<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:georss="http://www.georss.org/georss"
     xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
     xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[federal criminal attorney - Conaway & Strickler]]></title>
        <atom:link href="https://www.conawayandstrickler.com/blog/tags/federal-criminal-attorney/feed/" rel="self" type="application/rss+xml" />
        <link>https://www.conawayandstrickler.com/blog/tags/federal-criminal-attorney/</link>
        <description><![CDATA[Conaway & Strickler's Website]]></description>
        <lastBuildDate>Wed, 13 May 2026 21:02:04 GMT</lastBuildDate>
        
        <language>en-us</language>
        
            <item>
                <title><![CDATA[Child Pornography Cases Explained]]></title>
                <link>https://www.conawayandstrickler.com/blog/child-pornography/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/child-pornography/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Wed, 13 May 2026 21:00:17 GMT</pubDate>
                
                    <category><![CDATA[child pornography]]></category>
                
                    <category><![CDATA[CSAM charges]]></category>
                
                    <category><![CDATA[Sex Crimes]]></category>
                
                    <category><![CDATA[Sex Offenders]]></category>
                
                
                    <category><![CDATA[criminal defense lawyers]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[sex crimes lawyer]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>Charges for child pornography (also known as CSAM) can range from possession, receipt, distribution, manufacturing, or other related charges in both the state or federal courts. Under the various statutes, the material can include online files, videos, print materials, photos, and other online materials. There are multiple ways in which a person can find themselves&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Charges for child pornography (also known as CSAM) can range from possession, receipt, distribution, manufacturing, or other related charges in both the <a href="https://law.justia.com/codes/georgia/title-16/chapter-12/article-3/part-2/section-16-12-100/" id="https://law.justia.com/codes/georgia/title-16/chapter-12/article-3/part-2/section-16-12-100/">state </a>or <a href="https://www.justice.gov/criminal/criminal-ceos/citizens-guide-us-federal-law-child-pornography" id="https://www.justice.gov/criminal/criminal-ceos/citizens-guide-us-federal-law-child-pornography">federal</a> courts.  Under the various statutes, the material can include online files, videos, print materials, photos, and other online materials. There are multiple ways in which a person can find themselves charged with child pornography which can include online file sharing, possession of child pornography, producing or distributing child pornography, online chatting between adults and minors, sexual exploitation of children or even sexting.</p>



<p>It is important to secure competent legal counsel as soon as possible to argue your case successfully.  </p>



<p>There are many defenses that can be explored to get a positive outcome in your case.  For example, the first one that comes to mind is <a href="https://law.justia.com/codes/georgia/title-16/chapter-3/article-2/section-16-3-25/" id="https://law.justia.com/codes/georgia/title-16/chapter-3/article-2/section-16-3-25/">entrapment</a>.  These days law enforcement often pose as other users in chat rooms or on the dark net.  They pose as someone actively seeking CSAM.  You may not have ever done anything illegal but for their persuading you to so.  There are legal motions we can file that may be dispositive for your case.   Remember, the government has become well versed in programs like <a href="https://www.bittorrent.com/">BitTorrent</a>, and can be on the dark net doing things illegal themselves all in their efforts to “combat crime.” </p>



<p>Additionally, when law enforcement comes to execute a search warrant for devices at your home or office, they must have a valid search warrant or everything they seized will be discarded and not used in the case against you.  You need an <a href="https://www.conawayandstrickler.com/lawyers/meg-strickler-federal-criminal-defense-lawyer/" id="https://www.conawayandstrickler.com/lawyers/meg-strickler-federal-criminal-defense-lawyer/">experienced criminal defense lawyer</a> to ensure law enforcement did not violate your Constitutional rights in executing the search warrant.  </p>



<p>Sometimes, a download from a proper website can result in what is termed as an “accidental download”. We have experts ready to assist us in showing the government exactly what is and what is not on your devices and what is and what was purposely downloaded and accessed.  </p>



<p>These are but some defenses that Conaway & Strickler, PC have successfully argued.  <a href="https://www.conawayandstrickler.com/contact-us/" id="https://www.conawayandstrickler.com/contact-us/">Contact us </a>to discuss your case in more depth.  The consequences of a child pornography or CSAM (“Child Sexual Abuse Material”) conviction are severe and life-altering. And the collateral consequence of being on the <a href="https://gbi.georgia.gov/services/georgia-sex-offender-registry" id="https://gbi.georgia.gov/services/georgia-sex-offender-registry">sex offender registry</a> can be devastating.  We are here to help.  </p>



<p></p>



<p></p>



<p></p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Digital Privacy – Fourth Amendment Case Law Update]]></title>
                <link>https://www.conawayandstrickler.com/blog/digital-privacy-fourth-amendment-case-law-update/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/digital-privacy-fourth-amendment-case-law-update/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Mon, 27 Apr 2026 12:53:32 GMT</pubDate>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                    <category><![CDATA[Drug Crimes]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[federal criminal appeal]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                    <category><![CDATA[White Collar Offenses]]></category>
                
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>This week, the U.S. Supreme Court will decide if law enforcement needs to be more specific in their applications for search warrants for phones. At issue this week specifically is whether law enforcement can use broad geofence warrants to gather information about an alleged crime. In the case before the Supreme Court, the issue is&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>This week, the U.S. Supreme Court will decide if law enforcement needs to be more specific in their applications for search warrants for phones. At issue this week specifically is whether law enforcement can use broad <a href="https://en.wikipedia.org/wiki/Geofence" id="https://en.wikipedia.org/wiki/Geofence">geofence</a> warrants to gather information about an alleged crime. In the <a href="https://www.scotusblog.com/cases/chatrie-v-united-states/" id="https://www.scotusblog.com/cases/chatrie-v-united-states/">case </a>before the Supreme Court, the issue is whether the government can use cell phone location data at a crime scene without knowing who is holding the phone. They are gathering data based on the Global Positioning System, Bluetooth beacons, cell phone towers and local wi-fi networks.</p>



<p>To understand the specifics of this case, below we have quoted directly from the <a href="https://www.nacdl.org/getattachment/77ca2722-b0fa-49c8-88e7-8b88ee8752c5/chatrie-v-us-opening-brief.pdf" id="https://www.nacdl.org/getattachment/77ca2722-b0fa-49c8-88e7-8b88ee8752c5/chatrie-v-us-opening-brief.pdf">Petitioner’s Brief:</a> </p>



<p><em>This case concerns the constitutionality of geofence warrants. For cell phone users to use certain services, their cell phones must continuously transmit their exact locations to their service providers. A geofence warrant allows law enforcement to obtain, from the service provider, the identities of users who were in the vicinity of a particular location at a particular time. In this case, law enforcement obtained, and served on Google, a geofence warrant seeking anonymized location data for every device within 150 meters of the location of a bank robbery within one hour of the robbery. After Google returned an initial list, law enforcement sought— without seeking an additional warrant—information about the movements of certain devices for a longer, two-hour period, and Google complied with that request as well. Then—again without seeking an additional warrant—law enforcement requested de anonymized subscriber information for three devices. One of those devices belonged to petitioner Okello Chatrie. Based on the evidence derived from the geofence warrant, petitioner was convicted of armed robbery.</em></p>



<p>The last time the Supreme Court wrestled with cell phone privacy issues was in <a href="https://www.supremecourt.gov/opinions/17pdf/16-402_h315.pdf" id="https://www.supremecourt.gov/opinions/17pdf/16-402_h315.pdf">Carpenter v. United States, 585 U.S. 296 (2018)</a>, which is a landmark United States Supreme Court case concerning the privacy of historical cell site location information. The Court held in that case that the government violates the Fourth Amendment when accessing historical cell phone Iocation records containing the physical locations of cellphones without a search warrant. That case, however, was <em>after</em> a suspect was identified, making it unlike the current case before the Supreme Court.</p>



<p>We receive terabytes of data in discovery for our <a href="https://www.conawayandstrickler.com/criminal-defense-practice/white-collar-crimes/" id="https://www.conawayandstrickler.com/criminal-defense-practice/white-collar-crimes/">cases</a>. Motions to suppress can be filed for all of the data seized from search warrants of phones. We are cognizant of the ever changing landscape of Fourth Amendment case law. We ensure that law enforcement follows the appropriate procedures for every single case. <a href="https://www.conawayandstrickler.com/contact-us/" id="https://www.conawayandstrickler.com/contact-us/">Contact us </a>now if you have a case you would like to discuss.</p>



<p></p>



<p></p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[AI Generated CSAM – What to Know]]></title>
                <link>https://www.conawayandstrickler.com/blog/ai-generated-csam-what-to-know/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/ai-generated-csam-what-to-know/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sat, 14 Mar 2026 15:03:41 GMT</pubDate>
                
                    <category><![CDATA[child pornography]]></category>
                
                    <category><![CDATA[CSAM charges]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Sex Crimes]]></category>
                
                
                    <category><![CDATA[csam charges]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>What is AI-Generated CSAM? Synthetic child sexual abuse material (CSAM) may not involve a camera or physical contact but it will depicts a child in a sexual context and thus is subject to regulation. Artificial intelligence is used to create realistic images or videos of children in sexual situations. Sometimes, these materials depict completely fabricated&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p><strong>What is AI-Generated CSAM?</strong></p>



<p>Synthetic child sexual abuse material (CSAM) may not involve a camera or physical contact but it will depicts a child in a sexual context and thus is subject to regulation.  Artificial intelligence is used to create realistic images or videos of children in sexual situations. Sometimes, these materials depict completely fabricated children or the face or likeness of a real child, placing them into sexualized content without their knowledge or consent.  When it is the face or likeness of a real child, there is a higher likelihood of charges being imminent.  </p>



<p><strong>Can I be Charged with Synthetic CSAM? </strong></p>



<p>It is possible to be charged criminally when in possession of AI generated child sex abuse material.  There has been some movement in this area to <a href="https://www.techpolicy.press/court-rules-that-constitution-protects-private-possession-of-aigenerated-csam/">litigate the legality</a> of charging such activity criminally and only time will tell what that means for how the Supreme Court will rule as recent cases move through the system. <a href="https://www.wdbj7.com/2026/03/04/reports-ai-generated-child-sexual-abuse-material-surge/">  News </a>continues to state that AI – Generated CSAM is on the rise and “a growing concern” which will in turn result in additional federal and state criminal charges for AI-Generated CSAM.  </p>



<p>Regulation of AI-created intimate images, often referred to as “deep fakes” has been broadly adopted by most states and the federal government.  In the state of Georgia, there have been <a href="https://www.ossoff.senate.gov/press-releases/sens-ossoff-blackburn-launch-bipartisan-inquiry-to-address-ai-generated-child-sex-abuse-material-online/">several attempts to change legislation</a> including this recent <a href="https://www.ossoff.senate.gov/wp-content/uploads/2023/07/23.07.17_DOJ-Letter-re-AI-CSAM-FINAL-1.pdf">letter </a>written by Jon Ossoff.  There are also <a href="https://www.dekalbda.org/news_detail_T6_R369.php">recent prosecutions </a>including a man in KY who was sentenced to five years for <a href="https://www.justice.gov/usao-wdky/pr/bowling-green-man-sentenced-5-years-federal-prison-followed-20-years-supervised">using AI to create child sexual abuse material.</a>  <a href="https://www.justice.gov/psc/press-room">Prosecutions at the federal level for CSAM </a>is on the rise as well.   </p>



<p>If you learn that you are under investigation for offenses related to CSAM, you should <a href="https://www.conawayandstrickler.com/contact-us/">contact us </a>immediately. <a href="https://www.conawayandstrickler.com/lawyers/meg-strickler/">We </a>are here to help and have <a href="https://www.conawayandstrickler.com/blog/categories/sex-crimes/">experience</a> to fight these cases.  </p>



