Tag: U.S. Attorney Jenny A. Durkan

  • Raymond Leo Jarlik Bell, 70-Year-Old Purported ‘Sovereign Citizen’ Linked To AdSurfDaily Figure Kenneth Wayne Leaming, Sentenced To More Than 8 Years In Federal Prison

    ponziblotterRaymond Leo Jarlik Bell, a 70-year-old purported “sovereign citizen” linked to AdSurfDaily figure Kenneth Wayne Leaming, has been sentenced to 97 months in federal prison for a tax scam.

    In July 2011, federal agents found records of bogus liens filed by Leaming against public officials while executing a search warrant at Jarlik Bell’s residence in Yelm, Wash., according to court records. Bell was under investigation for his tax scam at the time the records were found. Leaming, 57, later was charged with filing bogus liens, harboring federal fugitives from Arkansas in Washington state and being a felon in possession of firearms, including a “street sweeper” shotgun and an assault rife.

    Leaming was sentenced in May to eight years in federal prison. David Carroll Stephenson, another Leaming associate and purported “sovereign citizen” from Washington state, was sentenced in May to 10 years for filing bogus liens against two U.S. prison officials. Stephenson, 57, already was serving time for a tax scam when those liens were filed.

    Jarlik Bell’s scam centered on filing for false tax refunds “using a scheme known as OID fraud,” prosecutors said.

    OID fraud may include claims that the U.S. government maintains secret accounts for citizens and that such accounts can be tapped to receive tax “refunds” in the tens or even hundreds of thousands of dollars at a time if paperwork is filed in a certain manner.

    “No matter what the promoter calls it, a scheme to file bogus tax returns claiming outrageous tax ‘refunds’ that don’t belong to you, is just fraud,” said Kenneth J. Hines, special agent in charge of IRS Criminal Investigation in Seattle.

    “This defendant held himself out as a tax expert with contacts at the IRS – when both the IRS and a federal judge told him repeatedly that his conduct was criminal,” said U.S. Attorney Jenny A. Durkan of the Western District of Washington. “Mr. Jarlik Bell believed he was above the law, and aggressively promoted and spread his scheme to others looking to duck their fair share and steal tax dollars through fraudulent refunds.”

    From a statement by prosecutors (italics added):

    In 2006, BELL obtained a tax refund in excess of $30,000 using the scheme. Numerous others who were advised by JARLIK BELL also filed for and received fraudulent refunds they did not deserve.  One woman received a tax refund of more than $590,000.  In 2005, JARLIK BELL was ordered by U.S. District Judge Robert J. Bryan to stop promoting fraudulent tax schemes.  Less than three years later, he was back promoting another massive tax fraud among friends, family and strangers.

    Ute Christine Jarlik Bell, Jarlik Bell’s wife, also is a purported “sovereign citizen” and tax scammer, prosecutors said. She is scheduled to be sentenced tomorrow on four counts of filing false, fictitious and fraudulent claims.

    Jarlik Bell was convicted in March 2013 of five counts of filing false, fictitious and fraudulent claims, 15 counts of assisting in filing false tax returns, three counts of mail fraud, and one count of criminal contempt, prosecutors said.

    U.S. District Judge Ronald B. Leighton described Jarlik Bell’s scheme as “fraud at its core,” prosecutors said.

    “You are hurting people intentionally, regardless of your adherence to [your beliefs],” prosecutors quoted Leighton as saying.

    Leaming filed bogus liens against a federal judge, federal prosecutors and a U.S. Secret Service agent involved in the prosecution of the the ASD Ponzi scheme. The Secret Service has described ASD as a “criminal enterprise” that gathered about $119 million by duping people into believing that ASD’s purported payout of 1 percent a day came from legitimate means. ASD operator Andy Bowdoin, 78, is serving a 78-month prison term.

    When Leaming was arrested in November 2011, investigators discovered he’d been harboring two federal fugitives from Arkansas charged with mail fraud in a separate home-business scheme that allegedly had gathered millions of dollars.

    Leaming, who previously had sued President Obama and Attorney General Eric Holder on a theory that Obama was not born in the United States and was an unlawful President who’d appointed Holder unlawfully, went on to claim that Leighton owed him 208,000 ounces of silver.

    The lawsuit against Obama and Holder was tossed out of court by a federal judge.

     

     

  • URGENT >> BULLETIN >> MOVING: AdSurfDaily Figure And Purported ‘Sovereign Citizen’ Kenneth Wayne Leaming Sentenced To 8 Years In Federal Prison

    Kenneth Wayne Leaming
    Kenneth Wayne Leaming

    URGENT >> BULLETIN >> MOVING: (UPDATED 10:55 P.M. EDT U.S.A.) AdSurfDaily figure and purported “sovereign citizen” Kenneth Wayne Leaming has been sentenced to eight years in federal prison. His former business associate and fellow purported “sovereign” David Carroll Stephenson has been sentenced to 10 years.

    Stephenson already was serving prison time for a tax scam.

    “These defendants tried to mask their crimes with the cloak of free speech and beliefs,” said U.S. Attorney Jenny A. Durkan of the Western District of Washington. “They thought they were immune from the law or the justice system, but now their frauds aimed at taxpayers and public servants need to come to an end. A lengthy prison term is the best way to protect the public from their schemes.”

    Stephenson, Durkan’s office said, received a sentence longer than the recommended guidelines.

    U.S. District Judge Ronald B. Leighton said that Stephenson “cannot, will not live his life without doing harm to others,” prosecutors said. “He is the master manipulator, the puppeteer . . . He is in my mind a very dangerous man.”

    Leaming, the judge said, flaunts authority and “harasses law abiding people who have an obligation to the people to serve,” according to prosecutors.

    Leaming, like Stephenson, is 57. Although it never was clear whether Leaming was a member of the $119 million ASD Ponzi scheme broken up by the U.S. Secret Service in 2008, it became crystal clear that he was trying to derail the prosecution by filing bogus liens against public officials involved in the ASD case and had worked with Stephenson to file fraudulent liens against two U.S. prison officials.

