Identifying and Combatting Fraud and Other Misconduct in Transactions and Litigation a Case Study and Some Tactical Considerations

Total Page:16

File Type:pdf, Size:1020Kb

Identifying and Combatting Fraud and Other Misconduct in Transactions and Litigation a Case Study and Some Tactical Considerations Identifying and Combatting Fraud and Other Misconduct in Transactions and Litigation A Case Study and Some Tactical Considerations Michael Farhang, James Fogelman, Robert Klyman and Jay Srinivasan Thursday, March 16th 2017 <Presentation Title/Client Name> “Forgery. Perjury. Willful destruction of evidence. Litigators might sometimes suspect the other side of such shenanigans, but rarely do you get an unequivocal win as a result. On Friday, a team from Gibson, Dunn & Crutcher led by James Fogelman and Jay Srinivasan pulled it off, arguing successfully that a key plaintiffs’ document in a $12 billion fight was fake.” 2 <Presentation Title/Client Name> Judge Suzanne Bruguera’s November 22, 2016 Order and December 2, 2016 Default Judgment Determined three of Plaintiffs’ key documents to be forgeries Found “ample evidence” of perjury by Plaintiffs, in particular Lead Plaintiff, to mislead the Court and cover up misconduct Dismissed Plaintiffs’ Third Amended Complaint with prejudice Enjoined Plaintiffs from continuing to breach the Joint Venture Agreement Granted over $6 million in fees and costs to Gibson Dunn’s client 3 <Presentation Title/Client Name> How did Gibson Dunn and its clients prove forgery, fabrication, manipulation, and spoliation of evidence? 4 <Presentation Title/Client Name> Plan A: Plaintiffs and Their Counsel Swore That “Version 2” Was The “Original” From September 2010 “. the original has remained in “This document, sir, is the document that [Plaintiff’s] possession until recently, was sent to our office, that is correct.” when he turned it over to [Plaintiffs’] counsel for handling and maintaining in accordance with the September 8, 2015 order of this Court.” “. plaintiffs have assembled the original hard copies of the agreements for holding in escrow by a third party . They produced for copying “Since my receipt of the documentation . in by [Defendants] the original hard copies of JVA mid-September 2010, I have carefully maintained Version 2 and the La Cienega PMA.” the original hard copies of Version 2 and [the] September 14, 2010 cover letter for it.” 5 <Presentation Title/Client Name> Additional Perjury by Plaintiffs VIDEOTAPED DEPOSITION TESTIMONY TUESDAY, SEPTEMBER 22, 2015 Q. Now, just to clarify, is it Q. Let me clarify. Do you still have your testimony that the the original of what you say you found document you brought with you in the basement in the last eight to 12 today [“Version 2”] is exactly months [the Cover Letter] ? what you claim to have received A. Yes, I do sir. in September of 2010? Q. And where do you have that document? THE WITNESS: Yes. A. I keep that document in my safe now. 6 <Presentation Title/Client Name> Plan B: Plaintiffs And Their Counsel Threaten To Blame Defendants’ Counsel for “Switching” The Documents From: [Plaintiffs’ Counsel] Sent: Friday, October 16, 2015 1:13 PM To: [Gibson Dunn] Subject: Re: Lincoln Studios: Production of documents – Time Sensitive “Please understand that it is our position that this letter and version 2 was received in 2010. Once again, if you take the only copy of the letter and subsequent testing demonstrates that the age of the paper is after 2010, it will be our position that there has been an alteration.” “. If you take the letter, and it ends up being time dated at any other time in 2010, it will be our position that you have altered or substituted the document. My proposal guarantees that you will not have this exposure.” 