Tag: U.S. Secret Service

  • EDITORIAL: The ‘Zeek-Step,’ The Stepfordian Shuffle And The Stalinist HYIP

    On Jan. 22, 2011, nearly two years ago and long before the SEC brought the Zeek Ponzi scheme case in August 2012, the PP Blog proposed a new term in an effort to distill the economic and logistical nightmares of viral Internet crime to their essence: fraud creep. This followed our Dec. 12, 2010, post, which explained that America’s largest sports stadiums may not be large enough to accommodate all the victims of a single, web-based crime.

    Today the Blog is proposing another new term: Zeek-step, also known as “The Stepfordian Shuffle.” Zeek-step gets its name from the collapsed Zeek Rewards “program,” a 1.5.-percent-a-day ROI abomination (with accompanying recruitment commissions) boosted in part by serial MLM racketeers and Ponzi-forum criminals who pretended the 2008 AdSurfDaily Ponzi case never happened.

    To do the Zeek-step is to pretend the ASD Ponzi case brought by the U.S. Secret Service more than four years ago is meaningless. At the same time, the Zeek-step is characterized by post-complaint efforts to demonize the SEC and the receiver — and to paint Zeek as a noble enterprise, the sender of a high tide that would lift all MLM boats. The trouble with that claim is that the purported high tide appears to have sunk more than 80 percent of vessels that sought to navigate the Zeek waters.

    If you’re a Zeek victim — and if you’re unfamiliar with the ASD case — you should acquaint yourself with it right away. “Programs” such as ASD and Zeek were cancers on the global marketplace. The math of such schemes is approximately this: 86 percent of participants will become “losers” who subsidize enormous “profits” for a super-class consisting of about 14 percent — the “winners.”

    There may be 1 million or more victims of Zeek, according to court filings. Putting it another way, Zeek could fill the Rose Bowl to capacity with victims about 10 times over. The logistical challenges confronting the court-appointed receiver in the Zeek case may be unprecedented. So, yes, Zeek was an instance of fraud creep. The ASD case — large for its time four years ago with about 100,000 members — has been dwarfed by Zeek.

    Protecting The Super-Class

    Although the Zeeks of the world often are positioned as the byproduct of ingenious Democratic Capitalism even as critics incongruously are dismissed as Communists, Socialists, Nazis and enemies of the “free market,” the fact remains that “programs” such as Zeek are designed to channel huge sums to a super-class that largely is preordained. If Zeek were a political entity, this super-class would be seen as a Soviet-era Politburo. The rest of the field would consist of peasants who keep the uppermost Stalinists in fine liquor and cigars.

    One of the chief incongruities of “programs” such as Zeek is that “defenders” invariably position themselves as visionary Capitalists and rail against Statism — indeed, it’s axiomatic in HYIP schemes that a government agency that stops a scheme will be described as evil — and yet the “programs” being defended are all about keeping the Stalinists in their Chaikas and dachas.

    One way to view Zeek is as a for-profit enterprise that taxed 86 percent of its participants at 100 percent to create the “profits” for the elitist 14 percent. It is likely that some of the people among the 14 percent paid ZERO DOLLARS to Zeek. Zeek was particularly noxious because it planted the seed that MLMers without big lists still could profit by sending the company up to $10,000 and generating a profit over time from an abomination known as the Retail Points Pool.

    The SEC said Zeek manipulated the numbers to make that appear possible, to make it appear as though Zeek were a profitable enterprise capable of paying a return of 1.5 percent a day to potentially millions of people. The Secret Service said ASD did the same thing.

    Zeek was offensive at many levels, including the intellectual one. Most notable, in our view, is that purported Capitalists “defending” Zeek by railing against alleged Statism as practiced by the SEC don’t seem to make the connection that Zeek set things up to the maximum advantage of the Stalinists of the Electronic Age.

    A Ponzi-forum huckster with a big list and practiced in the art of turning blind eye to every HYIP fraud scheme that comes down the pike had a decided advantage over, say, an 85-year-old Florida widow who maxed out her credit card to join Zeek because the huckster caused her to believe she’d have more to leave to her children and grandchildren when God called her home.

    It is our hope that the SEC and the U.S. Department of Justice will act aggressively and quickly to oppose a motion filed Friday by certain members of the alleged Zeek Rewards Ponzi scheme to appoint an “examiner.”

    Jordan Maglich of PonziTracker has a fine story on Friday’s filing. Could it be true that some Zeekers actually want to further deplete the receivership estate of resources that should go to true victims?

    In the PP Blog’s view, embracing a story that Zeek was a legitimate Capitalist venture is to embrace a wicked myth. Hell, Stalin himself might have been the first in, seeing the beauty of how the profits could have propped up the Politburo. If the initial scheme that drove the vast majority of the profits to the elite Statists collapsed, he could simply have announced another five-year plan. PolitburoBids2.com?

     

  • Nathaniel Woods Plants Seed That Zeek Receiver Issued ‘Bogus Subpoena’ And Committed Felony; Claims Reminiscent Of Assertions Made In AdSurfDaily Ponzi Case

    UPDATED 5 P.M. ET (U.S.A.) Various members of the Florida-based AdSurfDaily 1-percent-a-day Ponzi scheme advanced various theories that judges, prosecutors and investigators committed various felonies during the course of the probe and follow-up actions in court. The claims were absurd on their face and, when the arguments were rejected, they were replaced by conspiracy theories. Time after time the conspiracy theories expanded to accommodate unpleasant fact sets, with various “defenders” of ASD retreating into an infinite set of contingencies and conflating one artificial reality after another.

    Now, a Florida resident and apparent participant in Zeek Rewards has filed a document in federal court that accuses the court-appointed receiver in the Zeek Ponzi scheme case of committing a felony. The receiver, Kenneth D. Bell, is a former federal prosecutor who once successfully prosecuted a Hezbollah terrorist cell operating in the United States.

    The PP Blog contacted the Zeek receivership today to seek comment from Bell. The Blog’s message was not immediately returned.

    In separate filings that appear on the docket of Senior U.S. District Judge Graham C. Mullen of the Western District of North Carolina, Nathaniel Woods claimed Bell or Bell’s receivership team unlawfully mailed a “bogus subpoena” to him in Ocala, Fla., thus committing a felony under Florida law.

    Mullen is presiding over the Zeek Ponzi case. In August, the SEC accused Zeek of operating a $600 million Ponzi- and pyramid scheme. Zeek’s business model was very similar to the model of ASD. ASD’s business practices triggered both civil and criminal investigations by the U.S. Secret Service in 2008.

