<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Exegy Today Publication]]></title><description><![CDATA[A journalist and publication blog about security related issues and my experience with Exegy Inc (www.exegy.com).]]></description><link>https://exegy.today</link><image><url>https://cdn.hashnode.com/res/hashnode/image/upload/v1759684819984/1f48fedf-cfad-4631-b6e2-24b22ac2624b.png</url><title>Exegy Today Publication</title><link>https://exegy.today</link></image><generator>RSS for Node</generator><lastBuildDate>Thu, 09 Apr 2026 09:49:57 GMT</lastBuildDate><atom:link href="https://exegy.today/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[The Poisoned Well: How Misconfigured Artifact Repositories Fuel Supply Chain Attacks
]]></title><description><![CDATA[The security vulnerabilities identified within the Exegy infrastructure revolve primarily around the improper configuration of the JFrog Artifactory instance and the exposure of sensitive credentials.]]></description><link>https://exegy.today/the-poisoned-well-how-misconfigured-artifact-repositories-fuel-supply-chain-attacks</link><guid isPermaLink="true">https://exegy.today/the-poisoned-well-how-misconfigured-artifact-repositories-fuel-supply-chain-attacks</guid><category><![CDATA[Exegy]]></category><category><![CDATA[vulnerabilities]]></category><category><![CDATA[artifactory]]></category><dc:creator><![CDATA[Justin Walters]]></dc:creator><pubDate>Thu, 09 Apr 2026 00:34:30 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/68dec33a31f85a829f5d8eaf/a539d676-beff-4b3f-b80e-d5ae71153dfd.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The security vulnerabilities identified within the Exegy infrastructure revolve primarily around the improper configuration of the <strong>JFrog Artifactory</strong> instance and the exposure of sensitive credentials.</p>
<h3><strong>Critical Access Control Gaps</strong></h3>
<p>The current Artifactory implementation lacks a hardened access control model. This deficiency allows unauthorized users to modify or replace <strong>Production RPMs</strong>. Because these packages are not strictly locked down, a malicious actor could overwrite legitimate software with compromised versions, creating a direct vector for a supply chain attack.</p>
<h3><strong>Integrity and Repository Sprawl</strong></h3>
<p>A lack of standardized versioning and cleanup has resulted in multiple revisions of the same build residing within the repository. This "version clutter" increases the risk of human error, where an operator or automated process might inadvertently pull a deprecated or malicious RPM instead of the verified production build.</p>
<h3><strong>Operational Risk and Exposure</strong></h3>
<p>The security of customer deliveries currently relies heavily on the "tribal knowledge" of the operations team to identify the correct repositories. This manual process is susceptible to manipulation; if an operator is misled or a repository is compromised, malicious code could be delivered directly to customer servers or uploaded to public-facing FTP sites.</p>
<h3><strong>Credential Leakage</strong></h3>
<p>Hardcoded credentials for Artifactory have been identified within <strong>GitLab</strong> repositories. These exposed scripts and configuration files provide a roadmap for attackers to gain authenticated access to the artifact binary repository, bypassing external security layers.</p>
<h3><strong>Summary of Impact</strong></h3>
<p>The combination of these vulnerabilities creates a significant <strong>Supply Chain Risk</strong>. If left unaddressed, an attacker could inject malicious code into the development lifecycle, which would then be distributed to both internal Exegy servers and external customer environments, potentially leading to widespread system compromise.</p>
<h2>Security Alert: The Hidden Risks of Misconfigured Artifact Repositories</h2>
<p>In modern software development, <strong>JFrog Artifactory</strong> serves as the central nervous system for binaries and builds. However, when access controls are left in a "default" or partially implemented state, this vital tool can be transformed from a productivity booster into a primary attack vector for supply chain compromises.</p>
<h3>The Critical Risks of Incomplete Access Control</h3>
<p>A "loose" Artifactory configuration creates several high-impact vulnerabilities that can devastate both your internal infrastructure and your customers' environments:</p>
<ul>
<li><p><strong>Malicious Injection:</strong> If hardened security is not in place, unauthorized users (or compromised service accounts) can overwrite production <strong>RPMs</strong>. This allows an attacker to swap a legitimate package with a version containing a backdoor.</p>
</li>
<li><p><strong>Version Confusion and Shadow Binaries:</strong> When Artifactory allows multiple overlapping versions and revisions of the same build without strict naming conventions, developers or automated tools may inadvertently pull a "shadow" version. An attacker could upload a higher version number (e.g., v1.2.1-malicious) that search tools prioritize over the legitimate v1.2.0.</p>
</li>
<li><p><strong>The "Tribal Knowledge" Trap:</strong> Relying on the expertise of operations staff to "know" which repo is safe is a massive procedural risk. If the path to a customer-facing FTP or download link isn't strictly automated and locked down, a human error or a subtle path swap can lead to the distribution of malicious code to your entire client base.</p>
</li>
<li><p><strong>Credential Leakage:</strong> The presence of hardcoded Artifactory credentials within GitLab scripts creates a permanent open door. Once these are pushed to a repository, they are often cached in history, giving any user with repo access the keys to modify your binary "source of truth."</p>
</li>
</ul>
<h3>Hardening Artifactory: Best Practices for Implementation</h3>
<p>To prevent these scenarios, organizations must move away from "functional" setups toward <strong>Hardened Environments</strong>.</p>
<h4>1. Implement the Principle of Least Privilege (PoLP)</h4>
<p>Access should be restricted by team and by environment.</p>
<ul>
<li><p><strong>Virtual Repositories:</strong> Use these to create a single URL for developers to pull from, but strictly control which <strong>Local Repositories</strong> (the actual storage) are included in that virtual view.</p>
</li>
<li><p><strong>Permission Targets:</strong> Define granular permissions that separate <em>Read</em>, <em>Annotate</em>, and <em>Deploy</em> actions. No human user should have <em>Delete</em> or <em>Overwrite</em> permissions in a production-level repository.</p>
</li>
</ul>
<h4>2. Enforce Checksum and Signature Verification</h4>
<p>Ensure that Artifactory is configured to verify the <strong>GPG signatures</strong> of RPMs. Even if an attacker replaces a file, the installation will fail on the client side if the signature doesn't match the trusted public key.</p>
<h4>3. Secrets Management</h4>
<p>Never store Artifactory keys in GitLab. Use integrated secrets managers like <strong>HashiCorp Vault</strong> or <strong>GitLab CI/CD Variables</strong> (masked and protected). Implement <strong>JFrog Access Tokens</strong> with short expiration times rather than using static username/password combinations.</p>
<h3>Compliance Standards: CISA and RegSci</h3>
<p>Adhering to frameworks like <strong>CISA’s Secure Software Development Framework (SSDF)</strong> and <strong>Regulatory Science (RegSci)</strong> guidelines is not just about "checking a box"; it’s about establishing a defensible security posture.</p>
<ul>
<li><p><strong>CISA (Cybersecurity &amp; Infrastructure Security Agency):</strong> CISA emphasizes the <strong>Software Bill of Materials (SBOM)</strong>. By properly configuring Artifactory, you can automatically generate an SBOM, ensuring you know exactly what is in every RPM. This prevents the "unknown version" risk mentioned earlier.</p>
</li>
<li><p><strong>RegSci &amp; Formal Validation:</strong> In regulated industries, "Regulatory Science" requires that the tools used to build software are themselves validated. This means proving that only authorized code made it into the build.</p>
</li>
<li><p><strong>Importance:</strong> Following these standards protects you from legal liability and ensures that your software meets the security requirements now mandated for government contractors and critical infrastructure providers.</p>
</li>
</ul>
<h3>Preview: How Package Managers Become Weapons</h3>
<p>In a future installment, we will explore the technical mechanics of <strong>Package Manager Weaponization</strong>. While we think of RPMs as simple archives, they are actually capable of executing complex scripts during the installation process (pre-install and post-install scripts). We will discuss how an attacker can craft a "Trojan Horse" RPM that installs a legitimate application while simultaneously running a background script.</p>
]]></content:encoded></item><item><title><![CDATA[Security Risks and Remediation: Managing Wireless Network Authentication]]></title><description><![CDATA[A primary vulnerability within the Exegy network architecture lies in its reliance on Pre-Shared Key (PSK) authentication for wireless security. This static, password-based mechanism lacks individual ]]></description><link>https://exegy.today/security-risks-and-remediation-managing-wireless-network-authentication</link><guid isPermaLink="true">https://exegy.today/security-risks-and-remediation-managing-wireless-network-authentication</guid><category><![CDATA[Exegy]]></category><category><![CDATA[vulnerabilities]]></category><category><![CDATA[Security]]></category><dc:creator><![CDATA[Justin Walters]]></dc:creator><pubDate>Wed, 08 Apr 2026 21:22:50 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/68dec33a31f85a829f5d8eaf/1ca7480f-20a3-4b71-9a5f-08046170768a.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A primary vulnerability within the Exegy network architecture lies in its reliance on Pre-Shared Key (PSK) authentication for wireless security. This static, password-based mechanism lacks individual accountability, as any entity in possession of the credential—including former employees—retains persistent access. This configuration fails to meet the standards of a hardened environment; unauthorized actors can bypass perimeter defenses and leverage MAC address spoofing to obfuscate their identity, making detection and forensic attribution nearly impossible within the current infrastructure.</p>
<h4><strong>Modern Standards for Wireless Security and Compliance</strong></h4>
<p>To address the risks associated with shared password authentication, organizations must move toward robust identity management and encryption standards. Relying on a Pre-Shared Key (PSK) creates a significant "revocation challenge": when an employee leaves or a device is lost, the password for the entire organization must be changed to maintain security, which is often logistically ignored, leaving the network open to unauthorized access.</p>
<p>The Cybersecurity and Infrastructure Security Agency (CISA) and the SEC’s Regulation Systems Compliance and Integrity (Reg SCI) provide frameworks for mitigating these risks. CISA generally recommends the implementation of <strong>Enterprise-grade authentication (WPA3-Enterprise or WPA2-Enterprise)</strong> utilizing the <strong>802.1X standard</strong>. Unlike a single shared password, 802.1X requires unique credentials for every user, typically integrated with a RADIUS server or an identity provider like Active Directory. This allows administrators to revoke access for specific individuals instantly without affecting the rest of the workforce.</p>
<p>Furthermore, Reg SCI—which applies to key market participants to ensure the resilience of technological systems—emphasizes the importance of "preventative, detective, and corrective" controls. Under these guidelines, the best practice for handling wireless vulnerabilities includes:</p>
<ol>
<li><p><strong>Multi-Factor Authentication (MFA):</strong> Moving beyond passwords to ensure that even if a credential is leaked, a secondary physical or biometric token is required.</p>
</li>
<li><p><strong>Certificate-Based Authentication:</strong> Utilizing digital certificates on managed devices so that only "known" hardware can associate with the access point, rendering MAC address spoofing ineffective since the attacker would lack the unique cryptographic certificate.</p>
</li>
<li><p><strong>Network Segmentation:</strong> CISA recommends segmenting wireless traffic from the core production environment. Even if a wireless breach occurs, the attacker should be isolated from sensitive data and critical systems.</p>
</li>
<li><p><strong>Continuous Monitoring:</strong> Implementing logging and automated alerts to detect unusual patterns, such as multiple failed login attempts or unknown devices attempting to bypass security layers.</p>
</li>
</ol>
<p>By transitioning from simple password-based access to identity-centric security, organizations align with federal recommendations and ensure that their perimeter remains secure against both external threats and internal turnover.</p>
]]></content:encoded></item><item><title><![CDATA[The Ticking Clock: Why Exegy’s Security Culture Puts Financial Data at Risk
]]></title><description><![CDATA[In the high-stakes world of quantitative trading and global finance, data isn't just information—it’s the lifeblood of the market. Exegy, a prominent player in this space, occupies a critical position]]></description><link>https://exegy.today/the-ticking-clock-why-exegy-s-security-culture-puts-financial-data-at-risk</link><guid isPermaLink="true">https://exegy.today/the-ticking-clock-why-exegy-s-security-culture-puts-financial-data-at-risk</guid><category><![CDATA[Exegy]]></category><category><![CDATA[Security]]></category><dc:creator><![CDATA[Justin Walters]]></dc:creator><pubDate>Wed, 08 Apr 2026 14:38:24 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/68dec33a31f85a829f5d8eaf/61b62207-289f-41da-aa66-fd5252bda636.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the high-stakes world of quantitative trading and global finance, data isn't just information—it’s the lifeblood of the market. <strong>Exegy</strong>, a prominent player in this space, occupies a critical position in the financial ecosystem. The company acts as a high-speed conduit, ingestive live stock exchange data directly from the source and distributing it to major banks and elite institutional customers.</p>
<p>When you are the bridge between the exchanges and the world's largest financial entities, security isn't an "add-on"—it is the product. However, a disturbing pattern has emerged suggesting that this bridge may be built on a crumbling foundation.</p>
<h3><strong>Games, Not Governance</strong></h3>
<p>For some time, I have been documenting the internal culture and questionable practices at Exegy. If you haven't already, I strongly encourage you to <strong>read my previous posts</strong> regarding how this company operates. From "playing games" with reported issues to a general lack of urgency, the evidence points toward a firm that does not take its defensive posture seriously.</p>
<p>In the world of low-latency data, "speed" is often used as an excuse to bypass rigorous security protocols. But in a landscape where a single exploit can disrupt global markets or compromise sensitive banking intel, there is no room for a "fix it later" mentality.</p>
<h3><strong>Coming Soon: The Vulnerability Disclosure</strong></h3>
<p>Transparency is the only remaining tool when private warnings go unheeded. I am currently finalizing a comprehensive report that will <strong>disclose the specific security vulnerabilities</strong> I have identified within Exegy’s infrastructure.</p>
<p>This upcoming article will dive deep into:</p>
<ul>
<li><p>The technical nature of the gaps in their systems.</p>
</li>
<li><p>How these vulnerabilities could potentially impact the flow of live exchange data.</p>
</li>
<li><p>The risks posed to the banks and customers relying on Exegy's integrity.</p>
</li>
</ul>
<p>Security is a responsibility, not a game. It is time for the industry to see exactly what is happening behind the curtain at Exegy. <strong>Stay tuned.</strong></p>
]]></content:encoded></item><item><title><![CDATA[The Transparency Gap: Why Corporate "Social Washing" Backfires]]></title><description><![CDATA[In the modern marketplace, a company’s social media feed is its digital handshake. Every March, many corporate pages are scrubbed of their usual technical updates to make room for purple banners and s]]></description><link>https://exegy.today/the-transparency-gap-why-corporate-social-washing-backfires</link><guid isPermaLink="true">https://exegy.today/the-transparency-gap-why-corporate-social-washing-backfires</guid><category><![CDATA[Exegy]]></category><category><![CDATA[Social Washing]]></category><dc:creator><![CDATA[Justin Walters]]></dc:creator><pubDate>Tue, 07 Apr 2026 17:06:52 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/68dec33a31f85a829f5d8eaf/a3230de8-f42f-4758-89c7-354d3bad0f0c.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the modern marketplace, a company’s social media feed is its digital handshake. Every March, many corporate pages are scrubbed of their usual technical updates to make room for purple banners and stock illustrations celebrating <strong>International Women’s Day</strong> or <strong>Women’s History Month</strong>. However, when companies like Exegy post generic messages like "Moving Forward Together!" without providing specific evidence of how their own female employees drive success, they risk falling into the trap of <strong>performative activism</strong>.</p>
<h3><strong>The Strategy of Exploiting Trust</strong></h3>
<p>From a psychological standpoint, companies use these posts to trigger the <strong>"Halo Effect."</strong> This is a cognitive bias where the public’s positive feelings about a brand’s support for a social cause (like gender equity) spill over into their perception of the company’s overall trustworthiness and product quality.</p>
<ul>
<li><p><strong>Symbolic vs. Substantive Action:</strong> It is far cheaper to post a graphic of diverse women than it is to conduct a pay equity audit or promote women into C-suite positions.</p>
</li>
<li><p><strong>Institutional Isomorphism:</strong> Companies often post simply because their competitors do. This "copy-paste" advocacy leads to recycled content that lacks any unique facts about the actual women within the firm.</p>
</li>
<li><p><strong>Signaling Credibility:</strong> By tagging external organizations like "100 Women in Finance," a firm attempts to "borrow" the credibility of those organizations to mask a lack of internal initiatives.</p>
</li>
</ul>
<h3><strong>The Toll on the "Invisible" Employee</strong></h3>
<p>When a company uses its female workforce as a marketing tool without backing it up with facts, the employees themselves often experience <strong>Moral Injury</strong>.</p>
<ul>
<li><p><strong>The Feeling of Being "Used":</strong> As noted by Justin Walters in his comments, these posts often fail to mention "how their history there has help contributed to company growth". When a woman's professional labor is ignored while her gender is "celebrated," she feels like a token rather than a contributor.</p>
</li>
<li><p><strong>Erosion of Trust:</strong> Seeing a post that claims to "recognize talented women" while those same women feel invisible internally creates a deep sense of betrayal.</p>
</li>
<li><p><strong>Resentment and Disengagement:</strong> If a company only values women's presence for a LinkedIn photo op, those employees are likely to withdraw their effort, leading to higher turnover and a toxic internal culture.</p>
</li>
</ul>
<h3><strong>Why Companies Delete Comments Instead of Answering</strong></h3>
<p>When users like Justin W. ask direct questions—such as asking for facts on how the company recognizes and appreciates women over the years—companies often respond by <strong>deleting the comments</strong>. There are three main psychological and strategic reasons for this:</p>
<ol>
<li><p><strong>Brand Protection (The "Perfect Image" Fallacy):</strong> Companies view their social media as a curated advertisement. Any comment that points out a lack of facts or calls for transparency is seen as "graffiti" on their brand image.</p>
</li>
<li><p><strong>Avoidance of Accountability:</strong> Answering a question about "how you recognize women" requires hard data. If the company doesn't have that data—or if the data is unfavorable—they delete the question to avoid being forced into a "legal argument" or a public admission of failure.</p>
</li>
<li><p><strong>The "Echo Chamber" Effect:</strong> Organizations often want to maintain a feed that only shows support. Deleting critical comments is a way of silencing dissent to maintain the illusion of a harmonious, progressive workplace.</p>
</li>
</ol>
<h3><strong>Conclusion: Facts Over Flatulence</strong></h3>
<p>A post that says "Thanks for everything you do" is empty if the company cannot name what "everything" entails. To move from exploitation to true advocacy, companies must stop using women as a "social society" shield to look favorable and start sharing the actual achievements, promotion rates, and contributions of the women in their ranks.</p>
<p>As the public becomes more media-literate, the "same post as last year" will no longer be enough to maintain trust. Transparency isn't just a social media trend—it's a requirement for a healthy workplace.</p>
<p>​If a company wants to "Educate &amp; Inspire Generations", they must start by respecting the generation currently working for them. Facts are the only antidote to the feeling of being used. Without them, a social media post isn't a celebration—it's just an advertisement using women as the product.</p>
<p>Sources of Exegy Posts on LinkedIn can be seen at the following URL</p>
<p><a href="https://drive.google.com/drive/folders/1IFguE4j7Ha9Q5XuLPQt4XIwt8sDfLk1C">https://drive.google.com/drive/folders/1IFguE4j7Ha9Q5XuLPQt4XIwt8sDfLk1C</a></p>
]]></content:encoded></item><item><title><![CDATA[The Digital Ambush: Why Legal Service by Email Undermines Due Process]]></title><description><![CDATA[The Digital Ambush: Why Legal Service by Email Undermines Due Process In an era where we handle everything from banking to grocery shopping via our smartphones, it might seem logical to assume that le]]></description><link>https://exegy.today/the-digital-ambush-why-legal-service-by-email-undermines-due-process</link><guid isPermaLink="true">https://exegy.today/the-digital-ambush-why-legal-service-by-email-undermines-due-process</guid><category><![CDATA[Exegy]]></category><category><![CDATA[Tina Babel]]></category><category><![CDATA[due process]]></category><category><![CDATA[Carmody MacDonald P.C.]]></category><category><![CDATA[digital ambush]]></category><dc:creator><![CDATA[Justin Walters]]></dc:creator><pubDate>Sun, 22 Mar 2026 15:44:24 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/68dec33a31f85a829f5d8eaf/6232d9e8-fc7d-4e18-b245-63e2672eb07b.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Digital Ambush: Why Legal Service by Email Undermines Due Process In an era where we handle everything from banking to grocery shopping via our smartphones, it might seem logical to assume that legal matters would follow suit. However, when it's a matter of a formal lawsuit—especially one involving a request for an immediate restraining order—the "send" button is not a substitute for due process.</p>
<p>Receiving a legal petition via email, particularly when a court date is set for less than 24 hours later, is more than just a logistical headache. It is a fundamental breach of the fairness our legal system is supposed to uphold.</p>
<p>Why Email is Not "Service" The "Service of Process" is the formal procedure used to notify a person that a legal action has been taken against them. It is designed to be a high-standard barrier to ensure that no one’s rights, property, or reputation are signed away without their knowledge.</p>
<p>Serving a defendant via email fails this standard for several reasons:</p>
<p>The "Spam" Risk: Unlike a physical document handed to you, an email can be buried in a junk folder, blocked by a firewall, or lost in a sea of newsletters. A person's legal rights should never depend on an algorithm's spam filter.</p>
<p>The Burden of Proof: There is a significant difference between "sent" and "received." Formal service requires a verifiable record that the person in question actually has the documents in their hand.</p>
<p>The Professional Imbalance: When an attorney bypasses formal channels to "informally" notify an unrepresented individual of a hearing occurring in 25 hours, it creates a massive power imbalance. It leaves the recipient with no time to find a lawyer, research their rights, or even understand the allegations against them.</p>
<p>The Correct Way: Ensuring Fairness A legal system only works when both sides are given a fair opportunity to be heard. "Fairness" in this context follows a very specific path:</p>
<ol>
