<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:georss="http://www.georss.org/georss"
     xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
     xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[Chicago White Collar Crimes Attorney - Law Offices of Andrew M. Weisberg]]></title>
        <atom:link href="https://www.chicagocriminallawyer.com/blog/tags/chicago-white-collar-crimes-attorney/feed/" rel="self" type="application/rss+xml" />
        <link>https://www.chicagocriminallawyer.com/blog/tags/chicago-white-collar-crimes-attorney/</link>
        <description><![CDATA[Law Offices of Andrew M. Weisberg Website]]></description>
        <lastBuildDate>Thu, 12 Mar 2026 20:53:16 GMT</lastBuildDate>
        
        <language>en-us</language>
        
            <item>
                <title><![CDATA[Drug War Out, Cyber War In: America’s New Exorbitant Panic]]></title>
                <link>https://www.chicagocriminallawyer.com/blog/drug-war-cyber-war-americas-new-exorbitant-panic/</link>
                <guid isPermaLink="true">https://www.chicagocriminallawyer.com/blog/drug-war-cyber-war-americas-new-exorbitant-panic/</guid>
                <dc:creator><![CDATA[Law Offices of Andrew M. Weisberg]]></dc:creator>
                <pubDate>Wed, 16 Apr 2014 13:49:28 GMT</pubDate>
                
                    <category><![CDATA[Cyber Crimes]]></category>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[Chicago Cyber Crime Lawyer]]></category>
                
                    <category><![CDATA[Chicago White Collar Crimes Attorney]]></category>
                
                
                
                <description><![CDATA[<p>“Cyber security” is the new buzzword sending millions of Americans into a panicked frenzy as they find themselves vulnerable to numerous attacks by cyber criminals. And with the forward march of digitalization over the last two decades cutting across all segments of society, hackers have their work cut out for them. In the 21st century&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<div class="wp-block-image aligncenter">
<figure class="is-resized"><img decoding="async" alt="Cyber Security" src="/static/2026/01/cyber-security.jpg" style="width:px;height:px" /></figure>
</div>

<p>“Cyber security” is the new buzzword sending millions of Americans into a panicked frenzy as they find themselves vulnerable to numerous attacks by cyber criminals. And with the forward march of digitalization over the last two decades cutting across all segments of society, hackers have their work cut out for them.</p>


<p>In the 21<sup>st</sup> century America, “internet” is the name of our new addiction. Information-hungry, tech-savvy users are now empowered to capture, create, and spread content across a variety of mediums and industries, including entertainment, social interaction, education, communication, and even health care. Our tech-infused lives are nothing like they used to be: we now use phones to take pictures, iPods to listen to music, game consoles to entertain our friends; we read books on Kindles and transfer gigabytes of information per minute using USB technology. Modern advancements are making life easier, but they’re also <a href="http://www.dailymail.co.uk/sciencetech/article-565207/Modern-technology-changing-way-brains-work-says-neuroscientist.html" rel="noopener noreferrer" target="_blank">rewiring our brains</a> as they get us more and more hooked.</p>


<p>Expectedly, this full-blown digital revolution isn’t only affecting the average user. Every process, in every industry, across all segments of society – from automobiles to education and national security – is transformed in this massive shift towards paperless and wireless. Our banking systems, utilities, telecommunications, and national security have all moved online. An important and immediate effect? With all the information in the world at our fingertips, digitalization makes everyone powerful – the nature of authority is changing in a transparent world without barriers. Businesses, the media, or state institutions can no longer hide anything from the omnipresent eye of the public – or that of hackers’.</p>


<p>A <a href="http://www.symantec.com/security_response/publications/threatreport.jsp" rel="noopener noreferrer" target="_blank">report</a> published last year internet security firm Symantec revealed that cybercrime – hacking, identity theft, cyber stalking, malicious software, child pornography and abuse – costs the world an estimated $113 billion per year. On average, American companies have to fork over $277 for every customer’s account put at risk by malicious attacks, cost much higher than that of information leaks caused by employee negligence or software failure. The number of victims is well into the hundreds of millions.</p>


