Information for Victims in Large Cases
|Case Name||Familiar Names and Terms||District or Division||Overview|
|United States v. Ahmad Abouammo et al.||Ahmad Abouammo, Ali Alzabarah and Ahmed Almutairi aka Ahmed Aljbreen||USAO - California, Northern||
Defendants were charged with acting as agents of the Saudi government without notice to the Attorney General for their roles in the unauthorized access of Twitter accounts of users who had publicly renounced the Saudi government. Defendants Abouammo and Alzabarah were employees of Twitter and were provided user names that were of interest to the Saudi government by a foreign official/representative of the Saudi Royal Family.
|U.S. v. Elizabeth Holmes, et al.||Theranos||USAO - California, Northern||
Elizabeth Homes and Ramesh “Sunny” Balwani are charged with two counts of conspiracy to commit wire fraud and nine counts of wire fraud. According to the indictment, the charges stem from allegations Holmes and Balwani engaged in a multi-million dollar scheme to defraud investors, and a separate scheme to defraud doctors and patients. Both schemes involved efforts to promote Palo Alto, California based Theranos. Theranos is a private health care and life sciences company with the stated mission to revolutionize medical laboratory testing through allegedly innovative methods for drawing blood, testing blood, and interpreting the resulting patient data.
|United States vs. Matthew Brent Goettsche et al.||Matthew (“Matt”) Brent Goettsche, Russ Albert Medlin, Jobadiah (“Joby”) Sinclair Weeks, Joseph (“Joe”) Frank Abel, Silviu Catalin Balaci, BitClub Network||USAO - New Jersey||
Defendants Goettsche, Balaci, and Weeks have been charged with conspiracy to engage in wire fraud in connection with their roles in BitClub Network. From April 2014 through December 2019, BitClub Network was a fraudulent scheme that solicited money from investors in exchange for shares of purported cryptocurrency mining pools and rewarded investors for recruiting new investors into the scheme. Goettsche, Balaci, Weeks, and others conspired together to solicit investment in BitClub Network through fraudulent means, including by providing false and misleading figures that BitClub investors were told were “bitcoin mining earnings” purportedly generated by BitClub Network’s bitcoin mining pool. Goettsche, Balaci, Weeks, and others obtained the equivalent of at least $722 million from BitClub Network investors.
Defendants Goettsche, Balaci, Weeks, and Abel also conspired to sell BitClub Network shares—which were securities—notwithstanding that BitClub Network did not register the shares with the U.S. Securities and Exchange Commission. Weeks and Abel created videos and traveled around the United States and the world to promote BitClub Network and recruit others to invest.
|U.S. v. Francis Alvarez||Alvarez; Francis Alvarez; Freight Forwarders; Central Freight; Forwarders||Antitrust Division||
Francis Alvarez was charged with engaging in a conspiracy to suppress and eliminate competition by fixing prices for freight forwarding services provided in the United States and elsewhere from as early as September 2010 and continuing until at least August 2014.
|U.S. v. Brandon Demond Frere||Brandon Frere, Brandon Demond Frere dba American Financial Benefits Center (“AFBC”), Ameritech Financial (“AMERITECH”), and Financial Education Benefits Center (“FEBC”)||USAO - California, Northern||
Fraudulent student loan forgiveness program that operated from 2014 through November 2018.
|United States v. Sergiy P. Usatyuk, 5:18-CR-00461-BO||Sergiy P. Usatyuk or Sergio Usatyuk, ExoStress.in, (“ExoStresser”), QuezStresser.com, Betabooter.com (“Betabooter”), Databooter.com, Instabooter.com, Polystress.com, and Zstress.net, Booters, Stressers, Distributed Denial of Service Attacks (DDoS)||USAO - North Carolina, Eastern||
On February 27, 2019, Sergiy P. Usatyuk, 21, pleaded guilty to one count of conspiracy to cause damage to internet-connected computers for his role in owning, administering, and supporting illegal booter services that launched millions of illegal DDoS attacks against victim computer systems in the United States and elsewhere. The illegal services included ExoStress.in, (“ExoStresser”), QuezStresser.com, Betabooter.com (“Betabooter”), Databooter.com, Instabooter.com, Polystress.com, and Zstress.net.
|U.S. v. Dip Shipping Company, LLC||Dip Shipping, Dip Shipping Company LLC, Freight Forwarders, Central Freight, Forwarders||Antitrust Division||
Dip Shipping Company, LLC was charged with engaging in a conspiracy to suppress and eliminate competition by fixing prices for freight forwarding services provided in the United States and elsewhere from as early as September 2010 and continuing until at least March 2015.
