Showing posts with label AGGRAVATED IDENTITY THEFT. Show all posts
Showing posts with label AGGRAVATED IDENTITY THEFT. Show all posts

Friday, February 6, 2015

GUARD RECRUITER AND ASSISTANT CONVICTED IN BRIBERY CASE

FROM:  U.S. JUSTICE DEPARTMENT
Wednesday, February 4, 2015
Texas National Guard Recruiter and Assistant Convicted in Bribery and Fraud Scheme

An Army National Guard recruiter and recruiting assistant were convicted today for their roles in a bribery and fraud scheme, announced Assistant Attorney General Leslie R. Caldwell of the Justice Department’s Criminal Division and U.S. Attorney Kenneth Magidson of the Southern District of Texas.

Jammie T. Martin, 37, and Michelle H. Davis, 34, both of Katy, Texas, were convicted today of conspiracy, bribery, wire fraud and aggravated identity theft.  The defendants were indicted on Aug. 7, 2013, and will be sentenced on May 7, 2015, by U.S. District Judge David Hittner of the Southern District of Texas.

From February 2009 through April 2011, Martin served as an Army National Guard recruiter. Davis served as a recruiting assistant with the Guard Recruiting Assistance Program (G-RAP), which was a recruiting program that offered monetary incentives to soldiers of the Army National Guard who referred others to join the National Guard.  Both defendants worked out of a Texas National Guard Armory known as the Westheimer Armory.

According to evidence presented at trial, Martin—who, as a recruiter, was ineligible for the G-RAP incentives—provided the personal identifying information of potential soldiers to Davis and at least three other National Guard soldiers.  Davis and the others then falsely claimed they were responsible for referring the potential soldiers to join the military and fraudulently received referral bonus payments through the G-RAP program.  Davis and the others paid approximately half of each fraudulent bonus payment to Martin as a kickback.

To date, this investigation has led to the conviction of 26 individuals, including Martin and Davis.

This case is being investigated by the San Antonio Fraud Resident Agency of the U.S. Army Criminal Investigation Command’s Major Procurement Fraud Unit and prosecuted by Trial Attorneys Sean F. Mulryne and Mark J. Cipolletti of the Criminal Division’s Public Integrity Section and Assistant U.S. Attorney John P. Pearson of the Southern District of Texas.

Tuesday, August 19, 2014

ARMENIAN POWER ASSOCIATE RECEIVES 13 YEAR PRISON SENTENCE

FROM:  U.S. JUSTICE DEPARTMENT 
Monday, August 18, 2014
Armenian Power Associate Sentenced to More Than 13 Years in Prison for Racketeering Conspiracy

An associate of the Armenian Power gang, who was convicted at trial for his role in a racketeering conspiracy that included stealing personal and financial information of elderly bank customers for accounts valued at more than $25 million, was sentenced to serve 168 months in prison today in federal court in Los Angeles.

Assistant Attorney General Leslie R. Caldwell of the Justice Department’s Criminal Division, Acting U.S. Attorney Stephanie Yonekura of the Central District of California and Assistant Director in Charge Bill L. Lewis of the FBI’s Los Angeles Field Office made the announcement.   The sentence was imposed by U.S. District Judge Philip S. Gutierrez of the Central District of California.

Andranik Aloyan, 41, of Los Angeles was found guilty by a federal jury on Feb. 11, 2014, of racketeering conspiracy, attempted bank fraud, access device fraud, four counts of aggravated identity theft and possession of a firearm by a convicted felon.   According to evidence presented at trial, Aloyan possessed personal and financial information belonging to more than 75 mostly elderly customers of banks operating throughout the country.   This information was stolen by Aloyan and his associates.   The combined value of the accounts for which Aloyan possessed account information exceeded $25 million dollars.   In addition to his prison term of 168 months, Aloyan was sentenced to serve three years of supervised release and ordered to pay $3,516,711 in restitution to victims.

Aloyan was among 90 individuals charged in two indictments, including a 140-count indictment in July 2011 charging 70 defendants with a variety of criminal activities associated with the Armenian Power gang.   The indictment accused 29 defendants, including Aloyan, of participating in the Armenian Power racketeering conspiracy that involved a host of illegal activities such as sophisticated bank fraud, identity theft, debit-card skimming, manufacturing counterfeit checks and money laundering.   In addition, defendants in the case were allegedly involved in a variety of violent crimes, such as kidnapping, extortion and firearms offenses, along with other crimes including drug trafficking and illegal gambling.   Eighty-one defendants have previously been convicted or pleaded guilty to the charges, including 24 defendants who were convicted of or pleaded guilty to racketeering charges.

According to court documents, the Armenian Power street gang formed in the East Hollywood district of Los Angeles in the 1980s.   The gang’s membership consisted primarily of individuals of Armenian descent, as well as of other countries within the former Soviet bloc.   Armenian Power has been designated under California state law as a criminal street gang and is believed to have more than 250 documented members, as well as hundreds of associates. According to court documents, Armenian Power members and associates regularly carry out violent criminal acts, including murders, attempted murders, kidnappings, robberies, extortions and witness intimidation to enrich its members and associates and preserve and enhance the power of the criminal enterprise.

