WHAT IS IDENTITY THEFT?

Similar documents
Supreme Court of Florida

OKLAHOMA IDENTITY THEFT RANKING BY STATE: Rank 25, 63.9 Complaints Per 100,000 Population, 2312 Complaints (2007) Updated January 10, 2009

UTAH IDENTITY THEFT RANKING BY STATE: Rank 31, 57.8 Complaints Per 100,000 Population, 1529 Complaints (2007) Updated December 30, 2008

INDIANA FALSE CLAIMS AND WHISTLEBLOWER PROTECTION ACT

NEW YORK IDENTITY THEFT RANKING BY STATE: Rank 6, Complaints Per 100,000 Population, Complaints (2007) Updated January 25, 2009

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Enrolled. Senate Bill 505

O.C.G.A. TITLE 23 Chapter 3 Article 6. GEORGIA CODE Copyright 2015 by The State of Georgia All rights reserved.

District of Columbia False Claims Act

Marion County Attorney s Office 214 E. Main Knoxville, IA (641) TO ALL BUSINESSES/PERSONS UTILIZING THE BAD CHECK PROCEDURE

Rhode Island False Claims Act

(Approved December 30, 2010) AN ACT

Identity Theft Victim s Packet

Colorado Medicaid False Claims Act

TABLE OF CONTENTS A. POLICY 1 B. GENERAL 1 C. WEAPONS IN THE COURTHOUSE OR SATELLITE COURTHOUSE 2 D. CASE FILING 2 E. PRE-TRIAL CONFERENCE 4

JUDICIARY OF GUAM ELECTRONIC FILING RULES 1

MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY

PART III Discovery CHAPTER 8. Overview of the Discovery Process KEY POINTS THE NATURE OF DISCOVERY THE EXTENT OF ALLOWABLE DISCOVERY

A hearing was conducted, telephonically, on September 15, 2016 to consider the

31 U.S.C. Section 3733 Civil investigative demands

Referred to Committee on Judiciary. SUMMARY Makes various changes relating to electronic documents and electronic signatures.

CHAPTER 354. (Senate Bill 60)

STUDENT PERMIT APPLICATION INSTRUCTIONS

I N T H E COURT OF APPEALS OF INDIANA

WASHINGTON STATE MEDICAID FRAUD FALSE CLAIMS ACT. This chapter may be known and cited as the medicaid fraud false claims act.

EXAM APPLICATION FOR REAL ESTATE

State Data Breach Laws

HOUSE OF REPRESENTATIVES AS REVISED BY THE COMMITTEE ON CRIME PREVENTION, CORRECTIONS & SAFETY ANALYSIS

UNITED STATES DISTRICT COURT DISTRICT OF NEW JERSEY. v. Crim. No. I N D I C T M E N T. The Grand Jury in and for the District of New Jersey,

CPA LICENSURE APPLICATION BY RECIPROCITY ELECTRONIC APPLICATION FORMS AND INSTRUCTIONS

FLORIDA NOTARY PUBLIC LAW Section 117

South Carolina Department of Labor, Licensing and Regulation South Carolina Board of Registration for Professional Engineers and Surveyors

South Carolina Department of Labor, Licensing and Regulation South Carolina Real Estate Commission

Occupational License Application

THE STATE OF NEW HAMPSHIRE SUPREME COURT OF NEW HAMPSHIRE ORDER

COURT RULES OF CRIMINAL PROCEDURE CHAPTER 12 TABLE OF CONTENTS

MOTION FOR CHANGE OF PARENTING TIME (COMPANIONSHIP AND VISITATION) LAWRENCE COUNTY, OHIO

A Bill Regular Session, 2017 SENATE BILL 225

MUTUAL LEGAL ASSISTANCE

Instructor Information for Endorsement

AIRPORT SECURITY IDENTIFICATION BADGE APPLICATION

MINNESOTA JUDICIAL TRAINING UPDATE GRAND JURY PROCEEDINGS: EVERYTHING A JUDGE NEEDS TO KNOW - ALMOST

Michigan Medicaid False Claims Act

TEXAS DISCOVERY. Brock C. Akers CHAPTER 1 LAW REVISIONS TO TEXAS RULES OF CIVIL PROCEDURE GOVERNING DISCOVERY

DID YOU REMEMBER TO. Sign and date your application in front of a notary? Provide a certified disposition of your case?

