Category Archives: Fraud News From World

A “Fraud News From World” directory is a collection of news articles about fraud and scams from around the world. These directories can be a valuable resource for staying informed about the latest scams and how to protect yourself from them. The directory typically includes information about the scam, such as the type of scam, the target audience, the location of the scam, and the date of the scam. It may also include information about how to protect yourself from the scam, such as how to identify a phishing email or how to report a scam to the authorities.

Healthcare Fraud: Aria O. Sabit Pleaded Guilty to Four Counts of Health Care Fraud

Detroit-Area Neurosurgeon Sentenced to 235 Months in Prison for Role in $2.8 Million Health Care Fraud Scheme

A Detroit-area neurosurgeon was sentenced today to 235 months in prison for his role in $2.8 million health care fraud scheme in which he caused serious bodily harm to patients by performing unnecessary invasive spinal surgeries.

Assistant Attorney General Leslie R. Caldwell of the Justice Department’s Criminal Division, U.S. Attorney Barbara L. McQuade of the Eastern District of Michigan, Special Agent in Charge David P. Gelios of the FBI’s Detroit Division, Assistant Director in Charge Deirdre Fike of the FBI’s Los Angeles Division, Special Agent in Charge Lamont Pugh III of the U.S. Department of Health and Human Service Office of Inspector General (HHS-OIG) Chicago Region, Special Agent in Charge Glenn R. Ferry of the HHS-OIG Los Angeles Region and Special Agent in Charge Steve Francis of U.S. Immigration and Customs Enforcement’s Homeland Security Investigations (ICE-HSI) Detroit Field Office made the announcement.

Aria O. Sabit M.D., 43, of Birmingham, Michigan, pleaded guilty to four counts of health care fraud, one count of conspiracy to commit health care fraud and one count of unlawful distribution of a controlled substance, resulting in losses to Medicare, Medicaid and various private insurance companies.

Sabit was a licensed neurosurgeon who owned and operated the Michigan Brain and Spine Physicians Group, which had various locations in the Eastern District of Michigan. In connection with his guilty plea, Sabit admitted that he derived significant profits by convincing patients to undergo spinal fusion surgeries with “instrumentation” (medical devices designed to stabilize and strengthen the spine) that he never performed and billed public and private healthcare benefit programs for those fraudulent services. Sabit further admitted that, in some instances, he operated on patients and dictated in his operative reports – which he knew would later be used to support fraudulent insurance claims – that he had performed spinal fusion with instrumentation, when he had not. Specifically, Sabit fraudulently billed public and private health care programs for instrumentation when, in fact, he used cortical bone dowels made of tissue. Sabit failed to render services in relation to lumbar and thoracic fusion surgeries, including in certain instances, billing for implants that were not provided.

Before moving to moving to Michigan, Sabit was a resident of Ventura, California, and a licensed neurosurgeon in California. Sabit admitted that, in approximately February 2010, while he was on the staff of a California hospital, he became involved with Apex Medical Technologies LLC (Apex), which was owned by another neurosurgeon and three non-physicians. In exchange for the opportunity to invest in Apex and share in its profits, Sabit agreed to convince his hospital to buy spinal implant devices from Apex and to use a substantial number Apex spinal implant devices in his surgical procedures. Sabit further admitted that he and Apex’s co-owners concealed Sabit’s involvement in Apex from the hospitals and surgical centers.

In connection with his guilty plea, Sabit admitted that the financial incentives provided to him by Apex and his co-conspirators caused him to use more spinal implant devices than were medically necessary to treat his patients in order to generate more sales revenue for Apex, which resulted in serious bodily injury to his patients. Sabit also admitted that, on a few occasions, the money he made from using Apex spinal implant devices motivated him either to refer patients for unnecessary spine surgeries or for more complex procedures that they did not need.

The FBI, HHS-OIG and ICE investigated the Michigan case. The FBI and HHS-OIG investigated the California case, which was subsequently transferred to the Eastern District of Michigan. The California case was brought as part of the Medicare Fraud Strike Force, under the supervision of the Criminal Division’s Fraud Section and the U.S. Attorney’s Office of the Eastern District of Michigan. Trial Attorney Catherine K. Dick, formerly of the Criminal Division’s Fraud Section, is prosecuting the California case. Assistant U.S. Attorneys Regina R. McCullough and Philip A. Ross of the Eastern District of Michigan are prosecuting the Michigan case.

Sabit also is a defendant in two civil False Claims Act cases brought by the Justice Department in the Central District of California. These cases remain pending.

The Criminal Division’s Fraud Section leads the Medicare Fraud Strike Force. Since its inception in March 2007, the Medicare Fraud Strike Force, now operating in nine cities across the country, has charged over 3,000 defendants who collectively have billed the Medicare program for over $10 billion. In addition, the HHS Centers for Medicare & Medicaid Services, working in conjunction with the HHS-OIG, are taking steps to increase accountability and decrease the presence of fraudulent providers.

To learn more about the Health Care Fraud Prevention and Enforcement Action Team (HEAT), go to: www.stopmedicarefraud.gov.

Original PressReleases…

Identity Theft: Martin Aleksandrov Enev Sentenced For Possession Equipment With the Intent to Defraud, and Identity Theft

Bulgarian National Sentenced to Federal Prison for Possession of a Device to Make Fraudulent Credit and Debit Cards

Defendant Believed to Be Part of an Ongoing International Identity Theft Ring

Baltimore, Maryland – U.S. District Judge Richard D. Bennett sentenced Martin Aleksandrov Enev, age 27, a Bulgarian national residing in Randallstown, Maryland, today to 33 months in prison, followed by one year of supervised release, for possession of device-making equipment with the intent to defraud, and identity theft.

The sentence was announced by United States Attorney for the District of Maryland Rod J. Rosenstein; Special Agent in Charge Brian Murphy of the United States Secret Service – Baltimore Field Office; andChief James W. Johnson of the Baltimore County Police Department.

According to his plea agreement, on July 20, 2016, Bulgarian Customs Officers contacted U.S. Secret Service agents after they identified what they believed to be an illegal “ATM skimming device” concealed within a black and green nylon pouch, which is capable of reading the encrypted information contained in the magnetic strip on the back of a credit or debit card. The pouch had been discovered during a routine screening of international shipments scheduled to depart from the airport. The pouch was enclosed inside a shipper’s plastic delivery envelope with a packing slip attached addressed to “Marin Penev” at an address in Randallstown. Bulgarian authorities sent photographs of the device and envelope to the Secret Service.

On July 21, 2016, members of the USSS Maryland Electronic Crimes Task Force arranged a controlled delivery of the envelope and its contents once it arrived in the United States. On July 26, 2016, Enev picked up the package, providing a Maryland driver’s license in his name as identification. Special Agents of the USSS and Baltimore County Detectives followed Enev to a residence in Randallstown. The owner of the residence advised agents that Enev rented a room on the first floor of the residence and provided agents with Enev’s telephone number. A Secret Service agent called the phone number and spoke to Enev who agreed to exit the residence. Enev came out of the house and was taken into custody.

Search warrants were executed at Enev’s residence and his vehicle. From the vehicle, law enforcement recovered the opened shipping envelope, which was empty; one box containing 15 pre-paid gift and credit cards capable of being recoded with fraudulently obtained financial proceeds, along with various business cards; and three paper receipts indicating the reloading of a pre-paid gift card in the amount of $270. The search of Enev’s living area recovered: the black and green nylon pouch containing an ATM skimming, which matched the photographs of the device sent by Bulgarian authorities; two other ATM skimming devices inside the hall closet, along with a magnetic card re-encoder and 40 blank white credit cards; a desktop computer and cellular phone; and prepaid credit cards found in a desk and in Enev’s wallet. Also located in the wallet was a Maryland driver’s license bearing his name and photograph, and a Bulgarian identification card bearing Enev’s photograph. His Republic of Bulgaria driver’s license and European Union identification card were also seized during search.

A preliminary review of the prepaid gift cards and credit cards seized during the search revealed that some of them had been recoded with other people’s personal identifying information (PII), including their names and financial account numbers, creating a counterfeit access device capable of accessing those persons’ bank accounts and/or credit card balances through an ATM machine. The USSS confirmed that money had already been withdrawn from some of those financial accounts. PII contained on some of the other cards in Enev’s possession was obtained from financial accounts or credit cards created and issued in Europe. The government believes that Enev played a key role in an ongoing identity theft ring with ties to a criminal association based in Europe.

United States Attorney Rod J. Rosenstein commended the U.S. Secret Service and Baltimore County Police Department for their work in the investigation. Mr. Rosenstein thanked Assistant U.S. Attorney Martin J. Clarke, who prosecuted the case.

Financial Fraud: John Edward Taylor Charged With One Count of Wire Fraud, Bank Fraud and Aggravated Identity Theft

Alleged Confidence Man Charged With Luring Victims Through Matchmaking And Networking Sites To Commit Fraud And Identity Theft

John Edward Taylor Allegedly Masqueraded as a Millionaire and Businessman to Romance Victims, Steal Their Identifying Information, and Use Their Bank Accounts and Credit to Fund His Daily Expenses.

Preet Bharara, the United States Attorney for the Southern District of New York and Timothy Gallagher, Special Agent-in-Charge of the Newark Field Office of the Federal Bureau of Investigation (“FBI”), announced that JOHN EDWARD TAYLOR, a/k/a “Jay Taylor,” a/k/a “Josie Reeser,” was charged in a five-count indictment today.  TAYLOR had previously been charged by complaint, and first appeared in this district on December 21, 2016.  The case has been assigned to U.S. District Judge Laura Taylor Swain. TAYLOR is expected to be arraigned later this week before Judge Swain.

Manhattan U.S. Attorney Preet Bharara said:  “John Edward Taylor allegedly trolled dating websites to find unsuspecting women for his ‘romance’ scam, designed to steal their money.  While masquerading as a millionaire businessman with romantic and professional interest in his victims, Taylor was in reality an alleged con artist.  When confronted by some of his victims for looting their bank accounts, Taylor took his insidious crime another step further, allegedly threatening to release sexually explicit photos of them.”

FBI Special Agent-in-Charge Timothy Gallagher said:  “Today’s charges illustrate the FBI’s commitment to combating the growing threat of online dating scams and financial fraud. Our job is to protect victims and ensure those who commit these egregious crimes are held accountable.”

According to the allegations in the Complaint and Indictment filed in federal court:

JOHN EDWARD TAYLOR, a/k/a “Jay Taylor,” a/k/a “Josie Reeser,” stole, or attempted to steal, money, credit, and personal information from more than a dozen women (the “Victims”) in cities across the country, including New York City, Chicago, Atlanta, and Philadelphia.

TAYLOR contacted Victims using online matchmaking and networking websites, such as Match.com, eHarmony, Craigslist, and Seeking Arrangement.  TAYLOR typically introduced himself as “Jay” and often falsely described himself as a wealthy businessman with oil and land interests in North Dakota.  To some Victims, TAYLOR feigned interest in hiring the Victims to work on a new business TAYLOR purported to be creating.  To other Victims, TAYLOR expressed an interest in a romantic and personal relationship.  To most Victims, TAYLOR purported to be interested in both a personal and a professional relationship.

Using a variety of false pretenses, TAYLOR obtained the Victims’ personal identifying information, often including birthdates, addresses, and bank and credit account numbers.  TAYLOR used the Victims’ personal identifying information to purchase goods, transfer funds, and open new accounts – all without authorization.  In certain circumstances, TAYLOR opened accounts without the Victims’ knowledge.  In other circumstances, TAYLOR opened accounts that he assured Victims were business accounts, but were, in fact, personal accounts in the Victims’ names, over which TAYLOR maintained exclusive control.

Often within a matter of months, Victims would discover thousands of dollars in unauthorized charges and transfers in their existing accounts, receive bills for accounts they had never created, or learn their existing accounts had been closed due to delinquency.

Independent of each other, multiple Victims confronted TAYLOR about his activities.  To some, TAYLOR responded with insults.  To others, TAYLOR responded with promises to repay the losses – and on at least one occasion attempted to repay one Victim with funds unlawfully obtained from another Victim.  On multiple occasions, TAYLOR threatened to transmit sexually explicit images of the Victims – which he had obtained as part of his purported romantic relationships with them – to the Victims’ employers if the Victims tried to collect their debts.

TAYLOR’s fraud and attempted fraud totaled hundreds of thousands of dollars in losses.


TAYLOR, 47, has been charged with one count of wire fraud, which carries a maximum sentence of 30 years in prison and a maximum fine of $250,000 or twice the gross gain or loss from the offense; one count of bank fraud, which carries a maximum sentence of 30 years in prison and a maximum fine of $250,000 or twice the gross gain or loss from the offense; one count of aggravated identity theft, which carries a mandatory sentence of two years in prison; and two counts of threatening communications, each of which carries a maximum sentence of two years in prison and a maximum fine of $250,000, or twice the gross gain or loss from the offense.

The maximum potential sentences in this case are prescribed by Congress and are provided here for informational purposes only, as any sentences for the defendant will be determined by the judge.

Mr. Bharara praised the outstanding work of the FBI for their investigative efforts and ongoing support and assistance with the case.

The prosecution of this case is being overseen by the Office’s General Crimes Unit.  Assistant U.S. Attorneys Jonathan Rebold and Andrew Thomas are in charge of the case.

The charges contained in the Complaint and Indictment are merely accusations, and the defendant is presumed innocent unless and until proven guilty.

Original PressReleases…

Financial Fraud: George N. Krinos Charged In a Two-Count Criminal Information With Engaging in a Securities Fraud Scheme

Boardman man charged with defrauding investors out of $1.2 million

A Boardman man was charged in federal court with defrauding investors out of nearly $1.2 million and related tax violations, said Carole S. Rendon, U.S. Attorney for the Northern District of Ohio, Stephen D. Anthony, Special Agent in Charge of the FBI and Troy Stemen, Acting Special Agent in Charge of the IRS’s Cincinnati Field Office.

George N. Krinos was charged in a two-count criminal information with engaging in a securities fraud scheme and willfully failing to collect and pay taxes for his employees.

The information alleges that Krinos, through his various companies known as Krinos Holdings, engaged in a securities fraud scheme in which he sold through false and deceptive practices securities to numerous victims in the Northern District of Ohio.  These securities consisted of debenture notes and private placement memoranda that were not properly registered with the Securities and Exchange Commission.  Because the securities were not registered with and therefore subject to greater scrutiny by the SEC, Krinos was limited to selling them to “accredited investors” who were generally individuals having a net worth in excess of $1 million or who met specific, high-dollar income thresholds.

The information alleges that from 2011 through 2014, Krinos sold these unregistered securities to at least 10 investors in Ohio, causing them financial losses.  Krinos sold the securities under the pretense that his investors’ funds would be used for legitimate business purposes, including to provide venture capital to various client companies seeking funding from Krinos Holdings.  Rather than use these funds for their intended uses, Krinos instead used the money for personal expenses and to engage in unauthorized foreign currency transactions.  To entice his victims, Krinos made promises that their initial investments of $.10 per share would rise in value to as much as $5 or $6 per share.   Krinos also falsely told investors and others that he managed approximately $600 million in an investment account when he in fact had only $5 in the account.

