CENTRAL DISTRICT United States V. Jay R. Echouafni Et Al
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Double Horizon Defense Design for Robust Regulation of Malicious Traffic
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering August 2006 A Double Horizon Defense Design for Robust Regulation of Malicious Traffic Ying Xu University of Pennsylvania, [email protected] Roch A. Guérin University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/ese_papers Recommended Citation Ying Xu and Roch A. Guérin, "A Double Horizon Defense Design for Robust Regulation of Malicious Traffic", . August 2006. Copyright 2006 IEEE. In Proceedings of the Second IEEE Communications Society/CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm 2006). This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Pennsylvania's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/ese_papers/190 For more information, please contact [email protected]. A Double Horizon Defense Design for Robust Regulation of Malicious Traffic Abstract Deploying defense mechanisms in routers holds promises for protecting infrastructure resources such as link bandwidth or router buffers against network Denial-of-Service (DoS) attacks. However, in spite of their efficacy against bruteforce flooding attacks, existing outer-basedr defenses often perform poorly when confronted to more sophisticated attack strategies. -
In the United States District Court for the Middle District of Alabama Northern Division
Case 2:13-cr-00144-LSC-TFM Document 38 Filed 12/19/13 Page 1 of 28 IN THE UNITED STATES DISTRICT COURT FOR THE MIDDLE DISTRICT OF ALABAMA NORTHERN DIVISION UNITED STATES OF AMERICA ) ) v. ) CASE NO. 2:13-cr-144-MEF-TFM ) [wo] EDMUND MCCALL ) RECOMMENDATION OF THE MAGISTRATE JUDGE I. INTRODUCTION Pursuant to 28 U.S.C. § 636(b)(1) this case was referred to the undersigned United States Magistrate Judge for review and submission of a report with recommended findings of fact and conclusions of law. On August 22, 2013, the Grand Jury for the Middle District of Alabama returned an indictment against Antonio Harris (“Harris”) and defendant, Edmund McCall (“McCall” or “Defendant”). Count 1 of the Indictment alleges McCall and others conspired to use the mail and wire communications to execute a scheme and artifice to defraud the United States by filing false, federal income tax returns from 2010 through October 29, 2012. Count 2-6 of the Indictment alleges McCall and others executed the scheme and artifice to defraud the United States by 5 wire communications between January 16, 2012 and March 7, 2012. Counts 7 and 8 of the Indictment allege Harris and McCall engaged in identity theft and aggravated identity theft in relation to wire fraud. Counts 9 through 12 of the Indictment alleges Harris, McCall and others presented false claims against the United States by filing false tax returns between January 16, 2012 and February 29, 2012. Page 1 of 28 Case 2:13-cr-00144-LSC-TFM Document 38 Filed 12/19/13 Page 2 of 28 Counts 13 through 15 of the Indictment allege Harris filed false claims against the United States by filing false tax returns between January 30, 2013, and February 9, 2013. -
Fraud Against Financial Institutions: Judging Materiality Post- Escobar
William & Mary Business Law Review Volume 12 (2020-2021) Issue 3 Article 3 April 2021 Fraud Against Financial Institutions: Judging Materiality Post- Escobar Matthew A. Edwards Follow this and additional works at: https://scholarship.law.wm.edu/wmblr Part of the Banking and Finance Law Commons, and the Courts Commons Repository Citation Matthew A. Edwards, Fraud Against Financial Institutions: Judging Materiality Post-Escobar, 12 Wm. & Mary Bus. L. Rev. 621 (2021), https://scholarship.law.wm.edu/wmblr/vol12/iss3/3 Copyright c 2021 by the authors. This article is brought to you by the William & Mary Law School Scholarship Repository. https://scholarship.law.wm.edu/wmblr FRAUD AGAINST FINANCIAL INSTITUTIONS: JUDGING MATERIALITY POST-ESCOBAR MATTHEW A. EDWARDS* ABSTRACT In Neder v. United States, 527 U.S. 1 (1999), the Supreme Court held that proof of materiality is required for convictions under the federal mail, wire and bank fraud statutes. During the past 20 years, the federal courts have endeavored to