<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:georss="http://www.georss.org/georss"
     xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
     xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[top federal criminal attorney - Conaway & Strickler]]></title>
        <atom:link href="https://www.conawayandstrickler.com/blog/tags/top-federal-criminal-attorney/feed/" rel="self" type="application/rss+xml" />
        <link>https://www.conawayandstrickler.com/blog/tags/top-federal-criminal-attorney/</link>
        <description><![CDATA[Conaway & Strickler's Website]]></description>
        <lastBuildDate>Wed, 13 May 2026 21:02:04 GMT</lastBuildDate>
        
        <language>en-us</language>
        
            <item>
                <title><![CDATA[Child Pornography Cases Explained]]></title>
                <link>https://www.conawayandstrickler.com/blog/child-pornography/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/child-pornography/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Wed, 13 May 2026 21:00:17 GMT</pubDate>
                
                    <category><![CDATA[child pornography]]></category>
                
                    <category><![CDATA[CSAM charges]]></category>
                
                    <category><![CDATA[Sex Crimes]]></category>
                
                    <category><![CDATA[Sex Offenders]]></category>
                
                
                    <category><![CDATA[criminal defense lawyers]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[sex crimes lawyer]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>Charges for child pornography (also known as CSAM) can range from possession, receipt, distribution, manufacturing, or other related charges in both the state or federal courts. Under the various statutes, the material can include online files, videos, print materials, photos, and other online materials. There are multiple ways in which a person can find themselves&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Charges for child pornography (also known as CSAM) can range from possession, receipt, distribution, manufacturing, or other related charges in both the <a href="https://law.justia.com/codes/georgia/title-16/chapter-12/article-3/part-2/section-16-12-100/" id="https://law.justia.com/codes/georgia/title-16/chapter-12/article-3/part-2/section-16-12-100/">state </a>or <a href="https://www.justice.gov/criminal/criminal-ceos/citizens-guide-us-federal-law-child-pornography" id="https://www.justice.gov/criminal/criminal-ceos/citizens-guide-us-federal-law-child-pornography">federal</a> courts.  Under the various statutes, the material can include online files, videos, print materials, photos, and other online materials. There are multiple ways in which a person can find themselves charged with child pornography which can include online file sharing, possession of child pornography, producing or distributing child pornography, online chatting between adults and minors, sexual exploitation of children or even sexting.</p>



<p>It is important to secure competent legal counsel as soon as possible to argue your case successfully.  </p>



<p>There are many defenses that can be explored to get a positive outcome in your case.  For example, the first one that comes to mind is <a href="https://law.justia.com/codes/georgia/title-16/chapter-3/article-2/section-16-3-25/" id="https://law.justia.com/codes/georgia/title-16/chapter-3/article-2/section-16-3-25/">entrapment</a>.  These days law enforcement often pose as other users in chat rooms or on the dark net.  They pose as someone actively seeking CSAM.  You may not have ever done anything illegal but for their persuading you to so.  There are legal motions we can file that may be dispositive for your case.   Remember, the government has become well versed in programs like <a href="https://www.bittorrent.com/">BitTorrent</a>, and can be on the dark net doing things illegal themselves all in their efforts to “combat crime.” </p>



<p>Additionally, when law enforcement comes to execute a search warrant for devices at your home or office, they must have a valid search warrant or everything they seized will be discarded and not used in the case against you.  You need an <a href="https://www.conawayandstrickler.com/lawyers/meg-strickler-federal-criminal-defense-lawyer/" id="https://www.conawayandstrickler.com/lawyers/meg-strickler-federal-criminal-defense-lawyer/">experienced criminal defense lawyer</a> to ensure law enforcement did not violate your Constitutional rights in executing the search warrant.  </p>



<p>Sometimes, a download from a proper website can result in what is termed as an “accidental download”. We have experts ready to assist us in showing the government exactly what is and what is not on your devices and what is and what was purposely downloaded and accessed.  </p>



<p>These are but some defenses that Conaway & Strickler, PC have successfully argued.  <a href="https://www.conawayandstrickler.com/contact-us/" id="https://www.conawayandstrickler.com/contact-us/">Contact us </a>to discuss your case in more depth.  The consequences of a child pornography or CSAM (“Child Sexual Abuse Material”) conviction are severe and life-altering. And the collateral consequence of being on the <a href="https://gbi.georgia.gov/services/georgia-sex-offender-registry" id="https://gbi.georgia.gov/services/georgia-sex-offender-registry">sex offender registry</a> can be devastating.  We are here to help.  </p>



<p></p>



<p></p>



<p></p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Digital Privacy – Fourth Amendment Case Law Update]]></title>
                <link>https://www.conawayandstrickler.com/blog/digital-privacy-fourth-amendment-case-law-update/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/digital-privacy-fourth-amendment-case-law-update/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Mon, 27 Apr 2026 12:53:32 GMT</pubDate>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                    <category><![CDATA[Drug Crimes]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[federal criminal appeal]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                    <category><![CDATA[White Collar Offenses]]></category>
                
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>This week, the U.S. Supreme Court will decide if law enforcement needs to be more specific in their applications for search warrants for phones. At issue this week specifically is whether law enforcement can use broad geofence warrants to gather information about an alleged crime. In the case before the Supreme Court, the issue is&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>This week, the U.S. Supreme Court will decide if law enforcement needs to be more specific in their applications for search warrants for phones. At issue this week specifically is whether law enforcement can use broad <a href="https://en.wikipedia.org/wiki/Geofence" id="https://en.wikipedia.org/wiki/Geofence">geofence</a> warrants to gather information about an alleged crime. In the <a href="https://www.scotusblog.com/cases/chatrie-v-united-states/" id="https://www.scotusblog.com/cases/chatrie-v-united-states/">case </a>before the Supreme Court, the issue is whether the government can use cell phone location data at a crime scene without knowing who is holding the phone. They are gathering data based on the Global Positioning System, Bluetooth beacons, cell phone towers and local wi-fi networks.</p>



<p>To understand the specifics of this case, below we have quoted directly from the <a href="https://www.nacdl.org/getattachment/77ca2722-b0fa-49c8-88e7-8b88ee8752c5/chatrie-v-us-opening-brief.pdf" id="https://www.nacdl.org/getattachment/77ca2722-b0fa-49c8-88e7-8b88ee8752c5/chatrie-v-us-opening-brief.pdf">Petitioner’s Brief:</a> </p>



<p><em>This case concerns the constitutionality of geofence warrants. For cell phone users to use certain services, their cell phones must continuously transmit their exact locations to their service providers. A geofence warrant allows law enforcement to obtain, from the service provider, the identities of users who were in the vicinity of a particular location at a particular time. In this case, law enforcement obtained, and served on Google, a geofence warrant seeking anonymized location data for every device within 150 meters of the location of a bank robbery within one hour of the robbery. After Google returned an initial list, law enforcement sought— without seeking an additional warrant—information about the movements of certain devices for a longer, two-hour period, and Google complied with that request as well. Then—again without seeking an additional warrant—law enforcement requested de anonymized subscriber information for three devices. One of those devices belonged to petitioner Okello Chatrie. Based on the evidence derived from the geofence warrant, petitioner was convicted of armed robbery.</em></p>



<p>The last time the Supreme Court wrestled with cell phone privacy issues was in <a href="https://www.supremecourt.gov/opinions/17pdf/16-402_h315.pdf" id="https://www.supremecourt.gov/opinions/17pdf/16-402_h315.pdf">Carpenter v. United States, 585 U.S. 296 (2018)</a>, which is a landmark United States Supreme Court case concerning the privacy of historical cell site location information. The Court held in that case that the government violates the Fourth Amendment when accessing historical cell phone Iocation records containing the physical locations of cellphones without a search warrant. That case, however, was <em>after</em> a suspect was identified, making it unlike the current case before the Supreme Court.</p>



<p>We receive terabytes of data in discovery for our <a href="https://www.conawayandstrickler.com/criminal-defense-practice/white-collar-crimes/" id="https://www.conawayandstrickler.com/criminal-defense-practice/white-collar-crimes/">cases</a>. Motions to suppress can be filed for all of the data seized from search warrants of phones. We are cognizant of the ever changing landscape of Fourth Amendment case law. We ensure that law enforcement follows the appropriate procedures for every single case. <a href="https://www.conawayandstrickler.com/contact-us/" id="https://www.conawayandstrickler.com/contact-us/">Contact us </a>now if you have a case you would like to discuss.</p>



<p></p>



<p></p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[CSAM – Navigating Prosecution Under New AI-Generated Obscenity Laws]]></title>
                <link>https://www.conawayandstrickler.com/blog/csam/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/csam/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Fri, 10 Apr 2026 21:23:15 GMT</pubDate>
                
                    <category><![CDATA[CSAM charges]]></category>
                
                    <category><![CDATA[Sex Crimes]]></category>
                
                
                    <category><![CDATA[child pornography charges]]></category>
                
                    <category><![CDATA[csam charges]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>The recent conviction involving AI-generated obscene material of women and children highlights complex legal issues arising from the intersection of technology and criminal law. The Department of Justice is saying this is the first in the nation – a conviction of violating the new Take It Down Act. This new legislation, targeting AI-generated content, opens&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p></p>



<p>The recent <a href="https://www.justice.gov/usao-sdoh/pr/columbus-man-pleads-guilty-cyberstalking-exes-creating-ai-generated-obscene-material">conviction </a>involving AI-generated obscene material of women and children highlights complex legal issues arising from the intersection of technology and criminal law. The Department of Justice is saying this is the first in the nation – a conviction of violating the new <a href="https://www.congress.gov/bill/119th-congress/senate-bill/146">Take It Down Act</a>.  This new legislation, targeting AI-generated content, opens the door to prosecution of newly-defined crimes, but also raises critical questions about evidence, intent, due process, among others.  This is especially an issue with any <a href="https://www.conawayandstrickler.com/blog/ai-generated-csam-what-to-know/">charges alleging CSAM (Child Sex Abuse Material).</a>  <a href="https://www.justice.gov/usao-wdnc/pr/charlotte-child-psychiatrist-sentenced-40-years-prison-sexual-exploitation-minor-and">Recent cases</a> are increasingly alleging use of generative artificial intelligence (AI) to digitally alter clothed images of minors into child pornography.</p>



<p>Prosecutors now have the ability to pursue cases involving synthetic media that depict explicit material. The use of AI to generate highly realistic images and videos makes these cases unique, requiring forensic expertise to distinguish fabricated content from authentic imagery. The prosecution must prove that the defendant knowingly produced and distributed material deemed obscene under the law, regardless of its digital origins.</p>



<p>One avenue for CSAM prosecution involves demonstrating that AI-generated content was used with the intent to exploit, harass, or endanger individuals. The law may enable prosecutors to argue that even virtual representations pose real harm, especially when circulated widely. In such cases, expert testimony and digital forensics play a crucial role in examining detailed technological material.</p>



<p>However, the defense may challenge the scope and application of the new law, questioning whether AI-generated images constitute actual offenses under existing legal definitions of obscenity and exploitation. Furthermore, issues of free speech and artistic expression may arise, requiring careful legal navigation. It is essential for courts to weigh the balance between protecting society and safeguarding individual rights.</p>



<p>As technology evolves, so must legal strategies. Defense attorneys fighting for clients charged with CSAM must remain vigilant, not only in protecting the rights of the accused, but also in ensuring that prosecution under new laws is fair, evidence-based, and respectful of civil liberties. The emergence of AI-generated content cases marks a new chapter in criminal justice.</p>



<p>If you or a loved one is facing charges related to AI-generated content, <a href="https://www.conawayandstrickler.com/contact-us/">contact</a> the attorneys at Conaway & Strickler to discuss your legal options.</p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[SEC Investigations – FAQ]]></title>
                <link>https://www.conawayandstrickler.com/blog/sec-investigations-faq/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/sec-investigations-faq/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sat, 04 Apr 2026 13:55:40 GMT</pubDate>
                