    The subpoena, Woods claims, was meant for the purposes of “intimidation and harassment” on the part of the receiver.

    And Woods further claims that sending a “bogus subpoena” from North Carolina to Florida through the U.S. Mail constitutes “simulated process” under Florida law, a “third degree felony.”

    An accompanying document filed by Woods as an exhibit claims that “preliminary Zeek Rewards records” reviewed by the the receivership show that Woods received more than $496,000 from Zeek but paid nothing (“$0.00”) into the purported program.

    Bell is seeking the return of the money, describing it as “money lost by victims,” according to the exhibit.

    Woods is seeking to quash the subpoena, which demands records of Woods’ interactions with Zeek dating back to January 2010. He also claims the subpoena was only an “alleged subpoena” and was improperly served.

    A domain styled “500FREEBIDS4U.COM” is registered in the name of Nathaniel Woods at the Ocala street address to which the subpoena was sent, according to records. Other domains listed with an email address that appears on the registration data attributed to Nathanial Woods include Mybidshack10k.com, Mybidshackhow.info, Mybidshack4u.com and Mybidshackearn.info.

    Daryle Douglas, a onetime purported Zeek executive, also has been associated with a MyBidShack entity, according to researcher “K. Chang.”

    Zeek was a purported “penny auction” company operated by Paul R. Burks through Rex Venture Group LLC in Lexington, N.C. The penny-auction site was known as Zeekler. Zeek’s MLM arm was known as Zeek Rewards. Burks has consented to a judgment in the case. He has neither admitted nor denied the SEC’s allegations, which include securities fraud and the sale of unregistered securities.

    On Aug. 17, the U.S. Secret Service said it also was investigating Zeek. The SEC has said Burks duped investors into believing the purported Zeek “program” was paying a legitimate return of about 1.5 percent a day.

    Bell has said that perhaps 1 million people sent money to Zeek. Viewed by the number of potential victims and the number of transactions, Zeek may be the largest Ponzi scheme in U.S. history.

    Earlier this month, Bell said the receivership had gathered evidence that nearly 1 billion transactions were conducted through Zeek in about 18 months.

    AdSurfDaily was a Ponzi scheme that promoted a payout of 1 percent a day. It has about 100,000 members and gathered about $119 million, also in about 18 months, according to records.

    Records suggest that Zeek, which launched after the Secret Service brought the ASD Ponzi case, did about five times the dollar volume of ASD and potentially had 20 times the user volume.

    The civil portion of the ASD case dragged out for all or parts of five years. ASD President Andy Bowdoin admitted in May 2012 that ASD was a Ponzi scheme. In August 2012, less than two weeks after the SEC brought the Zeek case, Bowdoin was sentenced to 78 months in federal prison.

    ASD and Zeek are known to have had members in common.

  • SPECIAL REPORT: AdSurfDaily/Zeek Pitchman Todd Disner Gave Thousands To Gingrich, Romney After Soliciting Money To Sue The United States; Records Show Tax Liens Of More Than $405,000 Dating Back To 1999

    EDITOR’S NOTE: ASD was a multilevel-marketing scheme that planted the seed it paid a return of 1 percent a day on top of two-tiered affiliate commissions totaling 15 percent for recruiters. Federal prosecutors described the purported “opportunity” as a Ponzi scheme based in the the small town of Quincy, Fla., and operated by recidivist securities felon Andy Bowdoin.

    UPDATED 9:46 A.M. ET (NOV. 18, U.S.A.) A Florida man who claimed in a November 2011 lawsuit against the United States that AdSurfDaily was not a Ponzi scheme doled out thousands of dollars to Republican candidates and organizations in the following months, records show.

    The man, ASD promoter Todd Disner of Miami, joined with fellow Miami resident and suspended Connecticut attorney Dwight Owen Schweitzer in suing the United States as pro se plaintiffs after soliciting donations from fellow ASD members to fund the lawsuit earlier in 2011, according to records. As the lawsuit proceeded, Disner and fellow ASD promoter Schweitzer raised the prospect in court filings that the seizure of ASD’s database in a 2008 case brought by the U.S. Secret Service and federal prosecutors in the District of Columbia could lead to the ASD duo’s prosecution for tax evasion.

    A federal judge tossed the lawsuit in August 2012, but Disner and Schwetizer are appealing. They have accused the judge of “sophistry.”

    Both Disner and Schweitzer have been engaged in continuous litigation against the United States for more than a year. Neither has been charged with a crime. After their days promoting ASD, Disner and Schweitzer went on to promote Zeek Rewards, an ASD-like,  1.5-percent-a-day “program” with accompanying commissions that triggered probes by both the SEC and the U.S. Secret Service. On Aug. 17, the SEC accused North Carolina-based Zeek of operating a $600 million Ponzi-and pyramid scheme that potentially swindled more than 1 million investors.

    Zeek operator Paul R. Burks did not contest the SEC’s civil allegations and consented to a judgment in the case. Records show that Burks gave $2,500 to the campaign of GOP Presidential hopeful Ron Paul between 2011 and early 2012.

    On Dec. 26, 2011, only weeks after the Disner/Schweitzer lawsuit was filed against the government, Disner provided a donation of $1,000 to the GOP Presidential campaign of Newt Gingrich (Newt 2012), Federal Election Commission records show. The Gingrich donation by Disner appears to have been his first to a national candidate or organization. The FEC database, for example, shows no donations from Disner between Jan. 1, 1990, and Dec. 25, 2011.

    Disner matched the Dec. 26 donation with another $1,000 to Gingrich in January 2012, according to FEC records.

    Separately, records in Miami-Dade County show that the IRS filed a tax lien against Disner for $101,723 on Aug. 1, 2006. Included in that sum was $95,015.97 allegedly owed from 1999, and $6,707.77 allegedly owed from 2002.

    ASD, operated by the now-convicted and jailed Andy Bowdoin, launched just weeks after the IRS filed the lien against Disner. Two years to the day after the lien was recorded in Miami-Dade, the Secret Service seized $65.8 million from 10 Bowdoin bank accounts.  A raid of ASD’s headquarters followed four days later. Bowdoin later was charged criminally with operating a Ponzi scheme. Among the allegations against Bowdoin was that he had used money from the ASD Ponzi scheme to make a donation to the National Republican Congressional Committee.

    Bowdoin, 77, pleaded guilty to wire fraud in May 2012. In August, he was sentenced to 78 months in federal prison. Prosecutors said he was at the helm of a $119 million Ponzi scheme and promoted other MLM fraud schemes even after his December 2010 arrest.

