<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:georss="http://www.georss.org/georss"
     xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
     xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[Internet Crimes - Stahl Gasiorowski Criminal Defense Lawyers P.C.]]></title>
        <atom:link href="https://www.stahlesq.com/blog/categories/internet-crimes/feed/" rel="self" type="application/rss+xml" />
        <link>https://www.stahlesq.com/blog/categories/internet-crimes/</link>
        <description><![CDATA[Stahl Gasiorowski Criminal Defense Lawyers P.C.'s Website]]></description>
        <lastBuildDate>Fri, 20 Feb 2026 15:37:24 GMT</lastBuildDate>
        
        <language>en-us</language>
        
            <item>
                <title><![CDATA[The Tremendous Costs of Seized Electronic Discovery]]></title>
                <link>https://www.stahlesq.com/blog/seized-electronic-discovery/</link>
                <guid isPermaLink="true">https://www.stahlesq.com/blog/seized-electronic-discovery/</guid>
                <dc:creator><![CDATA[Stahl Gasiorowski Criminal Defense Lawyers P.C. Team]]></dc:creator>
                <pubDate>Fri, 25 Apr 2025 18:58:22 GMT</pubDate>
                
                    <category><![CDATA[Criminal Charges]]></category>
                
                    <category><![CDATA[Criminal Discovery]]></category>
                
                    <category><![CDATA[Criminal Investigation]]></category>
                
                    <category><![CDATA[Criminal Trial]]></category>
                
                    <category><![CDATA[Discovery]]></category>
                
                    <category><![CDATA[Federal Computer Fraud and Abuse]]></category>
                
                    <category><![CDATA[Federal Courts]]></category>
                
                    <category><![CDATA[Federal Plea & Sentencing Mitigation]]></category>
                
                    <category><![CDATA[Fraud Charges]]></category>
                
                    <category><![CDATA[Indictment]]></category>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                    <category><![CDATA[Plea Bargaining]]></category>
                
                
                
                
                <description><![CDATA[<p>Federal agents and AUSAs serve subpoenas that demand the production of huge amounts of documents and data. They seek search warrants that authorize the seizure of every electronic device at the location to be searched – computers, servers, external hard drives and cell phones. They seize tens of thousands of emails, texts and other forms&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="576" src="/static/2025/09/45_seized-electronic-discovery-1024x576.jpg" alt="The Tremendous Costs of Seized Electronic Discovery" class="wp-image-1441" srcset="/static/2025/09/45_seized-electronic-discovery-1024x576.jpg 1024w, /static/2025/09/45_seized-electronic-discovery-300x169.jpg 300w, /static/2025/09/45_seized-electronic-discovery-768x432.jpg 768w, /static/2025/09/45_seized-electronic-discovery.jpg 1200w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<p><a href="/blog/what-to-do-when-agents-come-knocking/">Federal agents and AUSAs</a> serve subpoenas that demand the production of huge amounts of documents and data. They seek <a href="/blog/search-warrant-explained/">search warrants</a> that authorize the seizure of every electronic device at the location to be searched – computers, servers, external hard drives and cell phones. They seize tens of thousands of emails, texts and other forms of communication from businesses and individuals. This common investigative tactic results in an exponential growth in seized data to be reviewed and turned over in discovery to the defense.</p>



<p>A few years ago, after several high profile cases exposed the Department of Justice’s failures in processing and timely disclosing seized data to the defense, the <a href="/blog/seized-electronic-data/">DOJ told U.S. Attorney’s Offices around the country to collect less evidence</a>. In late 2022, a training program was implemented to teach more than 6000 federal prosecutors to be more selective in the evidence sought and seized. This was the so called “smart collection” approach.</p>



<p>This approach was developed because DOJ struggled to fund and find the software and personnel needed to store and analyze the volume of electronic evidence seized. In fiscal year 2023, DOJ requested $27 million for U.S. Attorneys’ offices “e-Litigation modernization”, including 52 new positions and technology upgrades. This was in addition to DOJ’s $1.5 billion e-discovery vendor services contract awarded in 2020 and set to expire in 2027.</p>



<p>Putting aside the government’s issues and budget, seizures of terabytes of data require an enormous expenditure of time and resources for the defense. Effective review of the data requires hosting a search platform that can search millions of pages for key words, names and dates in an expedient fashion. Outside vendor platforms can cost thousands of dollars a month just for the platform. Add to that the time spent by paralegals and associates conducting the actual searches and initial review of the documents, and then the further review by the attorney handling the case. One can quickly see that only well-funded clients, or ones with some type of insurance or corporate backing, can afford zealous representation.</p>



<p>The costs for the review of massive amounts of documents and other data, coupled with potentially much lengthier prison sentences post-trial rather than a negotiated plea, account for the 95-97% rate of <a href="/blog/federal-plea-bargaining/">pleas in the federal system</a>. Few individuals can afford the <a href="/blog/the-financial-realities-of-the-criminal-justice-system/">costs of a trial – legal and discovery</a> fees, expert witness fees and the so-called “trial penalty” (harsher sentences after a loss at trial).</p>



<p>DOJ must do better at seizing and turning over data that falls within the confines of the items authorized to be seized in the warrant, and limiting the scope of the documents sought in <a href="/criminal-law/grand-jury-investigations/">grand jury subpoenas</a>. Courts must enforce discovery obligations on the government and compel the government to produce the discovery in a timely and organized fashion that permits defendants to be properly and zealously represented, including those defendants that cannot afford costly search platforms.</p>



<p><a href="/lawyers/">Stahl Gasiorowski Criminal Defense Lawyers</a> have successfully represented hundreds of individuals under <a href="/why-stahl-criminal-defense-lawyers/recent-criminal-defense-cases/">complex federal and state investigations</a> with terabytes of discovery. To contact the firm’s NJ office, call <a href="tel:9083019001"><strong>908.301.9001</strong></a> and to contact the firm’s NYC office, call <a href="tel:2127553300"><strong>212.755.3300</strong></a>, or email Mr. Stahl at <a href="mailto:rgs@stahlegasiorowski.com"><strong>rgs@stahlegasiorowski.com</strong></a> Ms. Gasiorowski at <strong>lkg@stahlegasiorowski.com</strong>.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Special Fraud Alert – Telemedicine]]></title>
                <link>https://www.stahlesq.com/blog/telemedicine-fraud-alert/</link>
                <guid isPermaLink="true">https://www.stahlesq.com/blog/telemedicine-fraud-alert/</guid>
                <dc:creator><![CDATA[Stahl Gasiorowski Criminal Defense Lawyers P.C. Team]]></dc:creator>
                <pubDate>Mon, 01 Aug 2022 14:18:25 GMT</pubDate>
                
                    <category><![CDATA[Business Fraud]]></category>
                
                    <category><![CDATA[Convictions]]></category>
                
                    <category><![CDATA[COVID]]></category>
                
                    <category><![CDATA[Criminal Investigation]]></category>
                
                    <category><![CDATA[Discovery]]></category>
                
                    <category><![CDATA[Federal Courts]]></category>
                
                    <category><![CDATA[Fraud Charges]]></category>
                
                    <category><![CDATA[healthcare]]></category>
                
                    <category><![CDATA[Healthcare Fraud]]></category>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                    <category><![CDATA[Medicare and Medicaid Fraud]]></category>
                
                    <category><![CDATA[Pandemic]]></category>
                
                    <category><![CDATA[White Collar Criminal Defense]]></category>
                
                    <category><![CDATA[White-Collar Crime Penalties]]></category>
                
                
                
                
                <description><![CDATA[<p>Earlier this month, the U.S. Department of Health and Human Services, Office of Inspector General (HHS, OIG) issued a special fraud alert advising healthcare providers to exercise caution when contracting with telemedicine companies. Such alerts are significant as they put providers on notice that OIG intends to investigate and prosecute potential fraud regarding telemedicine/. Such&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="411" src="/static/2025/09/bf_telemedicine-fraud.jpg" alt="Telemedicine" class="wp-image-1544" srcset="/static/2025/09/bf_telemedicine-fraud.jpg 900w, /static/2025/09/bf_telemedicine-fraud-300x137.jpg 300w, /static/2025/09/bf_telemedicine-fraud-768x351.jpg 768w" sizes="auto, (max-width: 900px) 100vw, 900px" /></figure>
</div>


<p>Earlier this month, the U.S. Department of Health and Human Services, Office of Inspector General (HHS, OIG) issued a <a href="https://oig.hhs.gov/documents/root/1045/sfa-telefraud.pdf" rel="noopener noreferrer" target="_blank">special fraud alert</a> advising healthcare providers to exercise caution when contracting with telemedicine companies. Such alerts are significant as they put providers on notice that OIG intends to investigate and prosecute potential <a href="/blog/telehealth-fraud/">fraud regarding telemedicine/</a>. Such notices provide the opportunity for healthcare providers to review their practices and compliance, as well as list examples of suspect practices in the industry.</p>