<li><p>The Use of a Neutral Third Party Legal documents shouldn't be "dropped" by the opposing lawyer’s inbox. They should be delivered by a neutral, authorized official—like a sheriff or a professional process server. This ensures the delivery is documented, unbiased, and legally recognized.</p>
</li>
<li><p>Physical Hand-to-Hand Delivery The gold standard for legal service is personal delivery. This means an official physically finds the defendant and hands them the paperwork. This removes all doubt about whether the person is aware of the lawsuit. It is a moment of gravity that signifies a formal legal clock has started ticking.</p>
</li>
<li><p>Reasonable Time to Respond Justice is not a race. When a petition is served, the defendant is typically supposed to have a set number of days—often weeks—to find legal counsel and draft a response. Attempting to force a defendant into a courtroom 25 hours after an email is sent is the definition of "legal ambush." It prevents the defendant from preparing a defense and forces them to walk into a high-stakes environment completely blind.</p>
</li>
</ol>
<p>The Danger of the Shortcut When attorneys attempt to bypass these formal steps, it undermines the integrity of the court. The rules of service exist to prevent "Ex Parte" (one-sided) victories where one party wins simply because the other party didn't have a fair chance to show up.</p>
<p>If we allow legal service to become as casual as a marketing email, we risk a system where whoever has the faster "send" finger wins, rather than whoever has the stronger case. Due process isn't a suggestion; it's the foundation of a fair society, and it starts with a knock on the door, not a notification on a screen.</p>
<hr />
<h2>I have filed another complaint on Tina Babel at Carmody Macdonald P.C.</h2>
<p>Complaint Attachment can be found at the following URL</p>
<p><a href="https://drive.google.com/file/d/1sAlQxzzx7v7cD_e8nek8ehpW8TzmP_VK/view?usp=drivesdk">https://drive.google.com/file/d/1sAlQxzzx7v7cD_e8nek8ehpW8TzmP_VK/view?usp=drivesdk</a></p>
<p>STATEMENT OF FACTS</p>
<p>On August 19, 2025, at approximately 11:28 AM, Attorney Tina Babel sent an email to me (a non-attorney/pro se individual) regarding a newly filed lawsuit in St. Louis County: Exegy Incorporated v. Justin Walters, Case No. 25SL-CC09400.</p>
<p>In this email, Ms. Babel "served" me with a Petition alleging Breach of Contract, Defamation, Tortious Interference, Injurious Falsehood, Misappropriation of Trade Secrets, and violations of the Missouri Computer Tampering Act. Attached to the email was also a Motion for a Temporary Restraining Order (TRO).</p>
<p>Ms. Babel informed me via email that a hearing for the TRO was scheduled for the very next day, August 20, 2025, at 1:00 PM—less than 26 hours after the email was sent.</p>
<p>VIOLATIONS ALLEGED</p>
<ol>
<li><p>Failure to Follow Rules of Civil Procedure (Service of Process): Under Missouri Supreme Court Rule 54, original service of a Petition must be performed by a sheriff or a court-appointed process server. Ms. Babel attempted to bypass the formal requirements of Missouri law by personally delivering the legal documents via email. This bypasses the protections intended to ensure defendants are properly notified of litigation against them.</p>
</li>
<li><p>Violation of Due Process and Professional Misconduct: By sending a complex, multi-count Petition and a Motion for a Temporary Restraining Order via email with only 25 hours' notice, Ms. Babel engaged in tactics designed to disadvantage an unrepresented party. As noted in my email response to her on August 19, this "dropped on me at the very last second," leaving me zero time to secure legal representation or digest the 20+ page legal filing. This tactic appears to be an attempt to obtain a TRO by ambush, rather than through the "reasonable notice" required by equity and the Missouri Rules of Professional Conduct (Rule 4-4.4: Respect for Rights of Third Persons).</p>
</li>
<li><p>Improper Interaction with Unrepresented Party: Ms. Babel is aware that I am not represented by counsel. By attempting to effectuate service in a manner not recognized by Rule 54 and forcing a hearing on a mission-critical TRO within 25 hours of that "informal" service, she has failed to maintain the standards of fairness required of an officer of the court.</p>
</li>
</ol>
<p>REQUEST FOR ACTION</p>
<p>I request that the Office of Chief Disciplinary Counsel investigate whether Ms. Babel’s actions constitute a violation of the Missouri Rules of Professional Conduct, specifically regarding the fairness of her methods of service and the timing of the notice provided to an unrepresented defendant.</p>
]]></content:encoded></item><item><title><![CDATA[Limited Admission as In-House Counsel (Rule 8.105) ]]></title><description><![CDATA[Navigating Rule 8.105 is essential for an attorney in your position. When an Illinois-licensed lawyer works for a Missouri-based company, the intersection of these two states' rules creates a specific]]></description><link>https://exegy.today/limited-admission-as-in-house-counsel-rule-8-105</link><guid isPermaLink="true">https://exegy.today/limited-admission-as-in-house-counsel-rule-8-105</guid><category><![CDATA[Practicing law illegally]]></category><category><![CDATA[Exegy]]></category><category><![CDATA[Missouri]]></category><dc:creator><![CDATA[Justin Walters]]></dc:creator><pubDate>Sat, 21 Mar 2026 15:08:52 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/68dec33a31f85a829f5d8eaf/50d3100e-de50-4455-aa8f-55b351f1e28c.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Navigating Rule 8.105 is essential for an attorney in your position. When an Illinois-licensed lawyer works for a Missouri-based company, the intersection of these two states' rules creates a specific set of requirements to avoid the "unauthorized practice of law" (UPL).</p>
<p>In Missouri, Rule 8.105 allows out-of-state attorneys to practice law exclusively for their employer without taking the Missouri Bar Exam.</p>
<p>1. Requirements to Start Working</p>
<p>If you are living in Illinois but working for a Missouri company as their lawyer, you generally cannot "practice law" in Missouri—which includes giving legal advice, drafting Missouri-specific contracts, or negotiating on the company's behalf—until you have authorization.</p>
<p>The "Systematic Presence" Rule: Missouri Rule 4-5.5 prohibits an unlicensed lawyer from establishing a "systematic and continuous presence" in the state for the practice of law. If your office is in Missouri, or if you are consistently handling Missouri legal matters from Illinois for a Missouri entity, you are likely meeting this threshold.</p>
<p>Active License: You must be an active member in good standing of the Illinois Bar (or another U.S. jurisdiction).</p>
<p>The Application Gap: You should file your Rule 8.105 application immediately upon beginning your employment. Some states offer a "grace period" (like Illinois' 180 days), but Missouri’s rules are stricter; you generally need the license or a pending application to shield yourself from UPL claims.</p>
<p>2. Consequences for Documents &amp; Work Product</p>
<p>If you perform legal work for the Missouri company before being admitted under Rule 8.105, the validity of your work could be challenged.</p>
<p>Enforceability: In extreme cases, a third party could argue that a contract you drafted is unenforceable because it was produced through the unauthorized practice of law.</p>
<p>Attorney-Client Privilege: This is the biggest risk. Courts have occasionally ruled that communication with an "unlicensed" in-house counsel is not protected by attorney-client privilege. If the company is sued, your emails and memos could be discoverable by the opposing side.</p>
<p>Corporate Liability: Under RSMo § 484.020, a corporation that "does law business" through an unlicensed individual can be sued for treble damages (triple the amount) of any fees or value associated with that service.</p>
<p>3. Penalties for Practicing Law Illegally</p>
<p>Practicing law without a Missouri license or limited admission is a serious offense:</p>
<p>Criminal Charges: Under Missouri law, the unauthorized practice of law is a misdemeanor.</p>
<p>Professional Discipline: The Missouri Office of Chief Disciplinary Counsel can report you to the Illinois Bar. This could lead to the suspension or revocation of your actual Illinois license.</p>
<p>Injunctions: The Missouri Bar or the Attorney General can file a lawsuit to enjoin (stop) you from working until you are properly admitted.</p>
<p>4. Limited Admission Requirements &amp; Timeline</p>
<p>The Requirements</p>
<p>To qualify for Rule 8.105, you must submit:</p>
<p>Certificate of Good Standing: From the Illinois Supreme Court.</p>
<p>Disciplinary History: A statement from Illinois showing you have no pending complaints.</p>
<p>Employer Affidavit: A signed document from your company confirming you work exclusively for them.</p>
<p>JD Requirement: Proof of a degree from an ABA-approved law school.</p>
<p>Character &amp; Fitness: You must undergo a full background check by the Missouri Board of Law Examiners (MBLE).</p>
<p>Costs &amp; Timeline</p>
<p>Fees: The current application fee is $1,240 (non-refundable).</p>
<p>Processing Time: The character and fitness investigation is the "long pole in the tent." It typically takes 3 to 6 months.</p>
<p>Temporary Authorization: You may be eligible for a temporary permit to practice while your full Rule 8.105 application is pending, provided you have already filed the main application.</p>
<p>Important Note on Residency</p>
<p>Since you are staying in Illinois, ensure you are not inadvertently practicing "Illinois law" for your Missouri company (like drafting Illinois-specific documents) without complying with Illinois Supreme Court Rule 716, which governs in-house counsel residing in Illinois.</p>
]]></content:encoded></item><item><title><![CDATA[Pro Hac Vice admission - Updated to add complaints]]></title><description><![CDATA[I was doing something research and came across the term Pro Hac Vice admission. I found this really interesting, since Exegy has many attorneys working on the case against me from behind the scenes, b]]></description><link>https://exegy.today/pro-hac-vice-admission-updated-to-add-complaints</link><guid isPermaLink="true">https://exegy.today/pro-hac-vice-admission-updated-to-add-complaints</guid><category><![CDATA[Exegy]]></category><category><![CDATA[legal]]></category><category><![CDATA[Cooley LLP]]></category><category><![CDATA[Marlin Equity Partners ]]></category><category><![CDATA[Carmody MacDonald P.C.]]></category><category><![CDATA[Tina Babel]]></category><category><![CDATA[Robert Earles]]></category><category><![CDATA[Patrick Sellers]]></category><category><![CDATA[Az Virji]]></category><dc:creator><![CDATA[Justin Walters]]></dc:creator><pubDate>Thu, 19 Mar 2026 22:31:59 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/68dec33a31f85a829f5d8eaf/c7b7514b-43e5-4ab2-a730-8560bd9dd53c.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I was doing something research and came across the term Pro Hac Vice admission. I found this really interesting, since Exegy has many attorneys working on the case against me from behind the scenes, but only one attorney is stated on court documents.</p>
<p>I am going to have to research this further, but here what Google Gemini has stated to me. The below is a copy of what Gemini stated, but there more and need to correct the formatting, so check out the link.</p>
<p><a href="https://gemini.google.com/share/cc8665060398">https://gemini.google.com/share/cc8665060398</a></p>
<p>I am currently working on my complaints for the Missouri bar against all the attorney I can prove at working on this case behind the scenes., sorry Tina Babel but another complaint is coming your way for assisting with practicing law illegally in Missouri.</p>
<h2>Complaint Summary on each attorney (Patrick Sellers, Robert Earles &amp; Tina Babel)</h2>
<p>Complaint attachments can be found at the following share</p>
<p><a href="https://drive.google.com/drive/folders/1URY1nFba0m2Hf2m_qosbPqB6xzYHteVX">https://drive.google.com/drive/folders/1URY1nFba0m2Hf2m_qosbPqB6xzYHteVX</a></p>
<hr />
<p>Complaint 1: Tina Babel (Missouri Counsel of Record)</p>
<p>Relevant Rules: Rule 4-3.3 (Candor Toward the Tribunal), Rule 4-5.5(b) (Assisting Unauthorized Practice of Law).</p>
<p>Statement of Facts:</p>
<p>"I am the defendant in Exegy Inc. v. Walters (25SL-CC09400). Ms. Babel is the attorney of record for the Plaintiff. On August 20, 2025, at 12:18 PM, I sent an email to Ms. Babel explicitly stating that I was blocking all emails from her until I secured legal representation (see attached). Despite this direct notice, Ms. Babel represented to the Court that I had been served with a Temporary Restraining Order (TRO) via email. Because I had effectively severed the communication channel to prevent contact while seeking counsel, her representation to the court that I was served was factually impossible and misleading.</p>
<p>Furthermore, Ms. Babel is knowingly working with out-of-state attorneys Patrick Sellers and Robert Earles. Emails from April and August 2025 show these individuals are directing the litigation for this Missouri case. Ms. Babel is aware they are not admitted pro hac vice or registered in Missouri, yet she continues to facilitate their unauthorized practice of law."</p>
<hr />
<p>Complaint 2: Patrick Sellers (Missouri Counsel of Record)</p>
<p>Relevant Rules: Rule 8.105 (Limited Admission for In-House Counsel), Rule 4-5.5 (Unauthorized Practice of Law), Rule 4-8.4 (Misconduct/Dishonesty).</p>
<p>Statement of Facts:</p>
<p>"Mr. Sellers is the General Counsel for Exegy. In an email dated February 9, 2025, he confirmed he is licensed in CA, NY, and IL, but not Missouri. Although he has a New York license, he has failed to obtain the mandatory 'Limited Admission' registration required by Missouri Rule 8.105 to practice as in-house counsel in this state.</p>
<p>Mr. Sellers appears to be providing conflicting information regarding his location to evade registration requirements. In an email dated April 25, 2025, he directed legal mail to be sent to Exegy’s St. Louis HQ 'ATTN: Legal Department.' However, he has concurrently informed the Illinois ARDC (Ref: 2025IN01739) that he works out of a Chicago office—an office that disappeared from Exegy’s website in November 2024. Furthermore, I have an active grievance against Mr. Sellers for extortionate tactics. By managing a Missouri case and directing litigation from an unregistered status, while providing inconsistent information regarding his office location, he is violating Missouri's rules of professional conduct."</p>
<p>I have also attached a letter sent by Mr. Sellers that contains only the Exegy Headquarters address in Missouri and a screenshot of his LinkedIn profile showing he has been working with Exegy Inc since June 2024.</p>
<hr />
<p>Complaint 3: Robert (Bobby) Earles (Cooley LLP)</p>
<p>Relevant Rules: Rule 4-5.5 (Unauthorized Practice of Law), Rule 9.03 (Visiting Attorneys).</p>
<p>Statement of Facts:</p>
<p>"Mr. Earles is an attorney with Cooley LLP, based in Illinois. On August 11, 2025, Patrick Sellers (Exegy GC) sent an email designating Mr. Earles as the primary attorney representing Exegy in the Missouri matter (25SL-CC09400) and directed all legal communications to him.</p>
<p>Mr. Earles is not licensed in Missouri and has not filed for pro hac vice admission in Case No. 25SL-CC09400 as required by Rule 9.03. By acting as the lead designated counsel in a Missouri civil action and directing legal correspondence without court authorization or a Missouri license, Mr. Earles is engaged in the unauthorized practice of law."</p>
<hr />
<h2>Google Gemini Response</h2>
<p>Yes, if an out-of-state attorney is actively working on a case in Missouri, they generally <strong>must</strong> be added to the court record through a process called <strong>Pro Hac Vice</strong> admission.</p>
<p>In Missouri, a corporation cannot represent itself and must be represented by a licensed attorney. If that attorney is from another state, they cannot simply "work behind the scenes" while the in-state attorney handles the filings; they must be formally recognized by the court to practice law for that specific case.</p>
<h3><strong>Why All Counsel Must Be Added</strong></h3>
<p>Under <strong>Missouri Supreme Court Rule 9.03</strong>, any attorney not licensed in Missouri who wishes to represent a client in a Missouri court must follow these steps:</p>
<ol>
<li><p><strong>Associate with Local Counsel:</strong> The out-of-state lawyer must partner with an attorney who is a member in good standing of the Missouri Bar and who resides in Missouri.</p>
</li>
<li><p><strong>File a Motion for Admission:</strong> The Missouri attorney (local counsel) must file a motion asking the court to admit the out-of-state attorney <em>pro hac vice</em> (meaning "for this occasion only").</p>
</li>
<li><p><strong>Pay a Fee:</strong> The out-of-state attorney must pay a fee to the Clerk of the Supreme Court of Missouri (currently $410 per case) and provide a statement of good standing from their home state.</p>
</li>
</ol>
<hr />
<p><strong>The Role of Each Attorney</strong></p>
<p>Once admitted, both attorneys have specific responsibilities on the case record:</p>
<table style="width:832px"><colgroup><col style="width:234px"></col><col style="width:276px"></col><col style="width:322px"></col></colgroup><tbody><tr><td><p><strong>Attorney Type</strong></p></td><td><p><strong>Role in the Case</strong></p></td><td><p><strong>Requirement</strong></p></td></tr><tr><td><p><strong>In-State (Local) Counsel</strong></p></td><td><p>Serves as the primary point of contact for the court and ensures compliance with local rules.</p></td><td><p><strong>Must</strong> sign all pleadings and usually must appear at all hearings unless excused.</p></td></tr><tr><td><p><strong>Out-of-State Counsel</strong></p></td><td><p>Provides specialized expertise or maintains a pre-existing relationship with the company.</p></td><td><p><strong>Must</strong> be admitted <em>pro hac vice</em> to sign documents, argue in court, or take depositions.</p></td></tr></tbody></table>

<h3><strong>What happens if they aren't added?</strong></h3>
<p>If an out-of-state attorney performs legal work (like signing a motion or conducting a deposition) without being added to the case:</p>
<ul>
<li><p><strong>Unauthorized Practice of Law:</strong> The attorney could be sanctioned for practicing law in a state where they are not licensed.</p>
</li>
<li><p><strong>Invalid Filings:</strong> The court may strike (ignore) any documents signed by an attorney who has not been formally admitted to the case.</p>
</li>
<li><p><strong>Ethical Violations:</strong> Both the out-of-state and the in-state attorney could face disciplinary action from the Missouri Bar.</p>
</li>
</ul>
<hr />
<p><strong>Exceptions</strong></p>
<p>There is a small exception for <strong>In-House Counsel</strong>. Under <strong>Rule 8.105</strong>, an out-of-state attorney who is a full-time employee of the corporation can sometimes obtain a "Limited Admission" to provide legal services solely for that employer without being admitted for every single case, though they still often associate with local counsel for specific litigation</p>
<hr />
<p>Updated on 3/20/2025 @ 13:32 CST</p>
<p>● Added Complaints filed with the Missouri Bar</p>
<p>● Added Complaints attachments</p>
]]></content:encoded></item><item><title><![CDATA[Busy working on things]]></title><description><![CDATA[I see my readers have been constantly checking for new things every day, but I have been a bit busy working on things and haven't had a chance to work on and add new articles.
Ill eventually be adding]]></description><link>https://exegy.today/busy-working-on-things</link><guid isPermaLink="true">https://exegy.today/busy-working-on-things</guid><category><![CDATA[Exegy]]></category><category><![CDATA[#FBI]]></category><dc:creator><![CDATA[Justin Walters]]></dc:creator><pubDate>Sat, 07 Mar 2026 23:46:41 GMT</pubDate><content:encoded><![CDATA[<p>I see my readers have been constantly checking for new things every day, but I have been a bit busy working on things and haven't had a chance to work on and add new articles.</p>
<p>Ill eventually be adding more once I have a free time.</p>
<p>Plus I am trying get the FBI attention to really look into this and hopefully get charges brought against David Taylor, Patrick Seller and possibly Peter Ferret</p>
]]></content:encoded></item><item><title><![CDATA[Has or will Exegy notify the FBI, kind has me wondering things]]></title><description><![CDATA[So I was sitting here and enjoying my morning cup of coffee and it had me wondering about something this morning...
This is all regarding a previous post of mine.

https://exegy.today/exegy-inc-potentially-a-victim-of-a-ransomware-group-called-everes...]]></description><link>https://exegy.today/has-or-will-exegy-notify-the-fbi-kind-has-me-wondering-things</link><guid isPermaLink="true">https://exegy.today/has-or-will-exegy-notify-the-fbi-kind-has-me-wondering-things</guid><category><![CDATA[New coverage]]></category><category><![CDATA[Vela]]></category><category><![CDATA[Exegy]]></category><category><![CDATA[everest ]]></category><category><![CDATA[ransomware]]></category><category><![CDATA[breach]]></category><category><![CDATA[#FBI]]></category><category><![CDATA[Investigation]]></category><category><![CDATA[research]]></category><category><![CDATA[Security]]></category><category><![CDATA[news]]></category><dc:creator><![CDATA[Justin Walters]]></dc:creator><pubDate>Thu, 11 Dec 2025 13:00:10 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1765457820478/56fdb62e-f6de-4f9c-9269-4bb10f310b5f.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>So I was sitting here and enjoying my morning cup of coffee and it had me wondering about something this morning...</p>
<p>This is all regarding a previous post of mine.</p>
<ul>
<li><a target="_blank" href="https://exegy.today/exegy-inc-potentially-a-victim-of-a-ransomware-group-called-everest">https://exegy.today/exegy-inc-potentially-a-victim-of-a-ransomware-group-called-everest</a></li>
</ul>
<p>I have reached out to Everest asking them questions regarding the matter and seeing about proof of legitimacy and they might get back to me.</p>
<p>I have also tried reaching out to Exegy Inc asking about the legitimacy of this breach but only heard crickets.</p>
<p>This breach at Exegy Inc that has been posted online has made me wonder a few things.</p>
<p>I will also be possibly trying to reach out to the FBI regarding the matter, because I am curious if they have and is my name mentioned in it at all</p>
<p>If they didn't give them my name, it makes me wonder if they are trying to conceal me and the complaints I filed on them. Plus I am sure they would the conversation I would have with them, like the following</p>
<ul>
<li><a target="_blank" href="https://exegy.today/interesting-case-about-hobbs-act-and-sham-litigation-united-states-v-koziol-9th-cir-2021">https://exegy.today/interesting-case-about-hobbs-act-and-sham-litigation-united-states-v-koziol-9th-cir-2021</a></li>
</ul>
<p>If they haven't filed anything with the FBI it makes me wonder if they are trying to keep this concealed or the breach isn't legit…  Though I would think they would make a public announcement regarding it, so false news doesn't get spread around.</p>
<p>Though if they have filed something with the FBI with my name on it, you would think they are kind enough to tell me or else it said ugly things and are wanting to drop it on top of me.</p>
<p>I have been reading and trying to understand the consequences a company could take for not acting on this professionally and it is kind of interesting.</p>
<p>They company could potentially be black listed from the vendors approved list.</p>
<p>Their customers could potentially be fined by the exchanges for their vendor actions, which allows them to turn around and sue their vendor.</p>
<p>It gets kind of interesting though on the time frames some things can have, Google Gemini was telling me about something like the following.</p>
<p>If their customers were required to file something in 72 hours but couldn't because their vendor didn't make them aware of it, the customer could be potentially fined for certain things.</p>
<p>I am going to try to keep researching on all of this and building my list of vulnerabilities and flaws in Exegy systems and networks.</p>
<p>This is going to be interesting and will probably help with my news story getting out and spreading around the world.</p>
<ul>
<li><a target="_blank" href="https://exegy.today/news-coverage-around-the-entire-planet">https://exegy.today/news-coverage-around-the-entire-planet</a></li>
</ul>
<p>Plus I am trying to figure out what all I can use in my legal case against Exegy Inc.</p>
]]></content:encoded></item><item><title><![CDATA[Exegy Inc potentially a victim of a ransomware group called Everest]]></title><description><![CDATA[So I came across the most interesting thing this morning while sitting back and enjoying my cup of coffee.