    Prosecutors had asked for Leaming to be sentenced to 10 years.

    When the FBI executed search warrants at Leaming’s Spanaway home in November 2011, they found six firearms — this despite the fact Leaming was a convicted felon banned from possessing guns. Leaming previously has been convicted of piloting an aircraft without a license.

    One of the weapons Leaming possessed was described by prosecutors as a “street sweeper” style shotgun. He also had an “assault rifle,” according to prosecutors.

    Leaming also was found to be harboring two federal fugitives from Arkansas wanted in a home-business caper separate from ASD.

    During his criminal trial, Leaming was channeling deceased cop-killer Christopher Dorner in a veiled bid to intimidate law enforcement, prosecutors said. Dorner is the former member of the Los Angeles Police Department who promised warfare against cops in February. The Dorner story stunned the nation.

    Leaming, according to the FBI, also has a history that includes discussing a plot by which he’d serve U.S. Chief Justice John Roberts with a purported writ at a school attended by Roberts’ young children.

    From a statement by Durkan’s office tonight (italics added):

    The men (Stephenson and Leaming) identify themselves as members of the ‘Sovereign Citizen’ movement. ‘Sovereign Citizens’ profess a belief that both state and federal government entities are illegitimate. Members of this group often engaged in so-called “freedom driving,” i.e., driving about without state-required licenses, either for their vehicles or themselves. When contacted by local law enforcement, members of the group often bombard local officials (from the officer, to local judges, to mayors and other members of local government) with frivolous liens, false claims, and sometimes threats of violence. Many members of this same group had previously come to the attention of federal law enforcement for engaging in various fraudulent tax schemes, wire fraud schemes, and (occasionally) inappropriate communications with various members of federal law enforcement and the judiciary.

    In asking for a ten year sentence for both men, prosecutors wrote to the court that only a long prison term would protect the public. About STEPHENSON they wrote, “This is not the case of a defendant who continues to run afoul of the law because of a substance abuse addiction or a history of childhood abuse. Rather, this is a defendant who simply chooses to remain defiant, despite court after court telling him that he must stop, and despite multiple stints in prison. At this point, removal from society is the only way in which the public can be kept safe from the defendant’s crimes.”

    As for LEAMING, prosecutors provided information to the court about his repeatedly holding himself out to victims as a lawyer who could solve their problems, when in fact his actions may have damaged their case. About the crimes from the March 2013 conviction prosecutors wrote: “Defendant’s possession of firearms is particularly disturbing in light of several facts. First is obviously his disdain for government. Second is his possession of various items of police equipment, including numerous badges, light bars, and a Crown Victoria sedan modified to appear to be a police vehicle. Last but not least is Defendant’s repeated invocation of the shooting of government officials in Southern California by a disgruntled former police officer – which again appeared to be a veiled threat to engage in violence himself if he is prevented from pursuing his “‘petitions for redress,’” prosecutors wrote in their sentencing memo.

  • Letter Sent To Federal Judge In Washington State Contained Ricin, FBI Says; Matthew Ryan Buquet Arrested

    americaatrisk4The FBI has arrested Matthew Ryan Buquet, who appeared in federal court yesterday to face a charge he mailed a letter containing ricin toxin to a federal judge in Washington state.

    Buquet is 37. The Associated Press, via Fox News, identified the intended recipient as U.S. District Judge Fred Van Sickle of the Eastern District of Washington. Van Sickle presides over cases in Spokane. He was appointed to the bench by President George H.W. Bush in 1991 and now serves as a senior judge. Prior to his appointment to the federal bench, Van Sickle was a state-court judge in Washington.

    It was not immediately clear whether the FBI suspects a broader crime. Nor was it clear whether Van Sickle ever presided over a case in which Buquet had a role. Washington state is known to be the site of an investigation into the activities of purported “sovereign citizens.” The word “sovereign” does not appear in a statement by the FBI yesterday on the Buquet arrest, but purported “sovereigns” have been linked to cases of domestic terrorism and extremism in the United States.

    “Our coordinated team acted swiftly to resolve a potentially dangerous situation and continues working tirelessly around-the-clock to investigate the origin of the letter and to address any remaining, potential risks,” said Laura M. Laughlin, special agent in charge of the FBI’s Seattle Division.

    “The U.S. Postal Inspection Service quickly deployed resources dedicated to find those responsible for this suspicious mailing to ensure the safety of U.S. Postal Service employees and the American public,” said Bradley J. Kleinknecht, inspector in charge of the Seattle Division of the U.S. Postal Inspection Service.

    The Spokane ricin investigation follows on the heels of an April incident in Mississippi allegedly involving ricin and the mails. President Obama, Sen. Roger Wicker, R-Miss., and a state judge in Mississippi allegedly were targets of the April letters.

    News of Buquet’s arrest came during the same week federal prosecutors in the Western District of Washington alleged that AdSurfDaily Ponzi scheme figure and purported “sovereign citizen” Kenneth Wayne Leaming was channeling deceased cop-killer Christopher Dorner in the courtroom.

    Leaming, 57, was convicted March 1 on charges of filing false liens against public officials involved in the ASD case, harboring two federal fugitives from Arkansas wanted in a separate multimillion-dollar fraud scheme and being a felon in possession of firearms. Based on their bizarre court pleadings, the Arkansas fugitives found with Leaming appear either to be “sovereigns” or people acting under the influence of “sovereigns.”

    “Sovereign citizens,” known to network over the Internet, may have an irrational belief that laws do not apply to them and may draft others into “sovereign” schemes, sometimes for a fee. Though typically linked to financial crimes, some individuals linked to the purported “sovereign citizen” movement also have been involved in sex crimes. In November 2011, a Florida man listed as a registered sex offender was jailed after the allegedly filed a bogus lien against a judge.