<p>Historically, federal regulations limited the use and scope of telemedicine. It became widely available, however, during the COVID crisis that necessitated the loosening of government regulations. While a relaxation of regulations and restrictions offered patients greater access to physicians, it also opened the door to fraudulent conduct. In previous articles, we explored schemes involving <a href="/blog/compounded-drugs/">compound medicines</a>, <a href="/why-stahl-criminal-defense-lawyers/recent-criminal-defense-cases/">genetic cancer screening (CGx and PGx tests)</a> and <a href="/blog/doj-covid19-healthcare-fraud-prosecutions/">durable medical equipment (DME)</a> such as orthotic braces.</p>



<p>This latest fraud alert confirms that OIG is still aggressively targeting DME companies, laboratories and pharmacies using telehealth services. The OIG alert offers a non-comprehensive list of factors that they examine in potential fraud cases, including:</p>



<ol class="wp-block-list">
<li>Patients that are referred to a practitioner through a telemedicine company, telemarketing, recruiter, call center, health fair or internet;</li>



<li>Practitioner has only limited access or contact with the alleged patient to meaningfully access the medical necessity of the services solicited;</li>



<li>Telemedicine company compensates the practitioner based on the volume of prescriptions and services;</li>



<li>Telemedicine company only provides services to federal health care program beneficiaries, and does not accept private insurance;</li>



<li>Telemedicine company only provides a single class of products such as braces, genetic testing, compound medicines – pain, scar and vitamin creams – thus limiting a practitioner’s treatment options; and</li>



<li>Telemedicine company does not expect its physicians to follow up with the patients regarding their prescriptions or services.</li>
</ol>



<p>This alert expressly notes that proactive marketing that advertises free or low cost items or services covered by federal healthcare programs and exclusively marketed to such beneficiaries is “suspect”. Additionally, any program that limits a practitioner from contacting a patient to follow up or offer other medical services is suspect.</p>



<p>While HHS, OIG alerts provide valuable guidance for practitioners and other healthcare professionals, they also provide federal prosecutors the opportunity to argue that a provider’s good faith defense is limited after such an alert has been issued, i.e. that providers are on notice that such practices as suspect.</p>



<p><strong><a href="/lawyers/">Stahl Gasiorowski Criminal Defense Attorneys</a></strong> have <a href="/why-stahl-criminal-defense-lawyers/recent-criminal-defense-cases/#healthcare-fraud-cases">represented dozens of physicians, marketers, telehealth companies and pharmacists in federal healthcare fraud investigations</a>. We proactively and aggressively protect our clients’ rights. To contact Mr. Stahl, call <strong><a href="tel:9083019001">908.301.9001</a></strong> for the NJ office and <strong><a href="tel:2127553300">212.755.3300</a></strong> for the NYC office, or email Mr. Stahl at <strong><a href="mailto:rgs@sgdefenselaw.com">rgs@sgdefenselaw.com</a>.</strong></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[The Importance of Experts in Criminal Cases]]></title>
                <link>https://www.stahlesq.com/blog/criminal-defense-experts-2/</link>
                <guid isPermaLink="true">https://www.stahlesq.com/blog/criminal-defense-experts-2/</guid>
                <dc:creator><![CDATA[Stahl Gasiorowski Criminal Defense Lawyers P.C. Team]]></dc:creator>
                <pubDate>Wed, 15 Jun 2022 13:18:48 GMT</pubDate>
                
                    <category><![CDATA[Business Fraud]]></category>
                
                    <category><![CDATA[Criminal Investigation]]></category>
                
                    <category><![CDATA[Discovery]]></category>
                
                    <category><![CDATA[Felony]]></category>
                
                    <category><![CDATA[Fraud Charges]]></category>
                
                    <category><![CDATA[Healthcare Fraud]]></category>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                    <category><![CDATA[White Collar Criminal Defense]]></category>
                
                
                
                
                <description><![CDATA[<p>In many types of criminal cases, the right expert can be invaluable. Whether it is a forensic accountant in a complex fraud or tax investigation; a medical or billing expert in a healthcare fraud investigation; a forensic psychiatrist for a sex abuse or child pornography case; a computer expert for a computer crimes matter or&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="720" height="445" src="/static/2025/09/25_criminal-defense-experts.jpg" alt="Experts in Criminal Cases" class="wp-image-1414" srcset="/static/2025/09/25_criminal-defense-experts.jpg 720w, /static/2025/09/25_criminal-defense-experts-300x185.jpg 300w" sizes="auto, (max-width: 720px) 100vw, 720px" /></figure>
</div>


<p>In many types of <a href="/why-stahl-criminal-defense-lawyers/recent-criminal-defense-cases/">criminal cases</a>, the right expert can be invaluable. Whether it is a forensic accountant in a complex <a href="/criminal-law/white-collar-crime/">fraud</a> or <a href="/criminal-law/white-collar-crime/tax-fraud/">tax investigation</a>; a medical or billing expert in a <a href="/criminal-law/white-collar-crime/health-care-fraud/">healthcare fraud investigation</a>; a forensic psychiatrist for a sex abuse or child pornography case; a computer expert for a <a href="/criminal-law/white-collar-crime/internet-crimes/">computer crimes matter</a> or to download and organize a searchable database for millions of documents in discovery; or a drug or gang expert in a <a href="/criminal-law/drug-crimes-trafficking/">serious drug case</a>, the proper expert retained early in the investigation can assist the client’s criminal defense attorney in their efforts to prevent the charges from being filed, or to assist in developing a defense to aid in plea negotiations or to prevail at trial.</p>



<p>Often the government employs or hires its own experts to analyze a wide variety of data, information or documents. These government “experts” may be recognized in their fields, or they may be opining on evidence in fields in which they are not truly qualified. It is critical in such cases, that the <a href="/lawyers/">defense attorney</a> have at his disposal the best possible expert in the relevant field of inquiry to conduct their own review and analysis of the evidence and to potentially refute the conclusion of the government expert.</p>



<p>In recent years, there have been notable cases that have demonstrated that government “experts” have either overreached or provided false reports and testimony. For instance, state drug labs around the country have discovered state laboratory technicians that have failed to conduct drug tests on tens of thousands of drug seizures and simply falsified their reports. Other so-called experts have opined on subjects that do not meet generally accepted scientific standards, including hair and fiber analysis, bite marks and lead analysis of bullets. Too often the testimony by these alleged experts have resulted in convictions based on false or unsound results.<br>
 Experts can be used to analyze the evidence and discover the weaknesses or fallacies in the government’s theory of the case. The ability to independently review and analyze varied and complex financial transactions, computer code, thousands of emails and attachments, billing records or scientific results can mean the difference between a conviction and acquittal. In addition, most fraud cases and potential sentences are driven by the loss amount. Experts can provide valuable analysis that reduces the loss amount and the potential sentencing ranges.</p>



<p><a href="/lawyers/">Aggressive, experienced defense attorneys</a> use experts as early in the process as possible. There are certain procedures that must be followed to protect and preserve the attorney-client and work-product privileges. To do so, the law firm retains the expert to work under the firm’s supervision and direction. While the client is responsible for the fees and expenses, the expert communicates with the law firm rather than with the client so that the expert cannot be cross-examined by the government about any statements or information provided by the client.</p>



<p><strong><a href="/">Stahl Gasiorowski Criminal Defense Lawyers</a></strong> have extensive experience using experts in their representation of individuals charged with federal and state felonies. To contact the firm’s NJ office, call <a href="tel:9083019001"><strong>908.301.9001</strong></a> and to contact the firm’s NYC office, call <strong>212.755.3300</strong>, or email Mr. Stahl at <strong><a href="mailto:rstahl@stahlesq.com">rstahl@stahlesq.com</a></strong>.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Cyber Fraud – Romance Scams on the Rise]]></title>
                <link>https://www.stahlesq.com/blog/cyber-fraud-romance-scams/</link>
                <guid isPermaLink="true">https://www.stahlesq.com/blog/cyber-fraud-romance-scams/</guid>
                <dc:creator><![CDATA[Stahl Gasiorowski Criminal Defense Lawyers P.C. Team]]></dc:creator>
                <pubDate>Tue, 07 Jun 2022 22:05:12 GMT</pubDate>
                
                    <category><![CDATA[Convictions]]></category>
                
                    <category><![CDATA[Criminal Charges]]></category>
                
                    <category><![CDATA[Criminal Harrasment]]></category>
                
                    <category><![CDATA[Criminal Investigation]]></category>
                
                    <category><![CDATA[Criminal Trial]]></category>
                
                    <category><![CDATA[Federal Courts]]></category>
                
                    <category><![CDATA[Fraud Charges]]></category>
                
                    <category><![CDATA[Indictment]]></category>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                    <category><![CDATA[NJ Superior Courts]]></category>
                
                    <category><![CDATA[Penalties]]></category>
                
                    <category><![CDATA[Police]]></category>
                
                    <category><![CDATA[White Collar Criminal Defense]]></category>
                
                
                
