Tag: ICE

  • BRIEF: Feds Tweet Photo Of $20 Million Allegedly Found In Box Spring And Tied To TelexFree

    Federal prosecutors have Tweeted a photo of $20 million allegedly found stuffed in a box spring and linked to the massive TelexFree Ponzi- and pyramid caper.

    The cash was found Jan. 4 by the Homeland Security Investigations branch of U.S. Immigration and Customs Enforcement, an arm of the U.S. Department of Homeland Security.

    Agents seized the cash and arrested Cleber Rene Rizerio Rocha, 28, of Brazil. He remains jailed.

    In other HYIP news, apparent supporters of the Traffic Monsoon “program” have been using Twitter in the past 24 hours to ask President Trump to intervene in the SEC’s fraud case brought in July 2016.

    Traffic Monsoon was pitched as an “advertising” program. The SEC alleged the program operated as a Ponzi scheme.




  • REPORTS: TelexFree Figure Sann Rodrigues Arrested In New Jersey

    Sann Rodrigues. From a promo for the TelexFree international convention in Spain in 2014.
    Sann Rodrigues. From a promo for the TelexFree international convention in Spain in 2014.

    BULLETIN: (Updated 9:27 p.m. EDT U.S.A.) TelexFree and iFreeX figure Sann Rodrigues has been arrested in New Jersey, according to the Blog of Joaldro Dalla “Billy” Costa, citing a report on radio station WSRO 650 AM in Framingham, Mass.

    Billy’s story is in Portuguese. Here is the English translation by Google Translate.

    Rodrigues — listed as Devasc Sanderley Rodrigues in online booking records and believed to be a native of Brazil who has lived in the U.S. states of Massachusetts and Florida — appears to have been arrested May 18.

    On the same day, U.S. and Brazilian law-enforcement officials met in Washington, D.C. Whether the international talks and the arrest were a coincidence was not immediately clear.

    The records suggest Rodrigues was detained at the Essex County Correctional Facility.

    Billy’s story suggests the booking was immigration-related. The PP Blog could not immediately confirm the information.

    The Essex County site provides a link to http://www.eccorrections.org/inmatelookup. When the name Sanderley Rodrigues is typed into the form and viewers click on a follow-up link, a booking photo of Rodrigues appears.

    No release date appears, suggesting Rodrigues, 43, still is being held. Information on bond and a specific charge was not posted.

    Rodrigues was one of eight TelexFree figures charged civilly with securities fraud by the U.S. Securities and Exchange Commission. He is a recidivist securities violator, according to the SEC.

    TelexFree, an alleged Ponzi- and pyramid scheme that may have gathered on the order of $1.8 billion in about two years, is under investigation by the SEC and the U.S. Department of Homeland Security. Alleged TelexFree operators James Merrill and Carlos Wanzeler have been charged criminally.

    U.S. authorities have called Wanzeler an international fugitive perhaps living in Brazil.

    On May 18, officials from U.S. Immigration and Customs Enforcement (ICE), an arm of the Department of Homeland Security, met in Washington with officials from the Brazilian National Police.

    The officials “discussed the joint commitment to continued information-sharing and conducting investigations into child exploitation, financial fraud and human trafficking, among other topics,” according to an ICE news release dated May 21.

     

  • Purported ‘Sovereign Citizen’ Who Bizarrely Claimed His Authority Came From ‘The Vatican’ Convicted Of Issuing Bogus Diplomatic Credentials

    From ABC report on James McBride and "Divine Province."
    From ABC News report on James McBride and “Divine Province.”

    EDITOR’S NOTE: U.S. Immigration and Customs Enforcement (ICE) and Homeland Security Investigations (HSI) are referenced in the story about purported “sovereign citizen” James T. McBride below. ICE/HSI also are involved in the investigation of the alleged TelexFree Ponzi- and pyramid scheme. Whether TelexFree had any “sovereign citizens” in its ranks is unclear. “Sovereign citizens,” however, have been linked to other HYIP schemes. Wild narratives may accompany such schemes both before and after a government intervention.

    ** __________________________________ **

    James T. McBride first came to our attention in January 2013, after a reader alerted us to a story in the Sun Sentinel about a bizarre incident that occurred during a bankruptcy hearing for a Florida business known as RoboVault.

    As the Sun Sentinel reported at the time (italics added):

    McBride, who claims to derive his authority from the Vatican, sent letters to the judge and trustee demanding the bankruptcy case be dropped. He previously has been profiled in media accounts as a “sovereign separatist,” someone who believes he is not subject to state and federal laws.

    McBride’s name next surfaced in February 2013, as part of a story concerning the arrest near Columbus, Ohio, of a purported “sovereign citizen.” A police officer and police canine reportedly were injured. (See Comments thread below story, which references an entity known as “Divine Province.”)

    So-called “sovereign citizens” — jailed AdSurfDaily figure Kenneth Wayne Leaming is one of them — have an irrational belief that laws do not apply to them.  Leaming became the target of an FBI investigation after filing false liens against various public officials involved in the ASD Ponzi case. Investigators found bogus police credentials in Leaming’s possession.

    Prosecutors said Leaming was a member of the “County Rangers,” the armed-enforcement wing of a group of “sovereign citizens.”

    By May 2014, prosecutors had formally connected McBride, 60, of Columbus, Ohio, to “Divine Province.” He has now been convicted in the Eastern District of Virginia on charges of conspiracy, causing the impersonation of a diplomat and producing false identification documents.

    Yes. You read that right: causing the impersonation of a diplomat.

