Tag Archives: Conspiracy

Unlocking Trouble: Inside the Richard Sherman SIM Fraud Conspiracy and the Fight Against Telecom Insider Threats

&NewLine;<h2 class&equals;"wp-block-heading">I&period; Introduction&colon; An Inside Job Shakes the Telecom Sector<&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<p>In a stark illustration of the vulnerabilities lurking within major corporations&comma; a former employee of a multinational telecommunications company recently admitted to orchestrating a sophisticated&comma; long-running fraud scheme&period; Richard Forrest Sherman&comma; 46&comma; pleaded guilty in Newark federal court to wire fraud conspiracy&comma; acknowledging his central role in a plot that fraudulently unlocked potentially thousands of mobile phones by exploiting his insider access and manipulating company systems&period;<sup><&sol;sup> Operating for approximately seven years&comma; from 2013 until its discovery in August 2020&comma; the scheme leveraged a legitimate customer&&num;8217&semi;s special unlocking privileges&comma; creating fake affiliated accounts to bypass standard security checks and reap illicit profits estimated around &dollar;500&comma;000&period;<sup><&sol;sup> &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>This case transcends a simple instance of employee misconduct&period; It serves as a critical case study illuminating the complex intersection of telecommunications business practices&comma; cybersecurity vulnerabilities&comma; the persistent challenge of insider threats&comma; and the legal frameworks designed to combat sophisticated financial crime&period; Sherman&&num;8217&semi;s actions highlight how trusted employees with privileged access can weaponize internal processes&comma; causing significant financial and operational damage&period; Understanding the mechanics of SIM locking&comma; the specifics of Sherman&&num;8217&semi;s fraudulent methods&comma; the broader impact of such schemes&comma; the legal repercussions under federal law&comma; the role of investigating agencies like the U&period;S&period; Secret Service&comma; and the strategies needed to mitigate insider risks is crucial for the telecom industry and cybersecurity professionals alike&period; This report delves into these facets&comma; contextualizing the Sherman case within the evolving landscape of telecommunications fraud and offering a comprehensive analysis of the threats and countermeasures involved&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading">II&period; The Golden Handcuffs&colon; Understanding SIM Locking<&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<p>The practice of &&num;8220&semi;SIM locking&&num;8221&semi; or &&num;8220&semi;carrier locking&&num;8221&semi; is a widespread strategy employed by mobile network operators globally&period; At its core&comma; a SIM lock is a software restriction built into mobile phones by manufacturers at the behest of carriers&period;<sup><&sol;sup> This software prevents the phone from being used with a SIM card from a different&comma; potentially competing&comma; mobile network&comma; even if those networks are technologically compatible&period;<sup><&sol;sup> This restriction can apply to both physical SIM cards and the newer electronic SIMs &lpar;eSIMs&rpar;&period;<sup><&sol;sup> &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>The primary motivation behind SIM locking is economic&period; Carriers often offer mobile devices&comma; particularly high-end smartphones&comma; at a significant discount or through installment plans as an incentive for customers to sign long-term service contracts&comma; typically lasting one to three years&period;<sup><&sol;sup> The SIM lock ensures that the subsidized device remains active on the carrier&&num;8217&semi;s network for a specified period&comma; allowing the carrier to recoup the device subsidy through monthly service fees&period;<sup><&sol;sup> Without this lock&comma; consumers could potentially acquire a discounted phone&comma; break the service contract&comma; and immediately use the device on a competitor&&num;8217&semi;s network or resell it for profit&comma; undermining the carrier&&num;8217&semi;s business model&period;<sup><&sol;sup> Even phones purchased at full price may be locked for a short duration &lpar;e&period;g&period;&comma; 60 days&rpar; as a measure to deter theft and certain types of fraud&period;<sup><&sol;sup> &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Recognizing the potential for consumer detriment and reduced competition&comma; regulatory bodies and industry associations have established guidelines for unlocking procedures&period; In the United States&comma; the Federal Communications Commission &lpar;FCC&rpar; oversees telecommunications&comma; and CTIA – The Wireless Association&comma; representing the wireless communications industry&comma; has developed voluntary commitments that most major carriers adhere to&period;<sup><&sol;sup> Key tenets of these commitments include <sup><&sol;sup>&colon; &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<ul class&equals;"wp-block-list">&NewLine;<li><strong>Disclosure&colon;<&sol;strong> Carriers must clearly post their unlocking policies on their websites&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Postpaid Policy&colon;<&sol;strong> Carriers must unlock devices &lpar;or provide unlocking information&rpar; for eligible customers&sol;former customers in good standing after service contracts or device financing plans are fulfilled&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Prepaid Policy&colon;<&sol;strong> Carriers must unlock prepaid devices no later than one year after activation&comma; subject to reasonable requirements&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Notice&colon;<&sol;strong> Carriers must notify customers when their devices become eligible for unlocking or unlock them automatically&comma; typically without extra fees for current&sol;former customers&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Response Time&colon;<&sol;strong> Carriers generally have two business days to respond to an unlocking request&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong><a class&equals;"wpil&lowbar;keyword&lowbar;link" href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;category&sol;military-scammer&sol;" title&equals;"Military" data-wpil-keyword-link&equals;"linked" data-wpil-monitor-id&equals;"1450">Military<&sol;a> Personnel&colon;<&sol;strong> Special provisions exist for unlocking devices for deployed military personnel&period;<&sol;li>&NewLine;<&sol;ul>&NewLine;&NewLine;&NewLine;&NewLine;<p>However&comma; unlocking only disables the software lock&semi; it doesn&&num;8217&semi;t guarantee the phone will work on another network due to differing technologies and frequencies used by carriers&period;<sup><&sol;sup> Despite these guidelines&comma; the desire for greater flexibility—to switch carriers for better deals&comma; use local SIMs while traveling abroad&comma; or resell devices—creates significant consumer demand for unlocked phones&period;<sup><&sol;sup> This demand&comma; coupled with the restrictions and waiting periods imposed by carriers&comma; fosters a market for unlocking services&comma; both legitimate and illicit&period;<sup><&sol;sup> The practice of carrier locking&comma; while serving the carriers&&num;8217&semi; economic interests&comma; inherently creates friction with consumer choice and competition&comma; potentially impacting low-income communities disproportionately and contributing to e-waste when locked phones cannot be easily resold or repurposed&period;<sup><&sol;sup> &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading">III&period; The Keys to the Kingdom&colon; IMEI Numbers and the Unlocking Process<&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<p>Central to the management of mobile devices and the enforcement of SIM locks is the International Mobile Equipment Identity &lpar;IMEI&rpar; number&period; Every legitimate mobile phone possesses a unique 15-digit IMEI&comma; serving as its global serial number&period;<sup><&sol;sup> This number identifies the specific physical device&comma; distinct from the user&&num;8217&semi;s identity or the SIM card &lpar;which holds the subscriber information&rpar;&period;<sup><&sol;sup> The IMEI contains information about the device&&num;8217&semi;s manufacturer&comma; model&comma; and origin&comma; embedded during production&period;<sup><&sol;sup> It can typically be found printed on the device&comma; under the battery&comma; on the original packaging&comma; or by dialing the universal code &ast;&num;06&num; on the phone&&num;8217&semi;s keypad&period;<sup><&sol;sup> &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>IMEI numbers play a critical role in network operations and security&period; They are registered in a central database known as the Equipment Identity Register &lpar;EIR&rpar;&comma; which networks use to validate devices attempting to connect&period;<sup><&sol;sup> A primary security function is blacklisting&colon; if a phone is reported lost or stolen&comma; the owner can provide the IMEI to their carrier&comma; who can then add it to a blacklist within the EIR&period;<sup><&sol;sup> A blacklisted IMEI prevents the device from connecting to any participating network&comma; even with a different SIM card&comma; thus deterring theft&period;<sup><&sol;sup> &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>The IMEI is also fundamental to the SIM unlocking process&period; When a customer meets the carrier&&num;8217&semi;s criteria for unlocking &lpar;e&period;g&period;&comma; contract fulfillment&comma; device payoff&rpar;&comma; they typically request the unlock&comma; often providing the device&&num;8217&semi;s IMEI number&period;<sup><&sol;sup> The carrier then uses this IMEI to identify the specific device within its systems and authorize the removal of the software lock&period;<sup><&sol;sup> While the exact technical mechanism varies&comma; it generally involves updating the status associated with that IMEI in a database maintained by the carrier or the original equipment manufacturer &lpar;OEM&rpar;&period;<sup><&sol;sup> For many modern smartphones&comma; this doesn&&num;8217&semi;t involve entering a code directly into the phone but rather a remote update pushed by the carrier or manufacturer once the unlock is approved in their backend systems&period;<sup><&sol;sup> Some third-party unlocking services claim to access these databases &lpar;legitimately or otherwise&rpar; or use algorithms based on the IMEI and original carrier to generate unlock codes&comma; though the latter is less common for newer devices where codes might be randomly generated and stored solely in secure databases&period;<sup><&sol;sup> &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>The reliance on IMEI numbers and associated databases for managing lock status creates the very system that fraudulent actors seek to exploit&period; The economic incentives are clear&colon; carriers implement locks to protect revenue streams from subsidized devices <sup><&sol;sup>&comma; while consumers desire unlocked phones for flexibility&comma; travel&comma; or resale&comma; creating a value differential between locked and unlocked devices&period;<sup><&sol;sup> Legitimate unlocking pathways often involve waiting periods or full payment of device plans&period;<sup><&sol;sup> This gap fuels a black market where individuals seek faster or cheaper unlocking methods&comma; creating the demand that schemes like Richard Sherman&&num;8217&semi;s aim to satisfy&period; &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>The integrity of the entire SIM locking and unlocking ecosystem hinges not just on the security of the IMEI databases themselves&comma; but critically&comma; on the integrity of the <em>processes<&sol;em> and <em>authorizations<&sol;em> that govern access to and modification of the lock status associated with each IMEI&period; As the Sherman case demonstrates&comma; compromising the authorization workflow—tricking the system into believing an illegitimate request is valid—can be just as effective&comma; if not more insidious&comma; than attempting a brute-force attack on the database itself&period; The inherent tension between the carriers&&num;8217&semi; business model reliant on locking and the consumer demand &lpar;and regulatory push&rpar; for unlocking flexibility creates fertile ground for such fraudulent exploitation&period;<sup><&sol;sup> The carrier&&num;8217&semi;s strategy to protect its investment inadvertently generates the economic conditions that insider threats can readily capitalize upon&period; &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading">IV&period; Executing the Heist&colon; How Sherman Weaponized Insider Access<&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<p>Richard Sherman&&num;8217&semi;s scheme was not a sophisticated external hack but an inside job that meticulously exploited procedural weaknesses and trust within the telecommunications company&&num;8217&semi;s systems&period; His position managing customer accounts provided him