    In a separate case involving a purported “sovereign,” Bruce Chalmers Hicks was jailed in Florida last week. The Tampa Bay Times reported that Hicks served seven years in prison after his 2004 conviction for molesting a child under the age of 12.

    MailOnline reported yesterday that Buquet “was listed as a sex offender following an ‘indecent liberties’ charge in 1998.”

    The office of U.S. Attorney Jenny A. Durkan of the Western District of Washington prosecuted Leaming, the ASD figure and purported “sovereign.” Leaming now claims a federal judge owes him 208,000 ounces of fine silver. Durkan’s office recently has prosecuted other purported “sovereigns,” including David Russell Myrland.

    In 2011, Myrland was sentenced to 40 months in federal prison for threatening the mayor of the Seattle suburb of Kirkland and other public officials. He later bizarrely claimed (apparently) that the government was engaging in a grammar conspiracy against him.

     

  • URGENT >> BULLETIN >> MOVING: AdSurfDaily Figure And Purported ‘Sovereign Citizen’ Kenneth Wayne Leaming Found Guilty Of Filing False Liens, Possessing Weapons Illegally — And More

    Kenneth Wayne Leaming
    Kenneth Wayne Leaming

    URGENT >> BULLETIN >> MOVING: AdSurfDaily figure and purported “sovereign citizen” Kenneth Wayne Leaming has been found guilty in the Western District of Washington of filing false liens against public officials, harboring fugitives and being a felon in possession of firearms, federal prosecutors said tonight.

    Leaming associate David Carroll Stephenson also was found guilty of filing false liens.

    The PP Blog will have a full report when more information becomes available. The case was prosecuted by the office of U.S. Attorney Jenny A. Durkan.

  • Payment Processor For Cybercrime Ring Sentenced To 48 Months In Federal Prison; ‘Operation Trident Tribunal’ Is Ongoing

    recommendedreading1Mikael Patrick Sallnert has been sentenced to 48 months in federal prison for his role in processing payments for a cybercrime ring, the U.S. Justice Department announced.

    Sallnert, 37, is a citizen of Sweden. As part of “Operation Trident Tribunal,” Sallnert was arrested in Denmark on Jan. 19, 2012, and extradited to the United States in March 2012. He pleaded guilty on Aug. 17, 2012, to one count of conspiracy to commit wire fraud and one count of accessing a protected computer in furtherance of fraud, the Justice Department said.

    “Payment processors like this defendant are the backbone of the cybercrime underworld,” said U.S. Attorney Jenny A. Durkan of the Western District of Washington.  “As an established businessman, this defendant put a stamp of legitimacy on cyber criminals.  He was involved in defrauding thousands of victims, and his actions contributed to insecurities in e-commerce that stifle the development of legitimate enterprises and increase the costs of e-commerce for everyone.”

    If Durkan’s name rings familiar to PP Blog readers, it’s because her office is involved in an investigation into the activities of a group of “sovereign citizens” operating in the Pacific Northwest. Kenneth Wayne Leaming, a figure in the AdSurfDaily Ponzi scheme story, is being prosecuted by Durkan’s office amid allegations he filed false liens against at least five public officials in the ASD Ponzi scheme case.

    Sallnert, prosecutors said, provided payment-processing services for “scareware” vendors.

    “Mikael Patrick Sallnert played an instrumental role in carrying out a massive cybercrime ring that victimized approximately 960,000 innocent victims,” said Assistant Attorney General Lanny A. Breuer. “By facilitating payment processing, Sallnert allowed the cybercrime ring to collect millions of dollars from victims who were duped into believing their computers were compromised and could be fixed by the bogus software created by Sallnert’s co-conspirators.  Cybercrime poses a real threat to American consumers and businesses, and the Justice Department is committed to pursuing cybercriminals across the globe.”

    Operation Trident Tribunal is an “ongoing, coordinated enforcement action targeting international cybercrime,” prosecutors said.

    “This cyber crime ring spanned multiple countries—increasing the threat it posed and complicating the necessary law enforcement response,” said Laura M. Laughlin, special agent in charge of the FBI’s Seattle Division.  “Thanks to the commitment of many foreign partners and FBI entities across the nation, we were able to dismantle that threat and ensure Mr. Sallnert faced justice.”

    Scams often rely on international payments processors to fleece their victims.

     

  • SOBERING: Cyber Criminals May Be Responsible For ‘The Greatest Transfer Of Wealth In History,’ Top Justice Department Official Says At Seattle Conference

    “The Intelligence Community’s most recent Worldwide Threat Assessment confirms that U.S. networks have already been subject to ‘extensive illicit intrusions.’ The head of the National Security Agency and the Pentagon’s Cyber Command, for one, believes such intrusions may have resulted in ‘the greatest transfer of wealth in history.’”Lisa Monaco, Assistant Attorney General for National Security, Oct. 25, 2012

    EDITOR’S NOTE: These are remarks prepared for delivery by Lisa Monaco, Assistant Attorney General for National Security, at the “2012 Cybercrime Conference” today in Seattle. Monaco presides over the Justice Department’s National Security Division.

    The conference was hosted by U.S. Attorney Jenny A. Durkan of the Western District of Washington. Durkan’s name may be familiar to longtime PP Blog readers because her office is involved in the prosecution of AdSurfDaily story figure Kenneth Wayne Leaming, a purported “sovereign citizen” charged with filing false liens against five public officials who had roles in the ASD Ponzi prosecution. ASD was a Florida-based online scam that created thousands of victims. Leaming also is accused of uttering a bogus “bonded promissory note” for $1 million and passing it at U.S. Bank, harboring fugitives implicated in a separate fraud scheme and being a felon in possession of firearms.