<p></p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Charged with a Federal Crime?]]></title>
                <link>https://www.conawayandstrickler.com/blog/charged-with-a-federal-crime/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/charged-with-a-federal-crime/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Thu, 29 Jan 2026 16:08:46 GMT</pubDate>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[Criminal Lawyer]]></category>
                
                    <category><![CDATA[federal crime]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                
                
                <description><![CDATA[<p>Being charged with a federal crime can result from allegations of violating a federal criminal statute. All cases are prosecuted by the Department of Justice prosecuted by a “AUSA” – Assistant United States Attorney. All cases are investigated by agencies like the FBI, ATF, or DEA. STEPS IN THE FEDERAL CRIMINAL PROCESS (Note: this blog&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Being charged with a federal crime can result from allegations of violating a <a href="https://www.congress.gov/crs-product/R48177">federal criminal statute.</a> All cases are prosecuted by the Department of Justice prosecuted by a “AUSA” – Assistant United States Attorney. All cases are investigated by agencies like the FBI, ATF, or DEA.</p>



<p><a href="https://www.justice.gov/usao/justice-101/steps-federal-criminal-process">STEPS IN THE FEDERAL CRIMINAL PROCESS</a> (Note: this blog will discuss the procedure for a plea. For more information on what to expect at federal criminal trial, read more <a href="https://www.conawayandstrickler.com/blog/what-to-expect-in-a-federal-criminal-trial/">here</a>.)</p>



<p><strong>Initial Appearance</strong></p>



<p>Generally, after an <a href="https://www.justice.gov/usao/justice-101/investigation">investigation</a>, charges are brought via a federal criminal indictment. Hiring a <a href="https://www.conawayandstrickler.com/lawyers/meg-strickler/">federal criminal defense attorney</a> as soon as possible results in a better resolution.</p>



<p>Once an indictment is filed, and you are arrested and processed, you are brought before a magistrate judge for an initial hearing on the case. At that time, you learn more about your rights and the charges against you, and the judge decides whether to grant you pretrial release  or order you be detained.</p>



<p><strong>Arraignment</strong></p>



<p>This hearing can occur at the same time as the initial appearance.  You are asked if you have read and understood the charges against you and you formally enter a plea of “Not Guilty”. </p>



<p><strong>Discovery</strong></p>



<p>Federal criminal discovery is governed by three sources of law: <a href="https://www.federalrulesofcriminalprocedure.org/title-iv/rule-16-discovery-and-inspection/">Rule 16 of the Federal Rules of Criminal Procedure</a>, the Supreme Court cases of <em>Brady </em>and <em>Giglio</em>, and the Jencks Act.</p>



<p><strong>Plea Negotiations</strong></p>



<p>The plea bargain itself, called a “<a href="https://www.justice.gov/archives/jm/criminal-resource-manual-623-pleas-federal-rule-criminal-procedure-11">Rule 11</a>” plea in the Federal Criminal Justice system, generally is memorialized in a 15-20 page document called the “<a href="https://www.justice.gov/usao-ndil/file/788886/dl?inline=">plea agreement</a>“.</p>



<p><strong>Change of Plea Hearing</strong></p>



<p>A change of plea hearing in federal court is scheduled when a defendant decides to plead guilty to a federal offense.  During the hearing, the judge will ask questions to ensure that the plea is entered freely and voluntarily.  </p>



<p><strong>Preparation of Pre-Sentence Report</strong></p>



<p>After you enter a plea of guilty to a federal offense or is convicted by trial, you will meet with a probation officer. The probation officer will conduct an interview you to get more information about the entire case and then submits a report for the judge to determine the proper sentence. The following information is gathered during this interview and pre sentence investigation: family history, community ties, education background, employment history, military history, physical health, mental and emotional health, history of substance abuse, financial condition, and willingness to accept responsibility for the offense. Learn more about the <a href="https://www.conawayandstrickler.com/blog/what-is-a-presentence-investigation-report-psr/">pre-sentence report</a> and the <a href="https://www.conawayandstrickler.com/blog/what-is-a-psr-interview/">pre-sentence report interview</a>.</p>



<p><strong>United States Sentencing Guidelines</strong></p>



<p>The <a href="https://www.ussc.gov/guidelines/2025-guidelines-manual">United States Federal Sentencing Guidelines</a> are what the judge uses to decide an appropriate sentence for each case.</p>



<p><strong>Sentencing Hearing</strong></p>



<p>A federal sentencing hearing is when final arguments are presented and a judge hands down the sentence.</p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[How to Defend CSAM Cases]]></title>
                <link>https://www.conawayandstrickler.com/blog/sex-crimes/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/sex-crimes/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Wed, 26 Nov 2025 03:02:11 GMT</pubDate>
                
                    <category><![CDATA[Sex Crimes]]></category>
                
                
                    <category><![CDATA[CSAM]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[sex crimes]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>I. How Does a Sex Crimes / CSAM Case Get to Law Enforcement? The National Center for Missing and Exploited Children (NCMEC) CyberTipline is a centralized reporting system for the online exploitation of children. Facebook/Meta, Google, Instagram, Snapchat, Yahoo, Microsoft, X, etc are required to report suspected CSAM detected on their platforms. These providers make&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>I. How Does a Sex Crimes / CSAM Case Get to Law Enforcement? <br></p>



<figure class="wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="576" height="576" data-id="1435" src="/static/2025/11/cs-picture.jpeg" alt="" class="wp-image-1435" srcset="/static/2025/11/cs-picture.jpeg 576w, /static/2025/11/cs-picture-300x300.jpeg 300w, /static/2025/11/cs-picture-150x150.jpeg 150w" sizes="auto, (max-width: 576px) 100vw, 576px" /></figure>
</figure>



<p>The National Center for Missing and Exploited Children (NCMEC)<a href="https://www.missingkids.org/gethelpnow/cybertipline?gad_source=1"> CyberTipline</a> is a centralized reporting system for the online exploitation of children. Facebook/Meta, Google, Instagram, Snapchat, Yahoo, Microsoft, X, etc are required to report suspected CSAM detected on their platforms.  These providers make reports of suspected online sex crimes issues and NCMEC reviews each report, and then forwards it to law enforcement for investigation. The report typically includes a description of the images, cryptographic hash values assigned to each file, and the Internet Protocol (IP) address linked to the account in question.</p>



<p>Cases can also occur when computer repair technicians encounter suspected CSAM on a device, or if a family member or peer sees something and informs law enforcement.  Additionally, if an allegation of child molestation is made against a suspect, that suspect’s devices may be seized and contraband files discovered.  </p>



<p>II.  How is the Dark Net involved in These Cases? </p>



<p>In a recent case, the DOJ arrested 18 defendants and dismantled four dark web sites dedicated to images and videos containing CSAM in “<a href="https://www.justice.gov/opa/pr/operation-grayskull-culminates-lengthy-sentences-managers-dark-web-site-dedicated-sexual">Operation Grayskull”</a>.</p>



<p>Bitcoin is the most popular dark web currency.  Litecoin comes in second as the most popular currency. Administrators of dark web sites use multiple websites under multiple pseudonyms, employing cryptocurrency mixers, numerous cryptocurrency wallets, and intermediary accounts to move the funds in an attempt to evade detection.</p>



<p>When a dark web site is dismantled, the users are tracked and ultimately arrested along with the administrators. </p>



<p>III.  What are Some Ways to Defend These Types of Cases? </p>



<p>Conaway & Strickler, PC always advises seeking digital forensic experts in these types of cases. They can mirror image the devices seized and analyze them. They help decipher some of the more technical aspects of the discovery we receive. Their expertise can pinpoint precise steps the government may have missed in their investigation. They can also determine whether files were intentionally accessed, whether timestamps were manipulated, and whether malware or remote-access software could have created the material without the accused’s knowledge.</p>



<p>We also employ forensic psychologists to do a psychosexual evaluation to help provide mitigation and/or to provide a defense to the charges.</p>



<p>Conaway & Strickler, PC represents clients charged with <a href="https://www.conawayandstrickler.com/criminal-defense-practice/sex-crimes/">Child Sex Abuse Material </a>at the state and federal level. For further information, please see <a href="https://www.conawayandstrickler.com/blog/categories/sex-crimes/">here </a>or <a href="https://www.conawayandstrickler.com/contact-us/">contact us</a>. We are here to help.</p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[What is Money Laundering?]]></title>
                <link>https://www.conawayandstrickler.com/blog/charged-with-money-laundering/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/charged-with-money-laundering/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Wed, 26 Nov 2025 02:14:54 GMT</pubDate>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[RICO]]></category>
                
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>I. What charges can the government use to allege money laundering? 18 U.S.C. § 1956: This is for laundering monetary instruments and carries a penalty of up to 20 years in prison and fines of up to $500,000 or twice the value of the funds involved, whichever is greater 18 U.S.C. § 1957: This applies&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p></p>



<p></p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="1024" height="768" src="/static/2025/11/lsa-downtown-view-.jpg" alt="" class="wp-image-1429" srcset="/static/2025/11/lsa-downtown-view-.jpg 1024w, /static/2025/11/lsa-downtown-view--300x225.jpg 300w, /static/2025/11/lsa-downtown-view--768x576.jpg 768w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>I. What charges can the government use to allege money laundering?</p>



<p>18 U.S.C. § 1956: This is for laundering monetary instruments and carries a penalty of up to 20 years in prison and fines of up to $500,000 or twice the value of the funds involved, whichever is greater</p>



<p>18 U.S.C. § 1957: This applies to engaging in monetary transactions in property derived from specified unlawful activity and can result in up to 10 years in prison and fines up to twice the value of the property involved.</p>



<p>18 U.S.C. § 1956(h): criminalizes conspiracy to commit money laundering. It makes it illegal for two or more people to agree to conduct or attempt to conduct a financial transaction involving the proceeds of specified unlawful activity (money laundering). The crime is the agreement itself, regardless of whether the money laundering was ultimately successful.</p>



<p>Bulk cash smuggling (31 U.S.C. § 5332): knowingly concealing more than $10,000 in currency or other monetary instruments on the person of such individual or in any conveyance, article of luggage, merchandise, or other container, and transports or transfers or attempts to transport or transfer such currency or monetary instruments from a place within the United States to a place outside of the United States, or from a place outside the United States to a place within the United States</p>



<p>RICO Act- the Racketeer Influenced and Corrupt Organizations (RICO)</p>



<p>II. Drug traffickers are purported to utilize some of the following tactics to money launder</p>



<p>-Purchase and or title assets in fictitious names, aliases, or in the names of friends or relatives </p>



<p>-Create and maintain Bitcoin and other cryptocurrency accounts. These are utilized because of the anonymity associated with the use of Bitcoin and other cryptocurrency accounts and because cryptocurrency is decentralized.</p>



<p>III. Dark Net Explanation </p>



<p>The darknet is a part of the internet that requires special software, like the <a href="https://www.torproject.org/">Tor browser</a>, to access, and is not indexed by standard search engines. It uses layered encryption to make user activity anonymous</p>



<p>IV. Cryptocurrency </p>



<p>This is a type of virtual currency, that is a decentralized, peer to peer network based medium of value or exchange that may be used as a substitute for fiat to buy goods or services or exchanged for fiat currency or other cryptocurrencies.  <a href="https://coinmarketcap.com/all/views/all/">Examples</a> of cryptocurrency are <a href="/blog/bitcoin-cryptocurrency-money-laundering/">Bitcoin</a>, Ethereum, Litecoin, Dogecoin, Monero, among others.  </p>



<p>Most cryptocurrencies have a blockchain which is a distributed public ledger, run by the decentralized network, containing an immutable and historical record of every transaction.  It is still difficult for a number of reasons for law enforcement to track.  </p>



