<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:georss="http://www.georss.org/georss"
     xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
     xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[federal criminal investigation - Conaway & Strickler]]></title>
        <atom:link href="https://www.conawayandstrickler.com/blog/tags/federal-criminal-investigation/feed/" rel="self" type="application/rss+xml" />
        <link>https://www.conawayandstrickler.com/blog/tags/federal-criminal-investigation/</link>
        <description><![CDATA[Conaway & Strickler's Website]]></description>
        <lastBuildDate>Wed, 13 May 2026 21:02:04 GMT</lastBuildDate>
        
        <language>en-us</language>
        
            <item>
                <title><![CDATA[Child Pornography Cases Explained]]></title>
                <link>https://www.conawayandstrickler.com/blog/child-pornography/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/child-pornography/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Wed, 13 May 2026 21:00:17 GMT</pubDate>
                
                    <category><![CDATA[child pornography]]></category>
                
                    <category><![CDATA[CSAM charges]]></category>
                
                    <category><![CDATA[Sex Crimes]]></category>
                
                    <category><![CDATA[Sex Offenders]]></category>
                
                
                    <category><![CDATA[criminal defense lawyers]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[sex crimes lawyer]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>Charges for child pornography (also known as CSAM) can range from possession, receipt, distribution, manufacturing, or other related charges in both the state or federal courts. Under the various statutes, the material can include online files, videos, print materials, photos, and other online materials. There are multiple ways in which a person can find themselves&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Charges for child pornography (also known as CSAM) can range from possession, receipt, distribution, manufacturing, or other related charges in both the <a href="https://law.justia.com/codes/georgia/title-16/chapter-12/article-3/part-2/section-16-12-100/" id="https://law.justia.com/codes/georgia/title-16/chapter-12/article-3/part-2/section-16-12-100/">state </a>or <a href="https://www.justice.gov/criminal/criminal-ceos/citizens-guide-us-federal-law-child-pornography" id="https://www.justice.gov/criminal/criminal-ceos/citizens-guide-us-federal-law-child-pornography">federal</a> courts.  Under the various statutes, the material can include online files, videos, print materials, photos, and other online materials. There are multiple ways in which a person can find themselves charged with child pornography which can include online file sharing, possession of child pornography, producing or distributing child pornography, online chatting between adults and minors, sexual exploitation of children or even sexting.</p>



<p>It is important to secure competent legal counsel as soon as possible to argue your case successfully.  </p>



<p>There are many defenses that can be explored to get a positive outcome in your case.  For example, the first one that comes to mind is <a href="https://law.justia.com/codes/georgia/title-16/chapter-3/article-2/section-16-3-25/" id="https://law.justia.com/codes/georgia/title-16/chapter-3/article-2/section-16-3-25/">entrapment</a>.  These days law enforcement often pose as other users in chat rooms or on the dark net.  They pose as someone actively seeking CSAM.  You may not have ever done anything illegal but for their persuading you to so.  There are legal motions we can file that may be dispositive for your case.   Remember, the government has become well versed in programs like <a href="https://www.bittorrent.com/">BitTorrent</a>, and can be on the dark net doing things illegal themselves all in their efforts to “combat crime.” </p>



<p>Additionally, when law enforcement comes to execute a search warrant for devices at your home or office, they must have a valid search warrant or everything they seized will be discarded and not used in the case against you.  You need an <a href="https://www.conawayandstrickler.com/lawyers/meg-strickler-federal-criminal-defense-lawyer/" id="https://www.conawayandstrickler.com/lawyers/meg-strickler-federal-criminal-defense-lawyer/">experienced criminal defense lawyer</a> to ensure law enforcement did not violate your Constitutional rights in executing the search warrant.  </p>



<p>Sometimes, a download from a proper website can result in what is termed as an “accidental download”. We have experts ready to assist us in showing the government exactly what is and what is not on your devices and what is and what was purposely downloaded and accessed.  </p>



<p>These are but some defenses that Conaway & Strickler, PC have successfully argued.  <a href="https://www.conawayandstrickler.com/contact-us/" id="https://www.conawayandstrickler.com/contact-us/">Contact us </a>to discuss your case in more depth.  The consequences of a child pornography or CSAM (“Child Sexual Abuse Material”) conviction are severe and life-altering. And the collateral consequence of being on the <a href="https://gbi.georgia.gov/services/georgia-sex-offender-registry" id="https://gbi.georgia.gov/services/georgia-sex-offender-registry">sex offender registry</a> can be devastating.  We are here to help.  </p>



<p></p>



<p></p>



<p></p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Digital Privacy – Fourth Amendment Case Law Update]]></title>
                <link>https://www.conawayandstrickler.com/blog/digital-privacy-fourth-amendment-case-law-update/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/digital-privacy-fourth-amendment-case-law-update/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Mon, 27 Apr 2026 12:53:32 GMT</pubDate>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                    <category><![CDATA[Drug Crimes]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[federal criminal appeal]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                    <category><![CDATA[White Collar Offenses]]></category>
                
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>This week, the U.S. Supreme Court will decide if law enforcement needs to be more specific in their applications for search warrants for phones. At issue this week specifically is whether law enforcement can use broad geofence warrants to gather information about an alleged crime. In the case before the Supreme Court, the issue is&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>This week, the U.S. Supreme Court will decide if law enforcement needs to be more specific in their applications for search warrants for phones. At issue this week specifically is whether law enforcement can use broad <a href="https://en.wikipedia.org/wiki/Geofence" id="https://en.wikipedia.org/wiki/Geofence">geofence</a> warrants to gather information about an alleged crime. In the <a href="https://www.scotusblog.com/cases/chatrie-v-united-states/" id="https://www.scotusblog.com/cases/chatrie-v-united-states/">case </a>before the Supreme Court, the issue is whether the government can use cell phone location data at a crime scene without knowing who is holding the phone. They are gathering data based on the Global Positioning System, Bluetooth beacons, cell phone towers and local wi-fi networks.</p>



<p>To understand the specifics of this case, below we have quoted directly from the <a href="https://www.nacdl.org/getattachment/77ca2722-b0fa-49c8-88e7-8b88ee8752c5/chatrie-v-us-opening-brief.pdf" id="https://www.nacdl.org/getattachment/77ca2722-b0fa-49c8-88e7-8b88ee8752c5/chatrie-v-us-opening-brief.pdf">Petitioner’s Brief:</a> </p>



<p><em>This case concerns the constitutionality of geofence warrants. For cell phone users to use certain services, their cell phones must continuously transmit their exact locations to their service providers. A geofence warrant allows law enforcement to obtain, from the service provider, the identities of users who were in the vicinity of a particular location at a particular time. In this case, law enforcement obtained, and served on Google, a geofence warrant seeking anonymized location data for every device within 150 meters of the location of a bank robbery within one hour of the robbery. After Google returned an initial list, law enforcement sought— without seeking an additional warrant—information about the movements of certain devices for a longer, two-hour period, and Google complied with that request as well. Then—again without seeking an additional warrant—law enforcement requested de anonymized subscriber information for three devices. One of those devices belonged to petitioner Okello Chatrie. Based on the evidence derived from the geofence warrant, petitioner was convicted of armed robbery.</em></p>



<p>The last time the Supreme Court wrestled with cell phone privacy issues was in <a href="https://www.supremecourt.gov/opinions/17pdf/16-402_h315.pdf" id="https://www.supremecourt.gov/opinions/17pdf/16-402_h315.pdf">Carpenter v. United States, 585 U.S. 296 (2018)</a>, which is a landmark United States Supreme Court case concerning the privacy of historical cell site location information. The Court held in that case that the government violates the Fourth Amendment when accessing historical cell phone Iocation records containing the physical locations of cellphones without a search warrant. That case, however, was <em>after</em> a suspect was identified, making it unlike the current case before the Supreme Court.</p>



<p>We receive terabytes of data in discovery for our <a href="https://www.conawayandstrickler.com/criminal-defense-practice/white-collar-crimes/" id="https://www.conawayandstrickler.com/criminal-defense-practice/white-collar-crimes/">cases</a>. Motions to suppress can be filed for all of the data seized from search warrants of phones. We are cognizant of the ever changing landscape of Fourth Amendment case law. We ensure that law enforcement follows the appropriate procedures for every single case. <a href="https://www.conawayandstrickler.com/contact-us/" id="https://www.conawayandstrickler.com/contact-us/">Contact us </a>now if you have a case you would like to discuss.</p>



<p></p>



<p></p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[CSAM – Navigating Prosecution Under New AI-Generated Obscenity Laws]]></title>
                <link>https://www.conawayandstrickler.com/blog/csam/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/csam/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Fri, 10 Apr 2026 21:23:15 GMT</pubDate>
                
                    <category><![CDATA[CSAM charges]]></category>
                
                    <category><![CDATA[Sex Crimes]]></category>
                
                
                    <category><![CDATA[child pornography charges]]></category>
                
                    <category><![CDATA[csam charges]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>The recent conviction involving AI-generated obscene material of women and children highlights complex legal issues arising from the intersection of technology and criminal law. The Department of Justice is saying this is the first in the nation – a conviction of violating the new Take It Down Act. This new legislation, targeting AI-generated content, opens&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p></p>



<p>The recent <a href="https://www.justice.gov/usao-sdoh/pr/columbus-man-pleads-guilty-cyberstalking-exes-creating-ai-generated-obscene-material">conviction </a>involving AI-generated obscene material of women and children highlights complex legal issues arising from the intersection of technology and criminal law. The Department of Justice is saying this is the first in the nation – a conviction of violating the new <a href="https://www.congress.gov/bill/119th-congress/senate-bill/146">Take It Down Act</a>.  This new legislation, targeting AI-generated content, opens the door to prosecution of newly-defined crimes, but also raises critical questions about evidence, intent, due process, among others.  This is especially an issue with any <a href="https://www.conawayandstrickler.com/blog/ai-generated-csam-what-to-know/">charges alleging CSAM (Child Sex Abuse Material).</a>  <a href="https://www.justice.gov/usao-wdnc/pr/charlotte-child-psychiatrist-sentenced-40-years-prison-sexual-exploitation-minor-and">Recent cases</a> are increasingly alleging use of generative artificial intelligence (AI) to digitally alter clothed images of minors into child pornography.</p>



<p>Prosecutors now have the ability to pursue cases involving synthetic media that depict explicit material. The use of AI to generate highly realistic images and videos makes these cases unique, requiring forensic expertise to distinguish fabricated content from authentic imagery. The prosecution must prove that the defendant knowingly produced and distributed material deemed obscene under the law, regardless of its digital origins.</p>



<p>One avenue for CSAM prosecution involves demonstrating that AI-generated content was used with the intent to exploit, harass, or endanger individuals. The law may enable prosecutors to argue that even virtual representations pose real harm, especially when circulated widely. In such cases, expert testimony and digital forensics play a crucial role in examining detailed technological material.</p>



<p>However, the defense may challenge the scope and application of the new law, questioning whether AI-generated images constitute actual offenses under existing legal definitions of obscenity and exploitation. Furthermore, issues of free speech and artistic expression may arise, requiring careful legal navigation. It is essential for courts to weigh the balance between protecting society and safeguarding individual rights.</p>



<p>As technology evolves, so must legal strategies. Defense attorneys fighting for clients charged with CSAM must remain vigilant, not only in protecting the rights of the accused, but also in ensuring that prosecution under new laws is fair, evidence-based, and respectful of civil liberties. The emergence of AI-generated content cases marks a new chapter in criminal justice.</p>