    ** ______________________________________________ **

    Good afternoon.   Thank you for having me here today.   I am grateful to the U.S. Attorney’s Office for the Western District of Washington and to U.S. Attorney Jenny A. Durkan, for organizing a conference on this important topic.   Thank you all for taking the time out of your schedules to discuss these issues.   Events like these are critical to helping us succeed in combating cyber threats.

    The Threat

    If there is one thing we all know from the presentations today and our work in the field, it is the seriousness of the cyber threat.   The President has called it “one of the most serious economic and national security challenges we face as a nation.”   It’s hard to quibble with that.   Hardly a day goes by when cyber events don’t show up in the news.   As many of you know, over the last several weeks, financial institutions in the United States have been hit by a series of Distributed Denial of Service (or DDOS) attacks.   Such attacks are relatively easy to carry out, but they can cause serious harm by disrupting companies’ website services and preventing customer access.   Although these disruptions have been temporary, their frequency and persistence underscores recent Intelligence Community warnings about the “breadth and sophistication of computer network operations . . . by both state and nonstate actors.”   The cyber alarm bell has been rung.   The Intelligence Community’s most recent Worldwide Threat Assessment confirms that U.S. networks have already been subject to “extensive illicit intrusions.”   The head of the National Security Agency and the Pentagon’s Cyber Command, for one, believes such intrusions may have resulted in “the greatest transfer of wealth in history.”

    We often think of national security threats, like that of a catastrophic terrorist attack, as questions about prevention.   But the cyber threat is not simply looming – it is here.   It is present and growing.   Although we have not yet experienced a devastating cyber attack along the lines of the “cyber Pearl Harbor” that Defense Secretary Panetta recently mentioned – we are already facing the threat of a death by a thousand cuts.   Outside the public eye, a slow hemorrhaging is occurring; a range of cyber activities is incrementally diminishing our security and siphoning off valuable economic assets.   This present-day reality makes the threat of cyber-generated physical attacks, like those that might disrupt the power grid, appear no longer to be the stuff of science fiction.   And all of this comes against the backdrop of sobering forecasts from the highest ranks of our national security community.   FBI Director Mueller – a man not prone to overstatement – predicts that “the cyber threat will pose the number one threat to our country” in “the not too distant future.”

    Despite all we know about intrusions against U.S. businesses and government agencies, what is more sobering still is the Intelligence Community’s assessment that “many intrusions . . . are not being detected.”   Even with respect to those that are detected, identifying who is behind cyber activity can be uniquely challenging.   Technologies can obscure perpetrators’ identities, wiping away digital footprints or leaving investigative trails that are as long as the web is wide.   Cyber intrusions don’t announce themselves or their purpose at the threshold.   Depending on the circumstances, the purpose or endgame of a particular intrusion may be anyone’s guess – is it espionage?   Mere mischief?   Theft?   An act of war?

    The threats are as varied as the actors who carry them out.   A growing number of sophisticated state actors have both the desire and the capability to steal sensitive data, trade secrets, and intellectual property for military and competitive advantage.   While most of the state-sponsored intrusions we are aware of remain classified, the onslaught of network intrusions believed to be state-sponsored is widely reported in the media.   We know the Intelligence Community has noted that China and Russia are state actors of “particular concern,” and that “entities within these countries are responsible for extensive illicit intrusions into US computer networks and theft of US intellectual property.”   Indeed, “Chinese actors are,” according to a public report of our top counterintelligence officials, “the world’s most active and persistent perpetrators of economic espionage.”   And we know that Secretary of Defense Panetta has stated that “Iran has also undertaken a concerted effort to use cyberspace to its advantage.”

    In cases involving state actors and others, trusted insiders pose particular risks.   Those inside U.S. corporations and agencies may exploit their access to funnel information to foreign nation states.   In these cases, perimeter defense isn’t worth much; the enemy is already inside the gates.   The Justice Department has prosecuted a number of corporate insiders and others who obtained trade secrets or technical data from major U.S. companies and routed them to other nations via cyberspace.

    Earlier this year, in the first indictment of foreign state-owned entities for economic espionage, several companies controlled by the government of China were charged in San Francisco for their alleged roles in stealing a proprietary chemical compound developed by a U.S. company for China’s benefit.   While this particular theft was not cyber-enabled, cyberspace makes economic espionage that much easier.   In an Internet age, it is no longer necessary to sneak goods out of the country in a suitcase; a single click of a mouse can transmit volumes of data overseas.   Indeed, the Department has secured convictions of individuals who stole corporate trade secrets by simply e-mailing them overseas.   In one recent case, a chemist downloaded a breakthrough chemical process just developed by his company in the United States and e-mailed it to a university in China where he had secretly accepted a new job.

    The other major national security threat in cyberspace is cyber-enabled terrorism.   Although we have not yet encountered terrorist organizations using the Internet to launch a full-scale cyber attack against the United States, we believe it is a question of when, not if, they will attempt to do so.   Individuals affiliated with or sympathetic to terrorist organizations are seeking such capabilities. We have already seen terrorists exhorting their followers to engage in cyber attacks on America.   Just this year, an al-Qaeda video released publicly by the Senate Homeland Security Committee encouraged al-Qaeda followers to engage in “electronic jihad” by carrying out cyber attacks against the West.

    Terrorists have already begun using cyberspace to facilitate bomb plots and other operations.   These activities go beyond the use of cyberspace to spread propaganda and recruit followers.   For example, the individuals who planned the attempted Times Square bombing in May 2010 used public web cameras for reconnaissance, file sharing sites to share operational details, and remote conferencing software to communicate.   Najibullah Zazi attempted to carry out suicide bomb attacks against the New York subways around the anniversary of 9/11 three years ago.   After returning to the United States from terrorist travel, he used the Internet to access the bomb-making instructions he had received in Pakistan and tried to communicate via the Internet in code with his al-Qaeda handlers in Pakistan just prior to the planned attack.   Khalid Aldawsari, who was convicted in June of this year in the Northern District of Texas, used the Internet extensively to research U.S. targets and to purchase chemicals and other bomb-making materials.