<h2 class="wp-block-heading">Spending More Money, a Viable Solution?</h2>

<div class="wp-block-image aligncenter">
<figure class="is-resized"><img decoding="async" alt="Chicago Cyber Crime" src="/static/2026/01/chicago-cyber-crime.jpg" style="width:px;height:px" /></figure>
</div>

<p>For the second year, the Ponemon Institute released an in-depth <a href="http://media.scmagazine.com/documents/54/2013_us_ccc_report_final_6-1_13455.pdf" rel="noopener noreferrer" target="_blank">report</a> titled <em>2013 Cost of Cyber Crime Study: United States</em> that analyzes the costs associated with fighting computer criminal activity directed at individuals, the private business sector, and the national infrastructure. Here were some of the study highlights:</p>


<ul class="wp-block-list">
<li>Cybercrime continues to drain businesses’ resources. Researchers found that, in 2013, the 60 companies surveyed had an annual expense of $11.6 million per year, ranging between $1.3 million and almost $60 million. This is a 26 percent increase compared to last year’s figures, when the average annualized cost didn’t exceed $9 million.</li>
<li>Cyberattacks are now a common sight. If, in 2012, the surveyed companies reported a total number of 102 successful attacks on average every week, in 2013, the number increased at 122.</li>
<li>All industries are vulnerable to cybercrime, but not to the same extent. Companies in retail and consumer products spend far less on fighting computer crime compared to financial companies, defense, and utilities.</li>
<li>The types of attacks that demand the biggest expenditures include web-based attacks and malicious software. Addressing these major problems efficiently, and mitigating costs would require organizations to implement intrusion prevention systems, risk management and compliance solutions, application security testing, enterprise governance, and others.</li>
</ul>


<p>
Clearly, cybersecurity is a real and pressing problem, <a href="http://www.cnet.com/news/study-cybercrime-cost-firms-1-trillion-globally/" rel="noopener noreferrer" target="_blank">threatening the entire world</a>. And certain steps are already being made by the government to decrease the risks of attack and secure critical information. The question is, is this new war against computer crime turning into the expensive, ineffective, and resource-draining waste of time that was the war on drugs? Americans certainly aren’t looking forward to footing the bill of yet another utter failure that will result in billions of tax dollars wasted, overcrowding jails, and millions of lives destroyed.</p>


<p>Spending more money is a solution, according to research from Bloomberg, which estimates that businesses who want to increase their level of security must fork over 9 times more than what they’re currently spending on cyberattack prevention. That is, in order to prevent 95 percent of all attacks, companies will have to increase their budgets from $5.3 billion to $46.6 billion.</p>


<p>On the other hand, many experts believe that putting more money into strategies that aren’t currently working will not increase their efficiency in fighting cybercrime. And yet, many business managers still choose to invest in <a href="http://www.cbsnews.com/news/is-anti-virus-software-a-waste-of-money/" rel="noopener noreferrer" target="_blank">antivirus solutions that can barely detect malware and virus threats</a>, out of fear of being held personally liable in the eventuality of a security breach.</p>


<h2 class="wp-block-heading">Excessive Punishment for Hackers: History Repeating?</h2>

<div class="wp-block-image aligncenter">
<figure class="is-resized"><img decoding="async" alt="Chicago Illinois Prison" src="/static/2026/01/chicago-illinois-prison.jpg" style="width:px;height:px" /></figure>
</div>

<p>Take the case of Eric Wosol, the 38 year old man from Wisconsin who helped the notorious activist group Anonymous to overload Kochind.com’s server, and was given a two-year probation sentence and a $183,000 fine, even though he participated in the attack for no longer than 60 seconds. Or the high-profile case of <a href="http://www.buzzfeed.com/rachelzarrell/journalist-matthew-keys-admits-to-hacking-claims-sleeping-pi" rel="noopener noreferrer" target="_blank">Matthew Keys</a>, a former social media editor at Reuters, who is accused of having turned the login information for the Tribune Company to the same Anonymous, which proceeded to make a prank and change one of the headlines to read “Pressure builds in House to elect CHIPPY 1337.” For this minor act of vandalism, Keys got indicted on three felony charges, and he’s looking at a sentence between 21 and 21 months in jail and possibly a huge fine.</p>