                
                <description><![CDATA[<p>Cybercrimes – hacking, phishing, ransomware and the like – are well-known to every user of the internet. We are bombarded weekly with emails and texts claiming that we need to update our passwords, personal profile, and the like. Now comes the rise of what has been called “romance scams”. The typical scheme starts with a&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="722" height="480" src="/static/2025/09/75_cyber-fraud-romance-scams.jpg" alt="Romance Scams" class="wp-image-1479" srcset="/static/2025/09/75_cyber-fraud-romance-scams.jpg 722w, /static/2025/09/75_cyber-fraud-romance-scams-300x199.jpg 300w" sizes="auto, (max-width: 722px) 100vw, 722px" /></figure>
</div>


<p><a href="/blog/cybercrimes-serious-criminal-penalties/">Cybercrimes</a> – <a href="/criminal-law/white-collar-crime/internet-crimes/">hacking, phishing, ransomware</a> and the like – are well-known to every user of the internet. We are bombarded weekly with emails and texts claiming that we need to update our passwords, personal profile, and the like. Now comes the rise of what has been called “<em><strong>romance scams</strong></em>”. The typical scheme starts with a fake dating profile on an online dating site. Fake name, picture, background, likes and what the alleged person is looking for in a mate is established. Once selected, the fraudster starts a series of on-line communications that lure the unsuspecting victim in with attention, romance and affection. The fraudster then sets out a story about why s/he needs money – lost their passport and credit cards while on a trip; a co-worker was injured and it was the fault of the scammer; needs money for a sick relative – always with the promise to return the money.</p>



<p>In 2021, it was reported that victims were scammed out of at least $547 million, an 80% increase over 2020. This figure is likely conservative since many victims of romance scams are too embarrassed to report them or the amounts are too small for law enforcement to actively investigate. Not unexpectedly, recently divorced and windowed women are frequent targets of romance scams.</p>



<p>Federal law enforcement has discovered that many of these types of scams are run out of Nigeria by organized groups, a well-known hotbed for cyber fraud and <a href="/blog/what-is-money-laundering/">money laundering schemes</a>. Many others, however, are simply con artists here in the United States looking for easy marks by preying on someone’s kindness, loneliness and vulnerabilities.</p>



<p>While older woman are common targets, the government reported that people between the ages of 18-29 are increasingly targets resulting in a tenfold increase from 2017 to 2021. Netflix documented one such scam in its documentary “The Tinder Swindler”. The film recounted the exploits of Shimon Hayut who held himself out as the son of a famous Russian-Israeli diamond scion. He lavished his victims with first class travel, jewelry and clothing using the proceeds from prior victims. His promotion of his lavish lifestyle on social media – private jets, yachts, expensive watches and clothes – was one way he recruited his victims. Once he lured a woman in, he then fabricated tales of being in danger and needing money for his safety.</p>



<p>These types of schemes are particularly heinous. They not only deprive the victims of often limited resources, they prey on their vulnerabilities, often leaving the victims psychologically scarred and feeling deeply violated. Victims are often too embarrassed to tell family, friend or law enforcement. Some are even left believing that the person who romanced them was genuine and something bad must have happened to him after they lose contact.</p>



<p>Recently, U.S. Attorney’s Offices, FBI and other federal agencies have been aggressively investigating and prosecuting these hideous schemes as often there are multiple victims totaling substantial losses.</p>



<p><a href="/lawyers/">Stahl Gasiorowski Criminal Defense Attorneys</a> actively and aggressively protect clients’ rights. To contact Mr. Stahl, call <a href="tel:9083019001"><strong>908.301.9001</strong></a> for the NJ office and <strong><a href="tel:2127553300">212.755.3300</a></strong> for the NYC office, or email Mr. Stahl at <strong><a href="mailto:rgs@sgdefenselaw.com">rgs@sgdefenselaw.com</a></strong>.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[What to Do When Federal Agents Come Knocking]]></title>
                <link>https://www.stahlesq.com/blog/federal-agents-come-knocking/</link>
                <guid isPermaLink="true">https://www.stahlesq.com/blog/federal-agents-come-knocking/</guid>
                <dc:creator><![CDATA[Stahl Gasiorowski Criminal Defense Lawyers P.C. Team]]></dc:creator>
                <pubDate>Mon, 18 Apr 2022 21:39:41 GMT</pubDate>
                
                    <category><![CDATA[Arrest Warrant]]></category>
                
                    <category><![CDATA[Attorney-Client Privilege]]></category>
                
                    <category><![CDATA[Criminal Charges]]></category>
                
                    <category><![CDATA[Criminal Discovery]]></category>
                
                    <category><![CDATA[Criminal Investigation]]></category>
                
                    <category><![CDATA[Criminal Trial]]></category>
                
                    <category><![CDATA[Due Process]]></category>
                
                    <category><![CDATA[Federal Computer Fraud and Abuse]]></category>
                
                    <category><![CDATA[Federal Courts]]></category>
                
                    <category><![CDATA[Felony]]></category>
                
                    <category><![CDATA[Fraud Charges]]></category>
                
                    <category><![CDATA[Indictment]]></category>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                    <category><![CDATA[Money Laundering]]></category>
                
                    <category><![CDATA[Mortgage Fraud]]></category>
                
                    <category><![CDATA[Penalties]]></category>
                
                    <category><![CDATA[Perjury]]></category>
                
                    <category><![CDATA[Police]]></category>
                
                    <category><![CDATA[Search and Seizure]]></category>
                
                    <category><![CDATA[White Collar Criminal Defense]]></category>
                
                
                
                
                <description><![CDATA[<p>It’s 6 a.m. or 8 p.m., your doorbell rings and two people are standing outside holding up their badges and credentials. They say they are Special Agents with the FBI or IRS and would like to talk with you for just a few minutes about something important. They ask if they could come in to&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="1000" height="668" src="/static/2025/09/4e_federal-agents-come-knocking.jpg" alt="Federal Agents" class="wp-image-1354" srcset="/static/2025/09/4e_federal-agents-come-knocking.jpg 1000w, /static/2025/09/4e_federal-agents-come-knocking-300x200.jpg 300w, /static/2025/09/4e_federal-agents-come-knocking-768x513.jpg 768w" sizes="auto, (max-width: 1000px) 100vw, 1000px" /></figure>
</div>


<p>It’s 6 a.m. or 8 p.m., your doorbell rings and two people are standing outside holding up their badges and credentials. They say they are Special Agents with the FBI or IRS and would like to talk with you for just a few minutes about something important. They ask if they could come in to speak with you privately. Caught off-guard, and not wanting them to think that you have anything to hide, you invite them in (and, of course, you don’t want your neighbors to see them talking to you on your front steps). The agents are “friendly” and just have a few questions to get your input, your side of things, or to serve you with a <a href="/blog/served-grand-jury-subpoena/">grand jury subpoena</a>. You decide to talk to them, only for a few minutes, in the comfort of your own home or office. At the end, they thank you for your time and hand you either a grand jury subpoena or a “<a href="/blog/target-letters-proffer-agreements/">target letter</a>.”</p>



<p>After they leave, you start to wonder – what did I say? How much did I tell them? Am I in trouble, did I implicate myself or others? You start to look for an attorney. You can’t ask your family or friends who they hired last time the FBI or IRS visited them because you don’t know anyone who ever faced such a situation. So, you scour the internet to find an <a href="/">experienced criminal defense attorney</a>, one with a lot of <a href="/lawyers/robert-g-stahl-esq/">federal experience</a> because it’s a <a href="/blog/categories/criminal-investigation/">federal investigation</a>.</p>



<p>The next day you’re in the attorney’s office. After talking to the attorney you realize that what you thought was an innocuous 15 -30 minute chat with the FBI was actually an hour and a half where you told them some things, but not others. You discover that it is a <a href="/blog/lying-federal-agents-serious-criminal-charges/">federal crime to lie to the agents</a>. You learn that it doesn’t matter that they didn’t read you your rights, like in the movies, because you weren’t “in custody.” When you tell the lawyer that you only spoke to them because you didn’t want the agents to think you were involved or guilty, the lawyer tells you that the agents already think that you’re involved, that’s why they were at your house to interview you in the first place. You then learn that there were two agents so that the interview was witnessed by two of them for credibility later on if you dispute what you said. You learn that a “target letter” is issued by an Assistant U.S. Attorney because she believes that you are involved in criminal activity and wants you to come in with your attorney to <a href="/blog/federal-plea-bargaining/">negotiate a plea of guilty</a>. You realize that it was a mistake to say anything to the agents without first talking with an experienced white-collar criminal defense attorney.</p>



<p>So, what should you do in such a situation? The safest course would be to politely tell the agents that while you would like to talk with them, you need to contact your attorney and that he will get back to them. Ask them for their business cards so that you can give the information to your attorney. If they don’t have cards, write down their names, agency and contact information. Do not under any circumstances talk with them about the subject matter of their investigation. After they leave, contact an experienced criminal defense attorney to discuss your rights, potential exposure and your options.</p>



<p>If you did talk with the agents, experienced criminal defense counsel can help you get through the situation and protect your rights going forward. The task will be to mitigate any statements made and develop an overall strategy to succeed.</p>