                    <category><![CDATA[SEC]]></category>
                
                    <category><![CDATA[SEC complaint]]></category>
                
                    <category><![CDATA[securities fraud]]></category>
                
                
                    <category><![CDATA[Best Securities Lawyer]]></category>
                
                    <category><![CDATA[SEC Complaint]]></category>
                
                    <category><![CDATA[SEC Investigation]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>SEC Investigations Frequently Asked Quesetions I have received a subpoena from the SEC what do I do?  It is important to understand that when you receive a subpoena from the SEC it is most definitely not the beginning of an investigation, but it is the beginning of your knowledge that there is an investigation.  If&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>SEC Investigations Frequently Asked Quesetions</p>



<p><strong>I have received a subpoena from the SEC what do I do? </strong></p>



<p>It is important to understand that when you receive a subpoena from the SEC it is most definitely not the beginning of an investigation, but it is the beginning of your knowledge that there is an investigation.  If you have received a subpoena from the SEC, your first and immediate step is to <a href="https://www.conawayandstrickler.com/contact-us/">contact an attorney</a> who can help guide you through the process and get the best resolution possible.  </p>



<p><strong>What is the process? </strong></p>



<p>First, the <a href="https://www.sec.gov/files/rules/final/2025/33-11366.pdf">majority of the Securities and Exchange Commission </a>must issue what is called a formal order of investigation.  This is a formal order within the SEC that gives authority to start issuing subpoeanas, and the like.  It is important to note that without that order, the SEC’s enforcement attorneys can request your cooperation, but they cannot require it.</p>



<p>The distinction is very important.  Before there is a formal order SEC staff can still conduct an investigation but it’s done in a more informal way.  It is very similar to a federal agent coming by your office and just “asking a few questions”.  They may imply it’s informal and no big deal – but it is.  Even if you are contacted this way, it is imperative to understand that these conversations are not casual.   Everything you say and do can and will be held against you.   And it can be the information that is used to procure the formal order. </p>



<p><strong>What is a subpoena duces tecum</strong>? </p>



<p>A subpoena <em>duces tecum</em> compels the production of documents.  It is a legal order requiring a person to produce documents or tangible evidence for use at a hearing or trial. The term “duces tecum” comes from the Latin phrase “you shall bring with you.”.  It includes correspondence, emails, contracts, financial records, trading logs, and communications on all types of platforms that include WhatsApp, Signal, Telegram etc per<a href="https://www.sec.gov/divisions/enforce/enforcementmanual.pdf"> the revised 2026 Enforcement Manual</a>.  The subpoena will specify a deadline and an address for production. An <a href="https://www.conawayandstrickler.com/lawyers/meg-strickler/">experienced attorney </a>may be able to secure a delay in this deadline so that there is adequate time to comply.  </p>



<p><strong>What is a preservation obligation? </strong></p>



<p>There is a <a href="https://legal.thomsonreuters.com/blog/managing-litigation-risks/">duty to preserve </a>once an investigation has begun.  These obligations now extend to encrypted communications on personal devices.  The preservation obligation attaches at the moment of service, and in certain cases before: the 2026 Manual directs enforcement staff to issue preservation letters early in an investigation, which means the duty to preserve may predate a subpoena by weeks.</p>



<p><strong>What is a subpoena ad testificandum</strong>? </p>



<p>A subpoena <a href="https://en.wikipedia.org/wiki/Subpoena_ad_testificandum">ad testificandum</a> compels you to appear at a designated time and place to give sworn testimony. </p>



<p>Securing counsel early on is key.&nbsp; <a href="https://www.conawayandstrickler.com/contact-us/">Contact us</a> so we can help.&nbsp; Complying with SEC subpoenas is <a href="https://www.conawayandstrickler.com/blog/anatomy-of-an-options-trading-scheme-case-in-federal-court-in-atlanta/">complicated</a> and time consuming. Even after complying, the investigation stage is a long process. It is important to have qualified counsel throughout.&nbsp; Remember all of the aspects of the SEC investigation can and usually does run parallel to a criminal investigation by the DOJ. &nbsp;</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Cryptocurrency Investment Fraud Cases]]></title>
                <link>https://www.conawayandstrickler.com/blog/cryptocurrency-investment-fraud-cases/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/cryptocurrency-investment-fraud-cases/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sun, 29 Mar 2026 17:33:34 GMT</pubDate>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                
                    <category><![CDATA[#crypto]]></category>
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[cryptocurrency fraud charges]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>Conaway & Strickler, PC recently tried a case in federal court that involved cryptocurrency investment fraud, money laundering, and wire fraud. Through the years, the firm has taken on an increasing number of cryptocurrency fraud cases as the popularity of digital currency continues to grow. We are well versed on defended anyone charged with the&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Conaway & Strickler, PC recently tried a case in federal court that involved cryptocurrency investment fraud, <a href="/criminal-defense-practice/federal-crimes/federal-white-collar-crimes/money-laundering/">money laundering</a>, and wire fraud.  Through the years, the firm has taken on an increasing number of cryptocurrency fraud cases as the popularity of digital currency continues to grow.  We are well versed on defended anyone charged with the types of cases like the below.  </p>



<p>For example, the <a href="https://www.sec.gov/files/litigation/complaints/2025/comp-pr2025-144.pdf">SEC recently filed charges </a>against purported crypto asset trading platforms Morocoin Tech Corp., Berge Blockchain Technology Co. Ltd., and Cirkor Inc. and investment clubs AI Wealth Inc., Lane Wealth Inc., AI Investment Education Foundation Ltd., and Zenith Asset Tech Foundation alleging that they defrauded retail investors out of more than $14 million in an elaborate investment confidence scam.  </p>



<p>“AI Wealth, Lane Wealth, AIIEF, and Zenith operated so-called investment clubs using WhatsApp and solicited investors to join the clubs with ads on social media. The clubs gained investors’ confidence with supposedly AI-generated investment tips before luring investors to open and fund accounts on purported crypto asset trading platforms Morocoin, Berge, and Cirkor, which falsely claimed to have government licenses, as alleged. The investment clubs and platforms then allegedly offered “Security Token Offerings” that were purportedly issued by legitimate businesses. In reality, no trading took place on the trading platforms, which were fake, and the Security Token Offerings and their purported issuing companies did not exist, according to the complaint. When investors tried to withdraw their funds, the complaint alleges that the defendants further defrauded victims by demanding that they pay advance fees. In all, the defendants misappropriated at least $14 million from U.S.-based retail investors and funneled those funds overseas through a web of bank accounts and crypto asset wallets, as alleged.”</p>



<p>In another recent <a href="https://www.justice.gov/usao-ct/pr/wolcott-man-indicted-cryptocurrency-fraud-scheme">case</a>, a young man, Elmin Redzepagic was charged in a 21-count indictment offenses related to an alleged cryptocurrency fraud scheme.  As alleged in the indictment, Redzepagic “held himself out to investors as a cryptocurrency investor who earned high rates of return. Once Redzepagic had victims’ initial investment, he told them they had earned a substantial profit but had to pay additional fees (“gas fees”) to withdraw it. Redzepagic claimed to work as part of a team that included someone known as “The Chef,” who supposedly led the operation and determined who, how, and when investors would receive their profits. In fact, Redzepagic did not invest victims’ funds in cryptocurrency but instead transferred the funds to Stake.com, an offshore gambling platform that Redzepagic used to receive and hold proceeds of the scheme, to generate cryptocurrency addresses for victims to use to transfer Bitcoin to him, and to make large “lulling” payments to victims throughout the course of the scheme.”</p>



<p>Finally, in another <a href="https://www.justice.gov/usao-mdfl/pr/goliath-ventures-ceo-arrested-wire-fraud-and-money-laundering">case,</a> Goliath Ventures founder Christopher Alexander Delgado has been arrested on a criminal complaint charging him with wire fraud and money laundering. It is alleged that this “was a “Ponzi scheme,” which is a form of investment fraud that involves the payment of purported returns to existing investors from funds contributed by new investors. Delgado’s scheme involved soliciting victims to invest substantial sums of money under false and fraudulent promises of monthly returns generated through cryptocurrency “liquidity pools.” Victims were induced to give money to Goliath through personal referrals, professional marketing materials, luxury events, charitable sponsorships, and some monthly payments of purported returns, all of which were designed to establish Goliath’s bona fides with investors. Based on these false and fraudulent representations, Goliath obtained at least $328 million from victim investors.</p>



<p>Although Goliath represented that it would place the victim investors’ funds in cryptocurrency liquidity pools, in reality, the funds were primarily used to pay purported returns to earlier investors, to return principal to investors who requested it, and for Goliath’s extravagant business gatherings, holiday parties, and luxury travel accommodations. With victim investors’ funds, Delgado purchased four residential properties each worth between $1.15 million and $8.5 million.”</p>



<p>The FBI has <a href="https://www.fbi.gov/how-we-can-help-you/victim-services/national-crimes-and-victim-resources/cryptocurrency-investment-fraud">recently stated</a> that “cryptocurrency investment fraud, which the media commonly describes as “<a href="https://www.conawayandstrickler.com/blog/what-is-a-pig-butchering-scam/">pig butchering</a>,” is one of the most prevalent and damaging fraud schemes today.”  As a result, more and more DOJ prosecutions are happening.  Please <a href="https://www.conawayandstrickler.com/contact-us/">contact us </a>if you have received any sort of indication that you are under federal investigation.  </p>



<p></p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[AI Generated CSAM – What to Know]]></title>
                <link>https://www.conawayandstrickler.com/blog/ai-generated-csam-what-to-know/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/ai-generated-csam-what-to-know/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sat, 14 Mar 2026 15:03:41 GMT</pubDate>
                
                    <category><![CDATA[child pornography]]></category>
                
                    <category><![CDATA[CSAM charges]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Sex Crimes]]></category>
                
                
                    <category><![CDATA[csam charges]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>What is AI-Generated CSAM? Synthetic child sexual abuse material (CSAM) may not involve a camera or physical contact but it will depicts a child in a sexual context and thus is subject to regulation. Artificial intelligence is used to create realistic images or videos of children in sexual situations. Sometimes, these materials depict completely fabricated&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p><strong>What is AI-Generated CSAM?</strong></p>



<p>Synthetic child sexual abuse material (CSAM) may not involve a camera or physical contact but it will depicts a child in a sexual context and thus is subject to regulation.  Artificial intelligence is used to create realistic images or videos of children in sexual situations. Sometimes, these materials depict completely fabricated children or the face or likeness of a real child, placing them into sexualized content without their knowledge or consent.  When it is the face or likeness of a real child, there is a higher likelihood of charges being imminent.  </p>



<p><strong>Can I be Charged with Synthetic CSAM? </strong></p>



<p>It is possible to be charged criminally when in possession of AI generated child sex abuse material.  There has been some movement in this area to <a href="https://www.techpolicy.press/court-rules-that-constitution-protects-private-possession-of-aigenerated-csam/">litigate the legality</a> of charging such activity criminally and only time will tell what that means for how the Supreme Court will rule as recent cases move through the system. <a href="https://www.wdbj7.com/2026/03/04/reports-ai-generated-child-sexual-abuse-material-surge/">  News </a>continues to state that AI – Generated CSAM is on the rise and “a growing concern” which will in turn result in additional federal and state criminal charges for AI-Generated CSAM.  </p>



<p>Regulation of AI-created intimate images, often referred to as “deep fakes” has been broadly adopted by most states and the federal government.  In the state of Georgia, there have been <a href="https://www.ossoff.senate.gov/press-releases/sens-ossoff-blackburn-launch-bipartisan-inquiry-to-address-ai-generated-child-sex-abuse-material-online/">several attempts to change legislation</a> including this recent <a href="https://www.ossoff.senate.gov/wp-content/uploads/2023/07/23.07.17_DOJ-Letter-re-AI-CSAM-FINAL-1.pdf">letter </a>written by Jon Ossoff.  There are also <a href="https://www.dekalbda.org/news_detail_T6_R369.php">recent prosecutions </a>including a man in KY who was sentenced to five years for <a href="https://www.justice.gov/usao-wdky/pr/bowling-green-man-sentenced-5-years-federal-prison-followed-20-years-supervised">using AI to create child sexual abuse material.</a>  <a href="https://www.justice.gov/psc/press-room">Prosecutions at the federal level for CSAM </a>is on the rise as well.   </p>



