ELECTRONIC SURVEILLANCE. Attacking Insider Trading and Other White Collar Cases Built on Evidence From Government Wiretaps: The Nuts and Bolts

Similar documents
Case 1:11-cr JSR Document 20 Filed 01/03/12 Page 1 of 22

TITLE III WIRETAPS. WHO S LISTENING?

UNPUBLISHED UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT. No

F I L E D August 26, 2013

Protecting the Privilege When the Government Executes a Search Warrant

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute

Case 3:07-cr NBB-SAA Document 112 Filed 02/19/2008 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF MISSISSIPPI

IN THE SUPERIOR COURT OF THE STATE OF DELAWARE IN AND FOR KENT COUNT

IN THE UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT

NAPD Formal Ethics Opinion 16-1

When the cartel investigators come calling: Top ten do s, top ten don ts

IN THE UNITED STATES COURT OF APPEALS FOR THE ELEVENTH CIRCUIT. No D.C. Docket No. 1:10-cr TWT-AJB-6. versus

Case 5:14-cr M Document 27 Filed 05/04/15 Page 1 of 32 IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF OKLAHOMA

WHAT TO DO WHEN THE GOVERNMENT COMES CALLING:

O n January 8, 2015, the United States Court of Appeals

Case 1:07-cr BSJ Document 45 Filed 05/21/2008 Page 1 of 10. PAUL C. BARNABA, : 07 Cr. 220 (BSJ)

PRINCIPLES OF AMERICAN CRIMINAL LAW AND PROCEDURE

Follow this and additional works at:

HOW A CRIMINAL CASE PROCEEDS IN FLORIDA

Case 1:11-cr JSR Document 43 Filed 03/27/12 Page 1 of x x. Pending before the Court are defendant Rajat Gupta's

An Introduction. to the. Federal Public Defender s Office. for the Districts of. South Dakota and North Dakota

RECENT THIRD CIRCUIT AND SUPREME COURT CASES

Case 8:18-cr TDC Document 35 Filed 10/23/18 Page 1 of 14 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND

As DOJ Confronts Setbacks in Litigated FCPA Cases, The Government s Overall FCPA Enforcement Program Faces Increasing Scrutiny

View from a Federal Prosecutor: Legal Pitfalls to Avoid. Medtrade Spring March 28, 2018 Mark Rush Josh Skora

A Review of the Current Health Care Fraud Enforcement Environment Brian McEvoy & Ellen Persons

IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF OKLAHOMA

I n January 2009, with the deepening financial crisis

IN THE COURT OF APPEALS FIRST APPELLATE DISTRICT OF OHIO HAMILTON COUNTY, OHIO

Supreme Court of Florida

PUBLISHED AS A PUBLIC SERVICE BY THE OFFICE OF DISCIPLINARY COUNSEL

Emily Stern. Partner Madison Avenue New York, NY Practices. Industries. Selected Experience

SUPREME COURT OF THE UNITED STATES

CFTC Adopts Final Anti-Manipulation and Anti-Fraud Rules & Begins Final Rulemaking Phase Implementing Dodd-Frank

Chapter 10 The Criminal Law and Business. Two elements must exist at the same time for a person to be convicted of a crime:

Give Me Back My Books and Records: Application of Rule 41(g) in

Criminal Provisions and Implications of the Dodd-Frank Act

UNITED STATES DISTRICT COURT EASTERN DISTRICT OF WISCONSIN. Plaintiff, Case No. 17-CR-124

Responding to Government Investigations of Fraud and Abuse: Legal and Practical Issues

Follow this and additional works at:

SUPREME COURT OF THE UNITED STATES

IN THE COURT OF APPEALS OF OHIO SECOND APPELLATE DISTRICT CLARK COUNTY : : : : : : : : : :... O P I N I O N

IN THE SUPREME COURT OF THE STATE OF FLORIDA. v. Case No. 5D02-503

USA v. Anthony Spence

Follow this and additional works at:

CASE COMMENT ELECTRONIC SURVEILLANCE: NATIONAL SECURITY AND THE PRESERVATION OF THE RIGHTS GUARANTEED BY THE FOURTH AMENDMENT

UNITED STATES COURT OF APPEALS TENTH CIRCUIT ORDER AND JUDGMENT* Before GORSUCH, SEYMOUR, and PHILLIPS, Circuit Judges.