    On Nov. 21, 2007, according to records, the IRS filed another lien against Disner in Miami-Dade totaling $294,940.89. This lien was for the 2003 and 2004 tax years. The IRS filed yet another lien against Disner on Oct. 22, 2008. This one sought $8,661.36 for the 2000 and 2001 tax years.

    All in all, records show three tax liens against Disner for the combined sum of $405,325.99.

    Whether Disner has cleared the IRS liens is unclear. What is clear is that, in June 2012, he raised the prospect in court filings that he could be prosecuted for tax evasion because of the seizure of ASD’s database in 2008. Records in the Zeek case, meanwhile, show that the Zeek database also has been seized.

    Records suggest that, with Gingrich out of the GOP Presidential race by May 2012, Disner switched his support to Mitt Romney, who went on to become the party’s nominee. Romney ultimately lost in the general election to President Obama, a Democrat seeking a second term.

    Gingrich, a former Georgia Congressman, is a former Speaker of the U.S. House of Representatives.

    On June 25, 2012, Disner gave $1,000 to Romney for President Inc., according to FEC records.

    Just days earlier — on June 18, 2012 — Disner and Schweizer claimed in federal court that the government’s Ponzi case against ASD was a “house of cards,” despite Bowdoin’s guilty plea and acknowledgment that he had operated a Ponzi scheme and that ASD never had operated lawfully after its 2006 inception.

    A month later — on July 17, 2012 — Disner gave $200 to the Republican National Committee, according to FEC records.

    Exactly a month after that — on Aug. 17, 2012 — the SEC filed an emergency action in federal court that accused Burks of presiding over a massive fraud scheme that effectively extended across the world.

    Within days of the SEC action, Disner — who previously solicited money to sue the United States for alleged misdeeds in the ASD Ponzi case — participated in a conference call with self-described Zeek “consultant” Robert Craddock, who himself was soliciting money for some sort of court action against the SEC or the court-appointed receiver in the Zeek case.

    Nothing has been filed by Craddock to date. During one call, Craddock dropped the name of former Florida Attorney General Bill McCollum, claiming McCollum as a “friend.” McCollum is a Republican. In 2008, while attorney general, McCollum accused ASD of operating a pyramid scheme.

    Some ASD members reacted by suggesting that McCollum and a Florida TV station that carried the news of the ASD lawsuit should be charged with Deceptive Trade Practices.

    Despite Craddock’s claim after the SEC action that McCollum’s law firm SNR Denton had become the attorneys for a Craddock and a group of Zeek members, SNR Denton appears to have decided not to represent Craddock or his group.

    FEC records show that Disner gave $1,500 to the Republican National Committee in September 2012.

  • DEVELOPING STORY: Zeek Winners Begin To Receive Subpoenas

    Alleged Ponzi scheme Zeek Rewards wrapped itself in the American flag and symbols such as the American penny coin to attract business. The purported “opportunity”  has created problems for hundreds of thousands of members in the United States and other countries.

    The PP Blog has received a report that some members of Zeek have received subpoenas issued by the court-appointed receiver in the Zeek Rewards Ponzi scheme case. The SEC alleged in August that Zeek was a $600 million Ponzi and pyramid scheme operated by Paul R. Burks and Rex Venture Group LLC.

    Receiver Kenneth B. Bell said earlier this week that a first round of about 1,200 subpoenas would be issued to “affiliates who profited most from ZeekRewards.”

    Early details are sketchy about precisely what information the subpoenas demand. Bell wrote on the receivership website that recipients “are required to fully respond to the subpoena.

    “If you do not have possession, custody or control of any of the documents requested simply say so in responding to the subpoena. However, you are required to make a full reasonable effort to locate all documents requested, including electronic documents and email,” Bell wrote.

    The issuance of the subpoenas demonstrates that online HYIPs dressed up as multilevel-marketing “programs” can — at a minimum — create civil exposure for participants. Profits received from such schemes are viewed as ill-gotten gains subject to clawback.

    In an Oct. 8 court filing, Bell advised Senior U.S. District Judge Graham C. Mullen that he planned to pursue Zeek winners and others through common-law and and clawback claims “under applicable fraudulent transfer statutes.”

    In addition to Zeek winners, potential clawback targets include Zeek officers, employees and professionals who benefited from the scheme, according to Bell’s Oct. 8 filing. As many as 100,000 people potentially received ill-gotten gains from Zeek, while about 800,000 Zeek members experienced losses.

    Zeek wrapped itself in the American flag while pitching its offer globally, claiming among other things that winners of its Zeekler auctions for sums of U.S. cash would be paid through offshore payment processors. North Carolina-based Zeek has never explained the striking incongruity of auctioning U.S. cash and offering to deliver it via payment processors linked to fraud scheme after fraud scheme promoted on Ponzi scheme forums such as TalkGold and MoneyMakerGroup.

    Auctions for cash mysteriously went missing from Zeek in June. On Aug. 4, 13 days before the SEC filed an emergency action to halt the alleged Zeek Ponzi scheme, the company publicly complained about “North Carolina Credit Unions” that were warning customers about Zeek.

    On June 5, the company bizarrely planted the seed that, if Zeek instructed members to change their preference in dispensing toilet paper, they should do it to demonstrate how coachable they are. Just days earlier — on May 28, Memorial Day — the company claimed it was closing two U.S. bank accounts and urged members to cash commission checks by June 1 or they would bounce.

    Zeek’s auction arm was known as Zeekler and was married to Zeek Rewards, the MLM side of the business. The SEC said in August that Zeek commingled funds and that Burks “unilaterally and arbitrarily” determined Zeek’s daily dividend rate so that it averaged “approximately 1.5% per day, giving investors the false impression that the business is profitable.”

    In 2008 and 2009, the U.S. Secret Service made similar allegations against AdSurfDaily and operator Andy Bowdoin. Bowdoin, 77, was charged criminally in December 2010. He pleaded guilty to a Ponzi-related charge of wire fraud in May 2012. Bowdoin was sentenced in August 2012 to 78 months in federal prison.

    ASD operated as an “autosurf” HYIP that planted the seed that members would receive a return of 1 percent a day.

    Precisely how many Zeek members live outside the United States and benefited from the scheme is unclear. In July, the PP Blog reported that a Zeek-related article carried on Google News claimed that Zeek had 100,000 members in Brazil alone.

    An issue that potentially could emerge in the coming weeks is whether the receiver will be successful in seeking clawbacks from non-U.S. members of Zeek who received more from the scheme than they put in. How many Zeek members fit the profile is not yet known.

