FROM: U.S. JUSTICE DEPARTMENT
Tuesday, June 16, 2015
Omar Gonzalez Sentenced to 17 Months in Prison for Armed Intrusion on White House Grounds
Omar Gonzalez, 43, of Copperas Cove, Texas, was sentenced today to 17 months in prison on charges stemming from an incident in which he climbed a fence and ran toward and into the White House while armed with a folding knife.
The sentencing was announced by Acting U.S. Attorney Vincent H. Cohen, Jr. for the District of Columbia and Acting Special Agent in Charge James M. Murray of the Washington Field Office for the U.S. Secret Service.
Gonzalez pleaded guilty on March 13, 2015, in the U.S. District Court for the District of Columbia to two federal offenses: one count of unlawfully entering a restricted building or grounds, while carrying a deadly or dangerous weapon and one count of assaulting, resisting, or impeding certain officers or employees. He was sentenced by the Honorable Rosemary M. Collyer. Upon completion of his prison term, Gonzalez will be placed on three years of supervised release.
Judge Collyer also prohibited Gonzalez from entering the District of Columbia for the duration of his supervision, except for court appearances and meetings with his attorney. He also will be required to participate in a psychiatric evaluation and cooperate fully with the Secret Service in any assessments they deem necessary to make of Gonzalez’s risk.
“Mr. Gonzalez is now paying the price for his foolish decision to jump the fence and run inside the White House,” said Acting U.S. Attorney Cohen. “When he finishes his prison term, he will be barred from entering the District of Columbia and must receive psychiatric treatment. The prison sentence imposed by the court should deter others from taking actions that needlessly put the First Family and White House employees at risk.”
According to the government’s evidence, on Sept. 19, 2014, at about 7:19 p.m., Gonzalez climbed over the north fence of the White House. While he was climbing over the fence, officers with the U.S. Secret Service’s Uniformed Division ran towards him and repeatedly yelled at him to stop and get down. Gonzalez, however, ignored the commands and landed on the north grounds of the White House.
Moments later, after ignoring additional, repeated commands from uniformed officers to stop, Gonzalez went through the north doors of the White House, knocking a uniformed officer backwards. Another uniformed officer then tackled him inside the White House.
Gonzalez was searched and a folding knife, with a serrated blade that was over three and one-half inches long, was discovered in his right front pants pocket. After his arrest, he gave oral consent to search his vehicle, located on Constitution Avenue NW. The vehicle contained hundreds of rounds of ammunition, in boxes and in magazines, hatchets and a machete.
Gonzalez has been in custody since his arrest on Sept. 19, 2014.
This case was investigated by the U.S. Secret Service and the U.S. Department of Homeland Security. It was prosecuted by Assistant U.S. Attorneys David Mudd and Thomas A. Gillice of the National Security Section for the U.S. Attorney’s Office for the District of Columbia.
A PUBLICATION OF RANDOM U.S.GOVERNMENT PRESS RELEASES AND ARTICLES
Showing posts with label U.S. SECRET SERVICE. Show all posts
Showing posts with label U.S. SECRET SERVICE. Show all posts
Wednesday, June 17, 2015
Saturday, April 4, 2015
4 INDICTED FOR ROLES IN INTERNATIONAL COUNTERFEIT CURRENCY OPERATION HEADQUARTERED IN UGANDA
FROM: U.S. JUSTICE DEPARTMENT
Thursday, April 2, 2015
Four Charged in International Uganda-Based Cyber Counterfeiting Scheme
A federal grand jury in Pittsburgh, Pennsylvania, has indicted four people in connection with an international counterfeit currency operation headquartered in the African nation of Uganda, announced U.S. Attorney David J. Hickton for the Western District of Pennsylvania.