<p>Cryptocurrency is stored in a virtual account called a <a href="https://www.coinbase.com/learn/crypto-basics/what-is-a-crypto-wallet">wallet</a>.  Crypto wallets are designed to store your private key, keeping your crypto accessible at all times. They also allow you to send, receive, and spend cryptocurrencies like Bitcoin and Ethereum.  Crypto wallets keep your private keys – the passwords that give you access to your cryptocurrencies – protected and accessible, allowing you to send and receive cryptocurrencies like Bitcoin and Ethereum.</p>



<p>The Financial Crimes Enforcement Network (“FinCEN”) has issued many notices discussing the various issues with cryptocurrency including recent concerns over regulatory risks related to convertible virtual currency <a href="https://www.fincen.gov/system/files/shared/FinCEN-Notice-CVCKIOSK.pdf">kiosks</a>.  This <a href="https://www.fincen.gov/system/files/advisory/2019-05-10/FinCEN%20Advisory%20CVC%20FINAL%20508.pdf">notice </a>dates back to 2019!  It’s worth a read as it describes dark net marketplaces and cryptocurrency really well.  </p>



<p>V. Recent cases in the news </p>



<p>The recent “<a href="https://manhattanda.org/d-a-bragg-announces-guilty-pleas-in-dark-web-cryptocurrency-drug-trafficking-ring-that-laundered-7-2-million/">Fire bunny</a>” case was a case that operated on the darknet from January 2019 to August 2022. It operated on multiple dark web marketplaces and described itself as an “old vendor with the best in QUALITY SPEED OF DELIVERY and STEALTH.”  In total, the defendants allegedly received nearly $8 million in Bitcoin proceeds and investigators found nearly $900,00 worth of cryptocurrency on one of the defendant’s phone. Some of the money received was laundered by converting Monero – a form of anonymized cryptocurrency that is extremely difficult to trace or monitor – into Bitcoin. The Bitcoin would then enter cryptocurrency exchange accounts controlled by the defendants and others.  At least $2.4 million in Bitcoin was sent to a foreign based cryptocurrency exchange and laundered in the form of Chinese Yuan.</p>



<p><a href="https://www.justice.gov/usao-sdny/pr/founders-samourai-wallet-cryptocurrency-mixing-service-sentenced-five-and-four-years">Samourai</a> CEO Keonne Rodriguez and Samourai CTO William Lonergan Hill were recently sentenced for knowingly transmitting over $237 million in alleged criminal proceeds, coming from, among other things, drug trafficking, darknet marketplaces, cyber-intrusions, frauds, sanctioned jurisdictions, murder-for-hire schemes, and a child pornography (“CSAM”) website.</p>



<p>It utilized a Bitcoin mixing service known as “Whirlpool,” and coordinated batches of Bitcoin exchanges between groups of Samourai users. Through this process, the original source of particular Bitcoin holdings became obscured within the blockchain’s transactional record, effectively preventing law enforcement agencies and cryptocurrency exchanges from tracing funds back to their origins. </p>



<p>The second service, called “Ricochet,” enabled users to introduce additional and unnecessary intermediate transactions—known as “hops”—between sending and receiving addresses. This feature served a similar obfuscation purpose, making it substantially more difficult for monitoring entities to establish connections between cryptocurrency transfers and potential illicit activities. The scale of these operations was considerable: from Ricochet’s launch in 2017 and Whirlpool’s inception in 2019, more than 80,000 Bitcoin—valued at over $2 billion at the time—passed through these services. Samourai collected fees for both services, estimated to have a total value of more than $6 million.</p>



<p>Finally, in <a href="https://www.justice.gov/opa/pr/law-enforcement-seize-record-amounts-illegal-drugs-firearms-and-drug-trafficking-proceeds">Operation RapTor</a>, participating law enforcement agencies in the U.S., Europe, South America, and Asia arrested 270 darknet vendors, buyers, and administrators.  Recently, as part of that large takedown, in the Southern District of New York (which is a district we are licensed to practice in) Incognito Market owner <a href="https://www.justice.gov/usao-sdny/pr/incognito-market-owner-pleads-guilty-operating-one-largest-illegal-narcotics">Rui-Siang Lin pled guilty</a> for operating an online narcotics bazaar that existed on the dark web.  It is alleged that Incognito Market sold more than $100 million of narcotics to anyone using the Tor web browser on the “dark web” or “darknet.”</p>



<p>Conaway & Strickler, PC is licensed to practice in NY, GA and CA. We can “pro hac” into any federal district in the country and have represented clients in New Hampshire, Vermont, Georgia, New Jersey, New York, California, Iowa, Texas, Tennessee, Florida, Pennsylvania, among others.  We have “first chaired” many jury trials and have represented clients charged with RICO, drug trafficking and cryptocurrency money laundering cases.  Please <a href="https://www.conawayandstrickler.com/contact-us/">contact us</a> for additional information or if you have a case you want to discuss with us.   Please see <a href="/criminal-defense-practice/federal-crimes/federal-white-collar-crimes/money-laundering/">here</a> for additional blogs on this subject.  </p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Why it is Important to have Professional License Defense]]></title>
                <link>https://www.conawayandstrickler.com/blog/why-it-is-important-to-have-professional-license-defense/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/why-it-is-important-to-have-professional-license-defense/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Fri, 19 Sep 2025 17:19:02 GMT</pubDate>
                
                    <category><![CDATA[Health Care]]></category>
                
                    <category><![CDATA[Nursing License Defense]]></category>
                
                    <category><![CDATA[Physician License Defense]]></category>
                
                    <category><![CDATA[Uncategorized]]></category>
                
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[health care fraud]]></category>
                
                    <category><![CDATA[Professional License Defense]]></category>
                
                
                
                <description><![CDATA[<p>Professional license defense is vital. Various professionals must have a valid, active license. When there are allegations of an arrest, substance abuse issues, misconduct or compliance failures, this can lead to disciplinary actions. Understanding what is involved and knowing how to navigate this is crucial for any professional facing such challenges. Over the past three&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Professional license defense is vital. Various professionals must have a valid, active license. When there are allegations of an arrest, substance abuse issues, misconduct or compliance failures, this can lead to disciplinary actions. Understanding what is involved and knowing how to navigate this is crucial for any professional facing such challenges.</p>



<p>Over the past three decades, Conaway & Strickler, PC has represented physicians, nurses, dentists, CPAs, chiropractors, financial advisors, educators, lawyers, and many others. The <a href="https://georgia.gov/get-professional-certification-or-license">list of licenses</a> for the state of Georgia shows how many professionals rely on licensure for their livelihood. We provide strong defenses to protect your professional license and preserve your reputation and career longevity.</p>



<p>It is important to <a href="https://www.conawayandstrickler.com/contact-us/">contact</a> Conaway & Strickler, PC very early on so that we can make strategic steps to protect your livelihood.  For example, a physician who is facing allegations of misconduct may face <a href="https://medicalboard.georgia.gov/what-does-it-mean-if-physicians-license-status-listed-probation-suspension-or-revocation">suspension, probation or revocation.  </a>It is important to have experienced legal counsel to effectively navigate these uncertain waters.  </p>



<p>Here is a list of the <a href="///Users/megstrickler/Downloads/Top%2010%20of%20the%20Most%20Common%20Disciplinary%20Actions%20Against%20Healthcare%20Professionals.pdf">top 10 of the Most Common Disciplinary Actions Against Healthcare Professionals</a> published recently by GCMB.  It helps explain some common pitfalls and responsibilities outlined by<br>the GCMB.  </p>



<p>If you are facing any issues with your professional license, we are here to help.  </p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Know Your Rights]]></title>
                <link>https://www.conawayandstrickler.com/blog/know-your-rights/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/know-your-rights/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Wed, 11 Jun 2025 13:43:00 GMT</pubDate>
                
                    <category><![CDATA[Blog]]></category>
                
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                
                
                <description><![CDATA[<p>When you’re approached or arrested by law enforcement, it’s natural to feel scared, overwhelmed, or tempted to explain your side. But one of the most powerful tools you have is silence. Under the 5th Amendment of the U.S. Constitution, you have the right to remain silent and avoid self-incrimination. This right is reinforced by your&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>When you’re approached or arrested by law enforcement, it’s natural to feel scared, overwhelmed, or tempted to explain your side. But one of the most powerful tools you have is silence. Under the 5th Amendment of the U.S. Constitution, you have the right to remain silent and avoid self-incrimination. This right is reinforced by your Miranda Rights, which police are required to read to you during a custodial interrogation. If you’ve heard the phrase, “You have the right to remain silent. Anything you say can and will be used against you in a court of law,” that’s your cue to stop talking and protect yourself.</p>



<p>Many people unknowingly waive their rights by speaking too soon or too freely. Even innocent statements can be twisted or taken out of context. That’s why one of the smartest things you can do is to invoke your right to remain silent and request legal counsel. Simply say, “I am invoking my right to remain silent. I would like to speak to an attorney.” Then stay quiet. You are not being difficult—you are being smart.</p>



<p>At Conaway & Strickler, we understand that early legal representation is crucial. Our experienced defense attorneys are here to protect your rights, guide you through the legal process, and fight for the best outcome possible. If you or a loved one is facing an investigation or has been arrested, don’t speak to the police first—<a href="/contact-us/">speak to us</a>. Contact Conaway & Strickler today for a free confidential consultation.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Department of Justice Fraud Prosecutions]]></title>
                <link>https://www.conawayandstrickler.com/blog/department-of-justice-fraud-prosecutions/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/department-of-justice-fraud-prosecutions/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Wed, 28 May 2025 13:28:00 GMT</pubDate>
                
                    <category><![CDATA[Blog]]></category>
                
                    <category><![CDATA[EIDL fraud]]></category>
                
                    <category><![CDATA[False Claims Act]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                    <category><![CDATA[White Collar Offenses]]></category>
                
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[EIDL fraud]]></category>
                
                    <category><![CDATA[federal crimes]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[health care fraud]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                
                
                <description><![CDATA[<p>Fraud is a concept that has been in the criminal justice system forever.&nbsp; Google defines it as an intentional deception used to gain an unfair advantage or benefit, often involving financial gains.&nbsp; How does the Department of Justice prosecute fraud?&nbsp; Below is a non exhaustive list of charges that the DOJ can bring. The FBI&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Fraud is a concept that has been in the criminal justice system forever.&nbsp; Google defines it as an intentional deception used to gain an unfair advantage or benefit, often involving financial gains.&nbsp; How does the Department of Justice prosecute fraud?&nbsp; Below is a non exhaustive list of charges that the DOJ can bring.</p>



<ul class="wp-block-list">
<li>Wire fraud</li>



<li>Mail fraud</li>



<li>Bank fraud</li>



<li>Tax fraud (tax evasion or false statements)</li>



<li>Healthcare fraud/FCA</li>



<li>Medicare/Medicaid fraud</li>



<li>PPP loan or COVID relief fraud</li>



<li>Securities fraud</li>



<li>Mortgage fraud</li>



<li>Immigration or visa fraud</li>



<li>Government contract fraud</li>



<li>Identity theft or benefits fraud</li>



<li>Trafficking in Counterfeit Goods or Services</li>



<li>Anti kickbacks</li>



<li>AML</li>
</ul>



<p>The FBI gives this <a href="https://www.fbi.gov/how-we-can-help-you/scams-and-safety/common-frauds-and-scams">list</a> of frauds and the DOJ publishes some of their cases <a href="https://www.justice.gov/criminal/criminal-fraud-cases">here</a>.</p>



<p>Fraud investigations can begin in a number of ways. In many cases, they are triggered by:</p>



