Department of Justice Journal of Federal Law and Practice

Total Page:16

File Type:pdf, Size:1020Kb

Department of Justice Journal of Federal Law and Practice DEPARTMENT OF JUSTICE JOURNAL OF FEDERAL LAW AND PRACTICE Volume 66 December 2018 Number 7 Director James A. Crowell IV Editor-in-Chief K. Tate Chambers Law Clerks Joseph Garfunkel Emily Lary Brianna Morrison Carson Sadro Sara Smith United States The Department of Justice Journal of Department of Justice Federal Law and Practice is published by Executive Office for United States the Executive Office for United States Attorneys Attorneys Washington, DC 20530 Office of Legal Education 1620 Pendleton Street Contributors’ opinions and statements Columbia, SC 29201 should not be considered an endorsement by EOUSA for any policy, program, or Cite as: service. 66 DOJ J. FED. L. & PRAC., no. 7, 2018. The Department of Justice Journal of Internet Address: Federal Law and Practice is published https://www.justice.gov/usao/resources/ pursuant to 28 C.F.R. § 0.22(b). journal-of-federal-law-and-practice Page Intentionally Left Blank Elder Justice In This Issue Introduction ........................................................................................ 1 By Acting Attorney General Matthew G. Whitaker The United States Department of Justice’s Elder Abuse Initiatives ...................................................................... 3 By Laura Ivkovich, Andy Mao, and Dr. Carrie Mulford Elder Financial Fraud Schemes: The Case for Federal Investigation and Prosecution ............... 31 By Peter E. Deegan Jr. Stop the Bleeding: Using Civil Injunctions Under 18 U.S.C. § 1345 To Stop Fraud .......................................... 39 By Jacqueline Blaesi-Freed Asset Forfeiture in Elder Fraud Schemes ................................... 61 By Kyle T. Bateman Using Fraud and Scam Reports to Fight Fraud Affecting Older Consumers ............................................................ 79 By Lois C. Greisman Money Mules: Stopping Older Adults and Others from Participating in International Crime Schemes .................................................................................. 95 By Michael C. Galdo, Monica E. Tait, Lisa E. Feldman Seeking Justice: The Department of Justice’s Civil and Criminal Tools and Strategies to Bring to Justice Nursing Homes Who Provide Grossly Substandard Care to Our Nation’s Elderly Residents ........................................................................... 113 By Susan Carney Lynch and Ellen Bowden McIntyre Using the False Claims Act to Combat Fraud by Personal Care Homes ............................................................... 129 By Michael S. Macko and Bianca Valcarce Elder Justice In This Issue Elder Justice—Federal, State, and Local Partnerships .........................................................................13 7 By Chantelle Smith and Rachel J. Scherle Promoting Elder Justice in Rural America: What the United States Department of Agriculture Brings to the Table .........................................................................1 47 By Brent Elrod Opioid Abuse and Elder Justice ................................................... 159 By Jane Pansing Brown Transnational Scam Predators and Older Adult Victims: Contributing Characteristics of Chronic Victims and Developing an Effective Response ...................................... 177 By Debbie Deem and Erik S. Lande Investigating and Prosecuting Transnational Telefraud Schemes: The India-Based Call Center Scam and Costa Rica Telemarketing Fraud Cases ..................................... 213 By J. Michael Sheckels and Jennifer L. Farer Senior Corps and the Department of Justice: Working Together to Prevent Elder Fraud and Abuse .............................................................................26 3 By Deborah Cox-Roush Responding to Elder Abuse and Neglect in American Indian and Alaska Native Communities..................................... 275 By Leslie A. Hagen Note from the Editor-in-Chief ...................................................... 305 By K. Tate Chambers Introduction Matthew G. Whitaker Acting Attorney General of the United States Elder abuse is a serious crime against some of the most decent and trusting people in our society—and it is all too common today. It is widely estimated that one in ten seniors in the United States is abused.1 That abuse can be physical, but often it is psychological or financial.2 Each year, an estimated $3 billion is stolen or defrauded from millions of American seniors through “grandparent scams,” fake prizes, romance scams, fraudulent IRS refunds, and even outright extortion.3 Unfortunately, such crimes pose a special challenge in rural communities like the one where I grew up, in which law enforcement agencies can be spread thin and where there often are fewer