7 <Presentation Title/Client Name> Plan C: Destroy All The Electronic Evidence Despite The Court’s Orders And Commitments Made To The Court 8 <Presentation Title/Client Name> Plaintiffs Conspire To Destroy Lead Plaintiff’s Computer Before the Court-Ordered Forensic Inspection 9 <Presentation Title/Client Name> Plaintiffs’ Employees Conspire to Permanently Delete and Wipe Devices Prior To The Court-Ordered Forensic Examination 10 <Presentation Title/Client Name> Devices Destroyed, Manipulated, or Withheld by Plaintiffs PNY USB Drive (Used N.S. Dell Desktop Dell OptiPlex 7010 N.S. 2012 Computer to transfer “NS clean 123 Computer (The A.S. NMS Dell (DELLNEIL2012-PC) PRINT.pdf”) Desktop) Seagate BUP Slim BK Seagate 4 terabyte drive Seagate 4 terabyte 20 Other USB (Replaced Seagate drive (Original Seagate USB (used in backup of Devices Secondary Hard Drive) N.S. Dell Desktop) Secondary Hard Drive) 11 <Presentation Title/Client Name> Lead Plaintiff’s Computer Is Backdated 17 Times in 60 Days 12 <Presentation Title/Client Name> Plaintiffs Admit To Downloading And Using Powerful File Eraser Software And Deleting Incriminating Software And Data Plaintiffs’ employees downloaded Eraser Portable on 12/3/2015 and ran it on 12/4/2015: 13 <Presentation Title/Client Name> Even Plaintiffs’ Computer Forensics Expert Was Disturbed By Plaintiffs’ Misconduct “It’s a horrendous idea.” “I would not advise “I think it was dumb. Bad idea.” somebody to do that.” “All I can say it was a stupid thing for him to have done. I wouldn’t have recommended it . .” 14 <Presentation Title/Client Name> Plaintiffs Stand Alone On Forged “Version 2” “I thought it was a typo, a misunderstanding, it was fixed.” 15 <Presentation Title/Client Name> Plaintiffs’ Deal Counsel Confirmed That There Is No “Typo” In Section 11.1 Q. Sir, looking at the language “five years from the date hereof,” which is contained in the redline portion 11.1(a)(i), you’re not aware of any typos in that language; correct, sir? A. No. Q. There are no typos contained in section 11.1(a)(i) of Exhibit 3; correct? A. Correct. 16 <Presentation Title/Client Name> Ex-President of Plaintiffs Confirms: No Typo in Section 11.1 Ex-President’s Deposition Testimony Q. And you are not aware of any typo in Section 11.1 A1, correct? A. No, I’m unaware of that. 17 <Presentation Title/Client Name> Non-Binding Term Sheet: Three Years OR Stabilization From: [Defendants] To: [Plaintiffs and Plaintiffs’ Deal Counsel] Sent: Wed 5/26/2010 3:32:12 PM Subject: [Joint Venture] Term Sheet [Lead Plaintiff] 18 <Presentation Title/Client Name> The 5-Year Buy/Sell Provision Was Incorporated Per Plaintiffs’ Request 19 <Presentation Title/Client Name> Versions 1 and 3 of the LLC Agreement 20 <Presentation Title/Client Name> Plaintiffs’ In-House Counsel Confirms: No 3 Year Buy/Sell In “Actual LLC Agreement” From: [Plaintiffs’ In-House Counsel] Sent: Friday, July 19, 2013 12:04 PM To: [Lead Plaintiff] Subject: RE: [FWD: FW: Emailing: [JV] Term Sheet v6 redline.doc, [JV] Term Sheet v6.doc] From: [Lead Plaintiff] Sent: Friday, July 19, 2013 11:47 AM To: [Plaintiffs’ In-House Counsel] Subject: FW: [FWD: FW: Emailing: [JV] Term Sheet v6 redline.doc, [JV] Term Sheet v6.doc] 21 <Presentation Title/Client Name> Changing “five” to “three” Causes A Single Overhanging Letter 22 <Presentation Title/Client Name> Version 1 and 3 LLC Agreements Are Different Than Version 2 LLC Agreement Version 1 and Version 3 LLC Version 2 LLC Agreement Agreements 23 <Presentation Title/Client Name> The CPS Code Found On The Original “Version 2” Confirms It Was Printed July 15, 2013 24 <Presentation Title/Client Name> All Other Versions of the Q1 Version 2 LLC Agreement Were Made On Or After July 15, 2013 Q1 Version 2 K61 Version 2 LLC LLC Agreement Agreement 25 <Presentation Title/Client Name> Versions of the JV Agreement Modified/Emailed Over Time on Plaintiffs’ Devices “Version 2” “Version 3” “Version 1” September January July 2013 2010 2011 