The indictment, returned on April 1, 2015, charges Ryan Andrew Gustafson, 27, aka “Jack Farrel” aka “Willy Clock,” a U.S. citizen currently incarcerated in Kampala, Uganda, Zackary L. Ruiz, 18, aka “Mr. Mouse,” of Las Vegas, Nevada, Jeremy J. Miller, 30, aka “Sinner,” of Seattle, Washington and Michael Q. Lin, 20, aka “Mlin” aka “Mr. Casino,” of Bethlehem, Pennsylvania, with conspiracy and counterfeiting acts committed within and outside of the U.S. from December 2013 until December 2014.
“Today we announce the dismantling of an international cyber conspiracy in which Ugandan-made counterfeit Federal Reserve Notes were being advertised, bought and sold through online criminal forums then passed in coffee shops and corner stores in neighborhoods across our country,” said U.S. Attorney Hickton. “Working cooperatively with law enforcement partners in the U.S. and abroad, we were able to quickly infiltrate and disrupt this counterfeit trafficking network and limit losses.”
“The early and aggressive application of traditional and cyber investigative expertise and the cooperation and assistance of numerous domestic and international law enforcement agencies in this case led to the quick and efficient identification of conspirators in a widespread cyber-based counterfeiting network,” said Special Agent in Charge Eric P. Zahren of the U.S. Secret Service Pittsburgh Field Office, “but as importantly, minimized financial losses in the U.S. and elsewhere, consistent with our charge to protect our currency, our commerce and, ultimately, our communities.”
According to the indictment, in late December 2013, Gustafson created his own dark web website called Community-X, which was dedicated to the manufacturing, selling, buying, distribution and passing of counterfeit Federal Reserve Notes (FRNs), which he claimed to have manufactured. The website contained forums where members discussed the counterfeit bills and shared tips on how best to pass, ship and distribute counterfeit FRNs.
In September 2014, Gustafson redesigned this website into two different sites, a Community-X HQ site, with controlled access and a Community-X Recruitment Center site, which was accessible to the public. Gustafson, Ruiz and Miller were active members of both sites. Lin was only a member of the Recruitment Site.
Gustafson and others allegedly sold these counterfeit FRNs to purchasers in the U.S. From December 2013 through February 2014, an associate of Gustafson sent DHL packages containing these counterfeit FRNs to individuals in the U.S. After February 2014, Gustafson had the counterfeit FRNs smuggled into the U.S. by hiding the counterfeit FRNs in glued together pages of fake charity pamphlets.
The indictment alleges that Ruiz, Miller and Lin had varied levels of roles and responsibilities as participants in the conspiracy. In particular, the indictment alleges that Ruiz and others unpacked the counterfeit FRNs, that Ruiz, Miller and others treated the counterfeit FRNs to prepare them for passing and used the U.S. Postal Service to mail the treated FRNs to re-shippers and to purchasers and that Lin was a purchaser of the FRNs, who offered a guide on how to pass the counterfeit notes through casinos.
The indictment alleges more than $1.4 million in counterfeit FRNs have been seized and passed worldwide, both overseas and in the U.S. as part of this scheme.
Gustafson was charged by Ugandan authorities on Dec. 16, 2014, with conspiracy, possession of counterfeit, selling/dealing in counterfeit and unlawful possession of ammunition. He is presently on trial in Uganda on their charges.
The law provides for a maximum total sentence of five years in prison, a fine of $250,000, or both, on the conspiracy count; a maximum total sentence of 20 years in prison, a fine of $250,000, or both, on the conspiracy to commit money laundering count; and a maximum total sentence of 20 years in prison, a fine of 250,000, or both, on each of the passing and receiving counterfeit money counts. Under the Federal Sentencing Guidelines, the actual sentence imposed would be based upon the seriousness of the offense and the prior criminal history, if any, of the defendant.
