Department of Justice Journal of Federal Law and Practice

Total Page:16

File Type:pdf, Size:1020Kb

Department of Justice Journal of Federal Law and Practice DEPARTMENT OF JUSTICE JOURNAL OF FEDERAL LAW AND PRACTICE Volume 69 May 2021 Number 3 Director Monty Wilkinson Editor-in-Chief Christian A. Fisanick Managing Editor E. Addison Gantt Associate Editors Gurbani Saini Philip Schneider Law Clerks Rachel Buzhardt Joshua Garlick Rebekah Griggs Mary Harriet Moore Garrett Simpson United States The Department of Justice Journal of Department of Justice Federal Law and Practice is published by Executive Office for the Executive Office for United States United States Attorneys Attorneys Washington, DC 20530 Office of Legal Education 1620 Pendleton Street Contributors’ opinions and Columbia, SC 29201 statements should not be considered an endorsement by Cite as: EOUSA for any policy, 69 DOJ J. FED. L. & PRAC., no. 3, 2021. program, or service. Internet Address: The Department of Justice Journal https://www.justice.gov/usao/resources/ of Federal Law and Practice is journal-of-federal-law-and-practice published pursuant to 28 C.F.R. § 0.22(b). Page Intentionally Left Blank Technology & Law In This Issue Introduction ........................................................................................ 1 Puneet V. Kakkar & Jo seph Wheatley Overcoming Technical Obfuscation: NITs and Remote Search Warrants ................................................................................. 3 Puneet V. Kakkar & Joseph Wheatley Introduction to the FinTech Ecosystem ...................................... 23 Jill Westmoreland Rose, Kelli Andrews, & Karyn Kenny Privilege in Data Breach Investigations ..................................... 39 Brian Mund & Leonard Bailey Using Blockchain Analysis From Investigation to Trial .......... 59 C. Alden Pelker, Christopher B. Brown, & Richard M. Tucker Prosecuting Sex Trafficking Cases in the Wake of the Backpage Takedown and the World of Cryptocurrency ........ 101 Jane Khodarkovsky, April N. Russo, & Lauren E. Britsch Finding Clarity in Crisis: How Technological Challenges Present Investigative Opportunities in the Time of a Pandemic .......................................................................................... 127 Denise O. Simpson & Nathaniel C. Kummerfeld From Beepers to Smartphones: Challenges in Applying Title III to Modern Communication Technology ..................... 141 Jeffrey S. Pollak, Douglas D. Guidorizzi, & Shanai T. Watson Carpenter’s Practical Implications for Law Enforcement and the Fourth Amendment ......................................................... 159 Annamartine Salick & Anil J. Antony Surfing the First Wave of Cryptocurrency Money Laundering ...................................................................................... 183 Alexandra D. Comolli & Michele R. Korver Know Before You Go: Navigating Double Jeopardy Issues When Your Investigation Heads to Europe .................. 237 Christen Gallagher Crime in the Sky—Prosecuting Drone Offenses ...................... 255 Matthew J. Cronin Technology & Law In This Issue DOJ and Drones: Protection, Policy, and Enforcement .......... 275 Colin T. Ross & Kevin M. Jinks Recent Case Law Developments Involving the Crime–Fraud Exception: The Attorney–Client Privilege, Filter Teams Protocols, and Other Privileges ........................... 289 Gretchen C. F. Shappert & Christopher J. Costantini Note From the Editor-in-Chief ..................................................... 355 Christian A. Fisanick Introduction Puneet V. Kakkar Deputy Chief, International Narcotics, Money Laundering, and Racketeering Section Central District of California on detail as the Resident Legal Advisor, Gulf Region Joseph Wheatley Former Deputy Director Joint Task Force Vulcan The Department of Justice (Department), since its establishment over 150 years ago, remains steadfast in its mission to “ensure [the] fair and impartial administration of justice for all Americans.”1 To carry out that mission, it must keep pace with the ever-changing landscape of criminal activity and the various ways that technology shapes that landscape—including the facilitation, prevention, investigation, and prosecution of criminal activity. Moreover, it must ensure that the nature and approach of its litigation manages such