26 <Presentation Title/Client Name> Timeline Clearly Indicates “Version 2” Is A Forgery Monday, July 15, 2013, at 3:51 p.m. The file is opened on Lead P’s son’s company computer, a device that was originally withheld from forensic examination. Before 4:00 p.m., the file is Monday, July 15, 2013, at 1:24 p.m. printed on a P’s Xerox WorkCenter machine, in P’s offices, leaving the CPS The file was transferred to a thumb code. The produced “Version 2” contains one page that was not printed with drive from the unknown computer the rest of the document. Monday, July 15, 2013, at 4:18 p.m. Sunday, July 14, 2013, at 9:46 p.m. The print-out of “Version 2” is scanned to Lead P’s son’s email An unknown computer opened and account from the Xerox WorkCenter. modified a file called “P6 LA MF Holding I LLC clean NS 123 Monday, July 15, 2013, at 9:43 p.m. PRINT.pdf.” This unknown “Version 2” pdf that was created earlier that day is “modified,” computer has never been produced. indicating a change to the document. Wednesday Thursday Friday Saturday Sunday Monday Tuesday Wednesday Thursday Friday Saturday July 10 July 11 July 12 July 13 July 14 July 15 July 16 July 17 July 18 July 19 July 20 Friday, July 12, 2013, at 4:52 p.m. P’s In-House Counsel emails two July 15, 2013, 3:51 p.m. Tuesday, July 16, 2013, at Friday, July 19, 2013, at 12:04 p.m. versions of the JV Agreement, 9:44 p.m. Email announces resignation P’s In-House emails Lead P: “This attaching two live emails from 2010 USB drive containing the of then-President of [3-year] concept didn’t make it into and 2011 containing the original and document entitled “P6 LA Plaintiffs, who negotiated the the actual LLC Agreement.” the operative JV Agreement. MF Holdings I LLC NS JV Agreement for Plaintiffs. clean 123 PRINT.pdf” is Friday, July 12, 2013, at 4:57 p.m. plugged into Lead P’s Friday, July 19, 2013, at 4:59 p.m. son’s computer. Plaintiffs Lead P forwards In-House Counsel’s email never produced this P’s In-House Counsel emails containing both “Version 1” and “Version 3” to device.
Recommended publications
  • INVESTIGATIVE REPORT Lori Torres, Inspector General
    INVESTIGATIVE REPORT Lori Torres, Inspector General OFFICE: INDIANA BUREAU OF MOTOR VEHICLES TITLE: FORGERY; PERJURY; THEFT CASE ID: 2017-12-0293 DATE: August 30, 2018 Inspector General Staff Attorney Kelly Elliott, after an investigation by Special Agent Mark Mitchell, reports as follows: The Indiana General Assembly charged the Office of Inspector General (OIG) with addressing fraud, waste, abuse, and wrongdoing in the executive branch of state government. IC 4-2-7-2(b). The OIG also investigates criminal activity and ethics violations by state workers. IC 4-2-7-3. The OIG may recommend policies and carry out other activities designed to deter, detect, and eradicate fraud, waste, abuse, mismanagement, and misconduct in state government. IC 4-2- 7-3(2). On March 23, 2017, the OIG received a complaint from the Indiana Bureau of Motor Vehicles (BMV) that alleged a former BMV employee, Richard Pringle, submitted false information to the BMV on personal certificate of title applications. OIG Special Agent Mark Mitchell conducted an investigation into this matter. Through the course of his investigation, Special Agent Mitchell interviewed Pringle and reviewed documentation received from BMV, including their internal investigation report on this matter. According to BMV’s investigative report of the allegations against Pringle, BMV found that Pringle submitted an application for a 1997 GMC Yukon in October 2016 that listed a sale price 1 that was different from the price the seller of the vehicle stated they sold it. At the conclusion of their investigation, BMV terminated Pringle’s employment in or around March 2017. Special Agent Mitchell reviewed the BMV certificate of title application for the 1997 GMC Yukon.