Cumulative Identity Theft Statutes Updated as of July 26, 2011

Termination of Guardianship Minor. Forms and Procedures. For Wyoming MOVANT

Application for Licensure by Comity

FLORIDA 4-H VOLUNTEER PACKET

South Dakota Notary Public Handbook (SDCL 18 1)

New Manufactured Contractor/Repairer/ Installer Application

Fraud/ Forgery Investigation Packet Summary Form. Customer/ Claimant Information

GEORGIA PEACE OFFICER STANDARDS AND TRAINING COUNCIL PETITION FOR MODIFICATION OF PROBATION

APPLICATION FOR CERTIFICATION AS A BIOLOGICAL WASTEWATER TREATMENT OPERATOR

PHARMACIST INTERN CERTIFICATE APPLICATION

APPLICATION FOR CERTIFICATION AS A WELL DRILLER

IN THE CIRCUIT COURT OF THE THIRTEENTH JUDICIAL CIRCUIT, FOR HILLSBOROUGH COUNTY, FLORIDA CIVIL DIVISION

APPLICATION FOR INITIAL LICENSE

GRAND RONDE GAMING COMMISSION

IN THE CIRCUIT COURT OF THE SIXTH JUDICIAL CIRCUIT, IN AND FOR PINELLAS COUNTY, FLORIDA CIVIL DIVISION NOTICE OF PRODUCTION

Are There Cases When You Should Not Use This Form? What Information Is Needed to Search for USCIS Records? Verification of Identity in Person.

[ ] WARRANT [X] ORDER OF DETENTION v. [ ] AMENDED COMPLAINT. The Complainant, being duly sworn, makes complaint to the above-named Court and COUNT I

Guardian Advocacy Forms

Attorney s BriefCase Beyond the Basics Depositions in Family Law Matters

Melbourne International Airport Police Department Security Badge Application SIDA SECURE Area

KANSAS IDENTITY THEFT RANKING BY STATE: Rank 29, 61.0 Complaints Per 100,000 Population, 1694 Complaints (2007) Updated December 15, 2008

Summer Science Camp Volunteer Counselor 2018 Application CHECKLIST

MONTANA CODE ANNOTATED

CHAPTER House Bill No. 1845

South Carolina Department of Labor, Licensing and Regulation South Carolina Board of Medical Examiners

New Manufactured Retail Dealer Application

OPTOMETRY CREDENTIAL LICENSURE APPLICATION

UNITED ST ATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF GEORGIA SUBPOENA TO TESTIFY BEFORE A GRAND JURY

NC General Statutes - Chapter 52C 1

THE FEDERAL FALSE CLAIMS ACT 31 U.S.C

Kane County Local Rule

MUSEUM DAILY SUPPORT OPERATIONS VOLUNTEER APPLICATION CHECKLIST

EXEMPT (Reprinted with amendments adopted on June 5, 2017) FOURTH REPRINT A.B Referred to Committee on Judiciary

STATE OMNIBUS BILLS AND LAWS January 1 June 30, 2011

Chicago False Claims Act

THE TAIPEI ECONOMIC AND CULTURAL REPRESENTATIVE OFFICE

Manufactured Retail Dealer Update/New Location/Renewal Application

INSTRUCTIONS FOR FLORIDA SUPREME COURT APPROVED FAMILY LAW FORM (a)(1), STEPPARENT ADOPTION: CONSENT AND WAIVER BY PARENT (11/15)

CITY OF ATLANTA POLICE DEPARTMENT PAWN/TITLE/PRECIOUS METAL DEALERS INFORMATION CHECKLIST

Case 3:13-cv JE Document 1 Filed 12/20/13 Page 1 of 13 Page ID#: 1

CONTINUANCE POLICY IN BOTH CIVIL AND CRIMINAL CASES IN DISTRICT COURT AND CASE MANAGEMENT PLAN FOR CALENDARING CIVIL CASES

IN THE THIRTEENTH JUDICIAL CIRCUIT HILLSBOROUGH COUNTY, FLORIDA

South Dakota Notary Public Handbook

SCHWARTZ & BALLEN LLP 1990 M STREET, N.W. SUITE 500 WASHINGTON, DC

IN THE DISTRICT COURT OF APPEAL OF THE STATE OF FLORIDA FIFTH DISTRICT

Dr. Richard M. Powers POWER OF ATTORNEY AND MEDICAL RELEASE

FLORIDA RULES OF CIVIL PROCEDURE FOR INVOLUNTARY COMMITMENT OF SEXUALLY VIOLENT PREDATORS

POLICY TITLE: ACCESS TO PUBLIC RECORDS POLICY NO. 309 Page 1 of 10

What if the other parent is not making child support payments? The court will consider whether a parent is helping to support their child.