The information further alleges that Krinos submitted falsified letters and statements to reflect high balances in his accounts.  Krinos also falsely told investors that they were making high returns on their investments and that his relationships with the client companies was on good terms.  Contrary to his representations to his investors, Krinos actually used their funds on for his own personal use at restaurants, bars, casinos, adult entertainment clubs and hotels.  Rather than disclose these personal expenses, Krinos later characterized them as “sales and marketing” costs in a budget given to his shareholders at a meeting in Boardman, in 2013.

Over the course of his securities fraud scheme, Krinos caused more than ten victims to lose nearly $1.2 million.

The information also alleges that, in addition to the securities fraud scheme, Krinos improperly withheld taxes, including federal income taxes and Federal Insurance Contribution Act taxes from his employees without paying over those taxes to the IRS.  Over the course of approximately two years, Krinos improperly withheld and kept approximately $91,495 of his employees’ tax contributions from the IRS.

“This defendant lied to investors as means to funding a lavish lifestyle for himself,” Rendon said.

“Krinos’ victims extend not only include those who entrusted their financial assets to Mr. Krinos, but his employees and the taxpayers whose payroll taxes were squandered to further his personal gain,” Stemen said. “IRS-Criminal Investigation will continue devote our investigative resources to ensure honesty and integrity in the financial and tax systems and hold those accountable who threaten them.”

If convicted, the defendant’s sentence will be determined by the court after review of the factors unique to this case, including the defendant’s prior criminal record, the defendant’s role in the offense and the characteristics of the criminal conduct.  In all cases, the sentence will not excess the statutory maximum and in most cases it will be less than the maximum.

This case is being prosecuted by Assistant U.S. Attorneys Om Kakani and Robert J. Patton, following an investigation by the Federal Bureau of Investigation and the Internal Revenue Service – Criminal Investigations.

An information is only a charge and is not evidence of guilt.  A defendant is entitled to a fair trial in which it will be the government’s burden to prove the defendant guilty beyond a reasonable doubt.

Original PressReleases…

Financial Fraud: Sergey Kapustin Charged With One Count of Wire Fraud and Conspiring to Commit Wire Fraud

Auto Dealer Arrested In $2 Million Fraud On Russian Citizens

NEWARK, N.J. – A New Jersey auto dealer was charged today for allegedly defrauding more than 140 Russian citizens who were customers of his auto sales business, U.S. Attorney Paul J. Fishman announced.

Sergey Kapustin, 47, of Warminster, Pennsylvania, was arrested today by special agents of the FBI and charged by complaint with one count of wire fraud and conspiring to commit wire fraud. He will appear this afternoon before U.S. Magistrate Judge Joseph A. Dickson in Newark federal court.

According to documents filed in this case and statements made in court:

Kapustin was the owner and president of Global Auto Group, Effect Auto Sales and G Auto Sales, located in Elizabeth, New Jersey. Global bought and sold used cars, typically high-end vehicles that were classified as “salvaged.”

From January 2011 through December 2014, Kapustin allegedly operated business through a scheme to defraud customers, who usually lived in Russia, Ukraine or members of the former Soviet Union. Kapustin had one or more Russian language websites that offered for sale luxury vehicles, including Mercedes and Lexus that were normally priced below market value, that could be shipped to Finland for easy delivery to Russian citizens, if they agreed to pay full price upfront for the vehicle. Kapustin was Russian and his websites were geared to buyers who believed they were getting a “good deal” from a fellow countryman who could be trusted to follow through once the purchase price had been paid.

After the buyers would wire the full price to one or more bank accounts controlled by Kapustin, he would allegedly give them a litany of excuses and reasons for delay in delivery.  Unbeknownst to them, more often than not Kapustin had neither possession of nor title to the vehicles being sold. At some point, the victim would be offered a different, often inferior car, burdened with added shipping and storage costs.  The unsophisticated buyer, desperate to acquire something for money already spent, would oftentimes wire additional money to rescue the car from its storage; all to no avail. Those very few cars that did land in Finland were normally the product of salvage auctions for vehicles that had been immersed in or flooded with salt water and were inoperable. Kapustin allegedly stole approximately $2 million in this manner.

The count with which Kapustin is charged carries a maximum penalty of 20 years and $250,000 fine.

U.S. Attorney Fishman credited the special agents of the FBI, under the direction of Special Agent in Charge Timothy Gallagher in Newark, with the investigation leading to Kapustin’s arrest.

The government is represented by Senior Litigation Counsel V. Grady O’Malley of the U.S. Attorney’s Office Organized Crime/Gangs Unit.

The charge and allegations in the complaint are merely accusations, and the defendant is considered innocent unless and until proven guilty.

Original PressReleases…

Swiss Bank Tax: Final Resolutions Of Department of Justice And Swiss Bank Program

Justice Department Reaches Final Resolutions Under Swiss Bank Program

Information Received Continues to Drive Civil and Criminal Enforcement Efforts

The Department of Justice announced today that it has reached final resolutions with banks that have met the requirements of the Swiss Bank Program.  The Program provided a path for Swiss banks to resolve potential criminal liabilities in the United States, and to cooperate in the Department’s ongoing investigations of the use of foreign bank accounts to commit tax evasion.  The Program also provided a path for those Swiss banks that were not engaged in wrongful acts but nonetheless wanted a resolution of their status.  Banks already under criminal investigation related to their Swiss banking activities and all individuals were expressly excluded from the Program.

“The Swiss Bank Program has been and continues to be a vital part of the Justice Department’s efforts to aggressively pursue tax evasion,” said Attorney General Loretta E. Lynch. “This groundbreaking initiative has uncovered those who help facilitate evasion schemes and those who hide funds in secret offshore accounts; improved our ability to return tax dollars to the United States; allowed us to pursue investigations into banks and individuals.  I want to thank the Swiss government for their cooperation in this effort, and I look forward to continuing our work together to eradicate fraud and corruption.”

“Working with the Swiss government, we have made financial institutions reform the way they do business,” said Principal Deputy Associate Attorney General Bill Baer.  “We are moving toward an era of global financial transparency, and those seeking to violate our nation’s tax laws, or the laws of our treaty partners, will find that the days of hiding funds abroad are over.”

“The completion of the resolutions with the banks that participated in the Swiss Bank Program is a landmark achievement in the Department’s ongoing efforts to combat offshore tax evasion,” said Principal Deputy Assistant Attorney General Caroline D. Ciraolo.  “We are now in the legacy phase of the Program, in which the participating banks are cooperating, and will continue to cooperate, in all related civil and criminal proceedings and investigations.  The Tax Division, working closely with its colleagues throughout the Department and its partners within the Internal Revenue Service (IRS), will continue to hold financial institutions, professionals, and individual U.S. taxpayers accountable for their respective roles in concealing foreign accounts and assets, and evading U.S. tax obligations.”

“The completion of the examination of Category 3 and 4 banks in the Swiss Bank Program marks another milestone in the continued success of this valuable criminal compliance effort,” said Chief Richard Weber of IRS Criminal Investigation (CI).  “IRS–CI will continue to partner with DOJ in pursuing those who facilitate or engage in international income tax evasion.”

The Program established four categories of Swiss financial institutions. Category 1 included Swiss banks already under investigation when the Program was announced, and therefore, not eligible to participate.  Category 2 was reserved for those banks that advised the department by Dec. 31, 2013, that they had reason to believe that they had committed tax-related criminal offenses in connection with undeclared U.S. related accounts.  In exchange for a non-prosecution agreement, the Category 2 banks made a complete disclosure of their cross-border activities, provided detailed information on accounts in which U.S. taxpayers have a direct or indirect interest, are cooperating in treaty requests for account information, are providing detailed information as to other banks that transferred funds into hidden accounts or that accepted funds when those secret accounts were closed, and must cooperate in any related criminal and civil proceedings for the life of those proceedings.  The banks were also required to pay appropriate penalties.

Banks eligible for Category 3 of the Program were those that established, with the assistance of an independent internal investigation of their cross-border business, that they did not commit tax or monetary transaction-related offenses and have an effective compliance program in place.  The Category 3 banks were required to provide the Department with an independent written report that identified witnesses interviewed and a summary of each witness’s statements, files reviewed, factual findings, and conclusions.  In addition, the Category 3 banks were required to appear before the Department and respond to any questions related to the report or their cross-border business, and to close accounts of accountholders who fail to come into compliance with U.S. reporting obligations.  Upon satisfying these requirements, Category 3 banks received a non-target letter pursuant to the terms of the Program.

Category 4 of the Program was reserved for Swiss banks that were able to demonstrate that they met certain criteria for deemed-compliance under the Foreign Account Tax Compliance Act (FATCA).  Category 4 banks also were eligible for a non-target letter.

Between March 2015 and January 2016, the Department executed non-prosecution agreements with 80 Category 2 banks and collected more than $1.36 billion in penalties.  The Department also signed a non-prosecution agreement with Finacor, a Swiss asset management firm, reflecting the Department’s willingness to reach fair and appropriate resolutions with entities that come forward in a timely manner, disclose all relevant information regarding their illegal activities and cooperate fully and completely, including naming the individuals engaged in criminal conduct.

Between July and December 2016, four banks and one bank cooperative satisfied the requirements of Category 3, making them eligible for Non-Target Letters. No banks qualified under Category 4 of the Program.

“Offshore compliance remains an important area of tax administration,” said IRS Large Business & International Division (LB&I) Commissioner Douglas O’Donnell.  “We are evaluating incoming information to detect account holders who have evaded reporting overseas assets and income, and we are using this information to further untangle the web of financial institutions and intermediaries helping with this evasion.  We have expanded our investigations to other regions of the world, and we will continue to apply these techniques to help protect honest taxpayers.”

Principal Deputy Assistant Attorney General Ciraolo thanked the IRS and in particular, IRS-CI and the LB&I for their substantial assistance.  Principal Deputy Assistant Attorney General Ciraolo also thanked Tax Division Trial Attorneys Kimberle Dodd, Paul Galindo, Mark Kotila, Kathleen Lyon, and Thomas Voracek, who served as counsel on the Category 3 and 4 bank matters, as well as Senior Counsel for International Tax Matters and Coordinator of the Swiss Bank Program Thomas J. Sawyer and Senior Litigation Counsel Nanette L. Davis of the Tax Division.

Additional information about the Tax Division and its enforcement efforts may be found on the division’s website.

Original PressReleasess…

Financial And Tax Fraud: CHRISTOPHER A. JANSEN – President of Baytree Investors Inc. – Charges of Wire Fraud And Evading Income Taxes

Former President of St. Charles Company Sentenced to 70 Months in Federal Prison for Wire Fraud and Income Tax Evasion

ROCKFORD — The former President of Baytree Investors Inc., a defunct St. Charles company, was sentenced Wednesday by U.S. District Judge Frederick J. Kapala.

CHRISTOPHER A. JANSEN, 64, of St. Charles, was sentenced to 70 months in federal prison, to be followed by three years of supervised release, and ordered to pay $269,978 in restitution.  Jansen pleaded guilty on Oct. 14, 2008, to charges of wire fraud and evading income taxes.

According to the written plea agreement, Jansen was President of Baytree Investors Inc., an Illinois corporation engaged in acquiring trucking companies.  In 2001 Jansen learned DFC Transportation, a trucking company headquartered in Huntley, was for sale.  Jansen admitted in his plea agreement that he created a Delaware corporation, DFCTC Holding Inc., and arranged for DFCTC to purchase DFC with money Jansen would borrow using DFC receivables as collateral.  Jansen further admitted that he arranged for other individuals to be the owners of DFCTC, some of whom were previous investors in Baytree business acquisitions that had failed.  Jansen also admitted that he represented to others that he was the corporate secretary and controlled both DFCTC and DFC, without appointment or authority, and avoided having shareholder or director meetings.

After its purchase, Jansen arranged for DFC to use its receivables to borrow more money from a bank, and without authorization ordered employees to transfer money from DFC to DFCTC.  Jansen admitted he then distributed the money to himself and others for their personal use and benefit without disclosing it to the shareholders and directors.  Specifically, on March 22, 2002, Jansen ordered the transfer of $250,000 by wire from a DFC account in Utah to a DFCTC account in St. Charles, for his own personal benefit and the benefit of others, without disclosing it to the shareholders or directors of either corporation.

In pleading guilty, Jansen further admitted that he attempted to evade income tax for the year 2002 that he owed to the United States.  Specifically, Jansen admitted he failed to file a federal income tax return for that year, knowing federal income taxes would be calculated and due.  Jansen also admitted he used a bank account in the name of a dissolved corporation, Talcott Financial Corporation, to receive his income and disburse his expenditures and intentionally failed to have Talcott file informational forms with the IRS for taxable income distributed to him from the account.  Jansen also admitted in the plea agreement that he controlled Baytree and DFCTC and intentionally failed to have those corporations file informational forms with the IRS, such as Form 1099, regarding distributions of taxable income to him.  Further, Jansen admitted he did not have a bank account in his name in order to avoid easy tracing of his income and avoid reporting to the IRS.

The sentencing was announced by Zachary T. Fardon, United States Attorney for the Northern District of Illinois; James D. Robnett, Special Agent-In-Charge of the Chicago Office of the Internal Revenue Service – Criminal Investigation Division; Michael J. Anderson, Special Agent-In-Charge of the Chicago Office of the Federal Bureau of Investigation; and Jeffrey A. Monhart, Regional Director of the Chicago Regional Office of the U.S. Department of Labor, Employee Benefits Security Administration.

The government was represented by Assistant U.S. Attorney Michael D. Love.

Financial Fraud: United Shore Financial Services LLC (USFS) Pay For Alleged False Claims Act Liability Arising From Fha-Insured Mortgage Lending

United Shore Financial Services LLC Agrees To Pay $48 Million To Resolve Alleged False Claims Act Liability Arising From Fha-Insured Mortgage Lending

WASHINGTON – United Shore Financial Services LLC (USFS) has agreed to pay the United States $48 million to resolve allegations that it violated the False Claims Act by knowingly originating and underwriting mortgage loans insured by the U.S. Department of Housing and Urban Development’s (HUD) Federal Housing Administration (FHA) that did not meet applicable requirements, the Justice Department announced today.  USFS is headquartered in Troy, Michigan.

“The settlement announced today holds United Shore accountable for its endorsement of ineligible loans for FHA mortgage insurance,” said Principal Deputy Assistant Attorney General Benjamin C. Mizer, head of the Justice Department’s Civil Division.  “Over the past several years, the Civil Division, in collaboration with numerous U.S. Attorneys’ Offices, HUD and its Office of Inspector General, has diligently worked to hold FHA-approved lenders accountable for actions that deprived homeowners of their homes, wasted taxpayer funds, and contributed to the financial crisis.  The settlement announced today is yet another success in this continuing effort.”

“The federal government insures loans on the condition that lenders comply with certain rules to safeguard federal funds,” said U.S. Attorney Barbara L. McQuade for the Eastern District of Michigan.  “When lenders breach their duty of due diligence and make risky loans that go bad, taxpayers pay the bill.  By holding accountable lenders who fail to comply with underwriting requirements, we hope to send a message to all lenders that they must comply with government standards for federally insured loans.”