<p>If you or a loved one is facing charges related to AI-generated content, <a href="https://www.conawayandstrickler.com/contact-us/">contact</a> the attorneys at Conaway & Strickler to discuss your legal options.</p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Cryptocurrency Investment Fraud Cases]]></title>
                <link>https://www.conawayandstrickler.com/blog/cryptocurrency-investment-fraud-cases/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/cryptocurrency-investment-fraud-cases/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sun, 29 Mar 2026 17:33:34 GMT</pubDate>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                
                    <category><![CDATA[#crypto]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[cryptocurrency fraud charges]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>Conaway & Strickler, PC recently tried a case in federal court that involved cryptocurrency investment fraud, money laundering, and wire fraud. Through the years, the firm has taken on an increasing number of cryptocurrency fraud cases as the popularity of digital currency continues to grow. We are well versed on defended anyone charged with the&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Conaway & Strickler, PC recently tried a case in federal court that involved cryptocurrency investment fraud, <a href="/criminal-defense-practice/federal-crimes/federal-white-collar-crimes/money-laundering/">money laundering</a>, and wire fraud.  Through the years, the firm has taken on an increasing number of cryptocurrency fraud cases as the popularity of digital currency continues to grow.  We are well versed on defended anyone charged with the types of cases like the below.  </p>



<p>For example, the <a href="https://www.sec.gov/files/litigation/complaints/2025/comp-pr2025-144.pdf">SEC recently filed charges </a>against purported crypto asset trading platforms Morocoin Tech Corp., Berge Blockchain Technology Co. Ltd., and Cirkor Inc. and investment clubs AI Wealth Inc., Lane Wealth Inc., AI Investment Education Foundation Ltd., and Zenith Asset Tech Foundation alleging that they defrauded retail investors out of more than $14 million in an elaborate investment confidence scam.  </p>



<p>“AI Wealth, Lane Wealth, AIIEF, and Zenith operated so-called investment clubs using WhatsApp and solicited investors to join the clubs with ads on social media. The clubs gained investors’ confidence with supposedly AI-generated investment tips before luring investors to open and fund accounts on purported crypto asset trading platforms Morocoin, Berge, and Cirkor, which falsely claimed to have government licenses, as alleged. The investment clubs and platforms then allegedly offered “Security Token Offerings” that were purportedly issued by legitimate businesses. In reality, no trading took place on the trading platforms, which were fake, and the Security Token Offerings and their purported issuing companies did not exist, according to the complaint. When investors tried to withdraw their funds, the complaint alleges that the defendants further defrauded victims by demanding that they pay advance fees. In all, the defendants misappropriated at least $14 million from U.S.-based retail investors and funneled those funds overseas through a web of bank accounts and crypto asset wallets, as alleged.”</p>



<p>In another recent <a href="https://www.justice.gov/usao-ct/pr/wolcott-man-indicted-cryptocurrency-fraud-scheme">case</a>, a young man, Elmin Redzepagic was charged in a 21-count indictment offenses related to an alleged cryptocurrency fraud scheme.  As alleged in the indictment, Redzepagic “held himself out to investors as a cryptocurrency investor who earned high rates of return. Once Redzepagic had victims’ initial investment, he told them they had earned a substantial profit but had to pay additional fees (“gas fees”) to withdraw it. Redzepagic claimed to work as part of a team that included someone known as “The Chef,” who supposedly led the operation and determined who, how, and when investors would receive their profits. In fact, Redzepagic did not invest victims’ funds in cryptocurrency but instead transferred the funds to Stake.com, an offshore gambling platform that Redzepagic used to receive and hold proceeds of the scheme, to generate cryptocurrency addresses for victims to use to transfer Bitcoin to him, and to make large “lulling” payments to victims throughout the course of the scheme.”</p>



<p>Finally, in another <a href="https://www.justice.gov/usao-mdfl/pr/goliath-ventures-ceo-arrested-wire-fraud-and-money-laundering">case,</a> Goliath Ventures founder Christopher Alexander Delgado has been arrested on a criminal complaint charging him with wire fraud and money laundering. It is alleged that this “was a “Ponzi scheme,” which is a form of investment fraud that involves the payment of purported returns to existing investors from funds contributed by new investors. Delgado’s scheme involved soliciting victims to invest substantial sums of money under false and fraudulent promises of monthly returns generated through cryptocurrency “liquidity pools.” Victims were induced to give money to Goliath through personal referrals, professional marketing materials, luxury events, charitable sponsorships, and some monthly payments of purported returns, all of which were designed to establish Goliath’s bona fides with investors. Based on these false and fraudulent representations, Goliath obtained at least $328 million from victim investors.</p>



<p>Although Goliath represented that it would place the victim investors’ funds in cryptocurrency liquidity pools, in reality, the funds were primarily used to pay purported returns to earlier investors, to return principal to investors who requested it, and for Goliath’s extravagant business gatherings, holiday parties, and luxury travel accommodations. With victim investors’ funds, Delgado purchased four residential properties each worth between $1.15 million and $8.5 million.”</p>



<p>The FBI has <a href="https://www.fbi.gov/how-we-can-help-you/victim-services/national-crimes-and-victim-resources/cryptocurrency-investment-fraud">recently stated</a> that “cryptocurrency investment fraud, which the media commonly describes as “<a href="https://www.conawayandstrickler.com/blog/what-is-a-pig-butchering-scam/">pig butchering</a>,” is one of the most prevalent and damaging fraud schemes today.”  As a result, more and more DOJ prosecutions are happening.  Please <a href="https://www.conawayandstrickler.com/contact-us/">contact us </a>if you have received any sort of indication that you are under federal investigation.  </p>



<p></p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[AI Generated CSAM – What to Know]]></title>
                <link>https://www.conawayandstrickler.com/blog/ai-generated-csam-what-to-know/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/ai-generated-csam-what-to-know/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sat, 14 Mar 2026 15:03:41 GMT</pubDate>
                
                    <category><![CDATA[child pornography]]></category>
                
                    <category><![CDATA[CSAM charges]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Sex Crimes]]></category>
                
                
                    <category><![CDATA[csam charges]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>What is AI-Generated CSAM? Synthetic child sexual abuse material (CSAM) may not involve a camera or physical contact but it will depicts a child in a sexual context and thus is subject to regulation. Artificial intelligence is used to create realistic images or videos of children in sexual situations. Sometimes, these materials depict completely fabricated&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p><strong>What is AI-Generated CSAM?</strong></p>



<p>Synthetic child sexual abuse material (CSAM) may not involve a camera or physical contact but it will depicts a child in a sexual context and thus is subject to regulation.  Artificial intelligence is used to create realistic images or videos of children in sexual situations. Sometimes, these materials depict completely fabricated children or the face or likeness of a real child, placing them into sexualized content without their knowledge or consent.  When it is the face or likeness of a real child, there is a higher likelihood of charges being imminent.  </p>



<p><strong>Can I be Charged with Synthetic CSAM? </strong></p>



<p>It is possible to be charged criminally when in possession of AI generated child sex abuse material.  There has been some movement in this area to <a href="https://www.techpolicy.press/court-rules-that-constitution-protects-private-possession-of-aigenerated-csam/">litigate the legality</a> of charging such activity criminally and only time will tell what that means for how the Supreme Court will rule as recent cases move through the system. <a href="https://www.wdbj7.com/2026/03/04/reports-ai-generated-child-sexual-abuse-material-surge/">  News </a>continues to state that AI – Generated CSAM is on the rise and “a growing concern” which will in turn result in additional federal and state criminal charges for AI-Generated CSAM.  </p>



<p>Regulation of AI-created intimate images, often referred to as “deep fakes” has been broadly adopted by most states and the federal government.  In the state of Georgia, there have been <a href="https://www.ossoff.senate.gov/press-releases/sens-ossoff-blackburn-launch-bipartisan-inquiry-to-address-ai-generated-child-sex-abuse-material-online/">several attempts to change legislation</a> including this recent <a href="https://www.ossoff.senate.gov/wp-content/uploads/2023/07/23.07.17_DOJ-Letter-re-AI-CSAM-FINAL-1.pdf">letter </a>written by Jon Ossoff.  There are also <a href="https://www.dekalbda.org/news_detail_T6_R369.php">recent prosecutions </a>including a man in KY who was sentenced to five years for <a href="https://www.justice.gov/usao-wdky/pr/bowling-green-man-sentenced-5-years-federal-prison-followed-20-years-supervised">using AI to create child sexual abuse material.</a>  <a href="https://www.justice.gov/psc/press-room">Prosecutions at the federal level for CSAM </a>is on the rise as well.   </p>



<p>If you learn that you are under investigation for offenses related to CSAM, you should <a href="https://www.conawayandstrickler.com/contact-us/">contact us </a>immediately. <a href="https://www.conawayandstrickler.com/lawyers/meg-strickler/">We </a>are here to help and have <a href="https://www.conawayandstrickler.com/blog/categories/sex-crimes/">experience</a> to fight these cases.  </p>



<p></p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Why an Experienced Health Care Fraud Attorney Matters]]></title>
                <link>https://www.conawayandstrickler.com/blog/why-an-experienced-health-care-fraud-attorney-matters/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/why-an-experienced-health-care-fraud-attorney-matters/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sun, 22 Feb 2026 18:31:54 GMT</pubDate>
                
                    <category><![CDATA[False Claims Act]]></category>
                
                    <category><![CDATA[Health Care]]></category>
                
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[healthcare fraud defense]]></category>
                
                    <category><![CDATA[healthcare professional defense]]></category>
                
                    <category><![CDATA[heathcare fraud attorney]]></category>
                
                
                
                <description><![CDATA[<p>How can a Healthcare Fraud Attorney assist ?&nbsp; Healthcare fraud attorneys assist medical professionals who are facing allegations of False Claim Act violations. The False Claims Act “FCA” is an act that holds any person who knowingly submits, or causes to submit, false claims to the government civilly liable.  In general, such claims come from&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p><br><strong>How can a Healthcare Fraud Attorney assist</strong> ?&nbsp;</p>



<p>Healthcare fraud attorneys assist medical professionals who are facing allegations of <a href="https://www.conawayandstrickler.com/blog/recent-overview-of-the-false-claims-act/">False Claim Act </a>violations. <a href="https://www.justice.gov/civil/false-claims-act">The False Claims Act</a> “FCA” is an act that holds any person who knowingly submits, or causes to submit, false claims to the government civilly liable.  In general, such claims come from problematic practices related to billing federal government programs such as Medicare, Medicaid, and/or Tricare.  Any violation of federal regulations can cause issues.  </p>



<p><strong>What types of Healthcare Fraud does the Government Target?</strong></p>



<p>In general, the government will investigate situations involving:</p>



<p>-Billing for services not rendered</p>



<p>-Billing under the incorrect code</p>



<p>-Billing for services derived from illegal monetary kickbacks&nbsp;</p>



<p>-Billing for services that are not medically necessary. &nbsp;</p>



<p><strong>How can the government Bring a Claim?</strong></p>



<p><a href="https://www.justice.gov/civil/false-claims-act">The Falsc Claims Act</a> “FCA” is an act that holds any person who knowingly submits, or causes to submit, false claims to the government civilly liable. &nbsp;</p>



<p><strong>How can an individual purse a claim?&nbsp;</strong></p>



<p>In addition to allowing the government to pursue investigations on its own, the FCA allows private citizens to file suits on behalf of the government (called “<a href="https://www.fedbar.org/blog/understanding-the-basics-of-qui-tam-law/">qui tam</a>” suits) against those who have defrauded the government.&nbsp; Private citizens who successfully bring qui tam actions may receive a portion, (normally around 30 % of the recovered funds) of the government’s recovery.&nbsp; Many DOJ investigations arise from qui tam actions.</p>



<p><strong>What are the damages under the civil FCA?</strong></p>



<p>If a lawsuit filed under the FCA is lost, the doctor or medical business owner will be liable for damages.&nbsp; The district court is required to award damages in two ways:&nbsp;</p>



<ol class="wp-block-list">
<li>Triple the actual value of the fraudulently obtained funds and&nbsp;</li>



<li>Mandatory fine per false claim submitted.&nbsp;&nbsp;</li>
</ol>



<p>A <a href="https://www.justice.gov/opa/pr/false-claims-act-settlements-and-judgments-exceed-68b-fiscal-year-2025">recent press release</a> by the DOJ show <a href="https://www.justice.gov/opa/media/1424126/dl">settlements and judgments</a> under the False Claims Act <a href="https://www.justice.gov/opa/media/1424121/dl">exceeded $6.8 billion</a> in the fiscal year ending Sept. 30, 2025. &nbsp;</p>