2014 Minnesota Statutes

UNITED STATES DISTRICT COURT MIDDLE DISTRICT OF FLORIDA ADMINISTRATIVE PROCEDURES FOR ELECTRONIC FILING IN CIVIL AND CRIMINAL CASES

Ethical Considerations on Social Media EVIDENTIARY AND ETHICAL CONSIDERATIONS WHEN USING SOCIAL MEDIA TO BUILD OR DEFEND A CASE.

for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council

IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE AT JACKSON Assigned on Briefs October 4, 2011

FEDERAL RULES OF EVIDENCE (Mock Trial Version) (updated 10/07)

Draft Rules on Privacy and Access to Court Records

Transcription:

SUCCESSFUL PROSECUTION OF IDENTITY THEFT Created by Michael Lennon Presented by Sheri Maxim and Michael Lennon Assistant State Attorney Thirteenth Judicial Circuit Hillsborough County, Florida WHAT IS IDENTITY THEFT? Willfully and fraudulently using, or possessing with intent to fraudulently use, someone else s personal identification information without the owner s s consent. Florida Statute 817.568

WHAT IS PERSONAL IDENTIFICATION INFORMATION? Florida Statute 817.568(1)(f) defines personal identification information to include name, postal or electronic [email] address, telephone number, social security number, date of birth, mother s s maiden name, official state-issued or United States-issued driver s s license or identification number, alien registration number, government passport number, employer or taxpayer identification number, Medicaid or food stamp account number, bank account number, credit or debit card number, or personal identification number or code assigned to the holder of a debit card by the issuer to permit authorized electronic use of such card. Also includes biometric data (fingerprint, voice, retina image). HOW ARE THIEVES 1. Theft from your mailbox or garbage.

HOW ARE THIEVES 1. Theft from your mailbox or garbage. HOW ARE THIEVES 1. Theft from your mailbox or garbage.

HOW ARE THIEVES 1. Theft from your mailbox or garbage. HOW ARE THIEVES 2. Obtaining personal identification information from ordinary theft and robbery.

HOW ARE THIEVES COMMITTING IDENTITY THEFT? 3. Shoulder Surfing At first glance it would appear as though this individual is simply performing a simple ATM transaction. This Slide is courtesy of the United States Secret Service Thanks to Special Agent Don Cox, MD-FL HOW ARE THIEVES COMMITTING IDENTITY THEFT? 3. Shoulder Surfing What he is in fact doing is rigging the slot on the machine so as to capture (or keep) the card of the next person who uses the ATM. This Slide is courtesy of the United States Secret Service Thanks to Special Agent Don Cox, MD-FL

HOW ARE THIEVES COMMITTING IDENTITY THEFT? 3. Shoulder Surfing Rigging the machine is very risky business therefore the services of a lookout is required in order to warn of possible witnesses and/or potential victims. This Slide is courtesy of the United States Secret Service Thanks to Special Agent Don Cox, MD-FL HOW ARE THIEVES COMMITTING IDENTITY THEFT? 3. Shoulder Surfing Here we see the next customer to use the machine after the trap has been set. He inserts his card and attempts a transaction. This Slide is courtesy of the United States Secret Service Thanks to Special Agent Don Cox, MD-FL

HOW ARE THIEVES COMMITTING IDENTITY THEFT? 3. Shoulder Surfing The card has been captured and the customer is confused as to why this is so. However in the background we see that help is on its way or is it? This Slide is courtesy of the United States Secret Service Thanks to Special Agent Don Cox, MD-FL HOW ARE THIEVES COMMITTING IDENTITY THEFT? 3. Shoulder Surfing Here we see the Fraudster pretending to render assistance. What he is in fact trying to do is obtain the customer s s P.I.N now that he has captured the card This Slide is courtesy of the United States Secret Service Thanks to Special Agent Don Cox, MD-FL

HOW ARE THIEVES COMMITTING IDENTITY THEFT? 3. Shoulder Surfing He convinces the customer that he would be able to retrieve his card if he entered his P.I.N while he holds down both the cancel and the enter buttons. This Slide is courtesy of the United States Secret Service Thanks to Special Agent Don Cox, MD-FL HOW ARE THIEVES COMMITTING IDENTITY THEFT? 3. Shoulder Surfing After several attempts the customer is convinced that the machine has captured his card. Both he and the Fraudster leave the ATM. This Slide is courtesy of the United States Secret Service Thanks to Special Agent Don Cox, MD-FL