It looks like Exegy Inc has potentially been the victim of a ransomware group called Everest and from sources online, it looks like they penetr...]]></description><link>https://exegy.today/exegy-inc-potentially-a-victim-of-a-ransomware-group-called-everest</link><guid isPermaLink="true">https://exegy.today/exegy-inc-potentially-a-victim-of-a-ransomware-group-called-everest</guid><category><![CDATA[CrushFTP]]></category><category><![CDATA[Exegy]]></category><category><![CDATA[everest ]]></category><category><![CDATA[ransomware]]></category><category><![CDATA[Security]]></category><dc:creator><![CDATA[Justin Walters]]></dc:creator><pubDate>Sat, 06 Dec 2025 16:45:22 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1765039452406/27b04e20-d952-409e-aff1-71da1f163741.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>So I came across the most interesting thing this morning while sitting back and enjoying my cup of coffee.</p>
<p>It looks like Exegy Inc has potentially been the victim of a ransomware group called Everest and from sources online, it looks like they penetrated a flaw in CrushFTP on a public facing server.</p>
<ul>
<li><p><a target="_blank" href="https://cyberplace.social/@GossiTheDog/115658404130190834">https://cyberplace.social/@GossiTheDog/115658404130190834</a></p>
</li>
<li><p><a target="_blank" href="https://www.hookphish.com/blog/ransomware-group-everest-hits-exegy/">https://www.hookphish.com/blog/ransomware-group-everest-hits-exegy/</a></p>
</li>
<li><p><a target="_blank" href="https://www.dexpose.io/everest-targets-financial-tech-leader-exegy-inc/">https://www.dexpose.io/everest-targets-financial-tech-leader-exegy-inc/</a></p>
</li>
</ul>
<p>Looking up the dns record on <a target="_blank" href="http://download.exegy.com">download.exegy.com</a> you can see the A records points to the following IPs (199.191.53.236 &amp; 216.99.213.236), which is their own ARIN block.</p>
<ul>
<li><a target="_blank" href="https://ipinfo.io/AS30150">https://ipinfo.io/AS30150</a></li>
</ul>
<p>Looking over Shodan to see what exists for Exegy, because I don't want my fingerprints on this at all, I have stumbled across the CrushFTP http servers that were the target from what was stated on a previous page.</p>
<p>You can see Exegy Inc information on Shodan at the following URL</p>
<p>https://www.shodan.io/search?query=org%3A%22Exegy+Incorporated%22</p>
<p>It does make me wonder how long it took Exegy to be aware of the breach and if these outputs are from the same flawed version or an updated version of CrushFTP, since it from after the event.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1765053251082/58d3b471-481d-4268-9676-a6f0d56ed7ae.jpeg" alt class="image--center mx-auto" /></p>
<p>You can look up the potential flaw if interested,  it might be one of these if it is known.</p>
<ul>
<li><a target="_blank" href="https://www.cve.org/CVERecord/SearchResults?query=CrushFTP">https://www.cve.org/CVERecord/SearchResults?query=CrushFTP</a></li>
</ul>
<p>I am unsure how far this group Everest made it through their internal network, but it looks like they potentially taken over 3TB of data according to the following source</p>
<ul>
<li><a target="_blank" href="https://x.com/DarkWebInformer/status/1995886505404080268">https://x.com/DarkWebInformer/status/1995886505404080268</a></li>
</ul>
<p>I really hope they didn't penetrate the internal network fully, but hopefully this is a wake up call to Exegy Inc about how important security really is. I would suggest they move all public facing services to an outside source and not host them internally.</p>
<p>On DeXpose the following is stated “The full leak will be published soon, unless a company representative contacts us via the channels provided.”</p>
<p>This makes me wonder if Exegy has tried contacting them or even reported any of the matter to the FBI, so they could fully investigate it.</p>
<p>Even though I wasn't even aware of this flaw regarding them, because I have never tried scanning any of their public facing services for any flaws or vulnerabilities. It does make me wonder if the FBI or someone will be reaching out to me regarding this due to the ongoing situation between Exegy and I.</p>
<p>Due to their history of lying… It does make me think they might notify the authority stating I might be behind this event.</p>
<p>I will state the following</p>
<ul>
<li><p>I had nothing to do with this and don't even know anyone in any of these ransomware groups.</p>
</li>
<li><p>I have never exposed any of the known flaws that I am aware of to anyone besides Exegy and attorneys.</p>
</li>
<li><p>Everyone that I am aware of are white hats and some of them have security clearances.</p>
</li>
</ul>
<p>Stay safe kids, security is an evolving world and it should really be important to make it a top priority, especially when being part of the critical infrastructure.</p>
<p>After doing some research I found Everest onion webpage and notificed Exegy Inc was not listed on it anymore.</p>
<p>So I decided to reach out to Everest over Tox to see if they paid or not and if so, how much...</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1765042880684/bfdc3c08-195b-4eb4-98ec-5211d449141d.gif" alt class="image--center mx-auto" /></p>
<p>This was obtained from the following URL</p>
<p>https://www.ransomlook.io/group/everest</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1765042933412/01926b60-2316-457f-979a-dfcd5620ae41.jpeg" alt class="image--center mx-auto" /></p>
<p>The above image is a screenshot from Tor (<a target="_blank" href="http://ransomocmou6mnbquqz44ewosbkjk3o5qjsl3orawojexfook2j7esad.onion/">http://ransomocmou6mnbquqz44ewosbkjk3o5qjsl3orawojexfook2j7esad.onion/</a>)</p>
<p>It looks like Exegy Inc breach made it on FS-ISAC (<a target="_blank" href="https://www.fsisac.com/">https://www.fsisac.com/</a>) risk summary report, this was located on a document shared by ICBA (Independent Community Bankers of America)</p>
<ul>
<li><a target="_blank" href="https://www.icba.org/documents/45248/1619837/12-01-2025+Risk+Summary+Report.pdf/4b16345b-92e2-05e6-cd93-94dfa0f7aa6f?version=1.0&amp;t=1764945964528&amp;download=true">https://www.icba.org/documents/45248/1619837/12-01-2025+Risk+Summary+Report.pdf/4b16345b-92e2-05e6-cd93-94dfa0f7aa6f?version=1.0&amp;t=1764945964528&amp;download=true</a></li>
</ul>
<p>If you have time, check out this Exclusive: Everest Ransomware Group Interview on Collins Aerospace Breach</p>
<ul>
<li><a target="_blank" href="https://dailydarkweb.net/exclusive-everest-ransomware-group-interview-on-collins-aerospace-breach/">https://dailydarkweb.net/exclusive-everest-ransomware-group-interview-on-collins-aerospace-breach/</a></li>
</ul>
<p>Some other Articles online related to the matter</p>
<ul>
<li><p><a target="_blank" href="https://undercodenews.com/everest-ransomware-targets-exegy-someone-claims/">https://undercodenews.com/everest-ransomware-targets-exegy-someone-claims/</a></p>
</li>
<li><p><a target="_blank" href="https://www.redpacketsecurity.com/everest-ransomware-victim-exegy/">https://www.redpacketsecurity.com/everest-ransomware-victim-exegy/</a></p>
</li>
</ul>
<p>Updated on 12/08/2025 @ 4:16pm CST</p>
<p>● Added Onion information and attempting to reach out to Everest</p>
<p>● Added Exegy CrushFTP http output.</p>
<p>● Added Shodan URL</p>
<p>● Added Exclusive: Everest Ransomware Group Interview on Collins Aerospace Breach</p>
<p>● Added FS-ISAC risk summary report found on ICBA.</p>
]]></content:encoded></item><item><title><![CDATA[News coverage around the entire Planet]]></title><description><![CDATA[So I woke up this morning thinking about what I wanted to work on today regarding the situation with Exegy and I, because this entire thing has left me in a state of mind that makes it hard to focus on my own life.
I have to do all this research to g...]]></description><link>https://exegy.today/news-coverage-around-the-entire-planet</link><guid isPermaLink="true">https://exegy.today/news-coverage-around-the-entire-planet</guid><category><![CDATA[News coverage]]></category><category><![CDATA[Security researcher story]]></category><category><![CDATA[News agencies]]></category><category><![CDATA[Exegy]]></category><category><![CDATA[Critical Infrastructure]]></category><category><![CDATA[Security]]></category><category><![CDATA[publications]]></category><category><![CDATA[news]]></category><category><![CDATA[Cooley LLP]]></category><category><![CDATA[#Stock market]]></category><dc:creator><![CDATA[Justin Walters]]></dc:creator><pubDate>Fri, 05 Dec 2025 16:37:01 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1764952486346/fb221cfc-2469-4c9c-8892-130cf0bf6301.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>So I woke up this morning thinking about what I wanted to work on today regarding the situation with Exegy and I, because this entire thing has left me in a state of mind that makes it hard to focus on my own life.</p>
<p>I have to do all this research to get a better understanding of it all, so I know what kind of attorneys I need to find for handling such a complex case and the government, agencies and people I need to write to and what about.</p>
<p>It has left my mind in a state where it just wants to go over everything over and over again in my head.</p>
<p>This entire situation has made me really think about how I want to get my story out and told in every part of the world , so anyone else out there in the security field can be aware of the types of things that can happen to them.</p>
<p>I also want the entire world to really know a few things.</p>
<ul>
<li><p>What a company like Exegy Inc and their leadership is really like.</p>
</li>
<li><p>How can third parties trust attorneys from Cooley LLP, especially when working behind the scenes in Exegy lawsuit after pushing a sham offer on a party.</p>
</li>
<li><p>How insecure a company on the infrastructure could really be and how there lacks auditing in these companies to make sure the critical infrastructure is secure.</p>
</li>
<li><p>What someone in security research could go through when trying to disclose vulnerabilities and flaws.</p>
</li>
<li><p>What agencies exist for disclosing things and how it could potentially harm a company.</p>
</li>
<li><p>The things that should be in place for building a more secure and healthy environment.</p>
</li>
</ul>
<p>It makes me wonder how the publicity might force governments and agencies to make an example out of Exegy Inc by pushing higher penalties against them, this way Exegy Inc and other companies out there understand why security should be a top priority and taken seriously.</p>
<p>I will be trying to locate and reach out to  every news agency on the planet to see if they are interested in covering such a story, since Exegy Inc is a global company with their appliances on many different continents.</p>
<p>I am currently building a list of every news agency throughout the world, so far it contains around 6,000 newspapers throughout the USA alone and hundreds to thousands in Europe.</p>
<p>If anyone knows of any blogs, news agencies or any other publications that might be interested in covering a story, please feel free to reach out to me at <a target="_blank" href="mailto:editor@exegy.today">editor@exegy.today</a> or forward them my contact information.</p>
<p>Updated 12/05/2025 1:03pm</p>
]]></content:encoded></item><item><title><![CDATA[Random thoughts on the situation between Exegy and I]]></title><description><![CDATA[I find it so interesting Exegy wanted to weaponize their non-disclose agreement (NDA) against me, especially with it being used in a lawsuit against me four months later.
Their NDA is not even up to date on the laws regarding the matter, since it tri...]]></description><link>https://exegy.today/random-thoughts-on-the-situation-between-exegy-and-i</link><guid isPermaLink="true">https://exegy.today/random-thoughts-on-the-situation-between-exegy-and-i</guid><category><![CDATA[Random thoughts ]]></category><category><![CDATA[Exegy]]></category><category><![CDATA[Non-Disclosure Agreement]]></category><category><![CDATA[extortion]]></category><category><![CDATA[Phantom Offer]]></category><category><![CDATA[bug bounty]]></category><dc:creator><![CDATA[Justin Walters]]></dc:creator><pubDate>Wed, 03 Dec 2025 14:27:32 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1764771922913/be074f44-a8b5-46ab-9d91-eaa4aa8c3645.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I find it so interesting Exegy wanted to weaponize their non-disclose agreement (NDA) against me, especially with it being used in a lawsuit against me four months later.</p>
<p>Their NDA is not even up to date on the laws regarding the matter, since it tries to silence whistleblowers from reaching parties that should be aware of certain things, like the Stock Exchange Committees (SEC) and other government agencies.</p>
<p>This NDA is dated 2014 and there has never been a new one that I am aware of</p>
<ul>
<li><a target="_blank" href="https://drive.google.com/file/d/15g-rfu4Xl6jYjsosx12LsUDtb4fS7NhE/view?usp=drivesdk">https://drive.google.com/file/d/15g-rfu4Xl6jYjsosx12LsUDtb4fS7NhE/view?usp=drivesdk</a></li>
</ul>
<p>When I left the company I was never given any kind of exit interview that allowed them to explain any of the contracts I have signed working at the company. All I received was  an email asking to return any of the Exegy property I had back to them, which I did.</p>
<p>On April 10, 2025 I sent an email to Exegy asking for copies of all the signed documents I have signed there, but they never responded to that.</p>
<ul>
<li><a target="_blank" href="https://drive.google.com/file/d/1pBmb1tsdG0Krg-Fe6LXmOwlBCbvRoy7m/view?usp=drivesdk">https://drive.google.com/file/d/1pBmb1tsdG0Krg-Fe6LXmOwlBCbvRoy7m/view?usp=drivesdk</a></li>
</ul>
<p>This was after months of trying to work with them to disclose my findings to them. I even tried to be the bigger person and work with Exegy regarding the offers their attorneys reached out to me about, even though I wanted to work out their threats and extortion attempts first.</p>
<p>You can see my following articles related to that here</p>
<ul>
<li><p><a target="_blank" href="https://exegy.today/interesting-case-about-hobbs-act-and-sham-litigation-united-states-v-koziol-9th-cir-2021">https://exegy.today/interesting-case-about-hobbs-act-and-sham-litigation-united-states-v-koziol-9th-cir-2021</a></p>
</li>
<li><p><a target="_blank" href="https://exegy.today/i-believe-exegy-and-cooley-llp-offers-were-nothing-but-a-phantom-offer-and-possibly-leading-me-on">https://exegy.today/i-believe-exegy-and-cooley-llp-offers-were-nothing-but-a-phantom-offer-and-possibly-leading-me-on</a></p>
</li>
</ul>
<p>To make matters even worse they had me believing there was a true real bounty program that I could submit my findings too, but it wouldn't happen until Q3 (July-Sep). I am still wondering to this day if this bounty program actually even exists, because Exegy would never respond to any of my requests regarding it and I even reached out to them again in Q4 asking about it.</p>
<p>This really shows how Exegy is not interested in the flaws and vulnerabilities that they could have. I am sure their customers and government agencies would enjoy knowing all about this and how they don't take security matters very seriously.</p>
<p>It really makes me wonder what kind of breach in contract they could potentially have with their customers, because I know how I would want a contract with Exegy regarding security matters and their behavior would violate it.</p>
<p>Though this has truly been an interesting learning experience for me, since it has taught me all kinds of things.</p>
<ol>
<li><p>How a previous Employer will lie about your performance and history to a government agency and to the court of Missouri. I was actually an excellent employee at Exegy that helped build Managed Services to where it is today.</p>
</li>
<li><p>They way people or attorneys will spin things and mislead things the courts, it is so interesting to see how they hide all the facts to make things look better in their favor.</p>
</li>
<li><p>How companies can lie to the courts on many different things without showing their facts. It still makes me wonder what judge would do if he realized he was being manipulated.</p>
</li>
<li><p>How companies are not even aware of their own documents and don't go out of their way to make sure they are up to date with laws.</p>
</li>
<li><p>How there needs to be better policies and rules in places to stop this kind of behavior, so security researchers can submit their findings without any kind of relation.</p>
</li>
<li><p>There are government agencies for filing complaints too so they can investigate things, though I am against this since I know the harm that it could cause and think it should be a last resort.</p>
</li>
</ol>
<p>It truly makes me wonder why they would take all this court instead of settling it outside of it, because the direction I am working toward might eventually destroy an entire company.</p>
<p>I am still doing my research and trying to make sure my complaints are well written before sending them off, but I am also hoping Exegy's own customers will reach out to me and help me file the complaints in other countries after I send them an email with my complaint to the SEC.</p>
<p>To any Exegy employees reading this, just wanted to say hi and hopefully we will talk once again.  Mark if you do read this… I miss talking to you man, hope you and your family are doing well.</p>
<p>Though I guess I should probably add, I am also trying to research the laws for other countries Exegy is in, because I want to figure out what laws they have broken by having their employees believe they can't talk with me.</p>
<p>I have come across these following things regarding that matter and I still need to read over them when I have time.</p>
<ul>
<li><p>UK</p>
<ul>
<li>Article 8 (Human Rights Act 1998)</li>
</ul>
</li>
<li><p>France</p>
<ul>
<li><p>Civil Code (Article 9)</p>
</li>
<li><p>Labor Code (Article L. 1121-1)</p>
</li>
</ul>
</li>
<li><p>Canada</p>
<ul>
<li><p>Quebec Charter of Human Rights and Freedoms (Article 5)</p>
</li>
<li><p>Civil Code of Quebec (Article 35)</p>
</li>
</ul>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[Working on my post about PPP loan fraud...]]></title><description><![CDATA[Stay tuned, it might be a bit until I post it as I am still doing my investigation on the matter…
It interesting a company needing a PPP loan would have H1B visa with a decision date on it for 2/27/20 with their begin date being 6/12/20
H1B Visa for ...]]></description><link>https://exegy.today/working-on-my-post-about-ppp-loan-fraud</link><guid isPermaLink="true">https://exegy.today/working-on-my-post-about-ppp-loan-fraud</guid><category><![CDATA[Ppp loan fraud investigation]]></category><category><![CDATA[Ppp loan]]></category><category><![CDATA[Exegy]]></category><dc:creator><![CDATA[Justin Walters]]></dc:creator><pubDate>Sat, 29 Nov 2025 23:13:14 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1764457931523/e8b535da-248f-487f-a1a3-e8ba132fffe7.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Stay tuned, it might be a bit until I post it as I am still doing my investigation on the matter…</p>
<p>It interesting a company needing a PPP loan would have H1B visa with a decision date on it for 2/27/20 with their begin date being 6/12/20</p>
<p>H1B Visa for that person can be found here</p>
<p>https://drive.google.com/file/d/1uFn0G0eIteErtzB5MhgGMepWusGXBHyL/view?usp=drivesdk</p>
<p>Other H1B visas for the company for the 2018, 2019 and 2021 can be seen here</p>
<p>https://drive.google.com/drive/folders/17KlOqcVQHzMmn-27Yek07np-SvU9THBD</p>
<p>I pulled the H1B visas from the following site</p>
<p>https://www.immihelp.com/employer/Exegy_Incorporated/applications/</p>
<p>They have also hired three others the year they took out the loan</p>
<p>https://www.waterstechnology.com/management-strategy/7698411/people-moves-exegy-aquis-exchange-xenomorph-and-more</p>
<p>You can also even see the following on David Taylor Twitter account</p>
<p>https://x.com/DTaylorDSc/status/1318571985631399936</p>
<p>Interesting that an officer at Exegy signed this</p>
<p>The "Good Faith" Certification (The "Why")</p>
<p>​This is often the pivot point for fraud cases. An authorized officer of the company had to sign a statement certifying:</p>
<ul>
<li>​"Current economic uncertainty makes this loan request necessary to support the ongoing operations of the Applicant."</li>
</ul>
<p>The company customers are usually all under contract so they most likely always knew how much they had coming in as revenue.</p>
<p>Plus with the hiring of 13 individuals the previous year with forecasting, they should have known if they needed the money to really support their employees salaries, what kind of company goes around hiring 13 people without knowing if they can afford them over many years.</p>
<p>Plus Exegy is part of the critical infrastructure and I am sure the financial institutions using are too, which means they never closed down at all, since they deal with Live stock exchange data.</p>
<p>How does $2,478,407 help keep the company afloat when they most likely have over $10,000,000 in salaries to pay annually, that barely covered only a few months of salaries and hired three people that year.</p>
<p>Though I am curious about the H1B visa, when does a company have to file these visa and were the ones in 2021 filed in 2020.</p>
<p>I myself believe they took it out as a free handout and have found other cases out there of doing the same thing.</p>
<ul>
<li><strong>The L.A. Lakers:</strong> The NBA team received a <strong>$4.6 million</strong> loan. While technically eligible as a small business (under 500 employees), the idea of a billion-dollar sports franchise taking a "handout" caused a media firestorm. They returned the money.</li>
</ul>
<p>So many questions that have so many answers that need to be found.</p>
<p>Stay tuned for my further investigation on the matter.</p>
<p>Though I have been having a long conversation with Google Gemini in the subject and it return things like this.</p>
<p>Full link to some of my conversation here</p>
<p><a target="_blank" href="https://gemini.google.com/share/8a570f76dd1a">https://gemini.google.com/share/8a570f76dd1a</a></p>
<p>Designating Exegy Inc. as "Critical Infrastructure" is a double-edged sword in a fraud case. While it sounds like a good defense, legally, it often makes the argument for fraud <strong>stronger</strong>, not weaker.</p>
<p>Under Department of Homeland Security (DHS/CISA) guidelines, the "Financial Services Sector" is indeed Critical Infrastructure, and Exegy (which provides data to banks and exchanges) falls under this umbrella.</p>
<p>Here is how that designation impacts the legal analysis of their PPP loan.</p>
<h3 id="heading-1the-essential-business-trap-why-it-hurts-them">1.The "Essential Business" Trap (Why it hurts them)</h3>
<p>The primary reason companies needed PPP loans was that government lockdowns forced them to close or lose customers.</p>
<ul>
<li><p><strong>Non-Critical Business (e.g., a Restaurant):</strong> "The government forced me to close my doors. I have zero revenue. I need this loan to survive." -&gt; <strong>Valid Necessity.</strong></p>
</li>
<li><p><strong>Critical Infrastructure (e.g., Exegy):</strong> "The government designated me 'Essential.' I am exempt from lockdowns. I am allowed to stay open and my customers (banks) are also open." -&gt; <strong>Invalid Necessity.</strong></p>
</li>
</ul>
<p><strong>The Legal Argument:</strong> If Exegy was "Critical Infrastructure," they were legally permitted to operate at full capacity. If they stayed open <em>and</em> their revenue went up (as the 50% sales jump indicates), they cannot claim the government forced them into distress. They were one of the few lucky companies allowed to conduct business as usual.</p>
