Articles Tagged with federal criminal attorney

When you’re approached or arrested by law enforcement, it’s natural to feel scared, overwhelmed, or tempted to explain your side. But one of the most powerful tools you have is silence. Under the 5th Amendment of the U.S. Constitution, you have the right to remain silent and avoid self-incrimination. This right is reinforced by your Miranda Rights, which police are required to read to you during a custodial interrogation. If you’ve heard the phrase, “You have the right to remain silent. Anything you say can and will be used against you in a court of law,” that’s your cue to stop talking and protect yourself.

Many people unknowingly waive their rights by speaking too soon or too freely. Even innocent statements can be twisted or taken out of context. That’s why one of the smartest things you can do is to invoke your right to remain silent and request legal counsel. Simply say, “I am invoking my right to remain silent. I would like to speak to an attorney.” Then stay quiet. You are not being difficult—you are being smart.

At Conaway & Strickler, we understand that early legal representation is crucial. Our experienced defense attorneys are here to protect your rights, guide you through the legal process, and fight for the best outcome possible. If you or a loved one is facing an investigation or has been arrested, don’t speak to the police first—speak to us. Contact Conaway & Strickler today for a free confidential consultation.

Fraud is a concept that has been in the criminal justice system forever.  Google defines it as an intentional deception used to gain an unfair advantage or benefit, often involving financial gains.  How does the Department of Justice prosecute fraud?  Below is a non exhaustive list of charges that the DOJ can bring.

  • Wire fraud
  • Mail fraud

The federal government may target organizations and businesses as well as individuals for violations of federal criminal statutes.  For example, in the health care realm, cases can include office managers, practitioners from doctors, nurses to pharmacists to all other aspects of the medical industry.  Recent federal investigations have targeted pill mills, medicaid fraud, and accepting kickbacks among others.

Experienced federal criminal defense attorneys like those at Conaway & Strickler, PC may suggest early on about the possibility of entering into a “deferred prosecution agreement” which is essentially a contract with the Department of Justice. DPAs are frequently used in cases involving corporate fraud, bribery, and antitrust violations.  These pretrial agreements may involve an admission of wrongdoing, the payment of fines, and the implementation of compliance measures.  Charges may be dropped if the defendant complies with the requirements of the agreement.  Generally, the Assistant United States Attorney will file the criminal complaint and the DPA with the court, so it is of public record. This will be accompanied by a formal request to the court that any prosecution be delayed according to the terms of the DPA, allowing the defendant to fulfill its agreed-upon actions.  This is very similar to conditional discharge / pre trial diversion agreements found at the state level.

An example of a DPA would be one that was entered in to by the DOJ and Teva Pharmaceuticals USA, Inc in August 2023 in response to the company’s involvement in a price fixing conspiracy involving several pharmaceuticals.   As seen in this example, terms can include paying a fine, waiving certain rights, agreeing to a factual basis for the charges, and an agreement to cooperate and compliance monitoring and of course, agreeing to what will happen if there is a breach of the agreement.

A federal criminal trial consists of several different stages.   The below will analyze a ONE defendant trial.  But, more often than not, trials can consist of multiple defendants at trial.  This just augments the time needed for each stage.
Jury Selection also known as Voir Dire
Jury selection is one of the most important parts of a federal criminal trial.  It will start with about 40 potential jurors brought in. Usually we move our chairs to the other side of the table to face them. We ask general questions, then individual questions. Then, we deliberate on who to choose. Then, the court asks us to do our strikes, and then a jury is empaneled.

This month, the Supreme Court heard oral arguments in Kousisis v. United States, a case that could have significant implications on the future of federal white-collar prosecutions. Specifically, the Court is considering the boundaries of federal fraud statutes in scenarios where deceptive practices are employed without causing direct financial harm to the victim.

Kousisis comes before the Court after a Philadelphia-area government contractor was found guilty of fraud after it failed to comply with a contract provision intended to promote diversity. Stamatios Kousisis and Alpha Painting and Construction Co., Inc. (Alpha) secured two substantial contracts with the Pennsylvania Department of Transportation (PennDOT). These contracts mandated a certain percentage of work to be allocated to Disadvantaged Business Enterprises (DBEs). Kousisis and his company misrepresented their compliance with this requirement by using a DBE as a mere pass-through entity, thereby falsely claiming adherence to the DBE participation goals. Despite this deception, the contracted work was completed to PennDOT’s satisfaction, and no direct financial loss was incurred by the department.