    [Show full text]
  • 61-2G-306 Renewal of License, Certification, Or Registration. (1) To
    Utah Code 61-2g-306 Renewal of license, certification, or registration. (1) To renew a license, certification, or registration, before the license, certification, or registration expires, the holder of the license, certification, or registration shall submit to the division in compliance with procedures set through the concurrence of the division and the board: (a) an application for renewal; (b) a fee established by the division and the board, in accordance with Section 63J-1-504; and (c) evidence in the form prescribed by the division of having completed the continuing education requirements for renewal specified in this chapter. (2) (a) A license, certification, or registration expires if it is not renewed on or before its expiration date. (b) For a period of 30 days after the expiration date, a license, certification, or registration may be reinstated upon: (i) payment of a renewal fee and a late fee determined through the concurrence of the division and the board; and (ii) satisfying the continuing education requirements specified in Section 61-2g-307. (c) After the 30-day period described in Subsection (2)(b), and until six months after the expiration date, a license, certification, or registration may be reinstated by: (i) paying a renewal fee and a reinstatement fee determined through the concurrence of the division and the board; and (ii) satisfying the continuing education requirements specified in Section 61-2g-307. (d) After the six-month period described in Subsection (2)(c), and until one year after the expiration date, a
    [Show full text]
  • 715A.2 Forgery. 1. a Person Is Guilty of Forgery If, with Intent to Defraud Or
    1 FORGERY AND RELATED FRAUDULENT CRIMINAL ACTS, §715A.2 715A.2 Forgery. 1. A person is guilty of forgery if, with intent to defraud or injure anyone, or with knowledge that the person is facilitating a fraud or injury to be perpetrated by anyone, the person does any of the following: a. Alters a writing of another without the other’s permission. b. Makes, completes, executes, authenticates, issues, or transfers a writing so that it purports to be the act of another who did not authorize that act, or so that it purports to have been executed at a time or place or in a numbered sequence other than was in fact the case, or so that it purports to be a copy of an original when no such original existed. c. Utters a writing which the person knows to be forged in a manner specified in paragraph “a” or “b”. d. Possesses a writing which the person knows to be forged in a manner specified in paragraph “a” or “b”. 2. a. Forgery is a class “D” felony if the writing is or purports to be any of the following: (1) Part of an issue of money, securities, postage or revenue stamps, or other instruments issued by the government. (2) Part of an issue of stock, bonds, credit-sale contracts as defined in section 203.1, or other instruments representing interests in or claims against any property or enterprise. (3) A check, draft, or other writing which ostensibly evidences an obligation of the person who has purportedly executed it or authorized its execution.
    [Show full text]
  • Crimes Against Property
    9 CRIMES AGAINST PROPERTY Is Alvarez guilty of false pretenses as a Learning Objectives result of his false claim of having received the Congressional Medal of 1. Know the elements of larceny. Honor? 2. Understand embezzlement and the difference between larceny and embezzlement. Xavier Alvarez won a seat on the Three Valley Water Dis- trict Board of Directors in 2007. On July 23, 2007, at 3. State the elements of false pretenses and the a joint meeting with a neighboring water district board, distinction between false pretenses and lar- newly seated Director Alvarez arose and introduced him- ceny by trick. self, stating “I’m a retired marine of 25 years. I retired 4. Explain the purpose of theft statutes. in the year 2001. Back in 1987, I was awarded the Con- gressional Medal of Honor. I got wounded many times by 5. List the elements of receiving stolen property the same guy. I’m still around.” Alvarez has never been and the purpose of making it a crime to receive awarded the Congressional Medal of Honor, nor has he stolen property. spent a single day as a marine or in the service of any 6. Define forgery and uttering. other branch of the United States armed forces. The summer before his election to the water district board, 7. Know the elements of robbery and the differ- a woman informed the FBI about Alvarez’s propensity for ence between robbery and larceny. making false claims about his military past. Alvarez told her that he won the Medal of Honor for rescuing the Amer- 8.