    Here’s part of what ICE/HSI and federal prosecutors in the office of U.S. Attorney Dana J. Boente of the Eastern District of Virginia had to say about the McBride case (italics added):

    McBride was indicted on May 14, 2014, by a federal grand jury of one count of conspiracy, one count of causing the impersonation of a diplomat and four counts of producing false identification documents. According to the evidence at trial, McBride was the leader of a sovereign citizen group called “Divine Province,” whose members claimed the U.S. government was a “municipal corporation” that did not have authority over them. McBride produced and distributed false diplomatic identification cards to his group’s members, and he encouraged them to make claims of diplomatic immunity to avoid arrest, debts or taxes. None of the group’s members were in fact accredited diplomats.

    McBride started selling the identification cards in September 2012 at a seminar he organized in Herndon, Virginia. Afterwards, he started selling the IDs from a website and shipping them around the country.

    McBride sold the IDs in pairs, one that identified the holder as a “Universal Post Office Diplomat” and another that purported to be an “International Diplomatic Driver Permit,” for approximately $200. The defendant also encouraged his members to send copies of the IDs to governmental agencies to notify them of a member’s “status” as a diplomat. The defendant claimed that his authority to issue the IDs came from the Vatican. The defendant also gave a televised interview on ABC News prior to the filing of charges in the case, in which he reiterated such claims. During the course of the charged conduct, the defendant’s organization earned close to $500,000.

    Watch segment of ABC News video in which McBride bizarrely calls himself the “primary trustee of the world.”

    McBride potentially faces two decades in prison, prosecutors said.

  • SPECIAL REPORT: Prior To Brazil’s TelexFree-Related ‘Operation Orion,’ United States Used Same Name In Sting; U.S. Department Of Homeland Security Has Office In Brasilia And History Of Cooperating With Brazilian Investigators

    In a curious promo earlier this year, Egyptian pyramids were used as an art element by cheerleaders for TelexFree, an alleged pyramid scheme. Source: ConventionTelexFree.com. Red highlight by PP Blog.
    Only in MLM: In a head-scratching promo earlier this year, TelexFree cheerleaders used an image of the Pyramids of Giza during an active pyramid-scheme probe in Brazil. Red highlight by PP Blog.

    If you’ve been following TelexFree developments, you’ve probably heard about “Operation Orion,” the code name for the investigation that led to raids against TelexFree’s Ympactus arm last week by the Brazilian federal police. The Orion name was chosen, police said, because it fit splendidly within the context of a pyramid-scheme case.

    How so? The Pyramids of Giza in Egypt were aligned with the Orion constellation, police explained.

    Our analysis of the “Operation Orion” name is that it shows heady messaging by Brazilian police. It is direct in the sense that TelexFree, after all, may be the world’s largest MLM HYIP pyramid scheme. And it’s subtle in the sense that so many pyramid-scheme participants have bright stars in their eyes that blind them to the realities of mathematics.

    Here we’ll point out that, for whatever reason, someone within the TelexFree sphere got the head-scratching idea earlier this year to use an image of the Pyramids of Giza in a promo for TelexFree during an active pyramid-scheme probe in Brazil.

    We believe it notable that Brazilian police also referenced the Pyramids of Giza, given their presence in a TelexFree promo.

    For newer readers, we’ll also point out that the HYIP sphere is infamous for taunting the law-enforcement community. Like TelexFree, a “program” known as WCM777 also came under investigation in multiple countries earlier this year. Naturally someone within the WCM777 sphere shoved an image of a pyramid down the throat of law enforcement after word of the investigations became public.

    Second Tour (At Least) For ‘Operation Orion’

    Did you know that the code name “Operation Orion” chosen by Brazilian police previously had been used by the United States in a major law-enforcement action, albeit in a completely different context? (More on the 2012 U.S. action below.)

    What’s your thinking? Are two Operation Orions in two years coincidence?

    And did you know that the U.S. Department of Homeland Security (DHS), which has its own TelexFree probe, has an office in Brasilia and a history of cooperating with Brazil’s federal police — and that some criminal investigators from outside the United States receive training at the DHS Federal Law Enforcement Training Center in Glynco, Ga? (The U.S.-sponsored training also sometimes occurs in countries that host the United States. Some Brazilian investigators, for example, have received U.S. training in Peru. See photo below.)

    U.S. prosecutors did not respond to a request for comment on whether there was any coordination between the United States and Brazil last week on TelexFree-related events: the indictment of TelexFree figures James Merrill and Carlos Wanzeler in the United States, and the public announcement of “Operation Orion” in Brazil.

    What’s In A Code Name?

    U.S.-based police, prosecutorial and regulatory agencies regularly conjure up operational names to distill the essence of the law-enforcement goal and to send a message that fraudsters never should be confident. Agencies also sometimes engage in something we’ll describe as reverse black comedy whose purpose is to accent the absurdities of scams and scammers. In New Jersey last year, for example, a law-enforcement action targeted at alleged booze diluters was memorably named “Operation Swill.”

    It was an instant classic.

    A long-running FBI operation targeted at dozens of penny-stock fraudsters a few years ago was dubbed “Operation Shore Shells,” in part because the probe occurred near the sea and in part because the fraud involved the use of shell companies, often a nemesis of legitimate commerce. The SEC, which regulates the U.S. securities markets, once dubbed an action directed at hundreds of companies ripe for pump-and-dump swindles “Operation Shell Expel.”

    To out illegal gambling conduits reaching into the United States, DHS once set up a sting operation and “obtained a business address near Atlantic City, New Jersey” to bolster undercover operatives’ street cred.  As part of the operation, the Feds created a bogus “payment processor” known as Linwood Payment Solutions to “negotiate contracts and terms of the processing, and to handle the intricate movement and processing of collection and payment data from the gambling organizations to the banks.”

    These well-dressed greeters actually were part of a federal undercover operation dubbed "No Such Thing as a Free Lunch." Source: U.S. Marshals Service. Red blocks by PP Blog.
    These well-dressed greeters actually were part of a federal undercover operation dubbed “No Such Thing as a Free Lunch.” Source: U.S. Marshals Service. Red blocks by PP Blog.