<p>It is important to <a href="https://www.conawayandstrickler.com/contact-us/">reach out</a> and secure counsel, such as the experienced health care fraud attorneys at Conaway & Strickler PC as soon as practicable.&nbsp; It is always the hope to navigate the situation prior to the situation being investigated for <a href="https://www.conawayandstrickler.com/blog/largest-u-s-health-care-fraud-takedown-324-charged-14-6-b-alleged-loss/">criminal charges.</a>&nbsp;</p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Charged with a Federal Crime?]]></title>
                <link>https://www.conawayandstrickler.com/blog/charged-with-a-federal-crime/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/charged-with-a-federal-crime/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Thu, 29 Jan 2026 16:08:46 GMT</pubDate>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[Criminal Lawyer]]></category>
                
                    <category><![CDATA[federal crime]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                
                
                <description><![CDATA[<p>Being charged with a federal crime can result from allegations of violating a federal criminal statute. All cases are prosecuted by the Department of Justice prosecuted by a “AUSA” – Assistant United States Attorney. All cases are investigated by agencies like the FBI, ATF, or DEA. STEPS IN THE FEDERAL CRIMINAL PROCESS (Note: this blog&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Being charged with a federal crime can result from allegations of violating a <a href="https://www.congress.gov/crs-product/R48177">federal criminal statute.</a> All cases are prosecuted by the Department of Justice prosecuted by a “AUSA” – Assistant United States Attorney. All cases are investigated by agencies like the FBI, ATF, or DEA.</p>



<p><a href="https://www.justice.gov/usao/justice-101/steps-federal-criminal-process">STEPS IN THE FEDERAL CRIMINAL PROCESS</a> (Note: this blog will discuss the procedure for a plea. For more information on what to expect at federal criminal trial, read more <a href="https://www.conawayandstrickler.com/blog/what-to-expect-in-a-federal-criminal-trial/">here</a>.)</p>



<p><strong>Initial Appearance</strong></p>



<p>Generally, after an <a href="https://www.justice.gov/usao/justice-101/investigation">investigation</a>, charges are brought via a federal criminal indictment. Hiring a <a href="https://www.conawayandstrickler.com/lawyers/meg-strickler/">federal criminal defense attorney</a> as soon as possible results in a better resolution.</p>



<p>Once an indictment is filed, and you are arrested and processed, you are brought before a magistrate judge for an initial hearing on the case. At that time, you learn more about your rights and the charges against you, and the judge decides whether to grant you pretrial release  or order you be detained.</p>



<p><strong>Arraignment</strong></p>



<p>This hearing can occur at the same time as the initial appearance.  You are asked if you have read and understood the charges against you and you formally enter a plea of “Not Guilty”. </p>



<p><strong>Discovery</strong></p>



<p>Federal criminal discovery is governed by three sources of law: <a href="https://www.federalrulesofcriminalprocedure.org/title-iv/rule-16-discovery-and-inspection/">Rule 16 of the Federal Rules of Criminal Procedure</a>, the Supreme Court cases of <em>Brady </em>and <em>Giglio</em>, and the Jencks Act.</p>



<p><strong>Plea Negotiations</strong></p>



<p>The plea bargain itself, called a “<a href="https://www.justice.gov/archives/jm/criminal-resource-manual-623-pleas-federal-rule-criminal-procedure-11">Rule 11</a>” plea in the Federal Criminal Justice system, generally is memorialized in a 15-20 page document called the “<a href="https://www.justice.gov/usao-ndil/file/788886/dl?inline=">plea agreement</a>“.</p>



<p><strong>Change of Plea Hearing</strong></p>



<p>A change of plea hearing in federal court is scheduled when a defendant decides to plead guilty to a federal offense.  During the hearing, the judge will ask questions to ensure that the plea is entered freely and voluntarily.  </p>



<p><strong>Preparation of Pre-Sentence Report</strong></p>



<p>After you enter a plea of guilty to a federal offense or is convicted by trial, you will meet with a probation officer. The probation officer will conduct an interview you to get more information about the entire case and then submits a report for the judge to determine the proper sentence. The following information is gathered during this interview and pre sentence investigation: family history, community ties, education background, employment history, military history, physical health, mental and emotional health, history of substance abuse, financial condition, and willingness to accept responsibility for the offense. Learn more about the <a href="https://www.conawayandstrickler.com/blog/what-is-a-presentence-investigation-report-psr/">pre-sentence report</a> and the <a href="https://www.conawayandstrickler.com/blog/what-is-a-psr-interview/">pre-sentence report interview</a>.</p>



<p><strong>United States Sentencing Guidelines</strong></p>



<p>The <a href="https://www.ussc.gov/guidelines/2025-guidelines-manual">United States Federal Sentencing Guidelines</a> are what the judge uses to decide an appropriate sentence for each case.</p>



<p><strong>Sentencing Hearing</strong></p>



<p>A federal sentencing hearing is when final arguments are presented and a judge hands down the sentence.</p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[The DOJ has just announced that recoveries from False Claims Act settlements and judgments in fiscal year 2025 exceeded $6.8 billion]]></title>
                <link>https://www.conawayandstrickler.com/blog/the-doj-has-just-announced-that-recoveries-from-false-claims-act-settlements-and-judgments-in-fiscal-year-2025-exceeded-6-8-billion/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/the-doj-has-just-announced-that-recoveries-from-false-claims-act-settlements-and-judgments-in-fiscal-year-2025-exceeded-6-8-billion/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Thu, 22 Jan 2026 14:07:43 GMT</pubDate>
                
                    <category><![CDATA[False Claims Act]]></category>
                
                    <category><![CDATA[Uncategorized]]></category>
                
                
                    <category><![CDATA[False Claims Act]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[health care fraud]]></category>
                
                    <category><![CDATA[Qui Tam]]></category>
                
                
                
                    <media:thumbnail url="https://conawayandstrickler-com.justia.site/wp-content/uploads/sites/908/2026/01/image001.jpg" />
                
                <description><![CDATA[<p>Under the False Claims Act, individuals or entities can be held liable for knowingly submitting false or fraudulent claims for payment to the government. The FCA allows private individuals, known as “whistleblowers” or “relators,” to file lawsuits on behalf of the government and share in any monetary recovery. These health care fraud lawsuits are known&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Under the <a href="https://www.conawayandstrickler.com/blog/recent-overview-of-the-false-claims-act/">False Claims Act,</a> individuals or entities can be held liable for knowingly submitting false or fraudulent claims for payment to the government. The FCA allows private individuals, known as “whistleblowers” or “relators,” to file lawsuits on behalf of the government and share in any monetary recovery. These health care fraud lawsuits are known as qui tam actions. If the government intervenes in the lawsuit and recovers funds, the whistleblower is typically entitled to receive a portion of the recovered amount, often ranging from 15% to 30%. In fiscal year 2023, whistleblowers filed 712 qui tam suits, and this past year the Justice Department reported settlements and judgments exceeding $2.3 billion in these and earlier-filed suits.</p>



<p>“The False Claims Act imposes treble damages and penalties on those who knowingly and falsely claim money from the United States or knowingly fail to pay money owed to the United States. The False Claims Act thus safeguards government programs and operations that provide access to medical care, support our military and first responders, protect American businesses and workers, help build and repair infrastructure, offer disaster and other emergency relief, and provide many other critical services and benefits.”  Settlements and judgments under the False Claims Act <a href="https://www.justice.gov/opa/pr/false-claims-act-settlements-and-judgments-exceed-68b-fiscal-year-2025">exceeded $6.8 billion </a>in the fiscal year ending Sept. 30, 2025, Deputy Attorney General Todd Blanche and Assistant Attorney General Brett A. Shumate, head of the Justice Department’s Civil Division announced in mid January of 2026. Healthcare fraud dominated recoveries, with approximately $5.7 billion of the total $6.8 billion tied to healthcare-related matters that included managed care, prescription drugs, and medically unnecessary services.</p>



<p>In addition, relators also set a new record with 1,297 new <a href="https://www.fedbar.org/blog/understanding-the-basics-of-qui-tam-law/">qui tam suits </a>filed, breaking FY 2024’s record of 980 qui tam suits and nearly doubling the average number of new qui tam suits during <a href="https://www.justice.gov/archives/opa/media/1384546/dl">FY 2010 to FY 2023.</a></p>



<p>it is important for clients to make sure your compliance programs are designed to mitigate<a href="https://www.justice.gov/civil/false-claims-act">FCA</a> risk. Please <a href="https://www.conawayandstrickler.com/contact-us/">contact us</a>, we are here to help whether it is the beginning of an investigation, on the eve of trial, at the appellate stage or during settlement discussions.</p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Recent Investment Fraud case in Georgia]]></title>
                <link>https://www.conawayandstrickler.com/blog/recent-investment-fraud-case-in-georgia/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/recent-investment-fraud-case-in-georgia/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sat, 03 Jan 2026 18:04:54 GMT</pubDate>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[investment fraud]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[federal criminal defense attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[investment fraud]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar crime]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                    <media:thumbnail url="https://conawayandstrickler-com.justia.site/wp-content/uploads/sites/908/2023/10/IMG_7855-scaled-1.jpeg" />
                
                <description><![CDATA[<p>David Bradford, the former Chief Operating Officer of Drive Planning LLC (“Drive Planning”), pled guilty last month to conspiracy to commit wire fraud arising from a multi-year Ponzi investment fraud case that defrauded investors out of millions of dollars. A SEC complaint was also filed against Jacqueline and Russell Todd Burkhalter. The SEC complaint details&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>David Bradford, the former Chief Operating Officer of Drive Planning LLC (“Drive Planning”), <a href="https://www.justice.gov/usao-ndga/pr/former-financial-advisory-group-executive-pleads-guilty-4-million-ponzi-scheme">pled guilty</a> last month to conspiracy to commit wire fraud arising from a multi-year Ponzi investment fraud case that defrauded investors out of millions of dollars. A <a href="https://storage.courtlistener.com/recap/gov.uscourts.gand.332795/gov.uscourts.gand.332795.1.0.pdf">SEC complaint </a>was also filed against <a href="/blog/unregistered-securities-and-allegations-of-operating-a-ponzi-scheme/">Jacqueline and Russell Todd Burkhalter</a>. The SEC complaint details that promises of investment gains were built on lies. Drive Planning and its officers did not have any legitimate business operations capable of generating the returns they touted. Instead, they used new investor funds to pay earlier investors in classic Ponzi scheme fashion. The defendants in the case, it was alleged, used the funds to fund an extravagant lifestyle, including purchasing a $3.1 million yacht, spending $4.6 million on private jets and luxury car services, and acquiring a $2 million luxury condo.</p>



<p>An Indianapolis broker<a href="https://www.sec.gov/enforcement-litigation/litigation-releases/lr-26456"> is also being charged</a> with <a href="https://www.occ.gov/topics/consumers-and-communities/consumer-protection/fraud-resources/financial-and-investment-fraud-.html">securities fraud</a> and investment fraud by the SEC in relation to Drive Planning LLC, and its alleged $300 million Ponzi scheme. Gerardo “Gerry” Linarducci, a former Managing Partner of Drive Planning and head of its Indiana branch office, was charged on Dec. 19. </p>



<p>It is alleged that from late 2021 until in or about June 2024, Drive Planning, a Georgia based financial advisory group, marketed several investments, including the “Cash Out Real Estate Fund,” or “CORE Fund,” as “easy and simple,” advising prospective investors that the fund provided “100% Passive Income from Tax Liens.” Drive Planning guaranteed investors a return of 10% every six months or a 22% return per year for up to three years. Drive Planning further materially misrepresented that investors’ contributions to the CORE Fund were pooled together, government-protected, and fully collateralized. As part of the scheme, Bradford created a marketing brochure to promote the CORE Fund, which was shared with Drive Planning’s sales agents to solicit investors.&nbsp;</p>