with both the knowledge of internal processes and the access required to manipulate them&period;<sup><&sol;sup> &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>The scheme unfolded over several calculated steps&colon;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<ol class&equals;"wp-block-list">&NewLine;<li><strong>Identifying the Vulnerability&colon;<&sol;strong> Sherman recognized a powerful loophole&colon; a specific customer&comma; designated &&num;8220&semi;Company-1&&num;8221&semi; in court documents&comma; had been granted a special exemption from the standard unlocking requirements &lpar;such as fulfilling device payment plans or minimum usage periods&rpar;&period; This &&num;8220&semi;Company-1 Exemption&&num;8221&semi; allowed bulk unlocking requests for affiliated devices&comma; a privilege Sherman understood could be weaponized&period; His insider knowledge of this specific exemption and the systems governing it was paramount&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Creating the Fake Front&colon;<&sol;strong> Sherman established one or more new customer accounts within the carrier&&num;8217&semi;s internal systems&period; One key account mentioned is the &&num;8220&semi;Entity-1 Account&comma;&&num;8221&semi; controlled by Sherman and his co-conspirators&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>The Crucial Manipulation &&num;8211&semi; False Affiliation&colon;<&sol;strong> This was the linchpin of the fraud&period; Leveraging his authorized access to the carrier&&num;8217&semi;s systems&comma; Sherman fraudulently classified the newly created Entity-1 Account as an <em>affiliate<&sol;em> of the legitimate Company-1&period; Court documents suggest this involved manipulating system data&comma; potentially including requesting a specific billing number for the Entity-1 Account designed to mirror the structure of Company-1&&num;8217&semi;s billing numbers&comma; thereby tricking the system into recognizing a non-existent affiliation&period; This deceptive classification automatically conferred the potent Company-1 Exemption onto the fake Entity-1 Account&comma; granting it the ability to bypass standard unlocking protocols&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Monetizing the Exploit&colon;<&sol;strong> Sherman and his co-conspirators offered their illicit unlocking capability as a service&period; They received payments from third parties&comma; including an &&num;8220&semi;Individual-1&&num;8221&semi; mentioned in court filings&comma; in exchange for unlocking phones&period; These third parties likely sourced large numbers of locked phones intended for resale on the grey or black market once unlocked&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Bulk Unlocking via Fake Accounts&colon;<&sol;strong> Armed with the fraudulent exemption&comma; the conspirators submitted bulk requests to remove the locking software from devices&period; They used the fake Entity-1 Account to send lists of IMEI numbers &lpar;provided by Individual-1 and others paying for the service&rpar; to the carrier&&num;8217&semi;s unlocking system&period; Crucially&comma; because the Entity-1 Account appeared to possess the legitimate Company-1 Exemption&comma; the carrier&&num;8217&semi;s automated systems processed these bulk requests without performing the usual checks and balances required for standard unlocking&period; Thousands of devices were unlocked in this manner over the years&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Cashing In&colon;<&sol;strong> The scheme generated substantial illicit income&period; Sherman personally received payments through entities he controlled&comma; including a documented wire transfer of approximately &dollar;52&comma;361 via the Fedwire system into a New Jersey business bank account he managed&period; Over the course of the conspiracy &lpar;roughly 2013-2020&rpar;&comma; Sherman and his co-conspirators obtained approximately &dollar;500&comma;000&comma; which they converted for their personal use&period; As part of the legal proceedings&comma; the government sought forfeiture of all property derived from these criminal proceeds&period;  <&sol;li>&NewLine;<&sol;ol>&NewLine;&NewLine;&NewLine;&NewLine;<p>The success of this long-running fraud rested heavily on the exploitation of <em>trust<&sol;em> embedded within the carrier&&num;8217&semi;s internal systems&comma; particularly concerning affiliate relationships and special exemptions&period; The system likely lacked robust secondary validation mechanisms or anomaly detection capabilities to scrutinize changes to high-privilege account attributes like exemption status&comma; especially when initiated by an employee like Sherman who had legitimate authority to manage such accounts&period; The system essentially trusted the classification input by the authorized user&comma; highlighting a potential gap where zero-trust principles—verifying requests and classifications regardless of the source&&num;8217&semi;s apparent internal authority—could have provided a critical defense layer&comma; particularly for actions with major financial implications like granting bulk unlocking exemptions&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Furthermore&comma; the very existence of a bulk unlocking process&comma; designed for the convenience of large legitimate customers with exemptions&comma; inadvertently created a significant attack surface&period; While efficient for its intended purpose&comma; allowing bulk actions based on a single point of authorization &lpar;the manipulated affiliate status&rpar; dramatically magnified the potential impact of any fraud or error involving that authorization&period; Sherman&&num;8217&semi;s ability to unlock thousands of phones through this mechanism underscores the need for exceptionally stringent verification&comma; auditing&comma; and monitoring controls around any internal process that permits bulk actions&comma; especially those designed to bypass standard security checks&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading">V&period; The Ripple Effect&colon; Assessing the Damage of Unlocking Fraud<&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<p>The consequences of large-scale SIM unlocking fraud&comma; as exemplified by the Sherman case&comma; extend far beyond the direct financial gains of the perpetrators&period; The ripple effects impact carriers&comma; consumers&comma; and the market ecosystem in multiple ways&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Direct Financial Losses&colon;<&sol;strong> The most immediate impact is on the telecommunications carrier&period; When phones are unlocked prematurely and fraudulently&comma; the carrier loses the anticipated revenue stream associated with that device&period; This includes <sup><&sol;sup>&colon; &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<ul class&equals;"wp-block-list">&NewLine;<li><strong>Unrecouped Subsidies&colon;<&sol;strong> The initial discount provided on the device may not be recovered if the customer defaults or moves the phone off-network before the contract term or payment plan is complete&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Lost Service Revenue&colon;<&sol;strong> The carrier loses the future monthly service fees it expected to collect over the life of the contract associated with that device&period; The Muhammad Fahd case against AT&amp&semi;T&comma; involving similar unlocking methods &lpar;bribery and malware&rpar;&comma; provides a stark example of the potential scale&comma; with estimated losses pegged at over &dollar;200 million&comma; explicitly linked to lost subscriber payments for nearly 2 million unlocked phones&period; While Sherman&&num;8217&semi;s direct gain was cited as approximately &dollar;500&comma;000 &comma; the actual financial loss incurred by &&num;8220&semi;Victim-1&&num;8221&semi; &lpar;the carrier&rpar; was likely substantially higher&comma; encompassing the value of the thousands of devices improperly unlocked plus the associated lost service revenue streams&period; Calculating this full economic damage is complex&comma; often far exceeding the fraudster&&num;8217&semi;s profit&period;  <&sol;li>&NewLine;<&sol;ul>&NewLine;&NewLine;&NewLine;&NewLine;<p>This type of fraud contributes to the staggering overall cost of telecom fraud globally&period; Industry reports estimated global telecom fraud losses at &dollar;39&period;89 billion in 2021 &lpar;around 2&period;22&percnt; of industry revenue&rpar; <sup><&sol;sup>&comma; with estimates suggesting a rise to nearly &dollar;39 billion in 2023 &lpar;2&period;5&percnt; of revenue&rpar;&period;<sup><&sol;sup> Specific schemes like interconnect bypass fraud &lpar;SIM box fraud&rpar;&comma; which exploits call routing rather than device unlocking&comma; cost the industry billions annually &lpar;&dollar;3&period;11 billion cited in reports&rpar;&period;<sup><&sol;sup> &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Market Disruption&colon;<&sol;strong> Illicit unlocking schemes distort the mobile device market&period;<sup><&sol;sup> &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<ul class&equals;"wp-block-list">&NewLine;<li><strong>Secondary Market Impact&colon;<&sol;strong> The influx of fraudulently unlocked phones can flood the used or grey market&comma; potentially undercutting legitimate resellers and depressing prices&period; While legitimate unlocking supports a healthy secondary market and extends device lifecycles &comma; fraudulent channels may deal in stolen or illegitimately acquired devices&comma; focusing on rapid&comma; untraceable resale&period; This illicit trade might bypass responsible e-waste management practices that legitimate refurbishment channels adhere to&comma; potentially contributing indirectly to environmental concerns&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Undermining Market Structure&colon;<&sol;strong> While unlocking&comma; in general&comma; is seen as pro-competitive &comma; fraudulent unlocking undermines the established market structure built around carrier subsidies and service contracts&comma; disrupting the economic model carriers rely on&period;  <&sol;li>&NewLine;<&sol;ul>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Erosion of Trust and Reputation&colon;<&sol;strong> Fraud incidents significantly damage the carrier&&num;8217&semi;s standing&period;<sup><&sol;sup> &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<ul class&equals;"wp-block-list">&NewLine;<li><strong>Consumer Confidence&colon;<&sol;strong> Customers lose faith in a carrier&&num;8217&semi;s ability to secure its operations and protect data&comma; potentially leading to customer churn&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Brand Damage&colon;<&sol;strong> The company&&num;8217&semi;s reputation suffers&comma; impacting its ability to attract new customers and even retain talent&comma; as professionals may be wary of joining an organization perceived as vulnerable to fraud&period;  <&sol;li>&NewLine;<&sol;ul>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Operational and Security Impacts&colon;<&sol;strong> Beyond financial and reputational harm&comma; telecom fraud can affect network operations and broader security&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<ul class&equals;"wp-block-list">&NewLine;<li><strong>Service Quality Degradation&colon;<&sol;strong> While not directly caused by Sherman&&num;8217&semi;s <em>unlocking<&sol;em> method&comma; related telecom frauds like SIM box operations often use substandard equipment that degrades call quality for legitimate users&comma; reflecting poorly on the carrier&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Network Strain&colon;<&sol;strong> Certain fraud types can overload network infrastructure&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Security and Privacy Risks&colon;<&sol;strong> Some telecom fraud schemes can compromise user privacy or create avenues for further criminal activity&period; A closely related threat&comma; SIM <em>swapping<&sol;em> &lpar;where attackers hijack a user&&num;8217&semi;s phone number&comma; often via insider collusion or social engineering&rpar;&comma; directly targets user accounts&comma; enabling theft of funds or sensitive data by intercepting authentication messages&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>National Security Concerns&colon;<&sol;strong> Certain types of telecom fraud that bypass legal intercept mechanisms can pose risks to national security efforts aimed at tracking criminal communications&period;  <&sol;li>&NewLine;<&sol;ul>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading">VI&period; The Long Arm of the Law&colon; Prosecuting Wire Fraud Conspiracy<&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<p>Richard Sherman pleaded guilty to conspiracy to commit wire fraud&comma; a serious federal offense&period; Understanding the legal framework surrounding this charge is essential to grasping the severity of his actions and the tools available to prosecutors&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>The Underlying Offense&colon; Wire Fraud &lpar;18 