    The U.S. Marshals Service, in charge of rounding up fugitives, once famously conjured up a sting dubbed “No Such Thing as a Free Lunch” that operated as part of a larger sting dubbed FIST — for Fugitive Investigative Strike Teams.

    As part of a six-year FIST operation in the 1980s, marshals created a fake business known as “Flagship International Sports Television Inc.,” obtained the last-known addresses of more than 3,000 wanted persons and sent brunch “invitations” that promised free food and free National Football League game tickets to those addresses. The marshals also offered a shot at free Super Bowl tickets.

    The free-food sting netted 100 arrests. FIST overall netted more than 14,700.

    Undercover TelexFree Probe

    It is known that DHS conducted a TelexFree-related undercover operation that lasted for months. Whether the operation extended to foreign soil and had a formal name is unclear. Based on its research, the PP Blog believes that undercover stings (named and unnamed) operated by U.S. government agencies and aimed at HYIPs have been operating continuously in the United States since at least 2006.

    One of the reasons is that the schemes put banks in the line of fire and often target disadvantaged populations. Beyond that, HYIP schemes have a history of trading on the names of the White House and U.S. government agencies, thus confusing people across the world. TelexFree promoters, for instance, traded on the names of President Obama, the cabinet-level office of the U.S. Attorney General, the SEC and Massachusetts Commonwealth Secretary William Galvin. Why? To cloak themselves in a veneer of legitimacy and to drive money to a scheme that purportedly returned $1,040 in a year to people who paid in $289, $5,200 to people who paid in $1,375 and $57,200 to people who paid in $15,125.

    Even Bernard Madoff would gag at the thought.

    Female police officials from multiple countries, including Brazil, received U.S. training in Peru in 2012. Photo source: DHS.
    Female police officials from multiple countries, including Brazil, received U.S. training in Peru in 2012. Photo source: DHS.

    With the Internet emerging as the favored delivery vessel of both clever and unclever fictions aimed at transferring great sums of wealth and putting unwarranted financial power in the hands of criminals and criminal enterprises,  the need has arisen to pursue cross-border frauds aggressively. The only way to minimize the mushroom effect of fraud schemes operating on the Internet is through international cooperation at the highest levels of government and law enforcement.

    Put another way, your latest recruit could be a Fed. The person you instructed not to “call it an investment” (as part of a ham-handed cover-up bid) could be a Fed. The person sitting next to you at a hotel “extravaganza” of some sort could be a Fed.  So could the person in the cabin next to you on the scammers’ cruise ship. So could the recruit who, at your direction, paid you personally while joining, instead of paying the  company. That upline guy — the one who sponsored you and asked you to pay him personally — could have one or more Feds in his downline. Those Feds could be “placing ads” for the program and keeping notes on whether anybody signed up under them.

    Channeling?

    Could Brazilian authorities who selected the name “Operation Orion” and referenced the Pyramids of Giza perhaps been channeling their U.S. counterparts and engaging in some reverse black comedy to point out the absurdity of scams? Man, we hope so.

    As noted above, someone within the TelexFree sphere showcased the Pyramids of Giza during a pyramid-scheme probe in Brazil. Apparently no one in TelexFree thought it prudent, say, to stop the scheme during the Brazilian probe.

    Because the HYIP sphere is populated by the most disingenuous “businesses” and people you’ll ever encounter, it’s easy enough to read such an act as telling law enforcement to shove it. Fractured thinking and taunts at law enforcement are core signatures of HYIP frauds, perhaps characteristics every bit as defining as preposterous daily payout rates of between .50 and 2.75 percent.

    Good fortune certainly did not shine down on TelexFree from Orion on July 23, the date of the U.S. indictments. Nor did it shine down on July 24, the date the “Operation Orion” pyramid probe was announced in Brazil.

    In our view, the name “Operation Orion” selected by Brazilian police was practically perfect.

    In addition to being a star constellation, Orion is the great hunter from Greek mythology. With Brazil’s “Operation Orion,” alleged pyramid schemers became the hunted.

    Alleged child predators were the hunted in the U.S. version of “Operation Orion,” a 2012 sting engineered by DHS.  Arrests were made in the United States, Spain, the Philippines, Argentina and the United Kingdom. The DHS agency that launched the 2012 version of “Operation Orion” is known as Immigration and Customs Enforcement — or ICE for short. Homeland Security Investigations (HSI) is an ICE directorate.

    From ICE (italics/bolding added):

    HSI investigates immigration crime, human rights violations and human smuggling, smuggling of narcotics, weapons and other types of contraband, financial crimes, cybercrime and export enforcement issues. ICE special agents conduct investigations aimed at protecting critical infrastructure industries that are vulnerable to sabotage, attack or exploitation.

    In addition to ICE criminal investigations, HSI oversees the agency’s international affairs operations and intelligence functions. HSI consists of more than 10,000 employees, consisting of 6,700 special agents, who are assigned to more than 200 cities throughout the U.S. and 47 countries around the world.

    U.S. court records show that HSI started the undercover investigation into TelexFree at least by October 2013. Other records show HSI has an attaché office in Brasilia, the capital of Brazil.

    ICE and HSI have a history of cooperating with Brazil’s federal police. Recent examples include the May 2014 return to the government of Brazil of a smuggled painting linked to a bank fraud investigation. In April 2014, ICE agents returned to Brazil a man arrested in the United States and wanted on murder charges in Brazil.

    In May 2014, ICE and HSI announced they had cooperated with federal police in Brazil in a sting known as “Operation Proteja Brasil,” described as aimed at protecting against child porn.

    From ICE (italics/bolding added):

    Some of the warrants executed during this operation were the direct result of leads provided by HSI Brasilia and the National Center for Missing & Exploited Children (NCMEC).