<p>Andrew Auernheimer will spend 41 months in federal prison for having found and exploited a minor AT&T flaw, while Aaron Schwartz will never see the light of day again, committing suicide after being sentenced to 35 years in jail for multiple violations of the Terms of Service agreement.</p>


<p>This trend is not new; excessive punishment was fairly common in the war on drugs. But according to Marvin Ammori from <a href="http://www.wired.com/2014/01/using-computer-drug-war-decade-dangerous-excessive-punishment-consequences/" rel="noopener noreferrer" target="_blank">Wired</a>, “We need to question whether locking people up for long periods of time — without addressing the root concerns about concentrated political power, civil liberties abuses, and transparency — will have the effect of deterrence or worse yet, a hardened cynicism that perpetuates the endless cycle of punishment. That’s true of even non-politically motivated cybercrime, or really, all crime … whether it involves a computer or not.”</p>


<h2 class="wp-block-heading">Are We Winning or Losing the War?</h2>

<div class="wp-block-image aligncenter">
<figure class="is-resized"><img decoding="async" alt="Chicago Cyber Crimes Lawyer" src="/static/2026/01/chicago-cyber-crimes-lawyer.jpg" style="width:px;height:px" /></figure>
</div>

<p>The short answer is: we are definitely losing it. The Federal Bureau of Investigation appears to be overwhelmed by the craft and skills of tech-savvy hackers, according to former executive assistant director Shawn Henry, who was <a href="http://online.wsj.com/news/articles/SB10001424052702304177104577307773326180032?mg=reno64-wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424052702304177104577307773326180032.html" rel="noopener noreferrer" target="_blank">interviewed</a> by the <em>Wall Street Journal:</em> “”I don’t see how we ever come out of this without changes in technology or changes in behavior, because with the status quo, it’s an unsustainable model. Unsustainable in that you never get ahead, never become secure, never have a reasonable expectation of privacy or security.”</p>


<p>More and more often are FBI agents encountering situations where the data breach had occurred months or even years before company executives learned about their security issues. Henry says most of them are shocked at the thought of having had all business operations fully exposed to ill-intended individuals. In the meantime, aside from the daily thousands of crashing websites and virus-infected networks, attacks are now the cause of 18 percent of U.S.-based data center outages. The average cost/outage is $630,000, and the crash can interfere with other vital services based there, such as telephone systems and industrial facilities.</p>


<p>Part of the reason why FBI is often overwhelmed by this disturbing trend is because the organization is outnumbered: there are too many hackers and too many access points to organizations and agencies the FBI wants to protect. On the other hand, the number of agents is not the only shortcoming. According to <a href="http://www.reuters.com/article/2014/03/05/tech-cyber-ddos-idUSL6N0LV2WR20140305" rel="noopener noreferrer" target="_blank">Reuters</a>, attacks are becoming more commonplace than in past years and also much more sophisticated and targeted. Nowadays, it is not uncommon for wireless printers or smartphones to be “co-opted into attacks;” as they become ever more complex and frequent, cyberattacks are leaving automated detection systems far behind.</p>


<p>Ironically, the <a href="http://www.coburn.senate.gov/public/index.cfm?a=Files.Serve&File_id=f1d97a51-aca9-499f-a516-28eb872748c0" rel="noopener noreferrer" target="_blank">FBI is itself the target of cyber criminals</a>: “Over more than a decade, the federal government has struggled to implement a mandate to protect its own IT systems from malicious attacks. As we move forward on this national strategy to boost the cybersecurity of our nation’s critical infrastructure, we cannot overlook the critical roles played by many government operations, and the dangerous vulnerabilities which persist in their information systems.”</p>


