Podcast - "I Was Just Playing a Role"
Podcast - Too Dirty for Dirty Crime
Bar Exam Toolbox Podcast Episode 321: Listen and Learn -- Criminal Procedure: Identifications (Part 1)
Podcast - The Godfather of Houston
Law School Toolbox Podcast Episode 516: Listen and Learn -- Elements of a Crime
What crimes are reported to INTERPOL?
Episode 381 -- Cadence Design Pays $140 Million to Settle Trade Violations
Podcast - Bring Out the Bad Stuff
Just Press "Play"
10 For 10: Top Compliance Stories For the Week Ending, July 26, 2025
Daily Compliance News: July 23, 2025 the Pardon in the Wind? Edition
Podcast - “I Lied Like a Dog!”
Sittenfeld v. United States – Campaign Contributions as Crimes?
Podcast - Persistence and Determination
Episode 377 -- Refocusing Due Diligence on Cartels and TCOs
10 For 10: Top Compliance Stories For the Week Ending, July 12, 2025
RICO Section 1962(b): Acquisition or Maintenance of Control Over Legitimate Enterprises — RICO Report Podcast
Podcast - The Seeds of Corruption
False Claims Act Insights - Bitter Pills: DOJ Targets Pharmacies for FCA Enforcement
Pillsbury’s communications lawyers have published the FCC Enforcement Monitor monthly since 1999 to inform our clients of notable FCC enforcement actions against FCC license holders and others. ...more
Last week, the Colorado Supreme Court upheld a criminal conviction which relied in part on evidence obtained pursuant to a warrant for Google search data. People v. Seymour, 2023 CO 53 (Oct. 16, 2023) (available at...more
In a recent case decided by the Appellate Division in New Jersey, Facebook, Inc. v. State of New Jersey, the court considered whether communication data wire warrants (“CDWs”) or wiretap orders had to be served on Facebook...more
Several federal agencies rely on search warrants to gather evidence in support of their law enforcement efforts. If you have received a search warrant from the Federal Bureau of Investigation (FBI), Drug Enforcement...more
The U.S. Department of Justice (DoJ) has indicted a man from Ohio for running Helix, a darknet-based cryptocurrency laundering service that is alleged to have laundered bitcoins worth $300 million....more
Receiving notice that the government is investigating your organization, employees or corporate and/or scientific practice can be a cause for alarm – but it doesn’t have to be. Former federal prosecutors and Jackson Lewis...more
From 2010 to 2015, the Antitrust Division of the U.S. Department of Justice filed criminal charges against more than 120 corporations and more than 350 individuals, and collected fines and penalties of more than $8 billion....more
On Friday, January 11, 2019, the Supreme Court of the United States granted certiorari in the following eight cases: Fort Bend County v. Davis, No. 18-525: Whether Title VII’s administrative exhaustion requirement, 42...more
Government enforcement activities at businesses have significantly increased this year. The Immigration and Customs Enforcement (ICE) division of the Department of Homeland Security (DHS) has already conducted 5,200 audits...more
On July 25, 2018, in United States v. Lambus, No. 16-4296 (Kearse, Livingston, Jeffrey Meyer, D.J.), the Second Circuit issued a lengthy decision analyzing two questions related to the suppression of GPS data from an ankle...more
The Supreme Court of the United States issued its rulings in three cases today: Lagos v. United States, No. 16-1519: The Mandatory Victims Restitution Act of 1996 requires that defendants convicted of certain offenses...more
One of the ways that our Association engages in advocacy on behalf of the legal profession is through amicus briefs. One of our members, Jessica McElfresh, was charged, along with a client, of various felonies under...more
The murder-for-hire statute makes it a crime to agree to commit murder in exchange for “anything of pecuniary value.” 18 U.S.C. § 1958. The Second Circuit has understood this language to require that, at the time of the...more
Picture this: A criminal defendant is indicted for three counts related to the possession of methamphetamine, and federal prosecutors obtain a warrant for the defendant’s iPhone. But the iPhone is passcode protected, and...more