Tuesday, January 24, 2012

Indecent Liberties With A Minor

Legal Defense and Computer Forensics Expert Witness Services


The charge of attempted indecent liberties with a minor is sometimes begins when a police officer posing as a minor using the Internet or an online chat room baits an individual into suggestive conversation and role play.  This charge is sometimes charged simultaneously and involves the same chain of events leading to a prosecution for Internet solicitation of a minor also known as use of communications systems to facilitate certain offenses involving children.  The police sting operation often results in arrest and a criminal prosecution. Legal teams with both excellence and technology competence are necessary to effectively represent individuals accused of computer crimes in Virginia.

A person accused of this type of conduct requires the experience of an attorney who not only understands criminal defense but also has the technical experience to understand the underlying Internet technology.  Even an attorney who is well versed in criminal defense litigation would need the assistance of a Virginia computer forensics expert witness to understand all the technical aspects associated with a case involving Virginia computer forensics issues.  Some of the statutes that may form the basis for charges of indecent liberties or attempted indecent liberties in Virginia include:

§ 18.2-370. Taking indecent liberties with children; penalties.

A. Any person 18 years of age or over, who, with lascivious intent, knowingly and intentionally commits any of the following acts with any child under the age of 15 years is guilty of a Class 5 felony:

(1) Expose his or her sexual or genital parts to any child to whom such person is not legally married or propose that any such child expose his or her sexual or genital parts to such person; or

(2) [Repealed.]

(3) Propose that any such child feel or fondle the sexual or genital parts of such person or propose that such person feel or fondle the sexual or genital parts of any such child; or

(4) Propose to such child the performance of an act of sexual intercourse or any act constituting an offense under § 18.2-361; or

(5) Entice, allure, persuade, or invite any such child to enter any vehicle, room, house, or other place, for any of the purposes set forth in the preceding subdivisions of this section.

B. Any person 18 years of age or over who, with lascivious intent, knowingly and intentionally receives money, property, or any other remuneration for allowing, encouraging, or enticing any person under the age of 18 years to perform in or be a subject of sexually explicit visual material as defined in § 18.2-374.1 or who knowingly encourages such person to perform in or be a subject of sexually explicit material; shall be guilty of a Class 5 felony.

C. Any person who is convicted of a second or subsequent violation of this section shall be guilty of a Class 4 felony; provided that (i) the offenses were not part of a common act, transaction or scheme; (ii) the accused was at liberty as defined in § 53.1-151 between each conviction; and (iii) it is admitted, or found by the jury or judge before whom the person is tried, that the accused was previously convicted of a violation of this section.

D. Any parent, step-parent, grandparent or step-grandparent who commits a violation of either this section or clause (v) or (vi) of subsection A of § 18.2-370.1 (i) upon his child, step-child, grandchild or step-grandchild who is at least 15 but less than 18 years of age is guilty of a Class 5 felony or (ii) upon his child, step-child, grandchild or step-grandchild less than 15 years of age is guilty of a Class 4 felony.

The language of the statute also allows the government to penalize other minors involved in practices such as online chatting with other minors, text messages or "sexting".

§ 18.2-370.01. Indecent liberties by children; penalty.

Any child over the age of thirteen years but under the age of eighteen who, with lascivious intent, knowingly and intentionally exposes his or her sexual or genital parts to any other child under the age of fourteen years who, measured by actual dates of birth, is five or more years the accused's junior, or proposes that any such child expose his or her sexual or genital parts to such person, shall be guilty of a Class 1 misdemeanor.

Defending against accusations of attempted indecent liberties with a minor (use of communications system to facilitate certain offenses involving minors) in Virginia, including:
Henrico, Richmond City, Chesterfield, Colonial Heights, Amelia, Dinwiddie, Nottoway, Petersburg, Powhatan, Albemarle, Charlottesville, Culpeper, Fluvanna, Goochland, Greene, Louisa, Madison, Orange, Fairfax, Prince William, Alexandria, Arlington, Fauquier, Loudoun, Rappahannock, Norfolk, Virginia Beach, Newport News, Hampton, Portsmouth, Isle of Wight, Suffolk, Chesapeake, Fredericksburg, Spotsylvania, Stafford, Caroline, Essex,, Hanover, King George, Lancaster, Northumberland, Richmond County, Westmoreland, Charles City, Gloucester, James City County/Williamsburg, King William, King and Queen, Mathews, Middlesex, New Kent, Williamsburg/James City County, York County, Poquoson.