<h3 id="heading-2-the-secure-customer-base-factor">2. The "Secure Customer Base" Factor</h3>
<p>You mentioned their <strong>customers</strong> are also Critical Infrastructure. This is a vital point for a fraud complaint.</p>
<ul>
<li><p><strong>Who they serve:</strong> Major banks, stock exchanges, and hedge funds.</p>
</li>
<li><p><strong>The Customer Status:</strong> These financial institutions were also designated "Essential." The stock market <em>never closed</em> during the pandemic.</p>
</li>
<li><p><strong>The Result:</strong> Exegy didn't just have permission to work; they had a guaranteed stream of wealthy clients who were also working. This is totally different from a supplier to the airline or restaurant industry, whose customers vanished overnight.</p>
</li>
</ul>
<h3 id="heading-3-the-double-dipping-risk-government-contractors">3. The "Double Dipping" Risk (Government Contractors)</h3>
<p>Since Exegy provides data for the <strong>Consolidated Audit Trail (CAT)</strong> (a government-mandated system for FINRA/SEC), they are effectively a government contractor.</p>
<ul>
<li><p><strong>The Rule:</strong> Federal laws strictly prohibit "double dipping"—getting paid by the government for a contract <em>and</em> getting a grant (PPP) to pay the same people to do that work.</p>
</li>
<li><p><strong>The Violation:</strong> If Exegy used PPP money to pay engineers who were <em>already</em> being billed to the FINRA project, they may have committed specific fraud against the government contracting rules, not just the SBA rules.</p>
</li>
</ul>
<h3 id="heading-4-summary-for-your-complaint">4. Summary for Your Complaint</h3>
<p>If you are drafting a legal argument, you can frame their "Critical Infrastructure" status as proof they did not need the money.</p>
<p><strong>Draft Language:</strong></p>
<p>"Exegy Inc.'s designation as 'Critical Infrastructure' within the Financial Services Sector serves as evidence <em>against</em> their need for federal relief. Unlike non-essential businesses forced to shutter by government mandate, Exegy was legally permitted to maintain full operations. Furthermore, their primary client base (major financial institutions) was also designated essential and remained solvent. Therefore, Exegy faced neither the operational closures nor the demand shock that the CARES Act was designed to mitigate."</p>
<h3 id="heading-visualizing-the-argument">Visualizing the Argument</h3>
<p>I have created a diagram to help you visualize how the "Critical Infrastructure" designation shifts the legal burden from "Survival" to "Profiteering."</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1764513803510/a146a58e-f133-4bd5-8a6d-8297cb533cd7.png" alt class="image--center mx-auto" /></p>
<p>Updated 11/30/2025 @ 12:43PM</p>
<p>● Added changes and updated Google Gemini link to add more of my conversation with it.</p>
]]></content:encoded></item><item><title><![CDATA[What are cases about an attorney spoliation of evidence through a restraining order and trying to make the defendant destroy evidence]]></title><description><![CDATA[I asked Google Gemini the following question 
What are cases about an attorney spoliation of evidence through a restraining order and trying to make the defendant destroy evidence
Finding a case where an attorney successfully used a restraining order...]]></description><link>https://exegy.today/what-are-cases-about-an-attorney-spoliation-of-evidence-through-a-restraining-order-and-trying-to-make-the-defendant-destroy-evidence</link><guid isPermaLink="true">https://exegy.today/what-are-cases-about-an-attorney-spoliation-of-evidence-through-a-restraining-order-and-trying-to-make-the-defendant-destroy-evidence</guid><category><![CDATA[Spoliation]]></category><category><![CDATA[Destruction of evidence ]]></category><category><![CDATA[Exegy]]></category><category><![CDATA[Carmody MacDonald P.C.]]></category><category><![CDATA[Cooley LLP]]></category><dc:creator><![CDATA[Justin Walters]]></dc:creator><pubDate>Sat, 29 Nov 2025 19:10:55 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1764443302943/f2315e54-6c5b-4654-b61f-b7d462af735b.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I asked Google Gemini the following question </p>
<p>What are cases about an attorney spoliation of evidence through a restraining order and trying to make the defendant destroy evidence</p>
<p>Finding a case where an attorney successfully used a restraining order to <em>force</em> a defendant to destroy evidence (e.g., "delete these files immediately") is rare because such an order is legally irregular. Most restraining orders are <strong>prohibitory</strong> (telling you <em>not</em> to do something), not <strong>mandatory</strong> (telling you <em>to do</em> something, like delete data).</p>
<p>If an attorney tricked a judge into signing an order that forced you to destroy evidence, this is a severe violation known as <strong>Abuse of Process</strong> and <strong>Fraud on the Court</strong>.</p>
<p>Below are the most relevant legal concepts and cases that match this behavior.</p>
<h3 id="heading-1-the-trojan-horse-restraining-order-abuse-of-process">1. The "Trojan Horse" Restraining Order (Abuse of Process)</h3>
<p>This occurs when an attorney uses a legal tool (like a restraining order) for an illegal purpose (destroying evidence).</p>
<ul>
<li><strong>Case Concept:</strong> <em>Nienstedt v. Wetzel</em> (Arizona) / <em>General Abuse of Process</em></li>
</ul>
<ul>
<li><p><strong>The Scheme:</strong> "Abuse of Process" is a specific legal claim where you argue that the attorney used a court process (like a TRO) for an "ulterior purpose" not intended by law.</p>
</li>
<li><p><strong>Application to You:</strong> If an attorney obtained a TRO claiming "harassment" but slipped in a clause ordering you to "delete all communications," and their <em>real</em> goal was to destroy evidence for a different lawsuit, they have committed Abuse of Process.</p>
</li>
<li><p><strong>Relevant Law:</strong> <strong>Federal Rule 65 (Injunctions)</strong> requires that orders be specific and generally <em>preserve</em> the status quo, not destroy it. An order requiring deletion of potential evidence is often facially invalid because it violates the duty to preserve evidence (Spoliation).</p>
</li>
</ul>
<h3 id="heading-2-fraud-on-the-court-lying-to-get-the-order">2. Fraud on the Court (Lying to Get the Order)</h3>
<p>If the attorney knew their client was lying to get this order, the order is void.</p>
<ul>
<li><strong>Case: <em>Commissioner of Probation v. Adams</em> (Massachusetts)</strong></li>
</ul>
<ul>
<li><p><strong>The Facts:</strong> A plaintiff obtained a restraining order based on an affidavit full of lies.</p>
</li>
<li><p><strong>The Outcome:</strong> The court not only vacated the order but ruled it was <strong>"Fraud on the Court."</strong> This is a higher standard than simple perjury; it means the lawyer and client corrupted the judicial process itself.</p>
</li>
<li><p><strong>Why it matters:</strong> If you can prove the attorney knew the affidavit was false (e.g., they knew you weren't "harassing" the client but were actually just possessing evidence against them), you can move to have the order <strong>vacated and expunged</strong> based on this precedent.</p>
</li>
</ul>
<h3 id="heading-3-spoliation-of-evidence-the-deletion-trap">3. Spoliation of Evidence (The "Deletion" Trap)</h3>
<p>If an attorney forces you to delete evidence, they are triggering "spoliation."</p>
<ul>
<li><strong>Case: <em>Ennis-Flint, Inc. v. Greer</em> (North Carolina)</strong></li>
</ul>
<ul>
<li><p><strong>The Facts:</strong> In this case, a defendant deleted files <em>after</em> a TRO was issued (which is the reverse of your situation), but the judge's ruling is key. The judge ruled that <strong>spoliation (destruction) of evidence is an admission of guilt.</strong></p>
</li>
<li><p><strong>The Argument for You:</strong> If an opposing attorney obtained an order forcing you to delete data, they have effectively <strong>forced spoliation</strong>. You can argue in the main lawsuit that:</p>
</li>
</ul>
<ol>
<li><p>The attorney <em>caused</em> the loss of evidence.</p>
</li>
<li><p>Therefore, the court should assume that evidence was damning to their client (Adverse Inference).</p>
</li>
</ol>
<ul>
<li><strong>Case: <em>Jones v. Riot Hospitality Group</em> (9th Circuit)</strong></li>
</ul>
<ul>
<li><strong>The Ruling:</strong> The court affirmed that intentional destruction of text messages/evidence leads to <strong>dismissal of the case</strong>. If an attorney used a TRO to <em>make</em> you do this, they are arguably conspiring to obstruct justice.</li>
</ul>
<h3 id="heading-4-mandatory-vs-prohibitory-injunctions">4. Mandatory vs. Prohibitory Injunctions</h3>
<p>This is the technical legal argument you need to look for in your order.</p>
<ul>
<li><p><strong>Prohibitory Injunction:</strong> "Do not contact the plaintiff." (Standard)</p>
</li>
<li><p><strong>Mandatory Injunction:</strong> "Delete all emails from your hard drive." (Rare and Suspect)</p>
</li>
<li><p><strong>The Rule:</strong> Courts are extremely hesitant to grant <em>mandatory</em> injunctions (ordering you to <em>act</em>) without a full trial. If an attorney slipped a "mandatory" deletion clause into an <em>ex parte</em> (emergency) hearing where you weren't present, they likely violated due process.</p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[Find me legal cases about an attorney client committing perjury and being manipulative to the court system, especially if they were withholding facts]]></title><description><![CDATA[Having a conversation with Google Gemini and asked if the following question
Find me legal cases about an attorney client committing perjury and being manipulative to the court system, especially if they were withholding facts as evidence
Also show m...]]></description><link>https://exegy.today/find-me-legal-cases-about-an-attorney-client-committing-perjury-and-being-manipulative-to-the-court-system-especially-if-they-were-withholding-facts</link><guid isPermaLink="true">https://exegy.today/find-me-legal-cases-about-an-attorney-client-committing-perjury-and-being-manipulative-to-the-court-system-especially-if-they-were-withholding-facts</guid><category><![CDATA[Fraud on the court]]></category><category><![CDATA[Candor Toward the Tribunal]]></category><category><![CDATA[Exegy]]></category><category><![CDATA[Carmody MacDonald P.C.]]></category><category><![CDATA[lies]]></category><category><![CDATA[Fake affidavit ]]></category><category><![CDATA[Cooley LLP]]></category><category><![CDATA[David Taylor]]></category><category><![CDATA[Manipulations]]></category><category><![CDATA[Google]]></category><category><![CDATA[google gemini]]></category><dc:creator><![CDATA[Justin Walters]]></dc:creator><pubDate>Sat, 29 Nov 2025 18:51:37 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1764442175330/941aec91-ad8b-45e5-8500-74713fe4771f.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Having a conversation with Google Gemini and asked if the following question</p>
<p>Find me legal cases about an attorney client committing perjury and being manipulative to the court system, especially if they were withholding facts as evidence</p>
<p>Also show me cases where an attorney was notified by defendant their client commit perjury and failed to do anything about it</p>
<p>Here are specific legal cases and outcomes concerning attorneys who use client lies (perjury) to obtain immediate restraining orders or Temporary Restraining Orders (TROs), and cases where they failed to act after being notified of the truth.</p>
<h3 id="heading-1-cases-using-lies-amp-false-affidavits-to-get-restraining-orders">1. Cases: Using Lies &amp; False Affidavits to Get Restraining Orders</h3>
<p>These cases involve attorneys who were disciplined or orders that were vacated because they relied on false affidavits or "fraud on the court" to secure an immediate protective order.</p>
<h4 id="heading-in-re-petition-for-disciplinary-action-against-joseph-kaminsky-minnesota-supreme-court-2024">In re Petition for Disciplinary Action against Joseph Kaminsky (Minnesota Supreme Court, 2024)</h4>
<p>This is a very recent and "bullseye" case regarding your request about false affidavits in a restraining order context.</p>
<ul>
<li><p><strong>The Scheme:</strong> The attorney (Kaminsky) represented a client seeking a Harassment Restraining Order (HRO). To get the order, he needed to prove the defendant was served with papers. His office filed an <strong>affidavit of service</strong> claiming the defendant was personally served at a specific time and place.</p>
</li>
<li><p><strong>The Lie:</strong> The defendant was <em>not</em> served; the affidavit was false. The attorney filed it anyway to push the order through.</p>
</li>
<li><p><strong>The Attorney's Failure:</strong> Even after issues with the address and service were brought to light, the attorney did not investigate or correct the record. He allowed the false affidavit to stand to maintain the legal advantage.</p>
</li>
<li><p><strong>Outcome:</strong> The attorney was <strong>suspended indefinitely</strong> (minimum 9 months) for filing the false affidavit and failing to supervise his staff/verify the truth. The court emphasized that filing false documents to "get around notice requirements" is a grave injustice.</p>
</li>
</ul>
<h4 id="heading-commissioner-of-probation-v-adams-massachusetts">Commissioner of Probation v. Adams (Massachusetts)</h4>
<p>This case is often cited regarding vacating restraining orders due to perjury.</p>
<ul>
<li><p><strong>The Scheme:</strong> A plaintiff obtained a Chapter 209A abuse prevention order (restraining order) against a defendant.</p>
</li>
<li><p><strong>The Lie:</strong> The court found the plaintiff made <strong>19 separate false and perjurious allegations</strong> in the affidavit used to get the order.</p>
</li>
<li><p><strong>Outcome:</strong> The court ruled this constituted "fraud on the court." Unlike a simple "he said/she said" dispute, this was a systematic attempt to deceive the judge. The restraining order was <strong>vacated and expunged</strong> (removed from the record) entirely.</p>
</li>
</ul>
<hr />
<h3 id="heading-2-cases-attorney-notified-of-perjury-amp-failed-to-act">2. Cases: Attorney Notified of Perjury &amp; Failed to Act</h3>
<p>These cases address your second request: situations where the "defendant" (or opposing counsel) notified the attorney that their client was lying, and the attorney ignored it.</p>
<h4 id="heading-the-safe-harbor-failure-rule-11-sanctions">The "Safe Harbor" Failure (Rule 11 Sanctions)</h4>
<p>While not always a named "famous" case, this scenario frequently plays out under <strong>Federal Rule of Civil Procedure 11</strong> (and state equivalents).</p>
<ul>
<li><p><strong>The Scenario:</strong> You (the defendant) serve the opposing attorney with a motion (often called a "Rule 11 Motion") listing specific lies in their affidavit. You give them 21 days (the "safe harbor" period) to withdraw the false filing.</p>
</li>
<li><p><strong>The Failure:</strong> If the attorney refuses to withdraw the filing after being notified of the proof it is false, they become personally liable.</p>
</li>
<li><p><strong>Outcome:</strong> Courts then sanction the <em>attorney</em> personally, making them pay the defendant's legal fees.</p>
</li>
<li><p><em>Example:</em> <strong>Rickley v. Goodfriend (California)</strong>. The court sanctioned attorneys for filing false declarations and engaging in discovery abuses, ruling that they could not hide behind their client's instructions when they knew (or should have known) the facts were untrue.</p>
</li>
</ul>
<h4 id="heading-matter-of-filosa-new-jersey-massachusetts-2013">Matter of Filosa (New Jersey / Massachusetts, 2013)</h4>
<ul>
<li><p><strong>The Lie:</strong> An attorney represented a client in a matter where they concealed evidence and made false statements of material fact to the tribunal.</p>
</li>
<li><p><strong>The Notification:</strong> The attorney was aware (or was made aware by the circumstances) that the evidence he was presenting was false/incomplete, effectively hiding assets/facts.</p>
</li>
<li><p><strong>Outcome:</strong> He was suspended for <strong>one year</strong>. The court cited <strong>Rule 3.3 (Candor Toward the Tribunal)</strong>, stating a lawyer "shall not knowingly offer evidence that the lawyer knows to be false."</p>
</li>
</ul>
<h3 id="heading-what-to-look-for-legal-terminology">What to Look For (Legal Terminology)</h3>
<p>If you are looking for cases similar to your situation to show a lawyer or judge, search for these specific legal terms:</p>
<ol>
<li><p><strong>"Fraud on the Court":</strong> This is a higher standard than just "lying." It means the perjury was so severe it corrupted the judicial process (common in vacating false restraining orders).</p>
</li>
<li><p><strong>"Subornation of Perjury":</strong> When an attorney induces or allows their client to lie.</p>
</li>
<li><p><strong>"Ex Parte Duty of Candor":</strong> Attorneys have a <em>higher</em> duty of honesty when applying for immediate restraining orders (ex parte) because the other side isn't there to defend themselves. If they withhold facts here, sanctions are much more likely.</p>
</li>
</ol>
]]></content:encoded></item><item><title><![CDATA[I Believe Exegy and Cooley LLP Offers Were Nothing But a Phantom Offer and Possibly Leading Me On]]></title><description><![CDATA[I have been doing some research on Google Gemini and learning more about these offers attorneys can send out and think it is interesting how attorneys feel they can stay protected behind them.
Some of the things I have come across are the following
W...]]></description><link>https://exegy.today/i-believe-exegy-and-cooley-llp-offers-were-nothing-but-a-phantom-offer-and-possibly-leading-me-on</link><guid isPermaLink="true">https://exegy.today/i-believe-exegy-and-cooley-llp-offers-were-nothing-but-a-phantom-offer-and-possibly-leading-me-on</guid><category><![CDATA[Phantom Offer]]></category><category><![CDATA[Sham Negotiation ]]></category><category><![CDATA[Bad Faith Negotiation]]></category><category><![CDATA[Attorneys' Title Insurance Fund, Inc. v. Gorka]]></category><category><![CDATA[​Dryden v. Pedemonti (Florida Appellate Court)]]></category><category><![CDATA[​State Farm Florida Ins. Co. v. Laughlin-Alonso (Florida Appellate Court)]]></category><category><![CDATA[Exegy]]></category><category><![CDATA[Cooley LLP]]></category><dc:creator><![CDATA[Justin Walters]]></dc:creator><pubDate>Thu, 27 Nov 2025 20:17:37 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1764274289131/1130b9df-f20f-497e-9dfd-b19f8d3b3013.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I have been doing some research on Google Gemini and learning more about these offers attorneys can send out and think it is interesting how attorneys feel they can stay protected behind them.</p>
<h3 id="heading-some-of-the-things-i-have-come-across-are-the-following">Some of the things I have come across are the following</h3>
<p>When an attorney presents a settlement offer that does not actually exist or has no backing from their client—often to buy time, harass, or mislead a third party—it is generally referred to as "Bad Faith Negotiation" or "Sham Negotiation.”</p>
<ul>
<li><p>​Material Misrepresentation (Model Rule 4.1): Under the American Bar Association (ABA) Model Rules, attorneys are allowed to use "puffery" (e.g., "My client won't take a penny less than X"). However, they are strictly prohibited from lying about material facts, such as the existence of a settlement authority or a specific document that doesn't exist.</p>
</li>
<li><p>​Tortious Interference: If the fake offer was designed to "lead on" a third party (like a creditor, a potential buyer of a business, or another litigant) and disrupts that third party's business dealings, it is called tortious interference with prospective economic advantage.</p>
</li>
<li><p>​Abuse of Process: This applies if the fake offer was part of a legal strategy used for an improper purpose—such as dragging out litigation to bleed the other side dry financially, rather than to actually resolve the case.</p>
</li>
</ul>
<p>Here is an interesting case in Florida about a “Phantom Offer” and I believe it clearly shows the same thing Cooley LLP was doing by making me an offer that is impossible to accept.</p>
<p>The "Phantom Offer" (Attorneys' Title Insurance Fund, Inc. v. Gorka):</p>
<ul>
<li>In Florida, the Supreme Court discussed the concept of a "phantom offer" in the context of settlement proposals. They found that a settlement offer conditioned in a way that made it impossible to actually accept (effectively a fake offer designed to trigger fee-shifting statutes) was invalid and unenforceable.</li>
</ul>
<p>Cooley LLP was trying to do the same thing to me, because they knew the offer they were trying to push on me would keep my intellectual property safe from theft and the fact they would never respond to my requests for what posts needed to be removed or allow me to see any agreements that needed to be signed.</p>
<p>Emails between Kristen Mathews and I</p>
<ul>
<li><a target="_blank" href="https://drive.google.com/file/d/1yXt44zlDfR9v9v733bMNR12v4x_w6o8p/view?usp=drivesdk">https://drive.google.com/file/d/1yXt44zlDfR9v9v733bMNR12v4x_w6o8p/view?usp=drivesdk</a></li>
</ul>
<p>You can clearly see in the following emails where I was corresponding with Kristen Mathews on this offer.</p>
<p>On Sun, Feb 23, 2025 at 11:30 AM I stated the following</p>
<ul>
<li>Though your current process for how you’re wanting to handle these disclosures does not keep my personal and intellectual property safe from theft, as Exegy could easily turn around and say they are not interested and privately open bugs on the issues in Jira. Which is a private and closed off system from the public, so I wouldn’t ever know.</li>
</ul>
<p>She never replied back regarding it but tried pushing another offer with a different up front initial payment.</p>
<p>You can see that email from her on Feb 24, 2025 at 10:29 PM</p>
<ul>
<li>In the meantime, however, Exegy does want to prioritize your findings, and in recognition of your patience with this process, Exegy is willing to offer you an initial, upfront payment of $2,000 in exchange for a limited explanation from you regarding the potential vulnerabilities of Exegy’s system, as well as a confidentiality agreement.</li>
</ul>
<p>I have already given Exegy a limited explanation of my disclosures previously, it seems like they wanted as much detail as possible about what it was regarding and by giving them that much information, a confidentiality agreement would not be efficient enough to keep my property safe or were there any terms in offer to safeguard my property.</p>
<p>Their attempts to push such an offer didn't stop here, on Mar 10, 2025 at 1:54 PM Robert “Bobby” Earles tried to push another offer that was completely different in a few ways.</p>
<p>Emails between Robert Earles and I</p>
<ul>
<li><a target="_blank" href="https://drive.google.com/file/d/16GfW2IPv02GTm9KiGhKcc03kuIBNQkbI/view?usp=drivesdk">https://drive.google.com/file/d/16GfW2IPv02GTm9KiGhKcc03kuIBNQkbI/view?usp=drivesdk</a></li>
</ul>
<p>Robert Earles offer</p>
<ul>
<li><a target="_blank" href="https://drive.google.com/file/d/12BStg9VYlh7rKgKNGIHjeso3Hi413Oy_/view?usp=drivesdk">https://drive.google.com/file/d/12BStg9VYlh7rKgKNGIHjeso3Hi413Oy_/view?usp=drivesdk</a></li>
</ul>
<p>Robert Earles was also trying to make it impossible for me to accept his offer, by removing the up front payment and not fully divulging what posts I need to take down and only specifying them by a date when LinkedIn doesn't give you this type of information on them.</p>