    HYIPs that operate across borders on the Internet introduce the specter of international red tape and also potentially bring language barriers into play. In the days after the SEC brought the Zeek case, some purported international members of Zeek effectively thumbed their noses at the United States and Zeek victims, crowing on Ponzi-scheme forums that they’d keep their Zeek money no matter what.

     

  • SOBERING: Cyber Criminals May Be Responsible For ‘The Greatest Transfer Of Wealth In History,’ Top Justice Department Official Says At Seattle Conference

    “The Intelligence Community’s most recent Worldwide Threat Assessment confirms that U.S. networks have already been subject to ‘extensive illicit intrusions.’ The head of the National Security Agency and the Pentagon’s Cyber Command, for one, believes such intrusions may have resulted in ‘the greatest transfer of wealth in history.’”Lisa Monaco, Assistant Attorney General for National Security, Oct. 25, 2012

    EDITOR’S NOTE: These are remarks prepared for delivery by Lisa Monaco, Assistant Attorney General for National Security, at the “2012 Cybercrime Conference” today in Seattle. Monaco presides over the Justice Department’s National Security Division.

    The conference was hosted by U.S. Attorney Jenny A. Durkan of the Western District of Washington. Durkan’s name may be familiar to longtime PP Blog readers because her office is involved in the prosecution of AdSurfDaily story figure Kenneth Wayne Leaming, a purported “sovereign citizen” charged with filing false liens against five public officials who had roles in the ASD Ponzi prosecution. ASD was a Florida-based online scam that created thousands of victims. Leaming also is accused of uttering a bogus “bonded promissory note” for $1 million and passing it at U.S. Bank, harboring fugitives implicated in a separate fraud scheme and being a felon in possession of firearms.

    ** ______________________________________________ **

    Good afternoon.   Thank you for having me here today.   I am grateful to the U.S. Attorney’s Office for the Western District of Washington and to U.S. Attorney Jenny A. Durkan, for organizing a conference on this important topic.   Thank you all for taking the time out of your schedules to discuss these issues.   Events like these are critical to helping us succeed in combating cyber threats.

    The Threat

    If there is one thing we all know from the presentations today and our work in the field, it is the seriousness of the cyber threat.   The President has called it “one of the most serious economic and national security challenges we face as a nation.”   It’s hard to quibble with that.   Hardly a day goes by when cyber events don’t show up in the news.   As many of you know, over the last several weeks, financial institutions in the United States have been hit by a series of Distributed Denial of Service (or DDOS) attacks.   Such attacks are relatively easy to carry out, but they can cause serious harm by disrupting companies’ website services and preventing customer access.   Although these disruptions have been temporary, their frequency and persistence underscores recent Intelligence Community warnings about the “breadth and sophistication of computer network operations . . . by both state and nonstate actors.”   The cyber alarm bell has been rung.   The Intelligence Community’s most recent Worldwide Threat Assessment confirms that U.S. networks have already been subject to “extensive illicit intrusions.”   The head of the National Security Agency and the Pentagon’s Cyber Command, for one, believes such intrusions may have resulted in “the greatest transfer of wealth in history.”

    We often think of national security threats, like that of a catastrophic terrorist attack, as questions about prevention.   But the cyber threat is not simply looming – it is here.   It is present and growing.   Although we have not yet experienced a devastating cyber attack along the lines of the “cyber Pearl Harbor” that Defense Secretary Panetta recently mentioned – we are already facing the threat of a death by a thousand cuts.   Outside the public eye, a slow hemorrhaging is occurring; a range of cyber activities is incrementally diminishing our security and siphoning off valuable economic assets.   This present-day reality makes the threat of cyber-generated physical attacks, like those that might disrupt the power grid, appear no longer to be the stuff of science fiction.   And all of this comes against the backdrop of sobering forecasts from the highest ranks of our national security community.   FBI Director Mueller – a man not prone to overstatement – predicts that “the cyber threat will pose the number one threat to our country” in “the not too distant future.”

    Despite all we know about intrusions against U.S. businesses and government agencies, what is more sobering still is the Intelligence Community’s assessment that “many intrusions . . . are not being detected.”   Even with respect to those that are detected, identifying who is behind cyber activity can be uniquely challenging.   Technologies can obscure perpetrators’ identities, wiping away digital footprints or leaving investigative trails that are as long as the web is wide.   Cyber intrusions don’t announce themselves or their purpose at the threshold.   Depending on the circumstances, the purpose or endgame of a particular intrusion may be anyone’s guess – is it espionage?   Mere mischief?   Theft?   An act of war?

    The threats are as varied as the actors who carry them out.   A growing number of sophisticated state actors have both the desire and the capability to steal sensitive data, trade secrets, and intellectual property for military and competitive advantage.   While most of the state-sponsored intrusions we are aware of remain classified, the onslaught of network intrusions believed to be state-sponsored is widely reported in the media.   We know the Intelligence Community has noted that China and Russia are state actors of “particular concern,” and that “entities within these countries are responsible for extensive illicit intrusions into US computer networks and theft of US intellectual property.”   Indeed, “Chinese actors are,” according to a public report of our top counterintelligence officials, “the world’s most active and persistent perpetrators of economic espionage.”   And we know that Secretary of Defense Panetta has stated that “Iran has also undertaken a concerted effort to use cyberspace to its advantage.”

    In cases involving state actors and others, trusted insiders pose particular risks.   Those inside U.S. corporations and agencies may exploit their access to funnel information to foreign nation states.   In these cases, perimeter defense isn’t worth much; the enemy is already inside the gates.   The Justice Department has prosecuted a number of corporate insiders and others who obtained trade secrets or technical data from major U.S. companies and routed them to other nations via cyberspace.

    Earlier this year, in the first indictment of foreign state-owned entities for economic espionage, several companies controlled by the government of China were charged in San Francisco for their alleged roles in stealing a proprietary chemical compound developed by a U.S. company for China’s benefit.   While this particular theft was not cyber-enabled, cyberspace makes economic espionage that much easier.   In an Internet age, it is no longer necessary to sneak goods out of the country in a suitcase; a single click of a mouse can transmit volumes of data overseas.   Indeed, the Department has secured convictions of individuals who stole corporate trade secrets by simply e-mailing them overseas.   In one recent case, a chemist downloaded a breakthrough chemical process just developed by his company in the United States and e-mailed it to a university in China where he had secretly accepted a new job.

    The other major national security threat in cyberspace is cyber-enabled terrorism.   Although we have not yet encountered terrorist organizations using the Internet to launch a full-scale cyber attack against the United States, we believe it is a question of when, not if, they will attempt to do so.   Individuals affiliated with or sympathetic to terrorist organizations are seeking such capabilities. We have already seen terrorists exhorting their followers to engage in cyber attacks on America.   Just this year, an al-Qaeda video released publicly by the Senate Homeland Security Committee encouraged al-Qaeda followers to engage in “electronic jihad” by carrying out cyber attacks against the West.

