Information for Victims of Large Cases

The Department of Justice is committed to ensuring that victims of crime are an integral part of the criminal justice process. We generally personally contact each victim of the crimes we prosecute. For our very largest cases, where individual contact is impossible, we create case websites for victims providing information, updates and services. A listing of the current large cases is below. If you believe you are a victim of one of these cases, search for the defendant’s name or another common name associated with the case. The link provided at the case’s name will direct you to that case’s website. You may visit the case website anytime for the most recent case developments.

Case Name Familiar Names and Terms District or Division Overview
Byron Fisher USAO - Indiana, Southern District Bryon (Pronounced Brian) Fisher, was caught stealing mail from several Post Office Boxes in Indianapolis, Indiana, belonging to utility companies and other businesses that received regular payments.   As a result, customers their companies may have been assessed late fees, or had services disconnected.  
Citadel malware USAO - Georgia, Northern District Citadel is a sophisticated form of malicious software or “malware” known as a “banking Trojan” designed to steal online banking credentials, credit card information, and ultimately funds through unauthorized electronic transfers.  It electronically infects the computers of unsuspecting individuals and financial institutions, creating “bots”, which cyber criminals remotely control through command and control servers.  Once the victim computers are infected and under control, cybercriminals remotely access the infected computers, without authorization, and steal the victims’ personal and financial information. Used by a global syndicate of cybercriminals, Citadel is believed to have infected approximately 11 million computers worldwide and be responsible for over $500 million dollars in losses.
Photobucket, Photofucket, Brandon Bourret, Athanasios Andrianakis USAO - District of Colorado Between July 2012 and August 2013, the defendants allegedly developed, marketed, and sold a software application called “Photofucket” which allowed unauthorized persons to circumvent the privacy settings of the image and video hosting website at and to access and copy users’ private and password protected information, images, and videos without Photobucket or those users’ authorization.
Dennis P. Farrell, William E. Tis, Charles E. Herzing, Gary Southern, Freedom Industries, Inc., Michael E. Burdette, Robert J. Reynolds USAO - West Virginia, Southern District Freedom Industries, Inc. as well as former corporate officers, employees and agents, allegedly violated environmental laws in connection with the January 9, 2014, chemical spill. One defendant also faces additional charges stemming from bankruptcy proceedings related to the spill. Pending charges are merely accusations and the defendants are presumed innocent unless and until proven guilty beyond a reasonable doubt
Resorts Condos Management, Timeshare Goldline, JAMS Management, Vision Ventures Inc, Timeshare Services Today, Vacation Equity Marketing Inc., Maximum Properties, Universal Processing Services of Wisconsin LLC also known as Newtek Merchant Solutions, HES Merchant Services, Interval Equity Marketing, Vacations And Resorts, Visionary Investments LLC USAO - Texas, Northern District Between March 2009 and March 2011, the defendants allegedly engaged in a scheme to fraudulently induce timeshare property owners to send them money.  The telemarketers obtained lists containing contact information for timeshare property owners (victims) and during the telemarketing telephone call to the victim, promised buyers for their timeshares.  To consummate the promised sale of the property, the telemarketer instructed the victim to pay “closing costs” for the sale, usually between $900 to $3,000.  Once the victim sent the money, either by check, credit card, or wire transfer, the telemarketer or customer service representative would make excuses and delay the promised “closing” for approximately 90 days, so as to prevent the victim from successfully stopping payment on the check or obtaining a charge back on the credit card.
SpyEye malware USAO - Georgia, Northern District SpyEye is a sophisticated malicious computer code designed to automate the theft of confidential personal and financial information, such as online banking credentials, credit card information, usernames, passwords, PINs, and other personally identifying information. SpyEye facilitates this theft of information by secretly infecting victims’ computers, enabling cyber criminals to remotely control the infected computers (or bots) through command and control (C2) servers. Once the victims’ computers are infected and under control, cyber criminals remotely access the infected computers, without authorization, and steal the victims’ personal and financial information through a variety of techniques, including web injects, keystroke loggers, and credit card grabbers. The victims’ stolen personal and financial data is then surreptitiously transmitted to C2 servers, where it is used to steal money from the victims’ financial accounts. Until dismantled, SpyEye was the preeminent malware banking Trojan from 2010-2012.
New Century Coal USAO - Tennessee, Eastern District Brian C. Rose, acting through the defendants and others, diverted funds received from New Century Coal investors to multiple entities which were represented to investors as legitimate vendors or suppliers to New Century Coal. New Century Coal falsely and fraudulently moved investor funds to bank accounts in the name of ghost vendor companies and diverted those funds to the personal benefit and use of the defendants.
Mail Theft, Postal Service, Mail delay, Postman From August 1993 through March 2014, defendant Jeffrey L. Shipley was a postman with the United States Postal Service. On May 29, 2014, Shipley was charged by Information with theft of mail by a Postal Service employee, and with delay and destruction of mail by a Postal Service employee. The Information alleges that Shipley failed to deliver over 20,000 pieces of mail, including mail from the Parkville Branch and Catonsville Carrier Annex. Examples of items alleged to be in his possession include money orders, prescription medications, passports and greetings cards containing checks.
Platinum Trust Card Blake Rubin, 30, of Huntington Valley, PA, Chase Rubin 28, of Rydal, PA, and Justin Diaczuk, 31, of Philadelphia, PA, were recently charged with running a multi-million dollar telemarketing scam. According to the information, the defendants duped more than 70,000 people into buying what they falsely marketed as a general-purpose credit card that customers could use to buy merchandise over the internet and improve their credit.
Zeus Vyacheslav Igorevich Penchukov (aka tank) Ivan Viktorvich Klepikov (aka petrovich, aka nowhere) Alexey Dmitrievich Bron (aka thehead) Alexey Tikonov (aka kusanagi) Yevhen Kulibaba (aka jonni) Yuriy Konovalenko (aka jtkO) Nine alleged members of a wide-ranging racketeering enterprise and conspiracy who infected thousands of business computers with malicious software known as "Zeus" have been charged in an indictment. The indictment alleges that the "Zeus" malware captured passwords, account numbers, and other information necessary to log into online banking accounts. The conspirators allegedly used the information captured by "Zeus" to steal millions of dollars from victims' bank accounts. All of the defendants are charged with conspiracy to participate in racketeering activity, conspiracy to commit computer fraud and identity theft, aggravated identity theft, and multiple counts of bank fraud.