support services available. Exploiting seniors is a despicable crime, and under this Administration, the Department has taken sweeping action to stop it. In 2018, the Department took a series of new steps to enhance its Elder Justice program. For example, we mandated that each of the 94 United States Attorneys’ offices appoint an Elder Justice Coordinator to be responsible for formulating and leading their District’s Elder Justice strategy. Second, we partnered with the United States Department of Agriculture to amplify the Department’s education and outreach to seniors in rural America. Third, we announced the largest coordinated sweep of elder fraud cases in history, with cases involving more than 250 defendants from around the globe who victimized more than a million Americans, most of whom were elderly. The cases include criminal, civil, and forfeiture actions across more than 50 federal districts, with losses exceeding $500 million. Fourth, we ordered more training and resource guides for Elder Justice Coordinators, including residential training at the 1 Elder Abuse Prevention, CTRS. FOR DISEASE CONTROL AND PREVENTION, https://www.cdc.gov/features/elderabuse/index.html (last visited Dec. 14, 2018). 2 See id. 3 Press Release, Fed. Bureau of Investigation, FBI Tech Tuesday—Building a Digital Defense Against Elder Fraud (Mar. 27, 2018). December 2018 DOJ Journal of Federal Law and Practice 1 National Advocacy Center and this issue of the DOJ Journal. That was only the beginning. In November, I attended the Department’s Rural and Tribal Elder Justice Summit in Des Moines, Iowa, which explored the unique challenges and opportunities associated with addressing elder abuse in rural and tribal communities. At the Summit, I announced that over the next 11 months, our Office for Victims of Crime will provide nearly $18 million to help seniors who are victims of crime. Additionally, I unveiled the Money Mule Initiative, which is a coordinated effort against the transnational criminal organizations who are defrauding our seniors. I am grateful to the Executive Office for United States Attorneys’ Office of Legal Education for compiling this outstanding Journal, and I thank each of the writers, reviewers, and editors who contributed to it. This will be a helpful resource to those of you committed to investigating and prosecuting these challenging cases. Our goal is to reduce crime and protect America’s seniors. I am confident that if we work together, we can help seniors and others have the security and the peace of mind that they deserve. 2 DOJ Journal of Federal Law and Practice December 2018 The United States Department of Justice’s Elder Abuse Initiatives Laura Ivkovich Policy Analyst Office for Victims of Crime United States Department of Justice Andy Mao Deputy Director Commercial Litigation Branch and Coordinator Elder Justice Initiative United States Department of Justice Dr. Carrie Mulford Former Social Science Analyst National Institute of Justice I. Introduction The mission of the United States Department of Justice is “to enforce the law and defend the interests of the United States according to the law; to ensure public safety against threats foreign and domestic; to provide federal leadership in preventing and controlling crime; to seek punishment for those guilty of unlawful behavior; and to ensure fair and impartial administration of justice for all Americans.”1 As part of its mission, the Department of Justice has engaged in a wide array of activities to combat, prevent, and expand our understanding of elder abuse, neglect, and financial exploitation. In this article, we will highlight three of the Department of Justice’s programmatic efforts in the area of elder abuse. First, we will highlight the range of research, statistics, and evaluation projects that have been funded by the National Institute of Justice (NIJ). Second, we will highlight the Bureau of Justice Statistics (BJS), the research and statistics arms of the Department of Justice. Finally, we will highlight the Office for Victims of Crime (OVC) and their programs and initiatives to support elder abuse victims as well as elder justice professionals. 1 About DOJ, U.S. DEP’T OF JUST., http://www.justice.gov/about (last visited Oct. 15, 2018). December 2018 DOJ Journal of Federal Law and Practice 3 A. Overview The Department of Justice is the chief enforcer of our nation’s federal laws. Given its broad array of responsibilities, the Department of Justice is divided into various divisions and offices.2 The Department of Justice’s litigating components are organized into divisions, including the Criminal, Civil, and Civil Rights Divisions. In addition to enforcing the nation’s federal laws, the Department of Justice provides federal leadership and support to state, local, and tribal communities through a wide array of programs.