State of New York Supreme Court, Appellate Division Third Judicial Department

United States Court of Appeals For the Seventh Circuit Chicago, Illinois 60604

CHAPTER 119 WIRE AND ELECTRONIC COMMUNICATIONS INTERCEPTION AND INTERCEPTION OF ORAL COMMUNICATIONS

Obstruction of Justice: An Abridged Overview of Related Federal Criminal Laws

Whitman v. United States: U.S. Supreme Court Considers Deference to Agencies Interpretations of Criminal Statutes

OFFICE OF THE FEDERAL PUBLIC DEFENDER EASTERN DISTRICT OF NORTH CAROLINA U.S. SUPREME COURT CRIMINAL LAW UPDATE

Crisis Management Initial Response Checklist

Click to Print or Select 'Print' in your browser menu to print this document.

Ten years ago, the antitrust division

Fall, Criminal Litigation 9/4/17. Criminal Litigation: Arraignment to Appeal. How Do We Get A Case?

Emerging Technology and the Fourth Amendment

Chapter 10 The Criminal Law and Business. Below is a table that highlights the differences between civil law and criminal law:

DISTRICT COURT OF APPEAL OF THE STATE OF FLORIDA FOURTH DISTRICT

Supreme Court of the United States

USA v. Bernabe Palazuelos-Mendez

Case 3:07-cr NBB-SAA Document 91 Filed 02/11/2008 Page 1 of 19 UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF MISSISSIPPI

Packet Two: Criminal Law and Procedure Chapter 1: Background

Criminal Litigation: Step-By-Step

Appendix B. State Wiretap Legislation (as of June 1, 2002)

UNITED STATES COURT OF APPEALS FOR THE SECOND CIRCUIT SUMMARY ORDER

Department of Justice

USA v. Michael Wright

Case 1:17-cr ABJ Document 525 Filed 02/23/19 Page 1 of 25 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA. Crim. No.

Organized Crime And Racketeering

Case 1:15-cr KMW Document 23 Filed 09/04/15 Page 1 of 15 MEMORANDUM OF LAW IN SUPPORT OF DEFENDANTS MOTION FOR A BILL OF PARTICULARS

NOT FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT

Case 8:09-cr CJC Document 54 Filed 05/18/12 Page 1 of 17 Page ID #:143

NEW YORK LAW SCHOOL LAW REVIEW

UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA SAN FRANCISCO DIVISION

Case 2:10-cr MHT -WC Document 372 Filed 01/26/11 Page 1 of 8

Court Records Glossary

UNITED STATES DISTRICT COURT FOR THE CENTRAL DISTRICT OF CALIFORNIA ) ) ) ) ) ) ) ) ) ) )

USA v. David McCloskey

A Guide for Victims & Witnesses

Follow this and additional works at:

U.S. Department of Justice

Strickland v. Washington 466 U.S. 668 (1984), still control claims of

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF TEXAS SHERMAN DIVISION. v. Case No. 4:07-cv-279

FraudMail Alert. Background

CARLYN MALDONADO-MEJIA OPINION BY v. Record No JUSTICE DONALD W. LEMONS JANUARY 10, 2014 COMMONWEALTH OF VIRGINIA

STATE OF MICHIGAN COURT OF APPEALS

Follow this and additional works at:

Case 2:10-cr MHT -WC Document 608 Filed 02/14/11 Page 1 of 10

The Witness and the Justice System in Alberta

UNITED STATES OF AMERICA, Plaintiff-Appellee, v. MICHAEL E. PARKER, Defendant-Appellant. No

UNITED STATES COURT OF APPEALS

v No Lenawee Circuit Court I. FACTUAL BACKGROUND

No IN THE UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT UNITED STATES OF AMERICA, ROBERT F. MCDONNELL,

Respondent Kenneth Miller (Respondent Miller), a former Senior. Complaint filed by the Judicial Conduct Board. The Complaint contains two