    Evolving To Meet the Threat — Learning from the Counterterrorism Model

    The threats we face in cyberspace are changing, and we must change with them.   Of course, we have faced similar challenges before.   After the devastating attacks eleven years ago, we learned some hard lessons.   We have since put those lessons into practice:   working across agencies to share information, and bringing down legal, structural, and cultural barriers.   Law enforcement’s approach to terrorism has become intelligence-led and threat-driven.   We have erected new structures, including the National Security Division, which I am privileged to lead.   As the first new litigating division at the Justice Department in nearly fifty years, the National Security Division was created to bring together intelligence lawyers and operators on the one hand, and prosecutors and law enforcement agents on the other, to focus all talent on the threats before us.

    Since September 11, we have made great progress against terrorism by developing effective partnerships that help us identify threats and choose the best tools available to disrupt them.   Much of our success is attributable to the all-hands-on-deck approach we have adopted for countering terrorism.   From where I sit, I can see this change reflected in our day-to-day operations.   In our investigations, for instance, we actively seek to preserve the ability to prosecute even while using intelligence tools and vice versa.   We must bring the same approach, a whole-of-government approach, an all-tools approach, to combat cyber threats to our national security.   Investigations and prosecutions will be critical tools for deterrence and disruption, ones that we have a responsibility to use.   But they are not the only options available.   The diversity of cyber threats and cyber threat actors demands a diverse response.   This nation has many tools – intelligence, law enforcement, military, diplomatic, and economic – at its collective disposal as well as deep, and diverse, expertise.   The trick is in harnessing our collective resources to work effectively together.

    Those of us charged with investigating and disrupting cyber threats to national security and advising operators and agents must be creative and forward-looking in our approach.   First, we must consider – in conjunction with our partners – what cyber threats will look like in the coming years.   Only by knowing what is on the horizon can we ensure that the right tools exist to address cyber threats before they materialize.   Second, we must be vigilant to prevent the formation of what the WMD Commission after 9/11 called “legal myths” that have led to “uncertainty” in the past “about real legal prohibitions” among operators.   And, together with operators, we must consider what kinds of tools, investigations, and outreach we can launch now to lay the groundwork for future cyber efforts.   These may be relatively simple things, like standardized protocols and established points of contact to make reporting intrusions easier. Or they may take the form of institutional relationships between the government and the private sector for sharing information.

    On an operational level, both public and private sector attorneys need to be able to tell clients what options they have available to deal with cyber threats.   If cyberspace is an “information super-highway,” then lawyers are the GPS system in a client’s car:   It is our job to tell the client how to get there.   When obstacles get in the way, we should tell the client how to avoid them.   We must look ahead, anticipate jams, and route clients around them.

    This metaphor is particularly applicable in the cyber realm.   As cyber events unfold in real time, we learn more about our adversary, the means available to him or her, and the vulnerabilities in our own systems.   Our advice must adapt accordingly.   For those of us in government who act as operational lawyers, it is important in this environment to be clear about where the legal debate stops and the policy debate begins.   For those of you in the private sector, I imagine one concern is that your clients not be left vulnerable in a shifting legal landscape.   And for those of you in academia, we need your help testing boundaries and pushing forward with questions that need to be asked and answered by all of us as we navigate this legal space together.

    One of the significant operational challenges we face is the same one the Intelligence Community confronted in reorganizing itself after the attacks of September 11.   The cyber threat demands ready and fluid means of sharing information and coordinating our actions.   At the National Security Division, we have made this evolution, and combating this threat, a top priority.   Working with our partners – including the FBI, the U.S. Attorney community, and the Computer Crime and Intellectual Property Section (one of their leaders, Richard Downing is here today) – we are ensuring that all resources are brought to bear against national security cyber threats.

    To help accomplish these goals, the National Security Division established earlier this year a National Security Cyber Specialists’ Network to serve as a one-stop shop in the Justice Department for national security-related cyber matters.   The network brings together experts from across the National Security Division and the Criminal Division and serves as a centralized resource for the private sector, prosecutors, and agents around the country when they learn of national security-related computer intrusions.   Each U.S. Attorney’s office around the country has designated a point of contact for the network.   These skilled Assistant U.S. Attorneys will act as force multipliers, broadening the network’s reach and ensuring a link back to their counterparts at headquarters.   Drawing upon the Joint Terrorism Task Force model, which has been successful in the terrorism realm, the network seeks to improve the flow of national security cyber information to offices throughout the country.   This means more information, earlier on, in national security cyber incidents.   Thanks to the contribution of other parts of the Department, especially CCIPS, the FBI, and the U.S. Attorney’s offices, the network has helped us to focus nationwide on bringing more national security cyber investigations.   Through this nationwide network, we are consolidating and deepening the Department’s expertise, institutionalizing information sharing, ensuring coordination, and pursuing investigations.

    We have also trained our attention on the diverse cyber capabilities that reside throughout the government.   The U.S. Secret Service, the Department of Commerce, and the Department of Defense, not to mention the FBI, are all common partners in this fight, each using their distinct tools to achieve a common goal.   We have enhanced our joint work with the FBI’s National Cyber Investigative Joint Task Force, where we now have a dedicated National Security Division liaison.

    Within DOJ, we are putting more prosecutors against the threat and focusing on how to best equip and educate our cyber cadre.   Through the National Security Cyber Specialists’ Network, we are training prosecutors around the country.   Next month, more than 100 prosecutors will gather in Washington, D.C. to share expertise on everything from digital evidence to the Foreign Intelligence Surveillance Act.   No matter who the perpetrator is, being an effective adviser today requires an understanding of the technologies at hand.   Perhaps we should all take a page from Estonia—where I understand they’re beginning a system of teaching first graders how to program!   As courts confront these technologies, we also have a role in helping them grapple with what these changes mean for the development of the law and interpretations of existing legal authorities.