Recommended publications
  • Federal Register/Vol. 86, No. 134/Friday, July 16, 2021/Rules
    37674 Federal Register / Vol. 86, No. 134 / Friday, July 16, 2021 / Rules and Regulations (Federalism), it is determined that this DEPARTMENT OF JUSTICE Pennsylvania Avenue NW, Washington, action does not have sufficient DC 20530. Comments received by mail federalism implications to warrant the 28 CFR Part 50 will be considered timely if they are preparation of a Federalism Assessment. [Docket No. OAG 174; AG Order No. 5077– postmarked on or before August 16, As noted above, this action is an 2021] 2021. The electronic Federal eRulemaking portal will accept order, not a rule. Accordingly, the RIN 1105–AB61 comments until Midnight Eastern Time Congressional Review Act (CRA) 3 is at the end of that day. inapplicable, as it applies only to rules. Processes and Procedures for FOR FURTHER INFORMATION CONTACT: 5 U.S.C. 801, 804(3). It is in the public Issuance and Use of Guidance Robert Hinchman, Senior Counsel, interest to maintain the temporary Documents Office of Legal Policy, U.S. Department placement of N-ethylhexedrone, a-PHP, AGENCY: Office of the Attorney General, of Justice, telephone (202) 514–8059 4-MEAP, MPHP, PV8, and 4-chloro-a- Department of Justice. (not a toll-free number). PVP in schedule I because they pose a ACTION: Interim final rule; request for SUPPLEMENTARY INFORMATION: public health risk, for the reasons comments. expressed in the temporary scheduling I. Posting of Public Comments order (84 FR 34291, July 18, 2019). The SUMMARY: This interim final rule Please note that all comments temporary scheduling action was taken (‘‘rule’’) implements Executive Order received are considered part of the pursuant to 21 U.S.C.
    [Show full text]
  • Schwab's Fraud Encyclopedia
    Fraud Encyclopedia Updated June 2018 Contents Introduction . 3 Scams . 26 How to use this Fraud Encyclopedia . 3 1 . Properties . 28 2. Romance/marriage/sweetheart/catfishing . 28 Email account takeover . 4 3 . Investments/goods/services . .. 29 1 . Emotion . 7 4 . Prizes/lotteries . 29 2 . Unavailability . 7 5 . IRS . 30 3 . Fee inquiries . 8 6 . Payments . 30 4 . Attachments . 9 Other cybercrime techniques . 31 5 . International wires . 10 1 . Malware . 33 6 . Language cues . 10 2 . Wi-Fi connection interception . 34 7 . Business email compromise . 11 3 . Data breaches . 35 Client impersonation and identity theft . 12 4 . Credential replay incident (CRI) . 37 1 . Social engineering . 14 5 . Account online compromise/takeover . 37 2. Shoulder surfing . 14 6 . Distributed denial of service (DDoS) attack . 38 3. Spoofing . 15 Your fraud checklist . 39 4 . Call forwarding and porting . 16 Email scrutiny . 39 5 . New account fraud . 16 Verbally confirming client requests . 40 Identical or first-party disbursements . 17 Safe cyber practices . 41 1 . MoneyLink fraud . 19 What to do if fraud is suspected . 42 2 . Wire fraud . .. 19 Schwab Advisor Center® alerts . 43 3 . Check fraud . 20 4 . Transfer of account (TOA) fraud . 20 Phishing . 21 1 . Spear phishing . 23 2 . Whaling . .. 24 3 . Clone phishing . 24 4 . Social media phishing . 25 CONTENTS | 2 Introduction With advances in technology, we are more interconnected than ever . But we’re also more vulnerable . Criminals can exploit the connectivity of our world and use it to their advantage—acting anonymously How to use this to perpetrate fraud in a variety of ways . Fraud Encyclopedia Knowledge and awareness can help you protect your firm and clients and guard against cybercrime.