“USFS acknowledged that it failed to comply with FHA underwriting and quality control (QC) requirements, resulting in improperly originated mortgages,” said U.S. Attorney John W. Vaudreuil for the Western District of Wisconsin.  “While USFS deserves credit for acknowledging and resolving its conduct, that conduct not only resulted in substantial losses of public funds, but also put Wisconsin homeowners at risk of losing their homes or ruining their credit.  This large settlement should send a clear message that such conduct will not be tolerated.”

During the time period covered by the settlement, USFS participated as a direct endorsement lender (DEL) in the FHA insurance program.  A DEL has the authority to originate, underwrite and endorse mortgages for FHA insurance.  If a DEL approves a mortgage loan for FHA insurance and the loan later defaults, the holder of the loan may submit an insurance claim to HUD, FHA’s parent agency, for the losses resulting from the defaulted loan.  Under the DEL program, the FHA does not review a loan for compliance with FHA requirements before it is endorsed for FHA insurance.  DELs are therefore required to follow program rules designed to ensure that they are properly underwriting and certifying mortgages for FHA insurance, to maintain a QC program that can prevent and correct deficiencies in their underwriting practices, and to self-report any deficient loans identified by their QC program.

The settlement announced today resolves allegations that between Jan. 1, 2006, and Dec. 31, 2011, USFS failed to comply with certain FHA origination, underwriting and QC requirements.  As part of the settlement, USFS admitted to the following facts:  USFS improperly pressured underwriters to approve FHA mortgages and its compensation plan used a formula expressly tying underwriter compensation to the percentage of loans approved by the underwriter and closed by USFS.  USFS also falsely certified that direct endorsement underwriters personally reviewed appraisal reports prior to USFS approving and endorsing mortgages for FHA insurance.

Additionally, although USFS’ internal QC reviews showed severe problems with FHA insured mortgages, USFS routinely failed to provide any meaningful information to senior management regarding its QC findings.

USFS also failed to adhere to HUD’s self-reporting requirements.  While USFS’s QC reviews identified hundreds of materially-deficient FHA insured loans during the time period at issue, USFS self-reported only three loans to HUD.

As a result of USFS’ conduct and omissions, HUD insured hundreds of loans approved by USFS that were not eligible for FHA mortgage insurance under the Direct Endorsement program, and that HUD would not otherwise have insured.  HUD subsequently incurred substantial losses when it paid insurance claims on those loans.

Further, on Jan. 10, 2014, after the United States initiated an investigation into USFS, USFS made certain discretionary distributions to a shareholder in the company.

* * *

“The settlement announced today strongly demonstrates HUD OIG’s continued efforts to identify and investigate underwriting deficiencies in the origination and underwriting of single-family residential loans insured by FHA,” said HUD Inspector General David A. Montoya.

“This settlement, once again, demonstrates HUD’s unyielding efforts to root out poor underwriting practices in its mortgage insurance programs,” said Acting HUD General Counsel Tonya Robinson.  “We want to thank the Department of Justice for partnering with us in holding lenders accountable for their actions. It is critically important that lenders comply with HUD’s underwriting standards and originate mortgages that are in accordance with FHA requirements and that borrowers can sustain.”

The settlement was the result of a joint investigation conducted by HUD, HUD’s Office of Inspector General, the Civil Division’s Commercial Litigation Branch and the U.S. Attorneys’ Offices for the Eastern District of Michigan and the Western District of Wisconsin.

Investment Fraud: DAVID BLAINE WELLIVER Sentenced For Defrauding Investors in The Dblaine Fund

Investment Advisor Sentenced to Five Years for Defrauding Investors of $1.725 Million

The United States Attorney’s Office for the District of Minnesota announced the sentencing of DAVID BLAINE WELLIVER, 56, to five years in prison for defrauding investors in the Dblaine Fund of $1.725 million. WELLIVER pleaded guilty on July 13, 2016, to one count of securities fraud. He was sentenced today before Senior U.S. District Judge Paul A. Magnuson in U.S. District Court in St. Paul, Minn.

According to the defendant’s guilty plea, WELLIVER was the CEO and CIO of Dblaine Capital, LLC, an investment advisory company he founded in Buffalo, Minn. In September 2010, WELLIVER negotiated an agreement with Lazy Deuce Capital Company, LLC (Lazy Deuce), to purportedly finance the merger between Dblaine Capital and other mutual funds.

According to the defendant’s guilty plea, WELLIVER, in 27 separate transactions between October 2010 and May 2011, borrowed a total of $4 million from Lazy Deuce. Aside from a $95,000 payment to acquire the assets of a mutual fund, WELLIVER did not use any of the other proceeds of the Lazy Deuce loans to acquire mutual funds as he had represented to Lazy Deuce. Instead, WELLIVER diverted over $500,000 in proceeds from the Lazy Deuce loans to his own personal use, including for landscaping and interior decorating at his personal residence, to purchase land adjacent to his personal residence, to buy a personal vehicle, and to pay for his son’s college tuition.

According to the defendant’s guilty plea, between December 16, 2010, and April 15, 2011, WELLIVER caused $1.725 million in Dblaine Fund investors’ money to be invested in a shell company formed by several Lazy Deuce principals, called Semita Partners LLC (Semita). At the time WELLIVER made the investments in Semita, he knew that Semita was a shell company formed by principals of Lazy Deuce – the same company from which Dblaine Capital had borrowed money – and that Semita had no operations. On December 31, 2010, in order to meet a series of redemptions in the Dblaine Fund, WELLIVER liquidated nearly all of the stocks held by the Dblaine Fund. Following this liquidation, the Dblaine Fund’s only holdings consisted of worthless Semita shares and cash held in a money market account.

This case was the result of an investigation conducted by the United States Postal Inspection Service, the Federal Bureau of Investigation, and the Internal Revenue Service – Criminal Investigation.

This case was prosecuted by Assistant United States Attorneys Kimberly A. Svendsen and Benjamin F. Langner.
Defendant Information:

DAVID BLAINE WELLIVER, 56
Buffalo, Minn.

Convicted:
• Securities fraud, 1 count

Sentenced:
• Five years in prison
• Three years of supervised release
• Restitution of $2,161,079.83

Cyber Crime: IAT HONG, BO ZHENG, and CHIN HUNG Charged With Devising and Carrying Out a Scheme to Enrich Themselves by Obtaining And Trading on Material, Nonpublic Information

Manhattan U.S. Attorney Announces Arrest of Macau Resident and Unsealing of Charges Against Three Individuals for Insider Trading Based On Information Hacked from Prominent U.S. Law Firms

Iat Hong Arrested On December 25 In Hong Kong On U.S. Insider Trading and Hacking Charges; In Addition to Successful Cyber Intrusions into Two Law Firms, Defendants Charged with Attempting to Hack into Total of Seven Law Firms

Preet Bharara, the United States Attorney for the Southern District of New York, and William F. Sweeney Jr., the Assistant Director-in-Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced the arrest of IAT HONG and the unsealing today of a 13-count superseding indictment charging HONG, BO ZHENG, and CHIN HUNG (the “Defendants”).  The Defendants are charged with devising and carrying out a scheme to enrich themselves by obtaining and trading on material, nonpublic information (“Inside Information”), exfiltrated from the networks and servers of multiple prominent U.S.-based international law firms with offices in New York, New York (the “Victim Law Firms”), which provided advisory services to companies engaged in corporate mergers and acquisitions (“M&A transactions”).  The defendants targeted at least seven law firms as well as other entities in an effort to unlawfully obtain valuable confidential and proprietary information.  HONG, a resident of Macau, was arrested on these charges on December 25, 2016, in Hong Kong and is now pending extradition proceedings.  HONG was presented for an initial appearance on December 26, 2016, before a Judge in Hong Kong and is expected to have his next court appearance on January 16, 2017.

As alleged, from April 2014 through late 2015, the Defendants successfully obtained Inside Information from at least two of the Victim Law Firms (the “Infiltrated Law Firms”) by causing the networks and servers of these firms to be hacked.  Once the Defendants obtained access to the law firms’ networks, the Defendants targeted email accounts of law firm partners who worked on high-profile M&A transactions.  After obtaining emails containing Inside Information, the Defendants purchased stock in the target companies of certain transactions, which were expected to, and typically did, increase in value once the transactions were announced.  The Defendants purchased shares of at least five publicly-traded companies before public announcements that those companies would be acquired, and sold them after the acquisitions were publicly announced, resulting in profits of over $4 million.  In each case, one of the two Infiltrated Law Firms represented either the target or a contemplated or actual acquirer in the transaction.

Manhattan U.S. Attorney Preet Bharara said:  “As alleged, the defendants – including Iat Hong, who was arrested in Hong Kong on Christmas Day – targeted several major New York law firms, specifically looking for inside information about pending mergers and acquisitions.  They allegedly hacked into two prominent law firms, stole the emails of their M&A partners, and made over $4 million in illegal profits.  This case of cyber meets securities fraud should serve as a wake-up call for law firms around the world: you are and will be targets of cyber hacking, because you have information valuable to would-be criminals.”

FBI Assistant Director-in-Charge William F. Sweeney Jr. said:  “The subjects charged in this case allegedly stole nonpublic information through unauthorized access to law firms’ computers, and used the information for their own personal gain.  The FBI works around the clock to keep these types of alleged securities fraudsters and cyber criminals from trading on stolen information, potentially manipulating the market at the cost of legitimate investors, and harm to corporations.”

According to the allegations contained in the superseding indictment (the “Indictment”)1:

The Law Firm-1 Hack and Insider Trading

At all times relevant to the Indictment, Law Firm-1 was a U.S.-based international law firm with offices in New York, New York, which, among other services, provided advisory services to companies engaged in M&A transactions.

The Contemplated Intermune Transaction

In June 2014, Law Firm-1 was retained by a company not named in the Indictment (the “Company”) in connection with a contemplated acquisition of Intermune, a publicly traded U.S.-based drug maker (the “Contemplated Intermune Transaction”).  A partner in the M&A group at Law Firm-1 (“Partner-1”) was an attorney working on the Contemplated Intermune Transaction.

Beginning on July 21, 2014, the Defendants began exchanging emails concerning, among other things, particular M&A partners at Law Firm-1.  In addition, on or about July 29, 2014, HONG emailed HUNG a list of eleven partners at Law Firm-1, including Partner-1.

Also beginning about July 2014, the Defendants, without authorization, caused one of Law Firm-1’s web servers (the “Law Firm-1 Web Server”) to be accessed by using the unlawfully obtained credentials of a Law Firm-1 employee.  The Defendants then caused malware to be installed on the Law Firm-1 Web Server.  The access to the Law Firm-1 Web Server allowed unauthorized access to at least one of Law Firm-1’s email servers (the “Law Firm-1 Email Server”), which contained the emails of Law Firm-1 employees, including Partner-1.

Between about August 1 and August 15, 2014, Partner-1 was privy to Inside Information about the Contemplated Intermune Transaction.  For example, on more than one occasion between August 7 and August 15, 2014, Partner-1 obtained information, including via email, about details of the proposed transaction, including the price per share the Company was considering offering to acquire Intermune.

Between about August 1 and August 9, 2014, the Defendants caused more than 40 gigabytes of confidential data to be exfiltrated from the Law Firm-1 Email Server over the course of at least eight days.

On August 13, 2014, during the time Law Firm-1 was advising the Company on the Contemplated Intermune Transaction and after the Defendants had obtained access to confidential email data maintained at Law Firm-1, HONG used the Inside Information to purchase 7,500 shares of Intermune stock for certain trading accounts (the “Trading Accounts”).  Prior to that date, none of the Trading Accounts had purchased any shares of Intermune.  Later that day, HONG purchased an additional 1,000 shares of Intermune stock in the Trading Accounts.

On August 16 and 17, 2014, the Defendants exploited their continued unauthorized access to email data belonging to Law Firm-1 by exfiltrating approximately 10 gigabytes of confidential data from the Law Firm-1 Email Server.  Between about August 18 and August 21, 2014, HONG and ZHENG used the Inside Information to purchase additional Intermune shares in the Trading Accounts on at least five occasions, totaling an additional 9,500 shares of Intermune stock.

The Contemplated Intermune Transaction was never consummated.  Instead, before the market opened on Monday, August 25, 2014, Intermune announced that it had reached an agreement to be acquired by Roche AG, a German company.  On that day, Intermune’s share price increased by approximately $19 per share, or approximately 40 percent from the closing price on Friday, August 22, 2014, the last prior trading day.  That same day, August 25, 2014, the Defendants sold the 18,000 shares that they had begun acquiring twelve days earlier for profits of approximately $380,000.

The Intel-Altera Transaction

In January 2015, Law Firm-1 was retained by Intel Corporation (“Intel”), a publicly traded multinational technology company, in connection with a contemplated acquisition of Altera Corporation (“Altera”), a publicly traded integrated circuit manufacturer (the “Intel-Altera Transaction”).  As with the Contemplated Intermune Transaction, Partner-1 was an attorney working on the Intel-Altera Transaction.

Between January and about March 27, 2015, Partner-1 was privy to Inside Information about the Intel-Altera Transaction.  On several occasions during this time period, Partner-1 obtained confidential information about the contemplated transaction via email.  For example, on January 29, 2015, Partner-1 received an email with deal terms, including the proposed price per share to purchase Altera.

Between January 13, 2015, in the same month that Law Firm-1 was retained by Intel to advise on the Intel-Altera Transaction, and about February 10, 2015, the Defendants caused approximately 2.8 gigabytes of confidential data to be exfiltrated from the Law Firm-1 Email Server.

Beginning February 17, 2015, during the time Law Firm-1 was advising Intel and after the Defendants had obtained access to confidential email data maintained at Law Firm-1, the Defendants used the Inside Information to purchase shares of Altera stock in the Trading Accounts.  Prior to that date, none of the Trading Accounts had purchased any shares of Altera.

To further effectuate their insider trading scheme, between February 17 and March 27, 2015, one or more of the Defendants used the Inside Information to purchase additional shares of Altera stock in the Trading Accounts on at least 26 occasions, ultimately purchasing more than 210,000 shares.

On March 27, 2015, a financial newspaper published an article reporting on confidential merger discussions between Intel and Altera (the “March 27 Newspaper Article”).  Following the publication of the article, on March 27, 2015, Altera’s share price increased $9 per share, or approximately 26 percent, from Altera’s share price on March 27, 2015, just prior to the March 27 Newspaper Article.  On April 10 and April 13, 2015, the Defendants sold all of their shares of Altera stock for a profit of approximately $1.4 million.

The Law Firm-2 Hack and Insider Trading

At all times relevant to this Indictment, Law Firm-2 was a U.S.-based international law firm with offices in New York, New York, which, among other services, provided advisory services to companies engaged in M&A transactions.

