Information for Victims in Large Cases
|Case Name||Familiar Names and Terms||District or Division||Overview|
|United States v. Tanner Roughton||Tanner Roughton||USAO - Pennsylvania, Eastern||
Defendant Tanner Roughton is charged with one count of conspiracy to commit wire fraud, one count of wire fraud, and one count of filing a false tax returns. The charges stem from Roughton’s participation in scheme to defraud buyers and sellers of two cryptocurrencies by manipulating the price of the cryptocurrencies through various means, including the release of false statements designed to bolster the sale price and generate trading volume, and matched trades with a co-schemer and others to further generate trading volume. The charges allege that Roughton sold the cryptocurrencies for a profit and knowingly failed to report his profits on his tax returns.
|U.S. v. Moshe Porat (21-CR-00170), and U.S. v. Isaac Gottlieb, et al. (21-CR-00160)||Temple University Fox School of Business||USAO - Pennsylvania, Eastern||
The defendant and his co-conspirators provided false information to college ranking publications about statistical data relating to Temple University's Fox School of Business. U.S. News relied on these false and misleading representations and ranked Fox's OMBA program number one in the country four years in a row. U.S. News also ranked Fox's PMBA program as high as number seven in 2017. The defendant marketed the fraudulently inflated rankings to potential Fox applicants, students, and donors in order to obtain money from them.
|United States v. Greenlaw, et al (UDF)||UDF, United Development Funding Entities, Hollis Morrison Greenlaw, Benjamin Lee Wissink, Cara Delin Obert, Jeffrey Brandon Jester||USAO - Texas, Northern||
On January 21, 2021, a jury convicted defendants Hollis Morrison Greenlaw, Benjamin Lee Wissink, Cara Delin Obert, and Jeffrey Brandon Jester of conspiracy to commit wire fraud, conspiracy to commit securities fraud and eight substantive counts of securities fraud. Between January 2011 and December 2015, the defendants engaged in a scheme to defraud using investment fund entities known as United Development Funding III LP, United Development Funding IV, and United Development Funding Income Fund V (collectively "UDF entities"). The UDF entities were based out of Grapevine, Texas.
|U.S. v. Haykaz Mansuryan et al; 21-CR-2660-BAS||HAYKAZ MAN SURYAN (1), HAYK SHAKARYAN (2), DAVIT BABAYAN (3), ARTOUR HAKOBYAN (4), PETROS ARMUTYAN (5), HAKOP KARAYAN (6), ROBERT FICHIDZHYAN (7), VASILIY POLYAK (8)||USAO - California, Southern||
This case charges a ring of fraudsters who used skimming devices to steal unwitting victims’ account information from gas pumps, ATMs, and similar common points of sale. The defendants then allegedly used that information to make fraudulent debit and credit cards, which they used to withdraw cash from victims’ accounts and make fraudulent withdrawals and purchase goods in the mount of hundreds of thousands of dollars using funds on the accounts of unwitting victims. According to the indictment, these crimes were committed in and around southern California and elsewhere.
|United States v. Manahe et al.||Faysal Kalayaf Manahe, Ammar Alkinani, Yaser Ali, Quasim Saesah, Personal Support Specialist, PSS||Antitrust Division, USAO - Maine||
From at least as early as April 2020 and continuing until as late as May 2020, the defendants and unnamed others entered a conspiracy to fix the wage rates paid to PSS workers and agreed not to hire each other’s PSS workers. The conspiracy affected essential healthcare workers during the COVID-19 pandemic, when PSS workers provided crucial services to their communities at the risk of their own health. Shortly before the agreement to fix wages was reached, MaineCare increased the Medicaid reimbursement rate to PSS agencies. This increase aimed to provide PSS workers higher hourly wages in order to afford N-95 masks, gloves, and other protective equipment necessary during the COVID-19 pandemic.