challenges. This issue of the Department of Justice Journal of Federal Law and Practice (DOJ Journal) addresses some of the dynamic technological challenges that federal prosecutors, agents, analysts, paralegals, and other personnel face on a regular basis around the country, from investigations to litigation. Building off the May 2020 issue of the DOJ Journal, which focused on developing eLitigation skills and proficiencies to keep pace with ever-advancing technology in the context of producing electronic discovery and the entire lifecycle of electronic evidence,2 this issue turns the perspective towards technology-based criminal activities and technology-based strategies and tools for investigating and prosecuting cases. Articles in this issue focus on, among other things, the impact that the fast-changing fields of cryptocurrency and FinTech have on our traditional understanding of best practices for prosecuting bad actors. Authors in this issue have also explored constitutional and statutory issues that lie at the heart of criminal investigations involving advanced technology, from remote search warrants to drones to 1 About DOJ, U.S. DEP’T OF JUST., https://www.justice.gov/about (last visited Apr. 26, 2021). 2 68 DOJ J. Fed. L & Prac., no 3, 2020. May 2021 DOJ Journal of Federal Law and Practice 1 interception of communications. Finally, this issue also covers some of the practical issues that arise in every litigation, but more so in the technological context, such as unique issues in extraditions and the attorney–client privilege. These articles, drawing from the institutional knowledge and experience of our colleagues, provide timely and valuable insights and guidance about dynamic technological issues that impact the Department and its mission every day. The articles reflect that the Department has successfully addressed new technological challenges in a variety of areas and is prepared to tackle new ones going forward. 2 DOJ Journal of Federal Law and Practice May 2021 Overcoming Technical Obfuscation: NITs and Remote Search Warrants Puneet V. Kakkar Deputy Chief, International Narcotics, Money Laundering, and Racketeering Section U.S. Attorney’s Office for the Central District of California on detail as the Resident Legal Advisor, Gulf Region Joseph Wheatley Former Deputy Director Joint Task Force Vulcan I. Introduction The Government’s efforts to contain child pornographers, terrorists and the like cannot remain frozen in time; the Government must be allowed to utilize its own advanced technology to keep pace with our world’s ever-advancing technology and novel criminal methods.1 With criminal activity increasingly leveraging technology—from the darknet to encrypted platforms of communication to cryptocurrency2— law enforcement has utilized more advanced measures of obtaining evidence and uncovering criminal activity that respects and remains consistent with the Fourth Amendment of the U.S. Constitution. In the past year alone, criminal actors have used advanced technology to 1 United States v. Matish, 193 F. Supp. 3d 585, 622 (E.D. Va. 2016). 2 See generally U.S. DEP’T OF JUST., OFF. OF THE DEPUTY ATT’Y GEN., REPORT OF THE ATTORNEY GENERAL’S CYBER-DIGITAL TASK FORCE (2020), https://www.justice.gov/ag/page/file/1326061/download. May 2021 DOJ Journal of Federal Law and Practice 3 further—and conceal their involvement in—child exploitation,3 cybercrime,4 drug trafficking,5 and terrorist finance.6 To unmask these criminal activities and actors, investigators and prosecutors have obtained search warrants in various scenarios for permission to deploy technological measures, known as network investigative techniques (“NIT warrants”) or “remote search warrants,” to remotely search computers or other accounts without the consent or knowledge of the users. This article provides a brief explanation about the practical applications of NIT warrants and remote search techniques; the venues where they may be obtained, made clear by a recent amendment of Rule 41; legal challenges before this amendment; recent applications of these techniques; and legal challenges they may face based on historical context.7 II. About NITs, remote search techniques, and their uses NIT warrants and remote searches are two recurring applications of Rule 41 in investigations where criminal actors attempt to obfuscate their identities and presence. NITs have been used over the past decade in significant criminal investigations. NITs allow investigators to ascertain more information about computers—and the individuals using computers—connected to a network by deploying a code or program to the computers. For example, NITs can obtain information about a computer’s IP address, 3 E.g., Press Release, U.S. Dep’t of Justice, South Korean National and Hundreds of Others Charged Worldwide in the Takedown of the Largest Darknet Child Pornography Website, Which was Funded by Bitcoin (Oct. 16, 2019). 