The Pitney Bowes-Borderfree Transaction

In December 2014, Law Firm-2 was retained by Pitney Bowes Inc., a publicly traded international business services company, in connection with a contemplated acquisition of Borderfree, Inc., a publicly traded e-commerce company headquartered in New York, New York (the “Pitney Bowes-Borderfree Transaction”).  A partner in the M&A group at Law Firm-2 (“Partner-2”) was an attorney who worked on the Pitney Bowes-Borderfree Transaction.

Beginning about April 7, 2015, after Law Firm-2 had been retained to advise Pitney Bowes, the Defendants, without authorization, caused one of Law Firm-2’s web servers (the “Law Firm-2 Web Server”), located in New York, New York, to be accessed by using the unlawfully obtained credentials of a Law Firm-2 employee.  The Defendants then caused malware to be installed on the Law Firm-2 Web Server.  The malware on the Law Firm-2 Web Server allowed unauthorized access to at least one of Law Firm-2’s email servers, also located in New York, New York (the “Law Firm-2 Email Server”), which contained the emails of Law Firm-2 attorneys, including Partner-2.

Between about April 8 and July 31, 2015, the Defendants then caused approximately seven gigabytes of confidential data to be exfiltrated from the Law Firm-2 Email Server over the course of at least six days.

Beginning April 29, 2015, hours after the Defendants had caused data from the Law Firm-2 Email Server to be exfiltrated, HONG and HUNG used the Inside Information to purchase shares of Borderfree stock for the Trading Accounts.  Prior to that date, none of the Trading Accounts had purchased any shares of Borderfree stock.  To further effectuate their insider trading scheme, between April 29 and May 5, 2015, HONG and HUNG used the Inside Information to purchase additional shares of Borderfree in the Trading Accounts on at least five occasions.  In total, HONG and HUNG used the Inside Information to purchase 113,000 shares of Borderfree.

On May 6, 2015, the Pitney Bowes-Borderfree Transaction became public.  On that day, Borderfree’s stock price increased by approximately $7 per share, or 105 percent, from the previous day’s closing price.  On May 18, 2015, HONG and HUNG sold their Borderfree shares, earning a profit of approximately $841,000.

Additional Insider Trading and Attempted Insider Trading Based on Inside Information Hacked from the Infiltrated Law Firms

In addition to trading on Inside Information in connection with the Contemplated Intermune Transaction, the Intel-Altera Transaction, and the Pitney Bowes-Borderfree Transaction, detailed above, the Defendants carried out their scheme to enrich themselves by obtaining and trading on the basis of Inside Information exfiltrated from the networks and servers of the Infiltrated Law Firms concerning at least 10 additional M&A transactions, including certain M&A transactions that were contemplated but never consummated.  Several of these M&A transactions involved Partner-1 or Partner-2.  In total, as a result of trading on Inside Information, the Defendants enriched themselves by at least $4 million.

Attempts to Hack Other Victim Law Firms

In addition to obtaining and trading on Inside Information concerning M&A transactions exfiltrated from the networks and servers of the Infiltrated Law Firms, the Defendants repeatedly attempted to cause unauthorized access to the networks and servers of five other Victim Law Firms using means and methods similar to those used to successfully access the Infiltrated Law Firms.  For example, between March and September 2015, the Defendants attempted to cause unauthorized access to the networks and servers of these law firms on more than 100,000 occasions.

The Robotics Company Intrusions

At certain relevant times, the Defendants were also involved in a start-up robotics company (the “Robotics Company”), started by ZHENG, the defendant, which was engaged in the business of developing robot controller chips and providing control system solutions.  HONG and HUNG were also involved in running the Robotics Company.

Between April 2014 and late 2015, in addition to their efforts to hack the Victim Law Firms’ networks and servers during this period, the Defendants also caused confidential information to be exfiltrated from the networks and servers of two robotics companies (the “Robotics Company Victims”) using substantially similar means and methods of exfiltration as were used to access and attempt to access and exfiltrate information from the Victim Law Firms.  Specifically, certain of the same servers that were used to carry out the hacks and attempted hacks of the Victim Law Firms were used to carry out hacks of the Robotics Company Victims.  Among other confidential information, the Defendants obtained confidential and proprietary information concerning the technology and design of consumer robotic products, including detailed and confidential proprietary design schematics.  Following these exfiltrations from the Robotics Company Victims, the Defendants exchanged emails containing certain of the confidential information they had caused to be exfiltrated from the Robotics Company Victims, including the proprietary schematics.

Defendants and Charges

HONG, 26, and HUNG, 50, are residents of Macau.  ZHENG, 30, is a resident of Changsha, China.  HONG was arrested on December 25, 2016, in Hong Kong and is now pending extradition proceedings.  The defendants are charged with the following offenses, which carry the maximum prison terms listed below.  The statutory maximum penalties are prescribed by Congress and are provided here for informational purposes only, as any sentencings of the defendants would be determined by the judge.

CountDefendantsChargeMaximum Prison Term
OneHONG, ZHENG, HUNGConspiracy to Commit Securities Fraud: Insider Trading5 years
TwoHONGSecurities Fraud: Insider Trading – Intermune20 years
ThreeZHENGSecurities Fraud: Insider Trading – Intermune20 years
FourHONGSecurities Fraud: Insider Trading – Altera20 years
FiveHUNGSecurities Fraud: Insider Trading – Altera20 years
SixZHENGSecurities Fraud: Insider Trading – Altera20 years
SevenHONGSecurities Fraud: Insider Trading – Borderfree20 years
EightHUNGSecurities Fraud: Insider Trading – Borderfree20 years
NineHONG, ZHENG, HUNGConspiracy to Commit Wire Fraud20 years
TenHONG, ZHENG, HUNGWire Fraud20 years
ElevenHONG, ZHENG, HUNGConspiracy to Commit Computer Intrusion5 years
TwelveHONG, ZHENG, HUNGComputer Intrusion – Unlawful Access – Law Firm-210 years
ThirteenHONG, ZHENG, HUNGComputer Intrusion – Intentional Damage – Law Firm-210 years

 



Mr. Bharara praised the investigative work of the FBI, and thanked the Securities and Exchange Commission for their assistance.  Mr. Bharara also thanked the Office of International Affairs and Hong Kong law enforcement for their assistance in the arrest and apprehension of HONG.  He added that the investigation is continuing.

The charges were brought in connection with the President’s Financial Fraud Enforcement Task Force.  The task force was established to wage an aggressive, coordinated and proactive effort to investigate and prosecute financial crimes.  With more than 20 federal agencies, 94 U.S. attorneys’ offices, and state and local partners, it is the broadest coalition of law enforcement, investigatory and regulatory agencies ever assembled to combat fraud.  Since its formation, the task force has made great strides in facilitating increased investigation and prosecution of financial crimes; enhancing coordination and cooperation among federal, state and local authorities; addressing discrimination in the lending and financial markets; and conducting outreach to the public, victims, financial institutions and other organizations.  Since fiscal year 2009, the Justice Department has filed over 18,000 financial fraud cases against more than 25,000 defendants.  For more information on the task force, please visit www.StopFraud.gov.

This case is being handled by the Office’s Securities and Commodities Fraud Task Force and the Complex Frauds and Cybercrime Unit.  Assistant U.S. Attorneys Andrea M. Griswold, Daniel B. Tehrani, and Kristy J. Greenberg are in charge of the prosecution.

The allegations contained in the Indictment are merely accusations, and the defendants are presumed innocent unless and until proven guilty.

NOTE:  1- As the introductory phrase signifies, the entirety of the text of the Indictment and the descriptions of the Indictment set forth below constitute only allegations, and every fact described should be treated as an allegation.

Original PressReleases… 

Financial Fraud: Richard Shusterman Sentenced For Co-Conspirators Perpetrated a Brazen And Complex Ponzi Scheme That Defrauded Investors

Leader of $242 Million Investment Fraud Scheme Sentenced to 18 Years in Federal Prison

Ponzi Scheme Involved Sale of Medical Debts

Baltimore, Maryland – U.S. District Judge James K. Bredar sentenced Richard Shusterman, age 53, of Highland Beach, Florida, today to 18 years in prison, followed by three years of supervised release, for a wire fraud conspiracy and nine counts of wire fraud in connection with a complex scheme to defraud investors and lenders of $242 million by selling fraudulent investment portfolios of debts purportedly owed by hospital patients.  Judge Bredar also entered orders requiring Shusterman to pay restitution of $171,383,834, and to forfeit $242,485,254.

On May 2, 2016, a federal jury convicted Shusterman, who is the fourth and final conspirator to be convicted in the scheme.  At today’s sentencing, Judge Bredar enhanced Shusterman’s sentence upon finding that Shusterman was the organizer of the criminal activity. Shusterman has been in custody since his conviction.

The sentence was announced by United States Attorney for the District of Maryland Rod J. Rosenstein; Special Agent in Charge Gordon B. Johnson of the Federal Bureau of Investigation, Baltimore Field Office; and Special Agent in Charge Andre R. Watson of U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations (HSI).

“Richard Shusterman and his co-conspirators perpetrated a brazen and complex Ponzi scheme that defrauded investors of more than $242 million,” said U.S. Attorney Rod J. Rosenstein. “The conspirators pretended that they were repaying investors with revenue earned by collecting debts, but they were really using the money of new victims to repay previous investors.”

According to evidence presented at his 22-day trial, Shusterman was a shareholder and president of International Portfolio, Inc. (IPI), located in Pennsylvania.  Co-conspirator Robert Feldman was part owner of IPI, and president of United Consulting, Inc.  Shusterman and Feldman represented that IPI had experience in the purchase, valuation, collection and resale of medical accounts receivable, comprised of past due patient accounts which the hospitals and other entities selling the accounts had been unsuccessful in collecting. Beginning on June 21, 2006, Shusterman and Feldman, through United Consulting and IPI, bought and sold consumer debt, including medical debt portfolios.  From December 2006 through June 2008, IPI paid more than $25 million to purchase over $4.1 billion in medical accounts receivable, comprising more than 3,872,514 past due patient accounts.

Jonathan Rosenberg and Douglas Kuber operated Account Receivable Services, LLC (ARS) in New York, New York.  They agreed to promote the sale of IPI debt portfolio to investors.  Pursuant to their agreement, Shusterman, through IPI, bundled the past due patient accounts from IPI’s inventory into investment portfolios, then sold the portfolios to ARS at a discounted rate.  ARS’s purchases of the medical debt portfolios from IPI came from investors who agreed to lend money to ARS in return for a high, fixed interest rate.  Shusterman and IPI agreed to manage the collection activity for each debt portfolio that IPI sold.  Investors were told that any funds collected by IPI were to be forwarded to escrow accounts opened and maintained by ARS, which, in turn, would use the funds to cover the periodic interest payments and outstanding balances owed to the investors.

Fraudulent Inflation of Purchase Prices for IPI Debt Portfolios to Pay Fees and Commissions

Rosenberg and Kuber misrepresented to investors that a loan secured by IPI debt portfolios would not be used to pay up-front fees and commissions associated with the investment offering.  In fact, however, ARS and IPI agreed to a concealed purchase price for a debt portfolio, then told the investor that the portfolio price was 5% to 10% higher than the concealed price, in order to cover their fees and commissions.  Specifically, Shusterman paid the loan proceeds in excess of the true purchase prices to Rosenberg and Kuber, characterizing these kickbacks as a refund or a rebate. From June 2007 to March 2009, Shusterman paid Kuber and Rosenberg kickbacks totaling in excess of $8 million.

In reliance on the misrepresentations of Rosenberg and Kuber, investors provided loans to ARS of approximately $145 million to purchase IPI debt portfolios, and other investors purchased approximately $122.5 million worth of IPI debt portfolios, all of which IPI managed.

Fraudulent Inflation of Collection Results to Maintain and Increase Investments

In order to induce existing investors to maintain and increase their participation in the investment scheme and to persuade new investors to join, ARS and IPI falsely represented the amount of income being generated from the collection activity for the medical debt portfolios.  According to trial testimony, it became apparent almost from the start that collections were significantly inadequate, not only in their failure to cover periodic interest payments that ARS owed its investors, but also to repay the investors’ principal.

Shusterman and Rosenberg agreed that IPI would advance ARS the money needed to make ARS’s periodic interest payments to the investors.  From July 2008 to December 2009, and without the investors’ knowledge, Shusterman and his co-conspirators wired approximately 209 advances from IPI into the bank accounts of the ARS debt portfolios, which were subsequently used to pay periodic interest payments due to an investor and/or inflate the collection history of the respective investor debt portfolios.  Misleading collection reports were also created to deceive the investors.

After their plan to subsidize ARS with monthly advances was implemented, and to ensure a continuing flow of new funding into the investment scheme, Shusterman and his co-conspirators continued to solicit existing and prospective investors to purchase or finance IPI debt portfolios.  For example, an investor was induced to fund the purchase of 12 more portfolios between July and November 2008, totaling approximately $65 million in new investments.  Another investor representative living in West River, Maryland was induced to fund the purchase of a portfolio on November 8, 2008 for $10 million, and another portfolio on May 26, 2009 for $5 million.  Shusterman and his co-conspirators then fraudulently used the new investor funds to make interest and resale payments in order to meet the investment benchmarks of prior investors.

As a result of the scheme, the loss to investors was $242 million.

New Jersey residents Robert Feldman, age 69, of Beach Haven; Jonathan E. Rosenberg, age 48, of West Orange; and Douglas A. Kuber, age 56, of Livingston, previously pleaded guilty to their participation in the conspiracy and were sentenced to 46 months, five years, and four years in prison, respectively. Judge Bredar also ordered: Feldman and Rosenberg to pay restitution of $148,251,859; and Kuber to pay restitution of $105,565,223.

Today’s announcement is part of the efforts undertaken in connection with the President’s Financial Fraud Enforcement Task Force.  The task force was established to wage an aggressive, coordinated and proactive effort to investigate and prosecute financial crimes.  With more than 20 federal agencies, 94 U.S. attorneys’ offices, and state and local partners, it’s the broadest coalition of law enforcement, investigatory and regulatory agencies ever assembled to combat fraud.  Since its formation, the task force has made great strides in facilitating increased investigation and prosecution of financial crimes; enhancing coordination and cooperation among federal, state and local authorities; addressing discrimination in the lending and financial markets; and conducting outreach to the public, victims, financial institutions and other organizations.  Since fiscal year 2009, the Justice Department has filed over 18,000 financial fraud cases against more than 25,000 defendants.  For more information on the task force, please visit www.StopFraud.gov.

United States Attorney Rod J. Rosenstein thanked the FBI and HSI Baltimore for their work in the investigation.  Mr. Rosenstein praised Assistant U.S. Attorneys Martin J. Clarke and Leo J. Wise, who prosecuted the case.

Original PressReleases…

Tax Fraud: Anthony Cosica Sentenced For Multimillion-Dollar Cigarette Tax Fraud Scheme

Last Defendant in $48 Million Dollar Cigarette Tax Fraud Scheme Sentenced

The case involved untaxed cigarettes sold in all 50 States and was the first prosecution in the nation under federal PACT Act

The last defendant in a domestic and international, multimillion-dollar cigarette tax fraud scheme has been sentenced, the Department of Justice announced today.