<p>He could have easily described those posts or sent copies of them with his offer, but for some reason he refrained from doing this.</p>
<p>You can see in his following letter be stated the following</p>
<ul>
<li>To be eligible for a bounty, Exegy does request that you remove your LinkedIn post of February 25, 2025. as well as your post of March 4, 2025.</li>
</ul>
<p>I believe these are the following posts he was referring too</p>
<ul>
<li><p><a target="_blank" href="https://drive.google.com/file/d/1SApndgjguw9NhZcGOWbgTcBHmhq5nCew/view?usp=drivesdk">https://drive.google.com/file/d/1SApndgjguw9NhZcGOWbgTcBHmhq5nCew/view?usp=drivesdk</a></p>
</li>
<li><p><a target="_blank" href="https://drive.google.com/file/d/1k8kXxIjBauX_ciBzWN6D6F1R6S2eG7Bk/view?usp=drivesdk">https://drive.google.com/file/d/1k8kXxIjBauX_ciBzWN6D6F1R6S2eG7Bk/view?usp=drivesdk</a></p>
</li>
</ul>
<p>You can clearly see in these posts, LinkedIn doesn't state any specific date on them. If the KnowBe4 post was one of the items they wanted to be removed from LinkedIn, they could have clearly stated they would like any entries regarding Exegy removed from it, since the post was not regarding them, but only included them.</p>
<p>On Mar 23, 2025 at 5:04 PM I responded back to the offer with the following question</p>
<ul>
<li>You also stated that I needed to remove the post on “February 25, 2025” and “March 4, 2025”, could you please give me details on what posts you are referring too? Also why would my post help support Exegy consideration with moving forward.</li>
</ul>
<p>Cooley LLP never responded to this question, almost like they knew I knew I wouldn't go for this and made it seem like they wanted me to start removing posts to be eligible for a response, since Robert Earles stated the following on his offer “To be eligible for a bounty”.</p>
<p>The one thing you will notice is that a couple of these offers never specified any pricing terms or range, making it impossible for me to accept them.</p>
<p>Even though they stated an up front payment on a couple of them, it didn't consist of any terms on it.</p>
<ul>
<li><p>They could have easily come back stating we found them of lower value of the up front payment and you owe us money.</p>
</li>
<li><p>They could have also stated to me they were not valid without proof requiring me to return that up front payment.</p>
</li>
</ul>
<p>In an email to Kristen Mathews on Feb 23, 2025 at 11:30 AM, you can clearly see I sent her copies of other companies' bounty programs pay out ranges, but it seemed they ignored these.</p>
<p>These offers sent to me by Cooley LLP made me believe they truly were never real.</p>
<ul>
<li><p>They could have sent me the confidentiality agreements to look over and be potentially signed if I agreed to it.</p>
</li>
<li><p>They were vague on the terms of them and could have responded to my requests for more of a description on items.</p>
</li>
<li><p>The offers didn't include any terms to keep my property safeguarded from being stolen.</p>
</li>
<li><p>They didn't add in any kind of range for the monetary payout if they were valid.</p>
</li>
<li><p>They didn't include any terms for the up front payment.</p>
</li>
<li><p>Never stated a turn around time when they would get back to me after evaluating my disclosures, meaning they could have spent months to years before returning to me.</p>
</li>
</ul>
<p>I believe these offers were nothing but a phantom offer to lead me on and were never real. They were impossible to even accept as a true valid offer, since they don't meet the criteria of being a real valid offer.</p>
<p>On Apr 7, 2025 at 6:09 AM, you can clearly see in my emails to Robert Earles that I asked Cooley LLP “Is Exegy and Cooley LLP still handling all of this or are you leading me on?”, but they would never respond.</p>
<p>They also weaponized this offer in a lawsuit against me, making the courts believe they gave me a real and valid offer that I declined. I never once declined any offer until they would never respond to any of my questions regarding it and if they were leading me on.</p>
<p>You can clearly see in David Taylor notarized affidavit he tried to use these offers by Cooley LLP to make the company look better.</p>
<p>David Taylor notarized affidavit</p>
<ul>
<li><a target="_blank" href="https://drive.google.com/file/d/17udsvLQF0V8XUnBuAYXZIFWx0gKqLZ2b/view?usp=drivesdk">https://drive.google.com/file/d/17udsvLQF0V8XUnBuAYXZIFWx0gKqLZ2b/view?usp=drivesdk</a></li>
</ul>
<p>Items the specified on his affidavit</p>
<ul>
<li><p>36. Nonetheless, my colleagues and I took seriously the possibility of vulnerabilities in our systems. Exegy thus planned to offer Mr. Walters a payment after he had confidentially disclosed the vulnerability, and we had the chance to vet the claim. This planned structure—by which individuals submit reports to a company, who in turn review the report and offer a reward only if the report identifies a bona fide vulnerability—mirrors the approach of formal “bug bounty” programs that I understand to be used in the industry.</p>
</li>
<li><p>43. On February 13, 2025, we sent Mr. Walters an offer to discuss the alleged vulnerability and a possible bounty, regardless of our lack of a formal program. Mr. Walters, rather than work towards a compromise, claimed that our resistance to his own extortionate attempts somehow constituted extortion in turn.</p>
</li>
<li><p>45. Despite this, we continued to make reasonable efforts to resolve the situation with Mr. Walters, once again going above and beyond the industry standard to offer an upfront fee for information necessary to determine whether a vulnerability existed, with an additional reward, priced from the industry standard, contingent on those findings. I also expressed a willingness to create a formal “bug bounty” program.</p>
</li>
</ul>
<p>You can also see they used these offers on a Memo in Support of TRO</p>
<p>You can see the Memo in Support of TRO here</p>
<ul>
<li><a target="_blank" href="https://drive.google.com/file/d/1kXK8Trtp8o1prwncsJbofRJ619763YAS/view?usp=drivesdk">https://drive.google.com/file/d/1kXK8Trtp8o1prwncsJbofRJ619763YAS/view?usp=drivesdk</a></li>
</ul>
<p>One of the items they stated on it was</p>
<ul>
<li>To put the situation to rest and protect its network in the event there was some basis to Plaintiff’s claims, Exegy tried to mollify Defendant. On February 13, 2025, Exegy sent Defendant an offer to discuss the alleged vulnerability and a possible bounty, notwithstanding that Exegy had no formal bounty program. Id. at ¶ 43.</li>
</ul>
<p>You can clearly see they tried to use these offer as a way to work out disclosing the vulnerabilities to make the company look better and never disclosing the facts above.</p>
<p>You will also see that they never stated to the court how they removed the up front fee and talk about each of the different offers they tried to give me and made it seem like there was only one offer.</p>
<p>Things I do wonder what this offer</p>
<ul>
<li><p>Were they leading me on and making it impossible to accept it so they can tell their customers they could not work out a deal</p>
</li>
<li><p>Were they leading me on for some other reason</p>
</li>
<li><p>Were they hoping to lock me into it to steal my property, but knew that wouldn't be possible,  since I pointed that out.</p>
</li>
<li><p>Was they always planning to sue me and use this offer as a way to make them look like they tried to make an offer? This actually eventually did this as seen in the lawsuit.</p>
</li>
</ul>
<p>They did eventually try a different tactic by stating there would now be a bounty program that would be up Q3 and they would never return any response about if this happened.</p>
<p>It does make me wonder what they have said to their customers about all of this and what kinds of things have they communicated if thry have.</p>
<p>You can see here in the following emails I asked about the Q4 bounty program in Q3 but never received a response.</p>
<ul>
<li><a target="_blank" href="https://drive.google.com/file/d/1wXM8zk_SXeFaKe3vHjOJR-6DURX70375/view?usp=drivesdk">https://drive.google.com/file/d/1wXM8zk_SXeFaKe3vHjOJR-6DURX70375/view?usp=drivesdk</a></li>
</ul>
<p>A couple of other interesting cases regarding this matter, that could potentially be a result of this offer.</p>
<h3 id="heading-state-farm-florida-ins-co-v-laughlin-alonso-florida-appellate-court"><strong>​State Farm Florida Ins. Co. v. Laughlin-Alonso (Florida Appellate Court)</strong></h3>
<ul>
<li>​The "Sham" Offer: State Farm offered a nominal amount ($250) to settle a substantial homeowner's insurance claim. The plaintiff argued this was a bad-faith "sham" offer made solely to set up a claim for attorney's fees later.</li>
</ul>
<p>The offer from Exegy and Cooley LLP did not consist of any terms about disclosing my findings to them. They could have easily felt like I violated some contract by knowing this information and filed a fictitious civil lawsuit against me.</p>
<h3 id="heading-dryden-v-pedemonti-florida-appellate-court"><strong>​Dryden v. Pedemonti (Florida Appellate Court)</strong></h3>
<ul>
<li><p>​The "Sham" Offer: The defendant made an offer that required the plaintiff to execute a "full and complete release and satisfaction," but the attorney did not attach the release or summarize its specific terms.</p>
</li>
<li><p>​Why it was Invalid: The court struck the offer down as a "phantom" offer because the plaintiff could not know what rights they were giving up. The court ruled that the burden of clarifying the terms cannot be placed on the party receiving the offer.</p>
</li>
</ul>
<p>There was never any terms or confidentiality agreement for me to see what rights I could have been signing away.</p>
<h3 id="heading-summary-of-tactics-to-watch-for">Summary of Tactics to Watch For</h3>
<p>​If you are looking for case law regarding a specific type of "sham" offer, look for these keywords in your jurisdiction:</p>
<ul>
<li><p>​"Illusory Promise": An offer where the offeror retains an "out" or the benefit is vague.</p>
</li>
<li><p>​"Conditioned on Mutual Acceptance": The specific Gorka defect.</p>
</li>
<li><p>​"Patent Ambiguity": When the terms (like a release) are missing or unclear.</p>
</li>
<li><p>​"Bad Faith Nominal Offer": An offer of $1-$100 made when there is clear liability.</p>
</li>
</ul>
<p>Updated on 11/282025 @ 4:44PM</p>
<p>● Added more details and fixed some spelling issues.</p>
]]></content:encoded></item><item><title><![CDATA[Where is the world going if everyone feels threatened over nothing at all…]]></title><description><![CDATA[So I have been thinking about how Exegy felt threatened by me reaching out to their customers to see if they have a bounty program for their outside vendors and disclose discoveries to them.
Sure they hate having their customers be aware of their sec...]]></description><link>https://exegy.today/where-is-the-world-going-if-everyone-feels-threatened-over-nothing-at-all</link><guid isPermaLink="true">https://exegy.today/where-is-the-world-going-if-everyone-feels-threatened-over-nothing-at-all</guid><category><![CDATA[Security issues ]]></category><category><![CDATA[security-researchers]]></category><category><![CDATA[Regulations]]></category><category><![CDATA[reputation]]></category><category><![CDATA[risk management]]></category><category><![CDATA[Exegy]]></category><category><![CDATA[legal framework]]></category><dc:creator><![CDATA[Justin Walters]]></dc:creator><pubDate>Tue, 25 Nov 2025 22:32:46 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1764109832300/63b9e273-63b9-4d7a-9930-6e84b30a9734.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>So I have been thinking about how Exegy felt threatened by me reaching out to their customers to see if they have a bounty program for their outside vendors and disclose discoveries to them.</p>
<p>Sure they hate having their customers be aware of their security issues and the amount of time and resources they will have to use to fix them, but at the same time it helps build a more secure environment for them.</p>
<p>If a customer has to wait for a company to disclose those flaws and vulnerabilities to them, how can they ever prepare and design some kind of risk management for potential issues that could affect their own business.</p>
<p>It does make me wonder if anything was ever disclosed to Exegy, what kind of precautions do they have in place for telling their customers how they should deal with any such issues being disclosed to them until they have a fix or the types of things they should monitor.</p>
<p>Do they just inform them and hope those potential issues just don’t happen… or do they design a plan for how they can take precautions. What if they have a bad actor in their own company that might see those issues and use them for their own mental or monetary gain.</p>
<p>I do not see issues with a company's customers being informed of potential issues their vendors might have, it helps them get ahead of the curve before a potential disaster could strike.</p>
<p>Sure the company might not like the reputation it could bring, but that is only because they don't know how to handle the matter professionally.</p>
<p>Look at Microsoft… They have tons of bugs and issues at times and no one really cares. That's because they try their best at being professional about them and laugh at the jokes people pass around.</p>
<p>Would Exegy get mad if someone reached out to them about flaws regarding their firewalls or would they reach out to their vendor to see if it was disclosed or if it needed to be reported, who knows because I tried to talk about KnowBe4 issues they pushed me off to Mitire when KnowBe4 wouldn't help.</p>
<p>This whole situation between Exegy and I has taught me a lot about the legal landscape a security researcher should actually use, but at the same time it showed me that depending on the type of sector a business is in, it could potentially cause more harm to them and who really wants to do that.</p>
<p>This is all due to fines and penalties that can be pushed on top of them, even though they should have been aware of that from the beginning.</p>
<p>The landscape has changed drastically over the years and things have changed. I believe companies should be required to be fully transparent with bugs and issues with one another when it comes to being part of the critical infrastructure, this way we can keep each other aware of potential security issues.</p>
<p>If you are scared about this and can't stand the jokes and reputation it could bring your company,  then obviously you don't care enough about your product to make your consumers feel safe and secure.</p>
<p>Obviously there is no agency that checks if a company is setting the right policies and security in place when being part of it. It only seems to warrant investigating a company when Whistleblowers speak out about it.</p>
<p>Who actually wins from that, just the government agencies that demand the company pay in fines, when really that money could of benefits company instead.</p>
<p>Why should any company get harmed in this way, you almost think there should be some agency that does periodical checks every so many years for certain types of companies, because maybe they aren't even fully aware of the evolving legal framework and regulations that get pushed out every so often.</p>
<p>Where is the world going if everyone feels threatened over nothing at all…</p>
]]></content:encoded></item><item><title><![CDATA[Interesting case about Hobbs Act and Sham Litigation - United States v. Koziol (9th Cir. 2021)]]></title><description><![CDATA[I came across this case while corresponding back and forth with Google Gemini and it brought it to my attention.
I thought it was interesting, but first let's look at Exegy in-house counsel Patrick Sellers email and extortion letter.
You can see my p...]]></description><link>https://exegy.today/interesting-case-about-hobbs-act-and-sham-litigation-united-states-v-koziol-9th-cir-2021</link><guid isPermaLink="true">https://exegy.today/interesting-case-about-hobbs-act-and-sham-litigation-united-states-v-koziol-9th-cir-2021</guid><category><![CDATA[United States v. Koziol ]]></category><category><![CDATA[United States v. Avenatti]]></category><category><![CDATA[Sham litigation ]]></category><category><![CDATA[Exegy]]></category><category><![CDATA[Cooley LLP]]></category><category><![CDATA[Hobbs act]]></category><category><![CDATA[extortion]]></category><category><![CDATA[Wire fraud]]></category><dc:creator><![CDATA[Justin Walters]]></dc:creator><pubDate>Tue, 25 Nov 2025 06:10:03 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1764050905574/85ff6452-41f0-4683-b8f4-66d93d6e8384.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I came across this case while corresponding back and forth with Google Gemini and it brought it to my attention.</p>
<p>I thought it was interesting, but first let's look at Exegy in-house counsel Patrick Sellers email and extortion letter.</p>
<p>You can see my previous email here that led up to this.</p>
<ul>
<li><a target="_blank" href="https://drive.google.com/file/d/1UbyJxLkQvCxw2GRQOJhvDEXT8y2vnUo6/view?usp=drivesdk">https://drive.google.com/file/d/1UbyJxLkQvCxw2GRQOJhvDEXT8y2vnUo6/view?usp=drivesdk</a></li>
</ul>
<p>You can see Patrick Sellers extortion letter here with our correspondence between each other here</p>
<ul>
<li><p><a target="_blank" href="https://drive.google.com/file/d/1d4zSKzUXsSfNhhwZ6aJGFLXUF-GIGBca/view?usp=drivesdk">https://drive.google.com/file/d/1d4zSKzUXsSfNhhwZ6aJGFLXUF-GIGBca/view?usp=drivesdk</a></p>
</li>
<li><p><a target="_blank" href="https://drive.google.com/file/d/1k8khohlbsCTLHKcQ8sdiBM_TlgDHSqw6/view?usp=drivesdk">https://drive.google.com/file/d/1k8khohlbsCTLHKcQ8sdiBM_TlgDHSqw6/view?usp=drivesdk</a></p>
</li>
</ul>
<p>You can clearly see in Patrick Sellers letter that he makes false claims by stating I was making threats and demanding payment,  since he stated the following in it</p>
<ul>
<li>Threatening Exegy’s business and disclosure of the purported Vulnerabilties to Exegy’s customers if the Company does not respond to your threats and demands for payment is textbook extortion.</li>
</ul>
<p>If you look over what I stated on February 7, I stated the following</p>
<ul>
<li><p>I know people can have a lot going on and it hard to find the time to get back to someone when you are busy, but think it interesting how I can't even get a single response about wanting to talk about disclosing vulnerability in your network and architect that have a high potential for affecting your customer, which i thought is required and important to disclosing to them.</p>
</li>
<li><p>I would like to talk, if not I will move to trying to talk with your customers and seeing if they have a bounty program and give me time about the things that could affect their network.</p>
</li>
</ul>
<p>You can clearly see I never made any threats or demands for payment. I was only saying if they wouldn't give me any time to talk, I would move on to trying to talk to their customers and see if they had a bounty program.</p>
<p>Exegy is aware that they are required to report all vulnerabilities and flaws to their customers and possibly any Exchanges depending on the circumstances, so there really shouldn't be any problem with someone reaching out to their customers or SEC about possible concerns on things that can affect their network or the stock market.</p>
<p>There are many acts out there to protect people and Whistleblowers, Exegy and their in-house counsel should be fully aware of this.</p>
<p>As you look further on in Patrick Sellers extortion letter you will clearly see where he threatens me. He basically stated he will contact the FBI immediately and seek civil remedies unless I turn over everything in a matter of hours</p>
<ul>
<li><p>If you do not respond to this letter before 6:00 p.m. Central Time today, 7 February 2025, with all information necessary for Exegy to identify, assess, and, if necessary, remedy the Vulnerabilities, Exegy will immediately contact the FBI about your Emails and violation of the CFAA. Exegy will also seek all available civil remedies against you under state and federal law.</p>
</li>
<li><p>If Exegy determines, at any time and in its sole discretion, that you are not providing your best efforts to cooperate with any evaluation or remedy or other efforts related to the Vulnerabilties, Exegy will refer this matter to the FBI and seek all available civil remedies against you under state and federal law.</p>
</li>
</ul>
<p>This is clearly text book extortion by Exegy…</p>
<p>It's too long to post it all here, but on February 7 you can clearly see I replied back to Patrick Sellers as soon as possible since he demanded I respond back in a matter of hours with everything I have or I will face his threats.</p>
<p>I tried explaining to him that I had nothing belonging to Exegy at all and none of it was their proprietary property.</p>
<p>He turned around and replied back that he will be following through with his threats, which you can see here</p>
<ul>
<li><p>I interpret your response below to be a refusal to disclose the alleged vulnerability you referenced in your emails to Exegy on 29 January, 4 February, and 7 February 2025. That is unfortunate.</p>
</li>
<li><p>Exegy will proceed to take action as described in the letter sent earlier today.</p>
</li>
</ul>
<p>You can clearly see he stated he was following through with his threats  to immediately contact the FBI and seek civil remedies against me.</p>
<p>I found this really interesting and unsure if he followed through with his threat at this time, since they never notified or let me know if they did.</p>
<p>Though after I stated to him I was going to sue Exegy he replied back with “We are continuing to review this matter internally and will be in touch later this week.”</p>
<p>This is when Cooley LLP came into play with all of this, which seemed like a way to conceal their extortion attempt and work with me by trying to make an offer.</p>
<p>It wasn't until February 17 I found out Exegy never followed through with their threat, since Kristen Mathews from Cooley LLP stated to me “they do not plan to make a report with the law enforcement” . You can see that in the following set of emails</p>
<ul>
<li><a target="_blank" href="https://drive.google.com/file/d/1yXt44zlDfR9v9v733bMNR12v4x_w6o8p/view?usp=drivesdk">https://drive.google.com/file/d/1yXt44zlDfR9v9v733bMNR12v4x_w6o8p/view?usp=drivesdk</a></li>
</ul>
<p>This shows Patrick Seller committed wire fraud by never actually pursuing with immediately contacting the FBI and seeking all available civil remedies against me under state and federal law like he stated through his electronic communications by email.</p>
<p>There probably more areas in which he is lying, like telling me that I am being the extortionist and the things I have violated</p>
<p>A case I want to look up on about Extortion that includes Wire Fraud is United States v. Avenatti. It showed that if you use deceit (lying to a client/victim) alongside the threat (shakedown), you can be convicted of both crimes simultaneously.</p>
<p>This case below really illustrates how sham litigation is illegal and what Patrick Sellers is doing looks like it falls under the Hobbs Act, especially with him being in Illinois and the other parties who are CC on the Extortion letter are in Missouri and possibly one other state.</p>
<p>Exegy obviously knew they had no lawful claim to my property, since they tried to conceal their extortion attempt with an outside attorney and have them try to work out an offer with me.</p>
<p>The lawsuit they eventually filed against is not seeking access to my property or information regarding it. This shows Exegy was lying when they stated they would seek civil remedies against me.</p>