|United States v. Kristopher Lee Dallmann et al.||Kristopher Lee Dallmann, Darryl Julius Polo a/k/a djppimp, Douglas M. Courson, Felipe Garcia, Jared Edward Jaurequi a/k/a Jared Edwards, Peter H. Huber, Yoany Vaillant a/k/a Yoany Vaillant Fajardo, and Luis Angel Villarino||USAO - Virginia, Eastern||
Eight individuals, including Kristopher Lee Dallmann and Darryl Julius Polo, have been charged with conspiring to violate federal criminal copyright law by running an entity called Jetflicks, an online, subscription-based service headquartered in Las Vegas, Nevada, that permitted users to stream and, at times, download copyrighted television programs without the permission of the relevant copyright owners. According to the indictment, the defendants reproduced tens of thousands of copyrighted television episodes without authorization and made these infringing programs available to tens of thousands of paid subscribers located throughout the U.S. At one point, Jetflicks claimed to have more than 183,200 different television episodes. One of the defendants, Polo, left Jetflicks and created a competing site based in Las Vegas called iStreamItAll (ISIA) that at one point claimed to have 118,479 different television episodes and 10,980 individual movies. Like Jetflicks, ISIA offered content for a regular subscription fee to viewers around the United States, and ISIA publicly asserted that it had more content than Netflix, Hulu, Vudu and Amazon Prime. In addition, the two services were not only available to subscribers over the internet but specifically designed to work on many different types of devices, platforms and software including numerous varieties of computer operating systems, smartphones, tablets, smart televisions, video game consoles, digital media players, set-top boxes and web browsers.
Both Jetflicks and ISIA allegedly obtained infringing works from pirate websites around the world—including some of the globe’s biggest torrent and Usenet sites specializing in unauthorized content such as The Pirate Bay, RARBG, and TorrentDay—using automated computer scripts to locate, download, process, and store the illegal files, and then quickly make that content available on servers in Canada to United States subscribers for streaming and/or downloading. Essentially, Jetflicks and ISIA were two of the largest streaming services in the United States but did not compensate copyright owners for streaming and making available for download the unauthorized works they offered to their paid subscribers.
Besides the conspiracy charge, Dallmann has been charged with additional counts of criminal copyright infringement as well as money laundering in connection with Jetflicks, and Polo faces similar additional charges in connection with ISIA. More information can be found in the DOJ press release.
|United States v. Capt Neill’s Seafood, Inc. and Phillip R. Carawan||USAO - North Carolina, Eastern||
Charges: Lacey Act (false labeling) and aiding and abetting, 16 U.S.C. §§ 3372(d)(1) and (2), and 3373(d)(3)(A)(i) and (ii), 18 U.S.C. § 2
On June 27, 2019, the Eastern District of North Carolina filed charges against defendants PHILLIP R. CARAWAN and CAPT. NEILL’S SEAFOOD, INC. The charges allege that between January 1, 2012, and December 31, 2015, both CARAWAN and CAPT. NEILL’S SEAFOOD, INC. mislabeled jumbo lump crab meat as “Product of the USA” when, in fact, it was crab meat purchased from foreign countries, repackaged, and falsely labeled. The defendants sold the mislabeled crab meat to a number of different wholesalers and retailers.
For a more details, see the Joint Factual Statement on the district website above.
|US v. Robert Boling, Jr. et al.||Robert Wayne Boling Jr., Fredrick Brown, Trorice Crawford, Allan Albert Kerr, and Jongmin Seok||USAO - Texas, Western||
Five individuals have been charged with coordinating an identify-theft and fraud scheme targeting service members, their dependents, and veterans. The defendants are alleged to have used the stolen personal identifying information (PII) of thousands of military members to access Department of Defense and Veterans Affairs benefits sites and steal millions of dollars.
The defendants’ identity-theft and fraud scheme began in 2014 when Fredrick Brown allegedly stole thousands of military members’ PII, including names, dates of birth, social security numbers, and Department of Defense identification numbers. He is alleged to have then provided the stolen information to Robert Boling, Jr., who exploited the information in various ways together with his Philippines-based co-defendants Allan Kerr and Jongmin Seok. Boling, Kerr, and Seok specifically used the stolen information to compromise a Department of Defense portal designed to enable military members to access benefits information online. Once through the portal, the defendants are alleged to have accessed benefits information. Access to these detailed records enabled the defendants to steal or attempt to steal millions of dollars from military members’ bank accounts. The defendants also stole veterans’ benefits payments. After the defendants had compromised military members’ bank accounts and veterans’ benefits payments, Boling allegedly worked with Trorice Crawford to recruit individuals who would accept the deposit of stolen funds into their bank accounts and then send the funds through international wire remittance services to the defendants and others.