4 E.g., Press Release, U.S. Dep’t of Justice, Six Russian GRU Officers Charged in Connection with Worldwide Deployment of Destructive Malware and Other Disruptive Actions in Cyberspace (Oct. 19, 2020). 5 E.g., Press Release, U.S. Dep’t of Justice, Alleged Southern California Narcotics Traffickers Among Those Charged in International Crackdown Targeting Darknet Dealers (Sept. 22, 2020). 6 E.g., Press Release, U.S. Dep’t of Justice,
Recommended publications
  • BBC World Service : Overseas Broadcasting, 1932-2018 Pdf Free Download
    BBC WORLD SERVICE : OVERSEAS BROADCASTING, 1932-2018 PDF, EPUB, EBOOK Gordon Johnston | 338 pages | 26 Nov 2019 | Palgrave MacMillan | 9780230355606 | English | Basingstoke, United Kingdom BBC World Service : Overseas Broadcasting, 1932-2018 PDF Book Radio Times. A few months ago this was valuable information for those travelling abroad who wanted their fix of BBC radio coverage. Within a decade, the service began adding languages and regions, and currently broadcasts to people around the world in 27 languages, with a broad range of programs including news, music, comedy and documentaries. Ships within weeks Not available in stores. The Travel Show , Our World. Secession [Hardcover] Hardback. The Doha Debates. The easiest way to work around such restrictions is by using a VPN. Featuring psalm settings for each Sunday and all the major feast days, this essential musical resource is the first publication to feature the psalm texts that are used in the new Canadian lectionary. Huw Edwards. As radio streams don't hog bandwidth to the extent that streaming TV does, most good VPN services are perfectly adequate for virtually moving back to the UK to listen to a restricted programme. Can I view this online? Retrieved 21 November BBC Television. BBC portal. Editor: Sarah Smith. Retrieved 9 February The Bottom Line. The Random House Group. Advanced search Search history. We have recently updated our Privacy Policy. Need Help? The phrase "but for now" means among other things "making do," as if we had to settle for the bare minimum. Presenters who have normal shows and also Relief present have their relief shows in bold.
    [Show full text]
  • 6 Cybercrime
    Internet and Technology Law: A U.S. Perspective Cybercrime 6 Cybercrime Objectives Ater completing this chapter, the student should be able to: • Describe the three types of computer crime; • Describe and deine the types of Internet crime that target individuals and businesses; and • Explain the key federal laws that target Internet crime against property. 6.1 Overview his chapter will review privacy and security breaches on the Internet that are of a criminal nature, or called cybercrime. Broadly speaking, cybercrime is deined as any illegal action that uses or targets computer networks to violate the law. he U.S. Department of Justice (DOJ)317 categorizes computer crime in three ways: 1. As a target: a computer is the subject of the crime (such causing computer damage). For example, a computer attacks the computer(s) of others in a malicious way (such as spreading a virus). 2. As a weapon or a tool: a computer is used to help commit the crime. his means that the computer is used to commit “traditional crime” normally occurring in the physical world (such as fraud or illegal gambling). 3. As an accessory or incidental to the crime: a computer is used peripherally (such as for recordkeeping purposes). he DOJ suggests this would be using a computer as a “fancy iling cabinet” to store illegal or stolen information.318 6.2 Types of Crimes Many types of crimes are committed in today’s networked environment. hey can involve either people, businesses, or property. Perhaps you have been a victim of Internet crime, or chances are you know someone who has been a victim.