Case 1:14-cv JSR Document 461 Filed 02/19/16 Page 1 of 13

Under the Sarbanes-Oxley Act (SOX), no company or company representative

Sneak and Peak Search Warrants

Building Your Civil RICO Action From a Claims and Legal Standpoint to Withstand a Rule 11 Motion and/or a Rule 12b(6) Motion to Dismiss

Transcription:

Criminal Law Reporter Reproduced with permission from The Criminal Law Reporter, 92 CrL 550, 02/13/2013. Copyright 2013 by The Bureau of National Affairs, Inc. (800-372-1033) http://www.bna.com ELECTRONIC SURVEILLANCE Attacking Insider Trading and Other White Collar Cases Built on Evidence From Government Wiretaps: The Nuts and Bolts BY PAMELA JOHNSTON, JAIME GUERRERO AND Pamela L. Johnston and Jaime Guerrero are partners in Foley & Lardner LLP s Los Angeles office where they specialize in representing clients in white collar criminal and other government enforcement matters. Both were federal prosecutors in the U.S. Attorney s Office in Los Angeles. Guerrero handled many wiretap issues as a prosecutor. Johnston handled insider trading and other criminal securities cases as a prosecutor and does the same as a defense lawyer. Alexander Kramer, a senior associate at Foley & Lardner, specializes in white collar matters. ALEXANDER KRAMER A bridge has been crossed: Federal prosecutors are using federal wiretaps to obtain evidence in white collar cases, specifically, in insider trading cases. Use of such an invasive law enforcement tool in a white collar case was virtually unheard of 10 years ago. But as times change, so do the methods of investigating white collar cases. Indeed, the U.S. Attorney for the Southern District of New York ventured out and has staked the reputation of the Department of Justice on the merits of such an approach. So far, this new approach to combating insider trading has yielded approximately 70 convictions since 2009, 1 with more likely to follow around the country as the technique grabs hold in California and elsewhere. The most famous, to date, has been the prosecution and conviction of the former CEO of the Galleon hedge fund, Raj Rajaratnam. Wiretaps, and the evidence gained from them, helped convict Rajaratnam and led to numerous guilty pleas from money managers, traders, consultants, lawyers, and others associated with the insider trading charges in his case. Listening to recorded conversations during a trial allows a jury to hear the actual words of the defendant, and such evidence can be quite damning and difficult to counter. Thus, when arrested or charged in a white collar case that rests on wiretap evidence, the defendant should give strong consideration to allocating significant defense resources to challenge the wiretaps before trial to obtain an order that suppresses the recorded evidence, as was tried in the Rajaratnam case. Indeed, the best, and sometimes only, chance a defendant may have to mitigate the situation is a well-founded attack on the wiretap evidence. Consequently, understanding the processes for obtaining wiretaps and, more important, attacking wiretaps are important tools for white collar attorneys to wield. This article focuses on the nuts and 1 Michael Bobelian, The Obscure Insider Trading Case That Started It All, FORBES, Nov. 30, 2012, available at http:// www.forbes.com/sites/michaelbobelian/2012/11/30/theobscure-insider-trading-case-that-started-it-all/. COPYRIGHT 2013 BY THE BUREAU OF NATIONAL AFFAIRS, INC. ISSN 0011-1341