<p>In actuality, the investors’ monies were being used for other purposes, including to pay off other Drive Planning investors, make commission payments to Drive Planning’s agents, and pay for personal expenditures. Bradford and others at Drive Planning further concealed the scheme to defraud by failing to disclose that Drive Planning did not invest any funds in the CORE Fund after approximately December 9, 2022. To the contrary, even after the Securities and Exchange Commission (SEC) began investigating Drive Planning in approximately March 2024, Bradford and others continued to solicit investments for the CORE Fund. In total, Drive Planning received at least $4.1 million from CORE Fund investors.</p>



<p>In August 2024, the SEC obtained a temporary restraining order against Drive Planning and filed separate civil enforcement actions against Drive Planning and others in the U.S. District Court for the Northern District of Georgia related to the above-described scheme.&nbsp;</p>



<h2 class="wp-block-heading" id="h-we-can-help">We Can Help</h2>



<p>Conaway & Strickler, PC has vast experience representing those who are facing charges from the SEC and the DOJ and we are equally adept at representing victims of <a href="https://www.conawayandstrickler.com/blog/what-is-a-pig-butchering-scam/">investment fraud</a>.  We pursue all available legal avenues to recover your lost investments.  <a href="https://www.conawayandstrickler.com/contact-us/">Contact us</a> should you need representation.  </p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[White House Designates Fentanyl as Weapon of Mass Destruction]]></title>
                <link>https://www.conawayandstrickler.com/blog/white-house-designates-fentanyl-as-weapon-of-mass-destruction/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/white-house-designates-fentanyl-as-weapon-of-mass-destruction/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Wed, 17 Dec 2025 16:16:15 GMT</pubDate>
                
                    <category><![CDATA[Drug Charges]]></category>
                
                    <category><![CDATA[Drug Crimes]]></category>
                
                    <category><![CDATA[Uncategorized]]></category>
                
                
                    <category><![CDATA[federal criminal defense attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                
                
                <description><![CDATA[<p>President Donald Trump signed an executive order this week classifying fentanyl as a weapon of mass destruction. This will now expand enforcement tools and give the government additional powers to combat illegal trafficking of the fentanyl. What will this mean to clients charged with trafficking or possessing fentanyl? This concept has been debated for a&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>President Donald Trump signed an<a href="https://www.whitehouse.gov/presidential-actions/2025/12/designating-fentanyl-as-a-weapon-of-mass-destruction/"> executive order </a>this week classifying fentanyl as a weapon of mass destruction.  This will now expand enforcement tools and give the government additional powers to combat illegal trafficking of the fentanyl.</p>



<p>What will this mean to clients charged with trafficking or possessing fentanyl?  This concept has been debated for a few years now.  Unfortunately, it is now official.  This executive order will increase the penalties.  <a href="https://www.law.cornell.edu/uscode/text/18/2332a">18 U.S.C. §2332</a> imposes a maximum sentence of life in prison for violation of this statute, and, if death results, this statute permits bringing the death penalty.   </p>



<p>Despite intensified measures targeting drug supply and trafficking, there remains a lack of substantial efforts directed toward treatment, prevention, and broader accountability. Issues surrounding pharmaceutical companies such as the Sacklers, Purdue Pharma, and the ongoing opioid epidemic continue to be areas of public concern and debate.  </p>



<p>While federal enforcement efforts are intensifying, the current approach may further strain the criminal justice system, especially as courts and correctional facilities contend with rising caseloads linked to fentanyl offenses. The broader public health response—including investments in addiction recovery, harm reduction, and community education—remains crucial to preventing future tragedies and supporting individuals affected by substance use disorders. As policy shifts continue, we will need to balance aggressive enforcement with meaningful support for those impacted by the opioid crisis. </p>



<p>The Department of Justice is currently citing “office policy” of very tough resolutions to drug trafficking cases with zero thought on the individual details of each case.  </p>



<p><a href="https://www.conawayandstrickler.com/contact-us/">Contact us</a> should you or a loved one be facing a possession with intent to distribute or drug trafficking charge.  </p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[How to Defend CSAM Cases]]></title>
                <link>https://www.conawayandstrickler.com/blog/sex-crimes/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/sex-crimes/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Wed, 26 Nov 2025 03:02:11 GMT</pubDate>
                
                    <category><![CDATA[Sex Crimes]]></category>
                
                
                    <category><![CDATA[CSAM]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[sex crimes]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>I. How Does a Sex Crimes / CSAM Case Get to Law Enforcement? The National Center for Missing and Exploited Children (NCMEC) CyberTipline is a centralized reporting system for the online exploitation of children. Facebook/Meta, Google, Instagram, Snapchat, Yahoo, Microsoft, X, etc are required to report suspected CSAM detected on their platforms. These providers make&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>I. How Does a Sex Crimes / CSAM Case Get to Law Enforcement? <br></p>



<figure class="wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="576" height="576" data-id="1435" src="/static/2025/11/cs-picture.jpeg" alt="" class="wp-image-1435" srcset="/static/2025/11/cs-picture.jpeg 576w, /static/2025/11/cs-picture-300x300.jpeg 300w, /static/2025/11/cs-picture-150x150.jpeg 150w" sizes="auto, (max-width: 576px) 100vw, 576px" /></figure>
</figure>



<p>The National Center for Missing and Exploited Children (NCMEC)<a href="https://www.missingkids.org/gethelpnow/cybertipline?gad_source=1"> CyberTipline</a> is a centralized reporting system for the online exploitation of children. Facebook/Meta, Google, Instagram, Snapchat, Yahoo, Microsoft, X, etc are required to report suspected CSAM detected on their platforms.  These providers make reports of suspected online sex crimes issues and NCMEC reviews each report, and then forwards it to law enforcement for investigation. The report typically includes a description of the images, cryptographic hash values assigned to each file, and the Internet Protocol (IP) address linked to the account in question.</p>



<p>Cases can also occur when computer repair technicians encounter suspected CSAM on a device, or if a family member or peer sees something and informs law enforcement.  Additionally, if an allegation of child molestation is made against a suspect, that suspect’s devices may be seized and contraband files discovered.  </p>



<p>II.  How is the Dark Net involved in These Cases? </p>



<p>In a recent case, the DOJ arrested 18 defendants and dismantled four dark web sites dedicated to images and videos containing CSAM in “<a href="https://www.justice.gov/opa/pr/operation-grayskull-culminates-lengthy-sentences-managers-dark-web-site-dedicated-sexual">Operation Grayskull”</a>.</p>



<p>Bitcoin is the most popular dark web currency.  Litecoin comes in second as the most popular currency. Administrators of dark web sites use multiple websites under multiple pseudonyms, employing cryptocurrency mixers, numerous cryptocurrency wallets, and intermediary accounts to move the funds in an attempt to evade detection.</p>



<p>When a dark web site is dismantled, the users are tracked and ultimately arrested along with the administrators. </p>



<p>III.  What are Some Ways to Defend These Types of Cases? </p>



<p>Conaway & Strickler, PC always advises seeking digital forensic experts in these types of cases. They can mirror image the devices seized and analyze them. They help decipher some of the more technical aspects of the discovery we receive. Their expertise can pinpoint precise steps the government may have missed in their investigation. They can also determine whether files were intentionally accessed, whether timestamps were manipulated, and whether malware or remote-access software could have created the material without the accused’s knowledge.</p>



<p>We also employ forensic psychologists to do a psychosexual evaluation to help provide mitigation and/or to provide a defense to the charges.</p>



<p>Conaway & Strickler, PC represents clients charged with <a href="https://www.conawayandstrickler.com/criminal-defense-practice/sex-crimes/">Child Sex Abuse Material </a>at the state and federal level. For further information, please see <a href="https://www.conawayandstrickler.com/blog/categories/sex-crimes/">here </a>or <a href="https://www.conawayandstrickler.com/contact-us/">contact us</a>. We are here to help.</p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[What is Money Laundering?]]></title>
                <link>https://www.conawayandstrickler.com/blog/charged-with-money-laundering/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/charged-with-money-laundering/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Wed, 26 Nov 2025 02:14:54 GMT</pubDate>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[RICO]]></category>
                
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>I. What charges can the government use to allege money laundering? 18 U.S.C. § 1956: This is for laundering monetary instruments and carries a penalty of up to 20 years in prison and fines of up to $500,000 or twice the value of the funds involved, whichever is greater 18 U.S.C. § 1957: This applies&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p></p>



<p></p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="1024" height="768" src="/static/2025/11/lsa-downtown-view-.jpg" alt="" class="wp-image-1429" srcset="/static/2025/11/lsa-downtown-view-.jpg 1024w, /static/2025/11/lsa-downtown-view--300x225.jpg 300w, /static/2025/11/lsa-downtown-view--768x576.jpg 768w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>I. What charges can the government use to allege money laundering?</p>



<p>18 U.S.C. § 1956: This is for laundering monetary instruments and carries a penalty of up to 20 years in prison and fines of up to $500,000 or twice the value of the funds involved, whichever is greater</p>



<p>18 U.S.C. § 1957: This applies to engaging in monetary transactions in property derived from specified unlawful activity and can result in up to 10 years in prison and fines up to twice the value of the property involved.</p>



<p>18 U.S.C. § 1956(h): criminalizes conspiracy to commit money laundering. It makes it illegal for two or more people to agree to conduct or attempt to conduct a financial transaction involving the proceeds of specified unlawful activity (money laundering). The crime is the agreement itself, regardless of whether the money laundering was ultimately successful.</p>



<p>Bulk cash smuggling (31 U.S.C. § 5332): knowingly concealing more than $10,000 in currency or other monetary instruments on the person of such individual or in any conveyance, article of luggage, merchandise, or other container, and transports or transfers or attempts to transport or transfer such currency or monetary instruments from a place within the United States to a place outside of the United States, or from a place outside the United States to a place within the United States</p>



<p>RICO Act- the Racketeer Influenced and Corrupt Organizations (RICO)</p>



<p>II. Drug traffickers are purported to utilize some of the following tactics to money launder</p>



<p>-Purchase and or title assets in fictitious names, aliases, or in the names of friends or relatives </p>



<p>-Create and maintain Bitcoin and other cryptocurrency accounts. These are utilized because of the anonymity associated with the use of Bitcoin and other cryptocurrency accounts and because cryptocurrency is decentralized.</p>



<p>III. Dark Net Explanation </p>



<p>The darknet is a part of the internet that requires special software, like the <a href="https://www.torproject.org/">Tor browser</a>, to access, and is not indexed by standard search engines. It uses layered encryption to make user activity anonymous</p>



<p>IV. Cryptocurrency </p>



<p>This is a type of virtual currency, that is a decentralized, peer to peer network based medium of value or exchange that may be used as a substitute for fiat to buy goods or services or exchanged for fiat currency or other cryptocurrencies.  <a href="https://coinmarketcap.com/all/views/all/">Examples</a> of cryptocurrency are <a href="/blog/bitcoin-cryptocurrency-money-laundering/">Bitcoin</a>, Ethereum, Litecoin, Dogecoin, Monero, among others.  </p>



<p>Most cryptocurrencies have a blockchain which is a distributed public ledger, run by the decentralized network, containing an immutable and historical record of every transaction.  It is still difficult for a number of reasons for law enforcement to track.  </p>



<p>Cryptocurrency is stored in a virtual account called a <a href="https://www.coinbase.com/learn/crypto-basics/what-is-a-crypto-wallet">wallet</a>.  Crypto wallets are designed to store your private key, keeping your crypto accessible at all times. They also allow you to send, receive, and spend cryptocurrencies like Bitcoin and Ethereum.  Crypto wallets keep your private keys – the passwords that give you access to your cryptocurrencies – protected and accessible, allowing you to send and receive cryptocurrencies like Bitcoin and Ethereum.</p>



<p>The Financial Crimes Enforcement Network (“FinCEN”) has issued many notices discussing the various issues with cryptocurrency including recent concerns over regulatory risks related to convertible virtual currency <a href="https://www.fincen.gov/system/files/shared/FinCEN-Notice-CVCKIOSK.pdf">kiosks</a>.  This <a href="https://www.fincen.gov/system/files/advisory/2019-05-10/FinCEN%20Advisory%20CVC%20FINAL%20508.pdf">notice </a>dates back to 2019!  It’s worth a read as it describes dark net marketplaces and cryptocurrency really well.  </p>



