Tag: Joint Terrorism Task Force

  • SOBERING: Cyber Criminals May Be Responsible For ‘The Greatest Transfer Of Wealth In History,’ Top Justice Department Official Says At Seattle Conference

    “The Intelligence Community’s most recent Worldwide Threat Assessment confirms that U.S. networks have already been subject to ‘extensive illicit intrusions.’ The head of the National Security Agency and the Pentagon’s Cyber Command, for one, believes such intrusions may have resulted in ‘the greatest transfer of wealth in history.’”Lisa Monaco, Assistant Attorney General for National Security, Oct. 25, 2012

    EDITOR’S NOTE: These are remarks prepared for delivery by Lisa Monaco, Assistant Attorney General for National Security, at the “2012 Cybercrime Conference” today in Seattle. Monaco presides over the Justice Department’s National Security Division.

    The conference was hosted by U.S. Attorney Jenny A. Durkan of the Western District of Washington. Durkan’s name may be familiar to longtime PP Blog readers because her office is involved in the prosecution of AdSurfDaily story figure Kenneth Wayne Leaming, a purported “sovereign citizen” charged with filing false liens against five public officials who had roles in the ASD Ponzi prosecution. ASD was a Florida-based online scam that created thousands of victims. Leaming also is accused of uttering a bogus “bonded promissory note” for $1 million and passing it at U.S. Bank, harboring fugitives implicated in a separate fraud scheme and being a felon in possession of firearms.

    ** ______________________________________________ **

    Good afternoon.   Thank you for having me here today.   I am grateful to the U.S. Attorney’s Office for the Western District of Washington and to U.S. Attorney Jenny A. Durkan, for organizing a conference on this important topic.   Thank you all for taking the time out of your schedules to discuss these issues.   Events like these are critical to helping us succeed in combating cyber threats.

    The Threat

    If there is one thing we all know from the presentations today and our work in the field, it is the seriousness of the cyber threat.   The President has called it “one of the most serious economic and national security challenges we face as a nation.”   It’s hard to quibble with that.   Hardly a day goes by when cyber events don’t show up in the news.   As many of you know, over the last several weeks, financial institutions in the United States have been hit by a series of Distributed Denial of Service (or DDOS) attacks.   Such attacks are relatively easy to carry out, but they can cause serious harm by disrupting companies’ website services and preventing customer access.   Although these disruptions have been temporary, their frequency and persistence underscores recent Intelligence Community warnings about the “breadth and sophistication of computer network operations . . . by both state and nonstate actors.”   The cyber alarm bell has been rung.   The Intelligence Community’s most recent Worldwide Threat Assessment confirms that U.S. networks have already been subject to “extensive illicit intrusions.”   The head of the National Security Agency and the Pentagon’s Cyber Command, for one, believes such intrusions may have resulted in “the greatest transfer of wealth in history.”

    We often think of national security threats, like that of a catastrophic terrorist attack, as questions about prevention.   But the cyber threat is not simply looming – it is here.   It is present and growing.   Although we have not yet experienced a devastating cyber attack along the lines of the “cyber Pearl Harbor” that Defense Secretary Panetta recently mentioned – we are already facing the threat of a death by a thousand cuts.   Outside the public eye, a slow hemorrhaging is occurring; a range of cyber activities is incrementally diminishing our security and siphoning off valuable economic assets.   This present-day reality makes the threat of cyber-generated physical attacks, like those that might disrupt the power grid, appear no longer to be the stuff of science fiction.   And all of this comes against the backdrop of sobering forecasts from the highest ranks of our national security community.   FBI Director Mueller – a man not prone to overstatement – predicts that “the cyber threat will pose the number one threat to our country” in “the not too distant future.”

    Despite all we know about intrusions against U.S. businesses and government agencies, what is more sobering still is the Intelligence Community’s assessment that “many intrusions . . . are not being detected.”   Even with respect to those that are detected, identifying who is behind cyber activity can be uniquely challenging.   Technologies can obscure perpetrators’ identities, wiping away digital footprints or leaving investigative trails that are as long as the web is wide.   Cyber intrusions don’t announce themselves or their purpose at the threshold.   Depending on the circumstances, the purpose or endgame of a particular intrusion may be anyone’s guess – is it espionage?   Mere mischief?   Theft?   An act of war?