The case was investigated by the Eurasian Organized Crime Task Force, which is comprised of the FBI, the Glendale Police Department, the Los Angeles Police Department, the Burbank Police Department, the Los Angeles Sheriff’s Department, the Internal Revenue Service, U.S. Immigration and Customs Enforcement’s Homeland Security Investigations and the U.S. Secret Service.

The case is being prosecuted by Trial Attorney Andrew Creighton of the Criminal Division’s Organized Crime and Gang Section and Assistant U.S. Attorneys Martin Estrada, Elizabeth Yang and Stephen Wolfe of the Central District of California.


Friday, April 11, 2014

NINE FACE CHARGES IN "ZEUS" MALWARE MULTIMILLION DOLLAR IDENTITY THEFT CONSPIRACY

FROM:  U.S. JUSTICE DEPARTMENT 
Friday, April 11, 2014

Nine Charged in Conspiracy to Steal Millions of Dollars Using “Zeus” Malware

Two Defendants Extradited to U.S. Will Make Initial Court Appearance Today

Nine  alleged members of a wide-ranging racketeering enterprise and conspiracy who infected thousands of business computers with malicious software known as “Zeus” have been charged in an indictment unsealed today in Lincoln, Neb.

Acting Assistant Attorney General David A. O’Neil of the Justice Department’s Criminal Division, U.S. Attorney Deborah R. Gilg for the District of Nebraska and Special Agent in Charge Thomas R. Metz of the FBI’s Omaha Division made the announcement.

The indictment alleges that the “Zeus” malware captured passwords, account numbers, and other information necessary to log into online banking accounts.  The conspirators allegedly used the information captured by “Zeus” to steal millions of dollars from account-holding victims’ bank accounts.

The indictment was unsealed in connection with the arraignment this afternoon at the federal courthouse in Lincoln of two Ukrainian nationals, Yuriy Konovalenko, 31, and Yevhen Kulibaba, 36.  Konovalenko and Kulibaba were recently extradited from the United Kingdom.  All of the defendants were charged by a federal grand jury in August 2012 with conspiracy to participate in racketeering activity, conspiracy to commit computer fraud and identity theft, aggravated identity theft, and multiple counts of bank fraud.

“The ‘Zeus’ malware is one of the most damaging pieces of financial malware that has ever been used,” said Acting Assistant Attorney General O’Neil.  “As the charges unsealed today demonstrate, we are committed to making the Internet more secure and protecting the personal information and bank accounts of American consumers.  With the invaluable cooperation of our foreign law enforcement partners, we will continue to bring to justice cyber criminals who steal the money of U.S. citizens.”

“In this case, the victims included a Nebraska bank and a Nebraska company,” said U.S. Attorney Gilg.  “This demonstrates the global reach of cybercrime and the significant threat to our financial infrastructure.  We are grateful for the collaboration of our international and federal law enforcement partners in this complex financial fraud crime."

This case illustrates the vigorous cooperation between national and global law enforcement agencies and sends a strong message to cyber thieves,” said FBI SAC Metz.  “The FBI and our international partners will continue to devote resources to finding better ways to safeguard our systems, fortify our cyber defenses and stop those who do us harm."

According to the indictment, the defendants participated in an enterprise and scheme that installed, without authorization, malicious software known as “Zeus” or “Zbot” on victims’ computers.  The defendants are charged with using that malicious software to capture bank account numbers, passwords, personal identification numbers, RSA SecureID token codes and similar information necessary to log into online banking accounts.  The indictment alleges that the defendants falsely represented to banks that they were employees of the victims and authorized to make transfers of funds from the victims’ bank accounts, causing the banks to make unauthorized transfers of funds from the victims’ accounts.

As part of the enterprise and scheme, the defendants allegedly used as “money mules” residents of the United States who received funds transferred over the Automated Clearing House network or through other interstate wire systems from victims’ bank accounts into the money mules’ own bank accounts.  These “money mules” then allegedly withdrew some of those funds and wired the money overseas to conspirators.

According to court documents unsealed today, Kulibaba allegedly operated the conspirators’ money laundering network in the United Kingdom by providing money mules and their associated banking credentials to launder the money withdrawn from U.S.-based victim accounts.  Konovalenko allegedly provided money mules’ and victims’ banking credentials to Kulibaba and facilitated the collection of victims’ data from other conspirators.

The following four identified defendants remain at large:

• Vyacheslav Igorevich Penchukov, 32, of Ukraine, who allegedly coordinated the exchange of stolen banking credentials and money mules and received alerts once a bank account had been compromised.
• Ivan Viktorvich Klepikov, 30, of Ukraine, the alleged systems administrator who handled the technical aspects of the criminal scheme and also received alerts once a bank account had been compromised.
• Alexey Dmitrievich Bron, 26, of Ukraine, the alleged financial manager of the criminal operations who managed the transfer of money through an online money system known as Webmoney.
• Alexey Tikonov, of Russia, an alleged coder or developer who assisted the criminal enterprise by developing new codes to compromise banking systems.