Virginia Internet attempted indecent liberties with a minor defense lawyer and defense computer forensics experts.

Monday, October 10, 2011

Computer Forensics

Computer Forensics Expert and Virginia computer expert witness - Computer forensics expertise is critical in formulating a defense to cyber crime accusations.  In some cases, we apply our legal expertise to these cases.  In other cases, we apply our expertise in computer forensics to assist attorneys who are representing individuals accused of computer crimes.  (In Virginia, our computer forensics expert services are provided through our affiliate company, AVM Technology, LLC and no attorney-client relationship is created with us although our work may qualify as attorney work product through the attorney in charge of the case).
Certified Computer Examiner

Tasks for which an attorney defending an individual of cyber crime may call a computer forensics expert may include hard drive examination, evidence analysis, independent investigation, data recovery, and counter forensics.  Counter-forensics involves reviewing forensic reports and images of digital evidence acquired by law enforcement.  Our analysis will focus on ensuring that law enforcement followed generally acceptable computer forensics procedures.  We also assist the defense attorney in performing a comprehensive review of the evidence, including exculpatory material that the law enforcement examiner may "miss."

We can provide computer forensics assistance to attorneys representing individuals accused of various computer crimes, including:

  • Criminal computer hacking, or computer unauthorized access – Computer forensics expertise, including expert testimony at trial to assist attorneys in defending against charges of hacking, unauthorized access or violations of the Computer Trespassing and Computer Fraud statutes.

  • Computer solicitation of a minor over the InternetComputer forensics expertise, including expert testimony at trial to assist attorneys in defending against charges of using communications devices to facilitate certain offenses involving minors.  Most of these charges involve police officers posing as minors in Internet chat rooms, Yahoo being the most popular law enforcement site.

  • Internet identity theft and aggravated identity theftComputer forensics expertise, including expert testimony at trial to assist attorneys in defending against charges of  Identity Theft, aggravated identity theft, trafficking access devices, stolen credit cards, or social security numbers.

  • Internet violations of the Computer Fraud and Abuse Act, Access Device Fraud, and Trafficking in PasswordsComputer forensics expertise, including expert testimony at trial to assist attorneys in defending against charges of  violating the Federal Computer Fraud and Abuse Act.

  • Internet violation of the Virginia Computer crime statutesComputer forensics expertise, including expert testimony at trial to assist attorneys in defending against charges of  violating Virginia cyber crime statutes.

  • Virginia computer trespass under the Virginia Computer Crimes ActComputer forensics expertise, including expert testimony at trial to assist attorneys in defending against charges of computer trespass in Virginia.

  • Virginia computer fraud under the Virginia Computer Crimes ActComputer forensics expertise, including expert testimony at trial to assist attorneys in defending against charges of Virginia computer fraud.

  • Theft of computer services under the Virginia Computer Crimes ActComputer forensics expertise, including expert testimony at trial to assist attorneys in defending against charges of computer services theft.

  • Computer embezzlement under the Virginia Computer Crimes ActComputer forensics expertise, including expert testimony at trial to assist attorneys in defending against charges of computer embezzlement.

  • Computer as an instrument of forgery under the Virginia Computer Crimes Act

  • Possession of Internet child pornographyComputer forensics expertise, including expert testimony at trial to assist attorneys in defending against charges of possession or distribution of child pornography.  These cases may involve issues related to file sharing software that are highly technical in nature. 

  • Criminal computer invasion of privacy under the Virginia Computer Crimes Act

  • Cyber stalkingComputer forensics expertise, including expert testimony at trial to assist attorneys in defending against charges of cyber stalking.  These cases may be complicated, especially when the prosecution is based on unclear allegations and paper based evidence printouts.  Unless challenged with the appropriate expertise, the Court may accept these printouts as evidence, resulting in a conviction.

  • Criminal Copyright Infringement – An improperly channeled entrepreneurial spirit could cost you… downloading, sharing, or selling songs, movies, software, documents, or other files may cost you a Federal prison sentence.  We can assist you with our experience in Computer forensics and technology.  We obtained the first jury not guilty verdict in a Federal Internet music piracy case.