<p>If you learn that you are under investigation for offenses related to CSAM, you should <a href="https://www.conawayandstrickler.com/contact-us/">contact us </a>immediately. <a href="https://www.conawayandstrickler.com/lawyers/meg-strickler/">We </a>are here to help and have <a href="https://www.conawayandstrickler.com/blog/categories/sex-crimes/">experience</a> to fight these cases.  </p>



<p></p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Recent Investment Fraud case in Georgia]]></title>
                <link>https://www.conawayandstrickler.com/blog/recent-investment-fraud-case-in-georgia/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/recent-investment-fraud-case-in-georgia/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Sat, 03 Jan 2026 18:04:54 GMT</pubDate>
                
                    <category><![CDATA[Cyber Crime]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[investment fraud]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[federal criminal defense attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[investment fraud]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar crime]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                    <media:thumbnail url="https://conawayandstrickler-com.justia.site/wp-content/uploads/sites/908/2023/10/IMG_7855-scaled-1.jpeg" />
                
                <description><![CDATA[<p>David Bradford, the former Chief Operating Officer of Drive Planning LLC (“Drive Planning”), pled guilty last month to conspiracy to commit wire fraud arising from a multi-year Ponzi investment fraud case that defrauded investors out of millions of dollars. A SEC complaint was also filed against Jacqueline and Russell Todd Burkhalter. The SEC complaint details&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>David Bradford, the former Chief Operating Officer of Drive Planning LLC (“Drive Planning”), <a href="https://www.justice.gov/usao-ndga/pr/former-financial-advisory-group-executive-pleads-guilty-4-million-ponzi-scheme">pled guilty</a> last month to conspiracy to commit wire fraud arising from a multi-year Ponzi investment fraud case that defrauded investors out of millions of dollars. A <a href="https://storage.courtlistener.com/recap/gov.uscourts.gand.332795/gov.uscourts.gand.332795.1.0.pdf">SEC complaint </a>was also filed against <a href="/blog/unregistered-securities-and-allegations-of-operating-a-ponzi-scheme/">Jacqueline and Russell Todd Burkhalter</a>. The SEC complaint details that promises of investment gains were built on lies. Drive Planning and its officers did not have any legitimate business operations capable of generating the returns they touted. Instead, they used new investor funds to pay earlier investors in classic Ponzi scheme fashion. The defendants in the case, it was alleged, used the funds to fund an extravagant lifestyle, including purchasing a $3.1 million yacht, spending $4.6 million on private jets and luxury car services, and acquiring a $2 million luxury condo.</p>



<p>An Indianapolis broker<a href="https://www.sec.gov/enforcement-litigation/litigation-releases/lr-26456"> is also being charged</a> with <a href="https://www.occ.gov/topics/consumers-and-communities/consumer-protection/fraud-resources/financial-and-investment-fraud-.html">securities fraud</a> and investment fraud by the SEC in relation to Drive Planning LLC, and its alleged $300 million Ponzi scheme. Gerardo “Gerry” Linarducci, a former Managing Partner of Drive Planning and head of its Indiana branch office, was charged on Dec. 19. </p>



<p>It is alleged that from late 2021 until in or about June 2024, Drive Planning, a Georgia based financial advisory group, marketed several investments, including the “Cash Out Real Estate Fund,” or “CORE Fund,” as “easy and simple,” advising prospective investors that the fund provided “100% Passive Income from Tax Liens.” Drive Planning guaranteed investors a return of 10% every six months or a 22% return per year for up to three years. Drive Planning further materially misrepresented that investors’ contributions to the CORE Fund were pooled together, government-protected, and fully collateralized. As part of the scheme, Bradford created a marketing brochure to promote the CORE Fund, which was shared with Drive Planning’s sales agents to solicit investors.&nbsp;</p>



<p>In actuality, the investors’ monies were being used for other purposes, including to pay off other Drive Planning investors, make commission payments to Drive Planning’s agents, and pay for personal expenditures. Bradford and others at Drive Planning further concealed the scheme to defraud by failing to disclose that Drive Planning did not invest any funds in the CORE Fund after approximately December 9, 2022. To the contrary, even after the Securities and Exchange Commission (SEC) began investigating Drive Planning in approximately March 2024, Bradford and others continued to solicit investments for the CORE Fund. In total, Drive Planning received at least $4.1 million from CORE Fund investors.</p>



<p>In August 2024, the SEC obtained a temporary restraining order against Drive Planning and filed separate civil enforcement actions against Drive Planning and others in the U.S. District Court for the Northern District of Georgia related to the above-described scheme.&nbsp;</p>



<h2 class="wp-block-heading" id="h-we-can-help">We Can Help</h2>



<p>Conaway & Strickler, PC has vast experience representing those who are facing charges from the SEC and the DOJ and we are equally adept at representing victims of <a href="https://www.conawayandstrickler.com/blog/what-is-a-pig-butchering-scam/">investment fraud</a>.  We pursue all available legal avenues to recover your lost investments.  <a href="https://www.conawayandstrickler.com/contact-us/">Contact us</a> should you need representation.  </p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[How to Defend CSAM Cases]]></title>
                <link>https://www.conawayandstrickler.com/blog/sex-crimes/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/sex-crimes/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Wed, 26 Nov 2025 03:02:11 GMT</pubDate>
                
                    <category><![CDATA[Sex Crimes]]></category>
                
                
                    <category><![CDATA[CSAM]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[sex crimes]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>I. How Does a Sex Crimes / CSAM Case Get to Law Enforcement? The National Center for Missing and Exploited Children (NCMEC) CyberTipline is a centralized reporting system for the online exploitation of children. Facebook/Meta, Google, Instagram, Snapchat, Yahoo, Microsoft, X, etc are required to report suspected CSAM detected on their platforms. These providers make&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>I. How Does a Sex Crimes / CSAM Case Get to Law Enforcement? <br></p>



<figure class="wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="576" height="576" data-id="1435" src="/static/2025/11/cs-picture.jpeg" alt="" class="wp-image-1435" srcset="/static/2025/11/cs-picture.jpeg 576w, /static/2025/11/cs-picture-300x300.jpeg 300w, /static/2025/11/cs-picture-150x150.jpeg 150w" sizes="auto, (max-width: 576px) 100vw, 576px" /></figure>
</figure>



<p>The National Center for Missing and Exploited Children (NCMEC)<a href="https://www.missingkids.org/gethelpnow/cybertipline?gad_source=1"> CyberTipline</a> is a centralized reporting system for the online exploitation of children. Facebook/Meta, Google, Instagram, Snapchat, Yahoo, Microsoft, X, etc are required to report suspected CSAM detected on their platforms.  These providers make reports of suspected online sex crimes issues and NCMEC reviews each report, and then forwards it to law enforcement for investigation. The report typically includes a description of the images, cryptographic hash values assigned to each file, and the Internet Protocol (IP) address linked to the account in question.</p>



<p>Cases can also occur when computer repair technicians encounter suspected CSAM on a device, or if a family member or peer sees something and informs law enforcement.  Additionally, if an allegation of child molestation is made against a suspect, that suspect’s devices may be seized and contraband files discovered.  </p>



<p>II.  How is the Dark Net involved in These Cases? </p>



<p>In a recent case, the DOJ arrested 18 defendants and dismantled four dark web sites dedicated to images and videos containing CSAM in “<a href="https://www.justice.gov/opa/pr/operation-grayskull-culminates-lengthy-sentences-managers-dark-web-site-dedicated-sexual">Operation Grayskull”</a>.</p>



<p>Bitcoin is the most popular dark web currency.  Litecoin comes in second as the most popular currency. Administrators of dark web sites use multiple websites under multiple pseudonyms, employing cryptocurrency mixers, numerous cryptocurrency wallets, and intermediary accounts to move the funds in an attempt to evade detection.</p>



<p>When a dark web site is dismantled, the users are tracked and ultimately arrested along with the administrators. </p>



<p>III.  What are Some Ways to Defend These Types of Cases? </p>



<p>Conaway & Strickler, PC always advises seeking digital forensic experts in these types of cases. They can mirror image the devices seized and analyze them. They help decipher some of the more technical aspects of the discovery we receive. Their expertise can pinpoint precise steps the government may have missed in their investigation. They can also determine whether files were intentionally accessed, whether timestamps were manipulated, and whether malware or remote-access software could have created the material without the accused’s knowledge.</p>



<p>We also employ forensic psychologists to do a psychosexual evaluation to help provide mitigation and/or to provide a defense to the charges.</p>



<p>Conaway & Strickler, PC represents clients charged with <a href="https://www.conawayandstrickler.com/criminal-defense-practice/sex-crimes/">Child Sex Abuse Material </a>at the state and federal level. For further information, please see <a href="https://www.conawayandstrickler.com/blog/categories/sex-crimes/">here </a>or <a href="https://www.conawayandstrickler.com/contact-us/">contact us</a>. We are here to help.</p>



<p></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Recent Fraud Cases Highlighted by the DOJ include Cryptocurrency and Civil Forfeiture Complaints]]></title>
                <link>https://www.conawayandstrickler.com/blog/recent-fraud-cases-highlighted-by-the-doj-include-cryptocurrency-and-civil-forfeiture-complaints/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/recent-fraud-cases-highlighted-by-the-doj-include-cryptocurrency-and-civil-forfeiture-complaints/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sun, 03 Aug 2025 13:54:00 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[cryptocurrency]]></category>
                
                    <category><![CDATA[Cybercrime]]></category>
                
                
                    <category><![CDATA[#cryptocurrency]]></category>
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[atlanta criminal lawyer]]></category>
                
                    <category><![CDATA[atlanta federal criminal attorney]]></category>
                
                    <category><![CDATA[atlanta internet crime attorney]]></category>
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[cryptocurrency fraud charges]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                
                
                <description><![CDATA[<p>As we enter the 8th month of 2025, it is clear that federal agencies have ramped up enforcement of federal crimes, leading to substantial financial penalties and lengthy prison sentences. Recently, the Department of Justice highlighted enforcement efforts that allegedly aimed at protecting&nbsp; Americans from transnational fraud schemes.&nbsp; Here are some of the cases discussed:&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>As we enter the 8th month of 2025, it is clear that federal agencies have ramped up enforcement of federal crimes, leading to substantial financial penalties and lengthy prison sentences.</p>



<p>Recently, the Department of Justice highlighted enforcement efforts that allegedly aimed at protecting&nbsp; Americans from transnational fraud schemes.&nbsp; Here are some of the cases discussed:</p>



<p><a href="https://www.pacermonitor.com/public/case/58513717/USA_v_Murray">United States v. Troy Murray</a> and <a href="https://www.pacermonitor.com/public/case/58513715/USA_v_Murray">United States v. Cutter Murray</a>. On June 11, 2025, DOJ’s Consumer Protection Branch filed an Information in SDFL charging Troy Murray also known as “Steve Dixson” with conspiracy to commit wire fraud. According to court documents, Troy Murray sold to lottery fraud scammers, including Jamaicans, his lead list database containing the names, and personal information of over seven million elderly American consumers. These lists were allegedly then used to defraud elderly victims. Additionally, Cutter Murray, Troy Murray’s son, will plead guilty to one count of money laundering for receiving and then laundering $1.6 million of the fraudulent funds Troy Murray obtained.</p>