    [Show full text]
  • Global Philanthropy Forum Conference April 18–20 · Washington, Dc
    GLOBAL PHILANTHROPY FORUM CONFERENCE APRIL 18–20 · WASHINGTON, DC 2017 Global Philanthropy Forum Conference This book includes transcripts from the plenary sessions and keynote conversations of the 2017 Global Philanthropy Forum Conference. The statements made and views expressed are solely those of the authors and do not necessarily reflect the views of GPF, its participants, World Affairs or any of its funders. Prior to publication, the authors were given the opportunity to review their remarks. Some have made minor adjustments. In general, we have sought to preserve the tone of these panels to give the reader a sense of the Conference. The Conference would not have been possible without the support of our partners and members listed below, as well as the dedication of the wonderful team at World Affairs. Special thanks go to the GPF team—Suzy Antounian, Bayanne Alrawi, Laura Beatty, Noelle Germone, Deidre Graham, Elizabeth Haffa, Mary Hanley, Olivia Heffernan, Tori Hirsch, Meghan Kennedy, DJ Latham, Jarrod Sport, Geena St. Andrew, Marla Stein, Carla Thorson and Anna Wirth—for their work and dedication to the GPF, its community and its mission. STRATEGIC PARTNERS Newman’s Own Foundation USAID The David & Lucile Packard The MasterCard Foundation Foundation Anonymous Skoll Foundation The Rockefeller Foundation Skoll Global Threats Fund Margaret A. Cargill Foundation The Walton Family Foundation Horace W. Goldsmith Foundation The World Bank IFC (International Finance SUPPORTING MEMBERS Corporation) The Leona M. and Harry B. Helmsley Charitable Trust MEMBERS Conrad N. Hilton Foundation Anonymous Humanity United Felipe Medina IDB Omidyar Network Maja Kristin Sall Family Foundation MacArthur Foundation Qatar Foundation International Charles Stewart Mott Foundation The Global Philanthropy Forum is a project of World Affairs.
    [Show full text]
  • Guidelines to Making Programmes for BBC World Service
    Guidelines to Making Programmes for BBC World Service Titles and Descriptions It’s not just the programmes that need to have a sense of excitement and the ability to create curiosity in our audience and potential audience. Whatever we publish - titles, billings, online descriptions etc (known as ‘metadata’) - have an effect on how your programme performs on the web. Programme titles and descriptions should always be written in a way that encourages the most people to listen to it, makes the programme topic clear, and ensures visibility and findability across the web - in podcast provider spaces (such as Apple Podcasts, Spotify etc.), search engine results (such as Google) and other tech, such as voice-activated systems (such as Alexa). We need to have titles and programme descriptions five weeks before the transmission date. This ensures that both Press and Publicity have time to adequately promote the programme, and that these descriptions are ready in time for our automated systems. It can be difficult to update programme descriptions at some of their publication sites if the information arrives too close to transmission. Titles Indicate immediately what the programme or podcast is about. • Use clear simple language – no puns. Show the value of your content • Be succinct - take out any unnecessary words (use 50 characters max) • Put the words that convey most about the story at the front (apps may cut off the end of the title) • Use search terms so people can discover your content Examples of Good Titles • The Death Row book club • In search of the quarter-life crisis • ADHD and me • Finding the viruses that destroy superbugs • How Christo wrapped the Reichstag 1 Programme Descriptions We need you to provide two descriptions for each programme you deliver.
    [Show full text]
  • Tutorial Blogspot Plus Blogger Templates
    Tutorial Blogspot Plus Blogger Templates To Bloggers Everywhere 1 2 Contents Contact Us 25 Cara daftar Gmail 25 Cara daftar Blogger pertama kali 27 Cara login ke blogger pertama kali 28 Kontrol panel blogger (dashboard) 29 Cara posting di blogger 30 Halaman Pengaturan (menu dasar) 31 Banyak malware yang ditemukan google 32 Google ! Mesin pembobol yang menakutkan 32 Web Proxy (Anonymous) 33 Daftar alamat google lengkap 34 Google: tampil berdasarkan Link 37 Oom - Pemenang kontes programming VB6 source code 38 (www.planet-sourc... Oom - Keyboard Diagnostic 2002 (VB6 - Open Source) 39 Oom - Access Siemens GSM CellPhone With Full 40 AT+Command (VB6 - Ope... Oom - How to know speed form access (VB6) 40 Para blogger haus akan link blog 41 Nama blog cantik yang disia-siakan dan apakah pantas nama 41 blog dipe... Otomatisasi firewalling IP dan MAC Address dengan bash script 43 Firewalling IP Address dan MAC Address dengan iptables 44 Meminimalis serangan Denial of Service Attacks di Win Y2K/XP 47 Capek banget hari ini.. 48 3 daftar blog ke search engine 48 Etika dan cara promosi blog 49 Tool posting dan edit text blogger 52 Setting Blog : Tab Publikasi 53 Wordpress plugins untuk google adsense 54 Google meluncurkan pemanggilan META tag terbaru 54 “unavailable after” Setting Blog : Tab Format 55 Melacak posisi keyword di Yahoo 56 Mengetahui page ranking dan posisi keyword (kata kunci) anda 56 pada S... Percantik halaman blog programmer dengan "New Code 57 Scrolling Ticke... 20 Terbaik Situs Visual Basic 58 BEST BUY : 11 CD Full Source Code Untuk Programmer 60 Tips memulai blog untuk pemula 62 Lijit: Alternatif search untuk blogger 62 Berpartisipasi dalam Blog "17 Agustus Indonesia MERDEKA" 63 Trafik di blog lumayan, tapi kenapa masih aja minim komentar? 64 Editor posting compose blogger ternyata tidak "wysiwyg" 65 Google anti jual beli link 65 Tips blogger css validator menggunakan "JavaScript Console" 65 pada Fl..