U&period;S&period;C&period; § 1343&rpar;<&sol;strong> The crime Sherman conspired to commit was wire fraud&period; The core elements necessary to prove wire fraud under federal statute 18 U&period;S&period;C&period; § 1343 are <sup><&sol;sup>&colon; &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<ol class&equals;"wp-block-list">&NewLine;<li><strong>Scheme or Artifice to Defraud&colon;<&sol;strong> The existence of a plan or scheme intended to deceive and cheat someone out of money or property through false or fraudulent pretenses&comma; representations&comma; or promises&period; Sherman&&num;8217&semi;s scheme to use fake affiliate accounts to gain unauthorized unlocking clearly fits this definition&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Intent to Defraud&colon;<&sol;strong> The defendant must have acted knowingly and with the specific intent to defraud&period; Accidental or unintentional misrepresentations are not sufficient&period; Sherman&&num;8217&semi;s deliberate creation of fake accounts and manipulation of system classifications demonstrates intent&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Use of Interstate Wire Communications&colon;<&sol;strong> The scheme must involve the use of interstate or foreign wire&comma; radio&comma; or television communications &lpar;including internet&comma; phone lines&comma; wire transfers&rpar; to execute the scheme&period; The use of such communications must be reasonably foreseeable&period; In Sherman&&num;8217&semi;s case&comma; the receipt of payments via the interstate Fedwire Funds Service into a New Jersey bank account satisfied this element&period;  <&sol;li>&NewLine;<&sol;ol>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>The Conspiracy Charge &lpar;18 U&period;S&period;C&period; § 1349&rpar;<&sol;strong> Sherman was charged under 18 U&period;S&period;C&period; § 1349&comma; a statute specifically addressing <em>attempts<&sol;em> and <em>conspiracies<&sol;em> to commit the various fraud offenses outlined in Chapter 63 of Title 18 of the U&period;S&period; Code&comma; which includes wire fraud &lpar;§ 1343&rpar;&period;<sup><&sol;sup> &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>To secure a conviction for conspiracy under § 1349&comma; prosecutors generally need to prove <sup><&sol;sup>&colon; &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<ol class&equals;"wp-block-list">&NewLine;<li><strong>An Agreement&colon;<&sol;strong> That two or more persons entered into an agreement to commit the underlying fraud offense &lpar;here&comma; wire fraud&rpar;&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Knowing and Willful Participation&colon;<&sol;strong> That the defendant knew the conspiracy&&num;8217&semi;s objective and voluntarily joined it&period;<&sol;li>&NewLine;<&sol;ol>&NewLine;&NewLine;&NewLine;&NewLine;<p>A critical feature distinguishes § 1349 from the general federal conspiracy statute &lpar;18 U&period;S&period;C&period; § 371&rpar;&period; Under the general statute&comma; prosecutors must typically prove not only an agreement but also that at least one conspirator committed an &&num;8220&semi;overt act&&num;8221&semi; in furtherance of the conspiracy&period; However&comma; <strong>18 U&period;S&period;C&period; § 1349 explicitly does <em>not<&sol;em> require proof of an overt act<&sol;strong>&period;<sup><&sol;sup> For fraud conspiracies covered by § 1349&comma; the agreement itself is sufficient for conviction&period; This makes § 1349 a particularly potent tool for prosecutors targeting complex financial fraud schemes&comma; as they do not need to isolate and prove a specific subsequent action taken to advance the plot beyond the agreement to commit the fraud itself&period; &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>The enactment of § 1349 as part of the Sarbanes-Oxley Act of 2002 <sup><&sol;sup> signals a clear legislative intent to treat the mere agreement to commit serious financial and corporate fraud as severely as the completed crime&period; By removing the overt act requirement specifically for these types of conspiracies&comma; Congress lowered the prosecutorial burden compared to general conspiracies&comma; reflecting a focus on deterring the formation and planning stages of fraudulent enterprises&comma; particularly in the wake of major corporate scandals&period; &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Penalties and Sentencing<&sol;strong> The penalties for attempt or conspiracy under § 1349 are explicitly the <em>same<&sol;em> as those prescribed for the underlying offense that was the object of the attempt or conspiracy&period;<sup><&sol;sup> In Sherman&&num;8217&semi;s case&comma; conspiracy to commit wire fraud carries a maximum potential penalty of 20 years in prison and a fine of &dollar;250&comma;000&comma; or twice the pecuniary gain to the defendant or loss to the victims&comma; whichever is greatest&period;<sup><&sol;sup> The actual sentence imposed will depend on federal sentencing guidelines&comma; the specific details of the offense &lpar;like the duration and amount of loss&rpar;&comma; the defendant&&num;8217&semi;s criminal history&comma; and other factors considered by the court&period; Additionally&comma; conviction triggers forfeiture provisions&comma; allowing the government to seize property constituting or derived from the proceeds of the crime&comma; as sought in Sherman&&num;8217&semi;s case&period;<sup><&sol;sup> &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Sherman&&num;8217&semi;s guilty plea to a single conspiracy count&comma; despite the scheme&&num;8217&semi;s seven-year duration and multiple fraudulent acts&comma; might represent a strategic prosecutorial choice or the outcome of plea negotiations&period; Proving the specific elements of numerous individual wire fraud counts spanning years could be resource-intensive&period; Charging under § 1349&comma; focusing on the overarching agreement and lacking the overt act requirement&comma; may offer a more streamlined path to conviction&comma; even though the potential penalties remain substantial&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading">VII&period; The Investigators&colon; U&period;S&period; Secret Service Tackling High-Tech Fraud<&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<p>The investigation leading to Richard Sherman&&num;8217&semi;s guilty plea was conducted by the U&period;S&period; Secret Service&comma; specifically credited to special agents from the Seattle Field Office&period;<sup><&sol;sup> While often associated with protecting political leaders&comma; the Secret Service has a long-standing and evolving mandate to investigate complex financial crimes&comma; a mission that increasingly involves navigating the complexities of cyberspace&period; &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>An Evolving Mandate&colon; From Counterfeiting to Cybercrime<&sol;strong> Established in 1865 primarily to combat the widespread counterfeiting of U&period;S&period; currency following the Civil War <sup><&sol;sup>&comma; the Secret Service&&num;8217&semi;s investigative responsibilities have expanded significantly over time through legislative and executive action&period; Its mandate now firmly includes safeguarding the integrity of the nation&&num;8217&semi;s financial and payment systems&period;<sup><&sol;sup> &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Key areas of modern investigative authority relevant to cases like Sherman&&num;8217&semi;s include&colon;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<ul class&equals;"wp-block-list">&NewLine;<li><strong>Financial Crimes&colon;<&sol;strong> The agency holds primary authority for investigating access device fraud &lpar;like credit and debit card fraud&rpar;&comma; identity theft&comma; and financial institution fraud&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Cyber-Enabled Crimes&colon;<&sol;strong> Crucially&comma; the Secret Service&&num;8217&semi;s mandate explicitly extends to investigating computer fraud and computer-based attacks targeting the nation&&num;8217&semi;s critical infrastructure&comma; including financial&comma; banking&comma; <em>and telecommunications<&sol;em> systems&period; This places schemes that exploit telecom systems for financial gain squarely within their jurisdiction&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Digital Assets&colon;<&sol;strong> Recognizing the growing use of cryptocurrencies and other digital assets in illicit activities&comma; the agency is also focused on detecting and investigating crimes involving these technologies&period;  <&sol;li>&NewLine;<&sol;ul>&NewLine;&NewLine;&NewLine;&NewLine;<p>The evolution of the Secret Service&&num;8217&semi;s mission from physical currency protection to encompassing cyber and telecommunications infrastructure fraud reflects the undeniable convergence of financial systems with digital networks&period; Crimes like Sherman&&num;8217&semi;s&comma; involving the manipulation of internal telecom company systems <sup><&sol;sup> for direct financial enrichment <sup><&sol;sup>&comma; perfectly exemplify this intersection&period; Such cases demand expertise that bridges traditional financial investigation with deep technical understanding&comma; validating the Secret Service&&num;8217&semi;s expanded role in combating technologically-facilitated financial crime impacting critical infrastructure sectors&period; &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Specialized Units and Collaborative Methods<&sol;strong> To effectively tackle these complex threats&comma; the Secret Service employs specialized units and emphasizes collaboration&colon;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<ul class&equals;"wp-block-list">&NewLine;<li><strong>Cyber Investigative Section &lpar;CIS&rpar;&colon;<&sol;strong> Based at headquarters&comma; CIS centralizes expertise and supports major cybercrime investigations globally&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Cyber Fraud Task Forces &lpar;CFTFs&rpar;&colon;<&sol;strong> These are the operational hubs for cyber investigations in the field&period; Located strategically across the country &lpar;like the Seattle Field Office involved in the Sherman case&rpar;&comma; CFTFs operate as partnerships&comma; bringing together Secret Service agents&comma; other law enforcement agencies&comma; prosecutors&comma; private industry experts&comma; and academic researchers to combat cybercrime through investigation&comma; detection&comma; and prevention&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Global Investigative Operations Center &lpar;GIOC&rpar;&colon;<&sol;strong> This center coordinates complex domestic and international investigations impacting financial infrastructure and analyzes diverse data sources&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Forensic Capabilities&colon;<&sol;strong> The agency utilizes forensic analysis for both digital and physical evidence&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Partnerships&colon;<&sol;strong> Collaboration is key&period; The Secret Service works closely with the Department of Justice &lpar;e&period;g&period;&comma; Computer Crime and Intellectual Property Section &&num;8211&semi; CCIPS&rpar; and actively engages with the private sector through initiatives like the Cyber Investigations Advisory Board &lpar;CIAB&rpar;&comma; which brings external expertise from industry&comma; academia&comma; and non-profits to inform investigative strategies&period;  <&sol;li>&NewLine;<&sol;ul>&NewLine;&NewLine;&NewLine;&NewLine;<p>The strong emphasis on partnerships&comma; particularly through the CFTFs and CIAB&comma; underscores a critical reality&colon; combating sophisticated cyber-enabled financial crime necessitates expertise and information sharing beyond traditional law enforcement structures&period; Integrating insights from the private sector—often the owners of the targeted infrastructure and primary victims—and academia is vital for understanding emerging threats&comma; industry practices&comma; and cutting-edge technologies&period; This collaborative model is likely indispensable for agencies like the Secret Service to maintain pace with the rapid evolution of criminal tactics in specialized domains such as telecommunications&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading">VIII&period; Guarding the Gates&colon; Combating Insider Threats in Telecom<&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<p>The Richard Sherman case serves as a potent reminder that significant security risks can originate not from external attackers&comma; but from trusted individuals within an organization&period; Insider threats are broadly defined as current or former employees&comma; contractors&comma; or business partners who have inside information concerning the organization&&num;8217&semi;s security practices&comma; data&comma; and computer systems&comma; and who use this information&comma; intentionally or unintentionally&comma; to cause harm or exfiltrate sensitive information&period;<sup><&sol;sup> Sherman represents a classic malicious insider&comma; deliberately abusing