    The threats are as varied as the actors who carry them out.   A growing number of sophisticated state actors have both the desire and the capability to steal sensitive data, trade secrets, and intellectual property for military and competitive advantage.   While most of the state-sponsored intrusions we are aware of remain classified, the onslaught of network intrusions believed to be state-sponsored is widely reported in the media.   We know the Intelligence Community has noted that China and Russia are state actors of “particular concern,” and that “entities within these countries are responsible for extensive illicit intrusions into US computer networks and theft of US intellectual property.”   Indeed, “Chinese actors are,” according to a public report of our top counterintelligence officials, “the world’s most active and persistent perpetrators of economic espionage.”   And we know that Secretary of Defense Panetta has stated that “Iran has also undertaken a concerted effort to use cyberspace to its advantage.”

    In cases involving state actors and others, trusted insiders pose particular risks.   Those inside U.S. corporations and agencies may exploit their access to funnel information to foreign nation states.   In these cases, perimeter defense isn’t worth much; the enemy is already inside the gates.   The Justice Department has prosecuted a number of corporate insiders and others who obtained trade secrets or technical data from major U.S. companies and routed them to other nations via cyberspace.

    Earlier this year, in the first indictment of foreign state-owned entities for economic espionage, several companies controlled by the government of China were charged in San Francisco for their alleged roles in stealing a proprietary chemical compound developed by a U.S. company for China’s benefit.   While this particular theft was not cyber-enabled, cyberspace makes economic espionage that much easier.   In an Internet age, it is no longer necessary to sneak goods out of the country in a suitcase; a single click of a mouse can transmit volumes of data overseas.   Indeed, the Department has secured convictions of individuals who stole corporate trade secrets by simply e-mailing them overseas.   In one recent case, a chemist downloaded a breakthrough chemical process just developed by his company in the United States and e-mailed it to a university in China where he had secretly accepted a new job.

    The other major national security threat in cyberspace is cyber-enabled terrorism.   Although we have not yet encountered terrorist organizations using the Internet to launch a full-scale cyber attack against the United States, we believe it is a question of when, not if, they will attempt to do so.   Individuals affiliated with or sympathetic to terrorist organizations are seeking such capabilities. We have already seen terrorists exhorting their followers to engage in cyber attacks on America.   Just this year, an al-Qaeda video released publicly by the Senate Homeland Security Committee encouraged al-Qaeda followers to engage in “electronic jihad” by carrying out cyber attacks against the West.

    Terrorists have already begun using cyberspace to facilitate bomb plots and other operations.   These activities go beyond the use of cyberspace to spread propaganda and recruit followers.   For example, the individuals who planned the attempted Times Square bombing in May 2010 used public web cameras for reconnaissance, file sharing sites to share operational details, and remote conferencing software to communicate.   Najibullah Zazi attempted to carry out suicide bomb attacks against the New York subways around the anniversary of 9/11 three years ago.   After returning to the United States from terrorist travel, he used the Internet to access the bomb-making instructions he had received in Pakistan and tried to communicate via the Internet in code with his al-Qaeda handlers in Pakistan just prior to the planned attack.   Khalid Aldawsari, who was convicted in June of this year in the Northern District of Texas, used the Internet extensively to research U.S. targets and to purchase chemicals and other bomb-making materials.

    Evolving To Meet the Threat — Learning from the Counterterrorism Model

    The threats we face in cyberspace are changing, and we must change with them.   Of course, we have faced similar challenges before.   After the devastating attacks eleven years ago, we learned some hard lessons.   We have since put those lessons into practice:   working across agencies to share information, and bringing down legal, structural, and cultural barriers.   Law enforcement’s approach to terrorism has become intelligence-led and threat-driven.   We have erected new structures, including the National Security Division, which I am privileged to lead.   As the first new litigating division at the Justice Department in nearly fifty years, the National Security Division was created to bring together intelligence lawyers and operators on the one hand, and prosecutors and law enforcement agents on the other, to focus all talent on the threats before us.

    Since September 11, we have made great progress against terrorism by developing effective partnerships that help us identify threats and choose the best tools available to disrupt them.   Much of our success is attributable to the all-hands-on-deck approach we have adopted for countering terrorism.   From where I sit, I can see this change reflected in our day-to-day operations.   In our investigations, for instance, we actively seek to preserve the ability to prosecute even while using intelligence tools and vice versa.   We must bring the same approach, a whole-of-government approach, an all-tools approach, to combat cyber threats to our national security.   Investigations and prosecutions will be critical tools for deterrence and disruption, ones that we have a responsibility to use.   But they are not the only options available.   The diversity of cyber threats and cyber threat actors demands a diverse response.   This nation has many tools – intelligence, law enforcement, military, diplomatic, and economic – at its collective disposal as well as deep, and diverse, expertise.   The trick is in harnessing our collective resources to work effectively together.