<p><a href="https://www.justice.gov/usao-ct/pr/georgia-man-charged-operating-sweepstakes-scam">United States v. Jimmy Smith</a>. On April 1, 2025 the U.S. Attorney’s Office for the District of Connecticut announced charges against Jimmy Smith, 30, a citizen of Jamaica, who resided in Hinesville, Georgia. According to court documents, Smith and others defrauded at least four victims residing in Connecticut, New York, Texas, and California, by telling them they had won a Publishers Clearing House Sweepstakes and needed to pay taxes or money to claim the prize.</p>



<p>United States v. <a href="https://www.justice.gov/usao-ma/pr/nigerian-national-pleads-guilty-role-romance-scam-and-money-laundering-scheme">Charles Uchenna Nwadavid</a>. On April 9, the U.S. Attorney’s Office (USAO) for the District of Massachusetts announced charges against Charles Uchenna Nwadavid, a citizen of Nigeria who was arrested after landing at the Dallas-Fort Worth Airport. In January 2024, a grand jury indicted Nawadavid on one count of mail fraud and two counts of money laundering. Between approximately 2016 to September 2019, Nwadavid allegedly participated in romance scams that tricked victims into sending money abroad.&nbsp; He plead guilty to mail fraud, aiding and abetting money laundering and money laundering on June 26, 2025.&nbsp; The DOJ states “romance schemes” &nbsp;generally begin when the “bad actors” recruit victims through advertisements for online relationships on dating or social media websites. Individuals perpetuating romance scams often create fictitious profiles and then use them to gain victims’ trust through a purported romantic relationship. Perpetrators then direct their victims to send money or to conduct financial transactions involving other victims’ money under false pretenses, such as an urgent need for money to secure a multi-million dollar inheritance or to pay for an unexpected hospitalization.</p>



<p>Another romance scheme can involve investing in cryptocurrency. The United States Attorney’s Office for the Northern District of Ohio (USAO) has filed a <a href="https://www.justice.gov/usao-ndoh/media/1391461/dl?inline">civil complaint in forfeiture</a> against 8,207,578 Tether (USDT) cryptocurrency, valued at more than $8.2 million in February, 2025.&nbsp; &nbsp;In that case, investigators found that scammers initially contacted the victims through seemingly misdirected, or “wrong number,” text messages. The fraudster then gained the victim’s trust and affection using various manipulative tactics. Once trust was established with the victim, the fraudster would share how much success they, or someone they knew, had with investing in cryptocurrency. This personal testimonial lessened any uncertainties the victims may have had about virtual currencies and eventually had the intended effect to persuade the victim to proceed with the investment.</p>



<p>The fraudster would then guide the victim, step-by-step, on how to open a legitimate cryptocurrency account, most often with a U.S. based virtual currency exchange such as Crypto.com or Coinbase. The scammer would walk the victim through the entire process of transferring money from their bank to the newly created cryptocurrency account. Next, the victim received instructions on how to transfer the purchased cryptocurrency assets to an online “investment platform,” which would turn out to be a fake site created by the fraudsters to look like a legitimate company. Information on the platforms promised lucrative returns which encouraged victims to invest further. However, once the victim transferred their funds to the “investment platform” they unknowingly handed over complete control and ownership of their funds to the scammer.&nbsp; These fake cryptocurrency trading platforms or fake versions of official crypto wallets to trick unsuspecting victims. These fake websites usually have similar but slightly different domain names from the sites they attempt to mimic.</p>



<p>The complaint also outlines that the perpetrators of such investment fraud schemes often allow victims to withdraw a portion of their “profits” early on in the scheme to build trust and reinforce their belief that the “investment platform” was legitimate. But as the scheme progressed, victims were unable to withdraw their funds and given excuses as to why they could not access their funds. For example, the fraudsters referred to a fake “tax” requirement, stating that taxes must be paid on the proceeds generated from the investment platform. Knowing that the scam would run its course soon, the fraudsters used last-ditch efforts to lie to victims that they had to pay a tax. Ultimately, victims were locked out of their account on the investment platform and lost their funds.</p>



<p>A woman in Lake County, Ohio became the target of such a scam when she responded to a text on her phone from an unknown number in November 2023. She began sharing information via text with the person and the two bonded over topics such as hobbies and religion. Over a period of time, the victim followed instructions from her new “friend” and opened an account at Crypto.com and then transferred funds into the account. When the victim wanted to withdraw funds, her “friend,” relented and said additional payments were needed and she complied. When the victim no longer had any funds left after making additional payments, her “friend” began to threaten her that he would send his friends to “take care of” her friends and family. Having lost her entire life savings of approximately $663,352, including funds from her Roth IRA, the victim filed a complaint with the FBI’s Internet Crime Complaint Center to report the losses in June 2024. The FBI Cleveland Division subsequently initiated an investigation.</p>



<p><a href="https://www.justice.gov/usao-ndoh/media/1402451/dl?inline">United States v. 679,981.22 Tether, et al</a>. On June 3, the U.S. Attorney’s Office for the Northern District of Ohio announced the filing of a civil forfeiture complaint against 679,981.22 in the Tether cryptocurrency suspected of being fraudulently obtained as part of a romance/investment scam. According to court documents, one victim was targeted via LinkedIn and another victim was targeted though the dating App “Coffee Meets Bagel.”</p>



<p>The experienced federal criminal defense attorneys at <a href="/lawyers/">Conaway & Strickler, PC</a> are here to protect your rights, reputation, and future should you be under investigation. With decades of experience in defending traditional financial fraud paired with a deep understanding of the newer world of cryptocurrency, our firm possesses the skills and expertise to assist those accused of any type of fraud.  Call or <a href="/contact-us/">contact us online for a confidential consultation</a>.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Tax Evasion]]></title>
                <link>https://www.conawayandstrickler.com/blog/tax-evasion/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/tax-evasion/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Fri, 06 Jun 2025 13:35:00 GMT</pubDate>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Federal Sentencing]]></category>
                
                    <category><![CDATA[tax evasion]]></category>
                
                    <category><![CDATA[Tax Fraud]]></category>
                
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[#taxevasion]]></category>
                
                    <category><![CDATA[#taxfraud]]></category>
                
                    <category><![CDATA[aggravated identity theft]]></category>
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[PPP Loan Fraud]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>Tax evasion is a potential criminal charge. Tax avoidance is perfectly acceptable. 26 U.S.C. § 7201 defines what is tax evasion.&nbsp; It states in relevant part that any person who willfully attempts in any manner to evade or defeat any tax imposed by this title or the payment thereof shall, in addition to other penalties&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p><a href="https://www.law.cornell.edu/wex/tax_evasion">Tax evasion</a> is a potential criminal charge. <a href="https://apps.irs.gov/app/understandingTaxes/whys/thm01/les03/media/ws_ans_thm01_les03.pdf">Tax avoidance</a> is perfectly acceptable.</p>



<p>26 U.S.C. § 7201 defines what is <a href="https://www.justice.gov/tax/file/1293361/dl">tax evasion</a>.&nbsp; It states in relevant part that any person who willfully attempts in any manner to evade or defeat any tax imposed by this title or the payment thereof shall, in addition to other penalties provided by law, be guilty of a felony and, upon conviction thereof, shall be fined not more than $100,000 ($500,000 in the case of a corporation), or imprisoned not more than 5 years, or both, together with the costs of prosecution.</p>



<p>Federal prosecutors might also add additional charges beyond tax evasion. Those charges could include conspiracy charges, under 18 U.S.C. § 371, or tax fraud under 26 U.S.C. § 7206.&nbsp;&nbsp;The United States Sentencing Commission (USSC) recently released its <a href="https://www.ussc.gov/research/quick-facts/tax-fraud">Tax Fraud Report</a> for fiscal year 2023. It states that off the 64,124 cases reported to the Commission in fiscal year 2023, 363 involved tax fraud (down 27% since FY 2019).&nbsp; It is unclear if this downward trend will continue.</p>



<p>Recently, <a href="https://www.justice.gov/usao-nj/pr/new-jersey-man-pleads-guilty-tax-evasion">a man in New Jersey plead guilty to tax evasion</a>. According to the Department of Justice, “for tax years 2015 and 2016, Matthew Tucci, of West Long Branch, NJ, filed tax returns that stated he owed more than $2 million in taxes for both years. Despite admitting that he owed those taxes, Tucci did not fully pay them when they were due. Instead, Tucci purchased real estate and engaged in a series of transactions designed to conceal his interest in those properties.</p>



<p>In 2017, the IRS sent notices to Tucci that he owed taxes, interest, and penalties for 2015 and 2016. After receiving these notices, Tucci transferred multiple properties to an entity owned by another individual, but he continued to exert control over at least two of them. Of the two properties Tucci continued to control, he sold one and refinanced the other. Tucci used the proceeds from these transactions to pay his personal expenses rather than his tax debts. In 2019, Tucci submitted documents to the IRS that falsely claimed that he had no connection to the entity that owned the 12 properties.</p>



<p>He faces a maximum penalty of five years in prison as well as a period of supervised release, restitution, and monetary penalties. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.”</p>



<p>In another case, <a href="https://www.justice.gov/opa/pr/florida-businessman-sentenced-prison-tax-evasion">a Florida businessman was sentenced to prison for tax evasion</a>.&nbsp; According to the&nbsp; Department of Justice, “David Albert Fletcher, of Deltona, Florida owned and operated furniture liquidations businesses, including Century Liquidators. For tax years 2004 through 2013, Fletcher did not timely file his federal income tax returns or pay the taxes he owed. After an audit, the IRS assessed a total of $1.7 million in taxes, interest, and penalties against him.</p>



<p>To evade collection of these taxes, Fletcher concealed his income and assets from the IRS. For example, Fletcher used nominees to hide his purchases of luxury vehicles, including Rolls Royces. Fletcher also filed false income tax returns that understated his income by several million dollars, and when an IRS special agent interviewed him, Fletcher falsely represented the amount of income he earned.</p>



<p>In addition to his prison sentence, U.S. District Judge Wendy Berger for the Middle District of Florida ordered Fletcher to serve three years of supervised release and to pay approximately $7,112,689 in restitution to the United States.”</p>



<p>Recently, <a href="/lawyers/meg-strickler/">Meg Strickler</a> was able to ensure that no tax evasion charges were filed against her client.  <a href="/contact-us/">Contact us</a> if you think you might be facing tax evasion or tax fraud charges.  We are here to help.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Department of Justice Fraud Prosecutions]]></title>
                <link>https://www.conawayandstrickler.com/blog/department-of-justice-fraud-prosecutions/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/department-of-justice-fraud-prosecutions/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Wed, 28 May 2025 13:28:00 GMT</pubDate>
                
                    <category><![CDATA[Blog]]></category>
                
                    <category><![CDATA[EIDL fraud]]></category>
                
                    <category><![CDATA[False Claims Act]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Fraud]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                    <category><![CDATA[White Collar Offenses]]></category>
                
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[EIDL fraud]]></category>
                
                    <category><![CDATA[federal crimes]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[health care fraud]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                
                
                <description><![CDATA[<p>Fraud is a concept that has been in the criminal justice system forever.&nbsp; Google defines it as an intentional deception used to gain an unfair advantage or benefit, often involving financial gains.&nbsp; How does the Department of Justice prosecute fraud?&nbsp; Below is a non exhaustive list of charges that the DOJ can bring. The FBI&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>Fraud is a concept that has been in the criminal justice system forever.&nbsp; Google defines it as an intentional deception used to gain an unfair advantage or benefit, often involving financial gains.&nbsp; How does the Department of Justice prosecute fraud?&nbsp; Below is a non exhaustive list of charges that the DOJ can bring.</p>