    [Show full text]
  • U.S. V. Connie Moorman Willis
    Case 5:17-mj-01008-PRL Document 1 Filed 02/07/17 Page 1 of 14 PageID 1 AO 91 (Rev. 11/11) Criminal Complaint UNITED STATES DISTRICT COURT for the Middle District of Florida United States of America ) v. ) ) CONNIE MOORMAN WILLIS Case No. ) 5: 17-mj-1008-PRL ) ) ) Defendant(s) I CRIMINAL COMPLAINT I i I, 1~he complainant in this case, state that the following is true to the best of my knowledge and belief. On or about the date(s) of Feb. 4, 2011 through Jan. 25, 2016 in the county of Marion in the I Middle District of Florida , the defendant(s) violated: ! j Code Section Offense Description 18 u.s.c. 1 sec. 656 Theft by a Bank Employee 18 U.S.C. Sec. 1341 Mail Fraud Tnis criminal complaint is based on these facts: I I See attached affidavit. I lifl Continued on the attached sheet. Charles Johnsten, U.S. Postal Inspector Printed name and title Sworn to before me and signed in my presence. Date: ~-1 - :lo Ir City and siate: Ocala, Florida Philip R. Lammens, U.S. Magistrate Judge Printed name and title I ! Case 5:17-mj-01008-PRL Document 1 Filed 02/07/17 Page 2 of 14 PageID 2 S'FATE OF FLORIDA CASE NO. 5:17-mj-1008-PRL I IOUNTY OF MARION AFFIDAVIT IN SUPPORT OF A CRIMINAL COMPLAINT I, Charles Johnsten, being duly sworn, state as follows: INTRODUCTION 1. I am a United States Postal Inspector and have been so employed since I obcember 2016.
    [Show full text]
  • Aging and Elder/ Dependent Abuse Assessment and Reporting Course
    Aging and Elder/ Dependent Abuse Assessment and Aspirace.com Reporting Course- 10 Hours/Units © 2021 by Aspira Continuing Education. All rights reserved. No part of this material may be transmitted or reproduced in any form, or by any means, mechanical or electronic without written permission of Aspira Continuing Education. Page 1 of 145 Course Disclaimer: The contents of this course in its entirety are for informational purposes only and are in no way intended as a replacement or substitute for independent legal advice. In no event shall Aspira Continuing Education or its content providers be liable for any claims or damages resulting from the use of or inability to use this course or the content, whether based on warranty, contract, tort, or any other legal theory, and whether or not we are advised of the possibility of such damages and is not liable for any personal injury caused by the use or misuse of any information contained throughout the following course. Objectives This course is designed to help you: 1. Explain at least two types of elder/dependent physical abuse. 2. Discuss at least two types of elder/dependent financial abuse. 3. Explain at least two elder abuse warning signs for physical abuse. 4. Discuss at least two elder abuse warning signs for financial abuse. 5. Describe at least two elder abuse warning signs for neglect. 6. Explain at least one clinical and/or legal response to suspected elder and dependent abuse. 7. Describe at least two screening and assessment tools for identifying suspected elder and/or dependent abuse. 8.