U.S. Attorney Hickton commended numerous agencies and organizations for conducting the investigation leading to charges in this case, including the U.S. Secret Service in Pittsburgh, Los Angeles, California, Seattle, Washington, Las Vegas, Nevada, Philadelphia, Pennsylvania, Charlotte, North Carolina, Raleigh, North Carolina, Baltimore, Maryland, Minnesota, Miami, Florida, Washington, D.C., Cincinnati, Ohio, Denver, Colorado, Phoenix, Arizona, Rome, Italy, Pretoria, South Africa and the Criminal Investigative Division in Washington, D.C., the U.S. State Department, the U.S. Postal Inspection Service in Pittsburgh, Seattle, Las Vegas, Philadelphia and Charlotte, the Federal Bureau of Investigation – Pittsburgh Division, Homeland Security Investigations in Pittsburgh, Baltimore and Cincinnati, U.S. Customs and Border Protection and the National Cyber-Forensics & Training Alliance.
Thursday, April 2, 2015
Four Charged in International Uganda-Based Cyber Counterfeiting Scheme
A federal grand jury in Pittsburgh, Pennsylvania, has indicted four people in connection with an international counterfeit currency operation headquartered in the African nation of Uganda, announced U.S. Attorney David J. Hickton for the Western District of Pennsylvania.
The indictment, returned on April 1, 2015, charges Ryan Andrew Gustafson, 27, aka “Jack Farrel” aka “Willy Clock,” a U.S. citizen currently incarcerated in Kampala, Uganda, Zackary L. Ruiz, 18, aka “Mr. Mouse,” of Las Vegas, Nevada, Jeremy J. Miller, 30, aka “Sinner,” of Seattle, Washington and Michael Q. Lin, 20, aka “Mlin” aka “Mr. Casino,” of Bethlehem, Pennsylvania, with conspiracy and counterfeiting acts committed within and outside of the U.S. from December 2013 until December 2014.
“Today we announce the dismantling of an international cyber conspiracy in which Ugandan-made counterfeit Federal Reserve Notes were being advertised, bought and sold through online criminal forums then passed in coffee shops and corner stores in neighborhoods across our country,” said U.S. Attorney Hickton. “Working cooperatively with law enforcement partners in the U.S. and abroad, we were able to quickly infiltrate and disrupt this counterfeit trafficking network and limit losses.”
“The early and aggressive application of traditional and cyber investigative expertise and the cooperation and assistance of numerous domestic and international law enforcement agencies in this case led to the quick and efficient identification of conspirators in a widespread cyber-based counterfeiting network,” said Special Agent in Charge Eric P. Zahren of the U.S. Secret Service Pittsburgh Field Office, “but as importantly, minimized financial losses in the U.S. and elsewhere, consistent with our charge to protect our currency, our commerce and, ultimately, our communities.”
According to the indictment, in late December 2013, Gustafson created his own dark web website called Community-X, which was dedicated to the manufacturing, selling, buying, distribution and passing of counterfeit Federal Reserve Notes (FRNs), which he claimed to have manufactured. The website contained forums where members discussed the counterfeit bills and shared tips on how best to pass, ship and distribute counterfeit FRNs.
In September 2014, Gustafson redesigned this website into two different sites, a Community-X HQ site, with controlled access and a Community-X Recruitment Center site, which was accessible to the public. Gustafson, Ruiz and Miller were active members of both sites. Lin was only a member of the Recruitment Site.
Gustafson and others allegedly sold these counterfeit FRNs to purchasers in the U.S. From December 2013 through February 2014, an associate of Gustafson sent DHL packages containing these counterfeit FRNs to individuals in the U.S. After February 2014, Gustafson had the counterfeit FRNs smuggled into the U.S. by hiding the counterfeit FRNs in glued together pages of fake charity pamphlets.
The indictment alleges that Ruiz, Miller and Lin had varied levels of roles and responsibilities as participants in the conspiracy. In particular, the indictment alleges that Ruiz and others unpacked the counterfeit FRNs, that Ruiz, Miller and others treated the counterfeit FRNs to prepare them for passing and used the U.S. Postal Service to mail the treated FRNs to re-shippers and to purchasers and that Lin was a purchaser of the FRNs, who offered a guide on how to pass the counterfeit notes through casinos.
The indictment alleges more than $1.4 million in counterfeit FRNs have been seized and passed worldwide, both overseas and in the U.S. as part of this scheme.