On Thursday, U.S. District Judge David L. Bunning sentenced Anthony Cosica, 54, of Pinetop, Ariz., to 24 months in federal prison.  Eight other defendants, including three from eastern Kentucky and two from Russia, have already been sentenced, for charges including conspiracy to commit mail fraud, wire fraud and money laundering and violations of the PACT Act.

This case marks the first prosecution in the nation for violations of the PACT Act, which is a 2010 federal law enacted to prevent trafficking in untaxed cigarettes.

According to court documents and evidence presented at trial, from 2008 to 2013, the defendants devised a scheme that defrauded federal, state and local governments across the country, out of cigarette excise taxes totaling approximately $48 million.   Specifically, the defendants operated mail order and internet businesses engaged in the delivery sales of untaxed cigarettes to customers in all 50 states.

“This case represents a milestone in enforcement of the PACT Act,” said Kerry B. Harvey, U.S. Attorney for the Eastern District of Kentucky. “Mr. Cosica and his co-conspirators devised a complex criminal enterprise of international proportions which cost public treasuries millions of dollars. Congratulations to the law enforcement agencies and our trial team for their superb work in unwinding this criminal scheme.”

The leader of the conspiracy, John Maddux Jr., 56, formerly of Russell, Ky., operated mail order/online businesses that sold the cigarettes at discount prices.  Maddux executed the scheme by forming a business with two Russian nationals, Alexander Sergeev and Mikhail Serov.  Sergeev and Serov shipped cigarettes from Russia directly to customers of Maddux and his co-conspirators.  Evidence at trial further established that Maddux also fulfilled cigarette orders for other co-conspirators, who were also operating similar mail/online businesses.  To get the cigarettes through U.S. Mail, the defendants disguised and marked the cigarettes as gift items, which is a violation of the PACT Act.

Under the PACT Act, businesses are required to register and report cigarette and tobacco sales to state tax administrators, allowing States to properly collect required excise taxes from the businesses.  The defendants intentionally avoided these requirements and millions of dollars in taxes during the scheme.

The defendants received the following prison sentences:  John Maddux 10 years; Christina Carmen, formerly of Russell, Ky., 60 months; David H. White, formerly of Ashland, Ky., 24 months; Julie Coscia, of Pinetop, Ariz., 36 months; Michael E. Smith, of Escondido, Calif., 42 months; Alexander Sergeev, 46 months; Mikhail Serov, 46 months; and Barbara Routh, of Prospect, Ky., two years’ probation.  Under federal law, all defendants must serve at least 85 percent of their prison sentence.

Domestic and International trafficking in untaxed cigarettes via mail order or the Internet defrauds the federal and state governments of hundreds of millions of dollars in tobacco taxes and frequently funds other criminal activity.

U.S. Attorney Harvey; Stewart Lowrey, Special Agent in Charge, Louisville Field Division, Alcohol Tobacco Firearms and Explosives; Tracey Montano, Special Agent in Charge, Nashville Field Office, Internal Revenue Service-Criminal Investigations; Richard Deer, Acting Special Agent in Charge, Philadelphia Regional Office of the U.S. Department of Labor, Office of Inspector General, Office of Labor Racketeering and Fraud Investigations; and Mark McCormack, Special Agent in Charge, Metro Washington Field Office, U.S. Food and Drug Administration, jointly announced the sentence.

The investigation was conducted by the Bureau of Alcohol Tobacco Firearms and Explosives, the Internal Revenue Service-Criminal Investigations, the United States Department of Labor, Office of Inspector General, and U.S. Food and Drug Administration. Assistant United States Attorneys Laura K. Voorhees and Wade T. Napier, and ATF Associate Chief Counsel, Jeffery A. Cohen, prosecuted this case on behalf of the federal government.

Original PressReleases… 

Financial Fraud: Umair Hamid Charged with Wire Fraud, Aggravated Identity Theft, and Worldwide “Diploma Mill” Scheme

Manhattan U.S. Attorney Charges Executive Of Axact In $140 Million Diploma Mill Scam

Preet Bharara, the United States Attorney for the Southern District of New York, Philip R. Bartlett, Inspector-in-Charge of the New York Office of the U.S. Postal Inspection Service (“USPIS”), and William F. Sweeney Jr., the Assistant Director-in-Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced today the filing of a criminal Complaint charging UMAIR HAMID, a/k/a “Shah Khan,” a/k/a the “Shah,” with wire fraud, conspiracy to commit wire fraud, and aggravated identity theft in connection with a worldwide “diploma mill” scheme that collected at least approximately $140 million from tens of thousands of consumers.  As alleged, HAMID and his co-conspirators made false and fraudulent representations to consumers on websites and over the phone to trick them into enrolling in purported colleges and high schools, and issued fake diplomas upon receipt of upfront fees from consumers.  HAMID was arrested on December 19, 2016, and was presented yesterday in federal court in Fort Mitchell, Kentucky.

Manhattan U.S. Attorney Preet Bharara said:  “As alleged, while promising the rewards of a higher education, Umair Hamid was actually just peddling diplomas and certifications from fake schools.  Hamid allegedly took hefty upfront fees from young men and women seeking an education, leaving them with little more than useless pieces of paper.”

USPIS Inspector-in-Charge Philip R. Bartlett said:  “Mr. Hamid took advantage of the aspirations and dreams of thousands wanting a college education by devising a scheme to issue college coursework, degrees and certifications not worth the paper they were printed on. Postal Inspectors and their law enforcement partners will spare no resource to bring these scammers to justice, protecting those striving for higher education and opportunities.”

FBI Assistant Director-in-Charge William F. Sweeney Jr. said:  “Thousands of people’s hopes were crushed as this alleged diploma mill scheme came crashing down.  Victims took at face value the lies Hamid and his co-conspirators are alleged to have sold them.  Today, we’re rewriting the lesson plan.”

According to the allegations contained in the Complaint filed today in Manhattan federal court:

The Axact Scheme

HAMID, using the aliases “Shah Khan” and the “Shah,” and others operated a massive education “diploma mill” through the Pakistani company “Axact,” which has held itself out as one of the world’s leading information technology (“IT”) providers.  Working on behalf of Axact, HAMID and others made misrepresentations to individuals across the world, including throughout the United States and in the Southern District of New York, in order to dupe these individuals into enrolling in supposed high schools, colleges, and other educational institutions.  Consumers paid upfront fees to HAMID and his co-conspirators, believing that in return they would be enrolled in real educational courses and, eventually, receive legitimate degrees.  Instead, after paying the upfront fees, consumers did not receive any legitimate instruction and were provided fake and worthless diplomas.

Axact promoted and claimed to have an affiliation with approximately 350 fictitious high schools and universities, which Axact advertised online to consumers as genuine schools.  During certain time periods since 2014, Axact received approximately 5,000 phone calls per day from individuals seeking to purchase Axact products or enroll in educational institutions supposedly affiliated with Axact.  At least some of those consumers appeared to believe that they were calling phone numbers associated with the respective schools.  When consumers asked where the schools were located, sales representatives were instructed to give fictitious addresses.

Once a consumer paid for a school certificate or diploma that falsely reflected a completed course of study, Axact sales agents were trained to use sales techniques to convince the consumer that the consumer should also purchase additional “accreditation” or “certifications” for such certificates or diplomas in order to make them appear more legitimate.  Axact, through HAMID and his co-conspirators, falsely “accredited” purported colleges and other educational institutions by arranging to have diplomas from these phony educational institutions affixed with fake stamps supposedly bearing the seal and signature of the U.S. Secretary of State, as well as various states and state agencies and federal and state officials.

HAMID’s Role in the Scheme

HAMID served as Axact’s “Assistant Vice President of International Relations.”  While based in Pakistan, HAMID was involved in managing and operating online companies that falsely held themselves out to consumers over the Internet as educational institutions.  Among other things, HAMID made various false and fraudulent representations to consumers in order to sell fake diplomas.  At HAMID’s direction, the websites of purported “schools” (1) falsely represented that consumers who “enrolled” with the schools by paying tuition fees would receive online instruction and coursework, (2) sold bogus academic “accreditations” in exchange for additional fees, (3) falsely represented that the schools had been certified or accredited by various educational organizations, and (4) falsely represented that the schools’ degrees were valid and accepted by employers, including in the United States.

As a further part of the scheme, HAMID and a co-conspirator (1) opened bank accounts in the United States in the names of shell entities, effectively controlled by HAMID, which received funds transferred by consumers in exchange for fake diplomas, (2) transferred funds from those bank accounts to bank accounts associated with other entities located elsewhere in the United States, the United Arab Emirates, and Canada, at the direction of HAMID, and (3) opened and operated an account with Paypal, the online payment service provider, to collect and distribute consumer funds obtained in connection with their fraudulent scheme.

In or about May 2015, Axact was shut down by Pakistani law enforcement, and certain individuals associated with Axact were prosecuted in Pakistan.  Nevertheless, after May 2015, HAMID resumed his fraudulent business of selling fake diplomas to consumers in the United States for upfront fees based upon false and fraudulent representations.  Most recently, HAMID traveled to the United States in order to open a bank account that he has used to collect money from consumers he defrauded.


HAMID, 30, of Karachi, Pakistan, is charged with one count of conspiracy to commit wire fraud and two counts of wire fraud, each of which carries a maximum sentence of 20 years in prison; and one count of aggravated identity theft, which carries a mandatory minimum sentence of two years in prison.  The maximum potential sentences are prescribed by Congress and are provided here for informational purposes only, as any sentencing of the defendant will be determined by the judge.

Mr. Bharara praised the investigative work of the FBI and Postal Inspection Service.  Mr. Bharara noted that the investigation remains ongoing.

If you believe you were a victim of this crime, including a victim entitled to restitution, and you wish to provide information to law enforcement and/or receive notice of future developments in the case or additional information, please contact the Victim/Witness Unit at the United States Attorney’s Office for the Southern District of New York, at (866) 874-8900.  For additional information, go to http://www.usdoj.gov/usao/nys/victimwitness.html.

The prosecution of this case is being handled by the Office’s Complex Frauds and Cybercrime Unit.  Assistant United States Attorneys Edward A. Imperatore and Noah D. Solowiejczyk are in charge of the prosecution.

The charges contained in the Complaint are merely accusations, and the defendant is presumed innocent unless and until proven guilty.

Original PressReleases… 

Investment Fraud: Naris Chamroonrat Charged Of Conspiracy to Commit Securities Fraud And One Count of Wire Fraud

Owner Of Day Trading Firm Charged In Worldwide Simulator Trading Account Scheme

Scheme Targeted Hundreds of Investors in Over 30 Countries, Including the United States

NEWARK, N.J. – A Thai man was arrested and charged with allegedly orchestrating a scheme to defraud hundreds of investors worldwide of at least $1.4 million through his operations of a purported online day trading firm, U.S. Attorney Paul J. Fishman announced today.

Naris Chamroonrat, 33, of Bangkok, Thailand, is charged by complaint with one count of conspiracy to commit securities fraud and one count of wire fraud. Chamroonrat was arrested by special agents of the FBI on Dec. 20, 2016, at the Los Angeles International Airport in California. He is scheduled to appear later today before U.S. Magistrate Judge Frederick Mumm in Los Angeles federal court.

According to the complaint:

From December 2013 to June 2015, Chamroonrat and his conspirators allegedly solicited individual investors to open day-trading accounts with his company, Nonko Trading, and to wire thousands of dollars to the company to fund those accounts. Instead of using the money to fund the accounts, he and his conspirators allegedly stole $1.4 million from more than 260 investors in more than 30 countries. To cover up the theft, Chamroonrat provided the victims with online trading simulator, or “demo,” accounts, but told the investors they were real accounts to be used to trade securities. The majority of those funds were transferred to foreign bank accounts controlled by Chamroonrat and used for personal expenses or other unauthorized transactions. The victims of the scheme included at least 180 investors from the United States, including several in New Jersey.

Chamroonrat and others chose as victims those customers they believed would not make money day trading, and would therefore be less likely to try to withdraw funds from their accounts. These inexperienced, unsophisticated “losing” traders would simply believe they lost their money trading in the open markets.  If traders on the demo accounts started to appear profitable, Nonko would switch them to real accounts.

Chamroonrat and his conspirators discussed the scheme in detail in email and online chat communications.  In one online communication between Chamroonrat and a conspirator on Feb. 3, 2014, Chamroonrat allegedly discussed the scheme, which he commonly referred to as Nonko’s “TRZ Program.”  He stated, “We also have the trz program, where instead [of] a live account it’s a trz account and if they blow it all up, then great, firm still profits.”  The conspirator responded: “and thing with TRZ that freaks me out … THE ONLY THING … someone … will make money … what happens when they do make money?” Chamroonrat replied, “bump them off of trz, put them on a real account[,] give them more leverage in exchange for a profit split.”

The conspiracy count with which Chamroonrat is charged carries a maximum potential penalty of five years in prison and a $250,000 fine, or twice the gain or loss from the offense.  The wire fraud count carries a maximum potential penalty of 20 years in prison and a $250,000 fine, or twice the gain or loss from the offense.

In a separate civil action, the Securities and Exchange Commission today filed a complaint in Newark federal court charging Chamroonrat with violating and aiding and abetting violations of the antifraud provisions of the securities laws. The complaint seeks a permanent injunction as well as the return of ill-gotten gains plus interest and penalties.

U.S. Attorney Fishman credited special agents of the FBI, under the direction of Special Agent in Charge Timothy Gallagher, with the investigation leading to today’s charges. He also thanked the SEC for its valuable assistance in the investigation.

The government is represented by Assistant U.S. Attorney Nicholas P. Grippo of the Economic Crimes Unit.

The charge and allegations contained in the complaint are merely accusations, and the defendant is presumed innocent unless and until proven guilty.

Original PressReleases…

Tax Fraud: Kevin Brown, Formerly of Capitol Heights, Sentenced For Identity Theft and Tax Fraud Scheme

 Maryland Man Sentenced to 135 Months in Prison For Scheme That Used Stolen Identifying Information To Fraudulently Seek More Than $20 Million in Tax Refunds

Stole Identities of Nursing Home Patients and Others

WASHINGTON – A Maryland man was sentenced today to 135 months in prison on federal charges stemming from his role as a key organizer and leader of an identity theft and tax fraud scheme involving the filing of fraudulent returns falsely seeking more than $20 million in refunds, announced Principal Deputy Assistant Attorney General Caroline D. Ciraolo, head of the Justice Department’s Tax Division, U.S. Attorney Channing D. Phillips for the District of Columbia, Acting Special Agent in Charge Thomas J. Holloman of the Internal Revenue Service-Criminal Investigation (IRS-CI) Washington D.C. Field Office, Inspector in Charge Terrence P. McKeown of the U.S. Postal Inspection Service, Washington Division, and Assistant Inspector General for Investigations John L. Phillips of the U.S. Department of the Treasury.

Kevin Brown, formerly of Capitol Heights, Maryland, is among approximately 20 participants in this scheme who have pleaded guilty to charges in the U.S. District Court for the District of Columbia.  According to court documents, the overall case involves the filing of at least 12,000 fraudulent federal income tax returns that sought refunds of at least $20 million.