    Partnership with the Private Sector

    Of course, the need for collaboration does not end there.   While interaction with the private sector is something that does not always come easily to the national security community, which is accustomed to operating in secrecy, it is absolutely necessary here.   The Intelligence Community has noted the considerable portion of U.S. companies that report they have been the victims of cybersecurity breaches as well as the increased volume of malware on U.S. networks.   Private companies are on the front lines.   Individual defenses, as well as broader efforts to reform – like the legislation proposed by the Administration last year – will require our joint efforts.

    To succeed in these efforts, we must develop a greater understanding of the concerns and pressures under which our private sector partners operate.   A home computer user, whose machine is used in a botnet attack might not have much incentive to remove or check for malware.   But a company targeted by such an attack has considerable incentive to do so.   When dealing with corporate victims, the government must understand the competing interests at play.   Companies may have shareholders, reputational concerns, and sometimes legal limitations.   Yet we cannot fight the current or the future threat with old mindsets on either side.   My colleague, the U.S. Attorney for the Southern District of New York, has spoken compellingly about the need for a “culture of security” and a “culture of disclosure” in industry.   For our part, we need to understand the private sector’s concerns; we need to understand that it is not just the red tape of government that industry fears.   They also fear that the disclosure of computer intrusions will bring yellow tape as well – that it will disrupt business by converting the corporate suite into a crime scene.   Reporting breaches and thefts of information is the first step toward preventing future harm.   For our part, we will work with industry.   We will share information where we can and use protective orders and other tools to protect confidential and proprietary information.

    Conclusion

    How we respond to cyber intrusions and attacks, and how we organize and equip ourselves going forward, will have lasting effects on our government and its relationship with the private sector.   Particularly in these early moments, in what will no doubt be a sustained endeavor, it is incumbent upon us to take notes – to identify impediments, legal questions, technical challenges, and address them together.   All the while we must bear in mind the great potential of these technologies and the importance of not stifling them as we find better ways to make them secure.

    We have heard the warnings about the potential for a cyber 9/11, but we are, for the moment, in a position to do something to prevent it.   The cyber threat poses the next test of the imperative that we see law enforcement and national security as joint endeavors.   Our work offers an opportunity to demonstrate the strength and adaptability of the lessons we have learned over the last eleven years in the fight against terrorism.   U.S. Attorney’s Offices – and all of you sitting in this room – are at the forefront of these issues.   I look forward to pursuing the threats we face in partnership.   Thank you for being with us today.

  • Jailed AdSurfDaily Figure Kenneth Wayne Leaming Sues Obama, Holder; Purported ‘Sovereign Citizen’ Claims President Not A U.S. Citizen And Demands Compensation In ‘Silver’ And ‘Gold’ For Alleged Unlawful Imprisonment

    EDITOR’S NOTE: Just when you thought AdSurfDaily-related events could not get any stranger . . .

    ** _____________________________ **

    Kenneth Wayne Leaming

    Jailed near Seattle and awaiting trial in September on charges he filed false liens against at least five public officials involved in the AdSurfDaily Ponzi case, purported “sovereign citizen” Kenneth Wayne Leaming has sued “Barrack Hussein Obama” and U.S. Attorney General Eric Holder in federal court in the Western District of Washington.

    The complaint was written in longhand and names Leaming business associate and fellow federal prisoner David Carroll Stephenson a co-plaintiff. In addition to Obama and Holder, the complaint names as defendants “J. Doe #1 (U.S. Atty)” and “John Does 2-10.”

    It is believed that “J. Doe” refers to U.S. Attorney Jenny A. Durkan of the Western District of Washington. Durkan’s office has been involved in the prosecution of a number of purported “sovereign citizens,” including David Russell Myrland. Myrland was convicted last year on charges of threatening the mayor and officials of the Seattle suburb of Kirkland.

    After his conviction, Myrland sued federal prosecutors in Washington state, apparently alleging a grammar conspiracy.

    Obama, according to the Leaming/Stephenson complaint, is not a U.S. citizen and therefore is ineligible to be President. And because an ineligible President appointed Holder, it follows that Holder is “Personating [sic] the Attorney General of the United States” and therefore “cannot lawfully appoint or delegate authority to “Any United States Attorney.”

    It further follows, according to the complaint, that the charges against Leaming and Stephenson brought by the U.S. Attorney for the Western District of Washington should be declared “VOID For FRAUD” because the U.S. Attorney also is “personating” [sic] a federal officer.

    In court filings after Leaming’s arrest, the FBI cited a passage from an alleged Leaming email that referenced the children of U.S. Chief Justice John Roberts and their “school.”

    “In this email,” the FBI agent who sought Leaming’s arrest wrote, “I believe that LEAMING is offering to file documents on Stephenson’s behalf, including sending them to the Chief Justice, via his minor children.”

    Investigators discovered a paperwork trail that linked Leaming and Stephenson to a purported $10 million lien against Harley Lappin, the former director of the Federal Bureau of Prisons, and a purported lien for $20 million against Dennis R. Smith, the warden of the Federal Correctional Institution in Phoenix.

    As the probe that led to Leaming’s arrest proceeded, agents found bogus liens filed in Pierce County, Wash., against other public officials, including at least five officials involved in the ASD Ponzi case. Liens against Mary Peters, the former U.S. Secretary of Transportation, and Cutler Dawson, president and CEO of Navy Federal Credit Union, also were discovered.

    Leaming and Stephenson are demanding 100 “ounces of .999 fine silver” from each defendant as “compensatory damages ” for each day the government allegedly holds them unlawfully. In addition, they are demanding 1,000 “ounces of .9999 fine gold” from “each defendant” for “Punitive and Exemplary damages.”

    Screen shot: From the Stephenson/Leaming complaint.

    With two defendants formally named and 10 “Does,” it appears as if Leaming and Stephenson are demanding 12,000 ounces of gold. Gold is trading at roughly $1,600 an ounce, meaning the duo is asking for about $19.2 million at today’s approximate rate.

