Tag: P2P

  • OBTAINED: Feds’ Affidavit In Nick Smirnow/P2P Case; Full Story To Follow

    The PP Blog has obtained an affidavit filed by the U.S. Postal Inspection Service in the Nicholas A. Smirnow/Pathway To Prosperity (P2P) case. Smirnow was charged criminally Friday with operating an international Ponzi scheme that fleeced more than 40,000 investors.

    Smirnow, according to investigators, has:

    A. A 2002 conviction for the crime of breaking and entering.
    B. A 2001 conviction for the crime of robbery with a firearm.
    C. A 1996 conviction for the crime of cultivation of a narcotic for purpose of
    trafficking.
    D. A 1981 conviction for the crime of possession of stolen property.
    E. A 1979 conviction for the crime of trafficking in a controlled drug.

    Smirnow “admitted having gone to prison for robbery and characterized his involvement in that crime as being ‘the wheel man,’” according to the affidavit, which is based in part on statements made by Canadian authorities. “Smirnow also admitted involvement in a double homicide in the Hamilton Niagara area of Ontario. He also claimed to have organized crime ties there.”

    Additional details from the affidavit will follow in a separate story this evening (U.S.A, EDT) . . .

    12:33 A.M. June 1. 2010. See follow-up story.

  • Nicholas A. Smirnow, Pathway To Prosperity (P2P) Operator, A ‘Convicted Burglar, Robber And Drug Dealer’ Who Fleeced At Least 40,000 People In International Ponzi Scheme

    Here is how Pathway To Prosperity (P2P), operated by Nicholas A. Smirnow, was described by members of the indefatigable, Ponzi-pushing ASA Monitor forum in 2007:

    “Just talked with Nick today on the phone,” one member said. “I always enjoy talking with him — honest and straightforward.”

    “This one is a WINNER,” another crowed. “People, you don’t know what you are missing if you aren’t in this program.”

    Here is how a member of TalkGold, another Ponzi-pushing site, described P2P:

    “[T]his program will go a long way to bringing back stability to investment sites,” he wrote. “[T]his one you can trust 100% and also the admin Nick . . . come and join our happy group.”

    Here is how P2P was described by a member of MoneyMakerGroup, yet another Ponzi-pushing site:

    “[T]his is the kind of program that is needed,” the poster wrote. “p-2-p gives the little man a chance to invest and relax knowing your money will be safe at the end of the investment.”

    And here, according to the St. Louis Post-Dispatch, is how the U.S. Postal Inspection Service and federal prosecutors described Smirnow after charging him yesterday with operating an international Ponzi scheme that gathered more than $70 million and fleeced more than 40,000 people:

    “convicted burglar, robber and drug dealer who told a former employee that he was involved in a double homicide.”

    Smirnow, believed to be on the lam in the Philippines, used aliases such as Nicolay Smirnow, Alexander Judizcev, Nicholas Kachura and Jeff Prozorowiczm. The scam spread across the world, and P2P shielded itself by using a website in the Netherlands and a company incorporated in the Turks and Caicos Islands.

    Although the program pitched interest rates of up to 17,000 percent, a poster on ASA Monitor incongruously said, “This is not a HYIP — Nick does not believe in them.” Regardless, the same poster — despite his cheerleading — acknowledged he was worried “about the authorities getting in and shutting things down . . . but since it is not a site being heavily promoted like CEP and not so open, it may keep under the radar . . .”

    CEP was yet another Ponzi scheme.

    It has been an electrifying week for opponents of HYIP and autosurf frauds, who routinely are derided as “naysayers” by commission-grubbing pitchmen who spread Ponzi pain across the planet for a share of illegal profits.

    On Tuesday, the SEC announced it had charged Mazu.com operator Matthew J. Gagnon, 41, of Weslaco, Texas, and Portland, Ore., with helping “orchestrate a massive Ponzi scheme conducted by Gregory N. McKnight . . . and his company, Legisi Holdings, LLC.”

    The Legisi scheme raised about $72.6 million from more than 3,000 investors “by promising returns of upwards of 15% a month,” the SEC said.