<ul class="wp-block-list">
<li>A whistleblower or former employee</li>



<li>A suspicious activity report</li>



<li><a href="https://www.fbi.gov/how-we-can-help-you/scams-and-safety/common-frauds-and-scams">A suspicious activity report (SAR)</a> from a bank or financial institution</li>



<li>Data flagged by automated fraud detection software</li>



<li>A referral from another federal agency (e.g., IRS, SBA, USPS, HHS)</li>



<li>A civil audit or regulatory review that uncovers irregularities</li>



<li>Investigative journalism or public tips</li>



<li><a href="https://www.conawayandstrickler.com/blog/the-new-fincen-rule-for-residential-real-estate-what-it-means-for-investors-and-legal-compliance/">Problems in real estate transactions</a>.  (FINCEN’s new rule extends Anti-Money Laundering (AML) and Countering the Financing of Terrorism (CFT) obligations to investment advisers involved in these transactions)</li>
</ul>



<p>Once red flags are detected, the matter is referred to a federal investigative agency. These can include:</p>



<ul class="wp-block-list">
<li><strong>Federal Bureau of Investigation (FBI)</strong></li>



<li><strong>Internal Revenue Service – Criminal Investigation (IRS-CI)</strong></li>



<li><strong>Office of Inspector General (OIG)</strong></li>



<li><strong>Postal Inspection Service (USPIS)</strong></li>



<li><strong>Securities and Exchange Commission (SEC)</strong></li>



<li><strong>Health and Human Services (HHS)</strong></li>



<li><strong>Small Business Administration (SBA)</strong></li>
</ul>



<p>If you have been contacted by federal agents FOR ANY REASON, contact a federal criminal defense attorney immediately.&nbsp; Do not speak period.&nbsp; If you have received a grand jury subpoena, contact a federal criminal defense attorney immediately.&nbsp; If you have received a target letter, contact a federal criminal defense attorney immediately.&nbsp; If you are being audited by the IRS, SBA, HHS or another agency, contact a federal criminal defense attorney immediately. It never hurts in this&nbsp; last instance to have sage advice before the investigation goes any further.</p>



<p>At Conaway & Strickler, PC, we are here to help. <a href="/contact-us/">Contact us</a> to discuss your options.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Deferred Prosecution Agreements in the Health Care Field]]></title>
                <link>https://www.conawayandstrickler.com/blog/deferred-prosecution-agreements-in-the-health-care-field/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/deferred-prosecution-agreements-in-the-health-care-field/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sat, 08 Mar 2025 13:16:00 GMT</pubDate>
                
                    <category><![CDATA[False Claims Act]]></category>
                
                    <category><![CDATA[Health Care]]></category>
                
                    <category><![CDATA[Physician License Defense]]></category>
                
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[deferred prosecution agreements]]></category>
                
                    <category><![CDATA[False Claims Act]]></category>
                
                    <category><![CDATA[federal crimes]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[health care fraud]]></category>
                
                
                
                <description><![CDATA[<p>The federal government may target organizations and businesses as well as individuals for violations of federal criminal statutes.&nbsp; For example, in the health care realm, cases can include office managers, practitioners from doctors, nurses to pharmacists to all other aspects of the medical industry.&nbsp; Recent federal investigations have targeted pill mills, medicaid fraud, and accepting&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>The federal government may target organizations and businesses as well as individuals for violations of federal criminal statutes.&nbsp; For example, in the health care realm, cases can include office managers, practitioners from doctors, nurses to pharmacists to all other aspects of the medical industry.&nbsp; <a href="https://www.justice.gov/criminal/criminal-fraud/health-care-fraud-unit/2024-national-hcf-case-summaries">Recent federal investigations</a> have targeted pill mills, medicaid fraud, and accepting kickbacks among others.</p>



<p>Experienced federal criminal defense attorneys like those at <a href="/lawyers/meg-strickler/">Conaway & Strickler, PC</a> may suggest early on about the possibility of entering into a “deferred prosecution agreement” which is essentially a contract with the Department of Justice. DPAs are frequently used in cases involving corporate fraud, bribery, and antitrust violations.  These pretrial agreements may involve an admission of wrongdoing, the payment of fines, and the implementation of compliance measures.  Charges may be dropped if the defendant complies with the requirements of the agreement.  Generally, the Assistant United States Attorney will file the criminal complaint and the DPA with the court, so it is of public record. This will be accompanied by a formal request to the court that any prosecution be delayed according to the terms of the DPA, allowing the defendant to fulfill its agreed-upon actions.  This is very similar to conditional discharge / pre trial diversion agreements found at the state level.</p>



<p>An example of a <a href="https://www.justice.gov/d9/2023-08/415809.pdf">DPA</a> would be one that was entered in to by the DOJ and Teva Pharmaceuticals USA, Inc in August 2023 in response to the company’s involvement in a price fixing conspiracy involving several pharmaceuticals.&nbsp; &nbsp;As seen in this example, terms can include paying a fine, waiving certain rights, agreeing to a factual basis for the charges, and an agreement to cooperate and compliance monitoring and of course, agreeing to what will happen if there is a breach of the agreement.</p>



<p>The central benefit to entering in to a DPA is that the individual or business entity is not convicted of any crime. It offers an opportunity to have the federal criminal charges dismissed or dropped once the accused completes all the required conditions.</p>



<p><a href="https://www.gibsondunn.com/wp-content/uploads/2020/01/Avanir-Pharmaceuticals-DPA.pdf">Here</a> is an another example of a DPA entered in to with the NDGA and Avanir Pharmaceuticals.&nbsp; This pharmaceutical manufacturer based in Aliso Viejo, California, was charged for paying kickbacks to a physician to induce prescriptions of its drug Nuedexta.&nbsp; &nbsp;Of note in that case – the Northern District of Ohio indicted four individuals, including former Avanir employees and one of the top prescribers of Nuedexta in the country, who were involved in the kickback scheme.&nbsp; So, the company itself entered in to a DPA but there was still fall out with respect to some individuals and receiving criminal indictments.</p>



<p>Early intervention is key in a successful resolution in health care criminal matters.  We have extensively blogged about health care fraud.   <a href="/contact-us/">Contact us</a> if you need an experienced federal criminal defense litigator.  Our firm has vast experience in white collar criminal investigations including False Claims Act and antitrust investigations.</p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[What to Expect in a Federal Criminal Trial]]></title>
                <link>https://www.conawayandstrickler.com/blog/what-to-expect-in-a-federal-criminal-trial/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/what-to-expect-in-a-federal-criminal-trial/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sun, 12 Jan 2025 20:22:00 GMT</pubDate>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                
                
                <description><![CDATA[<p>A federal criminal trial consists of several different stages.&nbsp; &nbsp;The below will analyze a ONE defendant trial.&nbsp; But, more often than not, trials can consist of multiple defendants at trial.&nbsp; This just augments the time needed for each stage. Jury Selection also known as Voir Dire Jury selection is one of the most important parts&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>A federal criminal trial consists of several different stages.&nbsp; &nbsp;The below will analyze a ONE defendant trial.&nbsp; But, more often than not, trials can consist of multiple defendants at trial.&nbsp; This just augments the time needed for each stage.</p>



<p><strong>Jury Selection also known as Voir Dire</strong></p>



<p>Jury selection is one of the most important parts of a federal criminal trial.&nbsp; It will start with about 40 potential jurors brought in. Usually we move our chairs to the other side of the table to face them. We ask general questions, then individual questions. Then, we deliberate on who to choose. Then, the court asks us to do our strikes, and then a jury is empaneled.</p>



<p>This usually takes a full day.</p>



<p><strong>Opening Statement</strong></p>



<p>After the jury has been empaneled and sworn, and loads of logistical information is given to the jurors by the judge, then&nbsp;the federal district court judge will invite the AUSA to give their opening statement. Like the jury selection, the opening statement is a critical part of a federal criminal trial.</p>



<p>The purpose of the opening statement is to allow the parties to explain to the jury what the case is about. While the parties may discuss the evidence, and explain what they believe it will show, they are not allowed to make arguments about what they think the evidence means.</p>



<p>After the AUSA has given their opening statement, which they are required to do because they have the burden of proof, the federal district court judge will ask the defense attorney if (s)he wishes to give an opening statement. The judge asks this in the form of a question because the defense attorney is not required to give an opening statement.</p>



<p>In a criminal case, the federal criminal defense lawyer may either give an opening statement, waive the opening statement, or waive the opening statement at that time, instead giving their opening statement at the close of the AUSA’s case.&nbsp; If this was a multi defendant trial, the judge usually will go in order as it is depicted on the most recent indictment.</p>



<p><strong>Direct Examination</strong> begins after we are done with the opening statements.&nbsp; The AUSA will begin calling their witnesses.&nbsp; Federal criminal defense attorney teaches <a href="https://law.gsu.edu/profile/meg-strickler/">advanced evidence</a> to LLM and JD students and GSU law and <a href="https://law.emory.edu/news-and-events/releases/2024/05/2024-05-20-keptt-kessler-eidson-trial-techniques-emory-law.html">trial techniques</a> at Emory Law.&nbsp; She literally teaches the <a href="https://www.uscourts.gov/sites/default/files/evidence_federal_rules_pamphlet_dec_1_2023.pdf">Federal Rules of Evidence</a> on what comes in at trial and how to do direct and cross examinations to law students.</p>



<p>Most direct examinations include three stages: </p>



<p>1. Introduction and background of the witness. <br>2. Laying the foundation of their relation to the case<br>3. Substantive questions about the case.</p>



<p>Like all criminal cases, in a federal criminal trial, the entire burden of proof is on the AUSA. In thinking how to proceed, an AUSA will consider all elements of the crimes alleged. This is because every crime is made up of parts, or elements. The elements are set forth in the instructions to the jury. To prevail, the AUSA must prove each and every element of the crime. Consequently, the AUSA will call witnesses that have information they believe will help persuade the jury that an element has been satisfied.</p>



<p>Because this is direct examination, the AUSA may only ask open ended questions. This is often as simple as, “what happened next?” A question used for direct examination may not suggest an answer. Therefore, it would not be appropriate for the AUSA to tell the witness what they think happened, and then ask the witness to agree. Thus, the AUSA cannot properly say “and the next thing that happened was….do you agree?” This leading question would constitute cross-examination. The party who called the witness may not “lead” the witness and may only ask direct examination questions. Such a leading question would likely prompt the objection of any of us federal criminal defense lawyers.</p>



<p>There are some exceptions to this rule, however, and some leading questions are allowed during direct examination. For example, Rule 611 of the Federal Rules of Evidence suggests that an AUSA may use cross-examination as necessary to “develop the witnesses testimony.” Leading questions may also be used with a “hostile witness.”</p>



<p>Once the witness has testified on direct, the defense lawyer will get to conduct <strong>Cross-Examination</strong> of the government’s witnesses.</p>



<p>We may ask questions of the government’s witness after the AUSA has completed their direct examination. Again, the defense attorney is not required to ask questions because they have no burden of proof. While there may be strategic reasons for waiving a witness, in some instances, we will engage in extensive and detailed questioning or cross-examination of the government witness.</p>



<p>Most cross-examination questions include the following:</p>



<p>1. We draft question to elicit any positive information from the witness. <br>2. We work to limit the damage done by the cross-examination. <br>3. We will impeach the witness where appropriate.</p>



<p>The defense attorney’s questioning can proceed by either direct or leading questions. A leading question is one that suggests the answer. This is called cross-examination. The purpose of cross-examination is to expand on the witness’s testimony, and possibly to show that the witness lacks credibility or that their fact statements are wrong or misleading.</p>



<p>Cross-examination may also be used by us&nbsp;defense attorneys to show the jury that the government witness lacks actual knowledge, or that their knowledge is limited. This is especially true for expert witnesses. To expand on the above example, a defense attorney may cross-examine a forensic computer expert by asking them questions to show that they lack credentials. A cross-examination like this might be a simple statement to the witness such as “you don’t have a computer science degree?”</p>