    [Show full text]
  • Intersectionality and the Disability Rights Movement: the Black Panthers, the Butterfly Brigade, and the United Farm Workers of America
    JW Marriott Austin, Texas July 19-23, 2021 Intersectionality and the Disability Rights Movement: The Black Panthers, the Butterfly Brigade, and the United Farm Workers of America Paul Grossman, J.D., P.A. Mary Lee Vance, Ph.D. Jamie Axelrod, M.S. JW Marriott Austin, Texas July 19-23, 2021 Faculty Grossman, Axelrod and Vance Consulting, Beyond the ADA Paul Grossman, J.D., P.A. US, ED, OCR, Chief Regional Civil Rights Attorney, SF, retired Guest Lecturer for Disability Law, Harvard Graduate School of Education, Hastings and Berkeley Colleges of Law, U.C. NAADAC, OCR DisNet, & CAPED Faculty Member Former AHEAD Board Member; Blosser Awardee AHEAD and CHADD Public Policy Committees Member The Law of Disability Discrimination for Higher Education Professionals, Carolina Academic Press (updated annually) JW Marriott Austin, Texas July 19-23, 2021 Faculty Grossman, Axelrod and Vance Consulting, Beyond the ADA Jamie Axelrod, M.S. Mary Lee Vance, Ph.D. Dir., Disability Resources, Northern Arizona University Dir., Services for Students with Disabilities, Sacramento State University ADA Coordinator/Section 504 Compliance Officer, Northern Arizona Former AHEAD Bd. Member; University Member, JPED Editorial Bd.; Immediate Past President AHEAD Board Member, Coalition for Disability Reviewer, NACADA National Advising Journal Access in Health Science and Education Co-editor, Beyond the ADA (NASPA 2014) Member AHEAD Public Policy Committee JW Marriott Austin, Texas July 19-23, 2021 Caveat This presentation and its associated materials are provided for informational purposes only and are not to be construed as legal advice. You should seek your Systemwide or house counsel to resolve the individualized legal issues that you are responsible for addressing.
    [Show full text]
  • Willing to Be Scammed: How Self-Control Impacts Internet Scam Compliance
    Running head: Willing to be scammed: how self-control impacts Internet scam compliance Willing to be scammed: How self-control impacts Internet scam compliance Submitted by David Modic to the University of Exeter as a thesis for the degree of Doctor of Philosophy in Psychology In September 2012 This thesis is available for Library use on the understanding that it is copyright material and that no quotation from the thesis may be published without proper acknowledgement. I certify that all material in this thesis which is not my own work has been identified and that no material has previously been submitted and approved for the award of a degree by this or any other University. Signature: ………………………………………………………….. 2 WILLING TO BE SCAMMED WILLING TO BE SCAMMED 3 Abstract At any given moment in time, there are people complying with fraudulent requests (i.e. scams) on the Internet. While the incidence rates are low (between five and ten percent of the population becoming victims on a yearly basis), the financial and emotional consequences can be high. In this Thesis we composed a unified theory of which factors made individuals more likely to comply with scams and what psychological mechanisms are unwittingly employed by con-men to make their (illegitimate marketing) offers more enticing. The strongest overall predictor of scam compliance (i.e. the extent to which an individual is likely to comply with fraudulent requests) was the level of self-control, regardless of the observed stage of a scam. On the basis of previous research, we postulated and have empirically shown that falling for a scam is a 3-stage process (i.e.
    [Show full text]
  • Important Safety Message Oakdale Police Department
    Safety Important Safety Message Oakdale Police Department Likely Perpetrators Dear• St rangersOakdale preying Residents: on older people who may be isolated,lonely, confused, or desperate for attention. • Caregivers and persons in a position of trust who use fear or guilt to take advantage of a senior. Too• Foften,amilym eresidentsmbers with a crigetminal hooked history and by/or cona artists and scammers whose intent is toh istoryfinancially of drug abuse, exploitaddiction, them. or unemployment. It isn’t just the elderly, as anyone who has received unsolicited and suspicious phone calls, mail or email spam can attest.Signs that an Older Adult Might Thebe Oakdalein Trouble Police Department urges you to review this information and discuss• Unusual it rewithcent changesloved to ones, a person's friends, account, and especially those who may need a littleincluding extra atyphelp.ical withdrawals,This bookletnew person(s) offers information on various scams, tips to avoidadded, being or sudden exploited, repeated use and of the resources seniors' ATM to help. or credit card. If• youA large work check in written a financial to someone youinstitution, don't know. money transfer company or retail • industryA change (which in their powersells of prepaid attorney or cards the or money orders), you are in a unique beneficiarieson their insurance or investment positionaccounts. to stop a scam in progress. In fact, you may be the last person who can• Unusualstop the or unnecessary customer purchases, from suchlosing as buying a large amount of his or her assets. new golf clubs or a diamond bracelet. By• stayingUnnecessary alert, home repairs.sharing concerns, and asking questions you can help protect • yourselfBecoming and close others with a muchavoid younger financial person or harm.