    Terrorists have already begun using cyberspace to facilitate bomb plots and other operations.   These activities go beyond the use of cyberspace to spread propaganda and recruit followers.   For example, the individuals who planned the attempted Times Square bombing in May 2010 used public web cameras for reconnaissance, file sharing sites to share operational details, and remote conferencing software to communicate.   Najibullah Zazi attempted to carry out suicide bomb attacks against the New York subways around the anniversary of 9/11 three years ago.   After returning to the United States from terrorist travel, he used the Internet to access the bomb-making instructions he had received in Pakistan and tried to communicate via the Internet in code with his al-Qaeda handlers in Pakistan just prior to the planned attack.   Khalid Aldawsari, who was convicted in June of this year in the Northern District of Texas, used the Internet extensively to research U.S. targets and to purchase chemicals and other bomb-making materials.

    Evolving To Meet the Threat — Learning from the Counterterrorism Model

    The threats we face in cyberspace are changing, and we must change with them.   Of course, we have faced similar challenges before.   After the devastating attacks eleven years ago, we learned some hard lessons.   We have since put those lessons into practice:   working across agencies to share information, and bringing down legal, structural, and cultural barriers.   Law enforcement’s approach to terrorism has become intelligence-led and threat-driven.   We have erected new structures, including the National Security Division, which I am privileged to lead.   As the first new litigating division at the Justice Department in nearly fifty years, the National Security Division was created to bring together intelligence lawyers and operators on the one hand, and prosecutors and law enforcement agents on the other, to focus all talent on the threats before us.

    Since September 11, we have made great progress against terrorism by developing effective partnerships that help us identify threats and choose the best tools available to disrupt them.   Much of our success is attributable to the all-hands-on-deck approach we have adopted for countering terrorism.   From where I sit, I can see this change reflected in our day-to-day operations.   In our investigations, for instance, we actively seek to preserve the ability to prosecute even while using intelligence tools and vice versa.   We must bring the same approach, a whole-of-government approach, an all-tools approach, to combat cyber threats to our national security.   Investigations and prosecutions will be critical tools for deterrence and disruption, ones that we have a responsibility to use.   But they are not the only options available.   The diversity of cyber threats and cyber threat actors demands a diverse response.   This nation has many tools – intelligence, law enforcement, military, diplomatic, and economic – at its collective disposal as well as deep, and diverse, expertise.   The trick is in harnessing our collective resources to work effectively together.

    Those of us charged with investigating and disrupting cyber threats to national security and advising operators and agents must be creative and forward-looking in our approach.   First, we must consider – in conjunction with our partners – what cyber threats will look like in the coming years.   Only by knowing what is on the horizon can we ensure that the right tools exist to address cyber threats before they materialize.   Second, we must be vigilant to prevent the formation of what the WMD Commission after 9/11 called “legal myths” that have led to “uncertainty” in the past “about real legal prohibitions” among operators.   And, together with operators, we must consider what kinds of tools, investigations, and outreach we can launch now to lay the groundwork for future cyber efforts.   These may be relatively simple things, like standardized protocols and established points of contact to make reporting intrusions easier. Or they may take the form of institutional relationships between the government and the private sector for sharing information.

    On an operational level, both public and private sector attorneys need to be able to tell clients what options they have available to deal with cyber threats.   If cyberspace is an “information super-highway,” then lawyers are the GPS system in a client’s car:   It is our job to tell the client how to get there.   When obstacles get in the way, we should tell the client how to avoid them.   We must look ahead, anticipate jams, and route clients around them.

    This metaphor is particularly applicable in the cyber realm.   As cyber events unfold in real time, we learn more about our adversary, the means available to him or her, and the vulnerabilities in our own systems.   Our advice must adapt accordingly.   For those of us in government who act as operational lawyers, it is important in this environment to be clear about where the legal debate stops and the policy debate begins.   For those of you in the private sector, I imagine one concern is that your clients not be left vulnerable in a shifting legal landscape.   And for those of you in academia, we need your help testing boundaries and pushing forward with questions that need to be asked and answered by all of us as we navigate this legal space together.

    One of the significant operational challenges we face is the same one the Intelligence Community confronted in reorganizing itself after the attacks of September 11.   The cyber threat demands ready and fluid means of sharing information and coordinating our actions.   At the National Security Division, we have made this evolution, and combating this threat, a top priority.   Working with our partners – including the FBI, the U.S. Attorney community, and the Computer Crime and Intellectual Property Section (one of their leaders, Richard Downing is here today) – we are ensuring that all resources are brought to bear against national security cyber threats.

    To help accomplish these goals, the National Security Division established earlier this year a National Security Cyber Specialists’ Network to serve as a one-stop shop in the Justice Department for national security-related cyber matters.   The network brings together experts from across the National Security Division and the Criminal Division and serves as a centralized resource for the private sector, prosecutors, and agents around the country when they learn of national security-related computer intrusions.   Each U.S. Attorney’s office around the country has designated a point of contact for the network.   These skilled Assistant U.S. Attorneys will act as force multipliers, broadening the network’s reach and ensuring a link back to their counterparts at headquarters.   Drawing upon the Joint Terrorism Task Force model, which has been successful in the terrorism realm, the network seeks to improve the flow of national security cyber information to offices throughout the country.   This means more information, earlier on, in national security cyber incidents.   Thanks to the contribution of other parts of the Department, especially CCIPS, the FBI, and the U.S. Attorney’s offices, the network has helped us to focus nationwide on bringing more national security cyber investigations.   Through this nationwide network, we are consolidating and deepening the Department’s expertise, institutionalizing information sharing, ensuring coordination, and pursuing investigations.

    We have also trained our attention on the diverse cyber capabilities that reside throughout the government.   The U.S. Secret Service, the Department of Commerce, and the Department of Defense, not to mention the FBI, are all common partners in this fight, each using their distinct tools to achieve a common goal.   We have enhanced our joint work with the FBI’s National Cyber Investigative Joint Task Force, where we now have a dedicated National Security Division liaison.

    Within DOJ, we are putting more prosecutors against the threat and focusing on how to best equip and educate our cyber cadre.   Through the National Security Cyber Specialists’ Network, we are training prosecutors around the country.   Next month, more than 100 prosecutors will gather in Washington, D.C. to share expertise on everything from digital evidence to the Foreign Intelligence Surveillance Act.   No matter who the perpetrator is, being an effective adviser today requires an understanding of the technologies at hand.   Perhaps we should all take a page from Estonia—where I understand they’re beginning a system of teaching first graders how to program!   As courts confront these technologies, we also have a role in helping them grapple with what these changes mean for the development of the law and interpretations of existing legal authorities.