<p>V. Recent cases in the news </p>



<p>The recent “<a href="https://manhattanda.org/d-a-bragg-announces-guilty-pleas-in-dark-web-cryptocurrency-drug-trafficking-ring-that-laundered-7-2-million/">Fire bunny</a>” case was a case that operated on the darknet from January 2019 to August 2022. It operated on multiple dark web marketplaces and described itself as an “old vendor with the best in QUALITY SPEED OF DELIVERY and STEALTH.”  In total, the defendants allegedly received nearly $8 million in Bitcoin proceeds and investigators found nearly $900,00 worth of cryptocurrency on one of the defendant’s phone. Some of the money received was laundered by converting Monero – a form of anonymized cryptocurrency that is extremely difficult to trace or monitor – into Bitcoin. The Bitcoin would then enter cryptocurrency exchange accounts controlled by the defendants and others.  At least $2.4 million in Bitcoin was sent to a foreign based cryptocurrency exchange and laundered in the form of Chinese Yuan.</p>



<p><a href="https://www.justice.gov/usao-sdny/pr/founders-samourai-wallet-cryptocurrency-mixing-service-sentenced-five-and-four-years">Samourai</a> CEO Keonne Rodriguez and Samourai CTO William Lonergan Hill were recently sentenced for knowingly transmitting over $237 million in alleged criminal proceeds, coming from, among other things, drug trafficking, darknet marketplaces, cyber-intrusions, frauds, sanctioned jurisdictions, murder-for-hire schemes, and a child pornography (“CSAM”) website.</p>



<p>It utilized a Bitcoin mixing service known as “Whirlpool,” and coordinated batches of Bitcoin exchanges between groups of Samourai users. Through this process, the original source of particular Bitcoin holdings became obscured within the blockchain’s transactional record, effectively preventing law enforcement agencies and cryptocurrency exchanges from tracing funds back to their origins. </p>



<p>The second service, called “Ricochet,” enabled users to introduce additional and unnecessary intermediate transactions—known as “hops”—between sending and receiving addresses. This feature served a similar obfuscation purpose, making it substantially more difficult for monitoring entities to establish connections between cryptocurrency transfers and potential illicit activities. The scale of these operations was considerable: from Ricochet’s launch in 2017 and Whirlpool’s inception in 2019, more than 80,000 Bitcoin—valued at over $2 billion at the time—passed through these services. Samourai collected fees for both services, estimated to have a total value of more than $6 million.</p>



<p>Finally, in <a href="https://www.justice.gov/opa/pr/law-enforcement-seize-record-amounts-illegal-drugs-firearms-and-drug-trafficking-proceeds">Operation RapTor</a>, participating law enforcement agencies in the U.S., Europe, South America, and Asia arrested 270 darknet vendors, buyers, and administrators.  Recently, as part of that large takedown, in the Southern District of New York (which is a district we are licensed to practice in) Incognito Market owner <a href="https://www.justice.gov/usao-sdny/pr/incognito-market-owner-pleads-guilty-operating-one-largest-illegal-narcotics">Rui-Siang Lin pled guilty</a> for operating an online narcotics bazaar that existed on the dark web.  It is alleged that Incognito Market sold more than $100 million of narcotics to anyone using the Tor web browser on the “dark web” or “darknet.”</p>



<p>Conaway & Strickler, PC is licensed to practice in NY, GA and CA. We can “pro hac” into any federal district in the country and have represented clients in New Hampshire, Vermont, Georgia, New Jersey, New York, California, Iowa, Texas, Tennessee, Florida, Pennsylvania, among others.  We have “first chaired” many jury trials and have represented clients charged with RICO, drug trafficking and cryptocurrency money laundering cases.  Please <a href="https://www.conawayandstrickler.com/contact-us/">contact us</a> for additional information or if you have a case you want to discuss with us.   Please see <a href="/criminal-defense-practice/federal-crimes/federal-white-collar-crimes/money-laundering/">here</a> for additional blogs on this subject.  </p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Why it is Important to have Professional License Defense]]></title>
                <link>https://www.conawayandstrickler.com/blog/why-it-is-important-to-have-professional-license-defense/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/why-it-is-important-to-have-professional-license-defense/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Fri, 19 Sep 2025 17:19:02 GMT</pubDate>
                
                    <category><![CDATA[Health Care]]></category>
                
                    <category><![CDATA[Nursing License Defense]]></category>
                
                    <category><![CDATA[Physician License Defense]]></category>
                
                    <category><![CDATA[Uncategorized]]></category>
                
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[health care fraud]]></category>
                
                    <category><![CDATA[Professional License Defense]]></category>
                
                
                
                <description><![CDATA[<p>Professional license defense is vital. Various professionals must have a valid, active license. When there are allegations of an arrest, substance abuse issues, misconduct or compliance failures, this can lead to disciplinary actions. Understanding what is involved and knowing how to navigate this is crucial for any professional facing such challenges. Over the past three&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Professional license defense is vital. Various professionals must have a valid, active license. When there are allegations of an arrest, substance abuse issues, misconduct or compliance failures, this can lead to disciplinary actions. Understanding what is involved and knowing how to navigate this is crucial for any professional facing such challenges.</p>



<p>Over the past three decades, Conaway & Strickler, PC has represented physicians, nurses, dentists, CPAs, chiropractors, financial advisors, educators, lawyers, and many others. The <a href="https://georgia.gov/get-professional-certification-or-license">list of licenses</a> for the state of Georgia shows how many professionals rely on licensure for their livelihood. We provide strong defenses to protect your professional license and preserve your reputation and career longevity.</p>



<p>It is important to <a href="https://www.conawayandstrickler.com/contact-us/">contact</a> Conaway & Strickler, PC very early on so that we can make strategic steps to protect your livelihood.  For example, a physician who is facing allegations of misconduct may face <a href="https://medicalboard.georgia.gov/what-does-it-mean-if-physicians-license-status-listed-probation-suspension-or-revocation">suspension, probation or revocation.  </a>It is important to have experienced legal counsel to effectively navigate these uncertain waters.  </p>



<p>Here is a list of the <a href="///Users/megstrickler/Downloads/Top%2010%20of%20the%20Most%20Common%20Disciplinary%20Actions%20Against%20Healthcare%20Professionals.pdf">top 10 of the Most Common Disciplinary Actions Against Healthcare Professionals</a> published recently by GCMB.  It helps explain some common pitfalls and responsibilities outlined by<br>the GCMB.  </p>



<p>If you are facing any issues with your professional license, we are here to help.  </p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Recent Fraud Cases Highlighted by the DOJ include Cryptocurrency and Civil Forfeiture Complaints]]></title>
                <link>https://www.conawayandstrickler.com/blog/recent-fraud-cases-highlighted-by-the-doj-include-cryptocurrency-and-civil-forfeiture-complaints/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/recent-fraud-cases-highlighted-by-the-doj-include-cryptocurrency-and-civil-forfeiture-complaints/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sun, 03 Aug 2025 13:54:00 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[atlanta criminal lawyer]]></category>
                
                    <category><![CDATA[atlanta federal criminal attorney]]></category>
                
                    <category><![CDATA[atlanta internet crime attorney]]></category>
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[cryptocurrency fraud charges]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                
                
                <description><![CDATA[<p>As we enter the 8th month of 2025, it is clear that federal agencies have ramped up enforcement of federal crimes, leading to substantial financial penalties and lengthy prison sentences. Recently, the Department of Justice highlighted enforcement efforts that allegedly aimed at protecting&nbsp; Americans from transnational fraud schemes.&nbsp; Here are some of the cases discussed:&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>As we enter the 8th month of 2025, it is clear that federal agencies have ramped up enforcement of federal crimes, leading to substantial financial penalties and lengthy prison sentences.</p>



<p>Recently, the Department of Justice highlighted enforcement efforts that allegedly aimed at protecting&nbsp; Americans from transnational fraud schemes.&nbsp; Here are some of the cases discussed:</p>



<p><a href="https://www.pacermonitor.com/public/case/58513717/USA_v_Murray">United States v. Troy Murray</a> and <a href="https://www.pacermonitor.com/public/case/58513715/USA_v_Murray">United States v. Cutter Murray</a>. On June 11, 2025, DOJ’s Consumer Protection Branch filed an Information in SDFL charging Troy Murray also known as “Steve Dixson” with conspiracy to commit wire fraud. According to court documents, Troy Murray sold to lottery fraud scammers, including Jamaicans, his lead list database containing the names, and personal information of over seven million elderly American consumers. These lists were allegedly then used to defraud elderly victims. Additionally, Cutter Murray, Troy Murray’s son, will plead guilty to one count of money laundering for receiving and then laundering $1.6 million of the fraudulent funds Troy Murray obtained.</p>



<p><a href="https://www.justice.gov/usao-ct/pr/georgia-man-charged-operating-sweepstakes-scam">United States v. Jimmy Smith</a>. On April 1, 2025 the U.S. Attorney’s Office for the District of Connecticut announced charges against Jimmy Smith, 30, a citizen of Jamaica, who resided in Hinesville, Georgia. According to court documents, Smith and others defrauded at least four victims residing in Connecticut, New York, Texas, and California, by telling them they had won a Publishers Clearing House Sweepstakes and needed to pay taxes or money to claim the prize.</p>



<p>United States v. <a href="https://www.justice.gov/usao-ma/pr/nigerian-national-pleads-guilty-role-romance-scam-and-money-laundering-scheme">Charles Uchenna Nwadavid</a>. On April 9, the U.S. Attorney’s Office (USAO) for the District of Massachusetts announced charges against Charles Uchenna Nwadavid, a citizen of Nigeria who was arrested after landing at the Dallas-Fort Worth Airport. In January 2024, a grand jury indicted Nawadavid on one count of mail fraud and two counts of money laundering. Between approximately 2016 to September 2019, Nwadavid allegedly participated in romance scams that tricked victims into sending money abroad.&nbsp; He plead guilty to mail fraud, aiding and abetting money laundering and money laundering on June 26, 2025.&nbsp; The DOJ states “romance schemes” &nbsp;generally begin when the “bad actors” recruit victims through advertisements for online relationships on dating or social media websites. Individuals perpetuating romance scams often create fictitious profiles and then use them to gain victims’ trust through a purported romantic relationship. Perpetrators then direct their victims to send money or to conduct financial transactions involving other victims’ money under false pretenses, such as an urgent need for money to secure a multi-million dollar inheritance or to pay for an unexpected hospitalization.</p>



<p>Another romance scheme can involve investing in cryptocurrency. The United States Attorney’s Office for the Northern District of Ohio (USAO) has filed a <a href="https://www.justice.gov/usao-ndoh/media/1391461/dl?inline">civil complaint in forfeiture</a> against 8,207,578 Tether (USDT) cryptocurrency, valued at more than $8.2 million in February, 2025.&nbsp; &nbsp;In that case, investigators found that scammers initially contacted the victims through seemingly misdirected, or “wrong number,” text messages. The fraudster then gained the victim’s trust and affection using various manipulative tactics. Once trust was established with the victim, the fraudster would share how much success they, or someone they knew, had with investing in cryptocurrency. This personal testimonial lessened any uncertainties the victims may have had about virtual currencies and eventually had the intended effect to persuade the victim to proceed with the investment.</p>



<p>The fraudster would then guide the victim, step-by-step, on how to open a legitimate cryptocurrency account, most often with a U.S. based virtual currency exchange such as Crypto.com or Coinbase. The scammer would walk the victim through the entire process of transferring money from their bank to the newly created cryptocurrency account. Next, the victim received instructions on how to transfer the purchased cryptocurrency assets to an online “investment platform,” which would turn out to be a fake site created by the fraudsters to look like a legitimate company. Information on the platforms promised lucrative returns which encouraged victims to invest further. However, once the victim transferred their funds to the “investment platform” they unknowingly handed over complete control and ownership of their funds to the scammer.&nbsp; These fake cryptocurrency trading platforms or fake versions of official crypto wallets to trick unsuspecting victims. These fake websites usually have similar but slightly different domain names from the sites they attempt to mimic.</p>