HOW ARE THIEVES COMMITTING IDENTITY THEFT? 3. Shoulder Surfing Satisfied that the coast is clear the Fraudster returns to retrieve the card that has been captured by his trap. He not only has the customers card he also has his P.I.N. This Slide is courtesy of the United States Secret Service Thanks to Special Agent Don Cox, MD-FL HOW ARE THIEVES COMMITTING IDENTITY THEFT? 3. Shoulder Surfing Armed with card and P.I.N he left and was able to withdraw $1000 from the account. This Slide is courtesy of the United States Secret Service Thanks to Special Agent Don Cox, MD-FL

HOW ARE THIEVES 3. Shoulder Surfing HOW ARE THIEVES 4. Skimming Skimming is the use of computers to read and store information encoded on the magnetic strip of a debit or credit card when the victim inserts the card through either a specialized card reader or a legitimate payment mechanism (e.g., e.g., the card reader used to pay for gas at the pump in a gas station). Once stored, that information can be re- encoded onto any other card with a magnetic strip, instantly transforming a blank card into a machine-readable ATM or credit card identical to that of the victim.

HOW ARE THIEVES Selling the information to other thieves. Using the information to make purchases online or over the phone. Using the information to make counterfeit cards. 4. Skimming HOW ARE THIEVES 5. Card Taking

HOW ARE THIEVES 5. Card Taking HOW ARE THIEVES 6. Phishing

HOW ARE THIEVES 7. Vishing Like Phishing except that instead of using a web link to lure the victim, the thief uses a false telephone number in the fraudulent email to lure unsuspecting victims into calling the telephone number and providing account information over the phone. HOW ARE THIEVES 8. Pharming Pharming is changing the specific record for a domain, sending the victim to a fake website similar in appearance and web address to the website that the victim intended to access, without the victim s s knowledge. Obtain the web history and domain history as evidence.

HOW ARE THIEVES 9. The Insider The Insider stands in a position of trust and has access to victims person identification information. Medical Records Car Dealerships Credit card companies. Pat O Brien O is not an identity thief. His picture is being used as a play on words. HOW ARE THIEVES 10. The Insider & Check Writing Software

HOW ARE THIEVES Keystroke catchers are computer programs or small devices that attach to the cable that connects your keyboard to your computer. The "catcher" resembles a standard connector, but contains a memory chip that records everything typed. 11. Keystroke Catchers HOW ARE THIEVES 11. Spoofing

HOW ARE THIEVES 11. Spoofing Allows thieves to call a credit card company with the caller ID appearing to originate from the card holder's home, and use the credit card number to order cash transfers that the thief can pick up. Pretext calls are calls made by someone posing as a customer, employee, or even a regulator to obtain personal information from companies and individuals. SUCCESSFUL INVESTIGATION AND PROSECUTION OF IDENTITY THEFT the average time between the occurrence of the crime and discovery by the victims is 12.7 months, with almost 10% of cases taking in excess of 60 months before discovery. Statewide Grand Jury Report Identity Theft in Florida January 10, 2002 First Interim Report of the Sixteenth Statewide Grand Jury In the Supreme Court of the State of Florida Case No.: SC 01-1095 1095

FIRST STEP IN THE INVESTIGATION STEP #1: Meeting with the victim. Generate a complaint. Have the victim fill out an identity theft affidavit to place with the police report. http://www.ftc.gov/bcp/conline/pubs/credit/affidavit.pdf Instruct the victim to immediately contact the credit reporting companies (credit bureaus) over the phone and in writing to report the fraudulent transactions (requesting placement of a fraud alert on the victim s s account). Give a copy of the police report to the victim (needed to prove identity theft to the consumer reporting companies). FIRST STEP IN THE INVESTIGATION Spend time with the victim to retrace steps. Attempt to ascertain who may have had access to the identification information. Does the victim live alone? Was the victim recently a victim of a robbery, burglary, or theft? Obtain as many credit documents from the victim as possible.