Gustafson was charged by Ugandan authorities on Dec. 16, 2014, with conspiracy, possession of counterfeit, selling/dealing in counterfeit and unlawful possession of ammunition. He is presently on trial in Uganda on their charges.
The law provides for a maximum total sentence of five years in prison, a fine of $250,000, or both, on the conspiracy count; a maximum total sentence of 20 years in prison, a fine of $250,000, or both, on the conspiracy to commit money laundering count; and a maximum total sentence of 20 years in prison, a fine of 250,000, or both, on each of the passing and receiving counterfeit money counts. Under the Federal Sentencing Guidelines, the actual sentence imposed would be based upon the seriousness of the offense and the prior criminal history, if any, of the defendant.
U.S. Attorney Hickton commended numerous agencies and organizations for conducting the investigation leading to charges in this case, including the U.S. Secret Service in Pittsburgh, Los Angeles, California, Seattle, Washington, Las Vegas, Nevada, Philadelphia, Pennsylvania, Charlotte, North Carolina, Raleigh, North Carolina, Baltimore, Maryland, Minnesota, Miami, Florida, Washington, D.C., Cincinnati, Ohio, Denver, Colorado, Phoenix, Arizona, Rome, Italy, Pretoria, South Africa and the Criminal Investigative Division in Washington, D.C., the U.S. State Department, the U.S. Postal Inspection Service in Pittsburgh, Seattle, Las Vegas, Philadelphia and Charlotte, the Federal Bureau of Investigation – Pittsburgh Division, Homeland Security Investigations in Pittsburgh, Baltimore and Cincinnati, U.S. Customs and Border Protection and the National Cyber-Forensics & Training Alliance.
Tuesday, March 31, 2015
FEDERAL AGENTS CHARGED FOR ROLES IN BITCOM MONEY LAUNDERING AND FRAUD CASE
FROM: U.S. JUSTICE DEPARTMENT
Monday, March 30, 2015
Former Federal Agents Charged With Bitcoin Money Laundering and Wire Fraud
Agents Were Part of Baltimore’s Silk Road Task Force
Two former federal agents have been charged with wire fraud, money laundering and related offenses for stealing digital currency during their investigation of the Silk Road, an underground black market that allowed users to conduct illegal transactions over the Internet. The charges are contained in a federal criminal complaint issued on March 25, 2015, in the Northern District of California and unsealed today.
Assistant Attorney General Leslie R. Caldwell of the Justice Department’s Criminal Division, U.S. Attorney Melinda Haag of the Northern District of California, Special Agent in Charge David J. Johnson of the FBI’s San Francisco Division, Special Agent in Charge José M. Martinez of the Internal Revenue Service-Criminal Investigation’s (IRS-CI) San Francisco Division, Special Agent in Charge Michael P. Tompkins of the Justice Department’s Office of the Inspector General Washington Field Office and Special Agent in Charge Lori Hazenstab of the Department of Homeland Security’s Office of the Inspector General in Washington D.C. made the announcement.
Carl M. Force, 46, of Baltimore, was a Special Agent with the Drug Enforcement Administration (DEA), and Shaun W. Bridges, 32, of Laurel, Maryland, was a Special Agent with the U.S. Secret Service (USSS). Both were assigned to the Baltimore Silk Road Task Force, which investigated illegal activity in the Silk Road marketplace. Force served as an undercover agent and was tasked with establishing communications with a target of the investigation, Ross Ulbricht, aka “Dread Pirate Roberts.” Force is charged with wire fraud, theft of government property, money laundering and conflict of interest. Bridges is charged with wire fraud and money laundering.