<p>The complaint also outlines that the perpetrators of such investment fraud schemes often allow victims to withdraw a portion of their “profits” early on in the scheme to build trust and reinforce their belief that the “investment platform” was legitimate. But as the scheme progressed, victims were unable to withdraw their funds and given excuses as to why they could not access their funds. For example, the fraudsters referred to a fake “tax” requirement, stating that taxes must be paid on the proceeds generated from the investment platform. Knowing that the scam would run its course soon, the fraudsters used last-ditch efforts to lie to victims that they had to pay a tax. Ultimately, victims were locked out of their account on the investment platform and lost their funds.</p>



<p>A woman in Lake County, Ohio became the target of such a scam when she responded to a text on her phone from an unknown number in November 2023. She began sharing information via text with the person and the two bonded over topics such as hobbies and religion. Over a period of time, the victim followed instructions from her new “friend” and opened an account at Crypto.com and then transferred funds into the account. When the victim wanted to withdraw funds, her “friend,” relented and said additional payments were needed and she complied. When the victim no longer had any funds left after making additional payments, her “friend” began to threaten her that he would send his friends to “take care of” her friends and family. Having lost her entire life savings of approximately $663,352, including funds from her Roth IRA, the victim filed a complaint with the FBI’s Internet Crime Complaint Center to report the losses in June 2024. The FBI Cleveland Division subsequently initiated an investigation.</p>



<p><a href="https://www.justice.gov/usao-ndoh/media/1402451/dl?inline">United States v. 679,981.22 Tether, et al</a>. On June 3, the U.S. Attorney’s Office for the Northern District of Ohio announced the filing of a civil forfeiture complaint against 679,981.22 in the Tether cryptocurrency suspected of being fraudulently obtained as part of a romance/investment scam. According to court documents, one victim was targeted via LinkedIn and another victim was targeted though the dating App “Coffee Meets Bagel.”</p>



<p>The experienced federal criminal defense attorneys at <a href="/lawyers/">Conaway & Strickler, PC</a> are here to protect your rights, reputation, and future should you be under investigation. With decades of experience in defending traditional financial fraud paired with a deep understanding of the newer world of cryptocurrency, our firm possesses the skills and expertise to assist those accused of any type of fraud.  Call or <a href="/contact-us/">contact us online for a confidential consultation</a>.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Know Your Rights]]></title>
                <link>https://www.conawayandstrickler.com/blog/know-your-rights/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/know-your-rights/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Wed, 11 Jun 2025 13:43:00 GMT</pubDate>
                
                    <category><![CDATA[Blog]]></category>
                
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                
                
                <description><![CDATA[<p>When you’re approached or arrested by law enforcement, it’s natural to feel scared, overwhelmed, or tempted to explain your side. But one of the most powerful tools you have is silence. Under the 5th Amendment of the U.S. Constitution, you have the right to remain silent and avoid self-incrimination. This right is reinforced by your&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>When you’re approached or arrested by law enforcement, it’s natural to feel scared, overwhelmed, or tempted to explain your side. But one of the most powerful tools you have is silence. Under the 5th Amendment of the U.S. Constitution, you have the right to remain silent and avoid self-incrimination. This right is reinforced by your Miranda Rights, which police are required to read to you during a custodial interrogation. If you’ve heard the phrase, “You have the right to remain silent. Anything you say can and will be used against you in a court of law,” that’s your cue to stop talking and protect yourself.</p>



<p>Many people unknowingly waive their rights by speaking too soon or too freely. Even innocent statements can be twisted or taken out of context. That’s why one of the smartest things you can do is to invoke your right to remain silent and request legal counsel. Simply say, “I am invoking my right to remain silent. I would like to speak to an attorney.” Then stay quiet. You are not being difficult—you are being smart.</p>



<p>At Conaway & Strickler, we understand that early legal representation is crucial. Our experienced defense attorneys are here to protect your rights, guide you through the legal process, and fight for the best outcome possible. If you or a loved one is facing an investigation or has been arrested, don’t speak to the police first—<a href="/contact-us/">speak to us</a>. Contact Conaway & Strickler today for a free confidential consultation.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Tax Evasion]]></title>
                <link>https://www.conawayandstrickler.com/blog/tax-evasion/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/tax-evasion/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Fri, 06 Jun 2025 13:35:00 GMT</pubDate>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Federal Sentencing]]></category>
                
                    <category><![CDATA[tax evasion]]></category>
                
                    <category><![CDATA[Tax Fraud]]></category>
                
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[#taxevasion]]></category>
                
                    <category><![CDATA[#taxfraud]]></category>
                
                    <category><![CDATA[aggravated identity theft]]></category>
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[PPP Loan Fraud]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>Tax evasion is a potential criminal charge. Tax avoidance is perfectly acceptable. 26 U.S.C. § 7201 defines what is tax evasion.&nbsp; It states in relevant part that any person who willfully attempts in any manner to evade or defeat any tax imposed by this title or the payment thereof shall, in addition to other penalties&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p><a href="https://www.law.cornell.edu/wex/tax_evasion">Tax evasion</a> is a potential criminal charge. <a href="https://apps.irs.gov/app/understandingTaxes/whys/thm01/les03/media/ws_ans_thm01_les03.pdf">Tax avoidance</a> is perfectly acceptable.</p>



<p>26 U.S.C. § 7201 defines what is <a href="https://www.justice.gov/tax/file/1293361/dl">tax evasion</a>.&nbsp; It states in relevant part that any person who willfully attempts in any manner to evade or defeat any tax imposed by this title or the payment thereof shall, in addition to other penalties provided by law, be guilty of a felony and, upon conviction thereof, shall be fined not more than $100,000 ($500,000 in the case of a corporation), or imprisoned not more than 5 years, or both, together with the costs of prosecution.</p>



<p>Federal prosecutors might also add additional charges beyond tax evasion. Those charges could include conspiracy charges, under 18 U.S.C. § 371, or tax fraud under 26 U.S.C. § 7206.&nbsp;&nbsp;The United States Sentencing Commission (USSC) recently released its <a href="https://www.ussc.gov/research/quick-facts/tax-fraud">Tax Fraud Report</a> for fiscal year 2023. It states that off the 64,124 cases reported to the Commission in fiscal year 2023, 363 involved tax fraud (down 27% since FY 2019).&nbsp; It is unclear if this downward trend will continue.</p>



<p>Recently, <a href="https://www.justice.gov/usao-nj/pr/new-jersey-man-pleads-guilty-tax-evasion">a man in New Jersey plead guilty to tax evasion</a>. According to the Department of Justice, “for tax years 2015 and 2016, Matthew Tucci, of West Long Branch, NJ, filed tax returns that stated he owed more than $2 million in taxes for both years. Despite admitting that he owed those taxes, Tucci did not fully pay them when they were due. Instead, Tucci purchased real estate and engaged in a series of transactions designed to conceal his interest in those properties.</p>



<p>In 2017, the IRS sent notices to Tucci that he owed taxes, interest, and penalties for 2015 and 2016. After receiving these notices, Tucci transferred multiple properties to an entity owned by another individual, but he continued to exert control over at least two of them. Of the two properties Tucci continued to control, he sold one and refinanced the other. Tucci used the proceeds from these transactions to pay his personal expenses rather than his tax debts. In 2019, Tucci submitted documents to the IRS that falsely claimed that he had no connection to the entity that owned the 12 properties.</p>



<p>He faces a maximum penalty of five years in prison as well as a period of supervised release, restitution, and monetary penalties. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.”</p>



<p>In another case, <a href="https://www.justice.gov/opa/pr/florida-businessman-sentenced-prison-tax-evasion">a Florida businessman was sentenced to prison for tax evasion</a>.&nbsp; According to the&nbsp; Department of Justice, “David Albert Fletcher, of Deltona, Florida owned and operated furniture liquidations businesses, including Century Liquidators. For tax years 2004 through 2013, Fletcher did not timely file his federal income tax returns or pay the taxes he owed. After an audit, the IRS assessed a total of $1.7 million in taxes, interest, and penalties against him.</p>



<p>To evade collection of these taxes, Fletcher concealed his income and assets from the IRS. For example, Fletcher used nominees to hide his purchases of luxury vehicles, including Rolls Royces. Fletcher also filed false income tax returns that understated his income by several million dollars, and when an IRS special agent interviewed him, Fletcher falsely represented the amount of income he earned.</p>



<p>In addition to his prison sentence, U.S. District Judge Wendy Berger for the Middle District of Florida ordered Fletcher to serve three years of supervised release and to pay approximately $7,112,689 in restitution to the United States.”</p>



<p>Recently, <a href="/lawyers/meg-strickler/">Meg Strickler</a> was able to ensure that no tax evasion charges were filed against her client.  <a href="/contact-us/">Contact us</a> if you think you might be facing tax evasion or tax fraud charges.  We are here to help.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Department of Justice Fraud Prosecutions]]></title>
                <link>https://www.conawayandstrickler.com/blog/department-of-justice-fraud-prosecutions/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/department-of-justice-fraud-prosecutions/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Wed, 28 May 2025 13:28:00 GMT</pubDate>
                
                    <category><![CDATA[Blog]]></category>
                
                    <category><![CDATA[EIDL fraud]]></category>
                
                    <category><![CDATA[False Claims Act]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                    <category><![CDATA[White Collar Offenses]]></category>
                
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[EIDL fraud]]></category>
                
                    <category><![CDATA[federal crimes]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[health care fraud]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                
                
                <description><![CDATA[<p>Fraud is a concept that has been in the criminal justice system forever.&nbsp; Google defines it as an intentional deception used to gain an unfair advantage or benefit, often involving financial gains.&nbsp; How does the Department of Justice prosecute fraud?&nbsp; Below is a non exhaustive list of charges that the DOJ can bring. The FBI&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Fraud is a concept that has been in the criminal justice system forever.&nbsp; Google defines it as an intentional deception used to gain an unfair advantage or benefit, often involving financial gains.&nbsp; How does the Department of Justice prosecute fraud?&nbsp; Below is a non exhaustive list of charges that the DOJ can bring.</p>



<ul class="wp-block-list">
<li>Wire fraud</li>



<li>Mail fraud</li>



<li>Bank fraud</li>



<li>Tax fraud (tax evasion or false statements)</li>



<li>Healthcare fraud/FCA</li>



<li>Medicare/Medicaid fraud</li>



<li>PPP loan or COVID relief fraud</li>



<li>Securities fraud</li>



<li>Mortgage fraud</li>



<li>Immigration or visa fraud</li>



<li>Government contract fraud</li>



<li>Identity theft or benefits fraud</li>



<li>Trafficking in Counterfeit Goods or Services</li>



<li>Anti kickbacks</li>



<li>AML</li>
</ul>



<p>The FBI gives this <a href="https://www.fbi.gov/how-we-can-help-you/scams-and-safety/common-frauds-and-scams">list</a> of frauds and the DOJ publishes some of their cases <a href="https://www.justice.gov/criminal/criminal-fraud-cases">here</a>.</p>



<p>Fraud investigations can begin in a number of ways. In many cases, they are triggered by:</p>



<ul class="wp-block-list">
<li>A whistleblower or former employee</li>



<li>A suspicious activity report</li>



<li><a href="https://www.fbi.gov/how-we-can-help-you/scams-and-safety/common-frauds-and-scams">A suspicious activity report (SAR)</a> from a bank or financial institution</li>



<li>Data flagged by automated fraud detection software</li>



<li>A referral from another federal agency (e.g., IRS, SBA, USPS, HHS)</li>



<li>A civil audit or regulatory review that uncovers irregularities</li>



<li>Investigative journalism or public tips</li>



<li><a href="https://www.conawayandstrickler.com/blog/the-new-fincen-rule-for-residential-real-estate-what-it-means-for-investors-and-legal-compliance/">Problems in real estate transactions</a>.  (FINCEN’s new rule extends Anti-Money Laundering (AML) and Countering the Financing of Terrorism (CFT) obligations to investment advisers involved in these transactions)</li>
</ul>