<p>Obviously my property has monetary value, because the SEC would put penalties on my discoveries and bug bounties programs exists that also put a value on such property. Even though Exegy has shown they are unaware of what these values are, because they wouldn't ever work with me to feel fully protected to full disclose them without being robbed of my property.</p>
<p>Another interesting case that shows you cannot use the threat of reporting someone to the authorities as an attempt to gain money and possibly property through an attorney was <strong>Flatley v. Mauro and Mendoza v. Hamzeh</strong></p>
<p>​Flatley v. Mauro (California Supreme Court, 2006)</p>
<ul>
<li><p>​Reporting Crimes vs. Getting Paid: You can report a crime, or you can sue for civil damages. You generally cannot say, "Pay me $100,000 or I will report this crime." That "linkage" converts the demand into extortion.</p>
</li>
<li><p>​Unrelated Threats: Threatening to expose secrets or crimes unrelated to the dispute (like the immigration/tax issues in this case) is strong evidence of extortion.</p>
</li>
<li><p>​No "Litigation Privilege" for Crime: While attorneys usually have "litigation privilege" protecting them from defamation suits for what they say in court or demand letters, Flatley v. Mauro established that this privilege does not protect conduct that is conclusively illegal (extortion).</p>
</li>
</ul>
<p>Mendoza v. Hamzeh (California Court of Appeals, 2013)</p>
<ul>
<li><p>​The Situation: Attorney Hamzeh sent a letter to a former manager of his client's business. The letter claimed the manager had committed fraud and theft. It stated, "If you do not pay us $75,000, we will proceed with filing a civil complaint and report you to the District Attorney and the IRS."</p>
</li>
<li><p>​The Outcome: The court found this to be "civil extortion." Because the attorney explicitly linked the payment of money to silence regarding criminal/tax authorities, it was illegal.</p>
</li>
</ul>
<p>You can clearly see from Patrick Sellers DEMAND letter he used this type of scenario and language in hopes of receiving my property of monetary value.</p>
<p>Still trying to research more on this, but maybe some attorney out there would be interested in showing me more cases or talking about this one.</p>
<p>I haven't actually looked or read through this at all but here something on the following case below</p>
<p><a target="_blank" href="https://cdn.ca9.uscourts.gov/datastore/opinions/2021/04/13/19-50018.pdf">https://cdn.ca9.uscourts.gov/datastore/opinions/2021/04/13/19-50018.pdf</a></p>
<p>I might have to do more research on this, because I am starting to wonder how much this lawsuit Exegy brought against me can compare to it as well.</p>
<h3 id="heading-case-summary-united-states-v-koziol-9th-cir-2021">Case Summary: <em>United States v. Koziol</em> (9th Cir. 2021)</h3>
<p><strong>Citation:</strong> <em>United States v. Koziol</em>, 993 F.3d 1160 (9th Cir.1 2021)</p>
<p>This case is a significant decision regarding the <strong>Hobbs Act</strong> (federal extortion law). It established that threatening to file a lawsuit can constitute criminal extortion if the threatened lawsuit is a "sham"—meaning it is objectively baseless and the threatener knows they have no lawful claim to the money they are demanding.</p>
<hr />
<h3 id="heading-1-what-was-it-about-the-facts">1. What was it about? (The Facts)</h3>
<p>The case centered on a scheme by the defendant, <strong>Benjamin Koziol</strong>, to extort money from a well-known celebrity (referred to in the opinion as "the Entertainer," identified in court documents as Andy Grammer) by threatening to file a lawsuit containing false sexual assault allegations.</p>
<ul>
<li><p><strong>The Incident:</strong> In 2016, Koziol's wife, a masseuse, was hired to give a massage to the Entertainer's <em>manager</em> at an apartment. The manager allegedly made unwanted advances, and Koziol (who was present in the apartment) confronted him.</p>
</li>
<li><p><strong>The Extortion Scheme:</strong> Although the incident involved the <em>manager</em>, Koziol later targeted the <em>Entertainer</em>, who was much wealthier and more famous.</p>
</li>
<li><p><strong>The Threat:</strong> Koziol demanded <strong>$1 million</strong> from the Entertainer. He threatened that if the money wasn't paid, he would file a lawsuit falsely accusing the Entertainer of sexually assaulting his wife and physically battering Koziol.</p>
</li>
<li><p><strong>The Fabrication:</strong> Koziol claimed to have photographic proof that the Entertainer was at the apartment. However, the photo he provided was actually taken a year <em>after</em> the alleged incident. Koziol knew the Entertainer was not the person involved but pursued the demand anyway.</p>
</li>
</ul>
<h3 id="heading-2-what-were-the-charges">2. What were the charges?</h3>
<p>Koziol was charged with and convicted of <strong>attempted extortion</strong> under the <strong>Hobbs Act (18 U.S.C. § 1951)</strong>.</p>
<ul>
<li><p><strong>The Hobbs Act</strong> prohibits obtaining property from another with their consent induced by the "wrongful use of actual or threatened force, violence, or fear."</p>
</li>
<li><p><strong>The Defense:</strong> Koziol argued that threatening to file a lawsuit is a constitutional right (protected by the First Amendment) and therefore cannot be "wrongful" under the statute, even if the lawsuit is frivolous.</p>
</li>
</ul>
<h3 id="heading-3-how-does-sham-litigation-fit-into-it">3. How does "Sham Litigation" fit into it?</h3>
<p>This is the most legally significant part of the case. The Ninth Circuit had to decide when a threat to sue crosses the line from aggressive legal negotiation to criminal extortion.</p>
<p>The court used the concept of <strong>sham litigation</strong> to draw this line.</p>
<ul>
<li><p><strong>The General Rule (Noerr-Pennington Doctrine):</strong> Under the First Amendment, people have a right to petition the government for redress of grievances, which includes filing lawsuits. Generally, you cannot be punished for threatening to sue someone, even if your case is weak.</p>
</li>
<li><p><strong>The "Sham" Exception:</strong> The court held that this protection <strong>does not apply</strong> to "sham litigation." It adopted a definition from antitrust law (<em>Professional Real Estate Investors, Inc. v. Columbia Pictures</em>), ruling that a litigation threat is "wrongful" (and thus extortionate) if it meets two criteria:</p>
</li>
</ul>
<ol>
<li><p><strong>Objectively Baseless:</strong> The lawsuit is so meritless that no reasonable litigant could realistically expect success on the merits.</p>
</li>
<li><p><strong>Subjectively Wrongful:</strong> The defendant knew the claim was baseless and used the threat solely to harass or extract money they knew they weren't entitled to.</p>
</li>
</ol>
<p>In Koziol's case:</p>
<p>The court found his threat was a "sham" because:</p>
<ul>
<li><p>It was <strong>objectively baseless</strong>: He knew the Entertainer wasn't the man who assaulted his wife.</p>
</li>
<li><p>It was <strong>subjectively wrongful</strong>: He fabricated evidence (the photo) and admitted to the FBI that he was just trying to get a "payday."</p>
</li>
</ul>
<p><strong>Key Takeaway:</strong> You can't be charged with extortion just for threatening a frivolous lawsuit. But if you <em>know</em> the lawsuit is a lie (a "sham") and use that threat to demand money you have no right to, it becomes a crime.</p>
<h3 id="heading-updated-this-at-152pm-cst-on-11252025">Updated this at 1:52PM CST on 11/25/2025</h3>
<p>● Added <strong>Flatley v. Mauro</strong></p>
<p>● Added <strong>Mendoza v. Hamzeh</strong></p>
]]></content:encoded></item><item><title><![CDATA[Transnational Legal Liability Assessment: Criminal and Civil Exposures for Breach of Vulnerability Disclosure Programs]]></title><description><![CDATA[Due to Exegy in-house attorney Patrick Sellers stating the following “companies are not obligated to pay bounties even if the report identifies a genuine issue;” on a submission to the Illinois ARDC, which you can see here under item g.ii
https://dri...]]></description><link>https://exegy.today/transnational-legal-liability-assessment-criminal-and-civil-exposures-for-breach-of-vulnerability-disclosure-programs</link><guid isPermaLink="true">https://exegy.today/transnational-legal-liability-assessment-criminal-and-civil-exposures-for-breach-of-vulnerability-disclosure-programs</guid><category><![CDATA[Saint Louis ]]></category><category><![CDATA[Exegy]]></category><category><![CDATA[fraud]]></category><category><![CDATA[Deceit ]]></category><category><![CDATA[bug bounty]]></category><category><![CDATA[Theft]]></category><category><![CDATA[Canada]]></category><category><![CDATA[paris]]></category><category><![CDATA[Belfast]]></category><category><![CDATA[Google]]></category><category><![CDATA[google gemini]]></category><dc:creator><![CDATA[Justin Walters]]></dc:creator><pubDate>Mon, 24 Nov 2025 20:51:55 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1764017395590/dcb0d51c-4377-486a-9589-e801dc5b8120.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Due to Exegy in-house attorney Patrick Sellers stating the following “companies are not obligated to pay bounties even if the report identifies a genuine issue;” on a submission to the Illinois ARDC, which you can see here under item <a target="_blank" href="http://g.ii">g.ii</a></p>
<p><a target="_blank" href="https://drive.google.com/file/d/17B8JkmewzqzgwdqltsR2ql5pW4nDUS7z/view?usp=drivesdk">https://drive.google.com/file/d/17B8JkmewzqzgwdqltsR2ql5pW4nDUS7z/view?usp=drivesdk</a></p>
<h2 id="heading-i-decided-to-ask-google-gemini-to-do-a-deep-research-on-the-following">I decided to ask Google Gemini to do a deep research on the following</h2>
<p>If a Delaware corporation in the USA that has a headquarters in Saint Louis, MO set up a bug bounty program for not just outside parties but also their own employees to use for helping disclose flaws and vulnerabilities in their system and code.</p>
<p>What kind of charges could the officers and the people involved in this bounty program be charged with in all the following countries and states they are in. If they believe they did not have to pay out on genuine bounties</p>
<p>Remember this is only about if the bounty submitted to them is genuine.</p>
<p>Missouri,  USA</p>
<p>New York, USA</p>
<p>Chicago, USA</p>
<p>Belfast,  Ireland</p>
<p>Paris, France</p>
<p>Montreal,  Canada</p>
<p>Makita, Philippines</p>
<h2 id="heading-google-gemini-deep-research-returned-the-following">Google Gemini Deep Research returned the following</h2>
<h2 id="heading-transnational-legal-liability-assessment-criminal-and-civil-exposures-for-breach-of-vulnerability-disclosure-programs">Transnational Legal Liability Assessment: Criminal and Civil Exposures for Breach of Vulnerability Disclosure Programs</h2>
<h2 id="heading-i-introduction-and-jurisprudential-framework">I. Introduction and Jurisprudential Framework</h2>
<h3 id="heading-the-unilateral-contract-model-in-cybersecurity">The Unilateral Contract Model in Cybersecurity</h3>
<p>The legal architecture of a "bug bounty" program—wherein a corporation invites external security researchers and internal employees to identify vulnerabilities in exchange for monetary compensation—rests fundamentally on the principles of the <strong>unilateral contract</strong>. Unlike bilateral contracts, which involve a mutual exchange of promises between parties (a promise for a promise), a unilateral contract consists of an offer that calls for acceptance through performance. In this context, the corporation (the offeror) publishes a vulnerability disclosure policy that acts as a standing offer to the world or a specific class of individuals. The terms are set: if a researcher (the offeree) successfully identifies a qualifying flaw and reports it according to the guidelines, the contract is formed and executed simultaneously.</p>
<p>Legal scholars and practitioners in the domain of digital contract law emphasize that the offeror in a unilateral contract can only breach the agreement after the offeree has performed. Once the researcher has invested the time—often hundreds of hours—and delivered the "consideration" (the vulnerability report), the corporation’s obligation to pay becomes absolute. The refusal to pay on a "genuine bounty"—a submission that meets the technical criteria of the program—transforms the issue from a mere operational decision into a breach of contract. However, when this refusal is predicated on a belief that payment is optional, or if the program was established with no intention of honoring valid claims, the liability transcends civil torts and enters the realm of criminal fraud, theft of services, and statutory wage theft.</p>
<h3 id="heading-the-authorization-paradox-and-the-cfaa">The "Authorization" Paradox and the CFAA</h3>
<p>A critical dimension of this legal landscape is the concept of "authorization" under statutes like the Computer Fraud and Abuse Act (CFAA) in the United States and similar laws globally. Bug bounty programs function as a "safe harbor," granting researchers prospective authorization to access systems that would otherwise be off-limits. When a corporation refuses to pay a researcher who has operated within the scope of this authorization, they not only breach the contract but potentially weaponize the CFAA. Recent jurisprudence, such as the <em>United States v. Sullivan</em> case, highlights the tension between retroactive authorization and criminal liability. If a corporation attempts to revoke authorization or deny the validity of the work to avoid payment, they risk accusations of inducing researchers to incriminate themselves or, conversely, of obtaining valuable security services through fraudulent misrepresentation.</p>
<p>This report provides an exhaustive analysis of the liabilities facing a Delaware corporation headquartered in Missouri that refuses to honor its bounty obligations. The analysis distinguishes between two classes of victims: <strong>external researchers</strong>, whose claims generally fall under commercial fraud and theft of services statutes; and <strong>internal employees</strong>, whose claims trigger aggressive wage theft and labor protection laws. The jurisdictional scope encompasses Missouri, New York, Illinois, Northern Ireland, France, Canada (Quebec), and the Philippines.</p>
<h2 id="heading-ii-united-states-jurisdiction-the-headquarters-and-major-hubs">II. United States Jurisdiction: The Headquarters and Major Hubs</h2>
<p>The United States legal system presents a fragmented but potent array of liabilities. While Delaware law governs the internal affairs of the corporation (fiduciary duties, shareholder rights), the criminal and trade practice liabilities are governed by the state where the conduct occurs or the effects are felt.</p>
<h3 id="heading-a-missouri-the-operational-headquarters">A. Missouri: The Operational Headquarters</h3>
<p>As the physical headquarters of the corporation, Missouri law dictates the primary exposure for deceptive trade practices and the conduct of corporate officers.</p>
<h4 id="heading-1-deceptive-business-practices-and-consumer-fraud">1. Deceptive Business Practices and Consumer Fraud</h4>
<p>The refusal to honor the terms of a public bug bounty program implicates the <strong>Missouri Merchandising Practices Act (MMPA)</strong>. The MMPA is a broadly construed consumer protection statute designed to preserve the integrity of the marketplace. It expressly prohibits "any deception, fraud, false pretense, false promise, misrepresentation, unfair practice or the concealment, suppression, or omission of any material fact in connection with the sale or advertisement of any merchandise".</p>
<p>While "merchandise" typically refers to goods, the statute defines it to include "any object, ware, good, commodity, intangible, real estate, or service". By soliciting the "service" of vulnerability reporting from the public (researchers), the corporation is engaging in trade or commerce. If the corporation establishes the program with the <em>belief</em> that they do not have to pay, they are making a "false promise" in connection with the advertisement of a commercial exchange.</p>
<p><strong>Criminal Liability Elements:</strong> Under <strong>Section 570.140 of the Missouri Revised Statutes</strong>, a person commits the offense of <strong>Deceptive Business Practice</strong> if, in the course of engaging in a business, occupation, or profession, they recklessly use materially false or misleading statements to promote the sale of property or services.</p>
<ul>
<li><p><strong>The Act:</strong> Promoting the bug bounty program creates a public image of security and reliability (promoting the corporation's services). If this promotion relies on the "false promise" of rewards that are never intended to be paid, the officers responsible may be charged with a Class A misdemeanor.</p>
</li>
<li><p><strong>The Intent:</strong> The statute criminalizes the reckless making of false statements. If the officers knew the budget was insufficient or intended to use "discretion" clauses to deny valid claims systematically, this satisfies the reckless standard.</p>
</li>
</ul>
<p><strong>Civil Class Action Risk:</strong> Missouri is a historically active jurisdiction for consumer class actions under the MMPA. Section 407.025 authorizes civil actions to recover damages for these deceptive practices. If the corporation systematically denies payments to multiple researchers, these individuals can form a class, alleging a pattern of unfair practices. Unlike simple fraud, which requires proving specific intent, the MMPA covers "unfair practices," which can include subtle, misleading conduct designed to exploit the researchers' labor.</p>
<h4 id="heading-2-filing-false-documents-and-corporate-fraud">2. Filing False Documents and Corporate Fraud</h4>
<p>If the corporation’s officers execute financial documents, reports, or compliance filings that misrepresent the liabilities owed to researchers (i.e., failing to book the accrued bounties as accounts payable), they risk liability under <strong>Section 570.095: Filing False Documents</strong>.</p>
<ul>
<li><p><strong>Felony Exposure:</strong> A person commits this offense if they file a document with a government entity or financial institution with the intent to "defraud, deceive... or negatively impact financially" another party.</p>
</li>
<li><p><strong>Application:</strong> If the corporation submits financial statements to a bank or the Secretary of State that omit the "debt" owed to researchers to make the company appear more solvent, this constitutes a Class D Felony.</p>
</li>
</ul>
<h4 id="heading-3-the-workers-compensation-fraud-analogy">3. The "Worker's Compensation Fraud" Analogy</h4>
<p>While Missouri generally treats unpaid wages as a civil matter, the state is aggressive regarding fraud in employment-adjacent benefits. Under Section 287.128, it is unlawful for an employer to "knowingly and intentionally refuse to comply with known and legally indisputable compensation obligations with intent to defraud". While this specific statute applies to worker's compensation, it establishes a prosecutorial mindset: the intentional withholding of legally owed compensation is a species of fraud. A creative prosecutor could argue that the refusal to pay internal employees for bug bounties (a "compensation obligation") with the intent to save money mirrors the conduct criminalized in the worker's comp arena.</p>
<h4 id="heading-4-emerging-legislative-threats-wage-theft-criminalization">4. Emerging Legislative Threats: Wage Theft Criminalization</h4>
<p>The legal landscape in Missouri is shifting toward criminalizing wage theft. <strong>House Bill 1841</strong>, the "Missouri Wage Theft Prevention and Wage Recovery Act," was introduced to make unpaid wages over $5,000 a <strong>Class A Misdemeanor</strong> and subsequent violations a <strong>Class E Felony</strong>. The bill defines "final compensation" to include "earned bonuses," which would encompass bug bounties.</p>
<ul>
<li><strong>Status:</strong> As of May 2024, the bill was referred to the General Laws committee. While not yet enacted, its existence signals legislative intent to close the gap between civil non-payment and criminal theft. If passed, the retrospective application or future conduct of the corporation would be subject to felony prosecution.</li>
</ul>
<h3 id="heading-b-new-york-the-epicenter-of-wage-theft-as-larceny">B. New York: The epicenter of "Wage Theft as Larceny"</h3>
<p>For operations or employees based in New York, the corporation faces the most severe criminal exposure in the United States. New York has recently redefined the legal understanding of unpaid compensation, moving it from a regulatory infraction to a serious felony.</p>
<h4 id="heading-1-the-2023-penal-law-amendment-wage-theft-is-grand-larceny">1. The 2023 Penal Law Amendment: Wage Theft is Grand Larceny</h4>
<p>In September 2023, New York amended its Penal Law to explicitly include "wage theft" within the definition of <strong>Larceny</strong> (Section 155.05).</p>
<ul>
<li><p><strong>The Statute:</strong> Section 155.05(2)(f) states that a person obtains property by wage theft when they hire a person to perform services and fail to pay wages.</p>
</li>
<li><p><strong>Aggregation of Claims:</strong> Crucially, the amendment allows prosecutors to <strong>aggregate</strong> non-payments across an entire "workforce" into a single count of larceny. The "workforce" is defined as a "group of one or more persons who work in exchange for wages".</p>
</li>
<li><p><strong>Application:</strong> If the corporation owes ten different researchers/employees $2,000 each, the prosecutor treats this not as ten small claims, but as a single $20,000 theft.</p>
</li>
<li><p><strong>Felony Thresholds:</strong></p>
</li>
<li><p><strong>Grand Larceny in the Fourth Degree (Class E Felony):</strong> Theft exceeding $1,000.</p>
</li>
<li><p><strong>Grand Larceny in the Second Degree (Class C Felony):</strong> Theft exceeding $50,000.</p>
</li>
<li><p><strong>Grand Larceny in the First Degree (Class B Felony):</strong> Theft exceeding $1,000,000. This carries a maximum sentence of 25 years in prison.</p>
</li>
</ul>
<h4 id="heading-2-bounties-as-wages-or-earned-bonuses">2. Bounties as "Wages" or "Earned Bonuses"</h4>
<p>The corporation may attempt to argue that bug bounties are "discretionary bonuses" and thus exempt from wage theft laws. New York Labor Law, however, makes a sharp distinction between "purely discretionary" bonuses (not wages) and "earned" bonuses.</p>
<ul>
<li><p><strong>Discretionary:</strong> A bonus is discretionary if it is not tied to specific criteria and depends solely on the employer's whim (e.g., a holiday gift).</p>
</li>
<li><p><strong>Earned:</strong> A bonus is "earned" if it is linked to specific events or productivity, such as closing a sale or, in this case, finding a vulnerability.</p>
</li>
<li><p><strong>Legal Conclusion:</strong> Because the bug bounty program outlines specific requirements for valid submissions and specific compensation tiers, the bounties are "earned bonuses." Consequently, they are "wages" under NY Labor Law. Withholding them is not merely a breach of contract; it is the criminal theft of the employee's property.</p>
</li>
</ul>
<h4 id="heading-3-personal-liability-of-shareholders-section-630">3. Personal Liability of Shareholders (Section 630)</h4>
<p>New York law pierces the corporate veil uniquely regarding employee compensation. <strong>New York Business Corporation Law Section 630</strong> provides that the ten largest shareholders of a privately held corporation are <strong>jointly and severally personally liable</strong> for all debts, wages, and salaries due to any of its employees for services performed in New York.</p>