    [Show full text]
  • Here a Causal Relationship? Contemporary Economics, 9(1), 45–60
    Bibliography on Corruption and Anticorruption Professor Matthew C. Stephenson Harvard Law School http://www.law.harvard.edu/faculty/mstephenson/ March 2021 Aaken, A., & Voigt, S. (2011). Do individual disclosure rules for parliamentarians improve government effectiveness? Economics of Governance, 12(4), 301–324. https://doi.org/10.1007/s10101-011-0100-8 Aaronson, S. A. (2011a). Does the WTO Help Member States Clean Up? Available at SSRN 1922190. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1922190 Aaronson, S. A. (2011b). Limited partnership: Business, government, civil society, and the public in the Extractive Industries Transparency Initiative (EITI). Public Administration and Development, 31(1), 50–63. https://doi.org/10.1002/pad.588 Aaronson, S. A., & Abouharb, M. R. (2014). Corruption, Conflicts of Interest and the WTO. In J.-B. Auby, E. Breen, & T. Perroud (Eds.), Corruption and conflicts of interest: A comparative law approach (pp. 183–197). Edward Elgar PubLtd. http://nrs.harvard.edu/urn-3:hul.ebookbatch.GEN_batch:ELGAR01620140507 Abbas Drebee, H., & Azam Abdul-Razak, N. (2020). The Impact of Corruption on Agriculture Sector in Iraq: Econometrics Approach. IOP Conference Series. Earth and Environmental Science, 553(1), 12019-. https://doi.org/10.1088/1755-1315/553/1/012019 Abbink, K., Dasgupta, U., Gangadharan, L., & Jain, T. (2014). Letting the briber go free: An experiment on mitigating harassment bribes. JOURNAL OF PUBLIC ECONOMICS, 111(Journal Article), 17–28. https://doi.org/10.1016/j.jpubeco.2013.12.012 Abbink, Klaus. (2004). Staff rotation as an anti-corruption policy: An experimental study. European Journal of Political Economy, 20(4), 887–906. https://doi.org/10.1016/j.ejpoleco.2003.10.008 Abbink, Klaus.
    [Show full text]
  • News and Documentary Emmy Winners 2020
    NEWS RELEASE WINNERS IN TELEVISION NEWS PROGRAMMING FOR THE 41ST ANNUAL NEWS & DOCUMENTARY EMMY® AWARDS ANNOUNCED Katy Tur, MSNBC Anchor & NBC News Correspondent and Tony Dokoupil, “CBS This Morning” Co-Host, Anchor the First of Two Ceremonies NEW YORK, SEPTEMBER 21, 2020 – Winners in Television News Programming for the 41th Annual News and Documentary Emmy® Awards were announced today by The National Academy of Television Arts & Sciences (NATAS). The News & Documentary Emmy® Awards are being presented as two individual ceremonies this year: categories honoring the Television News Programming were presented tonight. Tomorrow evening, Tuesday, September 22nd, 2020 at 8 p.m. categories honoring Documentaries will be presented. Both ceremonies are live-streamed on our dedicated platform powered by Vimeo. “Tonight, we proudly honored the outstanding professionals that make up the Television News Programming categories of the 41st Annual News & Documentary Emmy® Awards,” said Adam Sharp, President & CEO, NATAS. “As we continue to rise to the challenge of presenting a ‘live’ ceremony during Covid-19 with hosts, presenters and accepters all coming from their homes via the ‘virtual technology’ of the day, we continue to honor those that provide us with the necessary tools and information we need to make the crucial decisions that these challenging and unprecedented times call for.” All programming is available on the web at Watch.TheEmmys.TV and via The Emmys® apps for iOS, tvOS, Android, FireTV, and Roku (full list at apps.theemmys.tv). Tonight’s show and many other Emmy® Award events can be watched anytime, anywhere on this new platform. In addition to MSNBC Anchor and NBC.