When you need the assistance of a Virginia computer forensics expert, or a computer expert witness, we assist Virginia lawyers handling computer crime cases throughout Virginia including without limitation Fairfax County, Henrico County, Richmond City, Chesterfield County, Hanover County, Petersburg County, Prince William County, Hopewell, Petersburg, Dinwiddie, Quantico, Virginia Beach, Norfolk, Chesapeake, Fredericksburg, Stafford, Spotsylvania, Newport News, Hampton, Williamsburg, Amelia, Powhatan, Goochland, Louisa, Manassas, Woodbridge, Charles City, James City, Gloucester, Portsmouth, Shenandoah, Prince George, Sussex, New Kent, West End of Richmond, Glen Allen, Federal Court for the Eastern District of Virginia (Richmond, Alexandria, Norfolk, and Newport News Divisions).

 

Monday, May 23, 2011

Computer Harassment

Computer Harassment Defense Attorney in Virginia

Sometimes individuals engage in disagreements via email or via a website.  Sometimes it is almost impossible to determine who started.  However, most people are unaware that sending curse words to another via e-mail or on a website (or though the use of any computer or computer network) is considered a crime in Virginia.  The statute that addresses computer harassment in Virginia is as follows:

§ 18.2-152.7:1. Harassment by computer; penalty.

If any person, with the intent to coerce, intimidate, or harass any person, shall use a computer or computer network to communicate obscene, vulgar, profane, lewd, lascivious, or indecent language, or make any suggestion or proposal of an obscene nature, or threaten any illegal or immoral act, he shall be guilty of a Class 1 misdemeanor.

If you are accused of harassment by computer in Virginia, you may contact us for a computer harassment in Virginia attorney consultation.

Wednesday, July 7, 2010

Computer Crime Cases

When it comes to the defense of computer and Internet crime cases, we provide you not only with the legal skills and knowledge necessary of a criminal defense lawyer, but also with the understanding of the technical aspects involved with Internet crime charges:

Some recent cyber crime defense cases where we have assisted our clients include:

  • Our client was accused of being the leader of the most prolific Internet music piracy group in the world.  The charge consisted of conspiracy to commit copyright Infringement.  The charges were initially brought in the United States District Court for the Eastern District of Virginia located in Alexandria, Virginia.  The trial took place in the United States District Court for the Southern District of Texas, located in Houston, Texas.  Our client elected to have is case tried by a Federal Jury.  Our technical knowledge assisted us in providing competent legal representation and bringing the case to a successful resolution.  Read More...

  • Our client was arrested on access device fraud charges and aggravated identity theft in the Eastern District of Virginia, Richmond Division.  The accusations involved alleged selling of stolen credit card numbers, social security numbers, other personally identifiable information, as well as e-mail account data for spam purposes.  We thoroughly reviewed the government evidence, both the technical and the legal aspects, and assisted our client in obtaining a favorable result.

  • Our client was accused of using a computer system to solicit a minor in Chesterfield County, Virginia.  Our technical knowledge allowed us to properly dissect and understand the technical issues in the government's evidence, resulting in a favorable resolution for our client.

  • Our client appealed a case handled by another defense attorney to the Virginia Court of Appeals and to the Virginia Supreme Court.  The charges involved the use of a computer system to facilitate certain offenses involving children in Virginia.  Our technical knowledge allowed us to be able to understand the case immediately and completely analyze all the issues despite being retained after the appeal process was already underway.

  • Our client was a victim of computer trespass and unauthorized network access by a former employee.  Our experience in both the legal and technical aspects allowed our client to gather the necessary evidence to prosecute the perpetrator in a "one-stop shopping" manner.

  • Our client was charged with eight counts of use of a computer system to facilitate certain offenses involving children in Virginia.  Our technical analysis allowed us to get the majority of the charges dismissed, resulting in a resolution of the case involving no jail time.

  • Our client was a victim of computer fraud, computer trespass and unauthorized access to his computer by a debt collector.  Our technical know-how and legal analysis allowed us to recommend a course of action for this activity, which may have otherwise gone undetected.  Read More...

Saturday, May 1, 2010

Copyright Infringement Music Piracy Case - Part 3 (The Race to Plea)


Once the music piracy federal criminal conspiracy copyright infringement case began to move through the United States District Court for the Eastern District of Virginia, the "race to the plea line" began between the various defendants. They hoped to obtain a more lenient treatment in exchange to assisting the government in securing music piracy conspiracy copyright infringement convictions against the other defendants in federal court in Virginia. Only two people accused of allegedly being members of Rabid Neurosis (RNS) did not plead guilty. On of them was Domingo Rivera's client, Adil R. Cassim, who the Prosecution alleged was the leader of RNS.