<p>At the end of the government’s case, when there are no more witnesses or evidence, the AUSA will tell the judge that they “rest.” This means the AUSA’s case is completed.</p>



<p>At this juncture, we will all orally ask for a&nbsp;<strong>Motion for Directed Verdict</strong></p>



<p>In a federal criminal case, a motion for directed verdict is a motion requesting the judge to acquit the defendant as a matter of law. If the motion is granted, the case is done, and the defendant is declared the winner. A motion for directed verdict is also called a judgment as a matter of law.</p>



<p>While a motion for judgment as a matter of law may be made at any time before the case is submitted to the jury, the first opportunity for a federal criminal defense attorney to make such a motion is after the government has rested its case. In the attorney’s motion, we&nbsp;will offer to the judge any applicable law and explain why, based on this law, the facts of the case entitle the defendant to be found not guilty. An AUSA may not make a motion for directed verdict after the defense has rested.</p>



<p>In a typical federal criminal trial, once the AUSA has indicated that the government has rested its case, the district court judge will instruct the bailiff to escort the jury out of the courtroom. The judge will then ask the defense attorney if they have a motion for directed verdict. If the answer is no, then the jury will be brought back into the courtroom and the case will continue. Motions for directed verdict are always made outside the presence of the jury.</p>



<p>A federal criminal defense attorney may also make a motion for directed verdict at the end of the attorney’s case; meaning, after the defense has indicated to the court that they rest. This is because, as indicated, Rule 50 of the Federal Rules of Procedure allow a motion as a matter of law to be made any time before the jury has reached its verdict.</p>



<p><strong>DEFENSE:&nbsp;</strong></p>



<p>The defendant in a criminal case enjoys a presumption of innocence. One of the benefits of this presumption is that a person accused of a crime does not have an obligation to prove their innocence to the jury. This means there is no obligation to call any witnesses or produce any evidence. However, depending on the facts and circumstances of a case, it may be in the your best interest to call witness or provide evidence.</p>



<p>So, should any of us federal criminal defense attorneys call a witnesses, just as when the AUSA calls witnesses, the attorney may only ask this witness direct examination question, and the AUSA may cross-examine this witness using leading questions.</p>



<p>One of the witnesses that is available only to the defense attorney is the defendant. In a criminal case the accused has the right to remain silent. Therefore, only the defense attorney can call the accused to the stand. Whether to call the accused as a witness is often one of the most difficult questions for a federal criminal defense attorney. However, the final answer to this question resides completely with YOU. The decision must not be made by the lawyer.</p>



<p>Once all of&nbsp;the defense attorneys call all of&nbsp;their witnesses (if any), they will indicate to the court that “the defense rests.”</p>



<p>Next, we move to The <strong>Government’s Rebuttal Witnesses</strong></p>



<p>The defense may call rebuttal witnesses after it has rested because the government has the burden of proof. Rebuttal witnesses serve largely the same function as cross-examination in that they are used as part of an attempt, in this case by the government, to disprove evidence submitted by the defendant or to disprove what the defense witnesses said. It is rare, but possible, for the federal district court judge to allow what is called surrebuttal on the part of the defense. A surrebuttal witness is called by a party to respond to the opposing party’s rebuttal.</p>



<p><strong>Closing Arguments</strong></p>



<p>Once all the witnesses have been called, both the AUSA and we, the federal defense criminal defense attorneys, have presented all their evidence, and both have indicated to the court that they have rested, the next step is closing argument.</p>



<p>According to the <a href="https://www.uscourts.gov/sites/default/files/criminal_federal_rules_pamphlet_dec_1_2023.pdf">Federal Rules of Criminal Procedure</a>, the government goes first, the defense attorneys goes next, then the government gets another opportunity to rebut what the defense attorney has argued. The government gets to go first, and last, because they have the burden of proof.</p>



<p>Unlike the opening statement, in their final arguments, the AUSA and the federal criminal defense attorney may not only summarize the evidence presented but may also forcefully argue why the jury should find in their favor.</p>



<p>It is important to note, that district court judges will typically deny us the time, at the end of the trial, to leave and prepare our closing arguments.&nbsp; It is typical to move right into closing arguments after all the evidence has been received by the jury, and any directed verdict motions made and denied.</p>



<p>The Jury is then instructed as to the applicable law through what is known as jury charges.</p>



<p>The main purpose of a jury is to resolve issues of fact. A jury will reach its verdict by taking the law as provided to them by the judge and applying to this law to the facts as they find them. In this way they will arrive at their verdict. This law is set forth in the jury instructions.</p>



<p>Judges routinely state they will rely mainly on the pattern instructions prepared by the Circuit Committee on Pattern Criminal Jury instructions.&nbsp; We certainly research notable and useful jury charges and file such if we determine the pattern charges are not sufficient.</p>



<p><strong>Deliberations and Verdict</strong></p>



<p>The final stage in a federal criminal trial will be jury deliberations and verdict. The first thing the jury will do is select, often by voting, who will be their foreperson. Pattern jury instruction for the 11th circuit provides that the foreperson’s job is to do two things: (1) guide the jury’s deliberations and (2) be a liaison for communications with the court.</p>



<p>If the jury has questions, then normally, the foreperson will write it down, give it to the court officer who then gives the question to the judge. The jury may not tell anyone outside the jury where their “vote” stands or anything else about their deliberations. There is, however, no rule that says that only the foreperson may write down questions or give them to the court officer. In this way all jurors are “equal”.</p>



<p>In a criminal case the verdict must be unanimous in favor of acquittal or conviction. In a federal criminal case, a jury will be instructed they are to continue their deliberations until they have reached a unanimous decision. Pattern Jury Instructions on this issue provide that to find a defendant guilty in a federal criminal trial, the jury must unanimously agree that the government has overcome the presumption of innocence as to every element of the crime alleged and have done so with evidence that proves the defendant is guilty beyond a reasonable doubt.</p>



<p>As set forth in another&nbsp;Pattern Jury Instruction, the jury will be told that they are not to consider punishment in their deliberations. Punishment is solely the province of the judge presiding over the case.</p>



<p>Once the jury has reached its verdict, another&nbsp;Pattern Jury Instruction provides that the foreperson mark the appropriate place for guilty or not guilty, have each member sign the form, then give it to the court officer, who will then give the form to the judge.</p>



<p>Upon learning that the jury has reached its verdict, the judge will resume the trial, making sure the defendant is in the courtroom. Finally, the verdict will be read in court.</p>



<p>Once the verdict is read, if you are found guilty, the deputies (who have moved in to position for this moment) will come forward and ask you to put your hands behind your back and take off shoe laces, jewelry, etc in order to go in to custody.&nbsp; The federal criminal defense attorney immediately asks that the defendant remain out on an appeal bond, and the judge decides on whether or not to take the defendant in to custody at this time.</p>



<p>If you are found not guilty on all charges, then the case is over and closed.</p>



<p>Should you have any further questions about federal criminal defense trials please&nbsp;<a href="https://www.conawayandstrickler.com/contact-us.html">contact us</a>.&nbsp; We are here to help.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[White Collar Crime at a Crossroads: The Implications of Kousisis on Federal Fraud]]></title>
                <link>https://www.conawayandstrickler.com/blog/white-collar-crime-at-a-crossroads-the-implications-of-kousisis-on-federal-fraud/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/white-collar-crime-at-a-crossroads-the-implications-of-kousisis-on-federal-fraud/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Mon, 16 Dec 2024 19:32:00 GMT</pubDate>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[criminal defense attorney]]></category>
                
                    <category><![CDATA[Criminal Lawyer]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[fraud]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>This month, the Supreme Court heard oral arguments in Kousisis v. United States, a case that could have significant implications on the future of federal white-collar prosecutions. Specifically, the Court is considering the boundaries of federal fraud statutes in scenarios where deceptive practices are employed without causing direct financial harm to the victim. Kousisis comes&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>This month, the Supreme Court heard <a href="https://www.supremecourt.gov/oral_arguments/audio/2024/23-909" target="_blank" rel="noreferrer noopener">oral arguments</a> in <em><a href="https://www.scotusblog.com/case-files/cases/kousisis-v-united-states/" target="_blank" rel="noreferrer noopener">Kousisis v. United States</a></em>, a case that could have significant implications on the future of federal white-collar prosecutions. Specifically, the Court is considering the boundaries of federal fraud statutes in scenarios where deceptive practices are employed without causing direct financial harm to the victim.</p>



<p><em>Kousisis </em>comes before the Court after a Philadelphia-area government contractor was found guilty of fraud after it failed to comply with a contract provision intended to promote diversity. Stamatios Kousisis and Alpha Painting and Construction Co., Inc. (Alpha) secured two substantial contracts with the Pennsylvania Department of Transportation (PennDOT). These contracts mandated a certain percentage of work to be allocated to Disadvantaged Business Enterprises (DBEs). Kousisis and his company misrepresented their compliance with this requirement by using a DBE as a mere pass-through entity, thereby falsely claiming adherence to the DBE participation goals. Despite this deception, the contracted work was completed to PennDOT’s satisfaction, and no direct financial loss was incurred by the department.</p>



<p>Federal prosecutors charged Kousisis and Alpha with wire fraud, conspiracy to commit wire fraud, and making false statements. The prosecution’s argument was based on the “fraudulent inducement” theory, suggesting that the defendants obtained the contracts through deceptive promises, even though PennDOT did not suffer a financial loss. Ultimately, <a href="https://www.justice.gov/usao-edpa/pr/downingtown-man-sentenced-nearly-six-years-prison-defrauding-penndot-disadvantaged" target="_blank" rel="noreferrer noopener">Kousisis was sentenced</a> to 70 months’ imprisonment for the multi-million dollar fraud he perpetrated following a jury trial in 2018.</p>



<p>However, the defense has argued that for a fraud conviction, there must be an intent to cause economic harm, which they claim was absent in this case. During oral arguments, Justice Ketanji Brown Jackson posed the question, “Why isn’t this a classic scheme to obtain property under false pretenses?” For years in federal white-collar cases, the “scheme” itself has always been recognized as the “harm” that triggers application of the federal fraud statutes. Despite that precedent, defense argued: “If there’s no harm that occurs in those transactions, there is no fraud.”</p>



<p>It seems that conservative justices were receptive to the defendant’s argument. Chief Justice John Roberts suggested that “such crimes were better handled by state prosecutors.” Justice Samuel Alito expressed that “the court really doesn’t like the federalization of white-collar prosecutions and wants that to be done in state court and is really hostile to this whole enterprise.”</p>



<p>The outcome of <em>Kousisis v. United States</em> holds the potential to redefine the scope of federal white-collar prosecutions. A decision favoring the defendants could lead to a substantial shift in prosecutorial responsibilities from federal to state authorities. A ruling that limits federal jurisdiction in such cases would compel companies to adapt by focusing more on state-level compliance and legal frameworks. Engaging with experienced legal counsel will be essential for businesses to remain compliant and mitigate risks in this evolving legal landscape.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Recent Computer Hacking Cases in the News]]></title>
                <link>https://www.conawayandstrickler.com/blog/recent-computer-hacking-cases-in-the-news/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/recent-computer-hacking-cases-in-the-news/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sun, 24 Nov 2024 19:06:00 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[data breach]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[#bitcoin]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[atlanta criminal lawyer]]></category>
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                
                