<p>Once red flags are detected, the matter is referred to a federal investigative agency. These can include:</p>



<ul class="wp-block-list">
<li><strong>Federal Bureau of Investigation (FBI)</strong></li>



<li><strong>Internal Revenue Service – Criminal Investigation (IRS-CI)</strong></li>



<li><strong>Office of Inspector General (OIG)</strong></li>



<li><strong>Postal Inspection Service (USPIS)</strong></li>



<li><strong>Securities and Exchange Commission (SEC)</strong></li>



<li><strong>Health and Human Services (HHS)</strong></li>



<li><strong>Small Business Administration (SBA)</strong></li>
</ul>



<p>If you have been contacted by federal agents FOR ANY REASON, contact a federal criminal defense attorney immediately.&nbsp; Do not speak period.&nbsp; If you have received a grand jury subpoena, contact a federal criminal defense attorney immediately.&nbsp; If you have received a target letter, contact a federal criminal defense attorney immediately.&nbsp; If you are being audited by the IRS, SBA, HHS or another agency, contact a federal criminal defense attorney immediately. It never hurts in this&nbsp; last instance to have sage advice before the investigation goes any further.</p>



<p>At Conaway & Strickler, PC, we are here to help. <a href="/contact-us/">Contact us</a> to discuss your options.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Cryptocurrency Money Laundering]]></title>
                <link>https://www.conawayandstrickler.com/blog/cryptocurrency-money-laundering/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/cryptocurrency-money-laundering/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Mon, 24 Mar 2025 13:22:00 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                
                    <category><![CDATA[#crypto]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[money mule]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>Cryptocurrency fraud has become increasingly prevalent in recent years. The lack of a centralized authority governing crypto along with the relative anonymity of transactions has contributed to this rise in digital financial crime. Specifically, cryptocurrency money laundering has grown significantly in recent years with billions of dollars stolen through hacks, Ponzi schemes, mixers. A recent&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Cryptocurrency fraud has become increasingly prevalent in recent years. The lack of a centralized authority governing crypto along with the relative anonymity of transactions has contributed to this rise in digital financial crime. Specifically, cryptocurrency money laundering has grown significantly in recent years with billions of dollars stolen through hacks, Ponzi schemes, mixers. A <a href="https://www.chainalysis.com/blog/2025-crypto-crime-report-introduction/">recent report from Chainalysis</a> estimates illicit cryptocurrency addresses received more than 50 billion dollars in 2024.&nbsp;</p>



<p>Crypto money laundering follows the same pattern used for fiat (government-issued) currencies by “cleaning” funds gained through illicit means, before exchanging or withdrawing them for cash. Traditionally, money laundering involves disguising financial assets so they can be used without detection of the illegal activity that produced them. In the context of crypto, tokens are moved through various digital addresses to obscure their illegal origin and make them more difficult to trace. &nbsp;</p>



<p>The privacy-preserving nature of crypto has opened the door for criminals to conceal the origin of illicitly gained funds through a variety of methods. Cybercriminals ultimately funnel assets through several businesses and online addresses to hide the money trail before transferring the funds to a seemingly legitimate source.&nbsp;</p>



<p>There are several methods that criminals will use when engaging in cryptocurrency money laundering, including:&nbsp;</p>



<ul class="wp-block-list">
<li>Smurfing:&nbsp;Splitting up large sums of money into smaller amounts so they can be sent via multiple transactions.&nbsp;&nbsp;</li>



<li>Exchange Hopping:&nbsp;Using multiple cryptocurrency exchanges to transfer funds across several platforms and obscure the money trail.&nbsp;&nbsp;</li>



<li>Crypto Swaps: Using multiple cryptocurrency wallet addresses to directly convert funds without an intermediary or a centralized exchange.&nbsp;</li>



<li>Offshore Transactions:&nbsp;Creating offshore accounts to hide the origin of funds.&nbsp;</li>



<li>Mixing:&nbsp;Blending together the crypto assets of multiple users, making it difficult to determine who owns what.&nbsp;&nbsp;&nbsp;</li>



<li>Gambling Platforms:&nbsp;Depositing tokens into online gambling websites to be either withdrawn as cash or used to place coordinated bets.&nbsp;&nbsp;</li>
</ul>



<p>Cybercriminals require other actors (individuals and sometimes shell companies) to facilitate this crypto money laundering. Like traditional money laundering, criminals recruit “money mules” to move or launder the illicit funds, often unknowingly. In the context of crypto, this is often done under the guise of a cryptocurrency investment scheme. &nbsp;</p>



<p>Just as traditional money laundering can be federally prosecuted under <a href="https://www.law.cornell.edu/uscode/text/18/1956">18 U.S.C. § 1956</a>, crypto money laundering is a crime under that same law. In addition to money laundering charges, involvement in a cryptocurrency scam can lead to charges including conspiracy, wire fraud, mail fraud, and more. Further, individuals at all levels of these schemes can face prosecution, including those who may have unwittingly played the role of a money mule.&nbsp;</p>



<p>With decades of experience in defending traditional financial fraud paired with a deep understanding of the newer world of cryptocurrency, our firm possesses the skills and expertise to assist those accused of crypto fraud. <a href="/contact-us/">Contact us</a> for a free consultation.  </p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Anatomy of an Options Trading Scheme case in Federal Court in Atlanta]]></title>
                <link>https://www.conawayandstrickler.com/blog/anatomy-of-an-options-trading-scheme-case-in-federal-court-in-atlanta/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/anatomy-of-an-options-trading-scheme-case-in-federal-court-in-atlanta/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sun, 26 Jan 2025 18:38:00 GMT</pubDate>
                
                    <category><![CDATA[SEC]]></category>
                
                    <category><![CDATA[SEC complaint]]></category>
                
                    <category><![CDATA[securities fraud]]></category>
                
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[federal indictment]]></category>
                
                    <category><![CDATA[options trading scheme]]></category>
                
                    <category><![CDATA[SEC Complaint]]></category>
                
                    <category><![CDATA[securities fraud]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>Milan Patel and four other defendants were charged both by the SEC and the Department of Justice for their role in an options trading scheme in the Northern District of Georgia.&nbsp; Another defendant, Bart Ross was sentenced a few years ago for the same scheme.&nbsp; In total, In total, the defendants executed more than 500&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p><a href="https://www.sec.gov/files/litigation/complaints/2023/comp-pr2023-33.pdf">Milan Patel</a> and four other defendants were <a href="https://americankahani.com/business/quick-buck-indian-american-charged-for-spreading-false-rumors-about-public-firms/">charged</a> both by the SEC and the Department of Justice for their role in an options trading scheme in the Northern District of Georgia.&nbsp; Another defendant, <a href="https://www.justice.gov/usao-ndga/pr/former-registered-broker-admits-involvement-options-trading-scheme">Bart Ross</a> was sentenced a few years ago for the same scheme.&nbsp; In total, In total, the defendants executed more than 500 trades and made $2,651,320 in profits as a result of their fraudulent scheme.&nbsp; And just last week, Mr. Patel was <a href="https://www.justice.gov/usao-ndga/pr/five-defendants-sentenced-options-trading-scheme">sentenced.</a></p>



<p>According to the NDGA DOJ news release:</p>



<p><em>According to Acting U.S. Attorney Moultrie, the charges and other information presented in court: Between approximately October 2017 and January 2020, Milan Patel, Bart Ross, Mark Melnick, Anthony Salandra, and Charles Parrino conspired to trade securities—primarily short-term call options—in large, publicly traded companies based on materially false rumors about those companies that they generated and disseminated. These materially false rumors were intended to increase the price of the securities (both the underlying stock and options).</em></p>



<p><em>Call options are essentially a contract that gives the options’ holder the right, but not the obligation, to buy shares of the underlying stock at a set price per share—the option’s strike price—on or before a set future date (the option’s expiration date). Generally, the holder of a call option benefits when the price of the underlying stock increases. Short-term call options are ones that generally expire within a week.</em></p>



<p><em>Ross, Salandra, and Parrino, were formerly registered brokers with the Financial Industry Regulatory Authority (FINRA) and were responsible for drafting some of the fraudulent rumors. The conspirators would often refine a proposed rumor by exchanging drafts among themselves using the Trillian instant messaging application.</em></p>



<p><em>Melnick was a day trader and T3 Live Senior Trading Strategist who often provided technical evaluations on whether a particular false rumor would be successful. These rumors were carefully crafted to: (a) appear plausible enough to other market participants to move the price of the underlying security; and (b) move the price of the security in a particular direction—namely move the stock or option price up—so that Patel and the other conspirators could profitably trade on the rumors.</em></p>



<p><em>Patel was responsible for disseminating the rumor via Trillian to multiple accounts, which would in turn result in the false rumor being distributed over one or more market subscription services, including Trade The News, TradeXchange, and Benzinga, as well as various Twitter accounts.</em></p>



<p><em>Before Patel disseminated the rumor, the co-conspirators would acquire a position in the publicly traded company that was the subject of the rumor. The co-conspirators purchased short-term call options often mere seconds before Patel disseminated the rumor. The conspirators often purchased short-term call options because the price of such options is more sensitive than the price of the underlying stock. The conspirators profited from their scheme by selling the options (or other securities) after they increased in price. They would then sell off their positions shortly after the rumor was disseminated and the price of the option or underlying stock had increased</em>.</p>



<p>Most of these defendants ended up with a plea with one count of conspiracy to commit wire and securities fraud.&nbsp; When you see a case where the original situation with most defendants are charged in an indictment, and it ends with a plea to a one count, criminal information – this is good news. This means that the federal criminal defense lawyer has done their job well and worked out a resolution that limits the sentencing guidelines and ultimate months of incarceration.</p>



<p>In this case, if one has plead to Conspiracy to commit wire and securities fraud, the base offense level would be a 6.&nbsp; There will be an increase pursuant to the <a href="https://guidelines.ussc.gov/apex/r/ussc_apex/guidelinesapp/guidelines?app_gl_id=%C2%A72B1.1">chart</a> on what the intended loss amount is.&nbsp; There also can be enhancements such as:</p>



<ul class="wp-block-list">
<li>the number of victims</li>



<li>being a registered broker at the time of the offense</li>



<li>abuse of position of trust</li>



<li>sophisticated means</li>



<li>use of a special skill</li>
</ul>



<p>Then, there can be levels taken off for acceptance of responsibility and zero point offender.&nbsp; And finally, if the defendant has any criminal history the final number will be amended pursuant to Criminal History Category.&nbsp; Once the <a href="https://www.ussc.gov/sites/default/files/pdf/guidelines-manual/2023/Sentencing_Table.pdf">final number</a> is determined by the judge, the second part of the sentencing hearing will occur – discussing <a href="https://www.law.cornell.edu/uscode/text/18/3553">3553 factors.</a></p>



<p><a href="https://www.conawayandstrickler.com/contact-us.html">Contact</a> an experienced federal criminal defense lawyer like Conaway & Strickler, PC. We have close to 30 years experience in federal criminal and SEC defense.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[What to Expect in a Federal Criminal Trial]]></title>
                <link>https://www.conawayandstrickler.com/blog/what-to-expect-in-a-federal-criminal-trial/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/what-to-expect-in-a-federal-criminal-trial/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sun, 12 Jan 2025 20:22:00 GMT</pubDate>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                
                
                <description><![CDATA[<p>A federal criminal trial consists of several different stages.&nbsp; &nbsp;The below will analyze a ONE defendant trial.&nbsp; But, more often than not, trials can consist of multiple defendants at trial.&nbsp; This just augments the time needed for each stage. Jury Selection also known as Voir Dire Jury selection is one of the most important parts&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>A federal criminal trial consists of several different stages.&nbsp; &nbsp;The below will analyze a ONE defendant trial.&nbsp; But, more often than not, trials can consist of multiple defendants at trial.&nbsp; This just augments the time needed for each stage.</p>