    [Show full text]
  • Health Care Fraud and Abuse Control Program Annual Report for Fiscal Year 2019
    The Department of Health and Human Services And The Department of Justice Health Care Fraud and Abuse Control Program Annual Report for Fiscal Year 2019 June 2020 TABLE OF CONTENTS I. Executive Summary 1 II. Statutory Background 3 III. Program Results and Accomplishments 5 Monetary Results 5 Expenditures 7 Overall Recoveries 8 Health Care Fraud Prevention and Enforcement Action Team 8 Health Care Fraud Prevention Partnership 10 Strike Forces 10 Opioid Fraud and Abuse Detection Unit 13 Highlights of Successful Criminal and Civil Investigations 14 IV. Department of Health and Human Services 39 Office of Inspector General 39 Centers for Medicare & Medicaid Services 61 Administration on Community Living 85 Office of the General Counsel 88 Food and Drug Administration Pharmaceutical Fraud Program 91 V. Department of Justice 95 United States Attorneys 95 Civil Division 96 Criminal Division 102 Civil Rights Division 107 Department of Justice Office of Inspector General 110 VI. Appendix 112 Federal Bureau of Investigation 112 Return on Investment Calculation 116 Total HCFAC Resources 117 VII. Glossary of Terms 118 GENERAL NOTE All years are fiscal years unless otherwise stated in the text. EXECUTIVE SUMMARY The Health Insurance Portability and Accountability Act of 1996 (HIPAA) established a national Health Care Fraud and Abuse Control Program (HCFAC or the Program) under the joint direction of the Attorney General and the Secretary of the Department of Health and Human Services (HHS),1 acting through the Inspector General, designed to coordinate federal, state and local law enforcement activities with respect to health care fraud and abuse. In its twenty-third year of operation, the Program’s continued success confirms the soundness of a collaborative approach to identify and prosecute the most egregious instances of health care fraud, to prevent future fraud and abuse, and to protect program beneficiaries.
    [Show full text]
  • ON the EFFECTIVE USE of PROXY WARFARE by Andrew Lewis Peek Baltimore, Maryland May 2021 © 2021 Andrew Peek All Rights Reserved
    ON THE EFFECTIVE USE OF PROXY WARFARE by Andrew Lewis Peek A dissertation submitted to Johns Hopkins University in conformity with the requirements for the degree of Doctor of Philosophy Baltimore, Maryland May 2021 2021 Andrew Peek All rights reserved Abstract This dissertation asks a simple question: how are states most effectively conducting proxy warfare in the modern international system? It answers this question by conducting a comparative study of the sponsorship of proxy forces. It uses process tracing to examine five cases of proxy warfare and predicts that the differentiation in support for each proxy impacts their utility. In particular, it proposes that increasing the principal-agent distance between sponsors and proxies might correlate with strategic effectiveness. That is, the less directly a proxy is supported and controlled by a sponsor, the more effective the proxy becomes. Strategic effectiveness here is conceptualized as consisting of two key parts: a proxy’s operational capability and a sponsor’s plausible deniability. These should be in inverse relation to each other: the greater and more overt a sponsor’s support is to a proxy, the more capable – better armed, better trained – its proxies should be on the battlefield. However, this close support to such proxies should also make the sponsor’s influence less deniable, and thus incur strategic costs against both it and the proxy. These costs primarily consist of external balancing by rival states, the same way such states would balance against conventional aggression. Conversely, the more deniable such support is – the more indirect and less overt – the less balancing occurs.