FIRST STEP IN THE INVESTIGATION What county has jurisdiction (venue) for prosecution? Florida Statute 817.568(16) allows prosecution in any county in which an element of the offense occurred, including the county where the victim generally resides. FIRST STEP IN THE INVESTIGATION Statute of Limitations Florida Statute 817.568(17) allows commencement of prosecution (filing an Information and reasonable attempt at arrest in timely manner) within 3 years of the offense date. EXCEPTION: If the three year time period has elapsed, prosecution can commence within 1 year of discovery so long as prosecution commences within 5 years of the offense date. Can you prosecute on another statute?

SECOND STEP IN THE INVESTIGATION DOES NOT NECESSARILY INVOLVE ARREST! Florida Rule of Criminal Procedure 3.191(a) entitles a defendant charged with a felony offense to a trial within 175 days from the date of arrest. Florida Rule of Criminal Procedure 3.191(b) allows a defendant to demand a trial within 60 days from the date of arrest. SECOND STEP IN THE INVESTIGATION Should you arrest? Does the Defendant present an imminent threat to continued loss? Is the Defendant a flight risk? Do the reasons for not arresting outweigh the benefits of arresting?

SECOND STEP IN THE INVESTIGATION Gather the necessary documents to prove the identity theft via subpoena or written consent from the victim to obtain the necessary documents. How are you going to ensure that a court will admit the records into evidence at trial? Authentication Florida Statute 90.901 provides that [a]uthentication or identification of evidence is required as a condition precedent to its admissibility. ty. Hearsay Florida Statute 90.802 states that unless an exception applies, hearsay evidence is inadmissible. SECOND STEP IN THE INVESTIGATION Records Custodians are essential witnesses. Florida Statute 90.803(6)(c) allows a business records certification to replace a live records custodian at trial. Send the Business Records Certification to the company when obtaining records.

SECOND STEP IN THE INVESTIGATION Obtaining Records from Internet Service Providers 18 USC 2703(f) Establishes a process by which the government may request that an ISP preserve evidence in its possession relating to a specified target pending the issuance of appropriate process. While 2703 (f) does not establish a required format, requests are usually in the form of a letter on the letterhead of the requesting agency identifying the target account or accounts and the information that is required. (See attached example language). The 2703 (f) request only preserves records in the possession of the ISP at the time of the receipt of the request and are not prospective. Therefore it is imperative for the requesting agency to work with the ISP to identify the type of record that is kept by the ISP and to make sure that the request is timely. Section 2703(f) requires that the requested records be retained for a period of 90-days which can be extended for an additional 90-days. 4. Other Evidentiary Considerations Business Records 6) RECORDS OF REGULARLY CONDUCTED BUSINESS ACTIVITY.-- (a) A memorandum, report, record, or data compilation, in any form, of acts, events, conditions, opinion, or diagnosis, made at or near the time by, or from information transmitted by, a person with knowledge, if kept in the course of a regularly conducted business activity and if it was the regular practice of that business activity to make such memorandum, report, record, or data compilation, all as shown by the testimony of the custodian or other qualified witness, or as shown by a certification or declaration that complies with paragraph (c) and s. 90.902(11), unless the sources of information or other circumstances show lack of trustworthiness.

Other Evidentiary Considerations Continued... Records Custodians are essential witnesses. Florida Statute 90.803(6)(c) allows a business records certification to replace a live records custodian at trial. Send the Business Records Certification to the company when obtaining records. CERTIFICATION OF BUSINESS RECORDS PURSUANT TO F.S. 90.803(6)(c) AND F.S. 90.902(11) I, (print name), hereby certify that I am a custodian of records of WACHOVIA BANK, NA (name of company) located at 401 Market Street, Philadelphia, PA 19101. (address of company). Pursuant to sections 90.803(6) and 90.902(11), Florida Statutes, I hereby certify the following: (1) that as part of my regular duties, I maintain custody and control of the original records of WACHOVIA BANK, NA (name of company); (2) that the enclosed documents consisting of (number of pages) pages are a true and accurate copy of the original memorandums, reports, records, or data compilations maintained at WACHOVIA BANK, NA (name of company); (3) that the attached documents consist of the following information: ; (4) that all the memorandums, reports, records, or data compilations ions described in paragraph 3 were made at or near the time of the occurrence of the matters set s forth by, or from information transmitted by, a person having knowledge of those matters; (5) that all the memorandums, reports, records, or data compilations ions maintained in the enclosed documents are kept in the course of the regularly conducted activities of WACHOVIA BANK, NA (name of company); (6) that all the memorandums, reports, records, or data compilations ions contained in the documents were made as a regular practice in the course of the regularly conducted c activities of WACHOVIA BANK, NA (name of company). STATE OF PENNSYLVANIA ) COUNTY OF PHILADELPHIA ) PERSONALLY APPEARED before me, the undersigned authority, (name of affiant), being duly sworn, says that the allegations of fact as set forth in the above Affidavit are true. SIGNATURE OF AFFIANT SWORN TO AND SUBSCRIBED before me this day of, 20. (signature) Notary Public, State of at Large Print, Type, or Stamp Commission of Notary Public Personally known OR Produced Identification Type of Identification Produced