                <description><![CDATA[<p>Recently, Robert Purbeck of Idaho, also known as “Lifelock,” and “Studmaster,”  was sentenced to ten years after pleading guilty to federal charges of computer fraud and abuse.  He hacked into the computer servers of the City of Newnan, Georgia  and a Griffin, Georgia medical clinic, and then targeted at least 17 other victims across the&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Recently, Robert Purbeck of Idaho, also known as “Lifelock,” and “Studmaster,”  was sentenced to ten years after pleading guilty to federal charges of computer fraud and abuse.  He <a href="https://www.11alive.com/article/news/local/city-of-newnan-experiences-data-breach/85-a76aa042-9758-4403-aad9-beba3976f401" target="_blank" rel="noreferrer noopener">hacked</a> into the computer servers of the City of Newnan, Georgia  and a Griffin, Georgia medical clinic, and then targeted at least 17 other victims across the United States – in the process stealing personal information of more than 132,000 individuals.  He also attempted to extort a Florida orthodontist for payment in Bitcoin, threatening to disclose stolen patient records and other personal information.</p>



<p>“Cyber extortion is unfortunately a rapidly growing threat and highlights the ever-growing need for corporations to remain vigilant in cybersecurity efforts,” <a href="https://www.justice.gov/usao-ndga/pr/idaho-man-sentenced-computer-hacking-and-extortion-scheme" target="_blank" rel="noreferrer noopener">said Sean Burke, Acting Special Agent in Charge of FBI Atlanta</a>. “This sentencing is just one example of the FBI working together to hold criminals that hide behind their computers accountable, regardless of their location.”</p>



<p>According to information presented in court, in June 2017, Purbeck purchased access to the computer server of a Griffin medical clinic on a darknet marketplace. He then used the stolen credentials to illegally access the computers of the medical clinic and removed records that contained the sensitive personal information of more than 43,000 individuals, including names, addresses, birth dates, and social security numbers.</p>



<p>In February 2018, Purbeck purchased access to a City of Newnan Police Department server on a darknet marketplace. Purbeck used the stolen credentials to hack into the City of Newnan’s computer systems and stole police reports and other documents, including personal information of more than 14,000 individuals.</p>



<p>Purbeck also attempted to extort a Florida orthodontist in July 2018, demanding a ransom payment in Bitcoin in return for his stolen patient files, threatening to sell the patient and personal information unless the orthodontist paid the ransom. Additionally, Purbeck threatened to sell the personal information of the orthodontist’s minor child. Purbeck harassed the orthodontist and his patients for 10 days with numerous threatening emails and text messages.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Song Wu, Chinese national, was indicted in September 2024, on charges for wire fraud and aggravated identity theft arising from his efforts to fraudulently obtain computer software and source code created by the National Aeronautics and Space Administration (“NASA”), research universities, and private companies.</p>



<p>“Efforts to obtain our nation’s valuable research software pose a grave threat to our national security,” <a href="https://www.justice.gov/usao-ndga/pr/chinese-national-charged-multi-year-spear-phishing-campaign" target="_blank" rel="noreferrer noopener">said U.S. Attorney Ryan K. Buchanan</a>. “However, this indictment demonstrates that borders are not barriers to prosecuting bad actors who threaten our national security.” According to information presented in court, Song allegedly engaged in a multi-year “spear phishing” email campaign in which he created email accounts to impersonate U.S.-based researchers and engineers and then used those imposter accounts to obtain specialized restricted or proprietary software used for aerospace engineering and computational fluid dynamics. This specialized software could be used for industrial and military applications, such as development of advanced tactical missiles and aerodynamic design and assessment of weapons. In executing the scheme, Song allegedly sent spear phishing emails to individuals employed in positions with the United States government, including NASA, the U.S. Air Force, Navy, and Army, and the Federal Aviation Administration.  Song also sent spear phishing emails to individuals employed in positions with major research universities in Georgia, Michigan, Massachusetts, Pennsylvania, Indiana, and Ohio, and with private sector companies that work in the aerospace field. Song’s spear phishing emails appeared to the targeted victims as having been sent by a colleague, associate, friend, or other person in the research or engineering community. His emails requested that the targeted victim send or make available source code or software to which Song believed the targeted victim had access. According to the indictment, while conducting this spear phishing campaign, Song was employed as an engineer at Aviation Industry Corporation of China (“AVIC”), a Chinese state-owned aerospace and defense conglomerate headquartered in Beijing, China.  AVIC manufactures civilian and military aircrafts and is one of the largest defense contractors in the world.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Ilya Lichtenstein, 35, of New York City, was sentenced recently to 60 months in federal prison for his involvement in a money laundering conspiracy arising from the hack and theft of approximately 120,000 bitcoin from Bitfinex, a global cryptocurrency exchange. According to information presented in court, Lichtenstein hacked into Bitfinex’s network in 2016, using advanced hacking tools and techniques. Once inside the network, Lichtenstein fraudulently authorized more than 2,000 transactions transferring 119,754 bitcoin from Bitfinex to a cryptocurrency wallet in Lichtenstein’s control. Lichtenstein then took steps to cover his tracks by deleting from Bitfinex’s network access credentials and other log files that could have revealed his conduct to law enforcement. Following the hack, Lichtenstein enlisted the help of his wife, Heather Morgan, in laundering the stolen funds. Lichtenstein, at times with Morgan’s assistance, employed numerous sophisticated laundering techniques, including using fictitious identities to set up online accounts; utilizing computer programs to automate transactions; depositing the stolen funds into accounts at a variety of darknet markets and cryptocurrency exchanges and then withdrawing the funds; converting bitcoin to other forms of cryptocurrency in a practice known as “chain hopping;” depositing a portion of the criminal proceeds into cryptocurrency mixing services; using U.S.-based business accounts to legitimize Lichtenstein’s and Morgan’s banking activity; and exchanging a portion of the stolen funds into gold coins. Additional information on this case is available on the United States Department of Justice’s website for large cases <a href="https://www.justice.gov/usao-dc/2016-bitfinex-hack">here</a>. &nbsp;</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[P2P Applications and Child Pornography]]></title>
                <link>https://www.conawayandstrickler.com/blog/p2p-applications-and-child-pornography/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/p2p-applications-and-child-pornography/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sat, 02 Nov 2024 14:16:00 GMT</pubDate>
                
                    <category><![CDATA[child pornography]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Sex Crimes]]></category>
                
                
                    <category><![CDATA[CSAM]]></category>
                
                    <category><![CDATA[federal child pornography charges]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>As we explained in our prior post about federal child pornography laws, the consequences of a child pornography or CSAM (“Child Sexual Abuse Material”) conviction are severe and life-altering. And the collateral consequence of being on the sex offender registry can be devastating. Early on, Conaway & Strickler defended cases that stemmed from activity on&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>As we explained in our prior post about <a href="https://www.conawayandstrickler.com/blog/federal-child-pornography-laws-in-a-nutshell/">federal child pornography laws</a>, the consequences of a child pornography or CSAM (“Child Sexual Abuse Material”) conviction are severe and life-altering. And the collateral consequence of being on the sex offender registry can be devastating.</p>



<p>Early on, Conaway & Strickler defended cases that stemmed from activity on classic peer-to-peer applications like Limewire.&nbsp; These type of networks were simply software applications that provided a central hub for various computers to connect.&nbsp; Napster, for example, was a peer-to-peer (P2P) file-sharing service that allowed users to share and download music files from other users’ computers.&nbsp; These types of programs were utilized to distribute music, movies and child pornography.&nbsp; Law enforcement was able to track those cases more easily.</p>



<p>Today, however, the government has also become well versed in programs like <a href="https://www.bittorrent.com/">BitTorrent</a>, Limewire and <a href="https://www.devx.com/terms/edonkey-network/">e-Donkey</a>, among others.&nbsp; When a hard drive or device is analyzed by the government, they now will produce a report detailing their forensic examination.&nbsp; They will detail all of the evidence found on the device showing evidence of P2P Networking, search history, bookmarks&nbsp; and they even cite images or image fragments found in cache locations.&nbsp; Here is a recent example of a <a href="https://www.justice.gov/usao-vi/pr/st-croix-man-who-downloaded-images-bittorrent-network-pleads-guilty-possession-child">federal criminal prosecution</a> of someone who downloaded images from the BitTorrent Network.</p>



<p>The P2P software programs allow the P2P networks to break large files into smaller segments that are then shared independently. The original purpose of this was to only optimize the download process by balancing the load among multiple users but it also increased the overall download speeds, as users can simultaneously download multiple segments from different sources.&nbsp; BUT, in early prosecutions of federal child pornography cases using P2P applications, the government was unable to show the actual images on the devices anymore.&nbsp; &nbsp;But, as described above, it is rare for a sophisticated user to have any actual images of CSAM on their devices.&nbsp; So, today, the government’s forensic report will draws a picture of all activities on the device to show that the user <em>intentionally</em> downloaded child pornography.&nbsp; We, at Conaway & Strickler, are well versed on the technicalities of defending a complex case like this and have years of experience of defending federal child pornography cases nationwide.&nbsp; We also have a variety of top notch experts ready to assist us to mirror images these devices in order to do our forensics to mount the proper defense to any federal criminal charges lodged.</p>



<p><a href="https://www.conawayandstrickler.com/contact-us.html">Contact us</a> anytime if you have any questions. We are here to help.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Criminal Consequences for Unruly Airline Passengers: The FAA’s Push for Prosecution]]></title>
                <link>https://www.conawayandstrickler.com/blog/criminal-consequences-for-unruly-airline-passengers-the-faas-push-for-prosecution/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/criminal-consequences-for-unruly-airline-passengers-the-faas-push-for-prosecution/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sat, 05 Oct 2024 17:45:04 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Sex Crimes]]></category>
                
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[FAA complaint]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[violent crimes]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                    <category><![CDATA[zero tolerance]]></category>
                
                
                
                <description><![CDATA[<p>In recent years, unruly behavior on flights has become a growing concern, prompting the Federal Aviation Administration (FAA) to escalate its enforcement efforts. Since 2021, the FAA has referred over 310 cases of severe incidents to the FBI for criminal prosecution. These cases involve dangerous acts like physical assaults, attempts to breach the cockpit, and&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>In recent years, unruly behavior on flights has become a growing concern, prompting the Federal Aviation Administration (FAA) to escalate its enforcement efforts. Since 2021, the FAA has referred over 310 cases of severe incidents to the FBI for criminal prosecution. These cases involve dangerous acts like physical assaults, attempts to breach the cockpit, and sexual misconduct, all of which have serious legal consequences.</p>


<p>The <strong>FAA’s zero-tolerance policy</strong>, implemented in 2021, marked a shift from warnings to immediate enforcement. With incidents like physical assaults on passengers and crew members, the FAA has consistently referred the most egregious cases to the FBI. The FAA can impose civil penalties up to $37,000 per violation, but when these cases are referred for criminal prosecution, offenders face much harsher outcomes.</p>


<p><a href="https://www.faa.gov/newsroom/faa-refers-more-unruly-passenger-cases-fbi" rel="noopener noreferrer" target="_blank">In 2023</a>, over 1,240 incidents of unruly passenger behavior were reported. Of those, 43 cases were referred to the FBI for criminal prosecution due to their severity. These cases often involve physical altercations or inappropriate behavior that pose a threat to the safety of everyone on board. The FAA’s clear stance on holding individuals accountable shows that passengers who engage in such behavior will face serious repercussions.You can read more about the FAA’s referral process and efforts in their <a href="https://www.faa.gov/newsroom/faa-refers-more-unruly-passenger-cases-fbi-0" rel="noopener noreferrer" target="_blank">official statement</a> and in further detail from <a href="https://www.faa.gov/unruly" rel="noopener noreferrer" target="_blank">FAA’s unruly passenger policy page</a>.</p>