After the guilty pleas of these defendants were accepted by the United States District Court for the Eastern District of Virginia, the defendants were scheduled for sentencing. As part of the sentencing process, the defendants and the government wrote various briefs with hope of persuading the Court to apply the version of the guidelines that they argue were applicable to the music piracy conspiracy copyright infringement case in the United States District Court for the Eastern District of Virginia.


The sentencing positions the the prosecution filed for the various music piracy cases were somewhat similar. The government's argument included:


As the Court is aware, the trial of the Defendant’s co-conspirators, which had been scheduled for November 4, 2009 in this District, was transferred by this Court to the Southern District of Texas, Houston Division, after the Court sua sponte invited a motion to transfer by the co-conspirators under Federal Rule of Criminal Procedure 21(b). That trial in Houston (which had originally been scheduled to start on January 19, 2010) has been delayed at the request of the defense, who has also re-filed all the pre-trial motions that it had previously submitted in this District. Due to a need to re-litigate these issues and possibly have additional evidentiary hearings, a new trial date has not yet been set but is expected in the next few months. The timing of the new trial is important since the government intends to call Defendant as a witness at trial. In the event he is called as a witness, the government is likely to file a Motion for a Downward Departure under Federal Rule of Criminal Procedure 35 when his truthful testimony is complete. Given that such a motion for a downward departure is likely to be requested, we would ask the Court to sentence the Defendant to the bottom of the properly calculated advisory sentencing guidelines range, which is 57 months of incarceration, and delay his surrender date until after he has had a chance to testify at the trial of his co-conspirators in March or early April of 2010.


As the above text demonstrates, the defendants who pleaded guilty in the Eastern District of Virginia during this conspiracy copyright infringement case. The government's argument continued:


As set forth in the Presentence Report and the Statement of Facts, the Defendant was a member of an Internet pre-release music group called “Rabid Neurosis” or “RNS.” The Defendant has acknowledged that he did willfully enter into an agreement with one or more individuals for the express purpose of unlawfully reproducing and distributing copyrighted materials via the Internet. Defendant also acknowledges that, through the acts of himself and others in the conspiracy, RNS caused the reproduction and distribution over the Internet of copyrighted works with a total infringement amount of more than $1,000,000 and less than $2,500,000. This Defendant was a particularly key member of the conspiracy, since for many years he provided the group with albums that were not yet commercially available. The Defendant worked at the North Carolina compact disc production facility that made the music CDs that the Defendant electronically provided to the leader of RNS. He trafficked in this stolen intellectual property, contrary to the express written agreement he had with his employer. In sum, the Defendant and his co-worker (who introduced him to RNS) were critical to the rise of RNS to the forefront of Internet music piracy that resulted in far more than $1,000,000 in loss.


Defendant pled guilty to a single count criminal information of conspiracy to commit copyright infringement, in violation of Title 18, United States Code, Section 371. On that date, the Court accepted the Defendant’s plea of guilty to the indictment. In this case, there was both an agreed-upon statement of facts and a plea agreement. In the statement of facts and before the Court, the Defendant admitted his unlawful conduct. Based on this record, the Presentence Report properly calculated that the Adjusted Offense Level for the Defendant’s conduct as 28: Sentencing Guideline 2B5.3(a) provides for an offense level of 8 for criminal copyright infringement; Guideline 2B5.3(b)(1)(I) provides an additional sixteen-level upward adjustment for an offense with an infringement amount greater than $1,000,000, but less than $2,500,000; Guideline 2B5.3(b)(3)(A) provides an additional two-level upward adjustment for an offense involving the uploading of infringed items; and Guideline 2B5.3(b)(2) provides an additional two-level upward adjustment for an offense involving the reproduction/distribution of at least one work being prepared for commercial distribution.


In the event that the government files a motion with the Court for a Section 3E1.1(b) one-level reduction and assuming the Defendant receives the two-level reduction for acceptance of responsibility, the Defendant will have an Offense Level Total of 25. The Presentence Report further calculates that the Defendant has a Criminal History Category of I. With an Offense Level Total of 25 and the Defendant’s Criminal History Category of I, the advisory Sentencing Guidelines range for the Defendant, in absence of credit for his cooperation, is properly calculated as 57-60 months.


