Sentences with phrase «criminal schemes involving»

On Friday, prosecutors disclosed that Shirley L. Huntley, when she was a Democratic state senator from Queens, had secretly recorded conversations with seven elected officials and two other people after she was confronted by the F.B.I. and asked about her alleged participation in criminal schemes involving embezzlement and bribery.
The complaint says that the men were involved in «two overlapping criminal schemes involving bribery, corruption and fraud in the awarding of hundreds of millions of dollars in state contracts and other official state benefits.»
Court papers say the charges announced Thursday come from «two overlapping criminal schemes involving bribery, corruption, and fraud in the award of hundreds of millions of dollars in State contracts and other official State benefits.»

Not exact matches

New York Senate Leader Dean Skelos has been charged with extortion, conspiring to commit fraud, and soliciting bribes in a corruption scheme also involving his son Adam Skelos — making Mr. Skelos the second of Albany's famous «three men in a room» leadership to face criminal charges from U.S. Attorney Preet Bharara.
«Peter Galbraith Kelly was involved in a criminal scheme to bribe one of the most powerful men in New York in exchange for favorable treatment for his energy company,» said U.S. Attorney Geoffrey Berman in a statement.
The former Speaker faces up to 12 years in prison for two criminal schemes, one of which involved real estate developers.
Kaloyeros stepped down from the leadership of SUNY Polytechnic Institute in the fall after it was alleged in federal and state criminal complaints that he took part in a wide - ranging scheme that involved bid - rigging and bribery.
The criminal complaint alleges Silver got approximately $ 700,000 through another scheme involving a real estate firm.
These criminals also use stories of severe life circumstances, tragedies, deaths in the family, injuries to themselves, or other hardships to keep their victims concerned and involved in their schemes.
Based on the true story of Dutch criminal Cor Van Hout (Jim Sturgess), Mr. Heineken follows Van Hout and his gang of similarly beefcake - ey friends as they plot a get - rich - quick scheme that involves kidnapping beer magnate Freddy Heineken (Anthony Hopkins), and although Van Hout's life and the Heineken case could have made for an interesting film if director Daniel Alfredson (The Girl Who Played With Fire) had avoided editorializing, it's hard to be really be compelled by a movie that endorses crime, particularly crime committed by people with a certain amount of privilege.
You will not, and will not allow or authorize others to, use the Services, the Sites or any Materials therein to take any actions that: (i) infringe on PetSmart Charities» or any third party's copyright, patent, trademark, trade secret or other intellectual or proprietary rights, or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, constitute discrimination based on race, religion, ethnicity, gender, sex, disability or other protected grounds, or are pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on PetSmart Charities or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices, or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate any applicable «anti-spam» legislation, including that commonly referred to as «CASL»; (vii) would be or encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, national or international laws or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interference with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of PetSmart Charities» or another party's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other account users or attempt to gain access to other account users» accounts or otherwise mine information about other account users or the Sites, or interfere with any other user's ability to access or use the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) in PetSmart Charities» sole discretion, are contrary to PetSmart Charities» public image, goodwill, reputation or mission, or otherwise not in furtherance of our Vision of a lifelong, loving home for every pet.
You will not, and will not allow or authorize others to, use the Services or the Sites to take any actions that: (i) infringe on any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, discriminatory based on race, ethnicity, gender, sex or disability, pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on the Animal League or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN - SPAM Act of 2003); (vii) would encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, federal or international laws, rules or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interfere with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of the Animal League's or other's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other Animal League members, Site users or attempt to gain access to other Animal League members information, or otherwise mine information about Animal League members, Site users, or the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) are contrary to the Animal League's public image, goodwill, reputation or mission or otherwise not in furtherance of the Animal Leagues stated purposes.
Assuming, for the moment, that an emissions trading scheme that would actually do the job is off the table, due to political cowardice in the face of the filth merchant lobby, then it seems to me that the next least bad set of options involves finding the cheapest way to buy these criminals off.
Home Daily News Former New York Assembly speaker is convicted... Criminal Justice By Debra Cassens Weiss Posted May 11, 2018, 4:45 pm CDT Sheldon Silver / New York State Assembly Former New York Assembly Speaker Sheldon Silver was convicted on federal corruption charges in his retrial Friday in connection with schemes that involved referral fees from law... Continue reading «Former New York Assembly speaker is convicted in retrial based on law firm referral fees»
Federal and state criminal prosecutors have roped our corporate clients into a myriad of white collar criminal allegations from running illegal operations involving counterfeiting and gambling, to market manipulation, bid rigging, trafficking in counterfeit goods and creating fraudulent investment vehicles as facades for Ponzi schemes.
A common aspect of the scheme involves the criminal hacking the sender's email (unbeknownst to them) and sending you an email that looks like other legitimate emails you have received from that party.
a b c d e f g h i j k l m n o p q r s t u v w x y z