<ul>
<li><strong>Implication:</strong> Even if the corporation is insolvent or refuses to pay, the top shareholders (often the founders or VC firms) can be sued personally for the unpaid bounties owed to NY-based employees. This liability is absolute and does not require proving fraud.</li>
</ul>
<h3 id="heading-c-chicago-illinois-theft-of-services-and-statutory-damages">C. Chicago (Illinois): Theft of Services and Statutory Damages</h3>
<p>Illinois law presents a dual threat: aggressive criminalization of "theft of services" and punitive civil damages that accrue monthly.</p>
<h4 id="heading-1-criminal-theft-of-labor-or-services">1. Criminal Theft of Labor or Services</h4>
<p>Under <strong>720 ILCS 5/16-3</strong>, a person commits theft when they knowingly obtain the temporary use of property, labor, or services of another which are available only for hire, by means of threat or <strong>deception</strong>.</p>
<ul>
<li><p><strong>Deception:</strong> The act of soliciting bug reports (labor/services) through a published program with no intention of paying constitutes "deception." The corporation "obtained" the service (the knowledge of the vulnerability) and used it (to patch the system) without compensating the provider.</p>
</li>
<li><p><strong>Felony Classification:</strong></p>
</li>
<li><p>If the value of the services exceeds $500, it is a <strong>Class 4 Felony</strong>.</p>
</li>
<li><p>Aggravating factors, such as the use of an access device or previous convictions, can escalate the charge.</p>
</li>
<li><p><strong>Venue:</strong> Illinois courts have broad discretion regarding venue. In <em>People v. Bochenek</em>, the court ruled that identity theft/fraud can be prosecuted where the victim resides. This means the corporation can be charged in Chicago if the researcher resides there, regardless of the HQ location.</p>
</li>
</ul>
<h4 id="heading-2-the-illinois-wage-payment-and-collection-act-iwpca">2. The Illinois Wage Payment and Collection Act (IWPCA)</h4>
<p>For employees, the IWPCA provides a mechanism that is punitive in nature.</p>
<ul>
<li><p><strong>5% Monthly Damages:</strong> Under 820 ILCS 115/14, any employee not timely paid wages (which includes "wage supplements" like bonuses) is entitled to recover the underpayment <em>plus</em> damages of <strong>5% of the underpayment for each month</strong> it remains unpaid. This penalty continues to accrue until paid, creating a rapidly ballooning liability for the corporation.</p>
</li>
<li><p><strong>Criminal "Willful Refusal":</strong> The IWPCA is not just civil. Section 14(a-5) states that any employer who willfully refuses to pay wages with the intent to "annoy, harass, oppress, hinder, delay or defraud" is guilty of a crime.</p>
</li>
<li><p><strong>Class B Misdemeanor:</strong> For amounts under $5,000.</p>
</li>
<li><p><strong>Class A Misdemeanor:</strong> For amounts over $5,000.</p>
</li>
<li><p><strong>Felony:</strong> A subsequent violation within two years constitutes a <strong>Class 4 Felony</strong>.</p>
</li>
<li><p><strong>Officer Liability:</strong> The statute explicitly applies to "any agent of an employer" who knowingly permits the violation , exposing the CISO and HR directors to personal criminal charges.</p>
</li>
</ul>
<h2 id="heading-iii-international-jurisdictions-the-global-fraud-landscape">III. International Jurisdictions: The Global Fraud Landscape</h2>
<p>The corporation’s liability extends beyond US borders, interacting with legal systems that often have lower thresholds for "fraud" and stricter definitions of "loyalty" in business.</p>
<h3 id="heading-d-belfast-northern-ireland-united-kingdom">D. Belfast, Northern Ireland (United Kingdom)</h3>
<p>Northern Ireland, operating under the <strong>Fraud Act 2006</strong> (which applies broadly across the UK), has abandoned the complex "deception" standards of the past in favor of a simpler, more encompassing "False Representation" model.</p>
<h4 id="heading-1-fraud-by-false-representation-section-2">1. Fraud by False Representation (Section 2)</h4>
<p>The primary criminal exposure in Belfast is <strong>Fraud by False Representation</strong> under Section 2 of the Fraud Act 2006.</p>
<ul>
<li><strong>Elements of the Crime:</strong></li>
</ul>
<ol>
<li><p><strong>Dishonesty:</strong> The defendant acted dishonestly according to the standards of ordinary decent people.</p>
</li>
<li><p><strong>False Representation:</strong> A representation is false if it is untrue or misleading, and the person making it <em>knows</em> that it is, or might be, untrue or misleading.</p>
</li>
<li><p><strong>Intent to Gain/Loss:</strong> The defendant intended to make a gain for themselves (getting security data for free) or cause a loss to another (the researcher’s unpaid time).</p>
</li>
</ol>
<ul>
<li><p><strong>Application to Bug Bounties:</strong> The bug bounty program terms constitute a "representation" that payment will follow a valid submission. If the corporation accepts the submission but refuses payment based on a "belief" they don't have to pay (despite the terms), they are making a false representation. The "implied" representation that they are a paying customer is also captured under Section 2(4).</p>
</li>
<li><p><strong>Penalty:</strong> On conviction on indictment, the maximum sentence is <strong>10 years imprisonment</strong>.</p>
</li>
</ul>
<h4 id="heading-2-liability-of-company-officers-section-12">2. Liability of Company Officers (Section 12)</h4>
<p>The Fraud Act 2006 contains a "piercing" provision that presents a catastrophic risk to corporate officers. <strong>Section 12 (Liability of Company Officers)</strong> states that if a fraud offense is committed by a body corporate with the <strong>consent or connivance</strong> of a director, manager, or secretary, <strong>that individual is also guilty of the offense</strong> and liable to be punished accordingly.</p>
<ul>
<li><strong>Connivance:</strong> This legal standard includes "turning a blind eye." If a director knows that the security team is refusing valid payouts to save budget and does nothing to stop it, they are guilty of connivance. This liability is personal and criminal.</li>
</ul>
<h3 id="heading-e-paris-france">E. Paris, France</h3>
<p>French law imposes a rigorous duty of good faith (<em>bonne foi</em>) in commercial and labor relations. The non-payment scenario triggers liabilities under the Penal Code that protect both "trust" and "labor."</p>
<h4 id="heading-1-escroquerie-fraud-vs-abus-de-confiance-breach-of-trust">1. Escroquerie (Fraud) vs. Abus de Confiance (Breach of Trust)</h4>
<ul>
<li><p><strong>Escroquerie (Article 313-1):</strong> This is the act of deceiving a natural or legal person to determine them to hand over funds, valuables, or <em>provide a service</em>. If the corporation used the bounty program as a "manoeuvre frauduleuse" (fraudulent maneuver) to trick researchers into working for free, this is Escroquerie. Punishment: <strong>5 years imprisonment and a €375,000 fine</strong>.</p>
</li>
<li><p><strong>Abus de Confiance (Article 314-1):</strong> This offense involves the misappropriation of funds, valuables, or <em>property</em> that were entrusted to a person on the condition that they be returned or used for a specific purpose.</p>
</li>
<li><p><strong>The Asset:</strong> A vulnerability report is intellectual property. It is "entrusted" to the company for the purpose of verification and payment.</p>
</li>
<li><p><strong>The Misappropriation:</strong> If the company uses the report to patch the vulnerability (thereby consuming the value of the asset) but refuses to pay the agreed price, they have misappropriated the property entrusted to them. Punishment: <strong>3 years imprisonment and a €375,000 fine</strong>.</p>
</li>
</ul>
<h4 id="heading-2-travail-dissimule-concealed-work">2. Travail Dissimulé (Concealed Work)</h4>
<p>For employees, or external researchers who could be reclassified as de facto employees due to the regularity of their work, non-payment triggers the offense of <strong>Travail Dissimulé</strong>.</p>
<ul>
<li><p><strong>The Offense:</strong> It is a crime to intentionally mention fewer hours on a pay slip than were actually worked. If an employee spends 50 hours finding bugs under the promise of a bounty, and the company refuses to pay (and thus fails to report these hours/earnings to social security), the crime is committed.</p>
</li>
<li><p><strong>Consequences:</strong></p>
</li>
<li><p><strong>Criminal:</strong> Up to 3 years imprisonment and a €45,000 fine for individuals; €225,000 for the legal entity.</p>
</li>
<li><p><strong>Civil:</strong> The employee is automatically entitled to a lump-sum indemnity equal to <strong>6 months of salary</strong>.</p>
</li>
<li><p><strong>Administrative:</strong> The URSSAF (social security) will reassess all unpaid social contributions on the estimated value of the work, often with 40% penalties.</p>
</li>
</ul>
<h4 id="heading-3-personal-liability-of-corporate-officers">3. Personal Liability of Corporate Officers</h4>
<p>French courts are uncompromising regarding officer liability. In a landmark 2020 ruling, the <em>Cour de Cassation</em> held that an intentional criminal offense committed by a corporate officer is a "personal act" separable from their corporate functions.</p>
<ul>
<li><strong>Implication:</strong> This means the officer cannot hide behind the company’s insurance or assets. They are personally liable for the fines and damages owed to the victim, and the company is prohibited from reimbursing them.</li>
</ul>
<h3 id="heading-f-montreal-canada-quebec">F. Montreal, Canada (Quebec)</h3>
<p>Quebec presents a hybrid legal environment, combining the federal Criminal Code of Canada with the provincial Civil Code of Quebec (CCQ).</p>
<h4 id="heading-1-criminal-fraud-section-380">1. Criminal Fraud (Section 380)</h4>
<p>Under the <strong>Criminal Code of Canada</strong>, Section 380(1) criminalizes defrauding the public or any person of property, money, or <strong>service</strong> by deceit, falsehood, or "other fraudulent means".</p>
<ul>
<li><p><strong>"Other Fraudulent Means":</strong> Canadian courts interpret this phrase broadly to include conduct that is not strict deceit but is "dishonest" by the standards of reasonable people. Refusing to pay a valid debt (the bounty) when the service has been irreversibly rendered constitutes "other fraudulent means" if the intent was to deprive the victim of compensation.</p>
</li>
<li><p><strong>Penalties:</strong></p>
</li>
<li><p><strong>Indictable Offense:</strong> If the value exceeds $5,000, the maximum term is <strong>14 years imprisonment</strong>.</p>
</li>
<li><p><strong>Aggravating Factors:</strong> Section 380.1 mandates that courts consider the "magnitude, complexity, duration or degree of planning" as aggravating factors. A structured, automated bug bounty program is inherently complex and planned.</p>
</li>
</ul>
<h4 id="heading-2-directors-liability-for-wages">2. Directors' Liability for Wages</h4>
<ul>
<li><p><strong>Federal Liability:</strong> Under the Canada Business Corporations Act, directors are jointly and severally liable for up to <strong>6 months of unpaid wages</strong> if the corporation fails to pay.</p>
</li>
<li><p><strong>Quebec Civil Code (Stipulation for Another):</strong> The legal structure of the bounty in Quebec is governed by <strong>Article 1444 CCQ</strong> (Stipulation for Another) or the general binding nature of offers. The offer to pay the bounty is a stipulation for the benefit of the researcher. Once the condition is met, the beneficiary has a direct right of action against the promisor.</p>
</li>
<li><p><strong>Monetary Penalties:</strong> The <em>Commission des normes, de l'équité, de la santé et de la sécurité du travail</em> (CNESST) can impose administrative monetary penalties on employers who fail to pay wages, ranging from hundreds to thousands of dollars per violation, and can pursue directors personally.</p>
</li>
</ul>
<h3 id="heading-g-manila-philippines">G. Manila, Philippines</h3>
<p>The Philippines jurisdiction poses the most immediate physical threat to the officers due to the criminalization of what Western jurisdictions might consider civil debt, under the doctrine of <em>Estafa</em>.</p>
<h4 id="heading-1-estafa-swindling-article-315-revised-penal-code">1. Estafa (Swindling) - Article 315, Revised Penal Code</h4>
<p>While the Philippine Constitution prohibits imprisonment for non-payment of debt, it allows imprisonment for <strong>Estafa</strong>—which is debt contracted through fraud or deceit.</p>
<ul>
<li><p><strong>The Elements:</strong> Estafa requires (1) deceit/abuse of confidence, (2) resulting in damage/prejudice, (3) intent to gain.</p>
</li>
<li><p><strong>The Critical Distinction:</strong> If the corporation borrowed money or contracted a service intending to pay but later failed due to insolvency, it is civil debt. However, if the corporation solicited the services (bug reports) with <strong>deceit</strong> (i.e., representing they had a bounty program when they had no intention of paying, or using false pretenses to induce the work), it is <strong>Estafa</strong>.</p>
</li>
<li><p><strong>Article 315(2)(a):</strong> Using a fictitious name or false pretenses to deceive. The "false pretense" here is the existence of a bona fide bounty program.</p>
</li>
<li><p><strong>Penalty:</strong> The penalty depends on the amount defrauded. Recent laws have adjusted the thresholds, but significant amounts still carry long prison terms.</p>
</li>
</ul>
<h4 id="heading-2-syndicated-estafa-the-non-bailable-nightmare">2. Syndicated Estafa: The "Non-Bailable" Nightmare</h4>
<p>If the fraud involves <strong>five or more persons</strong> (e.g., the Board of Directors and C-Suite acting in conspiracy) and results in the misappropriation of funds or solicitation of funds/investments from the public, it may be charged as <strong>Syndicated Estafa</strong> under PD 1689.</p>
<ul>
<li><strong>Risk:</strong> Syndicated Estafa is a non-bailable offense punishable by <strong>life imprisonment</strong> (<em>Reclusion Perpetua</em>). While typically applied to investment scams, the solicitation of "services" from the general public via the internet falls into a grey area that aggressive prosecutors utilize.</li>
</ul>
<h4 id="heading-3-officer-liability-and-double-indemnity">3. Officer Liability and Double Indemnity</h4>
<ul>
<li><p><strong>Criminal Liability:</strong> Since a corporation cannot be jailed, the Philippine Revised Penal Code imputes liability to the <strong>officers who directed the act</strong>. Officers who participated in the fraud or were the "moving spirit" behind the non-payment are personally criminally liable.</p>
</li>
<li><p><strong>Wage Liability:</strong> Under RA 8188 (Wage Rationalization Act), officers can be fined and imprisoned for non-payment of mandated wages. Furthermore, employees are entitled to <strong>double indemnity</strong> (payment of double the unpaid amount) in certain wage violation cases.</p>
</li>
</ul>
<h2 id="heading-iv-comparative-data-analysis">IV. Comparative Data Analysis</h2>
<p>The following tables synthesize the legal exposure across the seven jurisdictions.</p>
<h3 id="heading-table-1-primary-criminal-exposures-for-corporate-officers">Table 1: Primary Criminal Exposures for Corporate Officers</h3>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Jurisdiction</td><td>Primary Charge</td><td>Key Statute</td><td>Officer Liability Standard</td><td>Max Penalty (Officer)</td></tr>
</thead>
<tbody>
<tr>
<td><strong>New York</strong></td><td><strong>Grand Larceny (Wage Theft)</strong></td><td>Penal Law § 155.05</td><td><strong>Joint/Several (Shareholders)</strong></td><td>25 Years (Class B Felony)</td></tr>
<tr>
<td><strong>Illinois</strong></td><td>Theft of Services</td><td>720 ILCS 5/16-3</td><td>Willful Refusal / Agent</td><td>Class 4 Felony</td></tr>
<tr>
<td><strong>Missouri</strong></td><td>Deceptive Business Practice</td><td>RSMo § 570.140</td><td>Reckless Statement</td><td>Class A Misdemeanor</td></tr>
<tr>
<td><strong>N. Ireland</strong></td><td>Fraud by False Representation</td><td>Fraud Act 2006 § 2</td><td><strong>Connivance</strong> (Sec 12)</td><td>10 Years Imprisonment</td></tr>
<tr>
<td><strong>France</strong></td><td><em>Escroquerie</em> / <em>Travail Dissimulé</em></td><td>Penal Code 313-1</td><td><strong>Personal Act</strong> (Separable)</td><td>5 Years / €375k Fine</td></tr>
<tr>
<td><strong>Canada</strong></td><td>Fraud &gt; $5,000</td><td>Criminal Code § 380</td><td>Participation / Authorization</td><td>14 Years Imprisonment</td></tr>
<tr>
<td><strong>Philippines</strong></td><td><strong>Estafa</strong> (Swindling)</td><td>RPC Art. 315</td><td><strong>Moving Spirit</strong> Doctrine</td><td>Long-term Prison / Life</td></tr>
</tbody>
</table>
</div><h3 id="heading-table-2-financial-and-civil-liability-multipliers">Table 2: Financial and Civil Liability Multipliers</h3>
<div class="hn-table">
<table>
<thead>
<tr>
<td>Jurisdiction</td><td>Mechanism of Enhancement</td><td>Financial Impact</td></tr>
</thead>
<tbody>
<tr>
<td><strong>New York</strong></td><td>Aggregation of Workforce Claims</td><td>Sum of all unpaid bounties = Grand Larceny total</td></tr>
<tr>
<td><strong>Illinois</strong></td><td>IWPCA Statutory Damages</td><td><strong>5% per month</strong> cumulative penalty on unpaid amount</td></tr>
<tr>
<td><strong>France</strong></td><td><em>Travail Dissimulé</em> Indemnity</td><td>Automatic <strong>6 months salary</strong> penalty per employee</td></tr>
<tr>
<td><strong>Philippines</strong></td><td>Double Indemnity (Wages)</td><td>Payment of <strong>200%</strong> of the unpaid amount</td></tr>
<tr>
<td><strong>Missouri</strong></td><td>MMPA Class Action</td><td>Potential Punitive Damages for "Unfair Practice"</td></tr>
</tbody>
</table>
</div><h2 id="heading-v-the-discretion-defense-a-legal-dead-end">V. The "Discretion" Defense: A Legal Dead End</h2>
<p>The corporation will likely attempt to rely on the standard "Terms of Service" defense, arguing that the program rules state payments are "at the sole discretion of the company". Legal analysis suggests this defense will fail in the face of the criminal statutes outlined above.</p>
<h3 id="heading-1-the-good-faith-covenant">1. The Good Faith Covenant</h3>
<p>In all jurisdictions (particularly the US, UK, and France), commercial contracts contain an implied covenant of <strong>good faith and fair dealing</strong>. A "discretion" clause allows a company to judge the <em>quality</em> of a submission (e.g., is it a duplicate? is it severe?); it does not grant the right to arbitrarily deny payment for a submission that objectively meets the published criteria. Exercising "discretion" to defraud a researcher of their earned reward is evidence of <em>bad faith</em>, which supports the <em>mens rea</em> (intent) required for fraud convictions.</p>
<h3 id="heading-2-performance-based-acceptance">2. Performance-Based Acceptance</h3>
<p>Under the unilateral contract theory (US/Canada/UK), the contract is formed upon performance. Once the researcher finds the bug, the "discretion" to form the contract is gone; the obligation to pay has crystallized. Courts in New York and Quebec generally hold that if the benefit (the vulnerability report) is accepted and used, the obligation to pay the quantum meruit (value of services) is absolute, rendering "discretion" clauses unconscionable or void regarding the payment itself.</p>
<h2 id="heading-vi-conclusion-and-strategic-outlook">VI. Conclusion and Strategic Outlook</h2>
<p>The analysis indicates that the corporation's belief that they "did not have to pay out on genuine bounties" is not merely a mistaken interpretation of contract law—it is a potential admission of criminal intent.</p>
<p><strong>For External Researchers:</strong> The refusal to pay constitutes <strong>Deceptive Business Practice</strong> in Missouri, <strong>Theft of Services</strong> in Illinois, and <strong>Fraud by False Representation</strong> in the UK and Canada. The "discretion" defense offers minimal protection against statutes designed to punish the fraudulent inducement of labor.</p>
<p><strong>For Internal Employees:</strong> The exposure is catastrophic. In <strong>New York</strong>, the officers face <strong>Grand Larceny</strong> charges for wage theft, with the ability of prosecutors to aggregate claims into serious felonies. In <strong>France</strong>, they face <strong>Travail Dissimulé</strong> charges that pierce the corporate veil. In the <strong>Philippines</strong>, the specter of <strong>Estafa</strong> presents a non-bailable risk of imprisonment.</p>
<p><strong>The "Domino Effect":</strong> A criminal charge in one jurisdiction (e.g., a "Wage Theft" indictment in NY) establishes the "fraudulent intent" required to prosecute in others (e.g., Estafa in the Philippines or Fraud in the UK). The officers involved are not shielded by the corporate structure; statutes in NY (Shareholder Liability), UK (Section 12), and France (Personal Fault) specifically target the individuals who authorized or connived in the non-payment scheme. The corporation faces not only civil restitution but potential dissolution, massive punitive damages, and the incarceration of its leadership.</p>
<h4 id="heading-works-cited">Works cited</h4>