    Like Pathway to Prosperity, Legisi also was promoted on ASA Monitor, TalkGold, MoneyMakerGroup and other forums criminals and their shills frequent to separate people from their money.

    A U.S. warrant for Smirnow’s arrest was issued yesterday — although Smirnow is believed to have been ducking Canadian authorities for months because of an investigation into his business practices.

    Smirnow now joins Robert Hodgins — yet another international fugitive allegedly associated with the drug and HYIP trades — on the lam.

    Hodgins, who provided debit cards for the alleged AdSurfDaily Ponzi scheme and is believed also to have a tie to the PhoenixSurf autosurf Ponzi scheme and other autosurf and HYIP schemes, is wanted for helping a Colombian narco business launder money at ATM machines in Medellin and also for accepting $100,000 in purported drug proceeds for laundering money in the Dominican Republic.

    INTERPOL is searching for Hodgins.

    Read the Smirnow story in the St. Louis Post-Dispatch.

  • FTC Uncovers ‘Widespread Data Breaches’; Sends Letters To Nearly 100 Organizations, Opens ‘Non-Public Investigations’

    Jon Leibowitz, FTC.

    Saying it has identified nearly 100 organizations that lost control of personal information they maintain on employees, customers or others, the FTC has notified the entities to tighten security on peer-to-peer (P2P) file-sharing networks.

    At the same time, the agency said it has opened “non-public investigations” of companies whose customer or employee information has been exposed on P2P networks.

    The FTC did not name the organizations that lost control of data, describing them as a mix of  schools, local governments, small businesses and “corporations employing tens of thousands” of people.

    In numerous cases, the FTC said, data maintained by the organizations was shared over their computer networks and now “is available on P2P networks” on which users play games, make phone calls, and share music, video and documents.

    “[W]e found health-related information, financial records and drivers’ license and Social Security numbers — the kind of information that could lead to identity theft,” said FTC Chairman Jon Leibowitz.

    The FTC provided three examples of letters sent to the organizations.

    A letter sent to companies begins, “The Federal Trade Commission (FTC) is sending you this letter because at least one computer file containing sensitive personal information from or about your customers and/or employees has been shared from your computer network, or the network of one of your service providers, to a peer-to-peer file sharing (P2P) network.

    “One such file is *******. The information is now available to users of the P2P network, who could use it to commit identity theft or fraud. Your failure to prevent such information from being shared to a P2P network may violate laws enforced by federal, state, or local law enforcement agencies.”

    ‘Hard Look’ Advised

    “Companies should take a hard look at their systems to ensure that there are no unauthorized P2P file-sharing programs and that authorized programs are properly configured and secure,” Leibowitz said.  “Just as important, companies that distribute P2P programs, for their part, should ensure that their software design does not contribute to inadvertent file sharing.”

    In litigation in recent years, the FTC brought privacy-breach actions against well-known companies such as CVS Caremark Corp., the largest pharmacy chain in the United States; Genica Corp., operators of Computer Geeks Discount Outlet and geeks.com; and Premier Capital Lending Inc.

    Those cases all have been settled.

    In the PremierCapital case, the FTC alleged the company allowed a third-party home seller to access data without taking reasonable steps to protect it.

    “A hacker compromised the data by breaking into the home seller’s computer, obtaining the lender’s credentials, and using them to access hundreds of consumer reports,” the FTC said.

    In the Computer Geeks case, the FTC alleged the company stored sensitive customer information in unencrypted text on its corporate computer network.

    Hackers stole the information, the FTC said.

    Meanwhile, in the CVS case, the FTC said that it opened its investigation after reading newspaper reports that the company was “throwing trash into open [D]umpsters that contained pill bottles with patient names, addresses, prescribing physicians’ names, medication and dosages; medication instruction sheets with personal information; computer order information from the pharmacies, including consumers’ personal information; employment applications, including Social Security numbers; payroll information; and credit card and insurance card information, including, in some cases, account numbers and driver’s license numbers.”

    Visit the FTC site for info on previous data-breach cases.