     

  • URGENT >> BULLETIN >> MOVING: United States, 10 Foreign Law-Enforcement Agencies, Seize 706 Domain Names In Cyber Fraud Crackdown

    domainseizurescybermonday2013smallURGENT >> BULLETIN >> MOVING: The United States and 10 law-enforcement agencies in Europe and Hong Kong have seized 706 domain names in a Cyber Monday fraud crackdown, U.S. Immigration and Customs Enforcement (ICE) said.

    The photo above is from one of the domains: nfl-go.com, which has been linked to counterfeiting, according to a seizure message playing on the site. Variety.com first reported the seizure of domains linked to alleged counterfeiting sites that trade on the intellectual property of the National Football League.

    At least some of the seized sites now display the emblems of at least 14 law-enforcement agencies in the United States, the United Kingdom (City of London Police), Belgium, Romania, Hong Kong, France, Spain, Hungary and Denmark. The EUROPOL emblem also is rolling across the seized sites.

    “Working with our international partners on operations like this shows the true global impact of IP crime,” said ICE Acting Director John Sandweg. “Counterfeiters take advantage of the holiday season and sell cheap fakes to unsuspecting consumers everywhere. Consumers need to protect themselves, their families, and their personal financial information from the criminal networks operating these bogus sites.”

    A top EUROPOL official said buyers may be assisting organized crime.

    “Unfortunately the economic downturn has meant that disposable income has gone down, which may tempt more people to buy products for prices that are too good to be true. Consumers should realize that, by buying these products, they risk supporting organized crime,” said Rob Wainwright, director of Europol.

    ICE dubbed the takedown “Operation In Our Sites, Project Cyber Monday IV,” saying it built on efforts that began in 2010 and continued through subsequent years. The European side of the probe was dubbed Project Transatlantic III.

    ICE is a division of the U.S. Department of Homeland Security. Working with ICE on the U.S. side were Homeland Security Investigations (HSI), the U.S. Department of Justice and the National Intellectual Property Rights Coordination Center (IPR Center) in Washington, D.C.

    HSI conducted undercover operations as part of the effort, ICE said.

    “This is the fourth year that the IPR Center has targeted websites selling counterfeit products online in conjunction with Cyber Monday,” ICE said. “Due to the global nature of Internet crime, the IPR Center partnered with Europol who, through its member countries, seized 393 foreign-based top-level domains as part of Project Transatlantic III. Additionally, Hong Kong Customs coordinated the seizure of 16 foreign-based top-level domains hosted in Hong Kong, enlisting the assistance of the web-hosting companies to suspend the service of related websites.”

    “During this operation, federal law enforcement officers made undercover purchases of a host of products including professional sports jerseys and equipment, DVD sets and a variety of clothing, jewelry and luxury goods from online retailers who were suspected of selling counterfeit products,” ICE said. “Upon confirmation by the trademark or copyright holders that the purchased products were counterfeit or otherwise illegal, law enforcement officers obtained seizure orders for the domain names of the websites that sold these goods.”

  • Conflicting Reports Over Status Of U.S. Payza Funds: Frozen? Withheld By Vendor? Seized By Department Of Homeland Security?

    This claim appears today on a website styled obopayusa.com. Precisely when it began to appear is unclear.
    This claim appears today on a website styled obopayusa.com. Precisely when it began to appear is unclear.

    With Cyber Monday and the traditional online sales coming up a few days from now on Dec. 2, this is what we know: Payza, the successor brand to Montreal-based AlertPay, a Ponzi-forum darling and chronic HYIP- and fraud-enabler, suddenly says this in a headline on its Community forum: “US Funds Frozen | Obopay/Ultralight FS. issue.”

    The announcement is dated yesterday, Thanksgiving Eve in the United States.

    Today is Thanksgiving Day. U.S. government offices are closed. Black Friday, another day of brisk U.S. sales activity in which retailers cater to door-busting holiday shoppers, is tomorrow.

    We also know that the U.S. government has established a tradition of taking down counterfeiting and piracy scams and their enabling websites on Cyber Monday. Moreover, we know that U.S. Immigration and Customs Enforcement (ICE), a division of the U.S. Department of Homeland Security, issued an alert two days ago that it is working with partners and “will be conducting increased operations during the holiday season targeting the importation and distribution of counterfeit and pirated products.”

    Beyond that, we know that the United States — the U.S. Secret Service, ICE and other agencies — took down the Liberty Reserve payment processor over the 2013 Memorial Day holiday period and the U.S. Department of the Treasury identified Liberty Reserve as a “Financial Institution of Primary Money Laundering Concern.” The bust was announced on May 28, the day after Memorial Day.

    Backing up a year, we also know that the AlertPay-enabled Zeek Rewards venture that allegedly conducted a $600 million Ponzi- and pyramid fraud while auctioning sums of U.S. cash and telling successful bidders they could use AlertPay and another offshore processor (SolidTrustPay) to collect it, curiously announced on Memorial Day 2012 (May 28) that checks it issued from two U.S. banks had to be cashed by June 1 or they would bounce.

    Backing up a few years, we also know that AlertPay and SolidTrustPay enabled the $119 million AdSurfDaily Ponzi scheme and the $70 million Pathway To Prosperity fraud scheme — to name just two of many.

    Meanwhile, we know that the court-appointed receiver in the Zeek case is going after money allegedly tied to Payza and SolidTrustPay. The most recent affirmation of this occurred on Nov. 14, when the receiver advised a federal judge that his efforts to gather $10 million from Payza “persisted” and that “new information has come in” that affects his analysis of Zeek-related Payza funds. Whether the $10 million sum would go up or down based on the new information was not revealed in the filing.

    Analysis of “transactional data from Payza is not yet complete,” the receiver advised the judge. He also noted that the Payza funds were held in a “foreign bank account” in an undisclosed country.  Based on its research, the PP Blog believes the country is in Eastern Europe.