<p>Stahl Gasiorowski Criminal Defense Lawyers have successfully represented hundreds of individuals under federal and state investigations. To contact the firm’s NJ office, call <a href="tel:9083019001">908.301.9001</a> and to contact the firm’s NYC office, call <a href="tel:212.755.3300">212.755.3300</a>, or email Mr. Stahl at <a href="mailto:rstahl@stahlesq.com">rstahl@stahlesq.com</a>.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[U. S. Supreme Court Narrows the Scope of Computer Fraud and Abuse Act]]></title>
                <link>https://www.stahlesq.com/blog/computer-fraud-abuse/</link>
                <guid isPermaLink="true">https://www.stahlesq.com/blog/computer-fraud-abuse/</guid>
                <dc:creator><![CDATA[Stahl Gasiorowski Criminal Defense Lawyers P.C. Team]]></dc:creator>
                <pubDate>Wed, 30 Jun 2021 02:25:19 GMT</pubDate>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                
                    <category><![CDATA[Supreme Court]]></category>
                
                
                
                <description><![CDATA[<p>In its June 3rd decision, the Supreme Court greatly narrowed the scope of the federal Computer Fraud and Abuse Act (CFAA). The CFAA, the main federal anti-hacking law, prohibits outside actors from illegally accessing – breaking into – government or private computer networks. In addition, it is routinely used to charge authorized users of a&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="900" height="506" src="/static/2025/09/f5_computer-fraud-abuse.jpg" alt="Computer Fraud and Abuse Act" class="wp-image-1602" srcset="/static/2025/09/f5_computer-fraud-abuse.jpg 900w, /static/2025/09/f5_computer-fraud-abuse-300x169.jpg 300w, /static/2025/09/f5_computer-fraud-abuse-768x432.jpg 768w" sizes="auto, (max-width: 900px) 100vw, 900px" /></figure>
</div>


<p>In its June 3rd decision, the Supreme Court greatly narrowed the scope of the federal Computer Fraud and Abuse Act (CFAA). The CFAA, the main federal anti-<a href="/criminal-law/white-collar-crime/internet-crimes/">hacking</a> law, prohibits outside actors from illegally accessing – breaking into – government or private computer networks. In addition, it is routinely used to charge authorized users of a computer network who exceed the scope of their access, those who “access a computer with authorization and use such access to obtain or alter information in the computer that the accessor is not entitled to obtain or alter.” Such instances include employees taking corporate secrets, customer lists, source codes and the like.</p>



<p>The case, <em>Van Buren v. United States</em>, involved a local police officer who accepted money from a third party for him to access the police database to check on whether an individual was an undercover officer. Thus, the officer exceeded the authorized use of the government database. In its 6-3 decision, the majority of the Court held that the CFAA’s language was too broad in scope, that it would “attach criminal penalties to a breathtaking amount of commonplace computer activity.” The majority sided with the defense’s argument that the CFAA’s broad language allows prosecutors, and private entities seeking civil remedies under the law, to pursue claims based on activities as minor as an employee breaching company policy by sending a personal email on a work computer or researchers who exceed the scope of a website’s terms of service.</p>



<p>The CFAA was enacted in 1984, and amended in 1986, at the infancy of the internet. It has since been used by corporate employers and the federal government to charge insiders with exceeding the scope of their authorized access or use. Since its enactment, the internet and use of computer networks have greatly expanded and access issues have become much more sophisticated and complex. The ill-defined, broad language in the statute was likely due to the nascent use of computers in 1984. The Court’s decision will likely result in Congress rewriting the statute to clarify its scope and reflect today’s computer usage. In the meantime, corporations will likely tighten their employment rules regarding access and privileged data, and the government will look to use other statutes in these types of cases.</p>



<p><a href="/">Stahl Gasiorowski Criminal Defense</a> is here for all of your criminal legal needs during this time. To contact the firm’s NJ office, call <strong><a href="tel:9083019001">908.301.9001</a></strong> and to contact the firm’s NYC office, call <a href="tel:2127553300"><strong>212.755.3300</strong></a>, or email Mr. Stahl at <a href="mailto:rstahl@stahlesq.com"><strong>rstahl@stahlesq.com</strong></a>.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Sexting, Revenge Porn, and Cyberbullying Can Result in Serious Criminal Penalties]]></title>
                <link>https://www.stahlesq.com/blog/cybercrimes-serious-criminal-penalties/</link>
                <guid isPermaLink="true">https://www.stahlesq.com/blog/cybercrimes-serious-criminal-penalties/</guid>
                <dc:creator><![CDATA[Stahl Gasiorowski Criminal Defense Lawyers P.C. Team]]></dc:creator>
                <pubDate>Tue, 22 Oct 2019 13:53:46 GMT</pubDate>
                
                    <category><![CDATA[Domestic Violence]]></category>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                    <category><![CDATA[Pornography]]></category>
                
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[Criminal Investigation]]></category>
                
                
                
                <description><![CDATA[<p>With our societal addiction to the internet, smartphones, and computers, today’s teens face growing exposure to new forms of harassment and bullying. These can sometimes lead to criminal charges for those engaging in this conduct, and potentially anxiety, depression and, suicidal thoughts for the recipients. Sexting is the sending, receiving or forwarding of sexually explicit&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="300" height="200" src="/static/2025/09/3c_sexting-revenge-porn-cyberbullying.jpg" alt="Sexting, Revenge Porn, and Cyberbullying Can Result in Serious Criminal Penalties" class="wp-image-1342"/></figure>
</div>


<p>With our societal addiction to the internet, smartphones, and computers, today’s teens face growing exposure to new forms of harassment and <a href="/blog/cyber-bullying-is-a-crime-what-you-need-to-know/">bullying</a>. These can sometimes lead to <a href="/criminal-law/">criminal charges</a> for those engaging in this conduct, and potentially anxiety, depression and, suicidal thoughts for the recipients.</p>



<p>Sexting is the sending, receiving or forwarding of sexually explicit material over electronic devices, including cellphones and computers. Sexually explicit material includes nude or partially nude photos or videos. Studies have revealed that more than 50% of young adults have sent nude or seminude photos of themselves to others, and more than 70% have received such materials. New Jersey, like many states, criminalizes the sending, possession, sharing or viewing of sexually explicit photos and videos of anyone under the age of 18 under its <a href="/blog/how-authorities-are-alerted-to-child-pornography/">child pornography</a> laws. That means that a student under 18 who sends a nude photo of themselves to another student under 18 could face criminal prosecution. While there is a diversionary program available for juveniles charged with their first sexting offense, these are serious matters that persist in middle and high schools across the country.</p>



<p>Revenge porn, also referred to as non-consensual pornography, is the distribution of sexually explicit images of an individual without his or her consent and without legitimate purpose. It is an ever-increasing, invasive form of cyber harassment. It usually involves a former sexual partner, who sends nude photos or videos to the victim’s family, friends, or employer in an effort to degrade, embarrass, and harass. In New Jersey, this form of harassment is a third-degree crime, exposing the perpetrator to 3-5 years in state prison.</p>



<p><a href="/blog/cyber-bullying-is-a-crime-what-you-need-to-know/">Cyberbullying</a> is the repeated and intentional harassment of another person over electronic devices. Cyberbullying is rampant among teenagers and has recently resulted in a number of highly publicized suicides by victims. Studies have demonstrated that the adverse impact of cyberbullying can last much longer and cause greater damage than traditional forms of in-person bullying.</p>



<p>These activities are the latest form of <a href="/criminal-law/domestic-violence/">domestic violence</a>, <a href="/blog/what-exactly-is-cyberstalking/">stalking</a>, and harassment. They carry serious criminal penalties and require <a href="/lawyers/">experience and expertise</a> to handle correctly, as they risk incarceration, criminal fines and penalties, and civil restraining orders.</p>



<p><a href="/lawyers/">Stahl Gasiorowski Criminal Defense Lawyers</a> aggressively defend individuals charged with <a href="/criminal-law/">complex federal and state crimes</a>. Founder <a href="/lawyers/robert-g-stahl-esq/">Robert G. Stahl</a> is recognized as one of the top criminal defense attorneys in the NY/NJ area for his skills, knowledge and success. To contact the firm, call <a href="tel:9083019001">908.301.9001</a> for the NJ office and <a href="tel:2127553300">212.755.3300</a> for the NYC office, or email Mr. Stahl at <a href="mailto:rgs@sgdefenselaw.com">rgs@sgdefenselaw.com</a>.</p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Robert Stahl Represents Former Rutgers Student in Mirai Botnet Internet Crime Case]]></title>
                <link>https://www.stahlesq.com/blog/mirai-botnet-internet-attack/</link>
                <guid isPermaLink="true">https://www.stahlesq.com/blog/mirai-botnet-internet-attack/</guid>
                <dc:creator><![CDATA[Stahl Gasiorowski Criminal Defense Lawyers P.C. Team]]></dc:creator>
                <pubDate>Tue, 19 Dec 2017 18:21:48 GMT</pubDate>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                    <category><![CDATA[Significant Criminal Defense Cases]]></category>
                
                
                