    Partnership with the Private Sector

    Of course, the need for collaboration does not end there.   While interaction with the private sector is something that does not always come easily to the national security community, which is accustomed to operating in secrecy, it is absolutely necessary here.   The Intelligence Community has noted the considerable portion of U.S. companies that report they have been the victims of cybersecurity breaches as well as the increased volume of malware on U.S. networks.   Private companies are on the front lines.   Individual defenses, as well as broader efforts to reform – like the legislation proposed by the Administration last year – will require our joint efforts.

    To succeed in these efforts, we must develop a greater understanding of the concerns and pressures under which our private sector partners operate.   A home computer user, whose machine is used in a botnet attack might not have much incentive to remove or check for malware.   But a company targeted by such an attack has considerable incentive to do so.   When dealing with corporate victims, the government must understand the competing interests at play.   Companies may have shareholders, reputational concerns, and sometimes legal limitations.   Yet we cannot fight the current or the future threat with old mindsets on either side.   My colleague, the U.S. Attorney for the Southern District of New York, has spoken compellingly about the need for a “culture of security” and a “culture of disclosure” in industry.   For our part, we need to understand the private sector’s concerns; we need to understand that it is not just the red tape of government that industry fears.   They also fear that the disclosure of computer intrusions will bring yellow tape as well – that it will disrupt business by converting the corporate suite into a crime scene.   Reporting breaches and thefts of information is the first step toward preventing future harm.   For our part, we will work with industry.   We will share information where we can and use protective orders and other tools to protect confidential and proprietary information.

    Conclusion

    How we respond to cyber intrusions and attacks, and how we organize and equip ourselves going forward, will have lasting effects on our government and its relationship with the private sector.   Particularly in these early moments, in what will no doubt be a sustained endeavor, it is incumbent upon us to take notes – to identify impediments, legal questions, technical challenges, and address them together.   All the while we must bear in mind the great potential of these technologies and the importance of not stifling them as we find better ways to make them secure.

    We have heard the warnings about the potential for a cyber 9/11, but we are, for the moment, in a position to do something to prevent it.   The cyber threat poses the next test of the imperative that we see law enforcement and national security as joint endeavors.   Our work offers an opportunity to demonstrate the strength and adaptability of the lessons we have learned over the last eleven years in the fight against terrorism.   U.S. Attorney’s Offices – and all of you sitting in this room – are at the forefront of these issues.   I look forward to pursuing the threats we face in partnership.   Thank you for being with us today.

  • BULLETIN: Feds Charge Former Parole Officer, Saying She Facilitated Texas Swindler In ‘Massive Scheme To Defraud Investors’

    BULLETIN: A former Texas Department of Criminal Justice parole officer has been accused of honest services wire fraud and federal programs bribery, amid allegations she developed an “improper relationship” with one of her “assigned parolees” and enabled him to pull off a massive oil-and-gas swindle.

    Nichelle Derricks, 37, of Cedar Hill, Texas, “secretly used her official position with TDCJ to enrich herself and others by soliciting and receiving cash payments, gifts, furniture, household goods and items, food and beverages, and other things of value from the parolee in exchange for favorable official action benefitting the parolee,” the U.S. Department of Justice said this morning.

    A Dallas Observer Blog is reporting that the parolee was Alan Todd May.

    In June 2010, the PP Blog reported that May was captured by the U.S. Marshals Service in San Francisco. He was wanted by the U.S. Secret Service and also was under investigation by the SEC for his multimillion-dollar “Prosper Oil & Gas Inc.” swindle.

    May had a long criminal record and was described by the SEC as a “felon.” In 2010, the U.S. Marshals Service said May had assumed “multiple identities to evade apprehension.”

    May pleaded guilty to wire fraud in December 2010. In February 2012, he was sentenced to 20 years in federal prison.

    Although the Justice Department did not reference May by name in its news release today, the agency said this (italics added):

    The indictment further alleges that Derricks repeatedly allowed the parolee to violate the terms of his parole by, among other things, permitting him to travel outside Texas without prior, written approval and by allowing the parolee to engage in prohibited financial transactions. According to the indictment, such favorable treatment allowed the parolee to facilitate a massive scheme to defraud investors through an oil and gas company founded and operated by the parolee while he was on state parole.

  • AdSurfDaily Figures Todd Disner, Dwight Owen Schweitzer Appeal Lawsuit Dismissal

    AdSurfDaily figures Todd Disner and Dwight Owen Schweitzer — later to become pitchmen for the alleged Zeek Rewards Ponzi scheme — have appealed the dismissal of their ASD-related lawsuit.

    In August, U.S. District Judge Rosemary Collyer dismissed claims by the ASD duo that their 4th Amendment rights had been violated when ASD computer records were seized in 2008.

    Disner and Schweitzer had no standing to make the claim and had no privacy interests in records they voluntarily conveyed to ASD, Collyer ruled.

    In September, the duo sought to reopen the case and have Collyer removed from hearing it, but Collyer said no.

    Disner and Schweitzer now have appealed to the U.S. Court of Appeals for the District of Columbia the Aug. 29 final judgment and their denied motions to reopen the case and have Collyer stand down.

    The combined ASD and Zeek schemes fetched at least $719 million, according to federal records. On Aug. 17, the SEC described Zeek as a $600 million Ponzi- and pyramid fraud.

    ASD was a $119 million Ponzi scheme, according to the U.S. Secret Service. The Secret Service said in August that it also was investigating Zeek.

  • ASD Figure Kenneth Wayne Leaming’s Birther Lawsuit Against Obama, Holder Gets Tossed

    Screen shot: Part of the Leaming/Stephenson complaint demanding gold and silver.

    After he was charged with filing false liens and other crimes and jailed near Seattle, AdSurfDaily story figure and purported “sovereign citizen” Kenneth Wayne Leaming apparently thought it prudent to sue President Obama and U.S. Attorney General Eric Holder.

    Leaming, 56, advanced a theory that Obama was not born in the United States, was not eligible to be President and had appointed Holder unlawfully.

    It therefore followed, according to Leaming and co-plaintiff and former business colleague David Carroll Stephenson, that Holder was “Personating [sic] the Attorney General of the United States” and could not lawfully appoint or delegate authority to “Any United States Attorney.”