“Kevin Brown led a sprawling identity theft scheme that cost the government millions in fraudulently claimed income tax refunds, and caused substantial harm to those whose identities were stolen,” said Principal Deputy Assistant Attorney General Ciraolo. “Today’s significant prison sentence punishes Brown for his conduct and serves as a clear warning to those engaged in or considering similar conduct that the government will prosecute these crimes and will seek incarceration and restitution.”

“Although Kevin Brown owned a neighborhood barbershop, he was making most of his money through illegal means, as a key organizer and leader of a massive tax fraud scheme,” said U.S. Attorney Phillips.  “He and his many co-conspirators falsified tax returns in the names of some of the most vulnerable members of our society, including individuals who were elderly, infirm, disabled, incarcerated, and deceased, and then pocketed millions of dollars in tax refunds at a cost to hard-working taxpaying citizens. Thanks to a concerted effort by law enforcement, this defendant and the others in the scheme will be held accountable with prison terms and orders for restitution.”

“Criminal conspiracies involving fraudulent refund schemes are loathsome crimes that victimize our nation’s honest taxpayers,” said Acting Special Agent in Charge Holloman. “Today’s sentencing is a reminder that IRS-CI will remain vigilant in our investigation of these schemes and will continue to work with prosecutors to combat this type of criminal conduct.”

“Identity theft and fraud are a continuing problem in our society,” said Inspector in Charge McKeown. “The U.S. Postal Inspection Service aggressively investigates these types of crimes when they involve the U.S. Mail.  This case serves as another example of the significant positive results from collaborating with our law enforcement partners to achieve justice.”

“This sentencing of Mr. Brown is reflective of the commitment by the Treasury’s Office of Inspector General and its law enforcement partners to pursue criminal charges against individuals and groups that prey on the public by stealing identities and fraud committed against the U.S. taxpayer and Treasury Department in their criminal schemes,” said Assistant Inspector General Phillips.

According to the government’s evidence, Brown and others participated in a massive and sophisticated stolen identity refund fraud scheme that involved an extensive network of more than 130 people, many of whom were receiving public assistance.  Brown and his co-conspirators fraudulently claimed refunds for tax years 2005 through 2012, often in the names of people whose identities had been stolen, including the elderly, people in assisted living facilities, drug addicts and incarcerated prisoners.  Returns were also filed in the names of, and refunds were issued to, willing participants in the scheme.  The returns filed listed more than 400 “taxpayer” addresses located in the District of Columbia, Maryland and Virginia.

The participants played various roles in the scheme: stealing identifying information; allowing their personal identifying information to be used; creating and mailing fraudulent federal tax returns; allowing their addresses to be used for receipt of the refund checks; cashing the refund checks; providing bank accounts into which the refund checks were deposited; and forging endorsements of identity theft victims on the refund checks.  The false returns typically reported inflated or fictitious income from a sole proprietorship and claimed phony dependents to generate an Earned Income Tax Credit, a refundable federal income tax credit for working families with low to moderate incomes.

According to the government’s evidence, Brown was a key organizer and leader of the scheme and recruited others to join in the illegal activities.  Brown, who owns Classic Kutz, a barbershop in the 3200 block of 22nd Street SE in Washington, D.C., sometimes listed that establishment as the business name on the fraudulent returns.  Among other things, he prepared and mailed fraudulent returns, and endorsed and deposited fraudulently obtained refund checks.

Brown pleaded guilty on Feb. 15, 2013, to conspiracy to defraud the government with respect to claims, making false, fictitious or fraudulent claims for a tax refund, and fraud and related activity in connection with identification information (identity theft).  In addition to the term of prison imposed, U.S. District Judge Ellen S. Huvelle for the District of Columbia ordered Brown to serve three years of supervised release and to pay $4,543,659 in restitution to the IRS.

Principal Deputy Assistant Attorney General Ciraolo, U.S. Attorney Phillips, Acting Special Agent in Charge Holloman, Inspector in Charge McKeown, and Assistant Inspector General Phillips commended special agents who conducted the investigation and acknowledged the efforts of those who worked on the case from the U.S. Attorney’s Office of the District of Columbia, including former Assistant U.S. Attorney Sherri L. Schornstein and Paralegal Specialists Donna Galindo, Julie Dailey, and Jessica Mundi.  Finally, they expressed appreciation for the work of Assistant U.S. Attorney Ellen Chubin Epstein of the District of Columbia’s Fraud and Public Corruption Section and Trial Attorneys Jeffrey B. Bender, Thomas F. Koelbl, and Jessica Moran of the Tax Division, who prosecuted the case.

Additional information about the Tax Division and its enforcement efforts may be found on the division’s website.

Original PressReleases…

Cyber Crime: DAVID W. KENT, Owner Of Oilpro.com, Guilty In Hacking Into a Competitor’s Network and Stealing Client Data

Oilpro.Com Founder Pleads Guilty In Manhattan Federal Court To Hacking Into Competitor’s Computer System

Defendant Stole Information From Over 700,000 Customer Accounts Stored on a Competitor’s Database and Then Sought to Sell Oilpro.com to the Company He Had Hacked

Preet Bharara, the United States Attorney for the Southern District of New York, and William F. Sweeney Jr., Assistant Director-in-Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced today that DAVID W. KENT, the founder of professional networking website Oilpro.com (“Oilpro”), pled guilty this morning before U.S. District Judge Denise L. Cote in Manhattan federal court to a superseding Information, which charged him with one count of intentionally accessing a protected computer without authorization.  The charge stemmed from KENT’s role in repeatedly hacking into a competitor’s database to steal customer information and attempting to sell Oilpro to the same company whose database KENT had hacked.

Manhattan U.S. Attorney Preet Bharara said:  “David Kent has admitted to his role in hacking into a competitor’s network and stealing client data in order to boost the value of Oilpro, a company he founded.  Kent then attempted to sell Oilpro to the very company he hacked.  Using cyber hacking to gain advantage over a competitor is not only an unfair business practice, but is a federal crime for which Kent has now pled guilty.”

FBI Assistant Director William F. Sweeney said:  “Today, David Kent pled guilty to intentionally accessing a protected computer without authorization. This is a stern reminder to others that unauthorized access to a computer is a federal crime with severe penalties; even just a quick look at the data on the computer can lead to a prison sentence and that never leads to a leg up in business.”

According to the superseding Information, the previously filed Complaint, and statements made at public court proceedings:

In or about March 2000, KENT founded a website (“Website-1”) that provides, among other things, networking services to professionals working in the oil and gas industry.  Website-1 allows its members to create profiles, which includes personal and professional information.  As part of their profiles, members can also upload their resumes.  The profiles are contained in a database maintained by Website-1 (the “Members Database”).  Members are assigned login credentials (i.e., usernames and passwords) when they create their profiles.  Members use these login credentials to access their profiles.

In or around August 2010, KENT sold Website-1 for approximately $51 million to a publicly traded company headquartered in New York, NY (“Company-1”).  KENT entered into an employment agreement with Company-1 and agreed to continue to serve as the president of Website-1 after the acquisition.  However, KENT left Website-1 in September 2011 and launched Oilpro in October 2013.  Like Website-1, Oilpro provides networking services to professionals working in the oil and gas industry.  Oilpro is headquartered in Houston, Texas.

Between October 2013 and February 2016, KENT conspired to access information belonging to Website-1 without authorization and to defraud Company-1.  KENT accessed the Website-1 Members Database without authorization and stole customer information, including information from over 700,000 customer accounts.  KENT then exploited this information by inviting Website-1’s members to join Oilpro.  Similarly, one of Kent’s employees at Oilpro who previously worked for Website-1 (“CC-1”) accessed information in Website-1’s Google Analytics account without authorization and forwarded the information to KENT.  In the meantime, KENT attempted to defraud Company-1 by misrepresenting during discussions about a potential acquisition of Oilpro by Company-1 that Oilpro had increased its membership through standard marketing methods.


KENT, 41, of Spring, Texas, was arrested on March 30, 2016.  KENT pled guilty today to one count of intentionally accessing a protected computer without authorization, which carries a maximum penalty of five years in prison.

The maximum potential sentence is prescribed by Congress and is provided here for informational purposes only, as any sentencing of the defendant will be determined by the judge.

KENT is scheduled to be sentenced by Judge Cote on March 17, 2017, at 2:00 p.m.

Mr. Bharara praised the investigative work of the Federal Bureau of Investigation.  Mr. Bharara also thanked the Office of International Affairs and the United Kingdom’s National Cyber Crime Unit (NCCU), and noted that the investigation is continuing.

This case is being handled by the Office’s General Crimes Unit.  Assistant United States Attorneys Sidhardha Kamaraju and Andrew K. Chan are in charge of the prosecution.

Financial Fraud: Phillip E. Southwood former owner of Southwood Industries, Inc., Sentenced for Multiple Bankruptcy-Related Crimes

Small Business Owner Sentenced to Prison for Bankruptcy Fraud

Assistant U.S. Attorneys Joseph J.M. Orabona (619)546-7951 or Michael Heyman (619) 546-9615
NEWS RELEASE SUMMARY December 19, 2016

SAN DIEGO – Phillip E. Southwood, Jr., a 50-year-old former owner of Southwood Industries, Inc., a holding company for Jefferson Liquor in Poway, was sentenced in federal court today to 12 months and one day in prison for multiple bankruptcy-related crimes. Southwood was also ordered to pay $119,000 in restitution.

Following a referral from the U.S. Trustee’s Office and a lengthy investigation by the Federal Bureau of Investigation, Southwood was indicted on six counts of fraud involving his personal Chapter 7 bankruptcy, including bankruptcy fraud, making false oaths in bankruptcy, and making false statements under penalty of perjury in bankruptcy. After a two-week jury trial before U.S. District Judge M. James Lorenz in January 2016, the jury deliberated for several hours and found Southwood guilty on all 6 counts.

According to the evidence proven at trial and court documents, Southwood devised a scheme to defraud his creditors by voluntarily filing a false and fraudulent bankruptcy petition. From at least December 2007 and continuing up to and including March 5, 2009, Southwood caused a number of acts to be undertaken in furtherance of his fraudulent scheme.

He drafted and executed a fraudulent Fictitious Business Name Statement for Southwood Industries, whereby he admittedly forged his father’s signature. Thereafter, Southwood caused his parents to open a bank account for the purpose of receiving and concealing proceeds from the sale of a liquor store. Southwood was not named on this account.

Then, Southwood caused to be deposited approximately $171,000 in cash from that sale into the account he directed his parents to open. Once the funds were deposited into this account, Southwood directed his parents to use the funds to pay for Southwood’s personal expenses and to give him cash at his request.  When he filed his bankruptcy on March 5, 2008, Southwood concealed the proceeds from the sale of the liquor store and the bank account opened by his parents at Southwood’s direction which was used to receive and disburse these funds.

During the bankruptcy process, Southwood testified falsely about his schedules and financial affairs, including the funds he received from the sale of the liquor store. Southwood made false statements about the amount of cash he had on hand on the date he filed his bankruptcy. Southwood also made false statements about the timing and amount of preferential payments he made to certain creditors, family members, and insiders prior to filing his bankruptcy.

“The bankruptcy system is intended to provide eligible individuals an opportunity to obtain a fresh financial start. Unfortunately, in this case, the defendant used the bankruptcy system as a means to defraud his creditors by concealing a substantial amount of money that could have been used to pay off most of his debts,” said U.S. Attorney Laura Duffy. “Individuals who are contemplating bankruptcy are reminded that if they intentionally abuse the bankruptcy process, they will be investigated and prosecuted for their crimes.”

“Criminal bankruptcy fraud threatens the integrity of the bankruptcy system, as well as public confidence in that system,” said Tiffany Carroll, Acting U.S. Trustee for Southern California, Hawaii, and Guam (Region 15). “I am grateful to U.S. Attorney Laura Duffy and our law enforcement partners for their commitment to combating bankruptcy-related crimes, as demonstrated by today’s sentencing.”

The U.S. Trustee Program is the component of the Justice Department that protects the integrity of the bankruptcy system by overseeing case administration and litigating to enforce the bankruptcy laws. Region 15 is headquartered in San Diego, with an additional office in Honolulu.

SUMMARY OF CHARGES:

Count 1 – Bankruptcy Fraud (Title 18, United States Code, Section 157(1))

Maximum Penalties: 5 years in prison and $250,000 fine

Counts 2-3 – False Oath and Account in Bankruptcy (Title 18, United States Code, Section 152(2))

Maximum Penalties: 5 years in prison and $250,000 fine

Counts 4-6 – False Statement in Bankruptcy (Title 18, United States Code, Section 152(3))

Maximum Penalties: 5 years in prison and $250,000 fine

AGENCY

Federal Bureau of Investigation

Original PressReleases…

Investment Fraud: Seven Individuals Charged With Securities Fraud, Investment Adviser Fraud And Securities Fraud Conspiracy

Platinum Partners’ Founder And Chief Investment Officer Among Five Indicted In A $1 Billion Investment Fraud

Two Additional Individuals Indicted In A $50 Million Bond Fraud Involving Black Elk Energy, One Of Platinum’s Largest Portfolio Companies

BROOKLYN, N.Y. – An eight-count indictment was unsealed this morning in federal court in Brooklyn, New York, charging seven defendants, all of whom are or were formerly affiliated with Platinum Partners L.P. (Platinum), a purportedly $1.7 billion hedge fund based in New York, New York.  The indicted individuals are: Mark Nordlicht, the founder and Chief Investment Officer of Platinum; David Levy, the co-Chief Investment Officer of Platinum; Uri Landesman, the former Managing Partner and President of Platinum; Joseph SanFilippo, the Chief Financial Officer of Platinum’s signature hedge fund; Joseph Mann, a member of Platinum’s Investor Relations and Finance Departments; Daniel Small, a former Managing Director and co-Portfolio Manager of Platinum; and Jeffrey Shulse, the former Chief Executive Officer and Chief Financial Officer of Black Elk Energy Offshore Operations, LLC (Black Elk).

Nordlicht, Levy, Landesman, SanFilippo and Mann are charged with securities fraud, investment adviser fraud, securities fraud conspiracy, investment adviser fraud conspiracy and wire fraud conspiracy for defrauding investors through, among other things, the overvaluation of their largest assets, the concealment of severe cash flow problems at Platinum’s signature fund, and the preferential payment of redemptions.  Nordlicht, Levy, Small and Shulse are charged with securities fraud, securities fraud conspiracy and wire fraud conspiracy for defrauding Black Elk’s independent bondholders through a fraudulent offering document and diverting more than $95 million in proceeds to Platinum by falsely representing in the offering document that Platinum controlled approximately $18 million of the bonds when, in fact, Platinum controlled more than $98 million of the bonds.

Nordlicht, Levy, Landesman, SanFilippo, Mann, Small and Shulse will be arraigned later today before United States Magistrate Judge Lois Bloom at the United States Courthouse, 225 Cadman Plaza East, Brooklyn, New York.  Shulse’s initial appearance for removal proceedings to the Eastern District of New York is scheduled for this afternoon at the United States Courthouse, 515 Rusk Avenue, Houston, Texas.