2 bolts of obtaining wiretaps and attacking wiretap evidence in white collar cases. The Rajaratnam Appeal Rajaratnam s conviction rested soundly on wiretap evidence. He is now appealing his conviction, arguing, in major part, that the wiretaps were obtained using false statements and omissions and that the resulting recorded conversations should have been suppressed. 2 A three-judge panel of the U.S. Court of Appeals for the Second Circuit in New York heard arguments regarding the wiretaps and suppression on Oct. 25. No decision has been handed down, and the case is pending. Rajaratnam was the head of the Galleon Group, which operated a family of hedge funds. He was charged with leading multiple conspiracies from 2003 through 2009 to trade securities of 19 public companies based on material, nonpublic information. Rajaratnam was accused of obtaining nonpublic information from senior executives at IBM, McKinsey & Co., Intel Capital, and others. In late 2006, the Securities and Exchange Commission began investigating Rajaratnam and the Galleon Group for insider trading. As part of this investigation, the SEC obtained access to millions of pages of documents, conducted multiple interviews, subpoenaed records, and took sworn testimony from Rajaratnam and others. As was later revealed, in March 2007 the SEC believed it had found limited evidence of insider trading and briefed the U.S. Attorney s Office for the Southern District of New York and the FBI about what the SEC had uncovered. 3 A year later, on March 7, 2008, to obtain additional evidence, the government sought a warrant to place a wiretap on Rajaratnam s cellphone. In the wiretap application, the government used information provided to it from the SEC investigation as well as a cooperating informant. The wiretap application also stated that normal investigative techniques had been tried and either failed or reasonably appeared unlikely to succeed. This was the key representation made to the district court. Absent such a representation, the wiretap cannot be ordered. The district court approved the wiretap application, and the government began intercepting wire communications over Rajaratnam s telephone line. The government sought and received permission to intercept such wire communications a total of eight times. 4 The government intercepted 2,200 calls. After he was criminally charged, Rajaratnam moved to suppress the wiretaps using two arguments. First, he argued that the government made false statements and omissions in establishing probable cause for the warrants, specifically arguing that the government failed to state in its application that the cooperating informant had a prior felony conviction. Second, he argued that the government made false statements and omissions regarding the necessity for a wiretap, specifically arguing that the government omitted that the SEC had been conducting an investigation and that the government 2 Brief for Defendant-Appellant at 18-20, United States v. Rajaratnam, No. 11-4416 (2d Cir. Jan. 25, 2012). 3 Brief for the United States at 18-20, United States v. Rajaratnam, No. 11-4416 (2d Cir. Jan. 25, 2012). 4 Id. at 20-22. had access to the documents and information from that investigation. The district court ordered a hearing on the issue and held that while the government recklessly made false statements and omissions when seeking approval of the wiretaps, they were not material and that necessity was shown after the fact during the hearing held before the district court. Therefore, the court did not suppress the wiretaps. Rajaratnam s appeal argues that the district court erred in this ruling. 5 Title III Wiretaps: Nuts and Bolts The applicable law that governs federal wiretaps is Title III of the Omnibus Crime Control and Safe Streets Act of 1968, 18 U.S.C. 2510-2522. Title III permits district courts to authorize electronic surveillance by government officers in specified situations. Specifically, Title III authorizes the interception of wire communications if the crime under investigation is one of the enumerated offenses listed under 18 U.S.C. 2516. Section 2516 lists numerous crimes and categories of crimes for which wiretaps may be authorized. This list has been expanded over time and includes crimes related to organized crime, narcotics, and other felonies such as mail fraud (18 U.S.C. 1341), wire fraud (18 U.S.C. 1343), money laundering (18 U.S.C. 1956 and 1957), obstruction of justice (18 U.S.C. 1503), and bank fraud (18 U.S.C. 1344). While the specific securities fraud offenses and foreign corruption offenses in Title 15 are not on the list of offenses under Section 2516, prosecutors can usually seek to characterize an insider trading case, a foreign corruption scheme, or other white collar scheme as a species of wire fraud to avoid this omission in the statute. 6 Further, Section 2517 allows use of properly obtained recorded communications to prosecute crimes not listed in Section 2516. 7 These provisions act to permit a very broad set of circumstances where wiretaps are permitted to be used. It should be expected that government authorities will increasingly look to use wiretaps in white collar investigations and prosecutions. Title III sets forth specific criteria that must be included by the government in an application to obtain a warrant for a wiretap. This procedure is governed specifically by 18 U.S.C. 2518(1), and the required factual elements are: (a) The identity of the law enforcement officer submitting the application; (b) A full and complete statement of the facts and circumstances relied upon by the applicant to justify his belief that an order should be issued, in particular: (i) details of the alleged offense specified in Section 2516; (ii) the nature and location of the facilities from which the communications are to be intercepted (i.e. the telephone number, the type of telephone, and its location); 5 Brief for Defendant-Appellant at 3, United States v. Rajaratnam, No. 11-4416 (2d Cir. Jan. 25, 2012). 6 Section 2516. 7 Section 2517. 2-13-13 COPYRIGHT 2013 BY THE BUREAU OF NATIONAL AFFAIRS, INC. CRL ISSN 0011-1341