|United States v. Jared Davis||OptionMint, OptionKing, OptionQueen||USAO - Ohio, Northern||
Defendant owned and controlled various businesses, both in the United States and abroad, including Erie Marketing LLC with a principal place of business in Sandusky, Ohio. Though Defendant’s own role is disputed, it is alleged that those businesses engaged in a fraudulent binary options scheme using tradenames such as “OptionMint,” “OptionKing,” and, “OptionQueen.” These were neither licensed nor regulated and operated much differently from regulated exchanges. Defendant did not connect his investors to a legitimate binary options exchange that would match investors who chose different binary option outcomes. Instead, Defendant took the opposing position on each trade and thus only made money when investors lost their money, providing a built-in incentive to employ a variety of manipulative and deceptive practices. Victims were solicited through Internet marketing campaigns and international call centers. Victims were given accounts on fraudulent platforms and they paid foreign payment processors by credit card. More than $10 million in credit card payments were directed to Defendant’s companies. It is alleged there may be over 5000 individual victims involved in this scheme.
|United States v. Shuklin et al.||ANDREY SHUKLIN, SERGHEI VERLAN, PHYLLIS RICCI QUINCOCES a/k/a Faith Ashford, Grace Rubestello, Phyllis Ricci, Phyllis Ann, EVGENIA KUKUY a/k/a Jenny K, Evgenia Kukuv, VLADIMIR PESTEREANU a/k/a Vova, IEVGEN KAKIAKA a/k/a Eugene, AKHLIDDIN KALONOV, ROMAN IAKOVLEV, SANJAR FAYZIVEY, SERGEY BOCHAROV, JESSICA MARTIN a/k/a Emma Ricci, Mary Austin, SETH NEZAT a/k/a Andrew Johnson, Andrew Butler, Jason, Kyle Walker||USAO - Ohio, Southern||
A grand jury charged the defendants with participating in a criminal enterprise that operated thirteen different moving companies in multiple locations through the United States. The criminal enterprise enriched itself by defrauding, extorting, and stealing from customers who hired the moving companies to move their household goods. Specifically, the criminal enterprise lied to customers about the company's experience and record, provided low binding estimates to secure moving jobs, loaded the customers' household goods into moving trucks, and then illegally demanded money above the binding estimate based on fraudulent calculations of space used by the goods. Customers were required to pay falsely inflated prices to retrieve their possessions and, in some cases, never received their possessions at all. The criminal enterprise protected and perpetuated itself by concealing and misrepresenting the owners, operators, employees, and operations of their moving companies. This fraud was accomplished through a number of different means, including the preparation and submission to federal regulators and to third-party companies of documents containing false information and the use of fake drivers' licenses for the purported owners of the moving companies to further the criminal enterprise.
|U.S. v. Jonathan Donohue||USAO - Florida, Southern||
Jonathan Donohue controlled two websites from which he sold Distributed Denial of Service (“DDOS”) attacks. From January 10, 2017 through June 22, 2017, Donohue launched 179,951 DDOS attacks against 78,214 unique IP addresses.
|United States v. MATJAZ SKORJANC, FLORENCIO CARRO RUIZ, MENTOR LENIQI, And THOMAS KENNEDY MCCORMICK||Darkode||USAO - District of Columbia||
In December, 2018, the defendant McCormick, an American, and three others were charged by indictment with a racketeering conspiracy to develop and distribute malware through the major computer hacking forum known as Darkode. Arrest warrants are still outstanding for Skorjanc, a Slovenian national, Mentor Leneqi, a Serbian, and Florencio Ruiz, a Spaniard. The other foreign countries have declined to extradite the other three defendants to the U.S. for prosecution, but they remain fugitives from justice here in the United States.
Thomas McCormick, pled guilty to racketeering conspiracy and aggravated identity theft. The racketeering conspiracy charge includes conspiracy to commit bank, wire, and access device fraud, identity theft, hacking, and extortion.
|U.S. v. Glenn Arcaro; 21-CR-02542-TWR||BitConnect; Glenn Arcaro||USAO - California, Southern||
This case charges the defendant of participating in a massive conspiracy involving BitConnect, a cryptocurrency investment scheme, which defrauded investors from the Unites States and abroad of over $2 billion. The defendant admitted that he and others conspired to mislead investors about BitConnect’s purported technology, known as the “BitConnect Trading Bot” and “Volatility Software,” as being able to generate substantial profits and guaranteed returns by using investors’ money to trade on the volatility of cryptocurrency exchange markets. The BitConnect scheme is believed to be the largest cryptocurrency fraud ever charged criminally. According to the Information, these wire fraud crimes were committed in and around the Southern District of California, across the United States, and internationally.