The indictment also charges three other individuals as John Doe #1, John Doe #2 and John Doe #3.

The case was investigated by the FBI’s Omaha Cyber Task Force.  The Metropolitan Police Service of the United Kingdom, the National Police of the Netherlands’s National High Tech Crime Unit and the Security Service of Ukraine provided significant assistance in the investigation.

The case is being prosecuted by Trial Attorney William A. Hall, Jr. of the Criminal Division’s Computer Crime and Intellectual Property Section and Assistant U.S. Attorney Steven A. Russell of the District of Nebraska. The Office of International Affairs in the Justice Department’s Criminal Division provided valuable assistance with the extradition.

The charges contained in the indictment are merely accusations, and the defendants are presumed innocent unless and until proven guilty.

Saturday, February 1, 2014

THREE INDICTED IN $190 MILLION MEDICARE FRAUD CASE

FROM:  JUSTICE DEPARTMENT 
Thursday, January 30, 2014
Three Miami Residents Indicted for Alleged Roles in $190 Million Medicare Fraud Scheme
Three Miami residents have been indicted for their alleged participation in a $190 million Medicare fraud scheme.

Acting Assistant Attorney General Mythili Raman of the Justice Department’s Criminal Division; U.S. Attorney Wifredo A. Ferrer of the Southern District of Florida; Special Agent in Charge Michael B. Steinbach of the FBI’s Miami Field Office; and Special Agent in Charge Christopher B. Dennis of the U.S. Health and Human Services Office of Inspector General (HHS-OIG) Office of Investigations Miami Office made the announcement after the indictment was unsealed.

On Jan. 28, 2014, a federal grand jury in Miami returned a 10-count indictment charging Nelson Rojas, 43, Roger Bergman, 64, and Rodolfo Santaya, 54, for allegedly participating in a scheme to defraud Medicare by submitting false and fraudulent claims, from approximately December 2002 to October 2010.

Rojas was charged with conspiracy to pay and receive bribes and kickbacks in connection with a federal health care program, conspiracy to commit money laundering, two counts of money laundering and one count of aggravated identity theft.  Bergman and Santaya were each charged with conspiracy to commit health care fraud and wire fraud.  In addition, Bergman was charged with conspiracy to make false statements relating to health care matters.  Santaya was also charged with conspiracy to pay and receive bribes and kickbacks in connection with a federal health care program, as well as two counts of receiving bribes and kickbacks in connection with a federal health care benefit program.

According to the indictment, Rojas, Bergman and Santaya allegedly participated in a scheme orchestrated by the owners and operators of American Therapeutic Corporation (ATC) and its management company, Medlink Professional Management Group Inc.  ATC and Medlink were Florida corporations headquartered in Miami.  ATC operated purported partial hospitalization programs (PHPs), a form of intensive treatment for severe mental illness, in seven different locations throughout South Florida.  Both corporations have been defunct since October 2010.

The indictment alleges that Bergman was a licensed physician’s assistant who participated in the scheme by, among other things, admitting Medicare beneficiaries to ATC facilities for PHP treatment even though they did not quality for such treatment and falsifying patient records to make it appear as though patients needed, qualified for and actually received legitimate PHP treatment when they did not.  The indictment alleges that Santaya served as a patient recruiter who provided ineligible patients to ATC in exchange for kickbacks.  The indictment alleges that Rojas was the co-owner of a check cashing business and that he facilitated the payments of bribes and kickbacks from ATC to various patient recruiters.

ATC, Medlink and various owners, managers, doctors, therapists, patient brokers and marketers of ATC and Medlink have pleaded guilty or have been convicted at trial.  In September 2011, ATC owner Lawrence Duran was sentenced to 50 years in prison for his role in orchestrating and executing the scheme to defraud Medicare.

The charges and allegations contained in the indictment are merely accusations, and the defendants are presumed innocent unless and until proven guilty.

The case is being investigated by the FBI and HHS-OIG and was brought as part of the Medicare Fraud Strike Force, under the supervision of the Criminal Division’s Fraud Section and the U.S. Attorney’s Office for the Southern District of Florida.  The case is being prosecuted by Assistant Chief Robert A. Zink and Trial Attorney Nicholas E. Surmacz.

Since their inception in March 2007, Medicare Fraud Strike Force operations in nine locations have charged more than 1,700 defendants who collectively have falsely billed the Medicare program for more than $5.5 billion.  In addition, the HHS Centers for Medicare and Medicaid Services, working in conjunction with the HHS-OIG, are taking steps to increase accountability and decrease the presence of fraudulent providers.