3 (iii) a particular description of the type of communications sought to be intercepted; and (iv) the identity of the person, if known, committing the offense and whose communications are to be intercepted; (c) a full and complete statement as to whether other investigative procedures have been tried and failed or why they reasonably appear to be unlikely to succeed if tried or to be too dangerous (this is the so-called necessity requirement at issue in the Rajaratnam appeal); (d) a statement of the period of time for which the interception is required to be maintained; (e) a full and complete statement of the facts concerning all previous applications involving any of the same people, facilities, or places; and 8 Section 2518. 9 Id. 10 Id. 11 United States v. Torres, 901 F.2d 205, 231 (2d Cir. 1990). (f) where the application is for the extension of an order, a statement setting forth the results thus far obtained from the interception, or a reasonable explanation of the failure to obtain such results. Thus, the applicant must state under oath to the district court that all other reasonable means to obtain evidence will be unlikely to succeed if tried, that wiretap evidence is necessary, that probable cause exists to believe that the person under investigation is currently committing or has committed the specific crime listed, and that the information about the person and the telephone to be tapped are not stale. In connection with such an application, a judge may require the applicant to provide additional information. 8 After such an application is made, the district court may enter an order approving the wiretap if it determines on the basis of the facts submitted by the applicant that there is probable cause to believe (a) that an individual is committing, has committed, or is about to commit a particular offense covered by Title III; (b) that particular communications concerning the offense will be obtained through the wiretap; and (c) that the premises to be wiretapped were being used for criminal purposes or were about to be used or owned by the target of the wiretap. 9 Additionally, the district court must find that normal investigative procedures have been tried and have failed or reasonably appear to be unlikely to succeed if tried or to be too dangerous. 10 The intended purpose of this so-called necessity requirement is to ensure that wiretaps are not resorted to in situations where traditional investigative techniques would suffice. 11 Judicial oversight of wiretaps is critical to enforcing the strict limitations placed on wiretapping by Title III. By their very nature, wiretaps involve an intrusion on privacy that is very broad in scope. Consequently, Title III demands close judicial oversight of wiretaps. But district judges can perform this role only if the government is forthright during the wiretap application process, particularly because the proceedings are in camera and ex parte. District judges are required to carefully scrutinize wiretap applications and their supporting documents to determine whether Title III s requirements are satisfied prior to approving a wiretap. 12 With all that said, the practical reality is that even with the significant judicial oversight called for by Title III, wiretaps are overwhelmingly approved by federal judges on the basis of the representations made in wiretap applications. In fact, in 2010, only one out of 3,195 intercept applications was ultimately denied. 13 In 2011, only two out of 2,732 applications were ultimately denied. 14 Considering how damaging evidence from wiretaps can be, coupled with the frequency with which wiretaps are ultimately being approved, defendants must be prepared to take a serious look at challenging improperly obtained wiretaps and attempting to suppress any related evidence. Attacking Wiretap Evidence In a White Collar Case In addition to providing the procedures regarding obtaining wiretaps, Title III also provides a procedure for any aggrieved person to move to suppress the contents of a wiretap, or evidence obtained from a wiretap, where the wiretap was obtained in violation of the statute. 15 An aggrieved person is any person who was a party to any intercepted wire or a person against whom the interception was directed. 16 An aggrieved person may move to suppress unlawfully intercepted wire communications under both Title III and the Fourth Amendment. For purposes of a criminal trial, a suppression motion must be made prior to trial unless there was no opportunity to make such a motion or the person was not aware of the grounds of the motion. If the government wishes to use the contents of a wiretap at trial or in any other proceeding, it must provide each party with a copy of the application and court order approving the wiretap at least 10 days before the proceeding. 17 Defendants must be careful to submit a motion to suppress in a timely manner. 18 Title III specifically requires suppression of any wiretap, or any evidence derived therefrom, if the wiretap fails to satisfy the requirements set forth in Title III (as discussed in more detail above). 19 This includes where the wiretap application or approval fails to meet the necessity requirement. Failure to show that normal investigative procedures have been tried and have failed or reasonably appear to be unlikely to succeed if tried mandates suppression. 20 Further, Title III states that any aggrieved party may move to suppress a wiretap where: (1) the communication was unlawfully intercepted; (2) the order of authorization or approval under 12 United States v. Marion, 535 F.2d 697, 703 (2d Cir. 1976). 13 Administrative Office of the U.S. Courts, 2010 Wiretap Report 7 (2011). 14 Administrative Office of the U.S. Courts, 2011 Wiretap Report 7 (2012). 15 18 U.S.C. 2518(10). 16 Section 2510(11). 17 Section 2518(9). 18 United States v. Torres, 908 F.2d 1417, 1424 (9th Cir. 1990). 19 Section 2515. 20 Id.; see also United States v. Forrester, 616 F.3d 929, 943 (9th Cir. 2010) (citing United States v. Khan, 415 U.S. 143, 153 n.12 (1974)). CRIMINAL LAW REPORTER ISSN 0011-1341 BNA 2-13-13