Other Evidentiary Considerations (Continued) 1. Authentication 2. Identifying the perpetrator 3. Privileged communication 1. Authentication (documents do not fall out of the sky) Fla. Stat. 90.901. Requirement of authentication or identification. Authentication or identification of evidence is required as a condition precedent to its admissibility. The requirements of this section are satisfied by evidence sufficient to support a finding that the matter in question is what its proponent claims.

Authentication (Continued) Fla. Stat. 90.902. Self- Authentication. In general, documents bearing a seal from the public agency and having a signature from the custodian attesting to the authenticity of the seal. Also called certified documents. Fla. Stat. 90.953 allows copies of originals so long as properly authenticated. 2. Identifying the Perpetrator 1. Considerations: a. Defendant s s story b. Motive where did the money go? c. Handwriting Expert d. Immunity to Coconspirator

3. Privileged Communications Marital Privilege Attorney Client Privilege Accountant Client Privilege 90.504 Husband-wife privilege.-- (1) A spouse has a privilege during and after the marital relationship to refuse to disclose, and to prevent another from disclosing, communications which were intended to be made in confidence between the spouses while they were husband and wife.

WAIVER 90.507 Waiver of privilege by voluntary disclosure.-- --A A person who has a privilege against the disclosure of a confidential matter or communication waives the privilege if the person, or the person's predecessor while holder of the privilege, voluntarily discloses or makes the communication when he or she does not have a reasonable expectation of privacy, or consents to disclosure of, any significant part of the matter or communication. This section is not applicable when the disclosure is itself a privileged communication. 4. Defendant s s Statement 1. Considerations: a. General statements are not helpful. b. Use exhibits whenever possible. c. RECORD THE STATEMENT!!! NO EXCUSES!!!! Why not video the statement? d. A Defendant s s statement can eliminate any hearsay issues and any authentication issues. e. A Defendant s s statement can eliminate the need for a handwriting expert. f. Mention the crime s s elements.

Examples of bad statements taken from Defendants

Theft Intent circumstantial v. direct evidence Because intent to commit theft usually cannot be proven by direct evidence, the intent may be inferred from the circumstances surrounding the illegal act; however, the circumstantial evidence must exclude every reasonable hypothesis but that of guilt. Sewall v. State, 783 So. 2d 1171 (Fla. Dist. Ct. App. 5th Dist. 2001).

Evasiveness is Evidence An effort to conceal the property of another to prevent the owner from discovering it, or giving evasive answers when questioned in relation to it, is evidence of felonious intent. Long v. State,, 11 Fla. 295 (1866). 5. Subpoena a possible suspect??? Fla. Stat. 914.04... No person who has been duly served with a subpoena or subpoena duces tecum shall be excused from attending and testifying or producing any book, paper, or other document before any court having felony trial jurisdiction, grand jury, or state attorney upon investigation, proceeding, or trial for a violation of any of the criminal statutes of this state upon the ground or for the reason that the testimony or evidence, documentary or otherwise, required of the person may tend to convict him or her of a crime or to subject him or her to a penalty or forfeiture, but no testimony so given or evidence so produced shall be received against the person upon any criminal investigation or proceeding.

Scope of Fla. Stat. 914.04 This section grants derivative use immunity. Therefore, if witness s compelled testimony led to evidence that he had committed another crime, he could not be prosecuted for that crime unless prosecution could affirmatively prove that evidence it proposed to use was derived from legitimate source solely independent of compelled testimony. State v. McSwain, 440 So.2d 502 (Fla. 2d DCA 1983). A thorough investigation will lead to less of these... We the jury find as follows... the Defendant is NOT GUILTY.

And more of these. Sheri Maxim Michael Lennon Assistant State Attorneys Hillsborough County State Attorney s s Office Office: (813) 272-5400 Email: lennon_m@sao13th.com maxim_s@sao13th.com