The Supreme Court has declared that “[a]s a matter of administration and to secure nationwide consistency, the Guidelines should be the starting point and the initial benchmark.” Gall v. United States, 128 S. Ct. 586, 596 (2007). The advisory Sentencing Guidelines, therefore, remain an indispensable resource for assuring appropriate and uniform punishment for federal criminal offenses. This Court must also consider all of the sentencing considerations set forth in Section 3553(a). Those factors include: (1) the nature and circumstances of the offense and the history and characteristics of the Defendant; (2) the need for the sentence imposed to reflect the seriousness of the offense, to promote respect for the law, and to provide just punishment for the offense; (3) the need to afford adequate deterrence to criminal conduct, and to protect the public from further crimes of the Defendant; (4) the need to provide the Defendant with educational or vocational training, medical care, or other correctional treatment in the most effective manner; (5) the guidelines and policy statements issued by the Sentencing Commission; (6) the need to avoid unwarranted sentence disparities among defendants with similar records who have been found guilty of similar conduct; and (7) the need to provide restitution to any victims of the offense. 18 U.S.C. § 3553(a). B. A Sentence at the Bottom of the Sentencing Guidelines Would Be Reasonable and Appropriate in Light of Recent Supreme Court Rulings. The government’s recommendation of a bottom of the advisory sentencing guidelines range is based in part on the fact that such a sentence properly reflects the accumulated wisdom and expertise of the Sentencing Commission, and serves the vital goal of uniformity and fairness in sentencing. While, to be sure, “[i]n accord with 18 U.S.C. § 3553(a), the Guidelines, formerly mandatory, now serve as one factor among several courts must consider in determining an appropriate sentence,” Kimbrough v. United States, 128 S. Ct. 558, 574 (2007), it remains the case that “the Commission fills an important institutional role: it has the capacity courts lack to ‘base its determinations on empirical data and national experience, guided by a professional staff with appropriate expertise,’” id. at 574 (quoting United States v. Pruitt, 502 F.3d 1154, 1171 (10th Cir. 2007) (McConnell, J., concurring)). Thus, the Supreme Court recently stated that “[w]e have accordingly recognized that, in the ordinary case, the Commission’s recommendation of a sentencing range will ‘reflect a rough approximation of sentences that might achieve § 3553(a)’s objectives.” Kimbrough, 128 S. Ct. at 574 (quoting Rita v. United States, 127 S. Ct. 2456, 2465 (2007)). C. A Sentence at the Bottom of the Sentencing Guidelines is Reasonable In Light Of the Serious Nature Of Defendant’s Criminal Conduct. There can be no question that the Defendant engaged in serious crimes that harmed individuals and businesses (including his former employer); in fact, the total infringement amount attributable to the conspiracy of which the Defendant was a member is well over $1,000,000 (the parties have agreed to cap the amount at $2,500,000). In particular, the Defendant violated the trust of his former employer, the plant that printed compact discs for several music labels; he traded the intellectual property that was entrusted to his employer in order to get access to thousands and thousands of other copyrighted works. His breach at a time when no legitimate copies of the works he traded were available harmed the music industry in incalculable ways. Given the nature of the Defendant’s criminal conduct and the impact and the harm to the public, the United States believes that an appropriate sentence at this time would fall at the low end of the advisory Sentencing Guidelines. RNS was the most infamous and successful Internet music piracy group in history. It procured thousands of albums and made them available illegally on the Internet. It procured albums from production plants, from radio stations, and from retail establishments prior to their commercial release.


RNS utilized serious security measures and took other steps to avoid detection by law enforcement, including using encryption on their chat sessions, locating many of its servers overseas, using a referral system that reduced the chances of infiltration, breaking of copyright protections on encoded discs, timing events to reduce the chances of exposing group members, and comparmentalizing tasks within a hierarchal organization. Rather than operating as a group of friends interested in music, it operated as a business, and, rather than money, that business was designed to get access for its members of every copyrighted work that ever existed. While individual infringement may be of limited harm (such as making a copy of an album for a next door neighbor), the collective effect of RNS’s activities were felt around the world. News of a single album by an artist being released on the Internet in digitally-perfect form prior to its commercial release resulted in hundreds of thousands of downloads by the public, and a potential loss of millions to the artist and the recording label. Simply put, the actions of the group were not a hobby; it was a group of thieves on a massive scale.