    Leaming was arrested in November 2011, after an investigation by an FBI Terrorism Task Force. Stephenson — already a federal prisoner at the time of Leaming’s arrest — later was indicted with Leaming on a charge of retaliating against a federal judge or federal law enforcement officer.

    In addition to the charges of filing false liens, Leaming also faces charges of harboring two federal fugitives, being a felon in possession of firearms and uttering a bogus “Bonded Promissory Note” with a purported face value of $1 million.

    The U.S. Secret Service has described AdSurfDaily as a $110 million Ponzi scheme and a “criminal enterprise.” ASD President Andy Bowdoin is jailed in the District of Columbia, pending formal sentencing Aug. 29 in the ASD Ponzi case.

    One of the individuals against whom Leaming allegedly filed false liens is the Secret Service agent who led the ASD investigation. False liens also allegedly were filed against three federal prosecutors who worked on the ASD case and the federal judge who presided over it.

    Leaming has a prior federal felony conviction for piloting an aircraft without a license.

  • UNBELIEVABLE: ‘Sovereign Citizen’ Imprisoned For Harassing Mayor Of Kirkland, Wash., Files Lawsuit Against Federal Prosecutors; Complaint By David Russell Myrland Apparently Alleges ‘Grammar’ Conspiracy By Public Officials

    UPDATED 3:38 P.M. ET (U.S.A.)

    David Russell Myrland, the Washington state “sovereign citizen” ordered in December 2011 to spend 40 months in federal prison for threatening the mayor of Kirkland and other public officials, has filed a lawsuit against federal prosecutors in Seattle that alleges (apparently) that law enforcement engaged in a grammar conspiracy against him.

    The story first was reported today by Seattle Weekly.

    Myrland’s 28-page complaint (including purported exhibits) formally was filed Jan. 23. Information within the complaint suggests Myrland began working on the document only days after his prison sentence was handed down Dec. 2. He is listed as an inmate at the Metropolitan Correctional Center (MCC) in Chicago.

    MCC houses prisoners of all security levels, according to the Federal Bureau of Prisons website.

    While apparently alleging a grammar conspiracy by government officials contributed to his legal problems in a threats case, David Russell Myrland may be demonstrating his own lack of command over language skills.

    “Sovereign citizens” are known to file all sorts of wild documents, but  Myrland’s grammar lawsuit may set a new standard for the absurd. The document appears to parse virtually every word of a criminal complaint filed against him in the threats case by a special agent of the U.S. Department of Homeland Security.

    It does the same thing with Myrland’s plea agreement in the case.

    Both documents purport to break down individual words into their individual parts of speech, but the complaint suggests Myrland himself may suffer from grammar confusion. The word “mayor,” for instance, is declared an adjective under the interpretation “key” Myrland included in the complaint.

    “Mayor” is actually a noun.

    Myrland also declares the word “the” an adverb under his numbering system. “The” is actually a definite article. Mistakes involving other words pepper the complaint.

    Seattle Weekly reported that the office of U.S. Attorney Jenny A. Durkan declined comment on Myrland’s complaint, “except to say he could face civil sanctions for filing a frivolous lawsuit. “

  • Investigators Outline Darren Berg’s Ponzi Haul: ‘Stunning’ Greed, Top Prosecutor Says; ‘No Moral Compass,’ Judge Comments When Ordering Washington State Schemer To Spend 18 Years In Jail

    “The greed in this case is stunning. [Frederick Darren Berg] stole and squandered the dreams of hundreds: dreams of retirement, dreams of homeownership, dreams of a college education for their children and grandchildren. While we could not restore those dreams, today he was held accountable for his acts.”U.S. Attorney Jenny A. Durkan, Western District of Washington, Feb. 9, 2012

    Frederick Darren Berg gestures during his sales pitch for his Ponzi scheme in 2009. Source: YouTube.

    It was the largest fraud scheme ever prosecuted in the Western District of Washington. Before his Meridian Group of funds collapsed into a pile of Ponzi rubble, Frederick Darren Berg ensconced himself in the lap of luxury.

    Among other things, prosecutors said, Berg had acquired:

    A $1.95 million condominium at Second and Union in Seattle.

    A $1.25 million house in La Quinta, Calif.

    A $1.4 million condominium in San Francisco.

    A $5.475 million waterfront home on Mercer Island in Washington state.

    Two Lear jets for $5.5 million, including operational costs.

    “Several” yachts that consumed $3.6 million through “purchase, operation and frequent modification.”

    Even after he was caught, the lies and profligate spending continued, prosecutors said.

    Berg concealed about $400,000 from bankruptcy trustees while claiming to be cooperating. He sold a home he did not disclose in his bankruptcy filing, pocketing the proceeds and depositing the undisclosed windfall “into a series of bank accounts he concealed from the trustee.”

    While his investors were left holding the bag, Berg used the cash to make lease payments on a Porsche Cayenne and Porsche 911 Turbo Cabriolet. In addition, prosecutors said, he paid a year’s rent up front on a Los Angeles apartment, bought an Audi S5 convertible, purchased insurance for “jet skis” and a yacht — and plunked down a retainer for a criminal defense attorney.

    Berg was charged criminally in November 2010 with wire fraud, money laundering and bankruptcy fraud. He pleaded guilty in August 2011.

    “Those who peddle false investments and prey on investors for their own personal financial benefit need to understand that law enforcement will not sit by and let it happen,” said Kenneth J. Hines, IRS special agent in charge of the Pacific Northwest.

    It was a case of “unadulterated greed,” a top FBI agent in Seattle said.

    “Mr. Berg took advantage of hopeful investors — many of them senior citizens who depended on their carefully built savings to afford assisted living, medical care, and higher educational opportunities for future generations,” said Steven M. Dean, assistant special agent in charge of the Seattle office.