    We also know that AlertPay effectively became Payza in May 2012, even as Zeek was conducting auctions for U.S. currency and experiencing trouble with U.S. banks. Payza operates through a New York entity known as MH Pillars Inc., which in May 2012 announced the “recent acquisition of AlertPay’s existing online payment platform.” Payza also is associated with a U.K. entity known as MH Pillars Ltd. of London.

    Thanksgiving Confusion

    Although Payza’s headline uses the word “Frozen,” the text below it does not identify the party that purportedly froze the funds. At the same time, the text appears to be at least slightly at odds with the headline claim that the money was “Frozen.” Indeed, the text describes the funds as “withheld.”

    Although the word choices may or may not be important, one thing seems obvious: Either word is apt to be unsettling to Payza’s U.S. customers who want their money.

    “As you may or may not already know, we are unable to complete any requests to withdraw or transfer funds for a part of our U.S. members at this time, since they are being withheld [emphasis added by PP Blog] by Ultralight Financial Services (formerly known as Obopay Inc.) a licensed U.S. money transmitter of which Payza was an agent,” the announcement begins.

    “We have tried to resolve this problem by contacting their management, their legal team and State regulators,” the announcement continues. “Their management and legal team were unresponsive. However, State regulators are willing to help us, but they have told us that they will not intervene unless they hear from you, the owner of your funds.

    “In this case, Payza is asking all affected members to demand action from both Ultralight FS and your State regulator . . .”

    At the time of this PP Blog post, the full Nov. 27 announcement is available at the Payza Community Forum. [See Update at bottom of this PP Blog post.]

    These Thanksgiving Eve claims by Payza are at odds with other claims online.
    These Thanksgiving Eve claims by Payza are at odds with other claims online.

    In short, Payza seems to be saying that Ultralight/Obopay Inc. is responsible for its inability to serve U.S. customers because the entities either froze or withheld the money.

    But here is where the information diverges and becomes even more fractious: At least two websites that state they’re associated with Obopay claim that “[t]he US Department of Homeland Security has seized all MH Pillars dba Payza money on deposit with UltraLight FS.” Both of these sites are cheesy in appearance. Both also have have copyright notices: One, styled obopayusa.com, says “Content copyright 2013. Obopay, Inc. All rights reserved.” The other, styled ultralightfs.com, says “Copyright @ UltraLight Financial Services. All rights reserved.”

    Neither site says when the money purportedly was seized. Nor does either site say how much was seized.

    So, the apparent obopay and UltraLight entities are saying the money was seized by the U.S. Feds. Payza is saying it was “frozen” or “withheld” by obopay/ultralight.

    What’s the truth? Well, it’s unclear at this time.

    There’s also a website styled obopay.com that appears to have the same logo as obopayusa.com. The obopay.com site asserts an association with Obopay Mobile Technology India Pvt. Ltd. of Bangalore and says its partners include Societe Generale, Essar Telecom Kenya Limited and Union Bank of India.

    The obopay.com site appears to make no reference to Payza or MH Pillars, but does reference Obopay Inc. of Redwood City, Calif., as its parent company. When the PP Blog clicked on a “State License” tab at the bottom of the obopay.com site, however, it received this error message: “An error occurred during a connection to www.obopay.com. Peer’s Certificate has been revoked. (Error code: sec_error_revoked_certificate).”

    So, another layer of the curious.

    Searching the database of the Financial Crimes Enforcement Network (FinCEN), the PP Blog located a document that suggests Obopay Inc. of Redwood City, Calif., is a registered Money Services Business in all 50 U.S. states, plus the District of Columbia. FinCEN is an arm of the U.S. Treasury Department. Its stated mission is “to safeguard the financial system from illicit use and combat money laundering and promote national security through the collection, analysis, and dissemination of financial intelligence and strategic use of financial authorities.”

    Information on MH Pillars Inc. of New York also appears in the FinCEN database. The information suggests the firm is a registered Money Services Business in at least 48 of the the 50 U.S. states. (California and New Hampshire appear to be possible exceptions.) MH Pillars also appears to be registered in venues such as American Samoa, the Federated States Of Micronesia, the Marshall Islands, the Northern Mariana Islands, Palau and the U.S. Virgin Islands.

    It seems clear that both Obopay Inc. and MH Pillars Inc. are registered MSBs. Why, then, can’t U.S. Payza customers get their cash? Could it be because UltraLight isn’t registered? The FinCEN database appears to have no information on UltraLight.

    But a Florida Department of State database does, and that information suggests Obopay Inc. is changing its name to ULTRALIGHT FS Inc. The Florida document is date-stamped Oct. 15, 2013. A phone number listed in the document comports with a phone number in Louisiana and Mississippi records as the number for Obopay Inc. of Mountain View, Calif.  Like Redwood City, Mountain View is a Silicon Valley community.

    Why FinCEN records show Obopay in Redwood City while state records show the enterprise in Mountain View was not immediately clear.

    What does seem clear is that some or all of Payza’s U.S. customers can’t get their money and that whatever dispute exists between Payza and OboPay/Ultralight is about money that either was frozen/withheld by OboPay/Ultralight or seized by U.S. law enforcement.

    Payza claimed in July 2012 to be cleaning up its act. This claim was made about a month prior to the August 2012 Zeek action by the SEC and an accompanying confirmation from the U.S. Secret Service that it also was investigating Zeek. Whether the Payza claim was just lip service remains to be seen.

    When the United States took down Liberty Reserve, the Secret Service changed Liberty Reserve’s domain nameservers to a “sinkhole” URL at ShadowServer.org. This initially caused Liberty Reserve to go offline. When the domain returned, the logos/badges of the U.S. Department of Justice, the Global Illicit Financial Team,  the Secret Service, the Treasury Department and Homeland Security Investigations were published on the site to let the world know that crime doesn’t pay in the United States.

