Close

Articles Posted in Uncategorized

Updated:

PPP Loan Fraud Explained

News stories continue to pour in about Paycheck Protection Program loan fraud (see https://www.nbcnews.com/business/economy/congressional-investigation-finds-over-1-billion-ppp-fraud-n1239001).  The Paycheck Protection Program (“PPP”) was authorized as part of the Coronavirus Aid, Relief, and Economic Security Act to provide forgivable loans to eligible small businesses. Under the PPP, small businesses can apply for loans that…

Updated:

Operation Double Helix and Operation Brace Yourself are two recent examples of the United States Department of Justice efforts to punish health care fraud  

In Operation Brace Yourself, DME and medical brace manufacturers were alleged to have paid “kickbacks” and “bribes” to doctors and nurse practitioners working with telemedicine companies for exchange for Medicare patient referrals for medically unnecessary braces. In Operation Double Helix, patients nationwide were allegedly lured into providing their DNA for testing in a widespread…

Updated:

Sanctions against the ICC: Product of Isolationism or Defense of Sovereignty?

Meg Strickler, a chair of the ABA section of International Law, Government and Public Interest Committee, is hosting a webinar tomorrow. The US has recently authorized economic and travel sanctions against the members of the International Criminal Court who are investigating war crimes committed in Afghanistan. Are these sanctions lawful…

Updated:

Mass Electronic Surveillance Suspected In Protests

Federal agencies can use the “national security” exception to avoid search warrants and use unobtrusive stingrays and dirtboxes to obtain cell phone numbers, owners’ names, and owners’ addresses. Without targeting a suspect, they can access large swaths of data by using this technology in crowds. They can even use that…

Updated:

After a Data Breach, What to Do?

After the Hack: A Data Breach Post Game Show As chair of the Cyber Crime committee at iTechlaw, Meg Strickler gives her insight on data breaches from various perspectives on an iTechlaw webinar this week.  She and the other panelists discuss: The criminal charge of BEC (Business email compromise) fraud…

Updated:

Are you under an investigation for a cybercrime?

From online harassment and cyberstalking to cyberterrorism, cybercrimes have become increasingly common. If you are under investigation for a cybercrime, you should know that the prosecution will be aggressive and the penalties harsh. A little history The first federal case of cyber harassment came to court in 2004. The man…

Updated:

An arrest for vehicular homicide can happen to any motorist

You probably never image your involvement in white-collar crime such as identity theft, embezzlement or cyberstalking. However, vehicular manslaughter also falls into this category. Given the right set of circumstances, anyone who drives could face arrest for this kind of crime—even you. Vehicular manslaughter explained In the state of Georgia,…

Contact Us