    The day of reckoning for Berg, 49, came yesterday.

    Prior to sentencing Berg to 18 years in federal prison, U.S. District Judge Richard A. Jones told Berg “he had ‘reckless disregard for his victims . . . and had no moral compass,” prosecutors said, quoting the judge.

    Restitution is still being compiled. Prosecutors said it is expected to top $100 million, noting that Berg’s real-estate and financial swindle took in $245 million between 2001 and 2009 and consisted of schemes within schemes.

    Without investors’ knowledge, about $45 million was peeled off to acquire buses and to operate a transportation company known as MTR Western and subsidiaries.

    The long-running Berg swindle defrauded more than 800 investors, prosecutors said.

    Here is an outtake from the government’s sentencing memo. (Italics added):

    “Indeed, many of Mr. Berg’s victims will be forced to make significant changes to their lifestyle and that of their families such as foregoing retirement, taking additional jobs to support their children’s’ education and selling their homes. Others are likely to be forced into bankruptcy and may also lose their homes because of the financial devastation Mr.Berg’s fraud has caused.”

    Read a Seattle Times story on Berg’s sentencing and courtroom comments. Visit the YouTube site of the Times to see a Berg Ponzi sales pitch. (He references Bernard Madoff while addressing the audience.)

  • URGENT >> BULLETIN >> MOVING: AdSurfDaily Figure and Purported ‘Sovereign Citizen’ Kenneth Wayne Leaming Facing New Federal Felony Charges

    Leaming

    UPDATED 1:33 P.M. ET WITH LINK TO INDICTMENT: AdSurfDaily figure and purported “sovereign citizen” Kenneth Wayne Leaming is facing new federal-felony charges.

    Leaming, 56, originally was arrested in November 2011 by an FBI terrorism task force on charges of filing false liens against at least five public officials involved in the ASD Ponzi scheme case.

    Prosecutors now say he faces charges in addition to the ones originally filed and will be arraigned on the charges tomorrow in Tacoma, Wash.

    Among the new charges are concealing a person from arrest, being a felon in possession of a firearm and using a false and fictitious instrument, the office of U.S. Attorney Jenny A. Durkan of the Western District of Washington said.

    Leaming is among at least six purported “sovereign citizens” recently charged or convicted of crimes in the western section of the state.

    Timothy Garrison, 60, of Mount Vernon, Wash., was sentenced yesterday to 42 months in federal prison for a tax scam that cost the U.S. government more than $2.5 million.

    Like Leaming, Garrison’s activities included filing false liens. He also made “threats to ‘arrest’ law enforcement officers,” prosecutors said.

    “No one is above the law,” Durkan said. “[Garrison’s] scheme now creates a hardship for those who put their trust in Mr. Garrison – they have big tax bills to pay. His further abuse of the legal system with fraudulent liens and so-called ‘arrest warrants,’ is a dangerous mix for our law enforcement officers who are trying to keep our communities safe.”

    A convicted felon prior to the charges for which he was sentenced yesterday, Garrison assisted in the filing of more than 50 returns with false or fraudulent information, prosecutors said.

    When Leaming was arrested in November, he was found with two federal fugitives from Arkansas, along with firearms, prosecutors said.

    UPDATE AT 1:33 P.M. ET. Here is a link to the indictment, which also names alleged Leaming associate David Carroll Stephenson in a count of retaliating against a federal judge or federal law-enforcement officer. Stephenson currently is serving time in an Arizona federal prison in an earlier case, and prosecutors said he’ll be brought to Washington state on the new retaliation charge against him.  He is referenced in this November 2010 PP Blog story on a Leaming email sent to ASD members. Stephenson also is referenced in this November 2011 Leaming story about certain communications allegedly directed at U.S. Chief Justice John Roberts at the behest of Stephenson.

    The indictment describes the weapons allegedly found with Leaming and describes the fugitives by their initials. The PP Blog previously confirmed that the fugitives were Timothy Shawn Donavan and Sharon Jeannette Henningsen, who were wanted in an alleged mail-fraud caper involving envelope stuffing in Arkansas.

  • BULLETIN: Kenneth Wayne Leaming Will Remain In Jail; Judge At Bail Hearing Today Ruled Him A Flight Risk And Danger To The Community

    Kenneth Wayne Leaming

    BULLETIN: Purported “sovereign citizen” and AdSurfDaily figure Kenneth Wayne Leaming will remain jailed after a judge at a bail hearing today found that Leaming was a flight risk and a danger to the community, the office of U.S. Attorney Jenny A. Durkan of the Western District of Washington said this evening.

    Leaming, 55, of Spanaway, Wash., was arrested last month on charges of filing false liens against public officials involved in the ASD Ponzi scheme case in the District of Columbia. The liens allegedly were filed in Pierce County in Washington state.

    In advance of today’s 3 p.m. PT hearing, Leaming argued in court filings that he should be freed pending trial. U.S. Magistrate Judge J. Richard Creatura disagreed at today’s hearing, which was held in Tacoma.

    Leaming has been detained at the Sea Tac Federal Detention Center near Seattle since his Nov. 22 arrest. Prosecutors said last week that firearms were found at the Leaming arrest scene.

    At a proceeding last month, Creatura preliminarily found that Leaming had no adequate residence and that “no condition or combination of conditions which defendant can meet will reasonably assure the appearance of the defendant as required and/or the safety of any other person and the community.”

    Creatura specifically found at the first proceeding that Leaming’s history included a “failure to comply with Court orders and terms of supervision” in a previous case in which he was charged with piloting an airplane without a license.

    On one of the occasions in which he violated his probation in the aircraft-piloting case, Leaming claimed he had “diplomatic status or immunity.” On another occasion, he filed a “vexatious lawsuit lien or retaliatory complaint,” according to the FBI.

    Records show that Leaming tried to overturn his conviction in the aircraft-piloting case by making the strange assertion that the court hearing the case was a “BANK.”