<p>Once referred to the FBI, many unruly passenger cases lead to federal charges, especially when sexual misconduct or violence is involved. These cases often involve unwanted touching, and allegations of individuals under the influence of alcohol or medication. Federal prison time and long-term consequences await those convicted of these serious crimes. For more information about how the FBI and federal prosecutors handle these cases, you can review <a href="https://www.justice.gov/usao-wdwa/pr/federal-prosecutors-fbi-and-port-seattle-detail-disturbing-increase-sexual-assaults" rel="noopener noreferrer" target="_blank">this detailed account from the Department of Justice</a>.</p>


<p>Beyond hefty fines, individuals charged with federal crimes for unruly behavior aboard a flight face significant prison time. Sexual misconduct in particular is treated severely, with offenders often sentenced to years in federal prison. The FAA and FBI are clear in their mission: passengers who pose a threat will be prosecuted to the fullest extent of the law.</p>


<p>For those facing such charges, it is crucial to seek legal representation immediately. At our firm, we are experienced in defending against federal charges related to in-flight incidents and can provide the guidance needed to navigate these complex cases. <a href="/contact-us/">Contact us</a> today for a consultation.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[When Can Law Enforcement Search my Cell Phone?]]></title>
                <link>https://www.conawayandstrickler.com/blog/when-can-law-enforcement-search-my-cell-phone/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/when-can-law-enforcement-search-my-cell-phone/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sat, 14 Sep 2024 14:38:34 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Federal Offenses]]></category>
                
                
                    <category><![CDATA[aggravated identity theft]]></category>
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[drug trafficking]]></category>
                
                    <category><![CDATA[federal crimes]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>Cell phones are everywhere today and thus play a significant role in criminal investigations. What reports are generated from my devices? Cellebrite reports provide information about phone calls and text messages; but now it also provides a report on the data stored on these devices such as voicemails, images, and browsing history. From GPS location&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>Cell phones are everywhere today and thus play a significant role in criminal investigations.</p>


<p>
<strong>What reports are generated from my devices? </strong>
</p>


<p><a href="https://cellebrite.com/en/reader/" rel="noopener noreferrer" target="_blank">Cellebrite</a> reports provide information about phone calls and text messages; but now it also provides a report on the data stored on these devices such as voicemails, images, and browsing history.  From GPS location data to social media activity, cell phones can provide a treasure trove for law enforcement agencies to use to build their cases.</p>


<p>
<strong>What protections do I have to prevent law enforcement from searching my devices?</strong>
</p>


<p>Laws on the admission and use of this evidence in court are still evolving.  In the Georgia Supreme Court case <a href="https://caselaw.findlaw.com/court/ga-supreme-court/2189282.html" rel="noopener noreferrer" target="_blank">State v. Wilson,</a> the court ruled search warrants for cell phone contents must <em>specify</em> the items being sought. This is to prevent a general search of a person’s belongings, which is prohibited by the Fourth Amendment.</p>


<p>
<strong>Do I have the same legal rights at the border that I would elsewhere in the United </strong><strong>States?</strong></p>


<p>The Supreme Court ruled that the police must get a warrant before searching someone’s cell phone in <a href="https://supreme.justia.com/cases/federal/us/573/373/" rel="noopener noreferrer" target="_blank">Riley v. California</a>. The Supreme Court held that a warrant is generally required before a search of a cell phone seized incident to arrest.  BUT, at the border, there is less protection.  According to <a href="https://www.cbp.gov/sites/default/files/documents/inspectionelectronic-devices-tearsheet.pdf)" rel="noopener noreferrer" target="_blank">US Customs and Border Protection</a> a person may be chosen for inspection for many different random reasons and thus there is less protections when crossing the border in or out of the US.  What this means – you can be pulled for a secondary inspection and all of your devices can be searched without a warrant.  They can also get an image from the hard drive of these devices and / or seize the devices at the border.</p>


<p><strong>What do I do if I am asked to give my cell phone to law enforcement?</strong></p>


<p>If you know your rights, you can comply when necessary.  So, for example, if you are traveling internationally – do not travel with
devices that you would not want searched.  Furthermore, if you are driving and pulled over with drugs or a high amount of currency in your car, etc, your cell phone and / or other devices WILL be seized and analyzed.</p>


<p>And, please remember <em>anything</em> uploaded to the cloud is fair game for law enforcement.   That’s a broad statement – but when you signed up for Instagram, Whats App, Google, TikTok, Facebook, Signal, Twitter/X, etc, you signed away any privacy rights.  Those companies are fast to comply with law enforcement subpoenas giving whatever you posted/uploaded immediately to them.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Suspicious Activity Reports (SARs): What Triggers Them and How to Respond]]></title>
                <link>https://www.conawayandstrickler.com/blog/suspicious-activity-reports-sars-what-triggers-them-and-how-to-respond/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/suspicious-activity-reports-sars-what-triggers-them-and-how-to-respond/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Fri, 13 Sep 2024 16:36:56 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[PPP loan fraud]]></category>
                
                    <category><![CDATA[Theft Crimes]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[bank fraud]]></category>
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[fraud]]></category>
                
                    <category><![CDATA[identity theft]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[PPP Loan Fraud]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>In the world of banking and finance, the term “Suspicious Activity Report” (SAR) may sound intimidating—especially if you’ve been notified that a bank has filed one concerning your transactions. For individuals and businesses alike, it’s essential to understand what a SAR is, what activities can trigger these reports, and the potential legal consequences that may&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>In the world of banking and finance, the term “Suspicious Activity Report” (SAR) may sound intimidating—especially if you’ve been notified that a bank has filed one concerning your transactions. For individuals and businesses alike, it’s essential to understand what a SAR is, what activities can trigger these reports, and the potential legal consequences that may follow.</p>


<p><strong>What is a Suspicious Activity Report (SAR)?</strong></p>


<p>A Suspicious Activity Report (SAR) is a document that financial institutions are legally required to file with the <a href="https://www.fincen.gov/what-we-do" rel="noopener noreferrer" target="_blank">Financial Crimes Enforcement Network</a> (FinCEN) when they detect potentially suspicious behavior involving financial transactions. Once filed, these reports are sent to FinCEN, a division of the U.S. Department of the Treasury, which shares the information with law enforcement agencies for further investigation if necessary.</p>


<p><strong>Why Do Banks File SARs?</strong></p>


<p>Banks must comply with a variety of regulations designed to prevent financial crimes. One of the core elements of these regulations is monitoring customer transactions for anything that might indicate illegal or suspicious activity. A SAR is typically filed when a bank suspects that a transaction, or series of transactions, might involve:</p>


<ul class="wp-block-list">
<li><strong>Money laundering</strong>: Attempting to disguise the origins of illegally obtained money by passing it through a legitimate banking system.</li>
<li><strong>Fraud</strong>: Including wire fraud, identity theft, and other deceptive financial activities.</li>
<li><strong>Structuring</strong>: Breaking down large sums of money into smaller deposits to avoid triggering reporting requirements (also known as “smurfing”).</li>
<li><strong>Unexplained large transactions</strong>: Transactions that don’t align with an individual’s or business’s typical activity or appear inconsistent with known financial patterns.</li>
</ul>


<p><strong>Common Triggers for SARs</strong></p>


<p>Financial institutions are trained to spot red flags, and there are a number of scenarios that could trigger a SAR filing. Here are some of the most common:</p>


<ol class="wp-block-list">
<li><strong>Unusually Large Transactions</strong>: If an individual or business is suddenly moving unusually large amounts of money, especially in cash, this can raise red flags. Large deposits, withdrawals, or transfers that don’t align with normal activity patterns may prompt the bank to investigate further.</li>
<li><strong>Frequent Cash Deposits Below $10,000</strong>: To avoid the $10,000 threshold that triggers an automatic Currency Transaction Report (CTR), some individuals break down larger sums into smaller deposits (a practice called structuring). If a bank detects this behavior, it will likely file a SAR.</li>
<li><strong>Wire Transfers to High-Risk Countries</strong>: International wire transfers to or from countries that are known for terrorist activity, money laundering, or lacking robust financial regulations may result in a SAR filing.</li>
<li><strong>Multiple Accounts Under One Name</strong>: Using multiple accounts to shuffle money back and forth—especially if the accounts seem unrelated to legitimate business or personal activities—can appear suspicious.</li>
<li><strong>Account Activity Inconsistent with Known Business Practices</strong>: If a company typically processes small, regular transactions and suddenly starts handling large, irregular amounts, it might trigger suspicion. Likewise, if a personal account shows business-level activity, this could raise alarms.</li>
<li><strong>Use of Shell Companies</strong>: Banks scrutinize accounts associated with shell companies that lack a clear purpose or business activity, as they are often used in money laundering schemes.</li>
<li><strong>Unexplained Source of Funds</strong>: If the origin of deposited funds is unclear, or if large amounts of money are transferred without any legitimate explanation, the bank may file a SAR.</li>
</ol>


<p><strong>The Impact of a SAR Filing</strong></p>


<p>When a bank files a SAR, it is confidential. The individual or business subject to the report is not directly informed; However, the bank may decide to take action based on its findings, which can include:</p>


<ul class="wp-block-list">
<li><strong>Account closures</strong>: If the bank believes the activity is risky or potentially illegal, it may close your account or freeze any available funds.</li>
<li><strong>Increased monitoring</strong>: Your account may come under closer scrutiny, with more restrictions placed on transactions.</li>
<li><strong>Law enforcement involvement</strong>: If the behavior in question warrants it, the SAR could lead to a broader investigation by federal or state law enforcement agencies.</li>
</ul>


<p><strong>What to Do if You Believe a SAR Has Been Filed Against You</strong></p>


<p>While you won’t be directly informed if a SAR has been filed, you may suspect something is amiss if your bank account is frozen, closed, or you’re contacted by law enforcement regarding your financial activity. If you find yourself in this situation, here are some steps to take:</p>


<ol class="wp-block-list">
<li><strong>Seek Legal Counsel</strong>: The most important thing you can do is consult with an experienced criminal defense attorney. A SAR filing could be the beginning of a serious investigation, and you’ll want legal guidance to protect your rights and interests.</li>
<li><strong>Gather Financial Records</strong>: Be prepared to provide your attorney with all relevant financial records. This can help explain the nature of your transactions and demonstrate that they are legitimate.</li>
<li><strong>Do Not Attempt to Explain Yourself to the Bank</strong>: Anything you say to the bank could be misinterpreted or used against you in a later investigation. Your attorney will be able to navigate these communications appropriately.</li>
</ol>


<p>A Suspicious Activity Report can be a precursor to serious legal trouble, but it’s important to remember that it is not an accusation of a crime. Banks are required to report anything that appears suspicious, even if the behavior is ultimately lawful. If you find yourself facing consequences related to an SAR filing, don’t wait—<a href="/contact-us/">contact us</a> today for a consultation and take control of your situation before it escalates. If you are facing financial crime allegations, our skilled team of criminal defense attorneys is here to help.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[The Intersection of Crime and Non-Fungible Tokens (NFTs)]]></title>
                <link>https://www.conawayandstrickler.com/blog/the-intersection-of-crime-and-non-fungible-tokens-nfts/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/the-intersection-of-crime-and-non-fungible-tokens-nfts/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Tue, 14 Nov 2023 16:23:31 GMT</pubDate>
                
                    <category><![CDATA[Blog]]></category>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[#bitcoin]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[Criminal Lawyer]]></category>
                
                    <category><![CDATA[doj]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[fraud]]></category>
                