    [Show full text]
  • United States District Court Northern District of Alabama Southern Division
    UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ALABAMA SOUTHERN DIVISION In re HEALTHSOUTH CORPORATION ) Master File No. CV-03-BE-1500-S SECURITIES LITIGATION ) ) This Document Relates To: All Actions ) ) In re HEALTHSOUTH CORPORATION ) Consolidated Case No. CV-03-BE-1501-S STOCKHOLDER LITIGATION ) ) CLASS ACTION This Document Relates To: All Actions ) ) In re HEALTHSOUTH CORPORATION ) Consolidated Case No. CV-03-BE-1502-S BONDHOLDER LITIGATION ) ) CLASS ACTION This Document Relates To: All Actions ) ) JOINT SECOND AMENDED CONSOLIDATED CLASS ACTION COMPLAINT FOR VIOLATIONS OF THE FEDERAL SECURITIES LAWS [FACTUAL BASIS] DEMAND FOR JURY TRIAL TABLE OF CONTENTS Page INTRODUCTION ...........................................................................................................................1 The Scheme..........................................................................................................................3 Ernst & Young’s Participation in the Fraudulent Scheme...................................................5 Underwriters’ Knowing Involvement..................................................................................8 Financial Fraud ..................................................................................................................14 Medicare Fraud ..................................................................................................................15 Passage of the Balanced Budget Act and Defendants’ Sale of Stock and Notes...............16 Defendants Reinflate the Price of
    [Show full text]
  • Identity Theft What to Do If It Happens To
    Identity Theft: What to Do if It Happens to You You apply for a credit card and get turned down because of a low credit score. Yet you know that you’ve always paid your accounts on time. A debt collector calls to demand payment on a six-month overdue account for a credit card you have never had. You receive a credit card in the mail that you’ve never applied for. What’s happening? You could be a victim of identity theft, where an imposter is using your personal information. The identity thief could use your personal information for any of the following: • They may call your credit card issuer to change the billing address on your credit card account. The imposter then runs up charges on your account. Because your bills are being sent to a different address, it may be some time before you realize there’s a problem. • They may open new credit card accounts in your name. When they use the credit cards and don’t pay the bills, the delinquent accounts are reported on your credit report. • They may establish phone or wireless service in your name. • They may open a bank account in your name and write bad checks on that account. • They may counterfeit checks or credit or debit cards, or authorize electronic transfers in your name and drain your bank account. • They may file for bankruptcy under your name to avoid paying debits they’ve incurred under you name or to avoid eviction. • They may buy a car by taking out an auto loan in your name.