his legitimate access for personal gain&period; &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Insiders possess a dangerous advantage&colon; they often operate behind existing perimeter defenses and have authorized access to networks&comma; systems&comma; and sensitive data as part of their job functions&period;<sup><&sol;sup> Sherman didn&&num;8217&semi;t need to hack into the carrier&&num;8217&semi;s system from the outside&semi; he used his legitimate credentials and system privileges to manipulate account classifications and exploit the unlocking process&period;<sup><&sol;sup> &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Combating such threats requires a multi-layered approach encompassing technology&comma; policies&comma; and human factors&period; Best practices for detection and prevention include&colon;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h3 class&equals;"wp-block-heading">Detection Strategies&colon;<&sol;h3>&NewLine;&NewLine;&NewLine;&NewLine;<ul class&equals;"wp-block-list">&NewLine;<li><strong>User and Entity Behavior Analytics &lpar;UEBA&rpar;&colon;<&sol;strong> These systems establish baseline patterns of normal activity for users and devices&period; They can then flag anomalous behavior that might indicate a threat&comma; such as an employee accessing systems at unusual times&comma; downloading excessive data&comma; attempting to access resources outside their typical role &lpar;like Sherman manipulating affiliate status&rpar;&comma; or unusual patterns of bulk processing&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Comprehensive Monitoring and Logging&colon;<&sol;strong> Continuously monitor user activity&comma; especially actions involving privileged access or sensitive data modification&period; Detailed logging and regular log analysis are crucial for detecting suspicious actions and for post-incident investigations&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Access Reviews&colon;<&sol;strong> Periodically audit user access rights and permissions to ensure they align with current job roles and the principle of least privilege&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Anomaly Detection with Machine Learning&colon;<&sol;strong> Employ ML algorithms to identify subtle deviations from normal patterns in data access&comma; network traffic&comma; or system usage that might evade rule-based detection systems&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Behavioral Indicators&colon;<&sol;strong> While less definitive&comma; organizations should have processes for addressing concerning employee behaviors like expressed disgruntlement&comma; violations of policy&comma; or sudden changes in work habits&comma; as these can sometimes correlate with increased risk&period;  <&sol;li>&NewLine;<&sol;ul>&NewLine;&NewLine;&NewLine;&NewLine;<h3 class&equals;"wp-block-heading">Prevention Strategies&colon;<&sol;h3>&NewLine;&NewLine;&NewLine;&NewLine;<ul class&equals;"wp-block-list">&NewLine;<li><strong>Strong Access Controls&colon;<&sol;strong> Implement the <strong>Principle of Least Privilege &lpar;PoLP&rpar;<&sol;strong>&comma; ensuring users have only the minimum necessary permissions to perform their duties&period; Utilize <strong>Role-Based Access Control &lpar;RBAC&rpar;<&sol;strong> to manage permissions efficiently and consistently based on job functions&period; Enforce <strong>Multi-Factor Authentication &lpar;MFA&rpar;<&sol;strong> widely&comma; especially for accessing sensitive systems or performing high-risk actions&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Privileged Access Management &lpar;PAM&rpar;&colon;<&sol;strong> Deploy dedicated PAM solutions to tightly control&comma; monitor&comma; and audit the use of administrative and other privileged accounts&comma; which are frequent targets or tools for insiders&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Clear Policies and Consistent Enforcement&colon;<&sol;strong> Establish and regularly update clear&comma; comprehensive policies covering acceptable use&comma; data handling and classification&comma; remote access&comma; and security incident reporting&period; Crucially&comma; these policies must be consistently enforced across the organization&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Security Awareness Training&colon;<&sol;strong> Conduct regular&comma; role-specific security awareness training for all employees&period; This should cover recognizing threats &lpar;including insider risks and social engineering&rpar;&comma; understanding policies&comma; and knowing their responsibilities in maintaining security&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Thorough Vetting and Background Checks&colon;<&sol;strong> Implement rigorous screening processes for new hires&comma; particularly those in positions with access to sensitive data or systems&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Secure Offboarding Procedures&colon;<&sol;strong> Have a formal process to immediately revoke all system access for departing employees&comma; retrieve company assets&comma; and ensure the return or deletion of sensitive data&period; Sherman reportedly set up the fake accounts <em>before<&sol;em> leaving his employer&comma; highlighting that risks can manifest even before an employee&&num;8217&semi;s departure&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Data Loss Prevention &lpar;DLP&rpar;&colon;<&sol;strong> Use DLP tools to monitor and prevent the unauthorized transfer or exfiltration of sensitive data outside the organization&&num;8217&semi;s control&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Physical Security&colon;<&sol;strong> Maintain appropriate physical access controls to secure facilities&comma; data centers&comma; and sensitive documents&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Regular Risk Assessments and Audits&colon;<&sol;strong> Periodically conduct enterprise-wide risk assessments specifically addressing insider threats and audit the effectiveness of existing controls&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Cross-Functional Collaboration&colon;<&sol;strong> Establish an insider threat program involving stakeholders from IT Security&comma; Human Resources&comma; Legal&comma; Compliance&comma; Risk Management&comma; and Internal Audit to ensure a holistic approach&period;  <&sol;li>&NewLine;<&sol;ul>&NewLine;&NewLine;&NewLine;&NewLine;<p>The following table summarizes key mitigation strategies&colon;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<figure class&equals;"wp-block-table"><table class&equals;"has-fixed-layout"><tbody><tr><td><strong>Category<&sol;strong><&sol;td><td><strong>Specific Measure<&sol;strong><&sol;td><td><strong>Description<&sol;strong><&sol;td><td><strong>Relevance to Telecom Sector<&sol;strong><&sol;td><&sol;tr><tr><td><strong>Technical Controls<&sol;strong><&sol;td><td>Privileged Access Management &lpar;PAM&rpar;<&sol;td><td>Tools to strictly control&comma; monitor&comma; and audit access to critical systems and admin accounts&period;<&sol;td><td>Essential for securing access to network infrastructure&comma; billing systems&comma; customer databases&comma; and provisioning tools &lpar;like those Sherman manipulated&rpar;&period;<&sol;td><&sol;tr><tr><td><&sol;td><td>User &amp&semi; Entity Behavior Analytics &lpar;UEBA&rpar;<&sol;td><td>Baselines normal activity and flags anomalies in user&sol;system behavior&period;<&sol;td><td>Can detect unusual account modifications&comma; access patterns to sensitive customer data &lpar;CPNI&rpar;&comma; or abnormal use of internal tools&period;<&sol;td><&sol;tr><tr><td><&sol;td><td>Data Loss Prevention &lpar;DLP&rpar;<&sol;td><td>Monitors and blocks unauthorized movement of sensitive data&period;<&sol;td><td>Critical for preventing exfiltration of customer data&comma; proprietary network information&comma; or confidential business plans&period;<&sol;td><&sol;tr><tr><td><&sol;td><td>Strong Access Controls &lpar;PoLP&comma; RBAC&comma; MFA&rpar;<&sol;td><td>Ensures minimal necessary access based on roles&semi; requires multiple verification factors&period;<&sol;td><td>Limits potential damage if an account is compromised or abused&semi; vital given the vast amounts of sensitive data and critical systems&period;<&sol;td><&sol;tr><tr><td><strong>Organizational Policies<&sol;strong><&sol;td><td>Clear Security Policies<&sol;td><td>Documented rules for acceptable use&comma; data handling&comma; remote access&comma; incident reporting&period;<&sol;td><td>Sets clear expectations for employees handling sensitive telecom data and accessing critical systems&period;<&sol;td><&sol;tr><tr><td><&sol;td><td>Secure Offboarding<&sol;td><td>Immediate revocation of access&comma; asset retrieval&comma; data handling for departing employees&period;<&sol;td><td>Prevents departing employees from retaining access or data that could be misused &lpar;as Sherman set up accounts before leaving&rpar;&period;<&sol;td><&sol;tr><tr><td><&sol;td><td>Regular Audits &amp&semi; Risk Assessments<&sol;td><td>Periodic reviews of controls&comma; access rights&comma; and potential insider threat vulnerabilities&period;<&sol;td><td>Ensures security measures remain effective and adapt to evolving threats specific to the telecom environment&period;<&sol;td><&sol;tr><tr><td><strong>Human Factors<&sol;strong><&sol;td><td>Security Awareness Training<&sol;td><td>Educates employees on threats&comma; policies&comma; and their security responsibilities&period;<&sol;td><td>Reduces accidental risks and helps employees recognize and report suspicious activity&comma; including potential insider threats&period;<&sol;td><&sol;tr><tr><td><&sol;td><td>Background Checks &amp&semi; Vetting<&sol;td><td>Screening potential hires&comma; especially for sensitive roles&period;<&sol;td><td>Helps identify individuals with histories that may indicate higher risk before granting them access to critical telecom assets&period;<&sol;td><&sol;tr><tr><td><&sol;td><td>Cross-Functional Program<&sol;td><td>Collaboration between HR&comma; Legal&comma; IT Security&comma; Risk&comma; etc&period;&comma; on insider threat management&period;<&sol;td><td>Ensures a comprehensive approach considering legal&comma; ethical&comma; technical&comma; and human resource aspects of insider risk&period;<&sol;td><&sol;tr><&sol;tbody><&sol;table><&sol;figure>&NewLine;&NewLine;&NewLine;&NewLine;<p>Ultimately&comma; truly effective insider threat mitigation extends beyond technology and procedures into organizational culture&period; Building an environment of trust&comma; ensuring fairness in processes and disciplinary actions&comma; maintaining transparency about monitoring practices&comma; and actively promoting security awareness are crucial&period;<sup><&sol;sup> Disgruntled or neglected employees can pose a heightened risk&period;<sup><&sol;sup> While Sherman&&num;8217&semi;s actions appear purely malicious&comma; addressing the human element is a vital component of a comprehensive defense strategy&period; &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>The telecommunications sector faces particularly acute insider threat challenges due to the nature of its business&period; Employees often handle vast quantities of sensitive customer data &lpar;including call records&comma; location information&comma; and financial details&rpar;&comma; manage critical national communication infrastructure&comma; and operate complex billing and provisioning systems&period;<sup><&sol;sup> The potential impact of a compromised or malicious insider&comma; as Sherman&&num;8217&semi;s seven-year scheme demonstrates&comma; is exceptionally high&comma; capable of causing massive financial losses&comma; severe reputational damage&comma; and widespread disruption&period;<sup><&sol;sup> Therefore&comma; the application of insider threat best practices must be particularly rigorous and tailored to the unique&comma; high-stakes environment of this industry&period; &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading">IX&period; Contextualizing the Threat&colon; The Evolving Landscape of Telecom Fraud<&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<p>The Richard Sherman case&comma; while significant&comma; is just one example within a broader and constantly evolving landscape of telecommunications fraud&period; Understanding other major schemes and emerging tactics provides crucial context for appreciating the persistent nature of these threats&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h3 class&equals;"wp-block-heading">Beyond Sherman&colon; Other Major Cases<&sol;h3>&NewLine;&NewLine;&NewLine;&NewLine;<ul class&equals;"wp-block-list">&NewLine;<li><strong>Muhammad Fahd &sol; AT&amp&semi;T &lpar;Unlocking Fraud&rpar;&colon;<&sol;strong> This case&comma; resulting in a 12-year prison sentence for Fahd&comma; involved a more complex operation than Sherman&&num;8217&semi;s&comma; though with a similar goal&period; Fahd&comma; operating internationally&comma; initially bribed AT&amp&semi;T call center employees in the U&period;S&period; to use their credentials for illicit phone unlocking&period; When AT&amp&semi;T upgraded its systems&comma; Fahd