Friday, December 27, 2013

FOUR INDICTED IN FALSE TAX RETURN CONSPIRACY CASE

FROM:  U.S. JUSTICE DEPARTMENT T
Monday, December 23, 2013
Four Minneapolis-based Return Preparers Indicted for Conspiracy, Aggravated Identity Theft, Preparing False Returns

A 63-count superseding indictment charging Chatonda Khofi, Ishmael Kosh, Amadou Sangaray and Francis Saygbay in a conspiracy to defraud the Internal Revenue Service (IRS) was unsealed on Monday, December 23, in Minneapolis, Minn., the Justice Department and IRS announced today.  The superseding indictment was returned by a federal grand jury on Nov. 19, 2013, and alleges that Primetime Tax Services Inc. was a tax return preparation business with three storefronts in the Minneapolis area.  Khofi worked as the Chief Executive Officer of Primetime, and Kosh and Sangaray worked as managers of the Brooklyn Center location of Primetime.  All four named defendants allegedly prepared false tax returns under the name of Primetime.

According to court documents, Khofi, Kosh, Sangaray and Saygbay conspired amongst themselves and with others to prepare and file false individual income tax returns for the customers of Primetime.  Some of these returns reported false dependents, false deductions, false Schedule C business losses and false wage income.  These false entries resulted in fraudulently inflated refunds for their customers.  As part of the scheme, court documents allege that the defendants prepared and filed false Minnesota state income tax returns for their customers that contained the same or similar false information as reported on the federal income tax returns.  From 2007 to 2009, Primetime filed over 2,000 customer federal income tax returns with the IRS.

The indictment further charges each defendant with multiple counts of aggravated identity theft and multiple counts of aiding and assisting in the preparation of false individual income tax returns.  The aggravated identity theft charges stem from the defendants’ alleged use of the names and social security numbers of actual persons to falsely claim as dependents on their customers’ individual income tax returns.

According to the indictment, the defendants also accompanied some customers to check-cashing businesses to cash their falsely inflated tax refund checks, then demanded a portion of the cashed refund check in addition to tax preparation fees already collected.  The indictment alleges that, in some instances, the defendants withdrew cash from debits cards containing their customers’ refunds without permission, again in addition to the tax preparation fees they had already collected.

An indictment is merely an allegation and all defendants are presumed innocent unless and until proven guilty beyond a reasonable doubt in a court of law.  If convicted, the defendants face a maximum potential sentence of five years in prison for the conspiracy count and three years in prison for each count of aiding in the preparation of a false tax return.  The aggravated identity theft counts have a mandatory two year sentence.

The case was investigated by special agents of IRS-Criminal Investigation.  It is being prosecuted by Trial Attorneys Dennis Kihm and Thomas Flynn of the Justice Department's Tax Division.

Thursday, December 5, 2013

TWO PLEAD GUILTY FOR ROLES IN IDENTITY TRAFFICKING CONSPIRACY

FROM:  U.S. JUSTICE DEPARTMENT
Tuesday, December 3, 2013
Two Foreign Nationals Plead Guilty in Puerto Rican Identity Trafficking Conspiracy

A Dominican national and a Mexican national each pleaded guilty today in connection with their roles in trafficking the identities of Puerto Rican U.S. citizens and corresponding identity documents.

Acting Assistant Attorney General Mythili Raman of the Justice Department’s Criminal Division, U.S. Attorney Rosa E. Rodríguez-Vélez of the District of Puerto Rico, Acting Director John Sandweg of U.S. Immigration and Customs Enforcement (ICE), Chief Postal Inspector Guy J. Cottrell of the U.S. Postal Inspection Service (USPIS), Director Gregory B. Starr of the U.S. State Department’s Diplomatic Security Service (DSS) and Chief Richard Weber of the Internal Revenue Service-Criminal Investigation (IRS-CI) made the announcement.

Jorge Luis “Daniel” Mendez, 37, formerly of San Juan, Puerto Rico, and Enrique Rogelio Mendez-Solis, 37, formerly of Seymour, Ind., pleaded guilty before U.S. District Judge Juan M. Pérez-Giménez in the District of Puerto Rico to one count of conspiracy to commit identification fraud, one count of conspiracy to commit alien smuggling for financial gain and three counts of aggravated identity theft.   They face a maximum sentence of 15 years in prison for conspiracy to commit identification fraud, 10 years in prison for conspiracy to commit alien smuggling for financial gain, and two years in prison for each aggravated identity theft count when they are sentenced on April 28, 2014.

Both defendants were charged in a superseding indictment returned by a federal grand jury in Puerto Rico on March 22, 2012.   To date, 53 individuals have been charged for their roles in the identity trafficking scheme, 49 defendants have been arrested, and 49 have pleaded guilty.