According to the complaint, Force was a DEA agent assigned to investigate the Silk Road marketplace. During the investigation, Force engaged in certain authorized undercover operations by, among other things, communicating online with “Dread Pirate Roberts” (Ulbricht), the target of his investigation. The complaint alleges, however, that Force then, without authority, developed additional online personas and engaged in a broad range of illegal activities calculated to bring him personal financial gain. In doing so, the complaint alleges, Force used fake online personas, and engaged in complex Bitcoin transactions to steal from the government and the targets of the investigation. Specifically, Force allegedly solicited and received digital currency as part of the investigation, but failed to report his receipt of the funds, and instead transferred the currency to his personal account. In one such transaction, Force allegedly sold information about the government’s investigation to the target of the investigation. The complaint also alleges that Force invested in and worked for a digital currency exchange company while still working for the DEA, and that he directed the company to freeze a customer’s account with no legal basis to do so, then transferred the customer’s funds to his personal account. Further, Force allegedly sent an unauthorized Justice Department subpoena to an online payment service directing that it unfreeze his personal account.
Bridges allegedly diverted to his personal account over $800,000 in digital currency that he gained control of during the Silk Road investigation. The complaint alleges that Bridges placed the assets into an account at Mt. Gox, the now-defunct digital currency exchange in Japan. He then allegedly wired funds into one of his personal investment accounts in the United States mere days before he sought a $2.1 million seizure warrant for Mt. Gox’s accounts.
Bridges self-surrendered today and will appear before Magistrate Judge Maria-Elena James of the Northern District of California at 9:30 a.m. PST this morning. Force was arrested on Friday, March 27, 2015, in Baltimore and will appear before Magistrate Judge Timothy J. Sullivan of the District of Maryland at 2:30 p.m. EST today.
The charges contained in the complaint are merely accusations, and the defendants are presumed innocent unless and until proven guilty.
The case was investigated by the FBI’s San Francisco Division, the IRS-CI’s San Francisco Division, the Department of Justice Office of the Inspector General and the Department of Homeland Security Office of the Inspector General in Washington D.C. The Treasury Department’s Financial Crimes Enforcement Network also provided assistance with the investigation of this case. The case is being prosecuted by Assistant U.S. Attorneys Kathryn Haun and William Frentzen of the Northern District of California and Trial Attorney Richard B. Evans of the Criminal Division’s Public Integrity Section.
Monday, March 30, 2015
Former Federal Agents Charged With Bitcoin Money Laundering and Wire Fraud
Agents Were Part of Baltimore’s Silk Road Task Force
Two former federal agents have been charged with wire fraud, money laundering and related offenses for stealing digital currency during their investigation of the Silk Road, an underground black market that allowed users to conduct illegal transactions over the Internet. The charges are contained in a federal criminal complaint issued on March 25, 2015, in the Northern District of California and unsealed today.
Assistant Attorney General Leslie R. Caldwell of the Justice Department’s Criminal Division, U.S. Attorney Melinda Haag of the Northern District of California, Special Agent in Charge David J. Johnson of the FBI’s San Francisco Division, Special Agent in Charge José M. Martinez of the Internal Revenue Service-Criminal Investigation’s (IRS-CI) San Francisco Division, Special Agent in Charge Michael P. Tompkins of the Justice Department’s Office of the Inspector General Washington Field Office and Special Agent in Charge Lori Hazenstab of the Department of Homeland Security’s Office of the Inspector General in Washington D.C. made the announcement.
Carl M. Force, 46, of Baltimore, was a Special Agent with the Drug Enforcement Administration (DEA), and Shaun W. Bridges, 32, of Laurel, Maryland, was a Special Agent with the U.S. Secret Service (USSS). Both were assigned to the Baltimore Silk Road Task Force, which investigated illegal activity in the Silk Road marketplace. Force served as an undercover agent and was tasked with establishing communications with a target of the investigation, Ross Ulbricht, aka “Dread Pirate Roberts.” Force is charged with wire fraud, theft of government property, money laundering and conflict of interest. Bridges is charged with wire fraud and money laundering.