<ul class="wp-block-list">
<li>Wire fraud</li>



<li>Mail fraud</li>



<li>Bank fraud</li>



<li>Tax fraud (tax evasion or false statements)</li>



<li>Healthcare fraud/FCA</li>



<li>Medicare/Medicaid fraud</li>



<li>PPP loan or COVID relief fraud</li>



<li>Securities fraud</li>



<li>Mortgage fraud</li>



<li>Immigration or visa fraud</li>



<li>Government contract fraud</li>



<li>Identity theft or benefits fraud</li>



<li>Trafficking in Counterfeit Goods or Services</li>



<li>Anti kickbacks</li>



<li>AML</li>
</ul>



<p>The FBI gives this <a href="https://www.fbi.gov/how-we-can-help-you/scams-and-safety/common-frauds-and-scams">list</a> of frauds and the DOJ publishes some of their cases <a href="https://www.justice.gov/criminal/criminal-fraud-cases">here</a>.</p>



<p>Fraud investigations can begin in a number of ways. In many cases, they are triggered by:</p>



<ul class="wp-block-list">
<li>A whistleblower or former employee</li>



<li>A suspicious activity report</li>



<li><a href="https://www.fbi.gov/how-we-can-help-you/scams-and-safety/common-frauds-and-scams">A suspicious activity report (SAR)</a> from a bank or financial institution</li>



<li>Data flagged by automated fraud detection software</li>



<li>A referral from another federal agency (e.g., IRS, SBA, USPS, HHS)</li>



<li>A civil audit or regulatory review that uncovers irregularities</li>



<li>Investigative journalism or public tips</li>



<li><a href="https://www.conawayandstrickler.com/blog/the-new-fincen-rule-for-residential-real-estate-what-it-means-for-investors-and-legal-compliance/">Problems in real estate transactions</a>.  (FINCEN’s new rule extends Anti-Money Laundering (AML) and Countering the Financing of Terrorism (CFT) obligations to investment advisers involved in these transactions)</li>
</ul>



<p>Once red flags are detected, the matter is referred to a federal investigative agency. These can include:</p>



<ul class="wp-block-list">
<li><strong>Federal Bureau of Investigation (FBI)</strong></li>



<li><strong>Internal Revenue Service – Criminal Investigation (IRS-CI)</strong></li>



<li><strong>Office of Inspector General (OIG)</strong></li>



<li><strong>Postal Inspection Service (USPIS)</strong></li>



<li><strong>Securities and Exchange Commission (SEC)</strong></li>



<li><strong>Health and Human Services (HHS)</strong></li>



<li><strong>Small Business Administration (SBA)</strong></li>
</ul>



<p>If you have been contacted by federal agents FOR ANY REASON, contact a federal criminal defense attorney immediately.&nbsp; Do not speak period.&nbsp; If you have received a grand jury subpoena, contact a federal criminal defense attorney immediately.&nbsp; If you have received a target letter, contact a federal criminal defense attorney immediately.&nbsp; If you are being audited by the IRS, SBA, HHS or another agency, contact a federal criminal defense attorney immediately. It never hurts in this&nbsp; last instance to have sage advice before the investigation goes any further.</p>



<p>At Conaway & Strickler, PC, we are here to help. <a href="/contact-us/">Contact us</a> to discuss your options.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Anatomy of an Options Trading Scheme case in Federal Court in Atlanta]]></title>
                <link>https://www.conawayandstrickler.com/blog/anatomy-of-an-options-trading-scheme-case-in-federal-court-in-atlanta/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/anatomy-of-an-options-trading-scheme-case-in-federal-court-in-atlanta/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sun, 26 Jan 2025 18:38:00 GMT</pubDate>
                
                    <category><![CDATA[SEC]]></category>
                
                    <category><![CDATA[SEC complaint]]></category>
                
                    <category><![CDATA[securities fraud]]></category>
                
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[federal indictment]]></category>
                
                    <category><![CDATA[options trading scheme]]></category>
                
                    <category><![CDATA[SEC Complaint]]></category>
                
                    <category><![CDATA[securities fraud]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>Milan Patel and four other defendants were charged both by the SEC and the Department of Justice for their role in an options trading scheme in the Northern District of Georgia.&nbsp; Another defendant, Bart Ross was sentenced a few years ago for the same scheme.&nbsp; In total, In total, the defendants executed more than 500&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p><a href="https://www.sec.gov/files/litigation/complaints/2023/comp-pr2023-33.pdf">Milan Patel</a> and four other defendants were <a href="https://americankahani.com/business/quick-buck-indian-american-charged-for-spreading-false-rumors-about-public-firms/">charged</a> both by the SEC and the Department of Justice for their role in an options trading scheme in the Northern District of Georgia.&nbsp; Another defendant, <a href="https://www.justice.gov/usao-ndga/pr/former-registered-broker-admits-involvement-options-trading-scheme">Bart Ross</a> was sentenced a few years ago for the same scheme.&nbsp; In total, In total, the defendants executed more than 500 trades and made $2,651,320 in profits as a result of their fraudulent scheme.&nbsp; And just last week, Mr. Patel was <a href="https://www.justice.gov/usao-ndga/pr/five-defendants-sentenced-options-trading-scheme">sentenced.</a></p>



<p>According to the NDGA DOJ news release:</p>



<p><em>According to Acting U.S. Attorney Moultrie, the charges and other information presented in court: Between approximately October 2017 and January 2020, Milan Patel, Bart Ross, Mark Melnick, Anthony Salandra, and Charles Parrino conspired to trade securities—primarily short-term call options—in large, publicly traded companies based on materially false rumors about those companies that they generated and disseminated. These materially false rumors were intended to increase the price of the securities (both the underlying stock and options).</em></p>



<p><em>Call options are essentially a contract that gives the options’ holder the right, but not the obligation, to buy shares of the underlying stock at a set price per share—the option’s strike price—on or before a set future date (the option’s expiration date). Generally, the holder of a call option benefits when the price of the underlying stock increases. Short-term call options are ones that generally expire within a week.</em></p>



<p><em>Ross, Salandra, and Parrino, were formerly registered brokers with the Financial Industry Regulatory Authority (FINRA) and were responsible for drafting some of the fraudulent rumors. The conspirators would often refine a proposed rumor by exchanging drafts among themselves using the Trillian instant messaging application.</em></p>



<p><em>Melnick was a day trader and T3 Live Senior Trading Strategist who often provided technical evaluations on whether a particular false rumor would be successful. These rumors were carefully crafted to: (a) appear plausible enough to other market participants to move the price of the underlying security; and (b) move the price of the security in a particular direction—namely move the stock or option price up—so that Patel and the other conspirators could profitably trade on the rumors.</em></p>



<p><em>Patel was responsible for disseminating the rumor via Trillian to multiple accounts, which would in turn result in the false rumor being distributed over one or more market subscription services, including Trade The News, TradeXchange, and Benzinga, as well as various Twitter accounts.</em></p>



<p><em>Before Patel disseminated the rumor, the co-conspirators would acquire a position in the publicly traded company that was the subject of the rumor. The co-conspirators purchased short-term call options often mere seconds before Patel disseminated the rumor. The conspirators often purchased short-term call options because the price of such options is more sensitive than the price of the underlying stock. The conspirators profited from their scheme by selling the options (or other securities) after they increased in price. They would then sell off their positions shortly after the rumor was disseminated and the price of the option or underlying stock had increased</em>.</p>



<p>Most of these defendants ended up with a plea with one count of conspiracy to commit wire and securities fraud.&nbsp; When you see a case where the original situation with most defendants are charged in an indictment, and it ends with a plea to a one count, criminal information – this is good news. This means that the federal criminal defense lawyer has done their job well and worked out a resolution that limits the sentencing guidelines and ultimate months of incarceration.</p>



<p>In this case, if one has plead to Conspiracy to commit wire and securities fraud, the base offense level would be a 6.&nbsp; There will be an increase pursuant to the <a href="https://guidelines.ussc.gov/apex/r/ussc_apex/guidelinesapp/guidelines?app_gl_id=%C2%A72B1.1">chart</a> on what the intended loss amount is.&nbsp; There also can be enhancements such as:</p>



<ul class="wp-block-list">
<li>the number of victims</li>



<li>being a registered broker at the time of the offense</li>



<li>abuse of position of trust</li>



<li>sophisticated means</li>



<li>use of a special skill</li>
</ul>



<p>Then, there can be levels taken off for acceptance of responsibility and zero point offender.&nbsp; And finally, if the defendant has any criminal history the final number will be amended pursuant to Criminal History Category.&nbsp; Once the <a href="https://www.ussc.gov/sites/default/files/pdf/guidelines-manual/2023/Sentencing_Table.pdf">final number</a> is determined by the judge, the second part of the sentencing hearing will occur – discussing <a href="https://www.law.cornell.edu/uscode/text/18/3553">3553 factors.</a></p>



<p><a href="https://www.conawayandstrickler.com/contact-us.html">Contact</a> an experienced federal criminal defense lawyer like Conaway & Strickler, PC. We have close to 30 years experience in federal criminal and SEC defense.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[What to Expect in a Federal Criminal Trial]]></title>
                <link>https://www.conawayandstrickler.com/blog/what-to-expect-in-a-federal-criminal-trial/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/what-to-expect-in-a-federal-criminal-trial/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sun, 12 Jan 2025 20:22:00 GMT</pubDate>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                
                
                <description><![CDATA[<p>A federal criminal trial consists of several different stages.&nbsp; &nbsp;The below will analyze a ONE defendant trial.&nbsp; But, more often than not, trials can consist of multiple defendants at trial.&nbsp; This just augments the time needed for each stage. Jury Selection also known as Voir Dire Jury selection is one of the most important parts&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>A federal criminal trial consists of several different stages.&nbsp; &nbsp;The below will analyze a ONE defendant trial.&nbsp; But, more often than not, trials can consist of multiple defendants at trial.&nbsp; This just augments the time needed for each stage.</p>



<p><strong>Jury Selection also known as Voir Dire</strong></p>



<p>Jury selection is one of the most important parts of a federal criminal trial.&nbsp; It will start with about 40 potential jurors brought in. Usually we move our chairs to the other side of the table to face them. We ask general questions, then individual questions. Then, we deliberate on who to choose. Then, the court asks us to do our strikes, and then a jury is empaneled.</p>



<p>This usually takes a full day.</p>



<p><strong>Opening Statement</strong></p>



<p>After the jury has been empaneled and sworn, and loads of logistical information is given to the jurors by the judge, then&nbsp;the federal district court judge will invite the AUSA to give their opening statement. Like the jury selection, the opening statement is a critical part of a federal criminal trial.</p>



<p>The purpose of the opening statement is to allow the parties to explain to the jury what the case is about. While the parties may discuss the evidence, and explain what they believe it will show, they are not allowed to make arguments about what they think the evidence means.</p>



<p>After the AUSA has given their opening statement, which they are required to do because they have the burden of proof, the federal district court judge will ask the defense attorney if (s)he wishes to give an opening statement. The judge asks this in the form of a question because the defense attorney is not required to give an opening statement.</p>



<p>In a criminal case, the federal criminal defense lawyer may either give an opening statement, waive the opening statement, or waive the opening statement at that time, instead giving their opening statement at the close of the AUSA’s case.&nbsp; If this was a multi defendant trial, the judge usually will go in order as it is depicted on the most recent indictment.</p>



<p><strong>Direct Examination</strong> begins after we are done with the opening statements.&nbsp; The AUSA will begin calling their witnesses.&nbsp; Federal criminal defense attorney teaches <a href="https://law.gsu.edu/profile/meg-strickler/">advanced evidence</a> to LLM and JD students and GSU law and <a href="https://law.emory.edu/news-and-events/releases/2024/05/2024-05-20-keptt-kessler-eidson-trial-techniques-emory-law.html">trial techniques</a> at Emory Law.&nbsp; She literally teaches the <a href="https://www.uscourts.gov/sites/default/files/evidence_federal_rules_pamphlet_dec_1_2023.pdf">Federal Rules of Evidence</a> on what comes in at trial and how to do direct and cross examinations to law students.</p>



<p>Most direct examinations include three stages: </p>



<p>1. Introduction and background of the witness. <br>2. Laying the foundation of their relation to the case<br>3. Substantive questions about the case.</p>