                
                <description><![CDATA[<p>Former Rutgers Student Charged with Computer Crimes in the Mirai Botnet Internet Attack Robert Stahl, leaving the federal courthouse in Trenton on Wednesday, Dec. 13, 2017 with former Rutgers student, left. (Jeff Granit | For NJ.com) News Coverage on the Mirai Botnet Internet Crime Case: Represented NJ Rutgers student charged in the District of New&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="600" height="410" src="/static/2025/09/d4_Robert20Stahl-represents-Paras-Jha-mirai-botnet-internet-crime-case.jpg" alt="Robert Stahl Represents Former Rutgers Student in Mirai Botnet Internet Crime Case" class="wp-image-1567" srcset="/static/2025/09/d4_Robert20Stahl-represents-Paras-Jha-mirai-botnet-internet-crime-case.jpg 600w, /static/2025/09/d4_Robert20Stahl-represents-Paras-Jha-mirai-botnet-internet-crime-case-300x205.jpg 300w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure>
</div>


<h2 class="wp-block-heading" id="h-former-rutgers-student-charged-with-computer-crimes-in-the-mirai-botnet-internet-attack">Former Rutgers Student Charged with Computer Crimes in the Mirai Botnet Internet Attack</h2>



<p><em>Robert Stahl, leaving the federal courthouse in Trenton on Wednesday, Dec. 13, 2017 with f<em>ormer Rutgers student, left</em>. (Jeff Granit | For NJ.com)</em></p>



<p></p>



<h3 class="wp-block-heading" id="h-news-coverage-on-the-mirai-botnet-internet-crime-case">News Coverage on the Mirai Botnet Internet Crime Case:</h3>



<p>Represented NJ Rutgers student charged in the District of New Jersey and the District of Alaska with a massive cyber attack identified as the Mirai botnet, which infected Internet connected devices, known as the internet of things (IoT) to attack major websites with a “distributed denial of service” (DDoS) attacks, bringing the sites down. Infected devices included unsecured webcams, security cameras and wireless routers. The Mirai botnet was distributed online, and affected the French hosting provider OVH and Brian Krebs own security website that reports on such attacks. Mirai was later used to bring down Dyn, the domain name system used by Twitter, PayPal, Spotify, and Reddit.</p>



<ul class="wp-block-list">
<li><strong><strong><a href="/static/2025/10/Cybercrime.pdf">NJ.com, January 6, 2018</a><br>
 <a href="/static/2025/10/Cybercrime.pdf">Cybercrime, murder and ‘The Situation’: The top court cases to watch in 2018</a></strong></strong></li>



<li><a href="http://www.fox5ny.com/news/mirai-botnet-attack-minecraft-stunt" rel="noopener noreferrer" target="_blank"><strong>Fox 5 NY, January 4, 2018</strong></a><br>
 <a href="/static/2025/10/Fox-News-Minecraft-stunt.pdf">How the Mirai botnet attack is linked to a Minecraft stunt</a> 
<figure class="wp-block-embed alignfull is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="How the Mirai botnet attack is linked to a Minecraft stunt" width="500" height="281" src="https://www.youtube-nocookie.com/embed/hLxRmIdEFIU?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>
</li>



<li><a href="https://www.reuters.com/article/us-usa-cyber/three-u-s-men-plead-guilty-to-crimes-tied-to-2016-botnet-attacks-idUSKBN1E71ZB" rel="noopener noreferrer" target="_blank">Reuters, December 13, 2017</a><br>
 <a href="/static/2025/10/Reuters-12-13-2017-Mirai-Malware.pdf">Three U.S. men plead guilty to crimes tied to 2016 botnet attacks</a></li>



<li><a href="https://www.thetimes.co.uk/article/student-gamers-behind-mirai-cyberattack-m57mdqlt2" rel="noopener noreferrer" target="_blank">The Times of London, December 19, 2017</a><br>
 <a href="/static/2025/10/times-12-19-2017-student-gamers-Mirai-cyberattack.pdf">Student gamers behind Mirai cyberattack</a></li>



<li><a href="http://www.nj.com/education/2017/12/how_much_did_hacker_who_tortured_rutgers_cost_the.html" rel="noopener noreferrer" target="_blank">NJ.com, December 14, 2017</a><br>
 <a href="/static/2025/10/NJ-12-14-2017-How-much-did-hacker-who-taunted-Rutgers-cost.pdf">How much did hacker who taunted Rutgers cost the school?</a></li>



<li><a href="http://www.nj.com/education/2017/12/rutgers_student_charged_in_series_of_cyber_attacks.html" rel="noopener noreferrer" target="_blank">NJ.com, December 13, 2017</a><br>
 <a href="/static/2025/10/NJ-12-13-2017-Former-Rutgers-student-admits-creating-code-crashed-internet.pdf">Former Rutgers student admits to creating code that crashed internet</a></li>



<li><a href="https://blogs.economictimes.indiatimes.com/Whathappensif/what-fuels-the-demand-cycle-as-bitcoins-despite-concerns-surge-to-20k/" rel="noopener noreferrer" target="_blank">The Economic Times, December 19, 2017</a><br>
 <a href="/static/2025/10/economic-times-12-19-2017-what-fuels-demand-cycle-bitcoins-20K.pdf">What fuels the demand cycle, as Bitcoins despite concerns, surge to 20K?</a></li>



<li><a href="https://www.law360.com/whitecollar/articles/994291/3-men-cop-to-mirai-malware-attacks-in-nj-alaska" rel="noopener noreferrer" target="_blank">Law 360, December 13, 2017</a><br>
 <a href="/static/2025/10/law-360-12-13-2017-Mirai-Malware.pdf">3 Men Cop to Mirai Malware Attacks in NJ, Alaska</a></li>



<li>ZDNet, Decem<a href="/static/2025/10/ZDNET-12-13-2017-Mirai-botnet-attackers-plead-guilty.pdf">ber 13, 2017</a><br>
 <a href="/static/2025/10/ZDNET-12-13-2017-Mirai-botnet-attackers-plead-guilty.pdf">Mirai botnet attackers plead guilty for roles in cyberattacks</a></li>



<li><a href="https://americansecuritytoday.com/guilty-pleas-computer-crime-cases-involving-massive-ddos-attacks-videos/" rel="noopener noreferrer" target="_blank">American Security Today, December 13, 2017</a><br>
 <a href="/static/2025/10/America-Security-12-13-2017-Mirai-Malware.pdf">Guilty Pleas in Computer Crime Cases Involving Massive DDoS Attacks</a>  
<figure class="wp-block-embed alignfull is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="Guilty Pleas in Computer Crime Cases Involving Massive DDoS Attacks" width="500" height="281" src="https://www.youtube-nocookie.com/embed/3O2B1zRrb_E?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>



<figure class="wp-block-embed alignfull is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="Mirai attacks explained in 100 seconds" width="500" height="281" src="https://www.youtube-nocookie.com/embed/Ki-Yo7OS-yU?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>
</li>



<li><a href="http://www.ktuu.com/content/news/Cybercriminal-ring-botnet-developers-plead-guilty-to-powerful-cyberattacks.html" rel="noopener noreferrer" target="_blank">KTUU Channel 2 NBC News, December 13, 2017</a><br>
 <a href="/static/2025/10/KTUU-12-13-2017-Alaska-spearheads-investigation-powerful-cyberattack.pdf">Alaska spearheads investigation into ‘one of the most powerful cyberattacks in history’</a> 
<figure class="wp-block-embed alignfull is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe loading="lazy" title="One of the Most Powerful Cyberattacks in History" width="500" height="281" src="https://www.youtube-nocookie.com/embed/UEycB8SxJI8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>
</li>



<li><a href="https://internetofbusiness.com/three-plead-guilty-developing-mirai-botnet/" rel="noopener noreferrer" target="_blank">Internet of Business, December 18, 2017</a><br>
 <a href="/static/2025/10/internet-business-12-18-2017-three-plead-guilty-Mirai-botnet.pdf">Three plead guilty in US to developing Mirai botnet</a></li>



<li>Wired Magazine, December 13, 2017<br>
 <a href="/static/2025/10/Wired-Mirai-Botnet-College-Student-Minecraft-Scheme.pdf">How a Dorm Room <em>Minecraft</em> Scam Brought Down the Internet</a></li>
</ul>



<p><a href="/static/2025/10/Wired-Mirai-Botnet-College-Student-Minecraft-Scheme.pdf"><br>
 Read More News on Stahl Gasiorowski Criminal Defense Lawyers </a></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Seemingly Innocent Activities May Be Treated as Internet Crimes]]></title>
                <link>https://www.stahlesq.com/blog/seemingly-innocent-activities-may-be-treated-as-internet-crimes/</link>
                <guid isPermaLink="true">https://www.stahlesq.com/blog/seemingly-innocent-activities-may-be-treated-as-internet-crimes/</guid>
                <dc:creator><![CDATA[Stahl Gasiorowski Criminal Defense Lawyers P.C. Team]]></dc:creator>
                <pubDate>Mon, 12 Sep 2016 08:37:28 GMT</pubDate>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                
                