    [Show full text]
  • Fraud, Forgery & Outright Theft
    FRAUD, FORGERY & OUTRIGHT THEFT: STRATEGIES TO PROTECT PROJECT FUNDS Joshua Levy Partner Husch Blackwell LLP Contents FOLLOWING THE MONEY ....................................................................................................... 2 CRIME THAT PAYS................................................................................................................... 3 SUBCONTRACTORS AND FRAUD .......................................................................................... 3 PREVENTION AND DETECTION TIPS ..................................................................................... 3 Contact the Author: [email protected] www.huschblackwell.com/professionals/joshua-levy This article originally appeared in Mar. 30, 2018 CE This Week and is reposted from constructionexec.com, a publication of Associated Builders and Contractors. Copyright 2018. All rights reserved. Contractors who have employees and work with vendors are vulnerable to misappropriation of money and assets. Among industries most affected by fraud, construction ranks eighth, according to the Association of Certified Fraud Examiners 2016 Global Fraud Study. The median loss of the 86 construction cases studied was $259,000. The impact of such losses can be devastating for companies, especially smaller ones that don’t have the resources to absorb them. 1 FRAUD, FORGERY AND OUTRIGHT THEFT: STRATEGIES TO PROTECT PROJECT FUNDS Theft comes in all shapes and sizes. Employees, vendors and subcontractors—even those a contractor has worked with for years—can
    [Show full text]
  • GGD-84-6 Forgery of U.S. Treasury Checks--Federal Misdemeanor Law
    * BY THE COMPTROiLER GENERAL Report To The Congress OF THE UNITEDSTATES Forgery Of U.S. Treasury Checks- Federal Misdemeanor Law Needed F’ rging of payee signatures on U.S. Treas- u Py checks is increasing. Under Federal law fc/rgery is a major crime (felony) and is pun- is(hable by up to 10 years’ imprisonment. pi lthough offenders include members of o ganized criminal groups, the majority of F deral forgery cases involve a first-time o fender and a small amount of money. For c ses involving offenders in the latter cate- ory, there is no Federal statute that autho- r zes the prosecution of a forgery case as a inor offense (misdemeanor) and the fel- ny penalty is often considered too severe. onsequently, some forgery suspects are ot prosecuted. Federal prosecutors state t at a misdemeanor check forgery statute ould provide a realistic alternative to dec- 1I ning to prosecute a minor forgery offense r prosecuting it under a felony statute. 9 bA0 recommends that forgery of a Treasury #heck under certain circumstances, such as first-time offender forging a check of nom- nal value, be subject to prosecution as a i isdemeanor. GAO/GGO-84-6 NOVEMBER 17, 1983 , Request for copies of GAO reports should be sent to: U.S. General Accounting Off ice Document Handling and Information Services Facility P.O. Box 6015 Gaithersburg, Md. 20760 Telephone (202) 2756241 The first five copies of individual reports are free of charge. Additional copies of bound audit reports are $3.25 each. Additional copies of unbound report (Le., letter reports) and most other publications are $1.00 each.
    [Show full text]
  • § N.11 Burglary, Theft and Fraud
    Immigrant Legal Resource Center, www.ilrc.org § N.11 Burglary, Theft, Fraud January 2013 § N.11 Burglary, Theft and Fraud (For more information, see Defending Immigrants in the Ninth Circuit, Chapter 9, §§ 9.10, 9.13 and 9.35, www.ilrc.org/crimes) Table of Contents I. Overview II. Burglary: How to Avoid an Aggravated Felony and CIMT III. Theft: How to Avoid an Aggravated Felony and CIMT IV. Fraud or Deceit: How to Avoid an Aggravated Felony V. Review: When Does a CIMT Conviction Cause Inadmissibility or Deportability App. 13-1 Legal Summaries to Hand to Defendants I. OVERVIEW Burglary, theft and fraud convictions have two potential immigration consequences. They could constitute an aggravated felony conviction, in the categories of burglary, theft, or a crime of violence with a year’s sentence imposed, or fraud with a loss to the victim/s exceeding $10,000.1 In addition they can and frequently do constitute a conviction of a crime involving moral turpitude (“CIMT”).2 Including in felony cases, an informed criminal defender often can avoid conviction of an aggravated felony, the more serious immigration penalty, and sometimes can avoid a CIMT. A single offense has the potential to come within multiple adverse immigration categories, e.g. be an aggravated felony as burglary and as attempted theft. Check the offense against all immigration categories in this Note. The main defense strategies to avoid an aggravated felony in this area are: To avoid an aggravated felony for burglary or theft offenses, avoid a sentence imposed of one year or more on any single count.