apply the complex com- mon law concept of materiality to the federal criminal law context. The Supreme Court’s recent decision in Universal Health Services, Inc. v. United States ex rel. Escobar, 136 S. Ct. 1989 (2016), a civil case involving the False Claims Act, provided the federal appellate courts with an ideal opportunity to reconsider materiality standards in federal fraud cases. In particular, criminal fraud defendants have argued that Escobar’s “subjective” materiality standard should be applied in mail, wire and bank fraud cases involving financial institutions. Thus far, these arguments have failed. Instead, the Courts of Appeals have endorsed an objective materiality standard tethered to what a reasonable bank would do—not the behavior of renegade lenders. -
Speeding up Correlation Search for Binary Data
Speeding up Correlation Search for Binary Data Lian Duan and W. Nick Street [email protected] Management Sciences Department The University of Iowa Abstract Finding the most interesting correlations in a collection of items is essential for problems in many commercial, medical, and scientific domains. Much previous re- search focuses on finding correlated pairs instead of correlated itemsets in which all items are correlated with each other. Though some existing methods find correlated itemsets of any size, they suffer from both efficiency and effectiveness problems in large datasets. In our previous paper [10], we propose a fully-correlated itemset (FCI) framework to decouple the correlation measure from the need for efficient search. By wrapping the desired measure in our FCI framework, we take advantage of the desired measure’s superiority in evaluating itemsets, eliminate itemsets with irrelevant items, and achieve good computational performance. However, FCIs must start pruning from 2-itemsets unlike frequent itemsets which can start the pruning from 1-itemsets. When the number of items in a given dataset is large and the support of all the pairs cannot be loaded into the memory, the IO cost O(n2) for calculating correlation of all the pairs is very high. In addition, users usually need to try different correlation thresholds and the cost of processing the Apriori procedure each time for a different threshold is very high. Consequently, we propose two techniques to solve the efficiency problem in this paper. With respect to correlated pair search, we identify a 1-dimensional monotone prop- erty of the upper bound of any good correlation measure, and different 2-dimensional monotone properties for different types of correlation measures. -
Judicial "Pruning" of "Garden Variety Fraud" Civil RICO Cases Does Not Work: It's Time for Congress to Act
Vanderbilt Law Review Volume 43 Issue 3 Issue 3 - Symposium: Reforming RICO: Article 5 If, Why, and How 4-1990 Judicial "Pruning" of "Garden Variety Fraud" Civil RICO Cases Does Not Work: It's Time for Congress to Act Susan Getzendanner Follow this and additional works at: https://scholarship.law.vanderbilt.edu/vlr Part of the Courts Commons, and the Criminal Procedure Commons Recommended Citation Susan Getzendanner, Judicial "Pruning" of "Garden Variety Fraud" Civil RICO Cases Does Not Work: It's Time for Congress to Act, 43 Vanderbilt Law Review 673 (1990) Available at: https://scholarship.law.vanderbilt.edu/vlr/vol43/iss3/5 This Symposium is brought to you for free and open access by Scholarship@Vanderbilt Law. It has been accepted for inclusion in Vanderbilt Law Review by an authorized editor of Scholarship@Vanderbilt Law. For more information, please contact [email protected]. Judicial "Pruning" of "Garden Variety Fraud" Civil RICO Cases Does Not Work: It's Time for Congress to Act Susan Getzendanner* I. INTRODUCTION .......................................... 673 II. CIVIL RICO: THE STATUTORY UNDERLAYMENT ............ 675 III. THE USE OF CIVIL RICO ............................ 677 IV. REFORM OF THE CIVIL RICO PREDICATE OFFENSES ...... 678 A. "Garden Variety Fraud"....................... 679 B. M ultiple Victims .............................. 681 C. Securities Fraud............................... 683 D. Civil RICO Cases Based on Other Predicate Of- fenses ........................................ 684 V. OTHER PROPOSED REFORMS -
Criminal Law and the Administrative Lawyer