<p>1. Unilateral Contract: Definition, Examples &amp; Guide 2025 - HyperStart CLM, <a target="_blank" href="https://www.hyperstart.com/blog/unilateral-contract/">https://www.hyperstart.com/blog/unilateral-contract/</a> 2. What is a Unilateral Contract? - Icertis, <a target="_blank" href="https://www.icertis.com/contracting-basics/what-is-a-unilateral-contract/">https://www.icertis.com/contracting-basics/what-is-a-unilateral-contract/</a> 3. Unilateral vs. Bilateral Contracts: Key Differences, Examples, and Legal Insights - Sirion, <a target="_blank" href="https://www.sirion.ai/library/contract-management/unilateral-vs-bilateral-contract/">https://www.sirion.ai/library/contract-management/unilateral-vs-bilateral-contract/</a> 4. Legal Perspectives on Bug Bounty Programs and Vulnerability Disclosure - Steele Fortress, <a target="_blank" href="https://steelefortress.com/fortress-feed/legal-perspectives-on-bug-bounty-programs-and-vulnerability-disclosure-2">https://steelefortress.com/fortress-feed/legal-perspectives-on-bug-bounty-programs-and-vulnerability-disclosure-2</a> 5. A Court Ruling on Bug Bounties Just Made the Internet Less Safe - Infosecurity Magazine, <a target="_blank" href="https://www.infosecurity-magazine.com/opinions/court-ruling-bug-bounties-internet/">https://www.infosecurity-magazine.com/opinions/court-ruling-bug-bounties-internet/</a> 6. Consumer Protection | Attorney General Office of Missouri, <a target="_blank" href="https://ago.mo.gov/divisions/consumer/">https://ago.mo.gov/divisions/consumer/</a> 7. Revised Statutes of Missouri, RSMo Section 407.020 - <a target="_blank" href="http://MO.gov">MO.gov</a>, <a target="_blank" href="https://revisor.mo.gov/main/OneSection.aspx?section=407.020">https://revisor.mo.gov/main/OneSection.aspx?section=407.020</a> 8. 8 Things You Need to Know About The Missouri Merchandising Practices Act - Bell Law, <a target="_blank" href="https://bell-law-kc.com/8-things-you-need-to-know-about-the-missouri-merchandising-practices-act/">https://bell-law-kc.com/8-things-you-need-to-know-about-the-missouri-merchandising-practices-act/</a> 9. Revised Statutes of Missouri, RSMo Section 570.140, <a target="_blank" href="https://revisor.mo.gov/main/OneSection.aspx?section=570.140">https://revisor.mo.gov/main/OneSection.aspx?section=570.140</a> 10. Missouri Deceptive Trade Practices Laws - Business Law, <a target="_blank" href="https://businesslaw.uslegal.com/deceptive-trade-practices-laws/missouri-deceptive-trade-practices-laws/">https://businesslaw.uslegal.com/deceptive-trade-practices-laws/missouri-deceptive-trade-practices-laws/</a> 11. 2024 Missouri Revised Statutes :: Title XXVI - Trade and Commerce :: Chapter 407 - Merchandising Practices - Justia Law, <a target="_blank" href="https://law.justia.com/codes/missouri/title-xxvi/chapter-407/">https://law.justia.com/codes/missouri/title-xxvi/chapter-407/</a> 12. Two years since MMPA reform: How has it changed Missouri consumer litigation?, <a target="_blank" href="https://news.mobar.org/two-years-since-mmpa-reform-how-has-it-changed-missouri-consumer-litigation/">https://news.mobar.org/two-years-since-mmpa-reform-how-has-it-changed-missouri-consumer-litigation/</a> 13. Missouri Merchandising Practice Act (MMPA) - HD Trial Lawyers, <a target="_blank" href="https://hdtriallawyers.com/mmpa/">https://hdtriallawyers.com/mmpa/</a> 14. Revised Statutes of Missouri, RSMo Section 570.095 - <a target="_blank" href="http://MO.gov">MO.gov</a>, <a target="_blank" href="https://revisor.mo.gov/main/OneSection.aspx?section=570.095">https://revisor.mo.gov/main/OneSection.aspx?section=570.095</a> 15. Revised Statutes of Missouri, RSMo Section 287.128 - <a target="_blank" href="http://MO.gov">MO.gov</a>, <a target="_blank" href="https://revisor.mo.gov/main/OneSection.aspx?section=287.128">https://revisor.mo.gov/main/OneSection.aspx?section=287.128</a> 16. Statute: What are the penalties under the law for workers′ compensation fraud? - FAQs for Missouri Department of Labor, <a target="_blank" href="https://molabor.uservoice.com/knowledgebase/articles/283187-statute-what-are-the-penalties-under-the-law-for">https://molabor.uservoice.com/knowledgebase/articles/283187-statute-what-are-the-penalties-under-the-law-for</a> 17. New Workers' Comp Fraud Law Penalties | Webster &amp; Carlton, <a target="_blank" href="https://www.webstercarlton.com/blog/2019/february/new-workers-comp-fraud-law-penalties/">https://www.webstercarlton.com/blog/2019/february/new-workers-comp-fraud-law-penalties/</a> 18. HB 1841 -- WAGE COMPLAINTS AND PAYMENTS SPONSOR: Unsicker This bill establishes the "Missouri Wage Theft Prevention and Wag, <a target="_blank" href="https://documents.house.mo.gov/billtracking/bills241/sumpdf/HB1841I.pdf">https://documents.house.mo.gov/billtracking/bills241/sumpdf/HB1841I.pdf</a> 19. HOUSE BILL NO. 1841 - Missouri House of Representatives, <a target="_blank" href="https://documents.house.mo.gov/billtracking/bills241/hlrbillspdf/3460H.01I.pdf">https://documents.house.mo.gov/billtracking/bills241/hlrbillspdf/3460H.01I.pdf</a> 20. HB 1841 - Missouri House of Representatives, <a target="_blank" href="https://house.mo.gov/BillDocumentMobile.aspx?year=2024&amp;code=R&amp;bill=HB1841">https://house.mo.gov/BillDocumentMobile.aspx?year=2024&amp;code=R&amp;bill=HB1841</a> 21. New York Makes Wage Theft a Criminal Larceny in New Amendment to Its Penal Law, <a target="_blank" href="https://www.laboremploymentlawblog.com/2023/09/articles/labor-and-employment/new-york-makes-wage-theft-a-criminal-larceny-in-new-amendment-to-its-penal-law/">https://www.laboremploymentlawblog.com/2023/09/articles/labor-and-employment/new-york-makes-wage-theft-a-criminal-larceny-in-new-amendment-to-its-penal-law/</a> 22. Wage Theft In New York Is Now Criminal Larceny - Hodgson Russ LLP, <a target="_blank" href="https://www.hodgsonruss.com/newsroom/publications/Wage-Theft-In-New-York-Is-Now-Criminal-Larceny">https://www.hodgsonruss.com/newsroom/publications/Wage-Theft-In-New-York-Is-Now-Criminal-Larceny</a> 23. Wage Theft Now A Form Of Larceny In New York, <a target="_blank" href="https://www.wagehourlitigation.com/2023/09/wage-theft-now-a-form-of-larceny-in-new-york/">https://www.wagehourlitigation.com/2023/09/wage-theft-now-a-form-of-larceny-in-new-york/</a> 24. New York State Makes 'Wage Theft' a Crime - Fox Rothschild LLP, <a target="_blank" href="https://www.foxrothschild.com/publications/new-york-state-makes-wage-theft-a-crime">https://www.foxrothschild.com/publications/new-york-state-makes-wage-theft-a-crime</a> 25. Enforceability of Employee Bonuses in New York - LegalMatch, <a target="_blank" href="https://www.legalmatch.com/law-library/article/enforceability-of-employee-bonuses-in-new-york.html">https://www.legalmatch.com/law-library/article/enforceability-of-employee-bonuses-in-new-york.html</a> 26. Fact Sheet #56C: Bonuses under the Fair Labor Standards Act (FLSA), <a target="_blank" href="https://www.dol.gov/agencies/whd/fact-sheets/56c-bonuses">https://www.dol.gov/agencies/whd/fact-sheets/56c-bonuses</a> 27. Protecting New York Employee: The Urgent Need for the Wage Payment Integrity Act - NELA/NY, <a target="_blank" href="https://nelany.com/news_manager.php?page=28564">https://nelany.com/news_manager.php?page=28564</a> 28. What Officers and Directors Need to Know about Personal Liability for Unpaid Wages | Akin, <a target="_blank" href="https://www.akingump.com/en/insights/alerts/what-officers-and-directors-need-to-know-about-personal-liability-for-unpaid-wages">https://www.akingump.com/en/insights/alerts/what-officers-and-directors-need-to-know-about-personal-liability-for-unpaid-wages</a> 29. Employer FAQs on Liquidity Concerns in Light of the SVB Crisis | Fisher Phillips, <a target="_blank" href="https://www.fisherphillips.com/en/news-insights/employer-faqs-liquidity-concerns-svb-crisis.html">https://www.fisherphillips.com/en/news-insights/employer-faqs-liquidity-concerns-svb-crisis.html</a> 30. 720 ILCS 5/16-3, <a target="_blank" href="https://www.ilga.gov/legislation/ilcs/fulltext.asp?DocName=072000050K16-3">https://www.ilga.gov/legislation/ilcs/fulltext.asp?DocName=072000050K16-3</a> 31. 720 ILCS 5/ Criminal Code of 2012. - Illinois General Assembly, <a target="_blank" href="https://www.ilga.gov/legislation/ILCS/details?MajorTopic=&amp;Chapter=&amp;ActName=Criminal%20Code%20of%202012.&amp;ActID=1876&amp;ChapterID=53&amp;ChapAct=720+ILCS+5%2F&amp;SeqStart=36900000&amp;SeqEnd=39600000">https://www.ilga.gov/legislation/ILCS/details?MajorTopic=&amp;Chapter=&amp;ActName=Criminal%20Code%20of%202012.&amp;ActID=1876&amp;ChapterID=53&amp;ChapAct=720+ILCS+5%2F&amp;SeqStart=36900000&amp;SeqEnd=39600000</a> 32. Theft of Labor or Services | Aurora Criminal Defense Attorney - The Law Offices of David Lee, <a target="_blank" href="https://www.davidleelegal.com/practice-areas/criminal-defense/theft-crimes/theft-of-labor-or-services/">https://www.davidleelegal.com/practice-areas/criminal-defense/theft-crimes/theft-of-labor-or-services/</a> 33. Illinois Statutes Chapter 720. Criminal Offenses § 5/16-1. Theft - Codes - FindLaw, <a target="_blank" href="https://codes.findlaw.com/il/chapter-720-criminal-offenses/il-st-sect-720-5-16-1/">https://codes.findlaw.com/il/chapter-720-criminal-offenses/il-st-sect-720-5-16-1/</a> 34. CH 48 Theft And Other Property Offenses - Office of the State Appellate Defender, <a target="_blank" href="https://osad.illinois.gov/content/dam/soi/en/web/osad/publications/digest-by-chapter/ch-48-theft-and-other-property-offenses.pdf">https://osad.illinois.gov/content/dam/soi/en/web/osad/publications/digest-by-chapter/ch-48-theft-and-other-property-offenses.pdf</a> 35. Wage Payment and Collection Act Penalties - Illinois Department of Labor, <a target="_blank" href="https://labor.illinois.gov/laws-rules/fls/wpca-penalties.html">https://labor.illinois.gov/laws-rules/fls/wpca-penalties.html</a> 36. 820 ILCS 115/14, <a target="_blank" href="https://www.ilga.gov/Documents/legislation/ilcs/documents/082001150K14.htm">https://www.ilga.gov/Documents/legislation/ilcs/documents/082001150K14.htm</a> 37. 820 ILCS 115/ - Illinois Wage Payment and Collection Act. - Justia Law, <a target="_blank" href="https://law.justia.com/codes/illinois/chapter-820/act-820-ilcs-115/">https://law.justia.com/codes/illinois/chapter-820/act-820-ilcs-115/</a> 38. Fraud Act 2006: Fraud by false representation - Practical Law - Thomson Reuters, <a target="_blank" href="https://uk.practicallaw.thomsonreuters.com/7-602-0946?transitionType=Default&amp;contextData=\(sc.Default\)">https://uk.practicallaw.thomsonreuters.com/7-602-0946?transitionType=Default&amp;contextData=(sc.Default)</a> 39. The Fraud Act | Counter Fraud and Probity Services (CFPS), <a target="_blank" href="https://cfps.hscni.net/information/the-fraud-act/">https://cfps.hscni.net/information/the-fraud-act/</a> 40. Fraud Act 2006 - <a target="_blank" href="http://Legislation.gov.uk">Legislation.gov.uk</a>, <a target="_blank" href="https://www.legislation.gov.uk/ukpga/2006/35">https://www.legislation.gov.uk/ukpga/2006/35</a> 41. Fraud Act 2006 - UNODC Sherloc, <a target="_blank" href="https://sherloc.unodc.org/cld/uploads/res/document/gbr/2006/fraud_act_2006_html/Fraud_Act_2006.pdf">https://sherloc.unodc.org/cld/uploads/res/document/gbr/2006/fraud_act_2006_html/Fraud_Act_2006.pdf</a> 42. Fraud Act 2006 | The Crown Prosecution Service, <a target="_blank" href="https://www.cps.gov.uk/prosecution-guidance/fraud-act-2006">https://www.cps.gov.uk/prosecution-guidance/fraud-act-2006</a> 43. Changes over time for: Section 12 - Fraud Act 2006, <a target="_blank" href="https://www.legislation.gov.uk/ukpga/2006/35/section/12">https://www.legislation.gov.uk/ukpga/2006/35/section/12</a> 44. Fraud Act 2006 - Explanatory Notes - <a target="_blank" href="http://Legislation.gov.uk">Legislation.gov.uk</a>, <a target="_blank" href="https://www.legislation.gov.uk/ukpga/2006/35/notes/division/5/12">https://www.legislation.gov.uk/ukpga/2006/35/notes/division/5/12</a> 45. White collar - criminal offences - Bélot Malan &amp; Associés, <a target="_blank" href="https://bmavocats.com/en/white-collar-crime/">https://bmavocats.com/en/white-collar-crime/</a> 46. Financial Crime in France: Overview - Debevoise, <a target="_blank" href="https://www.debevoise.com/-/media/files/pdf/financial-crime-in-france-overview.pdf?la=en&amp;hash=2EC580063845D6AB0259DD0CE209CB27">https://www.debevoise.com/-/media/files/pdf/financial-crime-in-france-overview.pdf?la=en&amp;hash=2EC580063845D6AB0259DD0CE209CB27</a> 47. Business Crime Laws and Regulations Report 2026 France - <a target="_blank" href="http://ICLG.com">ICLG.com</a>, <a target="_blank" href="https://iclg.com/practice-areas/business-crime-laws-and-regulations/france">https://iclg.com/practice-areas/business-crime-laws-and-regulations/france</a> 48. Corporate officer's criminal and civil liability and delegations of authority: Vade mecum and modus operandi - Soulier Bunch - Strategic Lawyering, <a target="_blank" href="https://soulierbunch.com/en/corporate-officers-criminal-and-civil-liability-and-delegations-of-authority-vade-mecum-and-modus-operandi/">https://soulierbunch.com/en/corporate-officers-criminal-and-civil-liability-and-delegations-of-authority-vade-mecum-and-modus-operandi/</a> 49. French Court: Corporate Liability for Corrupt CEOs - Jones Day, <a target="_blank" href="https://www.jonesday.com/en/insights/2020/02/french-court-corporate-liability-for-corrupt-ceos">https://www.jonesday.com/en/insights/2020/02/french-court-corporate-liability-for-corrupt-ceos</a> 50. Criminal Code ( RSC , 1985, c. C-46) - Department of Justice Canada, <a target="_blank" href="https://laws-lois.justice.gc.ca/eng/acts/c-46/section-380.html">https://laws-lois.justice.gc.ca/eng/acts/c-46/section-380.html</a> 51. How is “Fraud” governed in Canada? - Shim Law, <a target="_blank" href="https://shimlaw.ca/how-is-fraud-governed-in-canada/">https://shimlaw.ca/how-is-fraud-governed-in-canada/</a> 52. Offences and Criminal Case Summaries under the Bankruptcy and Insolvency Act (BIA) and the Criminal Code - Innovation, Science and Economic Development Canada, <a target="_blank" href="https://ised-isde.canada.ca/site/office-superintendent-bankruptcy/en/protecting-public/offences-and-criminal-case-summaries-under-bankruptcy-and-insolvency-act-bia-and-criminal-code">https://ised-isde.canada.ca/site/office-superintendent-bankruptcy/en/protecting-public/offences-and-criminal-case-summaries-under-bankruptcy-and-insolvency-act-bia-and-criminal-code</a> 53. Criminal Code - R.S.C., 1985, c. C-46 (Section 380.1) - <a target="_blank" href="http://Laws.justice.gc.ca">Laws.justice.gc.ca</a>, <a target="_blank" href="https://laws-lois.justice.gc.ca/eng/acts/c-46/section-380.1.html">https://laws-lois.justice.gc.ca/eng/acts/c-46/section-380.1.html</a> 54. Director Liability – Employment Standards Non-Compliance, <a target="_blank" href="https://complianceworks.ca/blog/director-liability/">https://complianceworks.ca/blog/director-liability/</a> 55. Directors Liability (PRB 99-44E), <a target="_blank" href="https://publications.gc.ca/Collection-R/LoPBdP/BP/prb9944-e.htm">https://publications.gc.ca/Collection-R/LoPBdP/BP/prb9944-e.htm</a> 56. ccq-1991 - Civil Code of Québec, <a target="_blank" href="https://www.legisquebec.gouv.qc.ca/en/document/cs/ccq-1991/20170616">https://www.legisquebec.gouv.qc.ca/en/document/cs/ccq-1991/20170616</a> 57. Annotated Civil Code of Québec (updated on 2025-10-20) Section 1383, <a target="_blank" href="https://ccq.lexum.com/w/ccq/en#!fragment/sec1383">https://ccq.lexum.com/w/ccq/en#!fragment/sec1383</a> 58. Stipulation for Third Parties - PSP Legal, <a target="_blank" href="https://psplegal.ca/en/expertise/stipulation-for-third-parties/">https://psplegal.ca/en/expertise/stipulation-for-third-parties/</a> 59. PENALTIES AND INTERESTS - Employer's Guide - CNESST, <a target="_blank" href="https://www.cnesst.gouv.qc.ca/sites/default/files/documents/penalties-and-interest_0.pdf?cid=1723558120">https://www.cnesst.gouv.qc.ca/sites/default/files/documents/penalties-and-interest_0.pdf?cid=1723558120</a> 60. Workplace Protections in Quebec - Éducaloi, <a target="_blank" href="https://educaloi.qc.ca/en/capsules/workplace-protections-in-quebec/">https://educaloi.qc.ca/en/capsules/workplace-protections-in-quebec/</a> 61. Estafa Case Against a Company in the Philippines, <a target="_blank" href="https://www.respicio.ph/commentaries/estafa-case-against-a-company-in-the-philippines">https://www.respicio.ph/commentaries/estafa-case-against-a-company-in-the-philippines</a> 62. Can Failure to Pay Installments Be Estafa? Philippine Rules on Debt and Criminal Fraud, <a target="_blank" href="https://www.respicio.ph/commentaries/can-failure-to-pay-installments-be-estafa-philippine-rules-on-debt-and-criminal-fraud">https://www.respicio.ph/commentaries/can-failure-to-pay-installments-be-estafa-philippine-rules-on-debt-and-criminal-fraud</a> 63. Estafa vs Civil Debt: Defenses, Payment Arrangements, and Avoiding Criminal Liability, <a target="_blank" href="https://www.respicio.ph/commentaries/estafa-vs-civil-debt-defenses-payment-arrangements-and-avoiding-criminal-liability">https://www.respicio.ph/commentaries/estafa-vs-civil-debt-defenses-payment-arrangements-and-avoiding-criminal-liability</a> 64. Concern Regarding Non-Payment of Debt and Potential Estafa Charge - respicio &amp; co., <a target="_blank" href="https://www.respicio.ph/dear-attorney/concern-regarding-non-payment-of-debt-and-potential-estafa-charge">https://www.respicio.ph/dear-attorney/concern-regarding-non-payment-of-debt-and-potential-estafa-charge</a> 65. New Penalties for Estafa or Swindling - Law Firm in Philippines, <a target="_blank" href="https://ndvlaw.com/new-penalties-for-estafa-or-swindling/">https://ndvlaw.com/new-penalties-for-estafa-or-swindling/</a> 66. Corporate Fraud 100K Criminal Liability Philippines - respicio &amp; co., <a target="_blank" href="https://www.respicio.ph/commentaries/corporate-fraud-100k-criminal-liability-philippines-1">https://www.respicio.ph/commentaries/corporate-fraud-100k-criminal-liability-philippines-1</a> 67. G.R. No. 249606 - ALICIA O. FERNANDEZ, ANTHONY JOEY S. TAN, REYNALDO V. CESA, AND ERGARDO V. MARTINEZ, PETITIONERS, vs. PEOPLE OF THE PHILIPPINES, RESPONDENT.D E C I S I O N - Supreme Court E-Library, <a target="_blank" href="https://elibrary.judiciary.gov.ph/thebookshelf/showdocs/1/68454">https://elibrary.judiciary.gov.ph/thebookshelf/showdocs/1/68454</a> 68. G.R. No. 234818 - THE PEOPLE OF THE PHILIPPINES, PLAINTIFF-APPELLEE, V. FELIX AQUINO, ACCUSED-APPELLANT, IRIS AQUINO (DECEASED), ELEANOR MACABBALUG (AT-LARGE), GENALYN NASOL (AT-LARGE), ARTURO DELGADO, JR. (AT-LARGE), PEARL MILITAR (AT-LARGE, <a target="_blank" href="https://elibrary.judiciary.gov.ph/thebookshelf/showdocs/1/64853">https://elibrary.judiciary.gov.ph/thebookshelf/showdocs/1/64853</a> 69. Employer Liability for Unpaid Wages in the Philippines: Penalties and Remedies, <a target="_blank" href="https://www.respicio.ph/commentaries/employer-liability-for-unpaid-wages-in-the-philippines-penalties-and-remedies">https://www.respicio.ph/commentaries/employer-liability-for-unpaid-wages-in-the-philippines-penalties-and-remedies</a> 70. White Hat Hackers and Unpaid Bounties: What Are Your Legal Rights?, <a target="_blank" href="https://www.simonattorneys.com/blog/white-hat-hackers-and-unpaid-bounties-what-are-your-legal-rights">https://www.simonattorneys.com/blog/white-hat-hackers-and-unpaid-bounties-what-are-your-legal-rights</a> 71. Legal Class Action Against HackerOne : r/bugbounty - Reddit, <a target="_blank" href="https://www.reddit.com/r/bugbounty/comments/1jzy6o6/legal_class_action_against_hackerone/">https://www.reddit.com/r/bugbounty/comments/1jzy6o6/legal_class_action_against_hackerone/</a> 72. A Researcher's Guide to Some Legal Risks of Security Research - Cyberlaw Clinic, <a target="_blank" href="https://clinic.cyber.harvard.edu/wp-content/uploads/2020/10/Security_Researchers_Guide-2.pdf%EF%BF%BC">https://clinic.cyber.harvard.edu/wp-content/uploads/2020/10/Security_Researchers_Guide-2.pdf  
</a></p>
]]></content:encoded></item><item><title><![CDATA[Possible Penalties for violating Regulation Systems Compliance and Integrity (Us Securities and Exchange Commission Regulation)]]></title><description><![CDATA[Out of curiosity I figured I would see what Google Gemini stated about what are the penalties for violating RegSCI.
The penalties for violating Regulation SCI (Systems Compliance and Integrity) are significant because the rule governs the critical in...]]></description><link>https://exegy.today/possible-penalties-for-violating-regulation-systems-compliance-and-integrity-us-securities-and-exchange-commission-regulation</link><guid isPermaLink="true">https://exegy.today/possible-penalties-for-violating-regulation-systems-compliance-and-integrity-us-securities-and-exchange-commission-regulation</guid><category><![CDATA[Regulation Systems Compliance and Integrity (Us Securities and Exchange Commission Regulation)]]></category><category><![CDATA[RegSCI]]></category><category><![CDATA[SEC]]></category><dc:creator><![CDATA[Justin Walters]]></dc:creator><pubDate>Fri, 21 Nov 2025 23:30:10 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1763767682787/214c72ba-2793-477f-ab98-17134bf5b8b6.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Out of curiosity I figured I would see what Google Gemini stated about what are the penalties for violating RegSCI.</p>
<p>The penalties for violating <strong>Regulation SCI (Systems Compliance and Integrity)</strong> are significant because the rule governs the critical infrastructure of the U.S. financial markets.1</p>
<p>While the technical "maximum" fine per violation is around $1.2 million, the SEC often aggregates multiple violations to reach settlements in the <strong>$1.5 million to $14 million</strong> range.</p>
<h3 id="heading-1-the-real-world-price-tag-recent-settlements">1. The Real-World "Price Tag" (Recent Settlements)</h3>
<p>The SEC typically settles these cases for a lump sum that reflects the severity of the system failure or reporting delay.</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Company</strong></td><td><strong>Fine Amount</strong></td><td><strong>Date</strong></td><td><strong>Violation Details</strong></td></tr>
</thead>
<tbody>
<tr>
<td><strong>ICE (NYSE Parent)</strong></td><td><strong>$10 Million</strong></td><td><strong>May 2024</strong></td><td><strong>Failure to Notify:</strong> The largest recent penalty. ICE failed to "immediately" notify the SEC of a cyber intrusion. Even though the hack was minor ("de minimis"), the 4-day delay in reporting it was the primary violation.</td></tr>
<tr>
<td><strong>NYSE Group</strong></td><td><strong>$14 Million</strong></td><td><strong>2018</strong></td><td><strong>Business Continuity:</strong> The historic benchmark. Fined for multiple Reg SCI failures, including a botched rollout of a new trading system and failure to follow disaster recovery protocols during a market disruption.</td></tr>
<tr>
<td><strong>Virtu Americas</strong></td><td><strong>$1.5 Million</strong></td><td><strong>2019</strong></td><td><strong>Process Failure:</strong> Fined for operating an Alternative Trading System (ATS) without proper Reg SCI policies, annual reviews, or quarterly reports.</td></tr>
</tbody>
</table>
</div><hr />
<h3 id="heading-2-the-legal-limit-statutory-maximums-for-2025">2. The Legal Limit (Statutory Maximums for 2025)</h3>
<p>Under federal law, the SEC calculates fines using a three-tier system. These limits are per "act or omission," meaning a single system outage could theoretically count as hundreds of separate violations.</p>
<p><em>Effective January 15, 2025:</em></p>
<ul>
<li><p><strong>Tier 1 (Technical / Administrative):</strong></p>
</li>
<li><p><strong>Max Penalty:</strong> <strong>$118,225</strong> per violation.</p>
</li>
<li><p><em>Scenario:</em> Forgetting to file a quarterly report or missing a policy review deadline.</p>
</li>
<li><p><strong>Tier 2 (Fraud / Recklessness):</strong></p>
</li>
<li><p><strong>Max Penalty:</strong> <strong>$591,127</strong> per violation.</p>
</li>
<li><p><em>Scenario:</em> Recklessly ignoring a known software bug that later crashes the exchange.</p>
</li>
<li><p><strong>Tier 3 (Substantial Loss / Risk):</strong></p>
</li>
<li><p><strong>Max Penalty:</strong> <strong>$1,182,253</strong> per violation.</p>
</li>
<li><p><em>Scenario:</em> A massive system outage that halts trading for millions of investors or causes significant financial loss.</p>
</li>
</ul>
<hr />
<h3 id="heading-3-why-fines-exceed-the-maximums">3. Why Fines Exceed the Maximums</h3>
<p>You might wonder how a $1.2 million maximum turns into a $14 million fine. The SEC uses <strong>aggregation</strong>:</p>
<ul>
<li><p><strong>Duration:</strong> If a system is non-compliant for 10 days, that can be 10 violations.</p>
</li>
<li><p><strong>Scope:</strong> If a bad policy affects 5 different subsidiary exchanges (as in the ICE case), that counts as 5 separate infractions.</p>
</li>
<li><p><strong>Counts:</strong> Every individual email or report that <em>should</em> have been sent but wasn't is a separate "omission."</p>
</li>
</ul>
<h3 id="heading-4-the-1-trigger-for-fines-notification-speed">4. The #1 Trigger for Fines: Notification Speed</h3>
<p>The most common reason for a massive fine today is <strong>speed</strong>.</p>
<ul>
<li><p><strong>The Rule:</strong> Reg SCI requires "immediate" notification to the SEC upon confirming a major system event.2</p>
</li>
<li><p><strong>The Trap:</strong> Companies often wait to investigate fully before calling the SEC. <strong>This is a violation.</strong> In the $10M ICE settlement, the SEC penalized them specifically because they took 4 days to assess the impact before picking up the phone.3</p>
</li>
</ul>
<h3 id="heading-next-step">Next Step</h3>
<p>Are you reviewing this because you need to <strong>draft an Incident Response Plan</strong> that complies with the "Immediate Notification" standard? (I can outline the specific triggers that require a call to the SEC).</p>
]]></content:encoded></item></channel></rss>