    [Show full text]
  • Article 21. Forgery. § 14-119. Forgery of Notes, Checks, and Other Securities; Counterfeiting of Instruments
    Article 21. Forgery. § 14-119. Forgery of notes, checks, and other securities; counterfeiting of instruments. (a) It is unlawful for any person to forge or counterfeit any instrument, or possess any counterfeit instrument, with the intent to injure or defraud any person, financial institution, or governmental unit. Any person in violation of this subsection is guilty of a Class I felony. (b) Any person who transports or possesses five or more counterfeit instruments with the intent to injure or defraud any person, financial institution, or governmental unit is guilty of a Class G felony. (c) As used in this Article, the term: (1) "Counterfeit" means to manufacture, copy, reproduce, or forge an instrument that purports to be genuine, but is not, because it has been falsely copied, reproduced, forged, manufactured, embossed, encoded, duplicated, or altered. (2) "Financial institution" means any mutual fund, money market fund, credit union, savings and loan association, bank, or similar institution, either foreign or domestic. (3) "Governmental unit" means the United States, any United States territory, any state of the United States, any political subdivision, agency, or instrumentality of any state, or any foreign jurisdiction. (4) "Instrument" means (i) any currency, bill, note, warrant, check, order, or similar instrument of or on any financial institution or governmental unit, or any cashier or officer of the institution or unit; or (ii) any security issued by, or on behalf of, any corporation, financial institution, or governmental unit. (1819, c. 994, s. 1, P.R.; R.C., c. 34, s. 60; Code, s. 1030; Rev., s. 3419; C.S., s.
    [Show full text]
  • BASIC CRIMINAL LAW LAW ENFORCEMENT ASSISTANCE ADMINISTRATION .4B Manonal CRIMINAL JUSTICE REFERENCE SERVICE (Forger, ) WASHINGTON, D.C
    If you have issues viewing or accessing this file contact us at NCJRS.gov. , • ~. • ~ ,'11 t' • • . • I . I~/.''- " I I) . ~ , I SOUTH CAROLINA LAW ENFORCEMENT ETY This micnfiche WIS produced from documents received for TRAINING PROGRAM inclusion in the NCJRS data base. Since HCJRS Clnnot exercise control mer the physical condition of the documents submitted, thti individual frame quality will vary. The resolution ch.ut on this frallle may be used to euluate the document quality. 2 5 11111 . 1.1 11 ::::i 111111.8 111111.25 111111.4 11111 1.6 MICROCOPY RESOLUTION TEST CHART NAT/ONAl BUREAU or STANDARDS-I963_A Microfilminl procedures used to cnate this fiche cOlllply with the standards set forth in 41CFR 101.11.504 POints of view or opinions stated in this docu.llt are those of th author(s) and do not represent th official position or pOlicies of the U.S. Dep;rtlllut of Justin. U.S. DEPARTMENT OF JUSTICE BASIC CRIMINAL LAW LAW ENFORCEMENT ASSISTANCE ADMINISTRATION .4b MAnONAL CRIMINAL JUSTICE REFERENCE SERVICE (Forger, ) WASHINGTON, D.C. 20531 • PART XI ·1/28/76 STUDY WORKBOOK ....~ " SOUlll CAROLINA LAW ENfORCEMENT DIVIS'OII • ill C..,.,.tlill wltll SOUTH CAROLINA EDUCATIONAL TELEVISION METWOII( ••• • -~. \ I U 't:dl'({''''1 l()~;O I ------SOUTH ---------CAROLINA ---LAW ENFORCEMENT-~--- ---------TRAINING --------PROGRAM FROM CRIME TO COURT ~ ./ ,-I' ;?~~ . " • • ~)~aSiC Criminal Law~ '\ i I I Part ~ I! - r-:; ;'~'-e- '1 ) ::';k,. I J I f I 0, • Study Workbook )\ ",~,-..:.c, IC.~, ___"""",:","" '''''''41)" •.,;, .... ..:;.:...""-... ;.• Wf"lis:;,.g,ld..riCl!lMi!t~i~ .. ;..ei,!'2d --~---,-,,-~,,-- ""f" I • • ANSWER SHEET l. is 25. deed 2.