escalated his tactics by hiring a developer to create custom malware&period; This malware was installed on AT&amp&semi;T&&num;8217&semi;s internal systems by bribed employees&comma; allowing Fahd&&num;8217&semi;s operation to gain persistent access&comma; gather credentials&comma; and continue unlocking phones on a massive scale—nearly 1&period;9 million devices&comma; causing an estimated &dollar;200 million in losses to AT&amp&semi;T&period; Key differences from Sherman include the use of malware as a technical intrusion method alongside insider collusion and the significantly larger scale of financial impact&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>&&num;8220&semi;The Community&&num;8221&semi; Gang &sol; Garrett Endicott &lpar;SIM Swapping&rpar;&colon;<&sol;strong> This case highlights a different but related form of telecom-facilitated fraud&colon; SIM swapping or hijacking&period; Rather than unlocking devices for resale&comma; this gang focused on taking control of victims&&num;8217&semi; phone numbers&period; They achieved this through bribing employees at mobile carriers or using social engineering tactics to trick customer support into transferring the victim&&num;8217&semi;s number to a SIM card controlled by the attackers&period; Once in control of the number&comma; they could intercept two-factor authentication codes &lpar;often sent via SMS&rpar; and gain access to victims&&num;8217&semi; online accounts&comma; particularly cryptocurrency exchange accounts&comma; leading to millions in losses&period; Endicott&comma; the final defendant sentenced&comma; received 10 months&comma; while other gang members received sentences ranging from probation to four years&period; This case underscores how the phone number itself has become a critical&comma; and often vulnerable&comma; key to digital identity and assets&comma; and again highlights the role of compromised insiders &lpar;bribed employees&rpar;&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Prevalence of SIM Swapping&colon;<&sol;strong> The threat demonstrated by &&num;8220&semi;The Community&&num;8221&semi; is widespread&period; Numerous lawsuits have been filed against major carriers like AT&amp&semi;T and T-Mobile by victims of SIM swapping&comma; alleging inadequate security measures failed to prevent attackers from hijacking their numbers and subsequently stealing funds&comma; often cryptocurrency&period;  <&sol;li>&NewLine;<&sol;ul>&NewLine;&NewLine;&NewLine;&NewLine;<h3 class&equals;"wp-block-heading">Comparison of Major SIM-Related Fraud Cases<&sol;h3>&NewLine;&NewLine;&NewLine;&NewLine;<figure class&equals;"wp-block-table"><table class&equals;"has-fixed-layout"><tbody><tr><td><strong>Feature<&sol;strong><&sol;td><td><strong>Richard Sherman Case<&sol;strong><&sol;td><td><strong>Muhammad Fahd &sol; AT&amp&semi;T Case<&sol;strong><&sol;td><td><strong>&&num;8220&semi;The Community&&num;8221&semi; &sol; Endicott Case<&sol;strong><&sol;td><&sol;tr><tr><td><strong>Primary Fraud Type<&sol;strong><&sol;td><td>Device Unlocking<&sol;td><td>Device Unlocking<&sol;td><td>SIM Swapping &sol; Account Takeover<&sol;td><&sol;tr><tr><td><strong>Key Methods<&sol;strong><&sol;td><td>Insider System Manipulation &lpar;Exploiting Exemption&comma; Fake Accounts&rpar;<&sol;td><td>Bribery of Insiders&comma; Custom Malware Deployment<&sol;td><td>Bribery of Insiders&comma; Social Engineering<&sol;td><&sol;tr><tr><td><strong>Primary Target&sol;Goal<&sol;strong><&sol;td><td>Profit from Resale of Unlocked Phones<&sol;td><td>Profit from Resale of Unlocked Phones<&sol;td><td>Theft from Victim Accounts &lpar;esp&period; Crypto&rpar;<&sol;td><&sol;tr><tr><td><strong>Scale &sol; Impact<&sol;strong><&sol;td><td>~&dollar;500k Gain &lpar;Defendant&rpar;&semi; Carrier Loss Likely Higher&semi; Thousands of Phones<&sol;td><td>~&dollar;200M Loss &lpar;Carrier&rpar;&semi; ~1&period;9M Phones<&sol;td><td>Multi-million &dollar; Crypto Theft&semi; Multiple Victims<&sol;td><&sol;tr><tr><td><strong>Legal Outcome<&sol;strong><&sol;td><td>Guilty Plea &lpar;Wire Fraud Conspiracy&rpar;&semi; Sentencing Pending<&sol;td><td>12 Years Prison &lpar;Wire Fraud Conspiracy&rpar;<&sol;td><td>Various Sentences &lpar;Probation to 4 Years Prison&rpar;&semi; Endicott&colon; 10 Months<&sol;td><&sol;tr><&sol;tbody><&sol;table><&sol;figure>&NewLine;&NewLine;&NewLine;&NewLine;<p><&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>This comparison reveals a diversification of tactics targeting the telecom ecosystem&period; While unlocking fraud exploits carrier business processes and device subsidies&comma; SIM swapping targets the end-user&&num;8217&semi;s reliance on the phone number for identity verification and account security&period; Both methods&comma; however&comma; frequently rely on the &&num;8220&semi;human element&&num;8221&semi;—either through the direct malicious actions of an insider like Sherman&comma; or the compromise &lpar;via bribery or deception&rpar; of carrier employees&comma; as seen in the Fahd and &&num;8220&semi;The Community&&num;8221&semi; cases&period;<sup><&sol;sup> &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Emerging Trends and Industry Responses<&sol;strong> Fraudsters continually adapt their methods&period; Trends include increasing sophistication in social engineering&comma; attempts to exploit newer technologies like eSIMs &lpar;which&comma; despite security features&comma; remain vulnerable to malware and social engineering&rpar;&comma; and the persistent use of established fraud types like International Revenue Sharing Fraud &lpar;IRSF&rpar;&comma; Wangiri &lpar;call-back scams&rpar;&comma; and Interconnect Bypass &lpar;SIM box fraud&rpar;&period;<sup><&sol;sup> &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>The telecommunications industry recognizes the severity of the threat&period; A staggering 92&percnt; of carriers identified fraud as a &&num;8216&semi;top&&num;8217&semi; or &&num;8216&semi;strategic&&num;8217&semi; priority in 2023&comma; up significantly from 77&percnt; in 2022&period;<sup><&sol;sup> Responses involve investing in advanced fraud detection systems utilizing AI and machine learning&comma; implementing real-time monitoring&comma; enhancing internal controls&comma; and fostering collaboration within the industry and with law enforcement&period;<sup><&sol;sup> Regulatory bodies are also increasing scrutiny&comma; with the FCC&comma; for example&comma; exploring rules to compel carriers to strengthen defenses against SIM swapping&period;<sup><&sol;sup> &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>The immense financial losses attributed to telecom fraud—tens of billions annually <sup><&sol;sup>—and the high strategic priority assigned to combating it by carriers create a compelling business case for significant investment in prevention&period; While some operators may have historically absorbed certain fraud costs as a part of doing business <sup><&sol;sup>&comma; the escalating scale and sophistication of attacks necessitate proactive measures&period; The cost of implementing robust defenses&comma; including advanced technological solutions and comprehensive insider threat programs&comma; is increasingly viewed as a necessary investment likely outweighed by the potential savings from mitigating catastrophic fraud events like the Fahd case <sup><&sol;sup> or preventing long-running internal schemes like Sherman&&num;8217&semi;s&period; &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading">X&period; Conclusion&colon; Lessons from an Inside Job<&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<p>The case of Richard Forrest Sherman stands as a sobering testament to the enduring threat posed by malicious insiders within the telecommunications industry&period; Over seven years&comma; Sherman leveraged his trusted position and intimate knowledge of internal systems to execute a wire fraud conspiracy&comma; manipulating account privileges and exploiting procedural loopholes to facilitate the illicit unlocking of thousands of mobile devices for personal profit&period;<sup><&sol;sup> His guilty plea underscores the significant legal consequences awaiting those who betray corporate trust for financial gain&comma; facing potentially decades in prison under federal statutes like 18 U&period;S&period;C&period; § 1349&period;<sup><&sol;sup> &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Several critical lessons emerge from this analysis&colon;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<ul class&equals;"wp-block-list">&NewLine;<li><strong>Insider Threats Remain Paramount&colon;<&sol;strong> Even as organizations bolster external defenses&comma; the risk from within persists&period; Insiders with legitimate access can bypass many security layers&comma; making robust internal controls&comma; vigilant monitoring &lpar;like UEBA&rpar;&comma; and strict adherence to the principle of least privilege essential&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Business Processes Can Be Vulnerabilities&colon;<&sol;strong> Sherman exploited not a technical flaw in software&comma; but a weakness in the <em>process<&sol;em> surrounding customer exemptions and affiliate account classifications&period; This highlights the need to secure workflows and authorizations with the same rigor applied to technical systems&comma; especially those granting powerful privileges like bulk unlocking exemptions&period; Trust must be verified&comma; even internally&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Economic Models Create Fraud Opportunities&colon;<&sol;strong> The carrier practice of SIM locking&comma; driven by device subsidies&comma; creates an economic incentive for unlocking&period; This inherent market tension fuels demand for illicit services&comma; which insiders like Sherman can exploit&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Specialized Law Enforcement is Crucial&colon;<&sol;strong> The U&period;S&period; Secret Service&&num;8217&semi;s successful investigation demonstrates the value of specialized units &lpar;like CFTFs&rpar; possessing expertise in both financial crime and cyber&sol;telecom infrastructure&period; Their evolving mandate reflects the merging of financial and digital crime landscapes&period;  <&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Legal Deterrents are Strong but Prevention is Key&colon;<&sol;strong> While statutes like 18 U&period;S&period;C&period; § 1349 provide powerful tools for prosecution with severe penalties &comma; the ideal outcome is prevention&period; The significant financial and reputational damage caused by telecom fraud underscores the necessity of proactive investment in comprehensive security measures&period;  <&sol;li>&NewLine;<&sol;ul>&NewLine;&NewLine;&NewLine;&NewLine;<p>The ongoing battle against sophisticated telecom fraud&comma; whether SIM unlocking schemes&comma; SIM swapping&comma; or other variants&comma; demands constant vigilance and adaptation&period; This includes deploying advanced technologies like AI&sol;ML for anomaly detection&comma; rigorously enforcing strong access controls and internal policies&comma; cultivating a security-aware workforce through continuous training&comma; and fostering robust collaboration between industry players&comma; law enforcement&comma; and regulatory bodies <sup><&sol;sup>-&period;<sup><&sol;sup> &nbsp&semi;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>Ultimately&comma; the Richard Sherman conspiracy is a powerful narrative reinforcing a fundamental security principle&colon; the most damaging threats can indeed originate from within&comma; adeptly exploiting the very systems and trust mechanisms designed for legitimate operations&period; Building resilience against such insider threats requires a holistic strategy that meticulously addresses technology&comma; process&comma; and the human element&comma; recognizing that safeguarding critical telecommunications infrastructure demands vigilance at every level&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p><&sol;p>&NewLine;

Atlanta Cousins Sentenced in $2 Million+ COVID-19 Relief Fraud Scheme: Narcisse and Dieujuste Exploited PPP and EIDL Programs

