Podcast - "I Was Just Playing a Role"
Podcast - Too Dirty for Dirty Crime
Bar Exam Toolbox Podcast Episode 321: Listen and Learn -- Criminal Procedure: Identifications (Part 1)
Podcast - The Godfather of Houston
Law School Toolbox Podcast Episode 516: Listen and Learn -- Elements of a Crime
What crimes are reported to INTERPOL?
Episode 381 -- Cadence Design Pays $140 Million to Settle Trade Violations
Podcast - Bring Out the Bad Stuff
Just Press "Play"
10 For 10: Top Compliance Stories For the Week Ending, July 26, 2025
Daily Compliance News: July 23, 2025 the Pardon in the Wind? Edition
Podcast - “I Lied Like a Dog!”
Sittenfeld v. United States – Campaign Contributions as Crimes?
Podcast - Persistence and Determination
Episode 377 -- Refocusing Due Diligence on Cartels and TCOs
10 For 10: Top Compliance Stories For the Week Ending, July 12, 2025
RICO Section 1962(b): Acquisition or Maintenance of Control Over Legitimate Enterprises — RICO Report Podcast
Podcast - The Seeds of Corruption
False Claims Act Insights - Bitter Pills: DOJ Targets Pharmacies for FCA Enforcement
The U.S. Attorney’s Office for the District of Massachusetts has charged a student at Assumption University with hacking into two U.S.-based companies’ systems and demanding a ransom....more
Unfortunately, I’ve had unpleasant dealings with the Phobos ransomware group. My interactions with Phobos have been fodder for a good story when I educate client employees on recent cyber-attacks to prevent them from becoming...more
The recent indictment of Maksim Silnikau, a Belarusian and Ukrainian national, is a clear reminder that cybercriminals are becoming more sophisticated and bold....more
The Justice Department continues to attack and dismantle global ransomware extortion organizations. Business surveys often confirm that executives are hyper-focused on the risk of ransomware attacks against businesses....more
Last week, the Department of Justice (“DOJ”) announced the launch of its Civil Cyber-Fraud Initiative (“the Initiative”) aimed at combating “new and emerging cyber threats to the security of sensitive information and critical...more