Court documents allege that individuals located in the Savarona area of Caguas, Puerto Rico, obtained Puerto Rican identities and corresponding identity documents.   Other conspirators located in various cities throughout the United States allegedly solicited customers and sold Social Security cards and corresponding Puerto Rico birth certificates for prices ranging from $700 to $2,500 per set.   The superseding indictment alleges that these identity brokers in the United States ordered the identity documents from the document suppliers in Savarona on behalf of their customers by making coded telephone calls.   The conspirators are charged with using text messages, money transfer services, and express, priority, or regular U.S. mail to complete their illicit transactions.

Court documents allege that some of the conspirators assumed a Puerto Rican identity themselves and used that identity in connection with the trafficking operation.   Their customers generally obtained the identity documents to assume the identity of Puerto Rican U.S. citizens and to obtain additional identification documents, such as legitimate state driver’s licenses.   Some customers allegedly obtained the documents to commit financial fraud and attempted to obtain a U.S. passport.

According to court documents, various identity brokers were operating in Rockford, DeKalb and Aurora, Ill.; Seymour, Columbus and Indianapolis, Ind.; Hartford, Conn.; Clewiston, Fla.; Lilburn and Norcross, Ga.; Salisbury, Md.; Columbus and Fairfield, Ohio; Dorchester, Lawrence, Salem and Worcester, Mass.; Grand Rapids, Mich.; Nebraska City, Neb.; Elizabeth, N.J.; Burlington and Hickory, N.C.; Hazelton and Philadelphia, Penn.; Houston; Abingdon and Albertville, Ala.; and Providence, R.I.

Mendez admitted that he operated as a Savarona supplier.   Mendez-Solis admitted that he operated as an identity broker in the Seymour, Ind., area.

The charges are the result of Operation Island Express, an ongoing, nationally coordinated investigation led by the ICE Homeland Security Investigations’ (ICE-HSI) Chicago Office and USPIS, DSS and IRS-CI offices in Chicago, in coordination with the ICE-HSI San Juan Office and the DSS Resident Office in Puerto Rico.   The Illinois Secretary of State Police; Elgin, Ill., Police Department; Seymour, Ind., Police Department; and Indiana State Police provided substantial assistance.   The ICE-HSI Assistant Attaché office in the Dominican Republic and International Organized Crime Intelligence and Operations Center (IOC-2), as well as various ICE, USPIS, DSS and IRS-CI offices around the country, provided invaluable support.

The case is being prosecuted by Trial Attorneys James S. Yoon, Hope S. Olds, Courtney B. Schaefer and Christina Giffin of the Criminal Division’s Human Rights and Special Prosecutions Section, with the assistance of the Criminal Division’s Asset Forfeiture and Money Laundering Section, and the support of the U.S. Attorney’s Office for the District of Puerto Rico.   The U.S. Attorney’s Offices in the Northern District of Illinois, Southern District of Indiana, District of Connecticut, District of Massachusetts, District of Nebraska, Middle District of North Carolina, Southern District of Ohio, Middle District of Pennsylvania, District of Rhode Island, Southern District of Texas and Western District of Virginia provided substantial assistance.

Wednesday, November 6, 2013

DEBT COLLECTOR AND SON-IN-LAW RECEIVE PRISON TIME FOR IDENTITY THEFT

FROM: U.S. JUSTICE DEPARTMENT
Monday, November 4, 2013
Debt Collection Employee and Son-in-Law Sent to Prison for Identity Theft Tax Scheme

Quentin Collick of Montgomery, Ala., and Deatrice Williams of Duluth, Ga., were sentenced Nov. 1, 2013, to serve 85 and 51 months in prison, respectively, announced Assistant Attorney General Kathryn Keneally of the Justice Department's Tax Division and U.S. Attorney for the Middle District of Alabama George L. Beck Jr.  Collick and Williams were previously found guilty by a jury in the Middle District of Alabama of conspiring to file false claims, wire fraud, and aggravated identity theft.  Collick was also convicted of three counts of theft of public funds.  Corey Thompson, a co-conspirator, previously pleaded guilty and was sentenced to serve 30 months in jail.

Based on evidence introduced at trial and court filings, Williams worked for a debt collection company located in Norcross, Ga.  As an employee, Williams had access to a database that stored names, social security numbers and dates of birth of individuals who owed medical debts.  Williams stole the identities of a number of these individuals and provided the stolen information to Collick, her son-in-law.

Collick and Thompson used stolen identities to file false tax returns and fraudulently claim tax refunds.  In 2011 and 2012, Thompson worked as an independent contractor for a cable company installing cable and internet access for customers.  To conceal the filing of the false tax returns, Thompson used his specialized knowledge and equipment to shut down and hijack his customers’ internet service, and along with Collick, filed false tax returns using the customers’ internet access, making it appear as if the false tax returns were being filed by the customers.  Thompson and Collick then directed the tax refunds to be placed on pre-paid debit cards, which were mailed to Montgomery, Ala.  However, those cards were intercepted by the U.S. Postal Service.  Several tax refund checks were also mailed by the IRS, based upon the fraudulent returns, which Collick retrieved and cashed.