                    <category><![CDATA[fraud lawyer]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[NFTs]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>An NFT, or Non-Fungible Token, is a digital asset representing ownership or proof of authenticity of a unique item or piece of content using blockchain technology. Unlike cryptocurrencies such as Bitcoin or Ethereum, which are fungible and can be exchanged on a one-to-one basis, NFTs are non-interchangeable and one-of-a-kind. As long as you’re following copyright&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>An NFT, or Non-Fungible Token, is a digital asset representing ownership or proof of authenticity of a unique item or piece of content using blockchain technology. Unlike cryptocurrencies such as Bitcoin or Ethereum, which are fungible and can be exchanged on a one-to-one basis, NFTs are non-interchangeable and one-of-a-kind. As long as you’re following copyright laws and selling legitimate assets, creating, selling, and reselling NFTs is legal. However, due to the decentralized and anonymous nature of the crypto world, NFTs come with a host of legal issues. Like with most digital innovations, regulatory legislation has been slow to catch up and establish clear guidelines; still, wrongful use of NFTs can implicate an array of criminal charges.</p>


<p><strong>Money Laundering</strong> refers to the illegal process of concealing the origins of money obtained through criminal activities, making it appear as if it comes from a legitimate source. This is criminalized under 18 U.S.C. § 1956. Money laundering using NFTs involves the illicit use of these digital assets to disguise the origins of illegally obtained funds. In this context, individuals create a fake record of sales on the blockchain by selling NFTs to themselves using different accounts. Once finished, they sell the NFT to an unsuspecting buyer and repeat the process.</p>


<p><strong>Fraud</strong> has grown increasingly common in the crypto landscape due to its anonymous and decentralized nature. Fraud involving NFTs can manifest in various ways due to the unique characteristics of these digital assets. This is mostly being prosecuted as wire fraud under 18 U.S.C. § 1343. Some common forms of fraud associated with NFTs include:</p>


<ol class="wp-block-list">
<li><strong>Fake or Stolen NFTs</strong>: Fraudsters might create counterfeit NFTs by copying digital content and attempting to sell them as original or rare pieces. Additionally, they might steal someone else’s artwork or content and mint NFTs to sell without the creator’s consent.</li>
<li><strong>False Representation</strong>: Individuals might misrepresent the ownership or authenticity of an NFT by falsely claiming it is associated with a particular creator or source, leading buyers to believe they are purchasing something of higher value or legitimacy than it actually holds.</li>
<li><strong>Pump-and-Dump Schemes</strong>: Similar to traditional financial markets, some individuals may engage in pump-and-dump schemes within the NFT market. This involves artificially inflating the value of certain NFTs through false hype or manipulation, only to sell them off at a high price, leaving unsuspecting buyers with devalued assets.</li>
<li><strong>Phishing and Scams:</strong> Scammers may use phishing techniques to trick NFT owners into providing their private keys or access to their digital wallets, allowing the fraudster to steal the NFTs. Additionally, fraudulent schemes and fake NFT marketplaces can deceive buyers and sellers into making transactions for non-existent or misrepresented NFTs.</li>
<li><strong>Rug-Pull Scheme:</strong> As the term suggests, a “rug pull” refers to a scenario where the creator of an NFT and/or gaming project solicits investments and then abruptly abandons a project and fraudulently retains the project investors’ funds.</li>
</ol>


<p>Law enforcement is continuing to prosecute these types of NFT schemes across the nation, in cases that allege millions of dollars being defrauded. Two defendants were charged for executing a <a href="https://www.justice.gov/usao-sdny/pr/two-defendants-charged-non-fungible-token-nft-fraud-and-money-laundering-scheme-0" rel="noopener noreferrer" target="_blank">$1 million NFT money laundering and fraud scheme</a> in January 2022. In another NFT rug-pull, Aurelien Michel was charged for diverting <a href="https://www.justice.gov/usao-edny/pr/non-fungible-token-nft-developer-charged-multi-million-dollar-international-fraud" rel="noopener noreferrer" target="_blank">$2.9 million dollars in an international fraud scheme</a>.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[How is White Collar Crime Generally Prosecuted?]]></title>
                <link>https://www.conawayandstrickler.com/blog/how-is-white-collar-crime-generally-prosecuted/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/how-is-white-collar-crime-generally-prosecuted/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Mon, 10 Jul 2023 17:17:13 GMT</pubDate>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Federal Offenses]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[SEC]]></category>
                
                    <category><![CDATA[Theft Crimes]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                    <category><![CDATA[White Collar Offenses]]></category>
                
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[embezzlement]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[fraud lawyer]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                
                
                    <media:thumbnail url="https://conawayandstrickler-com.justia.site/wp-content/uploads/sites/908/2023/07/IMG_4620-scaled-1.jpeg" />
                
                <description><![CDATA[<p>The Department of Justice investigates and prosecutes cases where large amounts of money is alleged to have been taken. Examples of white collar crimes are money laundering, bank, wire and mail fraud, tax evasion, insider trading, insurance fraud, mortgage fraud, bribery and embezzlement. Of course Homeland Security, the FBI, the IRS, Customs and Border Patrol&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>The Department of Justice investigates and prosecutes cases where large amounts of money is alleged to have been taken. Examples of white collar crimes are money laundering, bank, wire and mail fraud, tax evasion, insider trading, insurance fraud, mortgage fraud, bribery and embezzlement.  Of course Homeland Security, the FBI, the IRS, Customs and Border Patrol and SEC can also investigate and prosecute cases of fraud as well.  </p>



<p>The government has a special United States Guideline Chapter dedicated to <a href="https://guidelines.ussc.gov/gl/§2B1.1" rel="noopener noreferrer" target="_blank">“basic” economic offenses</a>.  For purposes of this blog, this chapter will be discussed in more detail below.  As with anything involving federal criminal litigation, nothing is crystal clear in the law. Therefore, there is also a chapter in the United States Guidelines dedicated to tax offenses, election fraud, gambling, and money laundering in the United States Sentencing Guidelines.  </p>



<p>This USSG chapter DOES cover extortion, bribery, kickbacks, counterfeiting, embezzlement, health care fraud, computer fraud, insurance fraud, securities fraud, mortgage fraud, identity fraud, bankruptcy fraud, etc.   What is most important in this chapter is the loss amount.   All charges start off with a base offense level of  6 or 7 depending on the statutory max of the offense charged. Then, you look at what the “loss amount” is using the below table.
</p>



<figure class="wp-block-table is-style-regular"><table class="has-light-background-color has-background has-fixed-layout"><thead><tr><th>Loss (apply the greatest)</th><th>Increase in Level</th></tr></thead><tbody><tr><td>(A) $6,500 or less</td><td>no increase</td></tr><tr><td>(B) More than $6,500</td><td>add 2</td></tr><tr><td>(C) More than $15,000</td><td>add 4</td></tr><tr><td>(D) More than $40,000</td><td>add 6</td></tr><tr><td>(E) More than $95,000</td><td>add 8</td></tr><tr><td>(F) More than $150,000</td><td>add 10</td></tr><tr><td>(G) More than $250,000</td><td>add 12</td></tr><tr><td>(H) More than $550,000</td><td>add 14</td></tr><tr><td>(I) More than $1,500,000</td><td>add 16</td></tr><tr><td>(J) More than $3,500,000</td><td>add 18</td></tr><tr><td>(K) More than $9,500,000</td><td>add 20</td></tr><tr><td>(L) More than $25,000,000</td><td>add 22</td></tr><tr><td>(M) More than $65,000,000</td><td>add 24</td></tr><tr><td>(N) More than $150,000,000</td><td>add 26</td></tr><tr><td>(O) More than $250,000,000</td><td>add 28</td></tr><tr><td>(P) More than $550,000,000</td><td>add 30.</td></tr></tbody></table></figure>



<p>
The loss amount is a pandora box of confusion and the government is able to add all kinds of <a href="https://www.ussc.gov/sites/default/files/pdf/training/primers/2018_Primer_Relevant_Conduct.pdf" rel="noopener noreferrer" target="_blank">relevant conduct</a> and <a href="https://www.ussc.gov/sites/default/files/pdf/training/primers/2022_Primer_Loss.pdf" rel="noopener noreferrer" target="_blank">intended loss</a> conduct to inflate these numbers.</p>



<p>To further make things complicated, there are enhancements in this section that permit the government to add levels for things such as the use of sophisticated means, role in the offense, number of victims, a defrauding a charity, mass marketing, among others.</p>



<p>Navigating the federal criminal system is a task that should not be endured alone. <a href="/contact-us/">Contact</a> our team today for more information about we can protect your rights and your freedom.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Basics of Tax Evasion]]></title>
                <link>https://www.conawayandstrickler.com/blog/basics-of-tax-evasion/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/basics-of-tax-evasion/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Fri, 03 Mar 2023 06:51:08 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[tax evasion]]></category>
                
                    <category><![CDATA[Tax Fraud]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[IRS CID agent]]></category>
                
                    <category><![CDATA[tax evasion]]></category>
                
                    <category><![CDATA[tax fraud]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>By Maya Fouad Tax evasion is the most common federal tax crime and involves the failure to report taxes, reporting taxes inaccurately, or failing to pay taxes. Federal law defines the crime broadly; 26 U.S.C. 7201 states, “[a]ny person who willfully attempts in any manner to evade or defeat any tax imposed by this title&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>By Maya Fouad</p>


<p>Tax evasion is the most common federal tax crime and involves the failure to report taxes, reporting taxes inaccurately, or failing to pay taxes. Federal law defines the crime broadly; 26 U.S.C. 7201 states, “[a]ny person who willfully attempts in any manner to evade or defeat any tax imposed by this title or the payment thereof shall, in addition to other penalties provided by law, be guilty of a felony. . .” The penalties for tax evasion can include significant monetary fines, imprisonment, or both.</p>


<p>To establish a case of tax evasion, the Government must prove three elements beyond a reasonable doubt:</p>


<p>1. The Defendant attempted to evade or defeat a tax or payment of a tax;</p>


<p>2. An additional tax was due and owing; and</p>


<p>3. The Defendant acted willfully.</p>


<p>The Government is generally required to prove that the taxpayer owed substantially more tax than was reported; however, the Government does not necessarily need to prove the exact amount of tax evaded. In most tax evasion cases, this comes in the form of understatements or omissions of income, claims of fictitious or improper deductions, false allocations of income, or improper claims of credit or exemption.</p>


<p>The Government can offer direct or circumstantial evidence to prove the required elements. This may include evidence of specific transactions affecting taxable income which were inaccurately reported, unexplained increases in the taxpayer’s net worth or expenditures not reflected in the taxpayer’s net worth, or evidence of taxable receipts in a taxpayer’s bank deposits.</p>


<p>Finally, the language of the statute gives the crime of tax evasion a broad scope. Specifically, the crime of tax evasion applies to “[a]ny person” – not just individual taxpayers. Tax evasion under 26 U.S.C. 7201 can also be used to prosecute an individual taxpayer’s tax preparer, accountant, or bookkeeper, a corporate officer attempting to evade their corporation’s tax, or the administrator of an estate attempting to evade the estate’s tax. Further, the statute applies to “any tax” and tax evasion in “any manner” (emphasis added).</p>


<p>Recent tax evasion cases include the federal criminal jury trial of reality TV stars <a href="https://www.justice.gov/usao-ndga/pr/reality-tv-stars-convicted-fraud-and-tax-evasion" rel="noopener noreferrer" target="_blank">Todd and Julie Chrisley</a>.  They were convicted of tax evasion and other charges.  The DOJ alleged the Chrisleys knew the law was clear on taxable income and were required to file and pay taxes.   The IRS CID agent on the case was quoted as saying, “These convictions should send a clear message regardless of your fame or notoriety, everyone will be held accountable for paying their fair share of taxes.”  As a result of their case, they unfortunately are now in <a href="https://nbcpalmsprings.com/2023/01/17/todd-and-julie-chrisley-report-to-federal-prisons-to-begin-sentences/" rel="noopener noreferrer" target="_blank">prison</a>.</p>


<p>For more information on criminal tax charges, please <a href="/contact-us/">contact us</a>.  We are more than happy to discuss your situation.</p>


]]></content:encoded>
            </item>
        
    </channel>
</rss>