<p>The only way to save precious time and resources is for the government to learn from its own mistakes. Enforcing prohibition, excessive punishment, and the reckless wasting of tax dollars will not make our country more protected in the face of cyber criminals. Rather, efforts should continue to be focused on building a database with information of previous attacks (similar to a fingerprint repository) or updating the agency about data security breaches, thus keeping the “cyber panic” under control.</p>


<p><strong>About the Author </strong>
<em><a rel="noopener noreferrer" target="_blank">Andrew M. Weisberg</a> is a criminal defense attorney in Chicago, Illinois. A former prosecutor in Cook County, Mr. Weisberg,is a member of the Capital Litigation Trial Bar, an elite group of criminal attorneys who are certified by the Illinois Supreme Court to try death penalty cases. He is also a member of the Federal Trial Bar. Mr. Weisberg is a sole practitioner at the </em><a href="/skokie-criminal-lawyer"><em>Law Offices of Andrew M. Weisberg</em><em>.</em></a></p>


]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Wiretapping, Now a Potent Tool against White-Collar Crimes]]></title>
                <link>https://www.chicagocriminallawyer.com/blog/wiretapping-now-potent-tool-white-collar-crimes/</link>
                <guid isPermaLink="true">https://www.chicagocriminallawyer.com/blog/wiretapping-now-potent-tool-white-collar-crimes/</guid>
                <dc:creator><![CDATA[Law Offices of Andrew M. Weisberg]]></dc:creator>
                <pubDate>Wed, 22 Jan 2014 11:59:23 GMT</pubDate>
                
                    <category><![CDATA[White Collar Crimes]]></category>
                
                
                    <category><![CDATA[Chicago Criminal Lawyer]]></category>
                
                    <category><![CDATA[Chicago White Collar Crimes Attorney]]></category>
                
                    <category><![CDATA[White Collar Crimes Attorney]]></category>
                
                
                
                <description><![CDATA[<p>1968 was the year when the federal government was first allowed to use wiretapping to record telephone conversations of alleged offenders believed to be involved in drug trafficking and other narco-related crimes. Although there always were mixed opinions about the technique – given the fine line between investigators’ needs and the individual’s privacy rights –&hellip;</p>
]]></description>
                <content:encoded><![CDATA[

<p>1968 was the year when the federal government was <a href="http://en.wikipedia.org/wiki/Omnibus_Crime_Control_and_Safe_Streets_Act_of_1968" rel="noopener noreferrer" target="_blank">first allowed to use wiretapping</a> to record telephone conversations of alleged offenders believed to be involved in drug trafficking and other narco-related crimes. Although there always were mixed opinions about the technique – given the fine line between investigators’ needs and the individual’s privacy rights – wiretapping has started being used extensively in the last two decades.</p>


<p>According to a <a href="http://www.forbes.com/sites/jordanmaglich/2013/05/21/once-reserved-for-drug-crimes-wiretapping-takes-center-stage-in-white-collar-prosecutions/" rel="noopener noreferrer" target="_blank">Forbes article</a>, “the amount of court-issued warrants surging from 1,190 in 2000 to 3,194 in 2010 – a nearly 200% increase.” And if most of the times its use is still reserved to fight violent and organized crime, wiretapping has become a potent tool in high-profile white-collar crimes, as well.</p>

<div class="wp-block-image aligncenter">
<figure class="is-resized"><img decoding="async" alt="Criminal Lawyer" src="/static/2026/01/criminal-lawyer-5.jpg" style="width:px;height:px" /></figure>
</div>

<p>Photo Source: <a href="http://media.npr.org/assets/img/2011/05/11/raj-318e4d07fe81a93b1bcf52479803127c3cc2ed45-s40-c85.jpg" rel="noopener noreferrer" target="_blank">http://media.npr.org/assets/img/2011/05/11/raj-318e4d07fe81a93b1bcf52479803127c3cc2ed45-s40-c85.jpg</a></p>