    And because Holder had oversight responsibility over the U.S. Attorney’s Office in the Western District of Washington that had brought the criminal charges against Leaming and Stephenson after an FBI probe, the duo apparently surmised, it followed that the prosecution was unlawful and should be declared “VOID For FRAUD” because the U.S. Attorney also is “personating” [sic] a federal officer.

    In their June lawsuit, Leaming and Stephenson demanded compensation in “gold” and “silver” for each day they allegedly were held unlawfully. Over time, the docket of the case swelled to more than 30 entries.

    On Oct. 11, however, U.S. District Judge Robert S. Lasnik dismissed the Leaming/Stephenson lawsuit “for failure to identify any viable claim for relief.”

    The judge also ordered “all pending motions” stricken as moot.

    Leaming and Stephenson remain jailed near Seattle.

    In court filings earlier this month, federal prosecutors said Leaming was instrumental in founding the “County Rangers,” a “sovereign group’s armed enforcement wing.”

    He is charged with filing false liens against at least five federal officials involved in the prosecution of the AdSurfDaily Ponzi scheme, which the U.S. Secret Service described as a fraud operated by Andy Bowdoin that had gathered at least $119 million.

    Bowdoin, 77, was sentenced in August to 78 months in federal prison.

    Leaming initially was arrested by the FBI in November 2011. He was indicted in January 2012 on charges of filing false liens, harboring fugitives, possessing firearms as a convicted felon and uttering a bogus “Bonded Promissory Note” with a face value of $1 million and depositing it in U.S. Bank.

    Stephenson, a tax fraudster already jailed when Leaming was arrested and jailed, worked with Leaming to file false liens against U.S. prison officials, prosecutors said.

    See Nov. 27, 2011, PP Blog story that outlines FBI allegations that Leaming was discussing a way to serve Stepenson-related papers on U.S. Chief Justice John Roberts through the school attended by his children, who are minors.

    Roberts is the top judicial officer in the United States.

  • BULLETIN: Zeek Mystery Deepens: Receiver Says He Discovered ‘Foreign’ Account That Has NOT Been Seized; Meanwhile, $5 Million In Cashier’s Checks From Single U.S. Bank Found At Zeek Headquarters; Firm’s Records Described As ‘Inadequate Or Incomplete’; Secret Service Has Recovered Lion’s Share Of $293 Million Found So Far

    BULLETIN: (5TH UPDATE 6:13 P.M. EDT) The court-appointed receiver in the Zeek Rewards Ponzi scheme case says he discovered that Zeek has “at least one foreign account” that has not been seized.

    It was “not clear” whether the funds would be recoverable despite the fact the bank that holds the account has been served with a freeze order, receiver Kenneth D. Bell said in court filings yesterday.

    Bell did not name the bank or its home country in the filings. Nor did he say how he discovered the account.

    But Bell advised Senior U.S. District Graham C. Mullen of the Western District of North Carolina that he was working with the SEC, the U.S. Secret Service and federal prosecutors to determine “the most efficient and cost effective manner to recover the funds from the entity that controls or the bank that holds this account so that the funds can be used in the distribution plan for this case.”

    The amount allegedly held in the account was not disclosed. Zeek was operated by North Carolina-based Rex Venture Group LLC and Paul R. Burks, the SEC said in August. The agency described Zeek as a $600 million Ponzi- and pyramid fraud operating domestically and internationally.

    Whether Zeek had silent partners or a special class of members is just one of the many mysteries still surrounding the purported “opportunity.”

    Receiver May Have Cooperation Of Certain Insiders

    Bell’s filings yesterday — on the Columbus Day holiday in the United States — made it plain that certain individuals associated with Zeek were cooperating in the receivership probe, sometimes through lawyers. The names of those individuals were not disclosed. Nor was the degree of their cooperation.

    Filings, however, at least hinted that some people close to Zeek had stories to tell.

    “Initial interviews of the Receivership Defendant’s employees and officers who were willing to be interviewed, as well as communications with various third parties, have revealed the identities of numerous other individuals and entities that might have relevant information regarding the Scheme, including potential business associates and investors of the Receivership Defendant and its principals,” Bell advised Mullen.

    Moreover, the report revealed that the U.S. Secret Service largely was responsible for recovering the lion’s share of more than $293 million in Zeek-related financial accounts.

    Forensic Accounting Firm Hired

    Mullen ordered Bell in August to submit a preliminary liquidation plan by Oct. 8 that would update the court on the receivership’s efforts to date and lay out the early groundwork on how Zeek members could file claims.

    Bell described his investigation as “still in its preliminary stages” and “ongoing.”

    During the receivership’s first 52 days, Bell advised Mullen, it was learned that Zeek had about 2.2 million “affiliates,” but that some of those affiliates appeared to have “more than one user id.”

    Approximately 1 million affiliates “paid money into the Zeek Rewards Program,” Bell advised Mullen.

    Bell has hired FTI Consulting Inc., a forensic accounting firm, to assist in the receivership probe, according to yesterday’s receivership filing.

    Meanwhile, the McGuireWoods law firm is counsel for the receiver. Kroll Ontrack is assisting with data recovery and storage, and Gilardi & Co. is hosting the receivership website and providing a means for Bell to communicate with potentially millions of individuals affected by the alleged epic fraud, Bell said in the filing.

    Zeek’s Aug. 17 shutdown by consent after the SEC brought the Ponzi allegations did not stop bills from coming in, Bell said.

    The estate, for example, already has disbursed more than $55,000 for payroll and benefits due employees, “taxes due the United States, North Carolina, and Arkansas” and for property rent and certain ongoing business expenses.

    During the preliminary examination, Bell identified more than $922,000 in accounts payable, including “certain invoices for professional services,” according to the filing.

    Bell advised Mullen that he still was “in the process of determining the validity and amounts of these accounts payable” and ascertaining the priority in which expenses will be paid.

    Zeek Documentation ‘Inadequate Or Incomplete’

    In a passage that may read like a familiar refrain to HYIP Ponzi analysts, Bell advised Mullen that certain Zeek-related financial documentation “has been found to be inadequate or incomplete.”

    Examining paperwork and data will be time-consuming because of “the significant lack of documentation and the organization of this data,” Bell advised the judge.

    Regardless, Bell said, the receivership team would follow the trail “to identify additional assets, trace the proceeds of any fraudulent conduct, evaluate claims of creditor and investors, and identify potential claims against former employees, third parties (including Affiliate-Investors), and others that may have received assets of the Receivership Estate.”

    As the receiver’s probe moves forward and more evidence is gathered and analyzed, clawback claims will be contemplated under “applicable fraudulent transfer statutes against those who ran the operations and ‘net winner’ participants . . .” Bell said.