This case was investigated by special agents of IRS - Criminal Investigation and prosecuted by Tax Division Trial Attorneys Michael Boteler, Jason H. Poole and Alexander Effendi

Wednesday, September 18, 2013

8 PLEAD GUILTY IN THE CASE OF THE ARMENIAN POWER GANG

FROM:  U.S. JUSTICE DEPARTMENT 
Wednesday, September 11, 2013

Eight Defendants Plead Guilty in Los Angeles in Armenian Power Gang Case
Four members and associates of the Armenian Power gang and four other individuals pleaded guilty late yesterday to charges relating to the activities of the Armenian Power criminal enterprise, including racketeering conspiracy, bank fraud, aggravated identity theft, drug-trafficking and illegal possession of firearms.

The guilty pleas were announced today by Acting Assistant Attorney General Mythili Raman of the Justice Department’s Criminal Division, U.S. Attorney André Birotte Jr. of the Central District of California and Assistant Director in Charge Bill L. Lewis of the FBI’s Los Angeles Field Office.

 The following defendants pleaded guilty before U.S. District Judge Dean D. Pregerson in the Central District of California:

• Karo Yerkanyan, aka “Guilty,” 32, of Tujunga, Calif., pleaded guilty to racketeering conspiracy, bank fraud, aggravated identity theft, conspiracy to possess with intent to distribute marijuana and felon-in-possession of a firearm;

• Arman Tangabekyan, aka “Spito” and “Thick Neck,” 34, of Encino, Calif., pleaded guilty to racketeering conspiracy, bank fraud and aggravated identity theft;

• Artur Pembejian, aka “Cham,” 36, of Burbank, Calif., pleaded guilty to racketeering conspiracy;

• Raymond Tarverdyan, aka “Rye,” 35, of Montrose, Calif., pleaded guilty to racketeering conspiracy and bank fraud;

• Simon Antonyan, aka “Simo,” 38, of Hollywood, Calif., pleaded guilty to aggravated identity theft;

• Khachatur Arakelyan, aka “Khecho,” 39, of Glendale, Calif., pleaded guilty to aggravated identity theft;

• Vartenie Ananian, 29, of Tujunga, pleaded guilty to bank fraud; and

• Adam Davoodian, 32, of Glendale, Calif., pleaded guilty to conspiracy to possess with intent to distribute marijuana.

The defendants who pleaded guilty yesterday were among 70 individuals charged in a 140-count indictment in July 2011 for criminal activities associated with the Armenian Power gang.  The indictment accused 29 defendants, including four of those who pleaded guilty yesterday, of participation in the Armenian Power RICO conspiracy.  The RICO conspiracy charge alleges a host of illegal activities, many of which involved sophisticated fraudulent schemes of identity theft, bank fraud, credit card skimming, manufacturing counterfeit checks and laundering criminal proceeds, often electronically.  In addition, defendants were involved in a variety of violent crimes, such as extortion, kidnapping and firearms offenses.  Among the schemes charged in the racketeering indictment is a bank fraud and identity theft scheme that victimized hundreds of customers of 99 Cents Only Stores throughout Southern California.  Through the scheme, defendants caused more than $2 million in losses when they secretly installed sophisticated “skimming” devices to steal customer debit card account information at cash registers, and then used the skimmed information to create counterfeit debit cards to steal money from victims’ bank accounts.

The eight defendants who pleaded guilty yesterday played various roles in the activities of the Armenian Power gang, including participating in bank fraud, drug distribution, access device fraud, identity theft and illegal firearm possession.

Yerkanyan, a member of the Armenian Power conspiracy, participated in a bank fraud scheme that obtained the personal identifying information and account information of victims.  He and his co-conspirators used the information to open fraudulent bank accounts, loans and lines of credit at HSBC Bank and Bank of America without the knowledge of the victims.  Tangabekyan, a member of the Armenian Power conspiracy, participated in a bank fraud scheme by obtaining personal information and account information for victims and then obtaining or transferring over $475,000 in funds.

Yerkanyan also participated, along with Davoodian, in a scheme to steal approximately 207 pounds of marijuana, worth approximately $450,000, from another drug distributor.

Pembejian, a member of the Armenian Power conspiracy, abetted the illegal possession of a firearm by a leader of the Armenian Power gang, Mher Darbinyan.

Tarverdyan, an Armenian Power member, and Antonyan, Arakelyan and Ananian participated in the scheme to install secret “skimming” devices at the 99 Cents Only Stores in order to obtain victims’ account information.

According to court documents, the Armenian Power street gang formed in the East Hollywood district of Los Angeles in the 1980s.  The gang’s membership consisted primarily of individuals of Armenian descent, as well as of other countries within the former Soviet bloc.  The Armenian Power has been designated under California state law as a criminal street gang and is believed to have over 250 documented members, as well as hundreds of associates. According to court documents, Armenian Power members and associates regularly carry out violent criminal acts, including murders, attempted murders, kidnappings, robberies, extortions, and witness intimidation in order to enrich its members and associates and preserve and enhance the power of the criminal enterprise.