                
                <description><![CDATA[<p>Internet crimes were relatively rare several years ago. However, now Internet crimes can be committed from the convenience of a person’s home and can happen at the international or interstate levels. Even activities that seem innocent in New Jersey may bring serious penalties from various jurisdictions, including multiple states along with the federal government. If&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<p>Internet crimes were relatively rare several years ago. However, now Internet crimes can be committed from the convenience of a person’s home and can happen at the international or interstate levels. Even activities that seem innocent in New Jersey may bring serious penalties from various jurisdictions, including multiple states along with the federal government.</p>
 <p>If you have been charged with an Internet crime, it is wise to seek legal advice whether you are an individual or a business. Our attorneys can represent not just individuals but also businesses of all sizes. These include from small shops to Fortune 100 companies.</p>
 <p>Common Internet crimes today include computer hacking, Internet identify theft and illegal Internet gambling. People can also be accused of engaging in work-at-home schemes that are considered fraudulent, stealing trade secrets or proprietary computer software, or selling illegal drugs via the Internet. It is also possible for people to be charged with the intentional harming of another person’s computer using electronic viruses.</p>
 <p><a href="/criminal-law/white-collar-crime/internet-crimes/">Internet crimes</a> in the state of New Jersey may result in penalties, such as prison time for interstate wire fraud. Criminal charges related to the Internet are usually leveled with other types of charges, such as business fraud and securities fraud. No matter how serious your charges are, our criminal defense attorneys will strive for the most favorable outcome for you — whether that means proceeding to trial or accepting a plea deal, if offered by prosecutors — while also ensuring that your applicable legal rights are not violated during any stage of the criminal proceedings.</p>
 ]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Supreme Court Breaks New Ground in Internet Crime Defense]]></title>
                <link>https://www.stahlesq.com/blog/supreme-court-breaks-new-ground-in-internet-crime-defense/</link>
                <guid isPermaLink="true">https://www.stahlesq.com/blog/supreme-court-breaks-new-ground-in-internet-crime-defense/</guid>
                <dc:creator><![CDATA[Stahl Gasiorowski Criminal Defense Lawyers P.C. Team]]></dc:creator>
                <pubDate>Mon, 12 Sep 2016 06:03:26 GMT</pubDate>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                
                
                
                <description><![CDATA[<p>The proliferation of computers, smartphones and tablets has caused an explosion in the use people make of social media. Use of the Internet to share information with friends and acquaintances has vastly improved the ways in which people can communicate with each other. Unfortunately, social media has also given rise to Internet crime in the&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
 <p>The proliferation of computers, smartphones and tablets has caused an explosion in the use people make of social media. Use of the Internet to share information with friends and acquaintances has vastly improved the ways in which people can communicate with each other. Unfortunately, social media has also given rise to Internet crime in the form of computer fraud, cyber terrorism, identity theft and cyber bullying.</p>
 <p></p>
 <p>A federal investigation into the activities of one Facebook user that resulted in criminal charges and a trial recently drew the attention of the United States Supreme Court. The criminal case focused on threats a man was alleged to have made against his wife and several other people and groups by posting violent lyrics from a rap song on Facebook.</p>
 <p>The criminal defense strategy offered at the trial was that the federal statute under which the defendant was charged required prosecutors to prove the intent to make a threat. The trial judge took the position that the context or circumstances under which the allegedly threatening statements were made was sufficient without a showing of actual intent.</p>
 <p>Although an intermediate appellate court agreed with the trial judge and refused to overturn the conviction and penalties, the Supreme Court disagreed and reversed the conviction. The Court ruled that even though the cybercrime did not include a provision making proof of intent a requirement, a conviction of a violation of a criminal law must be based upon proof that the defendant intended the wrongdoing for which he or she is charged.</p>
 <p>People frequently forget that social media, email and the Internet are relatively recent developments. It might come as a surprise to many that this case is the first one from the Supreme Court pertaining to social media. If you have been charged with a <a href="/criminal-law/white-collar-crime/internet-crimes/">computer or Internet-based crime</a>, having your criminal defense handled by attorneys with experience representing clients facing such complex criminal charges is essential.</p>
 <p>Source: The National Law Review,”<a href="http://www.natlawreview.com/article/supreme-court-limits-criminal-law-s-reach-to-social-media-posts-avoids-first-amendme" rel="noopener noreferrer" target="_blank">Supreme Court Limits criminal Law’s Reach to Social Media Posts; Avoids First Amendment Issue</a>,” June 8. 2015</p>
 ]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Cyber-Bullying Is a Crime: What You Need to Know]]></title>
                <link>https://www.stahlesq.com/blog/cyber-bullying-is-a-crime-what-you-need-to-know/</link>
                <guid isPermaLink="true">https://www.stahlesq.com/blog/cyber-bullying-is-a-crime-what-you-need-to-know/</guid>
                <dc:creator><![CDATA[Stahl Gasiorowski Criminal Defense Lawyers P.C. Team]]></dc:creator>
                <pubDate>Mon, 12 Sep 2016 05:56:33 GMT</pubDate>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                
                
                
                <description><![CDATA[<p>Cyber-bullying is a form a bullying that takes place using electronic technology, such through a computer or cell phone. Most commonly, the bullying occurs on social media websites like Facebook, by e-emails, or over text messages. Recently, cyber-bullying became a crime in the state of New Jersey. Many of us have made comments online that&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
 <p>Cyber-bullying is a form a bullying that takes place using electronic technology, such through a computer or cell phone. Most commonly, the bullying occurs on social media websites like Facebook, by e-emails, or over text messages. Recently, cyber-bullying became a crime in the state of New Jersey.</p>
 <p></p>
 <p>Many of us have made comments online that we later regret. So how do you know if you committed the crime of cyber-bullying?</p>
 <p><a href="http://www.njleg.state.nj.us/2012/Bills/S2500/2469_I1.HTM" rel="noopener noreferrer" target="_blank">New Jersey law</a> refers to cyber-bullying as cyber-harassment. Under that law, you may have committed the crime of cyber-bulling if you:</p>
 <ul class="wp-block-list">
 <li>threatened to harm or injure another person or the property of another person;</li>
 <li>posted, sent, requested, or suggested indecent or obscene material about another person; or</li>
 <li>threatened to commit a crime against another person or the property of another person.</li>
 </ul>
 <p>Moreover, you must have communicated the threats or comments online through some electronic device or social networking website. Another key element of the crime is your intent. In other words, you must have acted with the specific purpose to harass the other person.</p>
 <p>The severity of punishments for cyber-bullying depends on a number of factors. Typically, cyber-bullying is considered to be a crime in the fourth degree. This means that it carries a possible jail sentence of up to 18 months. Cyber-bullying can be considered a crime of the third degree, which is more serious, if you are 21 or older at the time of the offense and you impersonated a minor for the purposes of harassing a minor. Under New Jersey law, crimes of the third degree carry a potential penalty of three to five years in prison.</p>
 <p>Cyber-bullying can still be a crime even if the person who committed the act is a minor. Children and teenagers under the age of 16 who are found to be delinquent for cyber-harassment may face consequences. For example, they could be ordered by a court to complete cyber-harassment classes or programs. Or, their parents or guardians could be ordered to pay a fine.</p>
 <p>Has you or a loved one has been charged with the <a href="/criminal-law/white-collar-crime/internet-crimes/">crime of cyber-bullying</a>? You should speak with an experienced criminal defense attorney as soon as possible.</p>
 ]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Federal Prosecutors Are Relentless in Pursuit of Internet Crimes]]></title>
                <link>https://www.stahlesq.com/blog/federal-prosecutors-are-relentless-in-pursuit-of-internet-crimes/</link>
                <guid isPermaLink="true">https://www.stahlesq.com/blog/federal-prosecutors-are-relentless-in-pursuit-of-internet-crimes/</guid>
                <dc:creator><![CDATA[Stahl Gasiorowski Criminal Defense Lawyers P.C. Team]]></dc:creator>
                <pubDate>Mon, 12 Sep 2016 05:45:42 GMT</pubDate>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                
                
