Information for Victims in Large Cases

Displaying 11 - 20 of 152
Case Name Familiar Names and Terms District or Division Overview
USAO - Florida, Southern

Jonathan Donohue controlled two websites from which he sold Distributed Denial of Service (“DDOS”) attacks.  From January 10, 2017 through June 22, 2017, Donohue launched 179,951 DDOS attacks against 78,214 unique IP addresses.

Darkode USAO - District of Columbia

In December, 2018, the defendant McCormick, an American, and three others were charged by indictment with a racketeering conspiracy to develop and distribute malware through the major computer hacking forum known as Darkode.  Arrest warrants are still outstanding  for Skorjanc, a Slovenian national, Mentor Leneqi, a Serbian, and Florencio Ruiz, a Spaniard.  The other foreign countries have declined to extradite the other three defendants to the U.S. for prosecution, but they remain fugitives from justice here in the United States.

Thomas McCormick, pled guilty to racketeering conspiracy and aggravated identity theft.  The racketeering conspiracy charge includes conspiracy to commit bank, wire, and access device fraud, identity theft, hacking, and extortion.

BitConnect; Glenn Arcaro USAO - California, Southern

This case charges the defendant of participating in a massive conspiracy involving BitConnect, a cryptocurrency investment scheme, which defrauded investors from the Unites States and abroad of over $2 billion.  The defendant admitted that he and others conspired to mislead investors about BitConnect’s purported technology, known as the “BitConnect Trading Bot” and “Volatility Software,” as being able to generate substantial profits and guaranteed returns by using investors’ money to trade on the volatility of cryptocurrency exchange markets.  The BitConnect scheme is believed to be the largest cryptocurrency fraud ever charged criminally.  According to the Information, these wire fraud crimes were committed in and around the Southern District of California, across the United States, and internationally. 

Wilhan Martono USAO - Texas, Northern

In June 2020, the website cityxguide.com (“CityXGuide”)—a leading source of online advertisements for prostitution and sex trafficking—was seized by Homeland Security Investigations pursuant to a warrant.  Wilhan Martono, the creator, owner, and operator of CityXGuide, was charged in a 28-count indictment with promotion of prostitution and reckless disregard of sex trafficking, interstate racketeering conspiracy (facilitating prostitution), interstate transportation in aid of racketeering (facilitating prostitution), and money laundering.  In August 2021, Martono pled guilty to Promotion and Facilitation of Prostitution and Reckless Disregard of Sex Trafficking in violation of 18 U.S.C. § 2421A and Conspiracy to Engage in Interstate and Foreign Travel and Transportation In Aid of Racketeering Enterprises in violation of 18 U.S.C. § 371.

Martono created, owned, and operated a network of websites, including CityXGuide, that posted hundreds of thousands of prostitution advertisements in locations across the United States and around the world.  CityXGuide allowed pimps, prostitutes, and brothels to post and pay for advertisements that featured an explicit list of “intimate activities,” along with nude or partially nude photographs, a physical description, work hours, methods of payment, and contact information for the female being advertised. 

Martono purchased the domain names of CityXGuide and its related websites, purchased and maintained the servers that hosted the websites, and purchased the server space, server equipment, and blocks of Internet Protocol (“IP”) addresses—including more than 95 unique IP addresses—to operate the websites. 

Shehzadkhan Khandakhan Pathan, Pradipsinh Dharmendrasinh Parmar, Sumer Kantilal Patel USAO - Virginia, Eastern

Conspirators at an Indian call center used automated, previously recorded calls, commonly referred to as “robocalls,” to initiate contact with victims.  These robocalls usually contained messages designed to create a sense of urgency with the call recipient, including threats of serious legal problems, usually criminal in nature, that required immediate action in order to avoid drastic consequences, including arrest and/or significant financial penalties.  Victims would be instructed to stay on the line or to call a particular number. Eventually victims would speak with one or more live persons, who used a variety of scripts incorporating different fraud schemes to persuade victims to send money via wire money transfer and/or the mail or private interstate commercial carrier shipments.

David Camp, Amazon Marketplace, DVDs and Blu-Ray Discs Antitrust Division

David Camp engaged in a conspiracy to fix prices for DVDs and Blu-Ray Discs sold through the Amazon Marketplace platform to customers located throughout the United States.  The charged conspiracy began at least as early as May 2018 and continued to on or about October 29, 2019.

Jason McGuire, Timothy Stiller, Justin Gay, Wesley Scott Tucker, broiler chicken Antitrust Division

Jason McGuire, Timothy Stiller, Justin Gay, and Wesley Scott Tucker were charged for participating in a conspiracy to fix prices and rig bids for broiler chicken products from at least 2012 until at least early 2019.

Kent Thiry, DaVita Antitrust Division

DaVita Inc. and its former CEO Kent Thiry were charged with entering into and engaging in three separate conspiracies with other health care companies to suppress competition for the services of certain employees.  Each of the charged conspiracies covers a different time period, but they begin as early as February 2012 and continue to as late as June 2019. 

Norman W. Fries, Inc., Claxton Poultry Farms, broiler chicken Antitrust Division

Norman W. Fries, Inc., d/b/a Claxton Poultry Farms engaged in a conspiracy to fix prices and rig bids for broiler chicken products. The charged conspiracy began at least as early as 2012 and continued at least until early 2019. 

Trickbot USAO - Ohio, Northern

Alla Witte is charged in 19 counts of a 47-count indictment, which accuses her of participating in a criminal organization referred to as the “Trickbot Group,” which deployed the Trickbot malware. The indictment alleges that beginning in November of 2015, Witte and her co-conspirators allegedly worked together to infect victim computers with the Trickbot malware designed to capture online banking login credentials and harvest other personal information, including credit card numbers, emails, passwords, dates of birth, social security numbers and addresses.  Witte and others also allegedly captured login credentials and other stolen personal information to gain access to online bank accounts, execute unauthorized electronic funds transfers and launder the money through U.S. and foreign beneficiary accounts.

The Trickbot Group operated in Russia, Belarus, Ukraine, and Suriname, and primarily targeted victim computers belonging to businesses, entities, and individuals, including those in the Northern District of Ohio and elsewhere in the United States. Targets included hospitals, schools, public utilities, and governments.

Pages