The defendants are scheduled to be sentenced beginning on Nov. 25, 2013.  Yerkanyan faces a maximum penalty of 102 years in prison.  Tangabekyan faces a maximum penalty of 52 years in prison.  Tarverdyan faces a maximum penalty of 50 years in prison.  Ananian faces a maximum penalty of 30 years in prison.  Pembejian and Davoodian each face a maximum penalty of 20 years in prison.  And Antonyan and Arakelyan each face a maximum penalty of two years in prison.

Fifty-one defendants have previously pleaded guilty for their roles in the activities of the Armenian Power gang.

The case is being prosecuted by Assistant U.S. Attorneys Martin Estrada, Elizabeth Yang and Stephen Wolfe of the Central District of California and Trial Attorney Andrew Creighton of the Criminal Division’s Organized Crime and Gang Section.  The case was investigated by the Eurasian Organized Crime Task Force, which is comprised of the FBI, the U.S. Secret Service, the Los Angeles Police Department, the Glendale Police Department, the Burbank Police Department, the Internal Revenue Service and U.S. Immigration and Customs Enforcement – Homeland Security Investigations.

Wednesday, July 25, 2012

TWO MEN SENTENCED IN NATIONWIDE BREACH OF CREDIT CARD TERMINALS AT MICHAELS STORES INC.

FROM: U.S. DEPARTMENT OF JUSTICE
Wednesday, July 25, 2012
Two Southern California Men Each Sentenced to 60 Months in Prison for Their Roles in a Nationwide Breach of Credit and Debit Card Terminals at Michaels Stores Inc.

Defendants Possessed 952 Blank Gold and Silver Credit Card-like Cards Re-Encoded with Stolen Bank Account and Personal Identification Numbers

WASHINGTON – Two southern California men were sentenced in the U.S. District Court for the Northern District of California in Oakland for their roles in a scheme to defraud nearly 1,000 debit card holders by using stolen bank account information to withdraw money from ATMs, announced Assistant Attorney General Lanny A. Breuer of the Justice Department’s Criminal Division, U.S. Attorney Melinda Haag of the Northern District of California and Special Agent in Charge Andrew C. Adelmann of the U.S. Secret Service’s San Francisco Field Office.

Eduard Arakelyan, 21, and Arman Vardanyan, 23, were each sentenced yesterday to serve 36 months in prison on bank fraud and conspiracy charges, and an additional, consecutive 24 months in prison for the identity theft charge. In addition, upon release from prison Arakelyan and Vardanyan were ordered to serve five years of supervised release and to pay $42,043 in restitution.

Arakelyan and Vardanyan were each charged in a criminal information filed on March 5, 2012, in the U.S. District Court in Oakland, with one count of conspiracy to commit bank fraud, one count of bank fraud and one count of aggravated identity theft. On March 20, 2012, Arakelyan and Vardanyan pleaded guilty to these crimes in Oakland and U.S. District Judge Claudia Wilken pronounced the sentences.

"These sentences send a clear message that if you take part in a fraud scheme that cheats consumers out of their hard earned money, you will pay a significant price," said Assistant Attorney General Breuer. "No matter the sophistication or size of the scheme, we are determined to bring to justice those who engage in these kinds of frauds."

"By employing an identity theft and bank fraud scheme, the defendants in this case attempted to make a fast buck at the expense of hard-working, law abiding citizens. Instead, they discovered a cold hard truth – crime does not pay," said U.S. Attorney Haag. "Hopefully, the sentences in this case will serve as a deterrent to individuals who may be considering a similar scheme – you will be caught and you will be prosecuted to the fullest extent of the law."

"This case represents a clear example of the successful cooperation between federal, state and local law enforcement authorities to aggressively investigate and hold accountable criminal organizations and individuals who target our financial payment systems," said Special Agent in Charge Adelmann.

Arakelyan and Vardanyan admitted that in or about July 2011, they participated in a scheme to defraud bank account holders and financial institutions by obtaining 952 stolen bank cards and traveling to Northern California to withdraw from ATMs as much money as possible using these stolen bank accounts. According to court documents, Arakelyan and Vardanyan possessed two loaded firearms, a GPS device pre-programmed with ATM locations and eight mobile telephones, all to further their scheme.

The information charged that these stolen cards were linked to a 2011 theft of a reported 94,000 debit and credit card account numbers from customers buying goods at 84 Michaels Stores Inc. stores across the United States. The perpetrators of that security breach replaced about 84 authentic personal identification number pads, used by the stores to process debit and credit card purchases, with fraudulent pads from which they downloaded customers’ banking information. After this breach, financial institutions reported tens of thousands of incidents of fraudulent activity linked to customers who had visited the affected Michaels stores. Arakelyan and Vardanyan are among those who executed one aspect of this scheme.

