Information for Victims in Large Cases

Displaying 1 - 10 of 138
Case Name Familiar Names and Terms District or Division Overview
USAO - Florida, Southern

Jonathan Donohue controlled two websites from which he sold Distributed Denial of Service (“DDOS”) attacks.  From January 10, 2017 through June 22, 2017, Donohue launched 179,951 DDOS attacks against 78,214 unique IP addresses.

Darkode USAO - District of Columbia

In December, 2018, the defendant McCormick, an American, and three others were charged by indictment with a racketeering conspiracy to develop and distribute malware through the major computer hacking forum known as Darkode.  Arrest warrants are still outstanding  for Skorjanc, a Slovenian national, Mentor Leneqi, a Serbian, and Florencio Ruiz, a Spaniard.  The other foreign countries have declined to extradite the other three defendants to the U.S. for prosecution, but they remain fugitives from justice here in the United States.

Thomas McCormick, pled guilty to racketeering conspiracy and aggravated identity theft.  The racketeering conspiracy charge includes conspiracy to commit bank, wire, and access device fraud, identity theft, hacking, and extortion.

BitConnect; Glenn Arcaro USAO - California, Southern

This case charges the defendant of participating in a massive conspiracy involving BitConnect, a cryptocurrency investment scheme, which defrauded investors from the Unites States and abroad of over $2 billion.  The defendant admitted that he and others conspired to mislead investors about BitConnect’s purported technology, known as the “BitConnect Trading Bot” and “Volatility Software,” as being able to generate substantial profits and guaranteed returns by using investors’ money to trade on the volatility of cryptocurrency exchange markets.  The BitConnect scheme is believed to be the largest cryptocurrency fraud ever charged criminally.  According to the Information, these wire fraud crimes were committed in and around the Southern District of California, across the United States, and internationally. 

Wilhan Martono USAO - Texas, Northern

In June 2020, the website cityxguide.com (“CityXGuide”)—a leading source of online advertisements for prostitution and sex trafficking—was seized by Homeland Security Investigations pursuant to a warrant.  Wilhan Martono, the creator, owner, and operator of CityXGuide, was charged in a 28-count indictment with promotion of prostitution and reckless disregard of sex trafficking, interstate racketeering conspiracy (facilitating prostitution), interstate transportation in aid of racketeering (facilitating prostitution), and money laundering.  In August 2021, Martono pled guilty to Promotion and Facilitation of Prostitution and Reckless Disregard of Sex Trafficking in violation of 18 U.S.C. § 2421A and Conspiracy to Engage in Interstate and Foreign Travel and Transportation In Aid of Racketeering Enterprises in violation of 18 U.S.C. § 371.

Martono created, owned, and operated a network of websites, including CityXGuide, that posted hundreds of thousands of prostitution advertisements in locations across the United States and around the world.  CityXGuide allowed pimps, prostitutes, and brothels to post and pay for advertisements that featured an explicit list of “intimate activities,” along with nude or partially nude photographs, a physical description, work hours, methods of payment, and contact information for the female being advertised. 

Martono purchased the domain names of CityXGuide and its related websites, purchased and maintained the servers that hosted the websites, and purchased the server space, server equipment, and blocks of Internet Protocol (“IP”) addresses—including more than 95 unique IP addresses—to operate the websites. 

Shehzadkhan Khandakhan Pathan, Pradipsinh Dharmendrasinh Parmar, Sumer Kantilal Patel USAO - Virginia, Eastern

Conspirators at an Indian call center used automated, previously recorded calls, commonly referred to as “robocalls,” to initiate contact with victims.  These robocalls usually contained messages designed to create a sense of urgency with the call recipient, including threats of serious legal problems, usually criminal in nature, that required immediate action in order to avoid drastic consequences, including arrest and/or significant financial penalties.  Victims would be instructed to stay on the line or to call a particular number. Eventually victims would speak with one or more live persons, who used a variety of scripts incorporating different fraud schemes to persuade victims to send money via wire money transfer and/or the mail or private interstate commercial carrier shipments.

Norman W. Fries, Inc., Claxton Poultry Farms, broiler chicken Antitrust Division

Norman W. Fries, Inc., d/b/a Claxton Poultry Farms engaged in a conspiracy to fix prices and rig bids for broiler chicken products. The charged conspiracy began at least as early as 2012 and continued at least until early 2019. 

Trickbot USAO - Ohio, Northern

Alla Witte is charged in 19 counts of a 47-count indictment, which accuses her of participating in a criminal organization referred to as the “Trickbot Group,” which deployed the Trickbot malware. The indictment alleges that beginning in November of 2015, Witte and her co-conspirators allegedly worked together to infect victim computers with the Trickbot malware designed to capture online banking login credentials and harvest other personal information, including credit card numbers, emails, passwords, dates of birth, social security numbers and addresses.  Witte and others also allegedly captured login credentials and other stolen personal information to gain access to online bank accounts, execute unauthorized electronic funds transfers and launder the money through U.S. and foreign beneficiary accounts.

The Trickbot Group operated in Russia, Belarus, Ukraine, and Suriname, and primarily targeted victim computers belonging to businesses, entities, and individuals, including those in the Northern District of Ohio and elsewhere in the United States. Targets included hospitals, schools, public utilities, and governments.

Kristijan Krstic, Xenia Faye Atilano Krstic, Marko Pavlovic, Uros Selakovic, Haojia Miao, Nenad Krstic, Antonije Stojilkovic, Andrija Selakovic, Blazo Radulovic, Nikola Dimitrijevic, Nenad Mladenovic and Milos Mitic USAO - Texas, Northern

According to the indictment, the defendants were indicted on charges of conspiracy to commit wire fraud and conspiracy to commit money laundering. They allegedly helped create and market more than 20 fraudulent investing platforms, including Options Giants, Banking Option, Aeon Options, Option Riders, Bancde Options, Instant Options, Fast Options, Elite Options, Start Options, Crypto Trading World, Dragon Mining, Trinity Mining, BTC Mining Factory, Bitcoin Trading World, BTC Trader Online, BTC Falcon, Perpetual Energy, Hedger Tech, Go Solar Mining, Perfect-Options, and others.

Richard Smith USAO - Connecticut

On March 29, 2021, a federal grand jury sitting in New Haven, Connecticut returned an indictment charging Smith with receipt and possession of child pornography. If convicted of the charges, Smith faces a mandatory minimum term of imprisonment of five years and a maximum term of imprisonment of 40 years. Smith is currently detained pending trial, which is scheduled for June 3, 2021 before Judge Jeffrey Meyer in New Haven.

William N. Harwin; Florida Cancer Specialists Antitrust Division

Dr. William Harwin was charged with participating in a conspiracy to suppress and eliminate competition by agreeing to allocate the provision of medical and radiation oncology services.  While he was President and Managing Physician Partner of Florida Cancer Specialists (FCS), Harwin and his co-conspirators agreed not to compete to provide chemotherapy and radiation treatments to cancer patients in Southwest Florida.  Beginning as early as 1999 and continuing until at least 2016, Harwin entered into an illegal agreement that allocated chemotherapy treatments to FCS and radiation treatments to a competing oncology group.

Pages