    Those of us charged with investigating and disrupting cyber threats to national security and advising operators and agents must be creative and forward-looking in our approach.   First, we must consider – in conjunction with our partners – what cyber threats will look like in the coming years.   Only by knowing what is on the horizon can we ensure that the right tools exist to address cyber threats before they materialize.   Second, we must be vigilant to prevent the formation of what the WMD Commission after 9/11 called “legal myths” that have led to “uncertainty” in the past “about real legal prohibitions” among operators.   And, together with operators, we must consider what kinds of tools, investigations, and outreach we can launch now to lay the groundwork for future cyber efforts.   These may be relatively simple things, like standardized protocols and established points of contact to make reporting intrusions easier. Or they may take the form of institutional relationships between the government and the private sector for sharing information.

    On an operational level, both public and private sector attorneys need to be able to tell clients what options they have available to deal with cyber threats.   If cyberspace is an “information super-highway,” then lawyers are the GPS system in a client’s car:   It is our job to tell the client how to get there.   When obstacles get in the way, we should tell the client how to avoid them.   We must look ahead, anticipate jams, and route clients around them.

    This metaphor is particularly applicable in the cyber realm.   As cyber events unfold in real time, we learn more about our adversary, the means available to him or her, and the vulnerabilities in our own systems.   Our advice must adapt accordingly.   For those of us in government who act as operational lawyers, it is important in this environment to be clear about where the legal debate stops and the policy debate begins.   For those of you in the private sector, I imagine one concern is that your clients not be left vulnerable in a shifting legal landscape.   And for those of you in academia, we need your help testing boundaries and pushing forward with questions that need to be asked and answered by all of us as we navigate this legal space together.

    One of the significant operational challenges we face is the same one the Intelligence Community confronted in reorganizing itself after the attacks of September 11.   The cyber threat demands ready and fluid means of sharing information and coordinating our actions.   At the National Security Division, we have made this evolution, and combating this threat, a top priority.   Working with our partners – including the FBI, the U.S. Attorney community, and the Computer Crime and Intellectual Property Section (one of their leaders, Richard Downing is here today) – we are ensuring that all resources are brought to bear against national security cyber threats.

    To help accomplish these goals, the National Security Division established earlier this year a National Security Cyber Specialists’ Network to serve as a one-stop shop in the Justice Department for national security-related cyber matters.   The network brings together experts from across the National Security Division and the Criminal Division and serves as a centralized resource for the private sector, prosecutors, and agents around the country when they learn of national security-related computer intrusions.   Each U.S. Attorney’s office around the country has designated a point of contact for the network.   These skilled Assistant U.S. Attorneys will act as force multipliers, broadening the network’s reach and ensuring a link back to their counterparts at headquarters.   Drawing upon the Joint Terrorism Task Force model, which has been successful in the terrorism realm, the network seeks to improve the flow of national security cyber information to offices throughout the country.   This means more information, earlier on, in national security cyber incidents.   Thanks to the contribution of other parts of the Department, especially CCIPS, the FBI, and the U.S. Attorney’s offices, the network has helped us to focus nationwide on bringing more national security cyber investigations.   Through this nationwide network, we are consolidating and deepening the Department’s expertise, institutionalizing information sharing, ensuring coordination, and pursuing investigations.

    We have also trained our attention on the diverse cyber capabilities that reside throughout the government.   The U.S. Secret Service, the Department of Commerce, and the Department of Defense, not to mention the FBI, are all common partners in this fight, each using their distinct tools to achieve a common goal.   We have enhanced our joint work with the FBI’s National Cyber Investigative Joint Task Force, where we now have a dedicated National Security Division liaison.

    Within DOJ, we are putting more prosecutors against the threat and focusing on how to best equip and educate our cyber cadre.   Through the National Security Cyber Specialists’ Network, we are training prosecutors around the country.   Next month, more than 100 prosecutors will gather in Washington, D.C. to share expertise on everything from digital evidence to the Foreign Intelligence Surveillance Act.   No matter who the perpetrator is, being an effective adviser today requires an understanding of the technologies at hand.   Perhaps we should all take a page from Estonia—where I understand they’re beginning a system of teaching first graders how to program!   As courts confront these technologies, we also have a role in helping them grapple with what these changes mean for the development of the law and interpretations of existing legal authorities.