The charges were announced by Robert L. Capers, United States Attorney for the Eastern District of New York; William F. Sweeney, Jr., Assistant Director-in-Charge, Federal Bureau of Investigation, New York Field Office (FBI); and Philip Bartlett, Inspector-in-Charge, United States Postal Inspection Service, New York Division (USPIS).

“As alleged, Nordlicht and his cohorts engaged in one of the largest and most brazen investment frauds perpetrated on the investing public, earning Platinum more than $100 million in fees during the charged conspiracy.  Platinum Partners purported to be a standard bearer in the hedge fund industry, reporting annual average returns of more than 17 percent since inception in 2003.  In reality, their returns were the result of the overvaluation of their largest assets, which eventually led to Nordlicht and his co-conspirators operating Platinum like a Ponzi scheme, where they used loans and new investor funds to pay off existing investors,” stated United States Attorney Capers.  “The charges and arrests announced today reflect our steadfast commitment to holding accountable hedge funds on Wall Street who rip off investors for personal gain.”  Mr. Capers thanked the Securities and Exchange Commission, New York Regional Office (SEC) for their significant cooperation and assistance during the investigation.

“This case shows how several members of this firm allegedly manipulated and lied to investors about the health of the investments they were making, and then plotted ways to cover up their actions.  The FBI and our law enforcement partners do all we can to stop these schemes and to keep fraudsters from stealing from investors, but we can’t do it alone.  We need people to call us when they see things that don’t add up, or don’t make sense,” stated FBI Assistant Director-in-Charge Sweeney.

“These Platinum Partners employees devised a scheme to lure investors to funds they managed knowing the funds were insolvent and would not return the high yields they claimed. Postal Inspectors will never tolerate unfairness in the market and will vigorously pursue and bring to justice anyone who breaks the law, ensuring there is an honest and secure trading environment for investors,” stated USPIS Inspector-in-Charge Bartlett.


As detailed in the indictment, between 2011 and 2016, Nordlicht and Levy, together with their co-conspirators, orchestrated two separate schemes: (i) a scheme to defraud investors and prospective investors in funds managed by Platinum; and (ii) a scheme to defraud third-party holders of Black Elk’s bonds.

The Fraudulent Investment Scheme

Platinum was a hedge fund founded in 2003 and based in New York, New York.  Since September 2011, Platinum was registered with the SEC as an investment adviser.  Platinum managed several hedge funds, but the vast majority of its assets were invested through Platinum Partners Value Arbitrage Fund, L.P. (PPVA) and Platinum Partners Credit Opportunities Master Fund, L.P. (PPCO).  Platinum charged its investors a two percent management fee and a 20 percent incentive or performance fees.  In March 2016, Platinum reported to regulators, including the SEC, that it had $1.7 billion in assets under management (AUM), including approximately $1.1 billion in gross asset value in PPVA and more than $590 million in PPCO.

Between November 2012 and December 2016, Nordlicht, Levy, Landesman, SanFilippo and Mann, together with others, participated in a scheme to defraud investors and prospective investors in Platinum through lies and omissions relating to, among other things: (i) the performance of some of PPVA’s highly illiquid and privately-held assets; (ii) PPVA’s accessibility to cash or assets that could easily be converted into cash; (iii) the purpose of loans raised through investors and the use of those loan proceeds; and (iv) PPVA’s preferential redemption, or investor payment, process.  Specifically, Platinum fraudulently overvalued some of PPVA’s highly illiquid and privately-held assets in order to, among other things, boost performance numbers, attract new investors, retain existing investors and extract high management and incentive fees.  From 2012 through 2016, Platinum extracted more than $100 million in fees based, in large part, on their overvalued assets.  Platinum’s overvaluation of some of their assets precipitated a severe cash crunch, which Platinum initially attempted to mitigate through high-interest loans between its various hedge funds and related entities.  When the inter-fund loans proved insufficient to resolve PPVA’s cash crunch, Platinum began selectively paying some investors ahead of others, contrary to the terms of its governing documents.

As early as 2012, Nordlicht and his co-conspirators knew that PPVA was in trouble, but concealed that reality from investors and prospective investors.  For example, on November 6, 2012, upon learning that PPVA’s investors had sought $27 million in redemptions, Nordlicht exchanged emails with Landesman that stated, in part: “If we don’t exceed [the $27 million in redemptions] in [subscriptions] . . . we are probably going to have to put black elk in side pocket . . . It’s just very daunting.  It seems like we make some progress and then [redemptions] are relentless almost.  It’s tough to get ahead in [subscriptions] if u have to replace 150-200 a year.”

By 2014, the defendants were relying almost exclusively on new investments and inter-fund loans to pay redemptions to PPVA’s investors.  For example, on April 29, 2014, when faced with requests from investors who had not yet received their redemptions, Nordlicht sent an email to SanFilippo that stated, in part: “Start paying down [redemptions] as [you] can.  Between [a new investor] and [a one-off loan] (additional 10 million), [should] have decent short term infusion.  Hopefully some [M]ay 1 [new investments] show up as well.  Have a few more outflows to discuss but this is obviously the priority.”  Nordlicht and his co-defendants concealed PPVA’s cash crunch and selective redemption payments from investors.  For example, in an investor call on January 14, 2015, Nordlicht stated, in part: “If we look historically, we’ve been very very fortunate . . . we’re running about a billion four between all our different entities . . . I think we’ve returned about double that in cash to investors, so that is really an indication of . . . being very very liquid and nimble . . . in terms of 2015 for PPVA, we are targeting much higher returns than normal.”

Nordlicht’s and Landesman’s knowledge of Platinum’s dire situation was perhaps best illustrated by an email exchange on December 13, 2015.  When Nordlicht forwarded an email to Landesman where he had informed a co-conspirator that his wife was convincing him to get on a flight to Israel if he was unable to get a loan from his partners to save the fund, Landesman responded: “You should get on the flight if there is no bridge [loan], probably even if there is . . . We need to go through the mehalech of how we are going to share this with clients and employees, going to be very rough, big shame . . . it was nice seeing you, hopefully the girls will reacclimate [sic] quickly.”  Notwithstanding the above email exchange, on February 7, 2016, Landesman sent an email to an investor that stated, in part: “Fund is sound, I believe, new structure ideal.  Mark [Nordlicht] is really energized.  Hope to be beyond liquidity concerns forever by end of May, we welcome your further investment.”

PPVA was heavily invested in oil and gas companies that performed significantly below expectations and the valuations that Platinum attributed to them.  These valuations were further undermined by the plummeting price of oil, which dropped from approximately $105 per barrel in December 2013, to approximately $60 per barrel in December 2014, to approximately $36 per barrel in December 2015.

Despite the severe problems that PPVA was facing beginning in at least 2012, Platinum reported that PPVA’s AUM increased from approximately $727 million at the end of 2012, to approximately $757 million at the end of 2013, to approximately $770 million at the end of 2014, to approximately $910 million at the end of 2015.  Platinum collected two percent management fees off these amounts and 20 percent incentive fees off the profits.

The Fraudulent Black Elk Bond Scheme

From approximately November 2011 to December 2016, Nordlicht, Levy, Small and Shulse, together with their co-conspirators, orchestrated a fraudulent scheme to defraud third-party holders of Black Elk’s publicly-traded bonds (the bondholders) by diverting the proceeds from the sale of the vast majority of Black Elk’s most lucrative assets to Platinum even though the bondholders had priority over Platinum’s equity interests.  As early as November 2011, Nordlicht, Levy and Small were plotting to deceive the bondholders.  For example, when Nordlicht learned about the relevant covenants associated with the bonds, he sent an email to Levy, Small and another that stated: “Seem like there are bond[s] to be had out there and an additional 60 million is 24 down . . . We [would] have to figure it out . . . I’m sure we can get them in friendly hands if the covenants are going to be an obstacle.”

By late 2013, faced with the fact that Black Elk was effectively insolvent but knowing that Black Elk still possessed certain valuable assets, the defendants pursued opportunities to sell Black Elk’s assets while simultaneously pursuing a fraudulent strategy to divert the proceeds from any such asset sale to the preferred equity stockholders, which were controlled by Platinum, instead of the bondholders.  To execute this scheme, in early 2014, the defendants caused Platinum to purchase Black Elk bonds on the open market to gain control of a majority of the $150 million of outstanding bonds.  Platinum purchased and then transferred the bonds through a number of related entities in an effort to conceal Platinum’s ownership and control of the bonds.

By approximately April 2014, Platinum owned and controlled approximately $98 million of the $150 million of outstanding bonds.  Between March 2014 and April 2014, Platinum and its related parties also purchased the vast majority of the outstanding preferred equity that was owned by third parties to obtain nearly 100 percent ownership of the preferred equity.  By approximately May 2014, when alternative approaches failed, the defendants, together with others, determined that the only path to getting the preferred equity paid ahead of the bondholders was through a cash tender offer and consent solicitation process.  On July 2, 2014, Small forwarded an email from a Platinum trader to Nordlicht and Levy that set forth the following summary of the $98,631,000 of the bonds controlled by Platinum: (i) PPCO: $32,917,000; (ii) PPVA: $18,321,000; (iii) PPLO: $17,046,000; (iv) BAM [a related entity]: $13,360,000; and (v) BBIL [a related entity]: $16,987,000.  Nevertheless, in response to a query from an attorney, on July 9, 2014, Small sent an email that stated, in part: “$18,321,000 bonds are controlled by PPVA and should be disclosed and excluded from the calculation.  I believe this implies that $65,840,000 are required to obtain a majority consent.”

On July 16, 2014, Black Elk announced that it had commenced a public offer for the bonds (the Consent Solicitation).  The Consent Solicitation and accompanying press release provided, among other things, that: (i) Black Elk had commenced a cash tender offer to purchase the outstanding bonds at par value; (ii) Black Elk was soliciting bondholders’ consents to modify certain of the restrictive covenants governing the bonds; (iii) the bondholders that tendered their bonds would be considered to have validly delivered their consent to the proposed amendments; (iv) the bondholders could also consent to the proposed amendments without tendering their bonds; (v) the Consent Solicitation was being made in connection with the sale of assets and the net proceeds of the sale would be used by Black Elk to purchase the tendered bonds; and (vi) the offer would expire at 5:00 p.m. New York time on August 13, 2014.

Notably, the Consent Solicitation prohibited “any person directly or indirectly controlling or controlled by or under direct or indirect common control with [Black Elk]” from voting in the Consent Solicitation process.  Thus, the approximately $98 million of bonds controlled by Platinum should have been excluded from the voting process.  Nonetheless, the defendants caused Black Elk to disclose in the Consent Solicitation that: “[PPVA] and its affiliates, which own approximately 85% of our outstanding voting membership interests, own[ed] approximately $18,321,000 principal amount of the outstanding Notes.  Otherwise, neither we, nor any person directly or indirectly controlled by or under direct or indirect common control with us, nor, to our knowledge, any person directly or indirectly controlling us, held any Notes.”

The defendants then caused Platinum’s related parties to consent to the proposed amendments but not tender their bonds.  As of the offer’s expiration on August 13, 2014, bondholders that held $11,333,000 of the BE Bonds validly had tendered and were paid.  To the surprise of the remaining bondholders, who were unaware of Platinum’s control of $98,631,000 or approximately 65 percent of the BE Bonds, the trustee revealed that the holders of $110,565,000 or approximately 73.71 percent of the bonds had validly consented to the Consent Solicitation, thereby allowing the preferred equity to get paid from the proceeds of Black Elk’s sale of assets.

On or about August 11, 2015, Black Elk’s creditors filed a petition to place the company into an involuntary Chapter 7 bankruptcy, which was converted on or about September 1, 2015 to a voluntary Chapter 11 bankruptcy.  As of December 2016, a number of bondholders who did not tender their BE Bonds have yet to receive the principal amount of their holdings.


The criminal case has been assigned to Chief Judge Dora L. Irizarry of the United States District Court.  If convicted, each of the defendants faces a maximum sentence of 20 years’ imprisonment.

The government’s case is being prosecuted by the Office’s Business and Securities Fraud Section.  Assistant United States Attorneys Winston Paes, Alicyn Cooley, Lauren Elbert and Sarah Evans are in charge of the prosecution, with assistance provided by Assistant United States Attorney Brian Morris of the Office’s Civil Division.


The charges were brought in connection with the President’s Financial Fraud Enforcement Task Force.  The task force was established to wage an aggressive, coordinated and proactive effort to investigate and prosecute financial crimes.  With more than 20 federal agencies, 94 U.S. attorneys’ offices, and state and local partners, it is the broadest coalition of law enforcement, investigatory and regulatory agencies ever assembled to combat fraud.  Since its formation, the task force has made great strides in facilitating increased investigation and prosecution of financial crimes; enhancing coordination and cooperation among federal, state and local authorities; addressing discrimination in the lending and financial markets; and conducting outreach to the public, victims, financial institutions and other organizations.  Since fiscal year 2009, the Justice Department has filed over 18,000 financial fraud cases against more than 25,000 defendants.  For more information on the task force, please visit www.StopFraud.gov.

The Defendants:

MARK NORDLICHT
Age: 48
Residence: New Rochelle, New York

DAVID LEVY
Age: 31
Residence: New York, New York

URI LANDESMAN
Age: 55
Residence: New Rochelle, New York

JOSEPH SANFILIPPO
Age: 38
Residence: Freehold, New Jersey

JOSEPH MANN
Age: 24
Residence: Brooklyn, New York

DANIEL SMALL
Age: 47
Residence: New York, New York

JEFFREY SHULSE
Age: 44
Residence: Houston, Texas

E.D.N.Y. Docket No. 16-CR-640 (DLI)


Original PressReleases…

 

List Of U.S. Attorney’s Office Collects in Civil and Criminal Actions for U.S. Taxpayers in Fiscal year 2016

U.S. Attorney’s Office made a report on what they collected in 2016 following offenses and civil actions in Fiscal for U.S. Taxpayers with a more than a $15.3 billion.

Justice Department Collects More Than $15.3 Billion in Civil and Criminal Cases in Fiscal Year 2016


U.S. Attorney’s Office for the Eastern District of Michigan Collects $140,568,099.71

Detroit, MI –  U.S. Attorney Barbara McQuade announced today that the Eastern District of Michigan collected $140,568,099.71 in criminal and civil actions in Fiscal Year 2016.  Of this amount, $134,081,710.61 was collected in criminal actions and $6,486,389.10 was collected in civil actions

More Info…


U.S. Attorney’s Office for the California Collects $20,557,036

SAN DIEGO – U.S. Attorney Laura E. Duffy announced today that the Southern District of California collected $20,557,036 in criminal and civil actions in Fiscal Year 2016. Of this amount, $11,664,495 was collected in criminal actions and $8,892,541 was collected in civil actions. Additionally, the Southern District of California worked with other U.S. Attorney’s Offices and components of the Department of Justice to collect an additional $6,924,822 in civil actions pursued jointly with these offices.