    [Show full text]
  • FORGERY THIRD DEGREE Penal Law § 170.05 (1Committed on Or After September 1, 1967) Revised: January, 20181
    FORGERY THIRD DEGREE Penal Law § 170.05 (1Committed on or after September 1, 1967) Revised: January, 20181 The (specify) count is Forgery in the Third Degree. Under our law, a person is guilty of Forgery in the Third Degree when, with the intent to defraud, deceive or injure another he or she falsely makes, completes, or alters a written instrument. An intent to defraud, deceive, or injure another must include an intent to cause harm to that person. 2 The following terms used in that definition have a special meaning:3 INTENT means conscious objective or purpose.4Thus, a person acts with intent to defraud, deceive or injure another, when that person's conscious objective or purpose is to do so A WRITTEN INSTRUMENT means any instrument or article [including computer data or a computer program] containing written or printed matter or the equivalent thereof, used for the purpose of reciting, embodying, conveying or recording information, or constituting a symbol or evidence of value, right, privilege or identification, which is capable of being used to the 1 This instruction was revised to accord with Golb v.AttorneyGeneral, 870 F.3d 89 (2d Cir. 2017) by insertion of the third paragraph, which reads: "An intent to defraud, deceive, or injure another must include an intent to cause harm to that person." See also People v. Golb, 23 NY3d 455 (2014). 2 See note one. 3 Depending on the evidence, it may not be necessary to define all the methods by which a written instrument may be forged. 4 See Penal Law §15.05(1).
    [Show full text]
  • Default Culpability Requirements: the Model Penal Code and Beyond
    12-22-2020 Default Culpability Requirements: The Model Penal Code and Beyond Scott England Follow this and additional works at: https://digitalrepository.unm.edu/law_facultyscholarship Part of the Criminal Law Commons Articles SCOTT ENGLAND* Default Culpability Requirements: The Model Penal Code and Beyond Introduction ........................................................................................ 44 I. The Model Penal Code’s Default Culpability Provision ......... 48 A. Overview of Section 2.02(3) ............................................ 48 B. Strengths of Section 2.02(3) ............................................ 52 C. Shortcomings of Section 2.02(3) ..................................... 54 1. Failing to Anticipate Absolute Liability for Serious Criminal Offenses ......................................... 54 2. Silence About Default Culpability Requirements for Grading Provisions ............................................... 56 II. Default Culpability Provisions in Model Penal Code States .. 58 A. States Without Default Culpability Provisions ................ 59 B. States Fail to Require Culpability for Each Offense Element ............................................................................ 60 C. States Read in Culpability Levels Other than Recklessness .................................................................... 66 D. States Permit Absolute Liability Based on Legislative Intent ................................................................................ 70 E. States Fail to Require Culpability for
    [Show full text]
  • Corporate Criminal Liability in the UK: the Introduction of Deferred
    Analysis MULTI-JURISDICTIONAL GUIDE 2013/14 CORPORATE CRIME, FRAUD AND INVESTIGATIONS Corporate criminal liability in the UK: the introduction of deferred prosecution agreements, proposals for further change, and the consequences for officers and senior managers Jonathan Grimes, Rebecca Niblock and Lorna Madden Kingsley Napley LLP global.practicallaw.com/4-547-9466 "If the public interest requires more corporate prosecutions then such of a conviction, which can impact on the company's reputation and a change is high on my wish list." So said David Green, the Director ability to win future work. For both parties the agreements provide of the Serious Fraud Office (SFO), on 2 September 2013 in a speech considerable cost savings over a lengthy investigation and prosecution; to the Cambridge International Symposium on Economic Crime. As indeed for the prosecutor and the state the financial sanction within the if to reinforce this intent came the news just days later that the SFO agreement has become a way of generating significant revenue. The had charged Olympus and its UK subsidiary, Gyrus Group Ltd, with British government has been talking for some time about introducing making a statement to an auditor which was misleading, false or a similar scheme in the UK and has recently passed the primary deceptive, contrary to section 501 of the Companies Act 2006. How legislation required to enable this. greater corporate accountability can be achieved in the area of eco- Schedule 17 of the Crime and Courts Act 2013 allows the Crown nomic crime has been high on the Government's agenda (and therefore Prosecution Service (CPS) and the Serious Fraud Office (SFO) to enter on the agendas of its prosecuting authorities), for some time.
    [Show full text]