    Partnership with the Private Sector

    Of course, the need for collaboration does not end there.   While interaction with the private sector is something that does not always come easily to the national security community, which is accustomed to operating in secrecy, it is absolutely necessary here.   The Intelligence Community has noted the considerable portion of U.S. companies that report they have been the victims of cybersecurity breaches as well as the increased volume of malware on U.S. networks.   Private companies are on the front lines.   Individual defenses, as well as broader efforts to reform – like the legislation proposed by the Administration last year – will require our joint efforts.

    To succeed in these efforts, we must develop a greater understanding of the concerns and pressures under which our private sector partners operate.   A home computer user, whose machine is used in a botnet attack might not have much incentive to remove or check for malware.   But a company targeted by such an attack has considerable incentive to do so.   When dealing with corporate victims, the government must understand the competing interests at play.   Companies may have shareholders, reputational concerns, and sometimes legal limitations.   Yet we cannot fight the current or the future threat with old mindsets on either side.   My colleague, the U.S. Attorney for the Southern District of New York, has spoken compellingly about the need for a “culture of security” and a “culture of disclosure” in industry.   For our part, we need to understand the private sector’s concerns; we need to understand that it is not just the red tape of government that industry fears.   They also fear that the disclosure of computer intrusions will bring yellow tape as well – that it will disrupt business by converting the corporate suite into a crime scene.   Reporting breaches and thefts of information is the first step toward preventing future harm.   For our part, we will work with industry.   We will share information where we can and use protective orders and other tools to protect confidential and proprietary information.

    Conclusion

    How we respond to cyber intrusions and attacks, and how we organize and equip ourselves going forward, will have lasting effects on our government and its relationship with the private sector.   Particularly in these early moments, in what will no doubt be a sustained endeavor, it is incumbent upon us to take notes – to identify impediments, legal questions, technical challenges, and address them together.   All the while we must bear in mind the great potential of these technologies and the importance of not stifling them as we find better ways to make them secure.

    We have heard the warnings about the potential for a cyber 9/11, but we are, for the moment, in a position to do something to prevent it.   The cyber threat poses the next test of the imperative that we see law enforcement and national security as joint endeavors.   Our work offers an opportunity to demonstrate the strength and adaptability of the lessons we have learned over the last eleven years in the fight against terrorism.   U.S. Attorney’s Offices – and all of you sitting in this room – are at the forefront of these issues.   I look forward to pursuing the threats we face in partnership.   Thank you for being with us today.

  • Reputed Colorado ‘Sovereign Citizen’ Matthew O’Neill Pleads Guilty To Providing False Information After Mailing White Powder To State Department Of Revenue; Envelope Triggered Terrorism Scare And Evacuation Of Employees From Government Building

    On May 17, 2011, Matthew “Matt” O’Neill, 52, entered a post office in Kremmling, Colo., and “filled out documents for certified or registered mail,” federal prosecutors said.

    O’Neill, though, did not immediately put his envelope in the mail. Instead, he left the post office and “reentered several times before finally mailing” it, prosecutors said.

    By May 25, a mail-room employee of the Colorado Department of Revenue had begun the typical process of opening the envelope, stapling the documents inside and routing it to the intended recipient, prosecutors said.

    After placing the envelope on her desk, the recipient observed “white powder” falling out onto her work space. She then took the contents to another office, informed a colleague about the suspicious substance — and the two employees placed the contents on the desk, left the office and locked the door.

    They next informed the Revenue Department floor manager, who immediately dialed 9/11 and contacted the Colorado State Patrol. Fearing they’d been exposed to a biological or chemical substance, the two employees tried to decontaminate themselves by washing their hands, prosecutors said.

    More moments of high anxiety followed as the employees waited for the Denver Fire Department and the HAZMAT team to arrive. Practically every adult in America understands the horror caused when powdered substances spill out of envelopes. In September 2011 — about a week after the 9/11 terrorist attacks — the anthrax attacks began through the mail.

    Five people died. Seventeen became infected. One of the largest investigations in U.S. history began.

    When the fire department and HAZMAT team arrived at the Revenue Department, first responders — necessarily expecting the worst — took precautions with clothing and equipment and entered the building. An evacuation of people ensued.

    It was not the first time the Revenue Department had heard from Matthew O’Neill.

    As the probe continued, investigators learned that O’Neill had “sent several documents that express his views as a sovereign citizen, and that he believes that he does not have to pay state or federal taxes.”