According to the complaint, Force was a DEA agent assigned to investigate the Silk Road marketplace. During the investigation, Force engaged in certain authorized undercover operations by, among other things, communicating online with “Dread Pirate Roberts” (Ulbricht), the target of his investigation. The complaint alleges, however, that Force then, without authority, developed additional online personas and engaged in a broad range of illegal activities calculated to bring him personal financial gain. In doing so, the complaint alleges, Force used fake online personas, and engaged in complex Bitcoin transactions to steal from the government and the targets of the investigation. Specifically, Force allegedly solicited and received digital currency as part of the investigation, but failed to report his receipt of the funds, and instead transferred the currency to his personal account. In one such transaction, Force allegedly sold information about the government’s investigation to the target of the investigation. The complaint also alleges that Force invested in and worked for a digital currency exchange company while still working for the DEA, and that he directed the company to freeze a customer’s account with no legal basis to do so, then transferred the customer’s funds to his personal account. Further, Force allegedly sent an unauthorized Justice Department subpoena to an online payment service directing that it unfreeze his personal account.
Bridges allegedly diverted to his personal account over $800,000 in digital currency that he gained control of during the Silk Road investigation. The complaint alleges that Bridges placed the assets into an account at Mt. Gox, the now-defunct digital currency exchange in Japan. He then allegedly wired funds into one of his personal investment accounts in the United States mere days before he sought a $2.1 million seizure warrant for Mt. Gox’s accounts.
Bridges self-surrendered today and will appear before Magistrate Judge Maria-Elena James of the Northern District of California at 9:30 a.m. PST this morning. Force was arrested on Friday, March 27, 2015, in Baltimore and will appear before Magistrate Judge Timothy J. Sullivan of the District of Maryland at 2:30 p.m. EST today.
The charges contained in the complaint are merely accusations, and the defendants are presumed innocent unless and until proven guilty.
The case was investigated by the FBI’s San Francisco Division, the IRS-CI’s San Francisco Division, the Department of Justice Office of the Inspector General and the Department of Homeland Security Office of the Inspector General in Washington D.C. The Treasury Department’s Financial Crimes Enforcement Network also provided assistance with the investigation of this case. The case is being prosecuted by Assistant U.S. Attorneys Kathryn Haun and William Frentzen of the Northern District of California and Trial Attorney Richard B. Evans of the Criminal Division’s Public Integrity Section.
Saturday, November 23, 2013
U.S MARSHALS SERVICE ARRESTS SUSPECT IN CONNECTION WITH BOMB THREAT
FROM: U.S. MARSHALS SERVICE
November 21, 2013 Eastern District of Virginia
U.S. Marshals Task Force Arrests Suspect in Connection with a Bomb Threat
Alexandria, VA – U.S. Marshal Robert Mathieson announces the capture of William Wyatt Raum. Raum was wanted by the Fairfax County Sheriff’s Office (FCSO) in connection with a bomb threat communicated earlier this month.
On Oct. 29, the Fairfax County Adult Detention Center received a bomb threat from an unknown suspect. On Nov. 4, the FCSO requested their deputy sheriff assigned to the U.S. Marshals Service’s fugitive task force to investigate the threat. The investigation determined Raum as the alleged offender.
The case was adopted by the U.S. Marshals task force located within the federal Eastern District of Virginia. At approximately 6:00 a.m. on Monday, Nov. 18, task force officers and Deputy U.S. Marshals located and apprehended Raum in an apartment complex located on Marlboro Pike in Capitol Heights, MD. Raum was transported to the Prince George’s County Police Department and is awaiting extradition to Fairfax County.
The U.S. Marshals-led fugitive task force within E/VA is made possible by the collaboration of the U.S. Marshals Service, Federal Bureau of Investigation, U.S. Secret Service, Alexandria Police Department, Virginia State Police, Fairfax County Police Department, Fairfax County Sheriff's Department, Immigration and Customs Enforcement, and the Diplomatic Security Service.
The task force within the Metropolitan D.C. area was founded in 2004 and, to date, has arrested tens of thousands of fugitives. The success of the task force directly correlates to it being a truly joint endeavor. Each agency brings its unique skills and expertise toward the common goal of pursuing and arresting the worst of the worst.
The U.S. Marshals Service arrested more than 36,000 federal fugitives, 86,700 state and local fugitives, and 11,800 sex offenders in fiscal year 2013. Our investigative network and capabilities allow for the unique ability to track and apprehend any fugitive who attempts to evade police capture, anywhere in the country.