                
                <description><![CDATA[<p>For a few years until 2013, people who wanted to buy or sell drugs illegally on the Internet frequently found their way to a network known as the “Silk Road.” The network, which has been referred to as a “darknet” because of its efforts to conceal the identities and the transactions of its users, came&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<p>For a few years until 2013, people who wanted to buy or sell drugs illegally on the Internet frequently found their way to a network known as the “Silk Road.” The network, which has been referred to as a “darknet” because of its efforts to conceal the identities and the transactions of its users, came under intense scrutiny from federal government prosecutors who traced its activities across the country. Their efforts effectively degraded if not closed down the network, at least temporarily, and culminated with the recent conviction in federal court of its creator, Ross Ulbricht.</p>
 <p></p>
 <p>Ulbricht, who went by the darknet moniker “Dread Pirate Roberts,” could face imprisonment for up to 30 years. He has also been accused of attempting to arrange the murders of six people because he allegedly thought that they posed a threat to the anonymity and operations of the Silk Road.</p>
 <p>The tactics and techniques used by federal agents and federal attorneys offer a glimpse into the various ways that they use to investigate and prosecute Internet crimes. They monitored Bitcoin transactions (an alternative and supposedly anonymous way to make purchases online) and chat logs, including supposedly secure servers and social media sites. Nor did they confine their activities to the virtual world; federal agents placed Ulbricht under physical surveillance, arresting him in a public library as he was logging onto a notebook computer using a Silk Road alias.</p>
 <p>One lesson to take away from this case is that if you are<a href="/criminal-law/white-collar-crime/internet-crimes/"> accused of an Internet crime</a> in New Jersey, it is possible or even likely that the activities of others in different states or even foreign countries can also be entwined with the illegal acts with which you have been charged, and that multiple federal agencies will be involved against you. In such an eventuality, you will need the services of a legal defense team that is already familiar with federal prosecutions, federal laws, federal rules of criminal procedure and federal courts.</p>
 <p>You can count on the federal government to bring to bear a vast array of both technical and legal resources against you. The protection of your legal rights, including any possibility of acquittal or at least mitigation of the charges against you, is also something that you will need to count on.</p>
 <p>Source: PC World, “<a href="https://www.pcworld.com/article/431763/four-technologies-that-betrayed-silk-roads-anonymity.html" rel="noopener noreferrer" target="_blank">5 technologies that betrayed Silk Road’s anonymity</a>,” Joab Jackson, Feb. 9, 2015</p>
 <p>Secondary source: USA Today, “<a href="https://www.usatoday.com/story/news/2015/02/02/silk-road-murders-for-hire/22769635/" rel="noopener noreferrer" target="_blank">Silk Road mastermind tied to alleged murder plot</a>,” Kevin McCoy, Feb. 2, 2015</p>
 ]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[New Type of Cybercrime Can Cause Injury or Death Through Hacking]]></title>
                <link>https://www.stahlesq.com/blog/new-type-of-cybercrime-can-cause-injury-or-death-through-hacking/</link>
                <guid isPermaLink="true">https://www.stahlesq.com/blog/new-type-of-cybercrime-can-cause-injury-or-death-through-hacking/</guid>
                <dc:creator><![CDATA[Stahl Gasiorowski Criminal Defense Lawyers P.C. Team]]></dc:creator>
                <pubDate>Mon, 12 Sep 2016 05:42:49 GMT</pubDate>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                
                
                
                <description><![CDATA[<p>Most alleged Internet crimes are based on some form of financial fraud or related to a sex or pornography charge or stalking. Hacking can cause many types of angst, embarrassment and inconvenience to its targets. But rarely do you hear of someone dying as a result of Internet hacking. A new type of Internet crime&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
 <p>Most alleged Internet crimes are based on some form of financial fraud or related to a sex or pornography charge or stalking. Hacking can cause many types of angst, embarrassment and inconvenience to its targets. But rarely do you hear of someone dying as a result of Internet hacking.</p>
 <p></p>
 <p>A new type of Internet crime is the focus of an <a href="http://www.fda.gov/medicaldevices/safety/alertsandnotices/ucm456815.htm" rel="noopener noreferrer" target="_blank">investigation by the Federal Drug Administration</a>. “Medjacking” refers to a hacker’s ability to interfere with the remote delivery of medication through a medical device that is controlled through a computer. The possibility of such a crime occurring is so real that even the Department of Homeland Security is involved.</p>
 <p>The specific device under the microscope is an infusion pump that remotely delivers medication to a patient on a schedule determined by a hospital’s computer system. As with almost any computer system, the hospital’s may be vulnerable to hacking. And hacking the delivery system of the medication could result in serious medical issues or even death without the hospital or the patient having any idea of how it occurred.</p>
 <p>Until now, if someone wanted to cause serious injury to another person, there generally had to be some form of personal interaction. But now, a weak firewall, or an outdated one that hasn’t been programmed to anticipate such cyberattacks, can lead to death. Under this theory, a wife who wants to inherit her husband’s insurance policy no longer has to hire a hitman with a gun, but just a hacker with a keyboard.</p>
 <p>While no reports of actual injury have been found in New Jersey or any other state, the risk is so real that the FDA has recommended that hospitals no longer use the product. And, as an added layer of protection, the manufacturer is offering patients who have already been equipped with the devices additional security against hacking.</p>
 <p>Cybercrimes can be serious offenses but sometimes the end results were not intended by the person charged with the crime. Third parties can hack another person’s technology to cause harm another person without the knowledge of either victim. If you have been <a href="/criminal-law/white-collar-crime/internet-crimes/">charged with computer or Internet-based crime</a> that either you didn’t commit or that had consequences you hadn’t intended, contact an attorney familiar with state and federal cybercrime laws to discuss your rights.</p>
 ]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[What Exactly Is “cyberstalking”?]]></title>
                <link>https://www.stahlesq.com/blog/what-exactly-is-cyberstalking/</link>
                <guid isPermaLink="true">https://www.stahlesq.com/blog/what-exactly-is-cyberstalking/</guid>
                <dc:creator><![CDATA[Stahl Gasiorowski Criminal Defense Lawyers P.C. Team]]></dc:creator>
                <pubDate>Mon, 12 Sep 2016 05:29:14 GMT</pubDate>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                
                
                
                <description><![CDATA[<p>Stalking behaviors by one person directed at another are nothing new. The motivation may be anger, unrequited romantic interest, jealousy or other reasons. But actions such as following a person, attempting to interact with a person or communicating with others about that person in a harmful manner is frequently illegal. What is relatively new is&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<p>Stalking behaviors by one person directed at another are nothing new. The motivation may be anger, unrequited romantic interest, jealousy or other reasons. But actions such as following a person, attempting to interact with a person or communicating with others about that person in a harmful manner is frequently illegal.</p>
 <p></p>
 <p>What is relatively new is the misuse of the Internet as an extension of stalking activity. But while “ordinary” stalking is easy to identify, for example, following a person, showing up at his or her home or place of work unexpectedly, making unwanted phone calls, leaving unwanted gifts, or even issuing threats, the question in the age of the Internet becomes, “How does one ‘virtually’ stalk another?”</p>
 <p>The answer to this question is based on how the Internet has changed, added to or extended the activities that constitute stalking. Some ways that a person can engage in cyberstalking include, but are not necessarily limited to:</p>
 <ul class="wp-block-list">
 <li><strong>Sending unwanted emails.</strong> This is perhaps the most common form of cyberstalking with more than 80 percent of cyberstalking victims report receiving such unwelcome attention.</li>
 <li><strong>Using the Internet to follow another person in improper ways.</strong> As an example, the availability of sites that can make another person’s address, phone number, identity of relatives or even court records available for a small fee opens a range of unwanted and even dangerous possibilities for cyberstalking or even in-person stalking.</li>
 <li><strong>Using social media and other virtual means to maliciously damage the reputation of another.</strong> An ex-spouse or lover who posts compromising photos on the Internet, or who spreads false or defamatory statements about another person, is engaging in a form of cyberstalking. This particular form of behavior is related to “cyberbullying,” and in some cases the effect can be so devastating that the victim has even committed suicide as a result.</li>
 </ul>
 <p>The advent of cyberstalking, and both federal and New Jersey laws meant to combat it, can at times risk confusing innocent curiosity with unhealthy obsession. Although most of the time those accused of virtual stalking may deserve the accusation, it can be possible to be charged with such behavior when there was no malicious intent.</p>
 <p>Anyone who has been charged with cyberstalking may want to retain an experienced criminal defense law firm to protect his or her rights in negotiations and, if necessary, at trial.</p>
 ]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[You Can Defend Yourself Against Charges of Internet Crime]]></title>
                <link>https://www.stahlesq.com/blog/you-can-defend-yourself-against-charges-of-internet-crime/</link>
                <guid isPermaLink="true">https://www.stahlesq.com/blog/you-can-defend-yourself-against-charges-of-internet-crime/</guid>
                <dc:creator><![CDATA[Stahl Gasiorowski Criminal Defense Lawyers P.C. Team]]></dc:creator>
                <pubDate>Mon, 12 Sep 2016 05:26:16 GMT</pubDate>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                
                
                
                <description><![CDATA[<p>There was a time not that long ago when computers and the Internet were seen as tools to assist businesses to operate in a faster, more efficient and organized manner. The Internet was seen as an aid to students researching a topic and to help ordinary people expand their knowledge. Today the Internet is not&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<p>There was a time not that long ago when computers and the Internet were seen as tools to assist businesses to operate in a faster, more efficient and organized manner. The Internet was seen as an aid to students researching a topic and to help ordinary people expand their knowledge.</p>
 <p></p>
 <p>Today the Internet is not only seen as a peripheral tool to help people but it has become a business itself. So many people can now enter into transactions and conduct business without any paper, and cross international borders without ever leaving their home because of the Internet. The former niche tool has become the lifeblood of many businesses</p>
 <p>As with every young technology or industry, the law must adapt and learn as the technology advances and the industry grows. The Internet is no different and what many online users may believe is innocent conduct may in fact be a violation of a new law that was enacted to regulate and control Internet activity.</p>
 <p>Many businesses, large, medium and small are vulnerable to charges of Internet crimes because their employees may be using company resources to upload illegal viruses, steal another person’s identity or engage in illegal computer hacking.</p>
 <p>Internet crimes are particularly complex because they are often accompanied with other charges. It is these factors that a skilled criminal defense attorney will have to prepare for when defending against charges of Internet crimes.</p>
 <p>The lawyers at the Law of Offices of Robert G. Stahl have experience in defending New Yorkers who have been charged with various Internet crimes, and are familiar with complexity of the law concerning these charges. If you or a loved one is facing a charge of an <a href="/criminal-law/white-collar-crime/internet-crimes/">Internet crime</a>, please contact our office to learn how we may be able to help.</p>
 ]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Most Common Federal Business Frauds]]></title>
                <link>https://www.stahlesq.com/blog/most-common-federal-business-frauds/</link>
                <guid isPermaLink="true">https://www.stahlesq.com/blog/most-common-federal-business-frauds/</guid>
                <dc:creator><![CDATA[Stahl Gasiorowski Criminal Defense Lawyers P.C. Team]]></dc:creator>
                <pubDate>Mon, 12 Sep 2016 05:11:12 GMT</pubDate>
                