    O’Neill pleaded guilty this week to providing false information related to a terrorism offense for his mailing of the white powder, which proved to be baking soda but nevertheless caused fear to spread and left employees wondering if they’d lose their limbs or perhaps even their lives.

    “Those who mail a threat, especially one containing material simulating a biological or chemical agent, will face felony criminal consequences,” said U.S. Attorney John Walsh.

    “All threatening communications are taken seriously, the recipient of these types of threats cannot determine the true nature of the implied, or stated danger,” said James Yacone, special agent in charge of the FBI’s Denver office. “The FBI wants to remind everyone that mailing a threatening communication that contains a hoax of any kind in a parcel will be aggressively investigated.  We will continue to respond to such threats, along with our federal, state, and local law enforcement partners, through the combined resources of the Joint Terrorism Task Force.”

    Whether the power was harmful was not the issue, said the region’s top postal inspector.

    Threatening mailings “not only constitute a federal crime, but cause alarm to victims and victim institutions,” said Tommy Coke, acting postal inspector in charge of the Denver Division of the U.S. Postal Inspection Service.

    Sentencing for O’Neill before U.S. District Judge Marcia S. Krieger is set for June 4. He potentially faces up to five years in federal prison and a fine of up to $250,000.

    Some “sovereign citizens” have attempted to use the mail to instill fear among judges, prosecutors, investigators, litigation opponents, community officials and taxing authorities.

  • ANOTHER FALSE LIENS CASE: Man Who Asserted ‘Diplomatic Immunity’ Claimed Utah Officials Owed Him $53 TRILLION, Feds Say; Harvey Douglas Goff Charged In 14-Count Indictment After Probe By Joint Terrorism Task Force, IRS

    Harvey Douglas Goff. SOURCE: Weber County (Utah) Sheriff's Office.

    EDITOR’S NOTE: Longtime readers will recall that some members of Florida-based AdSurfDaily engaged in a hectoring campaign against public officials after the U.S. Secret Service seized tens of millions of dollars in the ASD Ponzi case in August 2008. Such actions can lead to serious criminal consequences, as the story below illustrates.

    It has happened again — this time in Utah, this time involving claims for the spectacular sum of more than $53 TRILLION.

    Harvey Douglas Goff, 53, of Ogden, was indicted last month on charges he placed fraudulent liens against Utah public officials after asserting “diplomatic immunity” during a traffic stop last year.

    Goff filed bogus liens against 77 parcels in Weber County “[i]n an apparent effort to create an appearance of indebtedness” to him on the part of officials representing the state of Utah, Weber County, Ogden City and the Ogden Police Department, federal prosecutors said.

    He has been charged in a 14-count indictment with obstruction of justice, impeding internal revenue laws, filing fictitious obligations, attempted mail fraud and using the mail in furtherance of a scheme and artifice to defraud.

    In November 2010, prosecutors said, Goff “mailed” documents styled “Notice of International Commercial Claim Within the Admiralty ab initio Administrative Remedy of Harvey Douglas Goff, Jr., Creditor Secured Party,” prosecutors said. “The documents claimed the agencies contracted to pay more than $53 trillion in damages to Goff. The documents purported to be part of a ‘self-help administrative process’ and asserted that the recipients had 10 days to respond before a ‘default’ resulted.”

    The case in part traces its roots to encounters Goff had with law enforcement during traffic stops, including one in which he asserted “diplomatic immunity,” prosecutors said, charging that Goff also impeded tax laws and filed “false and frivolous documents” involving a judge in an IRS case.

    Goff challenged the jurisdiction of a state-court judge in pro se pleadings, but the court denied his arguments. When Goff failed to appear for a pretrial conference in December 2010, a bench warrant was issued, prosecutors said.

    After Goff was arrested on May 12, he refused to stand before U.S. Magistrate Judge Judge Samuel Alba, which led to an “intervention” by the U.S. Marshals Service, prosecutors said.

    Among other things, Goff refused the appointment of counsel, would not state his name or acknowledge his identity and “claimed he had been kidnapped from his home even though the Court made findings in his presence that federal agents had served a duly authorized search warrant,” prosecutors said.

    Goff was ordered to undergo a mental-health examination, prosecutors said. He potentially faces decades in prison if convicted on all counts.

    The two “fictitious obligation” counts alone carry penalties of up to 25 years in prison, prosecutors said.

    An investigation by the FBI’s Joint Terrorism Task Force and the IRS continues, prosecutors said.