The activities of this group had such a wide ranging impact on the recording industry that, eventually, the music labels started discussing the likely impact of illegal RNS releases of their commercial albums prior to their actual theft.


The vastness of the impact of the harm makes it nearly impossible for the government or the Court to determine all the victims of RNS’s conduct and to calculate restitution for them. As such, the government has not sought restitution from the Defendant and his co-conspirators. It is worth noting, however, that it is because the harm is so large that such a calculation of restitution is daunting, rather than it being a factor to be consider in the defendants’ favor. The conduct of the Defendant, his co-conspirators, and intellectual property thieves around the world must be deterred. A sentence at the bottom end of the advisory Sentencing Guidelines would provide that deterrence. To depart below the guidelines range would send a clear message that the Court does not take the massive theft of copyrighted works seriously enough, since RNS was the most pervasive and infamous Internet piracy group in history. It 1 should make no difference from a sentencing perspective that this theft took primarily took place over the Internet, rather than a physical space. Theft is theft.


With respect to 18 U.S.C. § 3553(a)(6), which deals with sentencing disparities, the Government would note for the Court that no Internet piracy case is truly comparable with the RNS conspiracy. Technically, as indicated in the Pre-Sentence Report, there are a number of prior cases that involved similar conduct (“Apocalypse Production Crew” and “Drink or Die”) but none of them were similar in scope and impact to the RNS conspiracy. From simply a numbers standpoint, members of APC, who with exception of one individual who went to trial, agreed to a valuation of $30,000 to $70,000 of the conspiracy’s conduct. The one member of APC who went to trial was given a valuation of $100,000 to $200,000 by U.S. District Judge Liam O’Grady (U.S. v. Barry Gitarts) and was sentenced to 18 months in prison. Here, the agreed-upon valuation is $1,000,000 to $2,500,000, which, according to the sentencing guidelines, should command a significantly higher sentence of imprisonment (which the bottom of the guideline range would accomplish).


Unlike APC, which mostly involved distributing unlawful copies of music that had already been released, RNS was recognized as the world-leader in acquiring copies of pre-release music; that is, music that was not yet commercially available. The reason for a large part of that success was based on the fact that the group had two members, including Defendant, who worked in the music CD production plant in North Carolina. These individuals were able to procure many of the hottest albums of the last decade and provide them to RNS. No other music piracy group had that kind of regular access to pre-release materials. So, also unlike APC, the parties have agreed to the new additional two-point enhancement for pre-commercial works under Sentencing Guideline 2B5.3(b)(2).


Between the higher valuation and the pre-commercial enhancement, the properly calculated offense total under the advisory Sentencing Guidelines for RNS members is more than double that of APC members and the sentences should reflect that reality. Defendant dealt directly with the leader of RNS for years and gave him albums significantly before they were commercially available.


Based on the argument advanced by the government, the prosecution asked the court to sentence some of these defendants to almost 60 months in prison, the maximum possible sentence for a music piracy case based on a conspiracy copyright infringement case.

Wednesday, April 21, 2010

Access Device Fraud Charges in Federal Court

Access device fraud charges, whether in the Eastern District of Virginia, Southern District of Texas, the Arkansas Federal Courts, or any other Federal Court, can result in a felony conviction.  The charges may carry up to 10 years in a Federal prison and a fine of up to $250,000.00.  The main statute utilized for this type of prosecution is 18 U.S.C. Sec. 1029.

These charges are commonly brought when the government alleges that a person knowingly transfer, possess, or use, without lawful authority the credit card or means of identification (many times computer access fraud charges are filed in conjunction with identity theft charges).  The means of identification may include social security numbers and other identifiable information.

Just like any Federal criminal charges (or cybercrime accusations), whether in the Eastern District of Virginia, the Southern District of Texas in Houston, the Arkansas Federal Courts, or any other Federal court require competent assistance.  With a solid technical educational background and experience, Domingo J. Rivera may assist you in defending against Fraud in Connection with Access Devices charges in Federal Court.  In Virginia, many of these cases are typically handled in the Richmond Division of the Eastern District of Virginia.

Tuesday, April 20, 2010