4 which it was intercepted is insufficient on its face; or (3) the interception was not made in conformity with the order of authorization or approval. 21 A motion to suppress may also be brought under the Fourth Amendment. Where a defendant challenges a wiretap on the ground that it contains false statements or omits information, the court applies the analysis set forth in Franks v. Delaware, 438 U.S. 154 (1978). In a Franks hearing, a wiretap obtained by relying on false statements or omissions in an application may be suppressed if a defendant can establish: (1) that the false statements and/or omissions were the product of a deliberate falsehood or reckless disregard for the truth and (2) that after setting aside the falsehoods and adding the omitted material, what remains of the application is insufficient to support the warrant. 22 If what is left no longer supports a finding of probable cause, the information garnered from the warrant should be suppressed. The district court s analysis in Rajaratnam will need to be examined carefully in light of this standard because the district court permitted evidence developed during the Franks hearing to be used to uphold the wiretap. Using the Franks analysis as it pertains to the necessity requirement, a bifurcated standard of review applies. First, the court reviews whether a wiretap application is supported by a full and complete statement of the facts in compliance with Title III. If a wiretap is so supported, the court then reviews whether the wiretap, based on the supporting documentation, meets the necessity requirement. 23 An example of how this is applied comes from analyzing how the Ninth Circuit approaches reviewing the necessity requirement. When reviewing the necessity requirement, the Ninth Circuit employs a common sense approach to evaluating the reasonableness of the government s good-faith efforts to use traditional investigative tactics or its decision to forgo such tactics based on the unlikelihood of their success or the probable risk of danger involved with their use. 24 Simply stating in a conclusory manner that traditional investigative techniques are unlikely to succeed is insufficient in the Ninth Circuit to establish necessity. 25 The government must provide specific information that explains, in reasonable, case-specific detail, why traditional investigative techniques will not suffice. 26 Failure to do so can result in suppression. United States v. Gonzales Inc., 412 F.3d 1102 (9th Cir. 2005), provides an example of where evidence derived from a wiretap was suppressed. While it is not a white collar case, the court s analysis is still instructive. In Gonzales, the Ninth Circuit affirmed a district court order suppressing evidence from a wiretap because the wiretap application did not meet the necessity requirement. Specifically, the court held that normal investigative procedures had not been adequately utilized and that such procedures were reasonably likely to succeed. 27 The court found a lack of necessity because the investigation conducted prior to requesting the wiretap was very brief, lasting only five days, and attempted only very limited physical surveillance. 28 More was expected before a wiretap application could satisfy the necessity requirement. Evidence obtained from a wiretap has also been suppressed where the information used in an application for a wiretap has become stale. This issue is particularly relevant to extensions for wiretaps. Title III requires that each extension of the time period for an initial wiretap be supported by independent probable cause. 29 Simply restating and rehashing information from earlier applications and wiretaps does not give rise to a sufficient level of probable cause for a wiretap to be approved. 30 Information regarding extensions of wiretaps must be fresh and take into account what has been learned from the prior wiretaps and other sources. United States v. Williams, 2000 U.S. Dist. LEXIS 13172 (E.D. La. Sept. 5, 2000), provides an example of a situation where evidence was suppressed because an extension for a wiretap relied on stale information. In Williams, a drug case, the court held that the first two wiretaps were validly supported and necessary. 31 However, by the time the second and third extensions were being requested, facts had changed significantly but were largely not taken into consideration in the applications. For example, the defendant in the case had since been arrested and search warrants had been executed. 32 The court found that information came to light that should have led the government to return to normal investigative techniques. 33 Despite these developments, the applications for the wiretap extensions largely rehashed the earlier applications regarding the necessity for the wiretap and ignored these new facts. Consequently, the court held that the applications relied on stale information and failed to establish the continuation of the necessity requirement, and it suppressed the evidence from the wiretaps. 34 Information regarding how wiretaps are obtained and the required components of a wiretap application and order are necessary to be able to attack a wiretap. Substantive errors and omissions in the application process provide defendants with an opportunity to defeat the warrant and prevent the recorded conversations from being heard by a jury. Wiretaps in the White Collar Context When the government s white collar case rests on wiretap evidence, it would be wise for a defendant to consider expending precious defense resources to analyze and potentially attack the wiretap application. In some of these situations, the wiretap was not necessary, and the government s application for it was not adequately supported in light of the caselaw. There is a 21 Section 2518(10). 22 See United States v. Coreas, 419 F.3d 151, 155 (quoting Franks, 438 at 171-72). 23 United States v. Forrester, 616 F.3d 929, 934 (9th Cir. 2010). 24 United States v. Garcia-Villalba, 585 F.3d 1223, 1228 (9th Cir. 2009). 25 United States v. Gonzales Inc., 412 F.3d 1102, 1115 (9th Cir. 2005). 26 Garcia-Villalba, 585 F.3d at 1229-30. 27 Gonzales Inc., 412 F.3d at 1112-15. 28 Id. at 1108. 29 Section 2518(5); United States v. Shipp, 578 F. Supp. 980, 988 (S.D.N.Y. 1984). 30 United States v. Williams, 2000 U.S. Dist. LEXIS 13172, at *10 (E.D. La. Sept. 5, 2000). 31 Id. at *8-12. 32 Id. 33 Id. 34 Id. 2-13-13 COPYRIGHT 2013 BY THE BUREAU OF NATIONAL AFFAIRS, INC. CRL ISSN 0011-1341