                    <category><![CDATA[Business Fraud]]></category>
                
                    <category><![CDATA[Falsifying Documents]]></category>
                
                    <category><![CDATA[Healthcare Fraud]]></category>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                    <category><![CDATA[Securities Fraud]]></category>
                
                    <category><![CDATA[Wire and Mail Fraud]]></category>
                
                
                    <category><![CDATA[Tax Fraud]]></category>
                
                
                
                <description><![CDATA[<p>Violations of any number of federal statutes have the potential to jeopardize a business and can, in many cases, result in individuals going to prison. In addition, restitution and forfeiture may be applicable. Below, we delve into some of the most commonly encountered federal business fraud statutes. The Foreign Corrupt Practices Act The Foreign Corrupt&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image">
<figure class="alignright size-full is-resized"><img loading="lazy" decoding="async" width="900" height="600" src="/static/2025/09/84_most-common-federal-business-frauds.jpg" alt="Most Common Federal Business Frauds" class="wp-image-1488" style="width:300px;height:200px" srcset="/static/2025/09/84_most-common-federal-business-frauds.jpg 900w, /static/2025/09/84_most-common-federal-business-frauds-300x200.jpg 300w, /static/2025/09/84_most-common-federal-business-frauds-768x512.jpg 768w" sizes="auto, (max-width: 900px) 100vw, 900px" /></figure>
</div>


<p>Violations of any number of federal statutes have the potential to jeopardize a business and can, in many cases, result in individuals going to prison. In addition, restitution and forfeiture may be applicable. Below, we delve into some of the most commonly encountered <a href="/criminal-law/white-collar-crime/business-fraud/">federal business fraud</a> statutes.</p>



<h2 class="wp-block-heading" id="h-the-foreign-corrupt-practices-act">The Foreign Corrupt Practices Act</h2>



<p>The Foreign Corrupt Practices Act applies to any company that must file a report with the SEC, including companies based in the United States, their subsidiaries and those listed on the stock exchanges. This Act bars payments to foreign governments or officials to obtain a competitive advantage.</p>



<h2 class="wp-block-heading" id="h-wire-fraud-and-mail-fraud"><a href="/criminal-law/white-collar-crime/wire-and-mail-fraud/">Wire Fraud and Mail Fraud</a></h2>



<p><a href="/criminal-law/white-collar-crime/wire-and-mail-fraud/">Mail fraud and wire fraud</a> are used extensively by federal authorities. Mail fraud involves the use of the mail in a scheme to defraud another person or entity. This broad-based statute includes any mailing of a document that contains a materially false statement. “Mail” is defined as documents sent via public or private carriers. The document is not required to cross state lines to qualify as mail fraud. Wire fraud is similar to mail fraud except it includes just about all forms of media including e-mail, telephone, TV, radio, Internet, telex and facsimile.</p>



<h2 class="wp-block-heading" id="h-bankruptcy-fraud">Bankruptcy Fraud</h2>



<p>This type of business fraud involves defrauding through a document, petition or representation tied to a bankruptcy proceeding. It includes material misrepresentations as to assets and ownership interests in assets.</p>



<h2 class="wp-block-heading" id="h-health-care-fraud"><a href="/criminal-law/white-collar-crime/health-care-fraud/">Health Care Fraud</a></h2>



<p><a href="/criminal-law/white-collar-crime/health-care-fraud/">Health care fraud</a> is the defrauding of any private or public health care benefit program. The definition encompasses the payment for/delivery of services. This a very active area of investigation for federal and state authorities. It includes paying others for patient referrals, upcoding, over billing, ordering unnecessary tests or procedures and submitting false claims. False statements made to procure payment from a federal health care program also qualifies as health care fraud.</p>



<h2 class="wp-block-heading" id="h-securities-fraud"><a href="/criminal-law/white-collar-crime/securities-fraud/">Securities Fraud</a></h2>



<p>This type of fraud refers to the sale or purchase of an investment where the return is based on the effort of a third party. An example of such an offense is the trading of stocks with <a href="/criminal-law/white-collar-crime/securities-fraud/">insider information</a>. The fraudulent marking of prices or material false statements in the prospectus are also forms of securities fraud.</p>



<h2 class="wp-block-heading" id="h-the-false-claims-act">The False Claims Act</h2>



<p>Those who knowingly make or conspire to produce erroneous financial claims to the government can be found guilty of this type of fraud. It commonly applies to Medicaid and Medicare. False statements made on a bill can qualify as separate offenses. The operative word in this statute’s definition is “knowingly”. “Knowingly” is defined as actual knowledge, intentional ignorance or a “reckless” disregard for what is true. Examples of false claims include false affirmative certifications of compliance with federal regulations, billing and claims that stand for compliance with regulations, statutes or contract terms.</p>



<h2 class="wp-block-heading" id="h-material-false-statements"><a href="/criminal-law/white-collar-crime/falsifying-documents/">Material False Statements</a></h2>



<p>An individual who makes a <a href="/criminal-law/white-collar-crime/falsifying-documents/">materially false statement</a> to an official of the federal government or makes a false record of entry is committing a criminal offense. Though individuals certainly have the right to remain silent, they do not have the right to lie.</p>



<h2 class="wp-block-heading" id="h-the-dodd-frank-act-of-2010">The Dodd-Frank Act of 2010</h2>



<p>Passed into law as a result of the last recession, this Act is meant to spur improved transparency and accountability on Wall Street, protect investors and reform mortgages. However, its Constitutionality is currently being challenged in federal court. Stay tuned for developments.</p>



<h2 class="wp-block-heading" id="h-bank-fraud">Bank Fraud</h2>



<p>Bank fraud is an attempt (or the actual execution) to defraud a federally insured financial institution. Bank fraud encompasses securities, funds and property owned or possessed by the institution that has been victimized. Bank fraud can still apply even if the institution does not suffer an actual loss. It also includes submitting materially false statements on loan applications, whether the loan is for a car, car lease, home mortgage, or revolving line of credit.</p>



<h2 class="wp-block-heading" id="h-uniform-fraudulent-transfer-act">Uniform Fraudulent Transfer Act</h2>



<p>Fraudulent conveyances that occur in various contexts, such as bankruptcy, have tripped up numerous individuals and businesses in the past. The language of these statutes is broad enough to include activity that is meant to defraud, delay or disrupt a creditor. Courts can go back as far as six years to uncover evidence of this style of fraud. An example in the context of the private sector is a leveraged buyout in which a company borrows against its assets and acquires stock. Such an action can be scrutinized as a fraudulent conveyance.</p>



<h2 class="wp-block-heading" id="h-the-computer-fraud-and-abuse-act"><a href="/criminal-law/white-collar-crime/internet-crimes/">The Computer Fraud and Abuse Act</a></h2>



<p>This Act bars the procurement of national security information, infiltrating confidential information stored on computers, password trafficking, damaging transmissions/access and any extortion involving threats to damage computing devices. It is worth noting that cell phones qualify as “computing devices”.</p>



<h2 class="wp-block-heading" id="h-immigration-fraud">Immigration Fraud</h2>



<p>Those who fraudulently use immigration documents such as border crossing cards, permits and visas can be found guilty of immigration fraud.</p>



<h2 class="wp-block-heading" id="h-the-sarbanes-oxley-act-of-2002">The Sarbanes-Oxley Act of 2002</h2>



<p>This Act has eleven unique “Titles”, each with a section that has been written in response to corporate wrong-doings. Its purpose is to prevent future corporate scandals by requiring in-depth financial disclosures and auditor independence.</p>



<p>The experienced attorneys at Stahl Gasiorowski Criminal Defense Lawyers aggressively defend individuals charged with complex federal and state crimes. Founder Robert G. Stahl is recognized as one of the top criminal defense attorneys in the NY/NJ area for his skills, knowledge and success. To contact us to discuss your case, call <strong>908.301.9001</strong> for our NJ office and <strong>212.755.3300</strong> for our NYC office or <a href="mailto:rgs@sgdefenselaw.com" rel="noopener" target="_blank">email us at rgs@sgdefenselaw.com</a>.</p>
]]></content:encoded>
            </item>
        
    </channel>
</rss>