<p>Like all criminal cases, in a federal criminal trial, the entire burden of proof is on the AUSA. In thinking how to proceed, an AUSA will consider all elements of the crimes alleged. This is because every crime is made up of parts, or elements. The elements are set forth in the instructions to the jury. To prevail, the AUSA must prove each and every element of the crime. Consequently, the AUSA will call witnesses that have information they believe will help persuade the jury that an element has been satisfied.</p>



<p>Because this is direct examination, the AUSA may only ask open ended questions. This is often as simple as, “what happened next?” A question used for direct examination may not suggest an answer. Therefore, it would not be appropriate for the AUSA to tell the witness what they think happened, and then ask the witness to agree. Thus, the AUSA cannot properly say “and the next thing that happened was….do you agree?” This leading question would constitute cross-examination. The party who called the witness may not “lead” the witness and may only ask direct examination questions. Such a leading question would likely prompt the objection of any of us federal criminal defense lawyers.</p>



<p>There are some exceptions to this rule, however, and some leading questions are allowed during direct examination. For example, Rule 611 of the Federal Rules of Evidence suggests that an AUSA may use cross-examination as necessary to “develop the witnesses testimony.” Leading questions may also be used with a “hostile witness.”</p>



<p>Once the witness has testified on direct, the defense lawyer will get to conduct <strong>Cross-Examination</strong> of the government’s witnesses.</p>



<p>We may ask questions of the government’s witness after the AUSA has completed their direct examination. Again, the defense attorney is not required to ask questions because they have no burden of proof. While there may be strategic reasons for waiving a witness, in some instances, we will engage in extensive and detailed questioning or cross-examination of the government witness.</p>



<p>Most cross-examination questions include the following:</p>



<p>1. We draft question to elicit any positive information from the witness. <br>2. We work to limit the damage done by the cross-examination. <br>3. We will impeach the witness where appropriate.</p>



<p>The defense attorney’s questioning can proceed by either direct or leading questions. A leading question is one that suggests the answer. This is called cross-examination. The purpose of cross-examination is to expand on the witness’s testimony, and possibly to show that the witness lacks credibility or that their fact statements are wrong or misleading.</p>



<p>Cross-examination may also be used by us&nbsp;defense attorneys to show the jury that the government witness lacks actual knowledge, or that their knowledge is limited. This is especially true for expert witnesses. To expand on the above example, a defense attorney may cross-examine a forensic computer expert by asking them questions to show that they lack credentials. A cross-examination like this might be a simple statement to the witness such as “you don’t have a computer science degree?”</p>



<p>At the end of the government’s case, when there are no more witnesses or evidence, the AUSA will tell the judge that they “rest.” This means the AUSA’s case is completed.</p>



<p>At this juncture, we will all orally ask for a&nbsp;<strong>Motion for Directed Verdict</strong></p>



<p>In a federal criminal case, a motion for directed verdict is a motion requesting the judge to acquit the defendant as a matter of law. If the motion is granted, the case is done, and the defendant is declared the winner. A motion for directed verdict is also called a judgment as a matter of law.</p>



<p>While a motion for judgment as a matter of law may be made at any time before the case is submitted to the jury, the first opportunity for a federal criminal defense attorney to make such a motion is after the government has rested its case. In the attorney’s motion, we&nbsp;will offer to the judge any applicable law and explain why, based on this law, the facts of the case entitle the defendant to be found not guilty. An AUSA may not make a motion for directed verdict after the defense has rested.</p>



<p>In a typical federal criminal trial, once the AUSA has indicated that the government has rested its case, the district court judge will instruct the bailiff to escort the jury out of the courtroom. The judge will then ask the defense attorney if they have a motion for directed verdict. If the answer is no, then the jury will be brought back into the courtroom and the case will continue. Motions for directed verdict are always made outside the presence of the jury.</p>



<p>A federal criminal defense attorney may also make a motion for directed verdict at the end of the attorney’s case; meaning, after the defense has indicated to the court that they rest. This is because, as indicated, Rule 50 of the Federal Rules of Procedure allow a motion as a matter of law to be made any time before the jury has reached its verdict.</p>



<p><strong>DEFENSE:&nbsp;</strong></p>



<p>The defendant in a criminal case enjoys a presumption of innocence. One of the benefits of this presumption is that a person accused of a crime does not have an obligation to prove their innocence to the jury. This means there is no obligation to call any witnesses or produce any evidence. However, depending on the facts and circumstances of a case, it may be in the your best interest to call witness or provide evidence.</p>



<p>So, should any of us federal criminal defense attorneys call a witnesses, just as when the AUSA calls witnesses, the attorney may only ask this witness direct examination question, and the AUSA may cross-examine this witness using leading questions.</p>



<p>One of the witnesses that is available only to the defense attorney is the defendant. In a criminal case the accused has the right to remain silent. Therefore, only the defense attorney can call the accused to the stand. Whether to call the accused as a witness is often one of the most difficult questions for a federal criminal defense attorney. However, the final answer to this question resides completely with YOU. The decision must not be made by the lawyer.</p>



<p>Once all of&nbsp;the defense attorneys call all of&nbsp;their witnesses (if any), they will indicate to the court that “the defense rests.”</p>



<p>Next, we move to The <strong>Government’s Rebuttal Witnesses</strong></p>



<p>The defense may call rebuttal witnesses after it has rested because the government has the burden of proof. Rebuttal witnesses serve largely the same function as cross-examination in that they are used as part of an attempt, in this case by the government, to disprove evidence submitted by the defendant or to disprove what the defense witnesses said. It is rare, but possible, for the federal district court judge to allow what is called surrebuttal on the part of the defense. A surrebuttal witness is called by a party to respond to the opposing party’s rebuttal.</p>



<p><strong>Closing Arguments</strong></p>



<p>Once all the witnesses have been called, both the AUSA and we, the federal defense criminal defense attorneys, have presented all their evidence, and both have indicated to the court that they have rested, the next step is closing argument.</p>



<p>According to the <a href="https://www.uscourts.gov/sites/default/files/criminal_federal_rules_pamphlet_dec_1_2023.pdf">Federal Rules of Criminal Procedure</a>, the government goes first, the defense attorneys goes next, then the government gets another opportunity to rebut what the defense attorney has argued. The government gets to go first, and last, because they have the burden of proof.</p>



<p>Unlike the opening statement, in their final arguments, the AUSA and the federal criminal defense attorney may not only summarize the evidence presented but may also forcefully argue why the jury should find in their favor.</p>



<p>It is important to note, that district court judges will typically deny us the time, at the end of the trial, to leave and prepare our closing arguments.&nbsp; It is typical to move right into closing arguments after all the evidence has been received by the jury, and any directed verdict motions made and denied.</p>



<p>The Jury is then instructed as to the applicable law through what is known as jury charges.</p>



<p>The main purpose of a jury is to resolve issues of fact. A jury will reach its verdict by taking the law as provided to them by the judge and applying to this law to the facts as they find them. In this way they will arrive at their verdict. This law is set forth in the jury instructions.</p>



<p>Judges routinely state they will rely mainly on the pattern instructions prepared by the Circuit Committee on Pattern Criminal Jury instructions.&nbsp; We certainly research notable and useful jury charges and file such if we determine the pattern charges are not sufficient.</p>



<p><strong>Deliberations and Verdict</strong></p>



<p>The final stage in a federal criminal trial will be jury deliberations and verdict. The first thing the jury will do is select, often by voting, who will be their foreperson. Pattern jury instruction for the 11th circuit provides that the foreperson’s job is to do two things: (1) guide the jury’s deliberations and (2) be a liaison for communications with the court.</p>



<p>If the jury has questions, then normally, the foreperson will write it down, give it to the court officer who then gives the question to the judge. The jury may not tell anyone outside the jury where their “vote” stands or anything else about their deliberations. There is, however, no rule that says that only the foreperson may write down questions or give them to the court officer. In this way all jurors are “equal”.</p>



<p>In a criminal case the verdict must be unanimous in favor of acquittal or conviction. In a federal criminal case, a jury will be instructed they are to continue their deliberations until they have reached a unanimous decision. Pattern Jury Instructions on this issue provide that to find a defendant guilty in a federal criminal trial, the jury must unanimously agree that the government has overcome the presumption of innocence as to every element of the crime alleged and have done so with evidence that proves the defendant is guilty beyond a reasonable doubt.</p>



<p>As set forth in another&nbsp;Pattern Jury Instruction, the jury will be told that they are not to consider punishment in their deliberations. Punishment is solely the province of the judge presiding over the case.</p>



<p>Once the jury has reached its verdict, another&nbsp;Pattern Jury Instruction provides that the foreperson mark the appropriate place for guilty or not guilty, have each member sign the form, then give it to the court officer, who will then give the form to the judge.</p>



<p>Upon learning that the jury has reached its verdict, the judge will resume the trial, making sure the defendant is in the courtroom. Finally, the verdict will be read in court.</p>



<p>Once the verdict is read, if you are found guilty, the deputies (who have moved in to position for this moment) will come forward and ask you to put your hands behind your back and take off shoe laces, jewelry, etc in order to go in to custody.&nbsp; The federal criminal defense attorney immediately asks that the defendant remain out on an appeal bond, and the judge decides on whether or not to take the defendant in to custody at this time.</p>



<p>If you are found not guilty on all charges, then the case is over and closed.</p>



<p>Should you have any further questions about federal criminal defense trials please&nbsp;<a href="https://www.conawayandstrickler.com/contact-us.html">contact us</a>.&nbsp; We are here to help.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[White Collar Crime at a Crossroads: The Implications of Kousisis on Federal Fraud]]></title>
                <link>https://www.conawayandstrickler.com/blog/white-collar-crime-at-a-crossroads-the-implications-of-kousisis-on-federal-fraud/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/white-collar-crime-at-a-crossroads-the-implications-of-kousisis-on-federal-fraud/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Mon, 16 Dec 2024 19:32:00 GMT</pubDate>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[Criminal defense]]></category>
                
                    <category><![CDATA[criminal defense attorney]]></category>
                
                    <category><![CDATA[Criminal Lawyer]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[fraud]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                    <category><![CDATA[wire fraud]]></category>
                
                
                
                <description><![CDATA[<p>This month, the Supreme Court heard oral arguments in Kousisis v. United States, a case that could have significant implications on the future of federal white-collar prosecutions. Specifically, the Court is considering the boundaries of federal fraud statutes in scenarios where deceptive practices are employed without causing direct financial harm to the victim. Kousisis comes&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>This month, the Supreme Court heard <a href="https://www.supremecourt.gov/oral_arguments/audio/2024/23-909" target="_blank" rel="noreferrer noopener">oral arguments</a> in <em><a href="https://www.scotusblog.com/case-files/cases/kousisis-v-united-states/" target="_blank" rel="noreferrer noopener">Kousisis v. United States</a></em>, a case that could have significant implications on the future of federal white-collar prosecutions. Specifically, the Court is considering the boundaries of federal fraud statutes in scenarios where deceptive practices are employed without causing direct financial harm to the victim.</p>



<p><em>Kousisis </em>comes before the Court after a Philadelphia-area government contractor was found guilty of fraud after it failed to comply with a contract provision intended to promote diversity. Stamatios Kousisis and Alpha Painting and Construction Co., Inc. (Alpha) secured two substantial contracts with the Pennsylvania Department of Transportation (PennDOT). These contracts mandated a certain percentage of work to be allocated to Disadvantaged Business Enterprises (DBEs). Kousisis and his company misrepresented their compliance with this requirement by using a DBE as a mere pass-through entity, thereby falsely claiming adherence to the DBE participation goals. Despite this deception, the contracted work was completed to PennDOT’s satisfaction, and no direct financial loss was incurred by the department.</p>