U.S. Attorney’s Office for the Southern District of Indiana of Collects Over $7 Million

INDIANAPOLIS – U.S. Attorney Josh J. Minkler announced today that the Southern District of Indiana collected $7,707,955.00 in criminal and civil actions in Fiscal Year 2016.  Of this amount, $4,975,067.00 was collected in criminal actions and $2,732,888.00 was collected in civil actions.

More Info…


U.S. Attorney’s Office for the District of New Jersey of Collects $89.4 Million

NEWARK, N.J. – U.S. Attorney Paul J. Fishman announced today that the District of New Jersey collected $89.4 million in criminal and civil actions in Fiscal Year 2016.  Of this amount, $23.1 million was collected in criminal actions and $66.3 million was collected in civil actions.

More Info…


U.S. Attorney’s Office for the Middle District of Florida of Collects $236.9 Million

Tampa, FL – U.S. Attorney A. Lee Bentley, III announced today that the Middle District of Florida collected $236,927,010.74 for taxpayers this fiscal year (FY). In FY 2016, which ended on September 30, 2016, the Office’s Civil, Criminal, and Asset Forfeiture Divisions collected these monies through criminal and civil actions.

The Office’s Civil Division, led by Randy Harwell, recovered $96,354,288.71 from affirmative civil enforcement cases, most alleging health care fraud. An additional $57,148,531.95 was recovered as a result of joint investigations with the Department of Justice’s Civil Division and other U. S. Attorneys’ Offices.

More Info…


U.S. Attorney’s Office for the Southern District of Ohio of Collects $13 Million

CINCINNATI – U.S. Attorney Benjamin C. Glassman announced today that the Southern District of Ohio collected more than $13 million in criminal and civil actions in Fiscal Year 2016.  Of this amount, $10.7 million was collected in criminal actions and $2.4 million was collected in civil actions.

Additionally, the Southern District of Ohio worked with other U.S. Attorney’s Offices and components of the Department of Justice to collect an additional $73.5 million in cases pursued jointly with these offices. Of this amount, $62 million was collected in criminal actions and $11.5 million was collected in civil actions.

More Info…


U.S. Attorney’s Office for the Northern District of California of Collects $46,085,348.08

SAN FRANCISCO – U.S. Attorney Brian J. Stretch announced today that the Northern District of California collected $46,085,348.08 in criminal and civil actions in Fiscal Year 2016.  Of this amount, $29,720,757.86 was collected in criminal actions and $16,364,590.22 was collected in civil actions.

Additionally, the Northern District of California worked with other U.S. Attorney’s Offices and components of the Department of Justice to collect an additional $3,895,072,010.24 in cases pursued jointly with these offices.  Of this amount, $3,895,067,047.02 was collected in civil actions.

More Info…


U.S. Attorney’s Office for the Northern District of Alabama of Collects $5.09 Million

BIRMINGHAM — U.S. Attorney Joyce White Vance announced today that the Northern District of Alabama collected $5.09 million in criminal and civil actions in Fiscal Year 2016. Of this amount, about $3.7 million was collected in criminal actions and $1.4 million in civil actions

Additionally, the U.S. Attorney’s Office for north Alabama worked with other U.S. Attorney’s Offices and components of the Department of Justice to collect an additional $1.1 million in civil actions pursued jointly.

More Info…


U.S. Attorney’s Office for the Middle District of Pennsylvania of Collects $14.5 Million

HARRISBURG – The United States Attorney’s Office for the Middle District of Pennsylvania announced today that the Middle District of Pennsylvania collected $14.5 million in criminal and civil actions in Fiscal Year 2016.  Of this amount, $2.1 million was collected in criminal actions and $12.3 million was collected in civil actions

The $14.5 million collected exceeds the Office’s $8.9 million appropriated budget by approximately $5.6 million.

More Info…


U.S. Attorney’s Office for the District of Kansas of Collects $6.1 Million

TOPEKA, KAN. – U.S. Attorney Tom Beall announced today that the District of Kansas collected more than $6.1 million in criminal cases and civil actions in federal fiscal year 2016. Of this amount, $3.7 million was collected in criminal actions and $2.4 million was collected in civil actions

More Info…


U.S. Attorney’s Office for the District of Maryland of Collects $46.9 Million

Baltimore, Maryland – U.S. Attorney Rod J. Rosenstein announced that financial collections in criminal and civil actions in Fiscal Year (FY) 2016 in the District of Maryland reached $46,916,648.14.  The U.S. Department of Justice keeps statistics on a fiscal year basis, closing the books each September 30.

Attorney General Loretta Lynch announced today that the Justice Department collected $15.3 billion in civil and criminal actions in the fiscal year ending September 30, 2016.  The more than $15 billion in collections in FY 2016 represents more than five times the appropriated $2.93 billion budget for the 94 U.S. Attorney’s offices and the main litigating divisions of the Department of Justice in that same period.

More Info…


U.S. Attorney’s Office for the Southern District of Illinois of Collects $10,286,273

Donald S. Boyce, United States Attorney for the Southern District of Illinois announced today that his office collected $10,286,273 in criminal and civil actions in Fiscal Year 2016. Of this amount, $1,612,396 was collected in criminal actions and $8,673,877 was collected in civil actions.

Additionally, the Southern District of Illinois worked with other U.S. Attorney’s Offices and components of the Department of Justice to collect an additional $805,940 in civil actions.

More Info…


 U.S. Attorney’s Office for the District of South Carolina of Collects $65,905,918.40

Columbia, South Carolina — Acting U.S. Attorney Beth Drake announced today that the District of South Carolina collected $65,905,918.40 in criminal and civil actions in Fiscal Year 2016.  Of this amount, $7,112,893.48 was collected in criminal actions and $58,793,024.92 as collected in civil actions.

Additionally, the District of South Carolina worked with other U.S. Attorney’s Offices and components of the Department of Justice to collect an additional $78,957,002.59 in cases pursued jointly with these offices. Of this amount, $200.00 was collected in criminal actions and $78,956.802.59 was collected in civil actions.

More Info…


U.S. Attorney’s Office for the Eastern District of Virginia of Collects $156 Million

ALEXANDRIA, Va. – U.S. Attorney Dana J. Boente announced today that the Eastern District of Virginia (EDVA) collected $156,514,010.12 in criminal and civil actions in Fiscal Year 2016.  Of this amount, $49,997,392.53 was collected in criminal actions and $106,516,617.59 was collected in civil actions

Additionally, EDVA worked with other U.S. Attorney’s Offices and components of the Department of Justice to collect an additional $3,635,377.40 in cases pursued jointly with these offices.    Of this amount, $29,737.34 was collected in criminal actions and $3,605,640.06 was collected in civil actions.

More Info…


U.S. Attorney’s Office for the Middle District of Alabama of Collects $2.6 Million

Montgomery, Alabama– U.S. Attorney George L. Beck Jr. announced today that the Middle District of Alabama collected $2,639,626.76 in criminal and civil actions in Fiscal Year 2016. Of this amount, $2,317,486.29 was collected in criminal actions and $322,140.47 was collected in civil actions.

Attorney General Loretta E. Lynch announced on Wednesday, December 14, 2016 that the Justice Department collected nearly $15.4 billion in civil and criminal actions in the fiscal year ending Sept. 30, 2016. The $15,380,130,434 in collections in FY 2016 represents more than five times the appropriated $2.93 billion budget for the 94 U.S. Attorneys’ offices and the main litigating divisions of the Justice Department combined in that same period.

More Info…


U.S. Attorney’s Office for the Western District of Virginia of Collects $9,663,834

Roanoke, VIRGINIA – United States Attorney John P. Fishwick Jr. announced today that the Western District of Virginia collected $9,663,834 in criminal and civil actions in fiscal year 2016. Of this amount, $9,266,499 was collected in criminal actions and $397,334 was collected in civil actions.

Additionally, the Western District of Virginia worked with other U.S. Attorney’s Offices and components of the Department of Justice to collect an additional $7,775,772 in cases pursed jointly with these offices. Of this amount, $1,541,247, was collected in criminal actions and $6,234,475, was collected in civil actions.

More Info…


U.S. Attorney’s Office for the Eastern District of North Carolina of Collects $8,476,074.72

RALEIGH – The United States Attorney’s Office for the Eastern District of North Carolina announced that they collected $8,476,074.72 in Civil and Criminal Actions for U.S. Taxpayers in Fiscal Year 2016.  Of this amount, $3,313,619.45 was collected in criminal actions and $5,162,455.27 was collected in civil actions.

Additionally, the Eastern District of North Carolina worked with other U.S. Attorney’s Offices and components of the Department of Justice to collect an additional $72,417,597.68 in cases pursued jointly with these offices.  Of this amount, $10,437.68 was collected in criminal actions and $72,407,160.00 was collected in civil actions.

More Info…


U.S. Attorney’s Office for the District of Maine of Collects $3,730,685.68

Portland, Maine:  United States Attorney Thomas E. Delahanty II announced today that the U.S. Attorney’s Office for the District of Maine collected $3,730,685.68 in criminal and civil actions in Fiscal Year 2016.  Of this amount, $1,082,526.09 was collected in criminal actions and $2,648,159.59 was collected in civil actions.

Additionally, the District of Maine worked with other U.S. Attorney’s Offices and components of the Department of Justice to collect an additional $925,487.01 in cases pursued jointly with these offices. Of this amount, $2,625.01 was collected in criminal actions and $922,862.00 was collected in civil actions.

More Info…


U.S. Attorney’s Office for the Western District of Washington of Collects $14.4 million

An additional $8.5 Million Collected in Asset Forfeiture to aid Crime Victims and support Law Enforcement Programs

Seattle – U.S. Attorney Annette L. Hayes announced today that the Western District of Washington collected $14.4 million in the fiscal year ending September 30, 2016.  Of this amount, $8.9 was collected in criminal actions and $5.4 million was collected in civil actions

Additionally, the Western District of Washington worked with other U.S. Attorney’s Offices and components of the Department of Justice to collect an additional $12.4 million in cases pursued jointly with these offices.  Virtually all of these funds were collected in civil actions.

More Info…

 

Financial Fraud: Bogdan Nicolescu, Tiberiu Danet And Radu Miclaus Indicted in Cyber Fraud, Identity Theft And Wire Fraud

Three Romanian nationals indicted in cyber fraud case in which they infected 60,000 computers, sent out 11 million malicious emails and stole at least $4 million

A 21-count indictment was unsealed in which three Romanian nationals were charged for operating a cyber fraud conspiracy in which they infected 60,000 computers, sent out 11 million malicious emails and stole at least $4 million, said U.S. Attorney Carole S. Rendon and FBI Special Agent in Charge Stephen D. Anthony.

Bogdan Nicolescu, 34, Tiberiu Danet, 31, and Radu Miclaus, 34, were extradited to the United States this week after being taken into custody in their native Romania earlier this year. They are each charged with conspiracy to commit wire fraud, conspiracy to traffic in counterfeit service marks, aggravated identity theft, conspiracy to commit money laundering and 12 counts each of wire fraud.

“This case illustrates the sophistication and determination with which cyber criminals seek to harm Americans and American businesses from abroad,” said Assistant Attorney General Leslie R. Caldwell.  “But our response demonstrates that, with effective international cooperation, we can track these criminals down and make sure they face justice, no matter where or how they try to hide.”

“These defendants stole millions of dollars from people in the United States through a sophisticated fraud conspiracy they operated in Eastern Europe,” Rendon said. “Cybercrime is an ever-growing threat. We will continue to work with both our partners in law enforcement and in the private sector to evolve with the threat and protect our networks and national security.”

“This indictment and subsequent arrests reveal the dynamic landscape in which international criminals utilize sophisticated cyber methods to take advantage of and defraud, unsuspecting victims,” Anthony said. “Despite the complexity and global character of these investigations, these arrests demonstrate the commitment by the FBI and our partners to aggressively pursue these individuals and bring justice to the victims.”

According to the indictment filed in U.S. District Court in the Northern District of Ohio:

Nicolescu, Danet and Miclaus collectively operated a criminal conspiracy from Bucharest, Romania. It began in 2007 with the development of proprietary malware, which they disseminated through malicious emails purporting to be legitimate from such entities as Western Union, Norton AntiVirus and the IRS. When recipients clicked on an attached file, the malware was surreptitiously installed onto their computer.

This malware harvested email addresses from the infected computer, such as from contact lists or email accounts, and then sent malicious emails to these harvested email addresses. The defendants infected and controlled more than 60,000 individual computers, primarily in the United States.

Controlling these computers allowed the defendants to harvest personal information, such as credit card information, user names and passwords. They disabled victims’ malware protection and blocked the victims’ access to websites associated with law enforcement.

Controlling the computers also allowed the defendants group to use the processing power of the computer to solve complex algorithms for the financial benefit of the group, a process known as cryptocurrency mining.

The defendants used stolen email credentials to copy a victim’s email contacts. They also activated files that forced infected computers to register email accounts with AOL. The defendants registered more than 100,000 email accounts using this method. They then sent malicious emails from these addresses to the compromised contact lists. Through this method, they sent more than 11 million malicious emails.

When victims with infected computers visited websites such as Facebook, PayPal, eBay or others, the defendants would intercept the request and redirect the computer to a nearly identical website they had created. The defendants would then steal account credentials. They used the stolen credit card information to fund their criminal infrastructure, including renting server space, registering domain names using fictitious identities and paying for Virtual Private Networks (VPNs) which further concealed their identities.

The defendants were also able to inject fake pages into legitimate websites, such as eBay, to make victims believe they were receiving and following instructions from legitimate websites, when they were actually following the instructions of the defendants.

They placed more than 1,000 fraudulent listings for automobiles, motorcycles and other high-priced goods on eBay and similar auction sites. Photos of the items were infected with malware, which redirected computers that clicked on the image to fictitious webpages designed by the defendants to resemble legitimate eBay pages.

These fictitious webpages prompted users to pay for their goods through a nonexistent “eBay Escrow Agent” who was simply a person hired by the defendants. Users paid for the goods to the fraudulent escrow agents, who in turn wired the money to others in Eastern Europe, who in turn gave it to the defendants. The payors/victims never received the items and never got their money back.

This resulted in a loss of at least $4 million.

The Bayrob group laundered this money by hiring “money transfer agents” and created fictitious companies with fraudulent websites designed to give the impression they were actual businesses engaged in legitimate financial transactions. Money stolen from victims was wired to these fraudulent companies and then in turn wired to Western Union or Money Gram offices in Romania. European “money mules” used fake identity documents to collect the money and deliver it to the defendants, according to the indictment

This case is being prosecuted by Assistant U.S. Attorneys Duncan T. Brown and Om Kakani and Brian Levine, Senior Counsel with the Justice Department’s Computer Crime and Intellectual Property Section. The case was investigated by the FBI, with assistance from the Romanian National Police.

If convicted, the defendants’ sentences will be determined by the court after review of factors unique to this case, including the defendant’s prior criminal record, if any, the defendant’s role in the offense and the characteristics of the violations.  In all cases, the sentence will not exceed the statutory maximum and, in most cases, it will be less than the maximum.

An indictment is only a charge and is not evidence of guilt.  A defendant is entitled to a fair trial in which it will be the government’s burden to prove guilt beyond a reasonable doubt.

Original PressReleases…