&NewLine;<p><strong>Atlanta&comma; GA<&sol;strong> – In a stark reminder of the pervasive fraud that plagued COVID-19 relief programs&comma; two Georgia men&comma; Johnny Narcisse and his cousin Johnson Dieujuste&comma; have been sentenced to federal prison for their roles in a sophisticated scheme that defrauded the Paycheck Protection Program &lpar;PPP&rpar; and the Economic Injury Disaster Loan &lpar;EIDL&rpar; program of more than &dollar;2 million&period; The case highlights the vulnerability of emergency relief funds and the ongoing efforts of law enforcement to bring perpetrators of pandemic-related fraud to justice&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>This article delves into the details of Narcisse and Dieujuste&&num;8217&semi;s fraudulent activities&comma; their convictions&comma; and the broader context of COVID-19 relief fraud&period; It also explores the role of various government agencies in investigating and prosecuting such crimes&comma; and provides information on how the public can report suspected fraud&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading">The Scheme&colon; Exploiting Vulnerabilities in COVID-19 Relief Programs<&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<p>The COVID-19 pandemic triggered an unprecedented economic crisis&comma; prompting the U&period;S&period; government to launch massive relief programs aimed at mitigating the <a class&equals;"wpil&lowbar;keyword&lowbar;link" href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;tag&sol;financial-fraud&sol;" title&equals;"financial" data-wpil-keyword-link&equals;"linked" data-wpil-monitor-id&equals;"1133">financial<&sol;a> fallout&period; The PPP and EIDL programs were central to this effort&comma; designed to provide forgivable loans to small businesses struggling to stay afloat and cover essential expenses like payroll&comma; rent&comma; and utilities&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>However&comma; the speed and scale at which these programs were rolled out created opportunities for unscrupulous individuals to exploit vulnerabilities in the system&period; Johnny Narcisse and Johnson Dieujuste were among those who seized this opportunity&comma; devising a scheme that ultimately defrauded taxpayers of over &dollar;2 million&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading">How the Fraud Unfolded&colon; A Detailed Look at Narcisse and Dieujuste&&num;8217&semi;s Tactics<&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<p>According to court documents and statements made by Acting U&period;S&period; Attorney Richard S&period; Moultrie&comma; Jr&period;&comma; the investigation into Narcisse began in July 2021 when federal agents&comma; initially investigating a Florida resident for suspected tax crimes&comma; obtained a search warrant for Narcisse&&num;8217&semi;s Georgia home&comma; computer&comma; and cellular phone&period; This search yielded a trove of evidence revealing a complex conspiracy between Narcisse and Dieujuste&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>The cousins&&num;8217&semi; scheme involved recruiting small business owners and then filing fraudulent applications for PPP and EIDL loans on their behalf&period; The process was deceptively simple&colon;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<ol class&equals;"wp-block-list">&NewLine;<li><strong>Recruitment&colon;<&sol;strong> Narcisse and Dieujuste would approach small business owners&comma; promising to help them secure COVID-19 relief funds&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Information Gathering&colon;<&sol;strong> They would collect the business owners&&num;8217&semi; names&comma; business names&comma; and Employer Identification Numbers &lpar;EINs&rpar;&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Fabrication&colon;<&sol;strong> The rest of the information required for the <a class&equals;"wpil&lowbar;keyword&lowbar;link" href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;category&sol;loans&sol;" title&equals;"loan" data-wpil-keyword-link&equals;"linked" data-wpil-monitor-id&equals;"1132">loan<&sol;a> applications was simply invented&period; Narcisse and Dieujuste fabricated details about the businesses&&num;8217&semi; revenue&comma; expenses&comma; and number of employees to make them appear eligible for the loans&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Submission&colon;<&sol;strong> The fraudulent applications were then submitted to the Small Business Administration &lpar;SBA&rpar; and participating lenders&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Kickbacks&colon;<&sol;strong> If a loan was approved and disbursed&comma; the borrowers would kick back a percentage of the proceeds to Narcisse and&sol;or Dieujuste as payment for their &&num;8220&semi;services&period;&&num;8221&semi;<&sol;li>&NewLine;<&sol;ol>&NewLine;&NewLine;&NewLine;&NewLine;<p>This scheme was replicated dozens of times&comma; resulting in over &dollar;2 million in fraudulent loans being disbursed&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading">Beyond the Conspiracy&colon; Individual Fraudulent Loan Applications<&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<p>In addition to their scheme to defraud the PPP and EIDL programs on behalf of others&comma; Narcisse and Dieujuste also filed fraudulent loan applications for themselves&period; These individual applications&comma; which were uncovered during the investigation&comma; added to the total loss amount and were factored into their sentencing and restitution orders&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading">The Investigation&colon; Unraveling the Fraudulent Web<&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<p>The investigation into Narcisse and Dieujuste&&num;8217&semi;s activities was a collaborative effort led by the U&period;S&period; Treasury Inspector General for Tax Administration &lpar;TIGTA&rpar; and the Small Business Administration&&num;8217&semi;s Office of Inspector General &lpar;SBA-OIG&rpar;&period; These agencies played a crucial role in identifying the fraudulent loan applications&comma; tracing the flow of funds&comma; and gathering the evidence necessary to build a strong case against the defendants&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>The initial search warrant executed at Narcisse&&num;8217&semi;s home proved to be a turning point in the investigation&period; The digital evidence found on his computer and phone provided a detailed record of their communications&comma; the fraudulent loan applications&comma; and the financial transactions associated with the scheme&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading">Legal Proceedings&colon; Guilty Pleas and Sentencing<&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<p>Faced with the overwhelming evidence against them&comma; both Narcisse and Dieujuste pleaded guilty to one count each of conspiracy to commit wire fraud&period; This guilty plea&comma; a federal felony&comma; carry a maximum penalty of 20 years&comma; as well as a fine of not more than the greater of &dollar;250&comma;000 or twice the gross gain or loss from the offense&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading">Johnny Narcisse&&num;8217&semi;s Sentencing&colon;<&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<p>On October 21&comma; 2024&comma; U&period;S&period; District Judge Eleanor L&period; Ross sentenced Johnny Narcisse&comma; 46&comma; of Atlanta&comma; Georgia&comma; to two years and four months in prison&comma; followed by three years of supervised release&period; He was also ordered to pay restitution in the amount of &dollar;2&comma;000&comma;332&comma; reflecting the total losses attributed to his involvement in the scheme&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading">Johnson Dieujuste&&num;8217&semi;s Sentencing&colon;<&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<p>Johnson Dieujuste&comma; 37&comma; of Loganville&comma; Georgia&comma; received his sentence on January 8&comma; 2025&period; Judge Ross sentenced him to two years and eight months in prison&comma; also followed by three years of supervised release&period; Dieujuste was ordered to pay restitution in the amount of &dollar;2&comma;081&comma;559&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading">The Role of the COVID-19 Fraud Enforcement Task Force<&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<p>The prosecution of Narcisse and Dieujuste is part of a broader effort to combat pandemic-related fraud&period; On May 17&comma; 2021&comma; the Attorney General established the COVID-19 Fraud Enforcement Task Force&comma; a multi-agency initiative aimed at marshaling resources and expertise to investigate and prosecute individuals and organizations involved in COVID-19 relief fraud&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p>The Task Force has been instrumental in&colon;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<ul class&equals;"wp-block-list">&NewLine;<li><strong>Enhancing investigative and prosecutorial efforts&colon;<&sol;strong> By bringing together resources and expertise from various agencies&comma; the Task Force has strengthened the government&&num;8217&semi;s ability to identify and prosecute complex fraud schemes&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Improving coordination&colon;<&sol;strong> The Task Force has fostered greater collaboration between federal agencies&comma; state and local law enforcement&comma; and private sector partners&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Sharing information and best practices&colon;<&sol;strong> The Task Force facilitates the exchange of information and intelligence&comma; allowing agencies to learn from past enforcement efforts and adapt their strategies accordingly&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Preventing future fraud&colon;<&sol;strong> By analyzing patterns and trends in pandemic-related fraud&comma; the Task Force is working to identify vulnerabilities in relief programs and develop strategies to prevent future exploitation&period;<&sol;li>&NewLine;<&sol;ul>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading">The Broader Context&colon; The Scope of COVID-19 Relief Fraud<&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<p>The case of Narcisse and Dieujuste is just one example of the widespread fraud that has plagued COVID-19 relief programs&period; While the vast majority of the trillions of dollars in aid were distributed legitimately&comma; a significant portion was lost to fraud&comma; waste&comma; and abuse&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading">The Scope of the Problem&colon;<&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<p>Estimates of the total amount of fraudulent COVID-19 relief funds vary widely&comma; but it is undoubtedly in the billions&comma; if not tens of billions&comma; of dollars&period; The SBA-OIG&comma; in a 2023 report&comma; estimated that as much as &dollar;200 billion may have been lost to fraud in the PPP and EIDL programs alone&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading">Types of Fraud&colon;<&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<p>COVID-19 relief fraud has taken many forms&comma; including&colon;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<ul class&equals;"wp-block-list">&NewLine;<li><strong>Identity theft&colon;<&sol;strong> Fraudsters used stolen identities to apply for loans in the names of unsuspecting individuals&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Business identity theft&colon;<&sol;strong> Similar to identity theft&comma; but involving the use of stolen business information&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Loan stacking&colon;<&sol;strong> Applicants applied for multiple loans from different lenders&comma; often using the same fabricated information&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Inflated payroll or revenue&colon;<&sol;strong> Businesses exaggerated their payroll or revenue figures to qualify for larger loans&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Shell companies&colon;<&sol;strong> Fraudsters created fake businesses with no legitimate operations to apply for loans&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Misuse of funds&colon;<&sol;strong> Some businesses received loans but used the funds for purposes other than those allowed under the programs&period;<&sol;li>&NewLine;<&sol;ul>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading">Consequences of Fraud&colon;<&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<p>The consequences of COVID-19 relief fraud are far-reaching&colon;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<ul class&equals;"wp-block-list">&NewLine;<li><strong>Financial losses to taxpayers&colon;<&sol;strong> Fraudulent loans represent a direct loss to taxpayers&comma; who ultimately bear the cost of these programs&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Undermining public trust&colon;<&sol;strong> Fraud erodes public trust in government programs and institutions&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Distorting the economy&colon;<&sol;strong> Fraudulent loans can distort the economy by providing an unfair advantage to those who engaged in illicit activities&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Diverting resources from legitimate recipients&colon;<&sol;strong> Fraudulent claims can deplete the funds available for legitimate businesses and individuals in need&period;<&sol;li>&NewLine;<&sol;ul>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading">Reporting Suspected COVID-19 Fraud<&sol;h2>&NewLine;&NewLine;&NewLine;&NewLine;<p>The Department of Justice encourages anyone with information about allegations of attempted fraud involving COVID-19 to report it&period; You can do so by&colon;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<ul class&equals;"wp-block-list">&NewLine;<li><strong>Calling the National Center for Disaster Fraud &lpar;NCDF&rpar; Hotline&colon;<&sol;strong> 866-720-5721<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li><strong>Submitting a complaint online&colon;<&sol;strong> <a href&equals;"https&colon;&sol;&sol;www&period;justice&period;gov&sol;disaster-fraud&sol;ncdf-disaster-complaint-form" target&equals;"&lowbar;blank" rel&equals;"noreferrer noopener">https&colon;&sol;&sol;www&period;justice&period;gov&sol;&&num;8230&semi;complaint-form<&sol;a><&sol;li>&NewLine;<&sol;ul>&NewLine;&NewLine;&NewLine;&NewLine;<p><strong>Conclusion<&sol;strong><&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h2 class&equals;"wp-block-heading">The sentencing of Johnny Narcisse and Johnson Dieujuste serves as a powerful reminder of the ongoing fight against COVID-19 relief fraud&period; Their case underscores the importance of vigilance&comma; robust investigative efforts&comma; and inter-agency collaboration in protecting taxpayer funds and ensuring the integrity of government programs&period; As the COVID-19 Fraud Enforcement Task Force continues its work&comma; it is expected that more cases of pandemic-related fraud will be uncovered and prosecuted&comma; sending a clear message that those who seek to exploit public emergencies for personal gain will be held accountable&period; The public plays a vital role in this effort by reporting suspected fraud and helping to safeguard the integrity of vital relief programs&period;<&sol;h2>&NewLine;