Anatomy of a Corruption Case presented by Patrick K. Hanly, Esq. The Law Office of Patrick K. Hanly 980 Ninth Street Sacramento, California 95814 I. Overview of Prosecuting Agencies U.S. Attorney Grand Jury Indictment District Attorney/State Attorney General Complaint Grand Jury 1 II. How A Prosecution Gets Started Undercover Operation Bri-Spec D.C. operation ABScam Murtha on YouTube Anonymous Informant Quackenbush/Grays unexplained wealth FPPC fields calls anonymously Disgruntled Staffer Cooperating Defendant Disgruntled Contributor Strip clubs; liquor licensees; others seeking favors for money Scorned wife/husband 2 III. How Evidence is Gathered Witness interviews Do not count on Code of Silence Document subpoenas IV. Potential Charges Bribery Section 666. Theft or bribery concerning programs receiving Federal funds (a) Whoever, if the circumstance described in subsection (b) of this section exists - (B) corruptly solicits or demands for the benefit of any person, or accepts or agrees to accept, anything of value from any person, intending to be influenced or rewarded in connection with any business, transaction, or series of transactions of such organization, government, or agency involving any thing of value of $5,000 or more; or 3 Bribery, cont. Section 666, cont. (2) corruptly gives, offers, or agrees to give anything of value to any person, with intent to influence or reward an agent of an organization or of a State, local or Indian tribal government, or any agency thereof, in connection with any business, transaction, or series of transactions of such organization, government, or agency involving anything of value of $5,000 or more; shall be fined under this title, imprisoned not more than 10 years, or both. -
Covid Fraud Tracker
Subject name(s) Date Law Enforcement Alleged Conduct Summary Relevant statute(s) State Court Type of Action Individual subject? Corporate subject? Follow-on action? Matter Number Dates of unlawful Penalties Press Release Petition/ Agreement/J Announced Agency conduct (civil/criminal fines, Complaint/ udgment incarceration) Indictment Grubhub Holdings Inc. 7/29/2021 Massachusetts AG Consumer fraud Grubhub Holdings Inc. is accused of violating a provision of Massachusetts's economic G. L. c. 93A Massachusetts D. Mass. Civil No Yes No https://www.mas development legislation, which prohibited Grubhub and other third party delivery service enforcement s.gov/news/ag- platforms from charging fees to restaurants that exceed 15 percent of an order's menu healey-sues- price. The fee cap came into effect on January 14, 2021 and remained in place until grubhub-for- Governor Baker lifted the state of emergency in Massachusetts on June 15, 2021. charging- restaurants- illegally-high-fees- during-covid-19- public-health- emergency Dinesh Sah 7/28/2021 USDOJ PPP fraud Dinesh Sah pleaded guilty to wire-fraud and money laundering for submitting 15 fraudulent 18 U.S.C. §§ 1343, 1957 Texas W.D. Tex. Criminal Yes No No 3:20-cr-00484 Incarceration; https://www.justi applications that sought $24.8 million in Paycheck Protection Program ("PPP") loans. Sah enforcement Restitution ce.gov/opa/pr/te filed the claims under the names of various businesses that he owned or controlled, xas-man- claiming these businesses had numerous employees and hundreds of thousands of dollars sentenced-24- in payroll expenses; in reality, no business had employees or paid wages consistent with the million-covid-19- amounts claimed in the PPP applications. -
Taking Action: an Advocate's Guide to Assisting Victims of Financial Fraud
Taking Action An Advocate’s Guide to Assisting Victims of Financial Fraud REVISED 2018 Helping Financial Fraud Victims June 2018 Financial fraud is real and can be devastating. Fortunately, in every community there are individuals in a position to provide tangible help to victims. To assist them, the Financial Industry Regulatory Authority (FINRA) Investor Education Foundation and the National Center for Victims of Crime joined forces in 2013 to develop Taking Action: An Advocate’s Guide to Assisting Victims of Financial Fraud. Prevention is an important part of combating financial fraud. We also know that financial fraud occurs in spite of preventive methods. When fraud occurs, victims