    [Show full text]
  • Hot Topics in Fraud and Abuse Enforcement Involving Health Care Providers
    Hot Topics in Fraud and Abuse Enforcement Involving Health Care Providers Stephen C. Payne (moderator) Winston Y. Chan John D. W. Partridge Jonathan M. Phillips September 22, 2016 Agenda • Applicable Law • Enforcement Trends • Enforcement Theories • Recent Legal Developments • Questions 2 Applicable Law The False Claims Act (FCA) • The FCA, 31 U.S.C. §§ 3729-3733, is the federal government’s primary weapon to redress fraud against government agencies and programs. • The FCA provides for recovery of civil penalties and treble damages from any person who knowingly submits or causes the submission of false or fraudulent claims to the United States for money or property. “It seems quite clear that the objective of Congress was broadly • Under the FCA, the Attorney General, through DOJ to protect the funds attorneys, investigates and pursues FCA cases (except in and property of the declined qui tam cases). Government from fraudulent claims ….” Rainwater v. United States, 356 U.S. 590 (1958) 4 FCA – Key Provisions 31 U.S.C. Statutory Prohibition Summary § 3729(a)(1) (A) Knowingly presents, or causes to be presented, False/Fraudulent Claim a false or fraudulent claim for payment or approval (B) Knowingly makes, uses or causes to be made or False used, a false record or statement material to a Record/Statement false or fraudulent claim (C) Knowingly conceals or knowingly and improperly “Reverse” False Claim avoids or decreases an obligation to pay or transmit money or property to the Government (G) Conspires to violate a liability provision of
    [Show full text]
  • Electronic Mail Haibo Zhang Computer Science, University of Otago
    COSC301 Network Management and Security Lecture 14: Electronic Mail Haibo Zhang Computer Science, University of Otago COSC301 Lecture 14: Electronic Mail 1 Today’s Focus Electronic Mail -- How does it work? -- How to manage it? -- How to ensure security & privacy? COSC301 Lecture 14: Electronic Mail 2 What is an email? • A formatted file in ASCII code • Consists of Mail From: [email protected] • Envelope RCPT To: [email protected] envelope • Header From: Haibo Zhang To: Zhiyi Huang Date: 01/01/2015 header • Body Subject: Meeting Dear Zhiyi, Could we have a meeting on this Friday? body Cheers, Haibo COSC301 Lecture 14: Electronic Mail 3 Components in Email Architecture • User Agent (UA) – For users to compose, send, and browse emails – pine, Mail, ThunderBird • Mail Transport Agent (MTA) – Emails are handed to it for delivery – sendmail, exim • Mail Access Agent (MAA) – Retrieve message from mailbox COSC301 Lecture 14: Electronic Mail 4 Email Architecture User mail app User Agent local host host local Agent mail app MTA sendmail sendmail MTA MTA MTA server server relay Internet relay MTA MTA Mail server Mail server COSC301 Lecture 14: Electronic Mail 5 Email Protocols • SMTP (Simple Mail Transfer Protocol) – Email delivery protocol between two MTAs – Used twice: between the sender and the sender’s mail server and between the two mail servers • Mail fetching protocols – Between the receiver and its mail server – Post Office Protocol (POP): simple but limited in functionality – Internet Mail Access Protocol (IMAP): more features, more
    [Show full text]
  • Annual Report on the BBC 2019/20
    Ofcom’s Annual Report on the BBC 2019/20 Published 25 November 2020 Raising awarenessWelsh translation available: Adroddiad Blynyddol Ofcom ar y BBC of online harms Contents Overview .................................................................................................................................... 2 The ongoing impact of Covid-19 ............................................................................................... 6 Looking ahead .......................................................................................................................... 11 Performance assessment ......................................................................................................... 16 Public Purpose 1: News and current affairs ........................................................................ 24 Public Purpose 2: Supporting learning for people of all ages ............................................ 37 Public Purpose 3: Creative, high quality and distinctive output and services .................... 47 Public Purpose 4: Reflecting, representing and serving the UK’s diverse communities .... 60 The BBC’s impact on competition ............................................................................................ 83 The BBC’s content standards ................................................................................................... 89 Overview of our duties ............................................................................................................ 96 1 Overview This is our third
    [Show full text]