    Payza’s website loaded quickly this morning, with full Payza branding and services appearing. DNS settings appear not to have been altered, suggesting at least to this point that the domain has not been seized by the United States. Whether the United States intends to seize it now or ever is not known.

    But seizing money is an altogether different matter. One of the ways to choke off HYIP and counterfeit-goods/pirating scams is to stop the fuel supply and to starve them out. If the United States desired to cripple criminal HYIPs and counterfeiting enterprises, it theoretically could attack them by seizing money that had been routed through Payza and the AlertPay predecessor.

    Whether that’s what’s happening here remains unclear. At the same time, it would be catastrophically foolish for an enterprise such as Obopay or UltraLight (or some combination thereof) to attribute a seizure of Payza funds to the U.S. Department of Homeland Security if it were not true. It also would be catastrophically foolish for Payza to claim that Obopay/UltraLight froze or withheld the money from U.S. Payza customers if that were untrue or not the complete truth.

    Seizure of money by the U.S. government requires a court order. Obopay/UltraLight either has or has not received such a court order or notice that one was on the way.

    If the United States has court-worthy evidence that Payza was facilitating online criminal enterprises, then it should become apparent in the coming days. If Obopay/UltraLight played any role, it also should become apparent.

    It could be a very interesting Black Friday or Cyber Monday.

    Update 7:31 p.m. Nov. 28:  The original Payza announcement appears to have been removed this afternoon or this evening and replaced by this considerably shorter one. There’s also a post on the Payza Blog. It is dated today and titled, “Important Update: Limited Services for Certain U.S. States.” Those states are not identified in the Payza Blog post.

  • URGENT >> BULLETIN >> MOVING: Liberty Reserve, Founder, Others Indicted In New York

    breakingnews72URGENT >> BULLETIN >> MOVING: (15TH UPDATE 2:31 P.M. EDT U.S.A.) Liberty Reserve, its founder and several others have been indicted in U.S. District Court for the Southern District of New York (Manhattan).

    The charges, which include conspiracy to commit money-laundering, conspiracy to operate an unlicensed money-transmitting business and operating an unlicensed money-transmitting business, were confirmed this morning by the office of U.S. Attorney Preet Bharara.

    Liberty Reserve founder Arthur Budovsky was using the aliases “Eric Paltz” and “Arthur Belanchuk,” according to the indictment.

    Co-conspirators, according to the indictment, include Vladimir Kats, also known as “Ragnar”; Ahmed Yassine Abdelghani, also known as “Alex”; Allan Esteban Hildago Jimenez, also known as “Allen Garcia”; Azzeddine El Amine; Mark Marmilev, also known as “Marko”; and Maxim Chukharev.

    Marmilev also is known as “Mark Halls,” according to an affidavit that accompanies the indictment.

    Budovsky and El Amine were arrested Friday in Spain, Bharara’s office said today. Kats and Marmilev were arrested Friday in Brooklyn. Chukharev was arrested Friday in Costa Rica. Hildago and Abdelghani are “at large” in Costa Rica.

    “As alleged, the only liberty that Liberty Reserve gave many of its users was the freedom to commit crimes — the coin of its realm was anonymity, and it became a popular hub for fraudsters, hackers, and traffickers,” Bharara said. “The global enforcement action we announce today is an important step towards reining in the ‘Wild West’ of illicit Internet banking. As crime goes increasingly global, the long arm of the law has to get even longer, and in this case, it encircled the earth.”

    Added Steven G. Hughes, special agent in charge of the U.S. Secret Service. “These arrests are an example of the Secret Service’s commitment to investigate and apprehend criminals engaged in the misuse of virtual currencies to conduct global monetary fraud. Cyber criminals should be reminded today that they are unable to hide behind the anonymity of the Internet to avoid regulated financial systems.”

    The IRS and the U.S. Department of Homeland Security (U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations (HSI)) also are involved in the probe, as are multiple nations, Bharara’s office said.

    Liberty Reserve and its co-conspirators “intentionally created, structured, and operated Liberty Reserve as a criminal business venture, one designed to help criminals conduct illegal transactions and launder the proceeds of their crimes,” according to the indictment.

    The United States has seized the Liberty Reserve domain name along with several others, according to an affidavit that accompanies the indictment. The others include: ExchangeZone.com; SwiftExchanger.com; MoneyCentralMarket.com; and Asianagold.com. As part of the seizure process, a federal judge ordered the U.S. Secret Service to point the domain nameservers to a “sinkhole” URL at ShadowServer.org.

    News about the seizures destroys various examples of wishful thinking advanced by online HYIP hucksters at forums such as TalkGold and MoneyMakerGroup since LibertyReserve’s domain went offline Friday. On Saturday, reports surfaced that Budovsky had been arrested in Spain and that Liberty Reserve was under investigation in Costa Rica and the United States.

    Seizure notices are expected to appear on the domains, although the timing was not clear.

    The indictment ties Liberty Reserve to the crimes of “credit card fraud, identity theft, investment fraud, computer hacking, child pornography, and narcotics trafficking.”

    Among other things, the indictment alleges that “virtually all of Liberty Reserve’s business derived from suspected criminal activity” and that the scope of the fraud is “staggering.”

    Between 2006 and May 2013, according to the indictment, Liberty Reserve processed an estimated 55 million transactions and is believed “to have laundered more than $6 billion in criminal proceeds.”

    Supporting affidavits in the case show that the indictment was returned under seal on May 20 and that prosecutors applied for an injunction barring Amazon Web Services Inc. from providing services to Liberty Reserve. The affidavit also shows that the United States is seeking forfeiture of sums on deposit in at least 42 accounts in various countries

    These banks are in countries such as Costa Rica, Cyprus, Russia, Hong Kong, China, Morocco, Spain, Latvia, Australia and the United States. Tens of millions of dollars are being sought in forfeiture actions, although the final sum is unclear.