<p><strong>Jury Selection also known as Voir Dire</strong></p>



<p>Jury selection is one of the most important parts of a federal criminal trial.&nbsp; It will start with about 40 potential jurors brought in. Usually we move our chairs to the other side of the table to face them. We ask general questions, then individual questions. Then, we deliberate on who to choose. Then, the court asks us to do our strikes, and then a jury is empaneled.</p>



<p>This usually takes a full day.</p>



<p><strong>Opening Statement</strong></p>



<p>After the jury has been empaneled and sworn, and loads of logistical information is given to the jurors by the judge, then&nbsp;the federal district court judge will invite the AUSA to give their opening statement. Like the jury selection, the opening statement is a critical part of a federal criminal trial.</p>



<p>The purpose of the opening statement is to allow the parties to explain to the jury what the case is about. While the parties may discuss the evidence, and explain what they believe it will show, they are not allowed to make arguments about what they think the evidence means.</p>



<p>After the AUSA has given their opening statement, which they are required to do because they have the burden of proof, the federal district court judge will ask the defense attorney if (s)he wishes to give an opening statement. The judge asks this in the form of a question because the defense attorney is not required to give an opening statement.</p>



<p>In a criminal case, the federal criminal defense lawyer may either give an opening statement, waive the opening statement, or waive the opening statement at that time, instead giving their opening statement at the close of the AUSA’s case.&nbsp; If this was a multi defendant trial, the judge usually will go in order as it is depicted on the most recent indictment.</p>



<p><strong>Direct Examination</strong> begins after we are done with the opening statements.&nbsp; The AUSA will begin calling their witnesses.&nbsp; Federal criminal defense attorney teaches <a href="https://law.gsu.edu/profile/meg-strickler/">advanced evidence</a> to LLM and JD students and GSU law and <a href="https://law.emory.edu/news-and-events/releases/2024/05/2024-05-20-keptt-kessler-eidson-trial-techniques-emory-law.html">trial techniques</a> at Emory Law.&nbsp; She literally teaches the <a href="https://www.uscourts.gov/sites/default/files/evidence_federal_rules_pamphlet_dec_1_2023.pdf">Federal Rules of Evidence</a> on what comes in at trial and how to do direct and cross examinations to law students.</p>



<p>Most direct examinations include three stages: </p>



<p>1. Introduction and background of the witness. <br>2. Laying the foundation of their relation to the case<br>3. Substantive questions about the case.</p>



<p>Like all criminal cases, in a federal criminal trial, the entire burden of proof is on the AUSA. In thinking how to proceed, an AUSA will consider all elements of the crimes alleged. This is because every crime is made up of parts, or elements. The elements are set forth in the instructions to the jury. To prevail, the AUSA must prove each and every element of the crime. Consequently, the AUSA will call witnesses that have information they believe will help persuade the jury that an element has been satisfied.</p>



<p>Because this is direct examination, the AUSA may only ask open ended questions. This is often as simple as, “what happened next?” A question used for direct examination may not suggest an answer. Therefore, it would not be appropriate for the AUSA to tell the witness what they think happened, and then ask the witness to agree. Thus, the AUSA cannot properly say “and the next thing that happened was….do you agree?” This leading question would constitute cross-examination. The party who called the witness may not “lead” the witness and may only ask direct examination questions. Such a leading question would likely prompt the objection of any of us federal criminal defense lawyers.</p>



<p>There are some exceptions to this rule, however, and some leading questions are allowed during direct examination. For example, Rule 611 of the Federal Rules of Evidence suggests that an AUSA may use cross-examination as necessary to “develop the witnesses testimony.” Leading questions may also be used with a “hostile witness.”</p>



<p>Once the witness has testified on direct, the defense lawyer will get to conduct <strong>Cross-Examination</strong> of the government’s witnesses.</p>



<p>We may ask questions of the government’s witness after the AUSA has completed their direct examination. Again, the defense attorney is not required to ask questions because they have no burden of proof. While there may be strategic reasons for waiving a witness, in some instances, we will engage in extensive and detailed questioning or cross-examination of the government witness.</p>



<p>Most cross-examination questions include the following:</p>



<p>1. We draft question to elicit any positive information from the witness. <br>2. We work to limit the damage done by the cross-examination. <br>3. We will impeach the witness where appropriate.</p>



<p>The defense attorney’s questioning can proceed by either direct or leading questions. A leading question is one that suggests the answer. This is called cross-examination. The purpose of cross-examination is to expand on the witness’s testimony, and possibly to show that the witness lacks credibility or that their fact statements are wrong or misleading.</p>



<p>Cross-examination may also be used by us&nbsp;defense attorneys to show the jury that the government witness lacks actual knowledge, or that their knowledge is limited. This is especially true for expert witnesses. To expand on the above example, a defense attorney may cross-examine a forensic computer expert by asking them questions to show that they lack credentials. A cross-examination like this might be a simple statement to the witness such as “you don’t have a computer science degree?”</p>



<p>At the end of the government’s case, when there are no more witnesses or evidence, the AUSA will tell the judge that they “rest.” This means the AUSA’s case is completed.</p>



<p>At this juncture, we will all orally ask for a&nbsp;<strong>Motion for Directed Verdict</strong></p>



<p>In a federal criminal case, a motion for directed verdict is a motion requesting the judge to acquit the defendant as a matter of law. If the motion is granted, the case is done, and the defendant is declared the winner. A motion for directed verdict is also called a judgment as a matter of law.</p>



<p>While a motion for judgment as a matter of law may be made at any time before the case is submitted to the jury, the first opportunity for a federal criminal defense attorney to make such a motion is after the government has rested its case. In the attorney’s motion, we&nbsp;will offer to the judge any applicable law and explain why, based on this law, the facts of the case entitle the defendant to be found not guilty. An AUSA may not make a motion for directed verdict after the defense has rested.</p>



<p>In a typical federal criminal trial, once the AUSA has indicated that the government has rested its case, the district court judge will instruct the bailiff to escort the jury out of the courtroom. The judge will then ask the defense attorney if they have a motion for directed verdict. If the answer is no, then the jury will be brought back into the courtroom and the case will continue. Motions for directed verdict are always made outside the presence of the jury.</p>



<p>A federal criminal defense attorney may also make a motion for directed verdict at the end of the attorney’s case; meaning, after the defense has indicated to the court that they rest. This is because, as indicated, Rule 50 of the Federal Rules of Procedure allow a motion as a matter of law to be made any time before the jury has reached its verdict.</p>



<p><strong>DEFENSE:&nbsp;</strong></p>



<p>The defendant in a criminal case enjoys a presumption of innocence. One of the benefits of this presumption is that a person accused of a crime does not have an obligation to prove their innocence to the jury. This means there is no obligation to call any witnesses or produce any evidence. However, depending on the facts and circumstances of a case, it may be in the your best interest to call witness or provide evidence.</p>



<p>So, should any of us federal criminal defense attorneys call a witnesses, just as when the AUSA calls witnesses, the attorney may only ask this witness direct examination question, and the AUSA may cross-examine this witness using leading questions.</p>



<p>One of the witnesses that is available only to the defense attorney is the defendant. In a criminal case the accused has the right to remain silent. Therefore, only the defense attorney can call the accused to the stand. Whether to call the accused as a witness is often one of the most difficult questions for a federal criminal defense attorney. However, the final answer to this question resides completely with YOU. The decision must not be made by the lawyer.</p>



<p>Once all of&nbsp;the defense attorneys call all of&nbsp;their witnesses (if any), they will indicate to the court that “the defense rests.”</p>



<p>Next, we move to The <strong>Government’s Rebuttal Witnesses</strong></p>



<p>The defense may call rebuttal witnesses after it has rested because the government has the burden of proof. Rebuttal witnesses serve largely the same function as cross-examination in that they are used as part of an attempt, in this case by the government, to disprove evidence submitted by the defendant or to disprove what the defense witnesses said. It is rare, but possible, for the federal district court judge to allow what is called surrebuttal on the part of the defense. A surrebuttal witness is called by a party to respond to the opposing party’s rebuttal.</p>



<p><strong>Closing Arguments</strong></p>



<p>Once all the witnesses have been called, both the AUSA and we, the federal defense criminal defense attorneys, have presented all their evidence, and both have indicated to the court that they have rested, the next step is closing argument.</p>



<p>According to the <a href="https://www.uscourts.gov/sites/default/files/criminal_federal_rules_pamphlet_dec_1_2023.pdf">Federal Rules of Criminal Procedure</a>, the government goes first, the defense attorneys goes next, then the government gets another opportunity to rebut what the defense attorney has argued. The government gets to go first, and last, because they have the burden of proof.</p>



<p>Unlike the opening statement, in their final arguments, the AUSA and the federal criminal defense attorney may not only summarize the evidence presented but may also forcefully argue why the jury should find in their favor.</p>



<p>It is important to note, that district court judges will typically deny us the time, at the end of the trial, to leave and prepare our closing arguments.&nbsp; It is typical to move right into closing arguments after all the evidence has been received by the jury, and any directed verdict motions made and denied.</p>



<p>The Jury is then instructed as to the applicable law through what is known as jury charges.</p>



<p>The main purpose of a jury is to resolve issues of fact. A jury will reach its verdict by taking the law as provided to them by the judge and applying to this law to the facts as they find them. In this way they will arrive at their verdict. This law is set forth in the jury instructions.</p>



<p>Judges routinely state they will rely mainly on the pattern instructions prepared by the Circuit Committee on Pattern Criminal Jury instructions.&nbsp; We certainly research notable and useful jury charges and file such if we determine the pattern charges are not sufficient.</p>



<p><strong>Deliberations and Verdict</strong></p>



<p>The final stage in a federal criminal trial will be jury deliberations and verdict. The first thing the jury will do is select, often by voting, who will be their foreperson. Pattern jury instruction for the 11th circuit provides that the foreperson’s job is to do two things: (1) guide the jury’s deliberations and (2) be a liaison for communications with the court.</p>



<p>If the jury has questions, then normally, the foreperson will write it down, give it to the court officer who then gives the question to the judge. The jury may not tell anyone outside the jury where their “vote” stands or anything else about their deliberations. There is, however, no rule that says that only the foreperson may write down questions or give them to the court officer. In this way all jurors are “equal”.</p>



<p>In a criminal case the verdict must be unanimous in favor of acquittal or conviction. In a federal criminal case, a jury will be instructed they are to continue their deliberations until they have reached a unanimous decision. Pattern Jury Instructions on this issue provide that to find a defendant guilty in a federal criminal trial, the jury must unanimously agree that the government has overcome the presumption of innocence as to every element of the crime alleged and have done so with evidence that proves the defendant is guilty beyond a reasonable doubt.</p>



<p>As set forth in another&nbsp;Pattern Jury Instruction, the jury will be told that they are not to consider punishment in their deliberations. Punishment is solely the province of the judge presiding over the case.</p>



<p>Once the jury has reached its verdict, another&nbsp;Pattern Jury Instruction provides that the foreperson mark the appropriate place for guilty or not guilty, have each member sign the form, then give it to the court officer, who will then give the form to the judge.</p>



<p>Upon learning that the jury has reached its verdict, the judge will resume the trial, making sure the defendant is in the courtroom. Finally, the verdict will be read in court.</p>



<p>Once the verdict is read, if you are found guilty, the deputies (who have moved in to position for this moment) will come forward and ask you to put your hands behind your back and take off shoe laces, jewelry, etc in order to go in to custody.&nbsp; The federal criminal defense attorney immediately asks that the defendant remain out on an appeal bond, and the judge decides on whether or not to take the defendant in to custody at this time.</p>



<p>If you are found not guilty on all charges, then the case is over and closed.</p>



<p>Should you have any further questions about federal criminal defense trials please&nbsp;<a href="https://www.conawayandstrickler.com/contact-us.html">contact us</a>.&nbsp; We are here to help.</p>
]]></content:encoded>
            </item>
        
    </channel>
</rss>