November 21, 2013 Eastern District of Virginia
U.S. Marshals Task Force Arrests Suspect in Connection with a Bomb Threat
Alexandria, VA – U.S. Marshal Robert Mathieson announces the capture of William Wyatt Raum. Raum was wanted by the Fairfax County Sheriff’s Office (FCSO) in connection with a bomb threat communicated earlier this month.
On Oct. 29, the Fairfax County Adult Detention Center received a bomb threat from an unknown suspect. On Nov. 4, the FCSO requested their deputy sheriff assigned to the U.S. Marshals Service’s fugitive task force to investigate the threat. The investigation determined Raum as the alleged offender.
The case was adopted by the U.S. Marshals task force located within the federal Eastern District of Virginia. At approximately 6:00 a.m. on Monday, Nov. 18, task force officers and Deputy U.S. Marshals located and apprehended Raum in an apartment complex located on Marlboro Pike in Capitol Heights, MD. Raum was transported to the Prince George’s County Police Department and is awaiting extradition to Fairfax County.
The U.S. Marshals-led fugitive task force within E/VA is made possible by the collaboration of the U.S. Marshals Service, Federal Bureau of Investigation, U.S. Secret Service, Alexandria Police Department, Virginia State Police, Fairfax County Police Department, Fairfax County Sheriff's Department, Immigration and Customs Enforcement, and the Diplomatic Security Service.
The task force within the Metropolitan D.C. area was founded in 2004 and, to date, has arrested tens of thousands of fugitives. The success of the task force directly correlates to it being a truly joint endeavor. Each agency brings its unique skills and expertise toward the common goal of pursuing and arresting the worst of the worst.
The U.S. Marshals Service arrested more than 36,000 federal fugitives, 86,700 state and local fugitives, and 11,800 sex offenders in fiscal year 2013. Our investigative network and capabilities allow for the unique ability to track and apprehend any fugitive who attempts to evade police capture, anywhere in the country.
Tuesday, January 8, 2013
ROMANIAN NATIONAL SENTENCED FOR ROLE IN MULTIMILLION-DOLLAR REMOTE HACKING SCHEME
Monday, January 7, 2013
Romanian National Sentenced to 21 Months in Prison for Role in Multimillion-Dollar Scheme to Remotely Hack into and Steal Payment Card Data from Hundreds of U.S. Merchants’ Computers
WASHINGTON – A Romanian national was sentenced today to serve 21 months in prison for his role in an international, multimillion-dollar scheme to remotely hack into and steal payment card data from hundreds of U.S. merchants’ computers, announced Assistant Attorney General Lanny A. Breuer of the Justice Department’s Criminal Division; U.S. Attorney for the District of New Hampshire John P. Kacavas; and Holly Fraumeni, Resident Agent in Charge of the U.S. Secret Service (USSS), Manchester, N.H., Resident Office.
Cezar Butu, 27, of Ploiesti, Romania, was sentenced by Judge Steven J. McAuliffe in U.S. District Court in New Hampshire.
On Sept. 17, 2012, Butu pleaded guilty to one count of conspiracy to commit access device fraud.
In his guilty plea, Butu admitted that, from approximately 2009-2011, he participated in a Romanian-based conspiracy to hack into hundreds of U.S.-based computers to steal credit, debit and payment account numbers and associated data (collectively "payment card data") that belonged to U.S. cardholders. According to court documents, Butu and his co-conspirators used the stolen payment card data to make unauthorized charges on, and/or transfers of funds from, cardholders’ accounts (or alternatively to transfer the stolen payment card data to other co-conspirators who would do the same). Butu admitted that he repeatedly asked an alleged co-conspirator to provide him with stolen payment card data and that the alleged co-conspirator provided him with instructions for how to access a website where a portion of the stolen payment card data was stored. Butu later attempted to use the stolen payment card data to make unauthorized charges on, or transfers of funds from, the accounts. According to Butu’s plea agreement, he also attempted to sell, or otherwise transfer, the stolen payment card data to other co-conspirators for them to use in a similar manner. Butu admitted to acquiring stolen payment card data belonging to approximately 140 cardholders during the course of the scheme.