5 reason white collar cases have not traditionally rested on wiretap evidence. Wiretaps have never been more important in the white collar context. In a post-2008 financial crisis world, government prosecutors and investigators are opening up their arsenals and using every possible weapon they have in pursuing white collar cases. Investigative techniques such as undercover agents, confidential informants wearing hidden wires, and wiretaps are no longer being reserved for violent crimes. DOJ and U.S. Attorney s Offices have demonstrated they intend to use these tools as part of their white collar investigations. As emphasized by the incredible amount of media attention it has received, the Rajaratnam case is one of the most prominent examples of this. But it is definitely not the only example. In the context of the Foreign Corrupt Practices Act, the SHOT Show investigation and ensuing trials saw the use of undercover agents, confidential informants, and consensually recorded meetings. 35 While wiretaps were not used in that case, DOJ 35 Press release, Department of Justice, Twenty-Two Executives and Employees of Military and Law Enforcement officials have stated they continue to look to investigate FCPA violations and will use whatever tools they can to prosecute violators. It is widely speculated that wiretaps are already being used to investigate potential FCPA violations. It is also likely that wiretaps are being used beyond New York to investigate additional insider trading cases and other white collar cases. While the Galleon-related cases marked the first widespread use of wiretaps in an insider trading case, prosecutors have sparingly used wiretaps in criminal investigations of mail and wire fraud conspiracies, bank fraud schemes, and healthcare fraud schemes in the past. The Rajaratnam case and others have put the world on notice that federal criminal prosecutors are expanding the use of these invasive tools to investigate insider trading and other types of sophisticated white collar cases. Defendants and their attorneys must be ready to confront these tactics and appropriately challenge the use of evidence they yield. Products Companies Charged in Foreign Bribery Scheme (Jan. 19, 2010) (available at http://www.justice.gov/opa/pr/2010/ January/10-crm-048.html). CRIMINAL LAW REPORTER ISSN 0011-1341 BNA 2-13-13