This case is being prosecuted by Trial Attorney Paul Rosen of the Fraud Section in the Justice Department’s Criminal Division and Special Assistant U.S. Attorney Tamara Weber of the Northern District of California. The investigation was conducted by the U.S. Secret Service San Francisco field office and the Pleasant Hill, Calif., Police Department, with assistance from the U.S. Secret Service Los Angeles and Chicago field offices, as well as the Glendale, Calif. Police Department.

Wednesday, May 9, 2012

TWO MEDICAID RECIPIENT STOLEN INFORMATION FRAUDSTERS GET 25 YEARS EACH



FROM:  U.S. DEPARTMENT OF JUSTICE
Tuesday, May 8, 2012
Leaders of Multi-million Dollar Fraud Ring That Used Stolen Information of Medicaid Recipients Each Sentenced to Over 25 Years in Prison
Veronica Dale and Alchico Grant, who jointly ran a stolen identity refund fraud ring that attempted to defraud the United States of millions of dollars over several years, were sentenced to federal prison today, the Justice Department and Internal Revenue Service (IRS) announced. Veronica Dale, of Montgomery, Ala., was sentenced to 334 months and Alchico Grant of Lowndes County, Ala., was sentenced to 310 months in prison.   In addition, Dale and Grant were both ordered to pay over $2.8 million in restitution to the IRS.

In December 2010, Dale and Grant were originally indicted, along with three others, on various tax and tax-related charges including aggravated identity theft.  Dale and Grant continued their tax refund fraud while on pretrial release and as a result, Grant was indicted again in April 2011, and Dale was later named in a superseding indictment in August 2011.  Both were ordered detained following the second set of indictments and have remained in custody.

On Sept. 14, 2011, Grant pleaded guilty to a total of five charges from both indictments, including conspiracy, wire fraud and aggravated identity theft. On Oct. 14, 2011, Dale pleaded guilty to a total of seven charges from both indictments, including conspiracy, filing false claims, wire fraud and aggravated identity theft.

According to the first indictment, the plea agreements and other court documents, beginning in 2009 and continuing through 2010, the defendants were part of a scheme that involved fraudulently obtaining tax refunds by filing false tax returns using stolen identities. Dale admitted that she filed over 500 fraudulent returns that sought at least $3,741,908 in tax refunds.  These returns were filed using the names of Medicaid beneficiaries, whose personal information Dale obtained while earlier employed by a company that serviced Medicaid programs.  Dale directed the refunds to different bank accounts that she and other co-conspirators controlled.

Also according to the first indictment, plea agreements and other court documents, Grant admitted that he opened bank accounts to receive some of the refunds and recruited others to do the same.  One such recruit opened a bank account in the name of a business into which more than $1.3 million in fraudulently obtained tax refunds were deposited.  Thereafter, Grant directed distribution of the proceeds which included having third parties cash checks drawn on the various accounts and remit the funds to him.  Grant also instructed individuals to lie to law enforcement authorities when questioned about the checking account activities. Dale and Grant’s co-defendants – Laquanta Grant, Leroy Howard, and Isaac Dailey – have all pleaded guilty, as have two other co-conspirators, Wendy Delbridge and Betty Washington, who pleaded guilty to criminal informations.  

The second indictment charged a conspiracy that involved Dale, Grant, Melinda Clayton, and Stephanie Adams. As court documents show, this conspiracy extended from January 2011 to April 2011, when federal agents executed a search warrant at Clayton’s house and arrested her. In her plea agreement, Dale admitted that this scheme involved a fraud loss of between $400,000 and $1 million.  Dale admitted to providing Clayton with stolen identities in furtherance of the new scheme.  Clayton stored these and other lists of stolen identities at her home.  The tax refunds were directed to bank accounts and prepaid debit cards purchased by Dale and Grant. Dale, Grant, Clayton and Adams all pleaded guilty to their roles in the second scheme, as did Valerie Byrd, who pleaded guilty to a criminal information.

“The Justice Department remains committed to protecting Americans from thieves who would steal their identities and use them to commit refund fraud,” said Assistant Attorney General Kathryn Keneally of the Justice Department’s Tax Division. “Those who commit stolen identity refund fraud will be punished to the full extent of the law.”

"These sentences once again demonstrate the wide-spread and destructive nature of identity theft," observed George Beck, U.S. Attorney for the Middle District of Alabama.   "I commend the IRS for their strict enforcement of these violations of federal laws.   Our office remains dedicated to rooting out those evil wrongdoers who systematically steal taxpayers’ money."

“Identity theft is a despicable crime that victimizes honest taxpayers and causes immense hardship,” said Richard Weber, Chief, IRS Criminal Investigation. “This sentencing should serve as a strong warning to those considering similar conduct.”

The cases were investigated by Special Agents of the IRS - Criminal Investigation. Trial attorneys Jason H. Poole and Michael Boteler of the Tax Division are prosecuting the cases, with assistance from the U.S. Attorney’s Office, and in particular Assistant U.S. Attorneys Todd Brown and Jared Morris.

Search This Blog

Translate

White House.gov Press Office Feed