are left to cope with the aftermath of compromised identities, damaged credit, and financial loss, and a painful range of emotions including anger, fear, and frustration. This guide gives victim advocates a roadmap for how to respond in the wake of a financial crime, from determining the type of fraud to reporting it to the proper authorities. The guide also includes case management tools for advocates, starting with setting reasonable expectations of recovery and managing the emotional fallout of financial fraud. Initially published in 2013, the guide was recently updated to include new tips and resources. Our hope is that this guide will empower victim advocates, law enforcement, regulators, and a wide range of community professionals to capably assist financial victims with rebuilding their lives. Sincerely, Gerri Walsh Mai Fernandez President Executive Director FINRA Investor Education Foundation National Center for Victims of Crime AN ADVOCATE’S GUIDE TO ASSISTING VICTIMS OF FINANCIAL FRAUD | i About Us The Financial Industry Regulatory Authority (FINRA) is a not-for-profit self-regulatory organization authorized by federal law to help protect investors and ensure the fair and honest operation of financial markets. -
Semiannual Report to Congress April 1, 2010, Through September 30, 2010 Profile of Performance
U.S. Department of Housing and Urban Development Office of Inspector General Semiannual Report to Congress April 1, 2010, through September 30, 2010 Profile of Performance Audit profile of performance for the period April 1, 2010, through September 30, 2010 Results This reporting period FY 10 totals Recommendations that funds be put to better use1 $225,136,232 $813,264,347 Recommended questioned costs1 $109,919,327 $155,188,440 Collections from audits $14,150,383 $32,706,317 Administrative sanctions 3 4 Investigation profile of performance for the period April 1, 2010, through September 30, 2010 Results This reporting period FY 10 totals Funds put to better use $40,252,087 $76,756,637 Recoveries/receivables $126,694,457 $519,225,525 Arrests2 781 1,393 Indictments/informations 755 1,235 Convictions/pleas/pretrial diversions 389 898 Civil actions 79 129 Administrative sanctions3 168 371 Suspensions 41 90 Debarments 49 95 Personnel actions4 28 58 Search warrants 57 99 Subpoenas issued 1037 1827 Hotline profile of performance for the period April 1, 2010, through September 30, 2010 Results This reporting period FY 10 totals Funds put to better use $933,674 $1,297,454 Recoveries/receivables $140,614 $215,696 1 This represents all cost transactions during the period in which dollar amounts were reported with any recommendation. 2 Included in the arrests is our focus on the nationwide Fugitive Felon Initiative. 3 Administrative sanctions include limited denial of participation, relocations, removal from program participation, restraining orders, and systemic implication report submitted. 4 Personnel actions include reprimands; suspensions; demotions; or terminations of the employees of Federal, State, or local governments or of Federal contractors and grantees as the result of OIG activities. -
Mining Web User Behaviors to Detect Application Layer Ddos Attacks
JOURNAL OF SOFTWARE, VOL. 9, NO. 4, APRIL 2014 985 Mining Web User Behaviors to Detect Application Layer DDoS Attacks Chuibi Huang1 1Department of Automation, USTC Key laboratory of network communication system and control Hefei, China Email: [email protected] Jinlin Wang1, 2, Gang Wu1, Jun Chen2 2Institute of Acoustics, Chinese Academy of Sciences National Network New Media Engineering Research Center Beijing, China Email: {wangjl, chenj}@dsp.ac.cn Abstract— Distributed Denial of Service (DDoS) attacks than TCP or UDP-based attacks, requiring fewer network have caused continuous critical threats to the Internet connections to achieve their malicious purposes. The services. DDoS attacks are generally conducted at the MyDoom worm and the CyberSlam are all instances of network layer. Many DDoS attack detection methods are this type attack [2, 3]. focused on the IP and TCP layers. However, they are not suitable for detecting the application layer DDoS attacks. In The challenges of detecting the app-DDoS attacks can this paper, we propose a scheme based on web