    Bell envisions an approach that would “first offer those who are required to return money to the Receivership Estate the opportunity to do so cooperatively in an effort to avoid costly litigation for all concerned,” according to yesterday’s filing.

    Below a subhead of “Miscellaneous Assets Recovered,” Bell advised Mullen that $5 million in cashier’s checks from BB&T Bank were located in [Rex Venture Group’s] main office.”

    Zeek mysteriously announced on May 28 — Memorial Day — that it was closing its BB&T account, along with an account at NewBridge Bank. Why Zeek allegedly was in possession of $5 million in cashier’s checks that originated at BB&T was unclear in the receiver’s filing.

    Despite Zeek’s claim online that it was closing the accounts and its prompt to affiliates to cash or deposit Zeek commission checks drawn on the banks before June 1 or they would bounce, court records show that NewBridge still had $11.64 million in Zeek-related funds on deposit.

    Some observers have speculated that events that led to the August collapse of Zeek began in May, with the report from Zeek that it was closing the accounts voluntarily. If the account closures were less than voluntary, however, it may suggest that the banks had become suspicious of Zeek and that the Rex Venture-owned “opportunuity” was engaged in a scramble to find vendors to accept and maintain deposits.

    Court records claim that Zeek used at least 15 domestic and offshore vendors, including Canada’s AlertPay and SolidTrustPay.

    As of Oct. 8, the court-appointed receiver has identified these U.S. domestic companies as providers of services for Rex Venture Group LLC, the operator of the alleged Zeek Rewards Ponzi scheme. The receiver noted in court filings that “certain of the accounts listed above were closed, inactive or had a zero balance” before his August appointment.

    ‘Professionals’ To Receive Scrutiny

    Bell advised Mullen in yesterday’s filing that he also planned to “investigate potential claims against professionals and others” involved with Zeek to determine “who may be liable for the role they played in facilitating the operation.”

    Claims against the unidentified “professionals” and others will be pursued, if warranted, Bell advised the judge.

    Bell further advised Mullen that the receivership would “streamline” operations as much as possible so that Zeek victims and other creditors could receive a disbursement as soon as possible. He did not rule out the possibility of a “preliminary distribution” from seized proceeds.

    No specific timetable was laid out in the filings, but the task of formulating a claims process that potentially needs to accommodate 1 million or more people has begun, Bell said.

    Read the receiver’s filing for more details. (Document provided courtesy of the ASDUpdates Blog.)

     

  • Government Opposes Bids By ASD Figures Todd Disner And Dwight Owen Schweitzer To Reopen Lawsuit And Boot Federal Judge From Case

    AdSurfDaily figures Todd Disner and Dwight Owen Schweitzer should not be permitted to reopen their lawsuit against the government for alleged misdeeds in bringing the ASD Ponzi-scheme case in August 2008, government lawyers said in court filings today.

    Moreover, the bid by Disner and Schweitzer to force U.S. District Judge Rosemary Collyer of the District of Columbia to recuse herself from the case should fail because the ASD duo’s “dissatisfaction with the Court’s rulings is not a basis for recusal,” the lawyers said.

    Disner and Schweitzer, who became pitchmen for the alleged Zeek Rewards Ponzi scheme after their ASD days ended, sued the United States in November 2011. Collyer dismissed their lawsuit in late August, ruling that Disner and Schweitzer lacked standing to bring their 4th Amendment claim.

    Collyer dismissed the case on Aug. 29, the same date upon which she sentenced ASD operator Andy Bowdoin to 78 months in federal prison. Bowdoin, 77, admitted in May that ASD was a Ponzi scheme and that the firm never operated lawfully from its 2006 inception.

    Summoning a fancy word in their bid to force Collyer to step down, Disner and Schweitzer accused the judge of “sophistry.”

    The move by Disner and Schweitzer to prevent Collyer from hearing ASD-related matters was at least the third. Two others failed — one by purported “sovereign” being Curtis Richmond in 2009 and another by Bowdoin himself in 2009.

    “Plaintiffs’ motion to reopen and set aside the Court’s Order of August 29, 2012, merely rehashes arguments previously raised and fails to demonstrate any error, let alone clear error, in the Court’s ruling granting Defendant’s motion to dismiss. Likewise, the record provides no support for Plaintiffs’ motion to recuse Judge Collyer and this motion, too, should be dismissed,” the government said.

    ASD was a Ponzi scheme that raised at least $119 million, federal prosecutors said.

    Zeek Rewards was a $600 million Ponzi- and pyramid scheme, the SEC said on Aug. 17.

    Precisely when Disner and Schweitzer joined Zeek is unclear.

    What is clear is that some very strange events have occurred since the U.S. Secret Service brought the civil portion of the ASD Ponzi case in 2008.

    Purported “sovereign citizen” Kenneth Wayne Leaming is jailed near Seattle on charges he brought false liens against Collyer, three federal prosecutors and a U.S. Secret Service agent who had roles in the case.

    Leaming was arrested by an FBI Terrorism Task Force in November 2011. He since has sued President Obama and Attorney General Eric Holder. Separately, Leaming sued a county sheriff in Arkansas.

    Some ASD members claimed Leaming was doing legal work for them, even though he is not an attorney.

    Disner, who solicited funds to sue the government for alleged misdeeds in the ASD case, also was involved in an effort by Zeek figure Robert Craddock to raise funds to intervene in the Zeek case.

    Precisely how Craddock intends to do that is unclear.

  • ASD UPDATES BLOG: Victims Of AdSurfDaily Ponzi Scheme Who Missed Filing Deadline For Remissions Should Get Paperwork In Order And Contact U.S. Attorney’s Office To Receive Claim Form

    On Aug. 29, the PP Blog reported that U.S. District Judge Rosemary Collyer has authorized the U.S. Department of Justice to reopen remissions claims for victims of the AdSurfDaily Ponzi scheme who missed the January 2011 filing deadline.

    Earlier in August, prosecutors advised Collyer that “it is entirely possible” ASD’s database did not contain the names of all members and that money remained to provide a disbursement.

    Under the plan, qualifying members who missed the filing deadline could receive a pro rata share of the remainder of funds seized by the U.S. Secret Service in August 2008.

    Although the date upon which the Justice Department will reopen remissions still is not known, the ASDUpdates Blog is reporting today that “they expect something to happen within the next few months regarding Claim Forms and submission of documents.”

    Visit ASDUpdates to get important info on the new round of remissions.

    Visit the ASD victims’ info site site at the U.S. Attorney’s Office in the District of Columbia.