<p>Federal prosecutors charged Kousisis and Alpha with wire fraud, conspiracy to commit wire fraud, and making false statements. The prosecution’s argument was based on the “fraudulent inducement” theory, suggesting that the defendants obtained the contracts through deceptive promises, even though PennDOT did not suffer a financial loss. Ultimately, <a href="https://www.justice.gov/usao-edpa/pr/downingtown-man-sentenced-nearly-six-years-prison-defrauding-penndot-disadvantaged" target="_blank" rel="noreferrer noopener">Kousisis was sentenced</a> to 70 months’ imprisonment for the multi-million dollar fraud he perpetrated following a jury trial in 2018.</p>



<p>However, the defense has argued that for a fraud conviction, there must be an intent to cause economic harm, which they claim was absent in this case. During oral arguments, Justice Ketanji Brown Jackson posed the question, “Why isn’t this a classic scheme to obtain property under false pretenses?” For years in federal white-collar cases, the “scheme” itself has always been recognized as the “harm” that triggers application of the federal fraud statutes. Despite that precedent, defense argued: “If there’s no harm that occurs in those transactions, there is no fraud.”</p>



<p>It seems that conservative justices were receptive to the defendant’s argument. Chief Justice John Roberts suggested that “such crimes were better handled by state prosecutors.” Justice Samuel Alito expressed that “the court really doesn’t like the federalization of white-collar prosecutions and wants that to be done in state court and is really hostile to this whole enterprise.”</p>



<p>The outcome of <em>Kousisis v. United States</em> holds the potential to redefine the scope of federal white-collar prosecutions. A decision favoring the defendants could lead to a substantial shift in prosecutorial responsibilities from federal to state authorities. A ruling that limits federal jurisdiction in such cases would compel companies to adapt by focusing more on state-level compliance and legal frameworks. Engaging with experienced legal counsel will be essential for businesses to remain compliant and mitigate risks in this evolving legal landscape.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[P2P Applications and Child Pornography]]></title>
                <link>https://www.conawayandstrickler.com/blog/p2p-applications-and-child-pornography/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/p2p-applications-and-child-pornography/</guid>
                <dc:creator><![CDATA[Law Office of Conaway & Strickler]]></dc:creator>
                <pubDate>Sat, 02 Nov 2024 14:16:00 GMT</pubDate>
                
                    <category><![CDATA[child pornography]]></category>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Sex Crimes]]></category>
                
                
                    <category><![CDATA[CSAM]]></category>
                
                    <category><![CDATA[federal child pornography charges]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>As we explained in our prior post about federal child pornography laws, the consequences of a child pornography or CSAM (“Child Sexual Abuse Material”) conviction are severe and life-altering. And the collateral consequence of being on the sex offender registry can be devastating. Early on, Conaway & Strickler defended cases that stemmed from activity on&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>As we explained in our prior post about <a href="https://www.conawayandstrickler.com/blog/federal-child-pornography-laws-in-a-nutshell/">federal child pornography laws</a>, the consequences of a child pornography or CSAM (“Child Sexual Abuse Material”) conviction are severe and life-altering. And the collateral consequence of being on the sex offender registry can be devastating.</p>



<p>Early on, Conaway & Strickler defended cases that stemmed from activity on classic peer-to-peer applications like Limewire.&nbsp; These type of networks were simply software applications that provided a central hub for various computers to connect.&nbsp; Napster, for example, was a peer-to-peer (P2P) file-sharing service that allowed users to share and download music files from other users’ computers.&nbsp; These types of programs were utilized to distribute music, movies and child pornography.&nbsp; Law enforcement was able to track those cases more easily.</p>



<p>Today, however, the government has also become well versed in programs like <a href="https://www.bittorrent.com/">BitTorrent</a>, Limewire and <a href="https://www.devx.com/terms/edonkey-network/">e-Donkey</a>, among others.&nbsp; When a hard drive or device is analyzed by the government, they now will produce a report detailing their forensic examination.&nbsp; They will detail all of the evidence found on the device showing evidence of P2P Networking, search history, bookmarks&nbsp; and they even cite images or image fragments found in cache locations.&nbsp; Here is a recent example of a <a href="https://www.justice.gov/usao-vi/pr/st-croix-man-who-downloaded-images-bittorrent-network-pleads-guilty-possession-child">federal criminal prosecution</a> of someone who downloaded images from the BitTorrent Network.</p>



<p>The P2P software programs allow the P2P networks to break large files into smaller segments that are then shared independently. The original purpose of this was to only optimize the download process by balancing the load among multiple users but it also increased the overall download speeds, as users can simultaneously download multiple segments from different sources.&nbsp; BUT, in early prosecutions of federal child pornography cases using P2P applications, the government was unable to show the actual images on the devices anymore.&nbsp; &nbsp;But, as described above, it is rare for a sophisticated user to have any actual images of CSAM on their devices.&nbsp; So, today, the government’s forensic report will draws a picture of all activities on the device to show that the user <em>intentionally</em> downloaded child pornography.&nbsp; We, at Conaway & Strickler, are well versed on the technicalities of defending a complex case like this and have years of experience of defending federal child pornography cases nationwide.&nbsp; We also have a variety of top notch experts ready to assist us to mirror images these devices in order to do our forensics to mount the proper defense to any federal criminal charges lodged.</p>



<p><a href="https://www.conawayandstrickler.com/contact-us.html">Contact us</a> anytime if you have any questions. We are here to help.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Protecting your career: Professional License Defense]]></title>
                <link>https://www.conawayandstrickler.com/blog/protecting-your-career-professional-license-defense/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/protecting-your-career-professional-license-defense/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Thu, 05 Sep 2024 16:40:19 GMT</pubDate>
                
                    <category><![CDATA[Nursing License Defense]]></category>
                
                    <category><![CDATA[Physician License Defense]]></category>
                
                
                    <category><![CDATA[Professional License Defense]]></category>
                
                    <category><![CDATA[sexual misconduct]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>In many fields, maintaining a professional license is crucial for career advancement and job security. Physicians, surgeons, nurses, pharmaceutical technicians and other professionals spend years training before becoming licensed and employed. However, allegations of misconduct, incompetence, or violations of professional standards can jeopardize this license and your livelihood. Understanding how to navigate a professional license&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>In many fields, maintaining a professional license is crucial for career advancement and job security. Physicians, surgeons, nurses, pharmaceutical technicians and other professionals spend years training before becoming licensed and employed. However, allegations of misconduct, incompetence, or violations of professional standards can jeopardize this license and your livelihood. Understanding how to navigate a professional license defense is essential. At Conaway & Strickler, we are experienced in professional license defense and assisting clients with protecting their careers.</p>


<p>If your professional license is under review, you may be facing disciplinary action, suspension, or even revocation of your license. Professionals can face license challenges due to various reasons, including allegations of unethical behavior, negligence, or non-compliance with industry standards. Common grounds for disciplinary action in this context includes the following:</p>


<ul class="wp-block-list">
<li><strong>Negligence or Malpractice:</strong>Claims that a professional has failed to meet the appropriate standard of care.</li>
<li><strong>Ethical Violations:</strong>Breaches of professional codes of conduct or ethical guidelines.</li>
<li><strong>Criminal Charges:</strong>Convictions that impact one’s suitability for professional practice. Generally, a criminal charge will almost always bring a professional license under review.</li>
<li><strong>Substance Abuse:</strong>Issues related to addiction or impairment affecting professional duties. This can arise simply from reports of substance abuse made to the licensing board, or a criminal charge related to substance abuse (DUI, unlawful possession of controlled substances, etc.).</li>
<li><strong>Fraud or Misrepresentation:</strong>Instances of dishonesty or deceptive practices. Again, this can stem from criminal charges or arise in the context of reports/evidence of fraud or misrepresentation.</li>
</ul>


<p>The applicable licensing board often initiates the process for disciplinary action once a complaint has been filed. In some circumstances, such as pending criminal charges, it may be mandatory for the professional to self-report to the Board. This varies by state and different professional licenses have different requirements.</p>


<p>Following the initial notification, the Board conducts an investigation to gather evidence and determine if there is a basis for formal charges. It is crucial to respond promptly and thoroughly to any allegations. An experienced attorney can help you gather evidence, prepare statements, and formulate a defense strategy. Sometimes, it may be possible to resolve the matter through negotiation or a settlement, which can mitigate the impact on your license. If the case proceeds to a formal hearing, working closely with an attorney to present a robust defense is essential. This may involve testimony, evidence presentation, and cross-examination.</p>


<p>Hiring a skilled attorney is the best way to protect your career once your professional license has been challenged. At Conaway and Strickler, we have a proven track record in defending professional licenses can provide valuable insights and strategies for your case. Each case is unique, and we offer a personalized approach to understanding the specifics of your situation and providing customized legal solutions.Facing a challenge to your professional license can be a daunting experience, but with the right legal representation, you can navigate the process with confidence. Understanding the procedures, common issues, and having an attorney by your side can make a significant difference in the outcome of your case.</p>


<p>If you are facing allegations or disciplinary actions affecting your professional license in Georgia, contact our firm today to safeguard your career and future. Our experienced attorneys are here to help you defend your professional license. <a href="/contact-us/">Schedule a consultation</a> with us to discuss your case and explore your legal options.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[How is White Collar Crime Generally Prosecuted?]]></title>
                <link>https://www.conawayandstrickler.com/blog/how-is-white-collar-crime-generally-prosecuted/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/how-is-white-collar-crime-generally-prosecuted/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Mon, 10 Jul 2023 17:17:13 GMT</pubDate>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Federal Offenses]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[money laundering]]></category>
                
                    <category><![CDATA[SEC]]></category>
                
                    <category><![CDATA[Theft Crimes]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                    <category><![CDATA[White Collar Offenses]]></category>
                
                
                    <category><![CDATA[best federal criminal lawyer]]></category>
                
                    <category><![CDATA[embezzlement]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[fraud lawyer]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                    <category><![CDATA[white collar lawyer]]></category>
                
                
                
                    <media:thumbnail url="https://conawayandstrickler-com.justia.site/wp-content/uploads/sites/908/2023/07/IMG_4620-scaled-1.jpeg" />
                
                <description><![CDATA[<p>The Department of Justice investigates and prosecutes cases where large amounts of money is alleged to have been taken. Examples of white collar crimes are money laundering, bank, wire and mail fraud, tax evasion, insider trading, insurance fraud, mortgage fraud, bribery and embezzlement. Of course Homeland Security, the FBI, the IRS, Customs and Border Patrol&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>The Department of Justice investigates and prosecutes cases where large amounts of money is alleged to have been taken. Examples of white collar crimes are money laundering, bank, wire and mail fraud, tax evasion, insider trading, insurance fraud, mortgage fraud, bribery and embezzlement.  Of course Homeland Security, the FBI, the IRS, Customs and Border Patrol and SEC can also investigate and prosecute cases of fraud as well.  </p>



<p>The government has a special United States Guideline Chapter dedicated to <a href="https://guidelines.ussc.gov/gl/§2B1.1" rel="noopener noreferrer" target="_blank">“basic” economic offenses</a>.  For purposes of this blog, this chapter will be discussed in more detail below.  As with anything involving federal criminal litigation, nothing is crystal clear in the law. Therefore, there is also a chapter in the United States Guidelines dedicated to tax offenses, election fraud, gambling, and money laundering in the United States Sentencing Guidelines.  </p>



<p>This USSG chapter DOES cover extortion, bribery, kickbacks, counterfeiting, embezzlement, health care fraud, computer fraud, insurance fraud, securities fraud, mortgage fraud, identity fraud, bankruptcy fraud, etc.   What is most important in this chapter is the loss amount.   All charges start off with a base offense level of  6 or 7 depending on the statutory max of the offense charged. Then, you look at what the “loss amount” is using the below table.
</p>