user be summarized as the following aspects: browsing behaviors to detect the application layer DDoS • The app-DDoS attacks make use of higher layer attacks (app-DDoS). A clustering method is applied to protocols such as HTTP to pass through most of extract the access features of the web objects. Based on the the current anomaly detection systems designed access features, an extended hidden semi-Markov model is for low layers. proposed to describe the browsing behaviors of web user. • Along with flooding, App-DDoS traces the The deviation from the entropy of the training data set average request rate of the legitimate user and uses fitting to the hidden semi-Markov model can be considered as the abnormality of the observed data set. -
Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities
THE NATIONAL ACADEMIES PRESS This PDF is available at http://nap.edu/12651 SHARE Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities DETAILS 390 pages | 6x9 | PAPERBACK ISBN 978-0-309-13850-5 | DOI 10.17226/12651 AUTHORS BUY THIS BOOK William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors; Committee on Offensive Information Warfare; National Research Council FIND RELATED TITLES Visit the National Academies Press at NAP.edu and login or register to get: – Access to free PDF downloads of thousands of scientific reports – 10% off the price of print titles – Email or social media notifications of new titles related to your interests – Special offers and discounts Distribution, posting, or copying of this PDF is strictly prohibited without written permission of the National Academies Press. (Request Permission) Unless otherwise indicated, all materials in this PDF are copyrighted by the National Academy of Sciences. Copyright © National Academy of Sciences. All rights reserved. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of CYBerattacK CapaBILITIes William A. Owens, Kenneth W. Dam, and Herbert S. Lin, Editors Committee on Offensive Information Warfare Computer Science and Telecommunications Board Division on Engineering and Physical Sciences Copyright National Academy of Sciences. All rights reserved. Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities THE NATIONAL ACADEMIES PRESS 500 Fifth Street, N.W. Washington, DC 20001 NOTICE: The project that is the subject of this report was approved by the Gov- erning Board of the National Research Council, whose members are drawn from the councils of the National Academy of Sciences, the National Academy of Engi- neering, and the Institute of Medicine. -
AUGUST 2005 43 Your Defense Is Offensive STEVE MANZUIK EDITOR ;Login: Is the Official WORKPLACE Rik Farrow Magazine of the [email protected] USENIX Association
A UGUST 2005 VOLUME 30 NUMBER 4 THE USENIX MAGAZINE OPINION Musings RIK FARROWS Conference Password Sniffing ABE SINGER SYSADMIN The Inevitability of Xen JON CROWCROFT, KEIR FRASER, STEVEN HAND, IAN PRATT, AND ANDREW WARFIELD Secure Automated File Transfer MARK MCCULLOUGH SAN vs. NAS for Oracle: A Tale of Two Protocols ADAM LEVIN Practical Perl ADAM TUROFF ISPadmin ROBERT HASKINS L AW Primer on Cybercrime Laws DANI EL L. APPELMAN SECURITY Forensics for System Administrators SEAN PEISERT Your Defense Is Offensive STEVE MANZUIK WORKPLACE Marketing after the Bubble EMILY W. SALUS AND PETER H. SALUS BOOK REVIEWS Book Reviews RIK FAROWS USENIX NOTES SAGE Update DAVID PARTER ...and much more CONFERENCES 2005 USENIX Annual Technical Conference 2nd Symposium on Networked Systems Design and Implementation (NSDI ’05) 6th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2004) The Advanced Computing Systems Association Upcoming Events INTERNET MEASUREMENT CONFERENCE 2005 4TH USENIX CONFERENCE ON FILE AND (IMC ’05) STORAGE TECHNOLOGIES (FAST ’05) Sponsored by ACM SIGCOMM in cooperation with USENIX Sponsored by USENIX in cooperation with ACM SIGOPS, IEEE Mass Storage Systems Technical Committee (MSSTC), OCTOBER 19–21, 2005, NEW ORLEANS, LA, USA and IEEE TCOS http://www.usenix.org/imc05 DECEMBER 14–16, 2005, SAN FRANCISCO, CA, USA http://www.usenix.org/fast05 ACM/IFIP/USENIX 6TH INTERNATIONAL MIDDLEWARE CONFERENCE 3RD SYMPOSIUM ON NETWORKED SYSTEMS NOVEMBER 28–DECEMBER 2, 2005, GRENOBLE, FRANCE DESIGN AND IMPLEMENTATION (NSDI ’06) http://middleware05.objectweb.org