FIFA Officials Indicted for Conspiracy and Corruption Scam

<h2 id&equals;"node-title">Sixteen Additional FIFA Officials Indicted for Racketeering Conspiracy and Corruption<&sol;h2>&NewLine;<p><figure id&equals;"attachment&lowbar;15565" aria-describedby&equals;"caption-attachment-15565" style&equals;"width&colon; 336px" class&equals;"wp-caption alignright"><a href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;6502566-3x2-700x467-2&sol;" rel&equals;"attachment wp-att-15565"><img class&equals;"wp-image-15565" src&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;wp-content&sol;uploads&sol;2015&sol;12&sol;6502566-3x2-700x467-1-1&period;jpg" alt&equals;"FIFA Officials Indicted" width&equals;"336" height&equals;"224" &sol;><&sol;a><figcaption id&equals;"caption-attachment-15565" class&equals;"wp-caption-text"><em><strong>FIFA Officials Indicted<&sol;strong><&sol;em><&sol;figcaption><&sol;figure><&sol;p>&NewLine;<p class&equals;"rtecenter">The New Defendants Include Five Current or Former FIFA Executive Committee Members and the Current Presidents of CONCACAF and CONMEBOL&semi; Guilty Pleas for Eight Others&comma; Including Jeffrey Webb and the Former Presidents of the Colombian and Chilean Soccer Federations&comma; also Announced<&sol;p>&NewLine;<p>A 92-count superseding indictment was unsealed earlier today in federal court in Brooklyn&comma; New York&comma; charging an additional 16 defendants with racketeering&comma; wire fraud and money laundering conspiracies&comma; among other offenses&comma; in connection with their participation in a 24-year scheme to enrich themselves through the corruption of international soccer&period;  The superseding indictment also includes additional charges for seven of the defendants still pending extradition following the return of the original indictment last May&period;  The guilty pleas of eight defendants – including Jeffrey Webb&comma; Alejandro Burzaco and José Margulies&comma; three of the defendants indicted last May – were also announced today&period;<&sol;p>&NewLine;<p>The new defendants charged in the superseding indictment include high-ranking officials of FIFA&comma; the organization responsible for the regulation and promotion of soccer worldwide&comma; as well as high-ranking officials of other soccer governing bodies that operate under the FIFA umbrella&period;  The defendants Alfredo Hawit and Juan Ángel Napout – the current presidents of CONCACAF and CONMEBOL&comma; respectively&comma; as well as current FIFA vice presidents and Executive Committee members – are among the 16 additional soccer officials charged with racketeering and bribery offenses&period;  CONCACAF and CONMEBOL are two of FIFA’s six continental confederations&period;  The new defendants also include Marco Polo del Nero and Ricardo Teixeira&comma; the current and former presidents of the Brazilian soccer federation&comma; both of whom are also former members of the FIFA Executive Committee&comma; as well as José Luís Meiszner and Eduardo Deluca&comma; the current and former general secretaries of CONMEBOL&period;  Within UNCAF&comma; the Central American regional soccer union operating within CONCACAF&comma; the charges in the superseding indictment name the current and&sol;or former presidents of nearly every country in the region&colon; Costa Rica&comma; El Salvador&comma; Guatemala&comma; Honduras&comma; Nicaragua and Panama&period;  Taken together&comma; the 27 defendants in the superseding indictment are alleged to have engaged in a number of schemes all designed to solicit and receive well over &dollar;200 million in bribes and kickbacks to sell lucrative media and marketing rights to international soccer tournaments and matches&comma; among other valuable rights and properties&period;<&sol;p>&NewLine;<p>The charges were announced by Attorney General Loretta E&period; Lynch&comma; FBI Director James B&period; Comey&comma; U&period;S&period; Attorney Robert L&period; Capers of the Eastern District of New York&comma; Assistant Director in Charge Diego G&period; Rodriguez of the FBI’s New York Field Office&comma; Chief Richard Weber of Internal Revenue Service-Criminal Investigation &lpar;IRS-CI&rpar; and Special Agent in Charge Erick Martinez of the IRS-CI Los Angeles Field Office&period;<&sol;p>&NewLine;<p>Early this morning&comma; Swiss authorities in Zurich arrested two of the defendants charged in the superseding indictment – Hawit and Napout – at the request of the United States&period;  Also this morning&comma; a search warrant was executed at Media World&comma; a sports marketing company based in Miami&period;<&sol;p>&NewLine;<p>The new charges unsealed today bring the total number of individuals and entities charged to date to 41&period;  Of those&comma; 12 individuals and two sports marketing companies have already been convicted as a result of the ongoing investigation&period;  The convicted defendants have agreed to pay more than &dollar;190 million in forfeiture&period;  In addition&comma; more than &dollar;100 million has been restrained in the United States and abroad in connection with the alleged criminal activity&period;  The United States has issued mutual legal assistance requests seeking the restraint of assets located in 13 countries around the world&period;<&sol;p>&NewLine;<p>&OpenCurlyDoubleQuote;The Department of Justice is committed to ending the rampant corruption we have alleged amidst the leadership of international soccer – not only because of the scale of the schemes&comma; or the brazenness and breadth of the operation required to sustain such corruption&comma; but also because of the affront to international principles that this behavior represents&comma;” said Attorney General Lynch&period;  &OpenCurlyDoubleQuote;The message from this announcement should be clear to every culpable individual who remains in the shadows&comma; hoping to evade our investigation&colon; You will not wait us out&period;  You will not escape our focus&period;”  Attorney General Lynch extended her grateful appreciation to the authorities of the government of Switzerland for their continuing outstanding assistance and collaboration in this investigation&comma; and to the authorities in a number of other countries&comma; including Brazil and Colombia&comma; for their assistance as well&period;<&sol;p>&NewLine;<p>&OpenCurlyDoubleQuote;For decades&comma; these defendants used their power as the leaders of soccer federations throughout the world to create a web of corruption and greed that compromises the integrity of the beautiful game&comma;” said Director Comey&period;  &OpenCurlyDoubleQuote;I want to thank all the agencies for their hard work and for showing the world that we do not tolerate this criminal activity&period;”<&sol;p>&NewLine;<p>&OpenCurlyDoubleQuote;The charges unsealed today send a clear message to those who corrupted a sport beloved by millions to satisfy their own greed&colon; We are determined to put a stop to bribery and corruption in international soccer and to make room for a new era of integrity and reform&comma;” said U&period;S&period; Attorney Capers&period;  &OpenCurlyDoubleQuote;This indictment is the latest step in that effort&comma; but our work is not done&period;  While our investigation continues at home&comma; we also look forward to continuing our collaboration with our international partners&comma; including in particular the Swiss authorities&comma; because there is so much yet to be done&period;”  Mr&period; Capers extended his thanks to the agents&comma; analysts and other investigative personnel with the FBI New York Eurasian Joint Organized Crime Squad and the IRS-CI Los Angeles Field Office&comma; as well as their colleagues in the United States and abroad&comma; for their continuing tremendous effort in this case&period;  Mr&period; Capers also thanked the U&period;S&period; Marshals Service for its continuing assistance&period;<&sol;p>&NewLine;<p>&OpenCurlyDoubleQuote;The brazenness with which the individuals indicted today breached the integrity of the U&period;S&period; <a class&equals;"wpil&lowbar;keyword&lowbar;link" href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;tag&sol;financial-fraud&sol;" title&equals;"financial" data-wpil-keyword-link&equals;"linked" data-wpil-monitor-id&equals;"503">financial<&sol;a> system to promote and conceal their criminal schemes is quite alarming&comma;” said Chief Weber&period;  &OpenCurlyDoubleQuote;While it is one of the most complex worldwide financial investigations ever conducted&comma; it is also an eye opener to everyone that such greed and corruption could be hiding in plain sight within the world’s most popular sport&period;  By conspiring to enrich themselves through bribery and kickback schemes relating to media and marketing rights&comma; the defendants undermined the process of fair and open competition&comma; corrupting the beautiful game for their own personal gain&period;”<&sol;p>&NewLine;<p>The charges in the superseding indictment are merely allegations&comma; and the defendants are presumed innocent unless and until proven guilty&period;<&sol;p>&NewLine;<p><strong><em>Overview of the Superseding Indictment<&sol;em><&sol;strong><&sol;p>&NewLine;<p>As alleged in the superseding indictment&comma; FIFA and its six continental confederations – including CONCACAF&comma; headquartered in the United States&comma; and CONMEBOL&comma; the confederation headquartered in South America – together with affiliated regional federations&comma; national member associations and sports marketing companies&comma; constitute an enterprise of legal entities associated in fact for purposes of violating the federal racketeering laws&period;  The principal – and entirely legitimate – purpose of the enterprise is to regulate and promote the sport of soccer worldwide&period;<&sol;p>&NewLine;<p>Like the original indictment&comma; the superseding indictment alleges that between 1991 and the present&comma; the defendants and their co-conspirators corrupted the enterprise by engaging in various criminal activities&comma; including fraud&comma; bribery and money laundering&period;  Two generations of soccer officials abused their positions of trust for personal gain&comma; frequently through an alliance with unscrupulous sports marketing executives who shut out competitors and kept highly lucrative contracts for themselves through the systematic payment of bribes and kickbacks&period;  All told&comma; the soccer officials are charged with conspiring to solicit and receive more than &dollar;200 million in bribes and kickbacks in exchange for their official support of the sports marketing executives who agreed to make the unlawful payments&period;<&sol;p>&NewLine;<p>The schemes alleged in the original indictment related to the solicitation and receipt of bribes and kickbacks by soccer officials from sports marketing executives in connection with the commercialization of the media and marketing rights associated with various soccer matches and tournaments&comma; as well as schemes related to the payment and receipt of bribes and kickbacks in connection with the sponsorship of the Brazilian soccer federation by a major U&period;S&period; sportswear company&comma; the selection of the host country for the 2010 World Cup and the 2011 FIFA presidential election&period;<&sol;p>&NewLine;<p>The new allegations in the superseding indictment relate to a series of bribery schemes in connection with multiple cycles of FIFA World Cup qualifiers and international friendly matches involving six Central American member associations within UNCAF&semi; a bribery scheme implicating many top CONMEBOL officials relating to the sale of broadcasting rights to the CONMEBOL Copa Libertadores over an extended period&semi; and a scheme by an Argentinian sports marketing company to obtain various rights properties from CONCACAF by