    Liberty Reserve, according to the indictment, used “exchangers” in countries with little oversight, including Malaysia, Russia, Nigeria and Vietnam. The process was part of a criminal scheme to bury evidence of fraud while providing anonymity for the fraudsters.

    The enterprise, according to the indictment, functioned “in effect as the bank of choice for the criminal underworld.”

    Link to documents posted by Bharara’s office. Read statement by Bharara’s office.

    In a separate but related action, the U.S. Department of the Treasury announced it had identified Liberty Reserve as a “Financial Institution of Primary Money Laundering Concern.”

    “Treasury is determined to protect the U.S. financial system from cyber criminals and other malicious actors in cyberspace, including overseas entities like Liberty Reserve that facilitate online crime and hope to evade regulatory scrutiny,” said Under Secretary for Terrorism and Financial Intelligence David S. Cohen. “We are prepared to target and disrupt illicit financial activity wherever it occurs – domestically, at the far reaches of the globe or across the internet.”

     

     

  • UPDATE: John Chiyuan Lee, Scammer Whose Case Shattered Ponzi-Board Myth, Sentenced To California State Prison And Ordered To Make Restitution

    John Chiyuan Lee

    In fleeing to Thailand, becoming a fugitive listed by INTERPOL and leaving dozens of U.S. victims in his wake when his Ponzi scheme collapsed, John Chiyuan Lee shattered the Ponzi-forum myth that “offshore equals safe.”

    “Safe — for a while while INTERPOL is beaming your picture 24/7 and U.S. authorities at the local, state and national level are on your trail” — might be more accurate

    Los Angeles County Sheriff’s Det. Simeon Plyler tracked Lee to Thailand, and U.S. Immigration and Custom Enforcement (ICE) and the U.S. Marshals Service worked with the sheriff’s office and Thailand’s government to locate and arrest the fugitive.

    He was found last year in Pataya, Thailand. U.S. Marshals brought him back to the United States to face justice.

    Lee, 40 at the time of his arrest, now has accepted responsibility for his crimes and accepted an early plea deal in Los Angeles Superior Court that includes a six-year sentence in California state prison and a restitution order of about $1.5 million, the Sheriff’s Department announced yesterday.

  • ANOTHER MYTH-BUSTING CASE: On The Lam From Greater Los Angeles For 5 Years, Ponzi Fugitive John Chiyuan Lee Arrested In Thailand And Extradited To The United States

    CAPTURED: John Chiyuan Lee. Source: INTERPOL

    One of the enduring myths of the Ponzi boards — “offshore equals safe” — has been shattered again. The Los Angeles County Sheriff’s Department says it got its man — with help from the government of Thailand, the U.S. Marshals Service and U.S. Immigration and Customs Enforcement (ICE).

    Ponzi scheme suspect John Chiyuan Lee became a fugitive in November 2006, when he fled Greater Los Angeles for Thailand after being identified as a thief. Victims emerged from at least four California counties — Los Angeles, Orange, Ventura and Santa Clara — and at least one victim resided in St. George, Utah, authorities said.

    INTERPOL published a “Wanted” notice on Lee, according to records.

    The case was assigned to Los Angeles Sheriff’s Det. Simeon Plyler, who discovered at least 29 victims and used passport records and worked with ICE to track Lee to Thailand.

    “ICE agents enlisted the assistance of Thailand authorities who were able to locate and arrest him in Pataya, Thailand, on October 4, 2011,” the Sheriff’s Department said. “Deputies with the U.S. Marshals Service assisted in the case by transporting Lee back to the United States from Thailand to face criminal charges.”

    Lee, 40, was arrested at Los Angeles International Airport and taken to the Los Angeles County Jail. Bail was set at $1.869 million, according to jail records. He remains jailed.

    Victims’ losses ranged from $3,000 to $425,000, authorities said.

    Residents of California communities such as Culver City, Hancock Park, Hollywood, Hollywood Hills, Huntington Beach, Lakewood, Los Angeles, Marina del Rey, Morgan Hill, San Pedro, Shadow Hills, Sherman Oaks, Studio City, Thousand Oaks, Valley Village, Van Nuys, Ventura, West Hollywood, West Los Angeles and Westwood were among the victims, authorities said.

    Patch.com is reporting that Lee was a trainer at a Culver City gym — and all of his victims worked out at the facility.

  • URGENT >> BULLETIN >> MOVING: Paranoia-Maker: FBI Undercover Sting In Florida Leads To Criminal, Civil Charges Against 5 In Alleged Penny-Stock Capers; Agents Established ‘Phony’ Consulting Company

    URGENT >> BULLETIN >> MOVING: An undercover sting by the FBI in Florida has led to criminal and civil charges against five alleged penny-stock fraudsters in Florida, Texas, Nevada and California.

    The sting featured a phony “consulting” company created by the FBI, authorities said. News about the make-believe consultancy followed on the heels of news last month that U.S. investigators had created a “payment processor” as part of a different probe into illegal gambling.

    Charged criminally in today’s undercover cases were Brian Gibson, 63, of Coconut Creek, Fla; Donald W. Klein, 40, of Frisco, Texas; Douglas Newton, 66, of Rancho Mirage, Calif; Charles Fuentes, 66, of Dana Point, Calif; and Thomas Schroepfer, 54, of Las Vegas. Schroepfer also is known as Thomas Schroepfer Baetsen.

    The men and several companies also were charged civilly by the SEC in what the agency described as a coordinated law-enforcement assault against microcap hucksters.

    “Investors deserve better than secret investment strategies based on kickbacks and bribes,” said Robert Khuzami, director of the SEC’s Division of Enforcement.