    [Show full text]
  • Protect Yourself. Don't Be a Victim of Fraud
    ROCIC • REGIONAL ORGANIZED CRIME INFORMATION CENTER • www.riss.net Tips to Protect Yourself ►Don’t Be A Victim! ROCIC • REGIONAL ORGANIZED CRIME INFORMATION CENTER • www.riss.net Protect Yourself • Don’t Be a Victim of Fraud 1 Table of Contents Con Artists and FlimFlams • 3 Bank Examiner • Broken Bottle Scam • Caller ID or Spoofing • C.O.D. Scam • Diversion Burglary • Door-to-Door Solicitor • Fortune Telling Fraud • Handkerchief Switch • Jury Duty Scam • Latin Lotto • Lottery Scams/Foreign Lottery • Lotteries • Pickpocket Diver- sion • Pigeon Drop • Police Follow-Up Scam • Recovery Rooms • Rock in a Box • Sweet- heart Swindle Con • Three-Card-Monte • Toner Rooms • Truck Stop Three-Card-Monte • Yellow Page Advertising Scheme Business and Investment Fraud • 17 Business Fraud • Telemarketing Fraud • Nigerian Letter or 419 Fraud • Advance Fee Schemes • Fake Check Scam • Redemption/Strawman/Bond Fraud • Letter of Credit Fraud • Prime Bank Note Fraud • Ponzi Schemes • Pyramid Schemes • Market Manipula- tion or Pump and Dump Fraud Identity Theft • 29 Fraud Against Senior Citizens • 30 Counterfeit Prescription Fraud • Funeral and Cemetery Fraud • Fraudulent Anti-Aging Products • Reverse Mortgage Fraud • Long Term Care Insurance Fraud Telemarketing Fraud • 36 Automobile Insurance Fraud • 42 Medical and Insurance Fraud • 46 Medical Equipment Fraud • Medicare Fraud • Dental • Medical Identity Scams • False Medical Claims • Discount Cards for Medical Insurance • Obamacare Scams • Medicare Scams • Workers Compensation • Stolen Premiums • Crooked Doctors and Lawyers Travel Industry Fraud • 57 Social Media Fraud • 61 Computer Fraud • 63 Internet Fraud • 65 Internet Auction Fraud • Internet Non-Delivery of Merchandise • Credit Card Fraud • Internet Investment Fraud • Preventing Online Fraud Home Improvement Fraud • 71 REGIONAL ORGANIZED CRIME INFORMATION CENTER • A RISS Center Protect Yourself • Don’t Be a Victim of Fraud 2 Sources of Information Many of the narratives for electronic or Internet fraud came from the FBI website at www.fbi.gov.
    [Show full text]
  • A Joint Bench Bar Conference
    The Maryland Judiciary and The Maryland State Bar Association, Inc. Present A JOINT BENCH BAR CONFERENCE DRAFT PROGRAM Clarion Resort Fontainebleau Hotel June 15-18, 2016 Ocean City, Maryland 1 | Page ~Notice of Meeting~ Notice is hereby given of the Annual Business Meeting of the Maryland State Bar Association to be held at the Clarion Resort Fontainebleau Hotel Crystal Ballroom on Saturday, June 18, 2016 at 8:30 a.m. DAILY ACTIVITIES WEDNESDAY – SATURDAY Discount Tickets Available Various Ocean City Locations FAMILY DAYS AT CABANA JOLLY ROGER AMUSEMENT PARK HOSPITALITY SUITES 30th Street and Coastal Highway Conveniently located poolside at the Clarion Hotel. Pier Location –401 South Atlantic Ave. Check the hotel message board for times. 10:00 a.m. – 6:00 p.m. Splash Mountain Water Park Back by Popular Demand $23.00 - all day! __________ THE WELLNESS SPOT Sponsored by: 10:00 a.m. – 6:00 p.m. Lawyer Assistance Program Amusement Rides and Maryland State Bar Association Miniature Golf $16.00 – all day! Stop by the Exhibit Hall and __________ have your Blood Pressure and Bone Density checked and *10:00 a.m. – 6:00 p.m. much more! Open during Speed World regular Exhibit Hall hours. Unlimited rides for *2 hours $32.00 Tickets will be available at the MSBA CHILD CARE SERVICES Registration Desk at the Clarion. Dial-A-Nanny - Pat Bennett - 410.641.2977. This information is provided as a service to our members; however the Maryland State Bar Association makes no recommendation of any service. 2 | Page Need CLE Credits? MSBA CLE: Raising the Bar for Education Please stop by the MSBA CLE booth to receive a Uniform Certificate of Attendance prior to attending any MSBA educational program.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]