paying bribes to three Central American soccer officials to cause them to exert their influence in favor of the company&period;<&sol;p>&NewLine;<p><strong><em>The 16 New Defendants<&sol;em><&sol;strong><&sol;p>&NewLine;<p>As set forth in the superseding indictment&comma; the 16 newly-indicted defendants are all current or former soccer officials who acted at various times in a fiduciary capacity within FIFA and one or more of its constituent organizations&colon;<&sol;p>&NewLine;<p><u>CONCACAF Region Officials<&sol;u><&sol;p>&NewLine;<ul>&NewLine;<li><u>Alfredo Hawit<&sol;u>&colon; Current FIFA vice president and Executive Committee member and CONCACAF president&period;  Former CONCACAF vice president and Honduran soccer federation president&period;<&sol;li>&NewLine;<li><u>Ariel Alvarado<&sol;u>&colon; Current member of the FIFA Disciplinary Committee&period;  Former CONCACAF Executive Committee member and Panamanian soccer federation president&period;<&sol;li>&NewLine;<li><u>Rafael Callejas<&sol;u>&colon; Current member of the FIFA Television and Marketing Committee&period;  Former Honduran soccer federation president and former president of the Republic of Honduras&period;<&sol;li>&NewLine;<li><u>Brayan Jiménez<&sol;u>&colon; Current Guatemalan soccer federation president and member of the FIFA Committee for Fair Play and Social Responsibility&period;<&sol;li>&NewLine;<li><u>Rafael Salguero<&sol;u>&colon; Former FIFA Executive Committee member and Guatemalan soccer federation president&period;<&sol;li>&NewLine;<li><u>Héctor Trujillo<&sol;u>&colon; Current Guatemalan soccer federation general secretary and judge on the Constitutional Court of Guatemala&period;<&sol;li>&NewLine;<li><u>Reynaldo Vasquez<&sol;u>&colon; Former Salvadoran soccer federation president&period;<&sol;li>&NewLine;<&sol;ul>&NewLine;<p><u>CONMEBOL Region Officials<&sol;u><&sol;p>&NewLine;<ul>&NewLine;<li><u>Juan Ángel Napout<&sol;u>&colon; Current FIFA vice president and Executive Committee member and CONMEBOL president&period;  Former Paraguayan soccer federation president&period;<&sol;li>&NewLine;<li><u>Manuel Burga<&sol;u>&colon; Current member of the FIFA Development Committee&period;  Former Peruvian soccer federation president&period;<&sol;li>&NewLine;<li><u>Carlos Chávez<&sol;u>&colon; Current CONMEBOL treasurer&period;  Former Bolivian soccer federation president&period;<&sol;li>&NewLine;<li><u>Luís Chiriboga<&sol;u>&colon; Current Ecuadorian soccer federation president and member of the CONMEBOL Executive Committee&period;<&sol;li>&NewLine;<li><u>Marco Polo del Nero<&sol;u>&colon; Current president of the Brazilian soccer federation&period;  Announced resignation from FIFA Executive Committee on Nov&period; 26&comma; 2015&period;<&sol;li>&NewLine;<li><u>Eduardo Deluca<&sol;u>&colon; Former CONMEBOL general secretary&period;<&sol;li>&NewLine;<li><u>José Luis Meiszner<&sol;u>&colon; Current CONMEBOL general secretary&period;<&sol;li>&NewLine;<li><u>Romer Osuna<&sol;u>&colon; Current member of the FIFA Audit and Compliance Committee&period;  Former CONMEBOL treasurer&period;<&sol;li>&NewLine;<li><u>Ricardo Teixeira<&sol;u>&colon; Former Brazilian soccer federation president and FIFA Executive Committee member&period;<&sol;li>&NewLine;<&sol;ul>&NewLine;<p><strong><em>The Convicted Defendants<&sol;em><&sol;strong><&sol;p>&NewLine;<p>The following defendants previously pleaded guilty under seal and agreed to forfeit more than &dollar;40 million&colon;<&sol;p>&NewLine;<p>On May 26&comma; 2015&comma; Zorana Danis&comma; the co-founder and owner of International Soccer Marketing Inc&period;&comma; a New Jersey-based sports marketing company&comma; waived indictment and pleaded guilty to a two-count information charging her with wire fraud conspiracy and filing false tax returns&period;  As part of her plea&comma; Danis agreed to forfeit &dollar;2 million&period;<&sol;p>&NewLine;<p>On Nov&period; 9&comma; 2015&comma; Fabio Tordin&comma; the former CEO of Traffic Sports USA Inc&period; and currently an executive with Media World LLC&comma; a Miami-based sports marketing company&comma; waived indictment and pleaded guilty to a four-count information charging him with three counts of wire fraud conspiracy and one count of tax evasion&period;  As part of his plea&comma; Tordin agreed to forfeit more than &dollar;600&comma;000&period;<&sol;p>&NewLine;<p>On Nov&period; 12&comma; 2015&comma; Luis Bedoya&comma; a member of the FIFA Executive Committee&comma; a CONMEBOL vice president and&comma; until last month&comma; the president of the Federación Colombiana de Fútbol&comma; the Colombian soccer federation&comma; waived indictment and pleaded guilty to a two-count information charging him with racketeering conspiracy and wire fraud conspiracy&period;  As part of his plea&comma; Bedoya agreed to forfeit all funds on deposit in his Swiss bank account&comma; among other funds&period;<&sol;p>&NewLine;<p>On Nov&period; 16&comma; 2015&comma; Alejandro Burzaco&comma; the former general manager and chairman of the board of Torneos y Competencias S&period;A&period;&comma; an Argentinian sports marketing company&comma; pleaded guilty to racketeering conspiracy&comma; wire fraud conspiracy and money laundering conspiracy&period;  As part of his plea&comma; Burzaco agreed to forfeit more than &dollar;21&period;6 million&period;<&sol;p>&NewLine;<p>On Nov&period; 17&comma; 2015&comma; Roger Huguet&comma; the CEO of Media World and its parent company&comma; waived indictment and pleaded guilty to a three-count information charging him with two counts of wire fraud conspiracy and one count of money laundering conspiracy&period;  As part of his plea&comma; Huguet agreed to forfeit more than &dollar;600&comma;000&period;<&sol;p>&NewLine;<p>On Nov&period; 23&comma; 2015&comma; Jeffrey Webb&comma; a former FIFA vice president and Executive Committee member&comma; CONCACAF president&comma; Caribbean Football Union Executive Committee member and Cayman Islands Football Association president&comma; pleaded guilty to racketeering conspiracy&comma; three counts of wire fraud conspiracy and three counts of money laundering conspiracy&period;  As part of his plea&comma; Webb agreed to forfeit more than &dollar;6&period;7 million&period;<&sol;p>&NewLine;<p>On Nov&period; 23&comma; 2015&comma; Sergio Jadue&comma; a vice president of CONMEBOL and&comma; until last month&comma; the president of the Asociación Nacional de Fútbol Profesional de Chile&comma; the Chilean soccer federation&comma; waived indictment and pleaded guilty to a two-count information charging him with racketeering conspiracy and wire fraud conspiracy&period;  As part of his plea&comma; Jadue agreed to forfeit all funds on deposit in his U&period;S&period; bank account&comma; among other funds&period;<&sol;p>&NewLine;<p>On Nov&period; 25&comma; 2015&comma; José Margulies&comma; the controlling principal of Valente Corp&period; and Somerton Ltd&comma; who served as an intermediary who facilitated illicit payments between sports marketing executives and soccer officials&comma; pleaded guilty to racketeering conspiracy&comma; wire fraud conspiracy&comma; and two counts of money laundering conspiracy&period;  As part of his plea&comma; Margulies agreed to forfeit more than &dollar;9&period;2 million&period;<&sol;p>&NewLine;<p>As previously announced last May&comma; all money forfeited by the defendants is being held in reserve to ensure its availability to satisfy any order of restitution entered at sentencing for the benefit of any individuals or entities that qualify as victims of the defendants’ crimes under federal law&period;<&sol;p>&NewLine;<hr &sol;>&NewLine;<p>The indicted and convicted defendants face maximum terms of incarceration of 20 years for the Racketeer Influenced and Corrupt Organizations Act &lpar;RICO&rpar; conspiracy&comma; wire fraud conspiracy&comma; wire fraud&comma; money laundering conspiracy&comma; money laundering and obstruction of justice charges&period;  In addition&comma; Tordin and Danis face maximum terms of five and three years in prison&comma; respectively&comma; for the tax charges&period;  Each defendant also faces mandatory restitution&comma; forfeiture and a fine&period;<&sol;p>&NewLine;<p>The superseding indictment and guilty pleas unsealed today are assigned to the U&period;S&period; District Judge Raymond J&period; Dearie of the Eastern District of New York&period;<&sol;p>&NewLine;<p>The government’s investigation is ongoing&period;<&sol;p>&NewLine;<p>The charges and guilty pleas announced today are part of an investigation into corruption in international soccer being led by the U&period;S&period; Attorney’s Office of the Eastern District of New York&comma; the FBI’s New York Field Office and the IRS-CI Los Angeles Field Office&period;  The work in the U&period;S&period; Attorney’s Office involves prosecutors from the National Security and Cybercrime Section&comma; the Organized Crime and Gang Section&comma; the Business and Securities Fraud Section and the Public Integrity Section&period;  The prosecutors in Brooklyn are receiving considerable assistance from attorneys in various parts of the Justice Department’s Criminal Division in Washington&comma; D&period;C&period;&comma; including the Office of International Affairs&comma; the Organized Crime and Gang Section&comma; the Asset Forfeiture and Money Laundering Section and the Fraud Section&comma; as well as from INTERPOL Washington&period;<&sol;p>&NewLine;<p>The charges and guilty pleas announced today are being prosecuted by Assistant U&period;S&period; Attorneys Evan M&period; Norris&comma; Amanda Hector&comma; Darren A&period; LaVerne&comma; Samuel P&period; Nitze&comma; M&period; Kristin Mace&comma; Paul Tuchmann&comma; Keith D&period; Edelman&comma; Tanya Hajjar and Brian D&period; Morris of the Eastern District of New York&period;<&sol;p>&NewLine;<p><strong><u>The Newly-Indicted Defendants<&sol;u><&sol;strong><strong>&colon;<&sol;strong><&sol;p>&NewLine;<p>ARIEL ALVARADO<&sol;p>&NewLine;<p>Age&colon;   56<&sol;p>&NewLine;<p>Nationality&colon;  Panama<&sol;p>&NewLine;<p>MANUEL BURGA<&sol;p>&NewLine;<p>Age&colon;   58<&sol;p>&NewLine;<p>Nationality&colon;  Peru<&sol;p>&NewLine;<p>RAFAEL CALLEJAS<&sol;p>&NewLine;<p>Age&colon;   72<&sol;p>&NewLine;<p>Nationality&colon; Honduras<&sol;p>&NewLine;<p>CARLOS CHÁVEZ<&sol;p>&NewLine;<p>Age&colon;   57<&sol;p>&NewLine;<p>Nationality&colon;  Bolivia<&sol;p>&NewLine;<p>LUÍS CHIRIBOGA<&sol;p>&NewLine;<p>Age&colon;   69<&sol;p>&NewLine;<p>Nationality&colon;  Ecuador<&sol;p>&NewLine;<p>MARCO POLO DEL NERO<&sol;p>&NewLine;<p>Age&colon;   74<&sol;p>&NewLine;<p>Nationality&colon;  Brazil<&sol;p>&NewLine;<p>EDUARDO DELUCA<&sol;p>&NewLine;<p>Age&colon;   75<&sol;p>&NewLine;<p>Nationality&colon;  ARGENTINA<&sol;p>&NewLine;<p>ALFREDO HAWIT<&sol;p>&NewLine;<p>Age&colon;   64<&sol;p>&NewLine;<p>Nationality&colon;  Honduras<&sol;p>&NewLine;<p>BRAYAN JIMÉNEZ<&sol;p>&NewLine;<p>Age&colon;   61<&sol;p>&NewLine;<p>Nationality&colon;  Guatemala<&sol;p>&NewLine;<p>JOSÉ LUÍS MEISZNER<&sol;p>&NewLine;<p>Age&colon;   69<&sol;p>&NewLine;<p>Nationality&colon;  Argentina<&sol;p>&NewLine;<p>JUAN ÁNGEL NAPOUT<&sol;p>&NewLine;<p>Age&colon;   57<&sol;p>&NewLine;<p>Nationality&colon;  Paraguay<&sol;p>&NewLine;<p>ROMER OSUNA<&sol;p>&NewLine;<p>Age&colon;  72<&sol;p>&NewLine;<p>Nationality&colon;  Bolivia<&sol;p>&NewLine;<p>RAFAEL SALGUERO<&sol;p>&NewLine;<p>Age&colon;   70<&sol;p>&NewLine;<p>Nationality&colon;  Guatemala<&sol;p>&NewLine;<p>RICARDO TEIXEIRA<&sol;p>&NewLine;<p>Age&colon;   68<&sol;p>&NewLine;<p>Nationality&colon;  Brazil<&sol;p>&NewLine;<p>HÉCTOR TRUJILLO<&sol;p>&NewLine;<p>Age&colon;   62<&sol;p>&NewLine;<p>Nationality&colon;  Guatemala<&sol;p>&NewLine;<p>REYNALDO VASQUEZ<&sol;p>&NewLine;<p>Age&colon;   59<&sol;p>&NewLine;<p>Nationality&colon;  El Salvador<&sol;p>&NewLine;<p><strong><u>The Convicted Defendants<&sol;u><&sol;strong><strong>&colon;<&sol;strong><&sol;p>&NewLine;<p>LUIS BEDOYA<&sol;p>&NewLine;<p>Age&colon;  56<&sol;p>&NewLine;<p>Nationality&colon; Colombia<&sol;p>&NewLine;<p>ALEJANDRO BURZACO<&sol;p>&NewLine;<p>Age&colon;  51<&sol;p>&NewLine;<p>Nationality&colon; Argentina<&sol;p>&NewLine;<p>ZORANA DANIS<&sol;p>&NewLine;<p>Age&colon;  52<&sol;p>&NewLine;<p>Nationality&colon; Belgium<&sol;p>&NewLine;<p>ROGER HUGUET<&sol;p>&NewLine;<p>Age&colon;  52<&sol;p>&NewLine;<p>Nationality&colon; USA&comma; Spain<&sol;p>&NewLine;<p>SERGIO JADUE<&sol;p>&NewLine;<p>Age&colon;  36<&sol;p>&NewLine;<p>Nationality&colon; Chile<&sol;p>&NewLine;<p>JOSÉ MARGULIES<&sol;p>&NewLine;<p>Age&colon;   76<&sol;p>&NewLine;<p>Nationality&colon;  Brazil<&sol;p>&NewLine;<p>FABIO TORDIN<&sol;p>&NewLine;<p>Age&colon;  50<&sol;p>&NewLine;<p>Nationality&colon; Brazil<&sol;p>&NewLine;<p>JEFFREY WEBB<&sol;p>&NewLine;<p>Age&colon;   51<&sol;p>&NewLine;<p>Nationality&colon;  Cayman Islands<&sol;p>&NewLine;<p>&nbsp&semi;<&sol;p>&NewLine;<p>Original Press-releases from <a href&equals;"http&colon;&sol;&sol;www&period;justice&period;gov&sol;opa&sol;pr&sol;sixteen-additional-fifa-officials-indicted-racketeering-conspiracy-and-corruption" target&equals;"&lowbar;blank" rel&equals;"noopener">justice&period;gov <&sol;a><&sol;p>&NewLine;