Federal prosecutors charged Kousisis and Alpha with wire fraud, conspiracy to commit wire fraud, and making false statements. The prosecution’s argument was based on the “fraudulent inducement” theory, suggesting that the defendants obtained the contracts through deceptive promises, even though PennDOT did not suffer a financial loss. Ultimately, Kousisis was sentenced to 70 months’ imprisonment for the multi-million dollar fraud he perpetrated following a jury trial in 2018.

Recently, Robert Purbeck of Idaho, also known as “Lifelock,” and “Studmaster,”  was sentenced to ten years after pleading guilty to federal charges of computer fraud and abuse.  He hacked into the computer servers of the City of Newnan, Georgia  and a Griffin, Georgia medical clinic, and then targeted at least 17 other victims across the United States – in the process stealing personal information of more than 132,000 individuals.  He also attempted to extort a Florida orthodontist for payment in Bitcoin, threatening to disclose stolen patient records and other personal information.

“Cyber extortion is unfortunately a rapidly growing threat and highlights the ever-growing need for corporations to remain vigilant in cybersecurity efforts,” said Sean Burke, Acting Special Agent in Charge of FBI Atlanta. “This sentencing is just one example of the FBI working together to hold criminals that hide behind their computers accountable, regardless of their location.”

According to information presented in court, in June 2017, Purbeck purchased access to the computer server of a Griffin medical clinic on a darknet marketplace. He then used the stolen credentials to illegally access the computers of the medical clinic and removed records that contained the sensitive personal information of more than 43,000 individuals, including names, addresses, birth dates, and social security numbers.

As we explained in our prior post about federal child pornography laws, the consequences of a child pornography or CSAM (“Child Sexual Abuse Material”) conviction are severe and life-altering. And the collateral consequence of being on the sex offender registry can be devastating.

Early on, Conaway & Strickler defended cases that stemmed from activity on classic peer-to-peer applications like Limewire.  These type of networks were simply software applications that provided a central hub for various computers to connect.  Napster, for example, was a peer-to-peer (P2P) file-sharing service that allowed users to share and download music files from other users’ computers.  These types of programs were utilized to distribute music, movies and child pornography.  Law enforcement was able to track those cases more easily.

Today, however, the government has also become well versed in programs like BitTorrent, Limewire and e-Donkey, among others.  When a hard drive or device is analyzed by the government, they now will produce a report detailing their forensic examination.  They will detail all of the evidence found on the device showing evidence of P2P Networking, search history, bookmarks  and they even cite images or image fragments found in cache locations.  Here is a recent example of a federal criminal prosecution of someone who downloaded images from the BitTorrent Network.

In recent years, unruly behavior on flights has become a growing concern, prompting the Federal Aviation Administration (FAA) to escalate its enforcement efforts. Since 2021, the FAA has referred over 310 cases of severe incidents to the FBI for criminal prosecution. These cases involve dangerous acts like physical assaults, attempts to breach the cockpit, and sexual misconduct, all of which have serious legal consequences.

The FAA’s zero-tolerance policy, implemented in 2021, marked a shift from warnings to immediate enforcement. With incidents like physical assaults on passengers and crew members, the FAA has consistently referred the most egregious cases to the FBI. The FAA can impose civil penalties up to $37,000 per violation, but when these cases are referred for criminal prosecution, offenders face much harsher outcomes.

In 2023, over 1,240 incidents of unruly passenger behavior were reported. Of those, 43 cases were referred to the FBI for criminal prosecution due to their severity. These cases often involve physical altercations or inappropriate behavior that pose a threat to the safety of everyone on board. The FAA’s clear stance on holding individuals accountable shows that passengers who engage in such behavior will face serious repercussions.You can read more about the FAA’s referral process and efforts in their official statement and in further detail from FAA’s unruly passenger policy page.

Cell phones are everywhere today and thus play a significant role in criminal investigations.

What reports are generated from my devices? 

Cellebrite reports provide information about phone calls and text messages; but now it also provides a report on the data stored on these devices such as voicemails, images, and browsing history.  From GPS location data to social media activity, cell phones can provide a treasure trove for law enforcement agencies to use to build their cases.

In the world of banking and finance, the term “Suspicious Activity Report” (SAR) may sound intimidating—especially if you’ve been notified that a bank has filed one concerning your transactions. For individuals and businesses alike, it’s essential to understand what a SAR is, what activities can trigger these reports, and the potential legal consequences that may follow.

What is a Suspicious Activity Report (SAR)?

A Suspicious Activity Report (SAR) is a document that financial institutions are legally required to file with the Financial Crimes Enforcement Network (FinCEN) when they detect potentially suspicious behavior involving financial transactions. Once filed, these reports are sent to FinCEN, a division of the U.S. Department of the Treasury, which shares the information with law enforcement agencies for further investigation if necessary.

Contact Information