  • UPDATE: Prosecutor Lauds FBI Terrorism Task Force In Case That Linked Serial HYIP Promoter To Scheme Operated By Man Convicted Of Financing Terrorism

    EDITOR’S NOTE: In an earlier post, we briefly touched on Ponzi peddler Brian David Anderson and his tie to an HYIP operated by a man convicted of financing terror. Federal prosecutors now have released a formal statement on Anderson’s guilty plea in a related Ponzi scheme — and the statement thanked the FBI’s Joint Terrorism Task Force for its work in the case.

    Here, now, the story . . .

    Critics long have fretted about the often-murky world of brick-and-mortar and electronic HYIPs and autosurfs, pointing out that no one really knows the motivations of the operators and their pitchman and that vast sums of money easily could fall into the hands of terrorists.

    Now federal prosecutors have lauded the FBI’s Joint Terrorism Task Force for its work in the successful prosecution of Canadian citizen Brian David Anderson, whom investigators linked to an international HYIP known as Flat Electronic Data Interchange (FEDI).

    Anderson was identified in legal filings as a FEDI pitchman, claiming FEDI was a commodities exchange and that he was selling “seats.”

    FEDI actually was a fraudulent loan-investment scheme operated as an HYIP by Abdul Tawala Ibn Ali Alishtari, also known as “Michael Mixon.” Alishtari, 46, of Ardsley, N.Y., pleaded guilty in September 2009 to fleecing investors out of millions of dollars.

    In the same case — a case in which Anderson’s name was referenced as a FEDI pitchman in a grand-jury indictment — Alishtari pleaded guilty to financing terrorism.

    “Alishtari . . . admitted that he stole millions from investors and knowingly financed what he believed to be tools of terror,” U.S. Attorney Preet Bharara said in September, after the guilty plea. “In enriching himself, Alishtari displayed a deliberate disregard for the financial and personal security of others.”

    Investigators said Alishtari “facilitated the transfer of $152,000, with the understanding that the money would be used to fund training for terrorists.

    “In the latter half of 2006,” according to investigators, “Alishtari agreed to discreetly transfer these funds for an undercover officer, believing that the money was going to be used to purchase night vision goggles and other equipment for a terrorist training camp in Afghanistan. During his guilty plea, Alishtari admitted that he sent the money from the United States knowing that the funds were to be used to help finance alleged terrorist activity in Pakistan and Afghanistan.”

    Anderson, the former pastor of a church in Canada who was arrested in Spain in 2007, was not linked to terrorism. But Canadian authorities said he pushed FEDI and another investment scheme known as Frontier Assets.

    He pleaded guilty in the United States to criminal charges stemming from the Frontier Assets scheme, and was sentenced last week to 90 months in federal prison. Prosecutors described it as a $4 million Ponzi scheme.

    U.S. District Judge Alvin K. Hellerstein said Anderson “ripped out” investors’ hearts.

    Prosecutors said Anderson told lie after lie to separate people from their money.

    “Anderson touted Frontier Assets as an exclusive ‘private loan program’ that promised high rates of return in the form of interest payments on the invested principal,” prosecutors said.

    The use of vague descriptions was part of the scheme, prosecutors said.

    “[I]n a document titled ‘How Does Frontier Assets Make Their Income,’ Frontier Assets boasted that it had been appointed a ‘Program Manager’ to a ‘major International Business Corporation’ that participates at the ‘private banking level of several significant European and Asian banks,’” prosecutors said.

    Investment jargon also was used to pique investors’ interest, prosecutors said.

    “Frontier Assets claimed the ability to place investors with offshore entities, including ‘Private Placement Investment Programs,’ ‘Real Estate development in Asia and the United States,’ ‘Manufacturing plants,’ ‘Commodities worldwide,’ ‘Forex Exchange,’ and ‘Buying and Selling of specialized bank paper, i.e. CD’s and Bank guarantees,’” prosecutors said.

    Investors’ funds were said to be insured by an “International Foundation,” prosecutors said.

    But Frontier Assets was blowing smoke, prosecutors said.

    “[T]he only funds paid into the Frontier Assets accounts were monies that had been provided by investors in the program, and the only payments out were payments of interest to investors, and transfers to Anderson and other co-conspirators. Like many other Ponzi schemes, more recent investors in Frontier Assets ultimately lost a substantial portion, if not all, of their invested principal. In total, at least 50 investors were defrauded of at least $4 million in funds.”

    Bharara praised the FBI’s Joint Terrorism Task Force for its work in this case.