    The Miami region’s top federal prosecutor, meanwhile, said the cases evolved from the Southern District of Florida’s ongoing Securities and Investment Fraud Initiative, a task force aimed at criminals and fraudsters operating in the region.

    “The defendants charged today abused their knowledge of the capital markets hoping to misappropriate money held in pension fund and brokerage accounts to enrich themselves and their co-conspirators,” said Wifredo A. Ferrer.

    Undercover FBI agents posed as scammers and set up a phony “consulting” business as part of the probe, the SEC said.

    “The defendants charged today were intent on making profits for themselves while defrauding others,” said Eric I. Bustillo, director of the SEC’s Miami Regional Office.

    Newton, the SEC said, was chief executive officer of Real American Brands Inc., now known as Real American Capital Corp. He was accused of paying kickbacks to a “purported employee pension fund trustee” to buy more than 6.2 million shares of restricted Real American Brands stock.

    He further was accused of trying to conceal the kickbacks through a “consulting” firm.

    However, the trustee Newton believed to be corrupt actually was “a fictitious person,” the SEC said. Meanwhile, “the trustee’s business associate who helped arrange the deal was an undercover FBI agent,” and the consulting company was a “phony” one created by the FBI, the SEC added.

    Klein was the president and chief executive officer of KCM Holdings Corp. He is accused of engaging in two restricted stock transactions and one market transaction involving KCM Holdings’ stock.

    “Klein and the company paid kickbacks to an undercover FBI agent who portrayed himself as a business associate of a corrupt trustee of an employee pension fund, in exchange for the fund’s purchase of 2.5 million shares of restricted KCM Holdings stock,” the SEC said. “Klein attempted to conceal the kickbacks through a consulting agreement with a phony company that would receive the kickbacks. In another scheme, Klein bribed a purported corrupt stockbroker (actually an undercover FBI agent) to purchase KCM Holdings stock in the open market for brokerage clients with discretionary accounts.”

    Thomas Schroepfer was president and president of of SmokeFree Innotec Inc. He, too, got caught in the sting, the SEC said.

    For his part, Fuentes was a promoter of SmokeFree’s stock, and “paid kickbacks to an undercover FBI agent, posing as the business associate of a corrupt employee pension fund trustee, in exchange for the fund’s purchase of 400,000 shares of restricted SmokeFree stock,” the SEC said.

    Schroepfer, the SEC said, “attempted to conceal the kickbacks through a consulting agreement with a phony company created to receive the kickbacks.

    “In addition, SmokeFree issued shares of its stock to a cooperating witness for acting as a middleman in the scheme,” the SEC said.

    Gibson “created a now-defunct website, Roaringpennystocks.com, to promote shares of Xtreme Motorsports International Inc., as part of a planned pump-and-dump scheme,” the SEC charged.

    He is accused of touting Xtreme Motorsports “by blasting a series of e-mails to potential investors” and posting “false testimonials on the site from purported investors raving about their success in following the website’s stock picks,” the SEC said.

    In a separate case in Maryland last month, prosecutors announced that federal agents had created a “payment processor” to infiltrate illegal gambling operations.

    The name of the Feds’ “payment processor” was Linwood Payment Solutions — and its website now serves this message:

    “Linwood Payment Solutions is a Department of Homeland Security Undercover Business set up to identify and prosecute companies accepting and paying out funds for U.S. customers who gamble online illegally.”

    In response to a white-collar fraud epidemic involving huge sums of money and fraudsters and criminals operating both domestically and internationally, U.S. agencies, including the Secret Service, ICE and others, have been employing techniques once largely reserved for organized-crime probes.

  • FLORIDA — AGAIN: Postal Inspectors Say Recidivist Felon With 24 Bank Accounts And Undisclosed Criminal History Bilked Investors In $20 Million Scam; James Risher Arrested Before He Could Take Flight To Bermuda

    A recidivist securities felon tied to at least 24 bank accounts had an airline ticket for Bermuda last week but was arrested in Florida  before he could get offshore after scamming investors in a long-running fraud scheme that had gathered $20 million, according to law-enforcement officials.

    Charged in a criminal complaint by the U.S. Postal Inspection Service was James D. Risher, who is associated with firms identified as Jade Asset Group LLC, Managed Capital LLC and Safe Harbor Investments. Risher is accused of mail fraud, wire fraud, money-laundering and conspiracy.

    Risher, 61, of Sanibel, Fla., was released from federal prison on Aug. 14. 2004, according to records. His imprisonment stemmed from 1997 convictions for mail fraud, securities fraud and money-laundering for which he was sentenced to 92 months, with three years’ supervised probation after his release.

    He also has state-level convictions in Georgia from a securities swindle in the early 1990s, according to records.

    The new charges against Risher suggest he embarked on a new swindle in early 2007, perhaps while still on probation for the swindle that led to his 1997 convictions. The FBI, the IRS, the Florida Department of Law Enforcement and the Florida Office of Financial Regulation are assisting postal inspectors in the new probe, which is ongoing.

    One of the keys to Risher’s arrest was a notification that law enforcement received from U.S. Immigration and Customs Enforcement (ICE) that Risher had a plane ticket to fly from North Carolina to Bermuda last week, according to court documents.

    Risher, according to the investigating postal inspector, had been placed on an ICE watch list during the probe and was being monitored for “scheduled travel outside of the country.”

    The investigating postal inspector advised a federal magistrate judge that Risher was a flight risk and may have a bank account in Bermuda, which is located in the Atlantic Ocean about 640 miles from North Carolina. ICE is part of the U.S. Department of Homeland Security.

    Risher had reason to believe  investigators were closing in, according to the postal inspector’s affidavit.

    Fleeced investors were demanding their money, according to the affidavit. Meanwhile, at least two Florida law firms were investigating claims against Risher on behalf of about 150 investors, according to other records.