<p>Wiretaps played a crucial role in the most famous white-collar case of recent years, leading to the conviction of Galleon Group LLC co-founder Raj Rajaratnam in 2011 for conspiracy and security fraud. Prosecutors alleged the billionaire investor had several ‘corporate tipsters’ that provided him insider information – used to make what seemed at the time extremely inspired business investments – and built their case on a series of telephone conversations recorded over the course of 9 months in 2008.</p>


<p>There were <a href="http://www.businessinsider.com/listen-to-the-raj-rajaratnam-wiretaps-2011-3" rel="noopener noreferrer" target="_blank">three major conversations</a> that sealed the trader’s fate. First one records a discussion between Rajaratnam and Rajiv Goel, a former Intel representative, about trading shares of People Support, about which he knows exactly when the price will go up, based on a tip from an inside man. The second conversation is between Raj and a former McKinsey executive about an AMD deal, ended with the latter encouraging Raj to buy up the stocks as soon as possible. On the last recording, Raj is discussing with one of his former partners at Galleon, Adam Smith, about a company named Vishay.</p>


<p>All recorded conversations between Rajaratnam and his informants, 45 in all, were essential to his conviction on 14 counts of securities fraud and conspiracy. On October 13, 2011, he was sentenced to 11 years in prison and fined over $150 million in criminal and civil penalties, the harshest-ever punishment imposed in a white-collar case.</p>


<h2 class="wp-block-heading"><em>Is Wiretapping Necessary?</em></h2>

<div class="wp-block-image aligncenter">
<figure class="is-resized"><img decoding="async" alt="White Collar Crimes Attorney" src="/static/2026/01/white-collar-crimes-attorney.jpg" style="width:px;height:px" /></figure>
</div>

<p>According to the federal <a href="http://www.law.cornell.edu/uscode/text/18/2518" rel="noopener noreferrer" target="_blank">Wiretap Act</a>, investigators must resort to wiretapping only if conventional investigative techniques prove unfruitful – they must demonstrate exactly how other procedures have failed or would have been too dangerous in those circumstances. The law was recently updated in order to “minimize the interception of communications not otherwise subject to interceptions” and limit unnecessary intrusion into the suspect’s privacy.</p>


<p>Wiretapping is particularly important as part of investigators’ toolbox when the phone is regularly used to conduct criminal activities currently under investigation. Especially when it comes to organized crime and drug-related cases, there are few conventional alternatives for proving offenses, and prosecutors have no trouble showing that wiretapping was indeed needed. In white-collar crime cases, however, especially high-profile ones, regulatory agencies may claim prosecutors are acting with ‘reckless disregard’ of the defendant’s privacy rights and question the legality of wiretaps.</p>


<p>Charges for white-collar crimes are serious criminal accusations that should not be taken lightly. If you have been requested to appear before a Grand Jury in relation to an investigation into such criminal offenses, the experience and talent of a <a href="/case-review">criminal defense lawyer</a> can prove extremely valuable in preparing your case for the proceeding. Call Mr. Weisberg cell phone 24/7 at <strong>773-908-9811 </strong>or text ‘LAWYER’ to 25827 to receive a call back.</p>


<p><strong><em><strong>About the Author</strong></em></strong>
<em><a rel="noopener noreferrer" target="_blank">Andrew M. Weisberg</a> is a criminal defense attorney in Chicago, Illinois. A former prosecutor in Cook County, Mr. Weisbergis a member of the Capital Litigation Trial Bar, an elite group of criminal attorneys who are certified by the Illinois Supreme Court to try death penalty cases. He is also a member of the Federal Trial Bar. Mr. Weisberg is a sole practitioner at the </em><a href="/practice-areas/white-collar-crimes/"><em>Law Offices of Andrew M. Weisberg</em><em>.</em></a></p>


]]></content:encoded>
            </item>
        
    </channel>
</rss>