<figure class="wp-block-table is-style-regular"><table class="has-light-background-color has-background has-fixed-layout"><thead><tr><th>Loss (apply the greatest)</th><th>Increase in Level</th></tr></thead><tbody><tr><td>(A) $6,500 or less</td><td>no increase</td></tr><tr><td>(B) More than $6,500</td><td>add 2</td></tr><tr><td>(C) More than $15,000</td><td>add 4</td></tr><tr><td>(D) More than $40,000</td><td>add 6</td></tr><tr><td>(E) More than $95,000</td><td>add 8</td></tr><tr><td>(F) More than $150,000</td><td>add 10</td></tr><tr><td>(G) More than $250,000</td><td>add 12</td></tr><tr><td>(H) More than $550,000</td><td>add 14</td></tr><tr><td>(I) More than $1,500,000</td><td>add 16</td></tr><tr><td>(J) More than $3,500,000</td><td>add 18</td></tr><tr><td>(K) More than $9,500,000</td><td>add 20</td></tr><tr><td>(L) More than $25,000,000</td><td>add 22</td></tr><tr><td>(M) More than $65,000,000</td><td>add 24</td></tr><tr><td>(N) More than $150,000,000</td><td>add 26</td></tr><tr><td>(O) More than $250,000,000</td><td>add 28</td></tr><tr><td>(P) More than $550,000,000</td><td>add 30.</td></tr></tbody></table></figure>



<p>
The loss amount is a pandora box of confusion and the government is able to add all kinds of <a href="https://www.ussc.gov/sites/default/files/pdf/training/primers/2018_Primer_Relevant_Conduct.pdf" rel="noopener noreferrer" target="_blank">relevant conduct</a> and <a href="https://www.ussc.gov/sites/default/files/pdf/training/primers/2022_Primer_Loss.pdf" rel="noopener noreferrer" target="_blank">intended loss</a> conduct to inflate these numbers.</p>



<p>To further make things complicated, there are enhancements in this section that permit the government to add levels for things such as the use of sophisticated means, role in the offense, number of victims, a defrauding a charity, mass marketing, among others.</p>



<p>Navigating the federal criminal system is a task that should not be endured alone. <a href="/contact-us/">Contact</a> our team today for more information about we can protect your rights and your freedom.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Basics of Tax Evasion]]></title>
                <link>https://www.conawayandstrickler.com/blog/basics-of-tax-evasion/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/basics-of-tax-evasion/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Fri, 03 Mar 2023 06:51:08 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[tax evasion]]></category>
                
                    <category><![CDATA[Tax Fraud]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[#moneylaundering]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal defense]]></category>
                
                    <category><![CDATA[IRS CID agent]]></category>
                
                    <category><![CDATA[tax evasion]]></category>
                
                    <category><![CDATA[tax fraud]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>By Maya Fouad Tax evasion is the most common federal tax crime and involves the failure to report taxes, reporting taxes inaccurately, or failing to pay taxes. Federal law defines the crime broadly; 26 U.S.C. 7201 states, “[a]ny person who willfully attempts in any manner to evade or defeat any tax imposed by this title&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>By Maya Fouad</p>


<p>Tax evasion is the most common federal tax crime and involves the failure to report taxes, reporting taxes inaccurately, or failing to pay taxes. Federal law defines the crime broadly; 26 U.S.C. 7201 states, “[a]ny person who willfully attempts in any manner to evade or defeat any tax imposed by this title or the payment thereof shall, in addition to other penalties provided by law, be guilty of a felony. . .” The penalties for tax evasion can include significant monetary fines, imprisonment, or both.</p>


<p>To establish a case of tax evasion, the Government must prove three elements beyond a reasonable doubt:</p>


<p>1. The Defendant attempted to evade or defeat a tax or payment of a tax;</p>


<p>2. An additional tax was due and owing; and</p>


<p>3. The Defendant acted willfully.</p>


<p>The Government is generally required to prove that the taxpayer owed substantially more tax than was reported; however, the Government does not necessarily need to prove the exact amount of tax evaded. In most tax evasion cases, this comes in the form of understatements or omissions of income, claims of fictitious or improper deductions, false allocations of income, or improper claims of credit or exemption.</p>


<p>The Government can offer direct or circumstantial evidence to prove the required elements. This may include evidence of specific transactions affecting taxable income which were inaccurately reported, unexplained increases in the taxpayer’s net worth or expenditures not reflected in the taxpayer’s net worth, or evidence of taxable receipts in a taxpayer’s bank deposits.</p>


<p>Finally, the language of the statute gives the crime of tax evasion a broad scope. Specifically, the crime of tax evasion applies to “[a]ny person” – not just individual taxpayers. Tax evasion under 26 U.S.C. 7201 can also be used to prosecute an individual taxpayer’s tax preparer, accountant, or bookkeeper, a corporate officer attempting to evade their corporation’s tax, or the administrator of an estate attempting to evade the estate’s tax. Further, the statute applies to “any tax” and tax evasion in “any manner” (emphasis added).</p>


<p>Recent tax evasion cases include the federal criminal jury trial of reality TV stars <a href="https://www.justice.gov/usao-ndga/pr/reality-tv-stars-convicted-fraud-and-tax-evasion" rel="noopener noreferrer" target="_blank">Todd and Julie Chrisley</a>.  They were convicted of tax evasion and other charges.  The DOJ alleged the Chrisleys knew the law was clear on taxable income and were required to file and pay taxes.   The IRS CID agent on the case was quoted as saying, “These convictions should send a clear message regardless of your fame or notoriety, everyone will be held accountable for paying their fair share of taxes.”  As a result of their case, they unfortunately are now in <a href="https://nbcpalmsprings.com/2023/01/17/todd-and-julie-chrisley-report-to-federal-prisons-to-begin-sentences/" rel="noopener noreferrer" target="_blank">prison</a>.</p>


<p>For more information on criminal tax charges, please <a href="/contact-us/">contact us</a>.  We are more than happy to discuss your situation.</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Drug Trafficking and the Safety Valve Exception]]></title>
                <link>https://www.conawayandstrickler.com/blog/drug-trafficking-and-the-safety-valve-exception/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/drug-trafficking-and-the-safety-valve-exception/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Fri, 14 Oct 2022 16:23:46 GMT</pubDate>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Drug Charges]]></category>
                
                    <category><![CDATA[Drug Crimes]]></category>
                
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal drug crimes]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                <description><![CDATA[<p>The “Safety Valve” exception is a statutory exception to mandatory minimum sentencing laws. A safety valve allows a judge to sentence a person below the mandatory minimum term if certain conditions are met. The “Safety Valve” provision is a provision of law codified in 18 United States Code §3553(f). It specifically allows a judge to&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>The “Safety Valve” exception is a statutory exception to mandatory minimum sentencing laws. A safety valve allows a judge to sentence a person below the mandatory minimum term if certain conditions are met.  The “Safety Valve” provision is a provision of law codified in 18 United States Code §3553(f).  It specifically allows a judge to sentence below the minimum mandatory required by law.  However, you must be eligible.  There is also a two level reduction in the sentencing guidelines under United States Sentencing Guidelines §2D1.1(b)(17).
The requirements set out in 18 U.S.C. §3553(f) are:
</p>


<ul class="wp-block-list">
<li><em>You do not have more than 1 criminal history point. </em></li>
<li><em>You did not use violence or credible threats of violence or possess a firearm or other dangerous weapon (or induce another participant)</em></li>
<li><em>The offense did not result in death or serious bodily injury to any person</em></li>
<li><em>You were not an organizer, leader, manager or supervisor of others in the offense and not engaged in a continuing criminal enterprise</em></li>
<li><em>You truthfully provided the government all information related to the offense.  </em></li>
</ul>


<p>

It is necessary for an  experienced federal criminal defense attorney to ascertain what constitutes a “criminal history point” for purposes of qualifying for the “Safety Valve” provision.  In addition, “truthfully providing” information to the government is another dicey area that needs an attorney present.

Conaway & Strickler, PC has handled many cases involving this provision.  Please feel free to <a href="/contact-us/">contact</a> us any time to discuss.
</p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[The Department of Justice in the Northern District of Georgia Federal Court will add a New Pretrial Diversion Court]]></title>
                <link>https://www.conawayandstrickler.com/blog/715-2/</link>
                <guid isPermaLink="true">https://www.conawayandstrickler.com/blog/715-2/</guid>
                <dc:creator><![CDATA[Conaway & Strickler, P.C.]]></dc:creator>
                <pubDate>Mon, 09 May 2022 15:20:03 GMT</pubDate>
                
                    <category><![CDATA[Federal Crimes]]></category>
                
                    <category><![CDATA[Federal Offenses]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                    <category><![CDATA[White Collar Offenses]]></category>
                
                
                    <category><![CDATA[#ATLCOURT]]></category>
                
                    <category><![CDATA[Criminal Lawyer]]></category>
                
                    <category><![CDATA[Diversion]]></category>
                
                    <category><![CDATA[doj]]></category>
                
                    <category><![CDATA[federal criminal attorney]]></category>
                
                    <category><![CDATA[federal criminal investigation]]></category>
                
                    <category><![CDATA[Federal Criminal Lawyer]]></category>
                
                    <category><![CDATA[pretrial diversion]]></category>
                
                    <category><![CDATA[top federal criminal attorney]]></category>
                
                
                
                    <media:thumbnail url="https://conawayandstrickler-com.justia.site/wp-content/uploads/sites/908/2022/05/images.jpeg" />
                
                <description><![CDATA[<p>On April 11, 2022, the Northern District of Georgia in Atlanta announced the creation of a new pretrial diversion court, the Accountability, Treatment, and Leadership Court “ATL Court“. It is formed with the Northern District of Georgia, the U.S. Probation Office, the U.S. Attorney’s Office, and the Federal Defender Program, and will be run by&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>On April 11, 2022, the Northern District of Georgia in Atlanta <a href="http://www.gand.uscourts.gov/news/united-states-district-court-northern-district-georgia-announces-new-diversion-court" rel="noopener noreferrer" target="_blank">announced</a> the creation of a new pretrial diversion court, the Accountability, Treatment, and Leadership Court “<strong>ATL Court</strong>“. It is formed with the Northern District of Georgia, the U.S. Probation Office, the U.S. Attorney’s Office, and the Federal Defender Program, and  will be run by folks from each of these agencies who will be known as the <strong>ATL Court Team</strong>.  Please note: The ATL Court is in addition to, and not a replacement of, the Northern District of Georgia’s existing Pretrial Diversion Program.</p>


<p>“THE ATL COURT MISSION:  Our mission is to provide the opportunity to avoid some of the consequences of aberrant criminal conduct to certain individuals charged with non-violent crimes in the Northern District of Georgia who would most greatly benefit from intense supervision, education, or treatment.”</p>


<p><strong>HOW ATL COURT WORKS</strong></p>


<p>Procedurally, a <a href="http://www.gand.uscourts.gov/sites/default/files/NDGA_LF047.pdf" rel="noopener noreferrer" target="_blank">request to apply </a>must be granted by the ATL Court Team before a full application can even be submitted. Then, like other criminal cases pending in the federal criminal courts, a guilty plea will be entered by a formal plea agreement.  In this agreement, participants will agree to do certain “chores” such as counseling, educational courses, completion of GED, etc.  The “chores” are individualized for each defendant entering in to the program, but most will require counseling at the minimum.  Once these “chores” are completed, the participants will receive what was delineated in the formal plea agreement: a sentence on the original charge with NO prison time, a reduction of their charge to a misdemeanor, or a complete dismissal of the case.  Again, the resolution and specific chores are individualized for each participant depended on circumstances.</p>


<p>ATL Court is meant for the less serious of charges, and those without prior serious criminal convictions.  It can only be implemented for people who were formally charged in 2022 or later.  Therefore, not everyone will be eligible for the program.</p>


<p><a href="/">Conaway & Strickler, PC</a> is very knowledgable on how to navigate this new program.  Please <a href="/contact-us/">contact us</a> to find out more information and see if we can help you.</p>


]]></content:encoded>
            </item>
        
    </channel>
</rss>