In his plea agreement, Butu agreed to be sentenced to 21 months in prison.
Butu’s co-conspirator Iulian Dolan pleaded guilty to one count of conspiracy to commit computer fraud and two counts of conspiracy to commit access device fraud, and has agreed to be sentenced to seven years in prison. Dolan’s sentencing hearing is scheduled for April 4, 2013.
Alleged co-conspirator Adrian-Tiberiu Oprea is scheduled for trial on Feb. 20, 2013, in U.S. District Court in New Hampshire.
The case was investigated by the USSS, with the assistance of the New Hampshire State Police and the Romanian Directorate of Investigation of Organized Crime and Terrorism.
The case is being prosecuted by Trial Attorney Mona Sedky in the Criminal Division’s Computer Crime and Intellectual Property Section and Assistant U.S. Attorney Arnold H. Huftalen from the District of New Hampshire.
Romanian National Sentenced to 21 Months in Prison for Role in Multimillion-Dollar Scheme to Remotely Hack into and Steal Payment Card Data from Hundreds of U.S. Merchants’ Computers
WASHINGTON – A Romanian national was sentenced today to serve 21 months in prison for his role in an international, multimillion-dollar scheme to remotely hack into and steal payment card data from hundreds of U.S. merchants’ computers, announced Assistant Attorney General Lanny A. Breuer of the Justice Department’s Criminal Division; U.S. Attorney for the District of New Hampshire John P. Kacavas; and Holly Fraumeni, Resident Agent in Charge of the U.S. Secret Service (USSS), Manchester, N.H., Resident Office.
Cezar Butu, 27, of Ploiesti, Romania, was sentenced by Judge Steven J. McAuliffe in U.S. District Court in New Hampshire.
On Sept. 17, 2012, Butu pleaded guilty to one count of conspiracy to commit access device fraud.
In his guilty plea, Butu admitted that, from approximately 2009-2011, he participated in a Romanian-based conspiracy to hack into hundreds of U.S.-based computers to steal credit, debit and payment account numbers and associated data (collectively "payment card data") that belonged to U.S. cardholders. According to court documents, Butu and his co-conspirators used the stolen payment card data to make unauthorized charges on, and/or transfers of funds from, cardholders’ accounts (or alternatively to transfer the stolen payment card data to other co-conspirators who would do the same). Butu admitted that he repeatedly asked an alleged co-conspirator to provide him with stolen payment card data and that the alleged co-conspirator provided him with instructions for how to access a website where a portion of the stolen payment card data was stored. Butu later attempted to use the stolen payment card data to make unauthorized charges on, or transfers of funds from, the accounts. According to Butu’s plea agreement, he also attempted to sell, or otherwise transfer, the stolen payment card data to other co-conspirators for them to use in a similar manner. Butu admitted to acquiring stolen payment card data belonging to approximately 140 cardholders during the course of the scheme.
In his plea agreement, Butu agreed to be sentenced to 21 months in prison.
Butu’s co-conspirator Iulian Dolan pleaded guilty to one count of conspiracy to commit computer fraud and two counts of conspiracy to commit access device fraud, and has agreed to be sentenced to seven years in prison. Dolan’s sentencing hearing is scheduled for April 4, 2013.
Alleged co-conspirator Adrian-Tiberiu Oprea is scheduled for trial on Feb. 20, 2013, in U.S. District Court in New Hampshire.
The case was investigated by the USSS, with the assistance of the New Hampshire State Police and the Romanian Directorate of Investigation of Organized Crime and Terrorism.
The case is being prosecuted by Trial Attorney Mona Sedky in the Criminal Division’s Computer Crime and Intellectual Property Section and Assistant U.S. Attorney Arnold H. Huftalen from the District of New Hampshire.
Subscribe to:
Posts (Atom)