Information for Victims in Large Cases
|Case Name||Familiar Names and Terms||District or Division||Overview|
|United States v. Neil Godfrey||Check Site||USAO - Pennsylvania, Eastern||
This case involves a third-party data processor (Godfrey), who helped fraudulent merchants make small, unauthorized withdrawals from the bank accounts of hundreds of thousands of victims. Godfrey did this through his business, Check Site, which worked directly with banks that would not have worked with the fraudulent merchants directly. Godfrey also helped the fraudulent merchants to conceal their activity from the banks through various means.
|U.S. v. Oladimeji Seun Ayelotan, et al. (AKA Scams R Us)||Scams R Us||USAO - Mississippi, Southern||
Operation Scams-R-Us involves a transnational organized crime enterprise operating numerous financial fraud schemes via the internet. This case involves mass marketing fraud over job and dating websites, including romance scams, re-shipping of merchandise purchased with stolen credit cards, using fraudulent U.S. postal and other carrier labels, counterfeit and fraudulent check scams, work-at-home and secret shopper scams. Victims believed they were conducting legitimate work such as at-home payroll services or remailing of electronic items for charities to South Africa and Nigeria. Victims were asked to withdraw money at ATMs using prepaid cards and forward money to others via MoneyGram and Western Union. U.S. citizens identities, personal information, bank and financial information were stolen and used to obtain credit cards that were used to take cash advances and purchase mobile phones and other electronic devices.
|United States v. Tulving Company, et al.||Hannes Tulving Jr, Alan Tulving, Costa Mesa California, Tulving Co, coins, gold and silver coins, gold bars, silver, emerald-colored gemstone, Canadian paper money||USAO - North Carolina, Western||
From in or about August 2013 through in or about January 2014, the defendants HANNES TULVING, JR. (“Tulving”) and THE TULVING COMPANY, INC, (“TULVING CO.”) executed a scheme to defraud individuals by inducing customers to place orders for gold and silver coins, among other things, and wire money for those goods knowing that those orders could not be fulfilled as advertised and promised, resulting in a loss of over $15,000,000 to over 400 victims.
|US v. Conagra Grocery Products Company, LLC||Conagra, tainted peanut butter, a salmonella outbreak, Peter Pan peanut butter||USAO - Georgia, Middle||
This case relates to a 2006-2007 nationwide outbreak of salmonella poisoning connected with tainted peanut butter.
|U.S. v. Bryon Fisher||Byron Fisher||USAO - Indiana, Southern||
Bryon (Pronounced Brian) Fisher, was caught stealing mail from several Post Office Boxes in Indianapolis, Indiana, belonging to utility companies and other businesses that received regular payments. As a result, customers their companies may have been assessed late fees, or had services disconnected.
|United States v. Dimitry Belorossov, a/k/a Rainerfox||Citadel malware||USAO - Georgia, Northern||
Citadel is a sophisticated form of malicious software or “malware” known as a “banking Trojan” designed to steal online banking credentials, credit card information, and ultimately funds through unauthorized electronic transfers. It electronically infects the computers of unsuspecting individuals and financial institutions, creating “bots”, which cyber criminals remotely control through command and control servers. Once the victim computers are infected and under control, cybercriminals remotely access the infected computers, without authorization, and steal the victims’ personal and financial information. Used by a global syndicate of cybercriminals, Citadel is believed to have infected approximately 11 million computers worldwide and be responsible for over $500 million dollars in losses.
|U.S. vs. Brandon Bourrett and Athanasios Andrianakis||Photobucket, Photofucket, Brandon Bourret, Athanasios Andrianakis||USAO - Colorado||
Between July 2012 and August 2013, the defendants allegedly developed, marketed, and sold a software application called “Photofucket” which allowed unauthorized persons to circumvent the privacy settings of the image and video hosting website at Photobucket.com and to access and copy users’ private and password protected information, images, and videos without Photobucket or those users’ authorization.
|U.S. v. Dennis P. Farrell, et al, and related cases||Dennis P. Farrell, William E. Tis, Charles E. Herzing, Gary Southern, Freedom Industries, Inc., Michael E. Burdette, Robert J. Reynolds||USAO - West Virginia, Southern||
Freedom Industries, Inc. as well as former corporate officers, employees and agents, allegedly violated environmental laws in connection with the January 9, 2014, chemical spill. One defendant also faces additional charges stemming from bankruptcy proceedings related to the spill. Pending charges are merely accusations and the defendants are presumed innocent unless and until proven guilty beyond a reasonable doubt
|United States v. Max Joseph Chilson, et. al.||Resorts Condos Management, Timeshare Goldline, JAMS Management, Vision Ventures Inc, Timeshare Services Today, Vacation Equity Marketing Inc., Maximum Properties, Universal Processing Services of Wisconsin LLC also known as Newtek Merchant Solutions, HES Merchant Services, Interval Equity Marketing, Vacations And Resorts, Visionary Investments LLC||USAO - Texas, Northern||
Between March 2009 and March 2011, the defendants allegedly engaged in a scheme to fraudulently induce timeshare property owners to send them money. The telemarketers obtained lists containing contact information for timeshare property owners (victims) and during the telemarketing telephone call to the victim, promised buyers for their timeshares. To consummate the promised sale of the property, the telemarketer instructed the victim to pay “closing costs” for the sale, usually between $900 to $3,000. Once the victim sent the money, either by check, credit card, or wire transfer, the telemarketer or customer service representative would make excuses and delay the promised “closing” for approximately 90 days, so as to prevent the victim from successfully stopping payment on the check or obtaining a charge back on the credit card.
|United States v. Aleksandr Andreevich Panin, a/k/a Harderman, a/k/a Gribodemon, and Hamza Bendelladj, a/k/a Bx1||SpyEye malware||USAO - Georgia, Northern||
SpyEye is a sophisticated malicious computer code designed to automate the theft of confidential personal and financial information, such as online banking credentials, credit card information, usernames, passwords, PINs, and other personally identifying information. SpyEye facilitates this theft of information by secretly infecting victims’ computers, enabling cyber criminals to remotely control the infected computers (or bots) through command and control (C2) servers. Once the victims’ computers are infected and under control, cyber criminals remotely access the infected computers, without authorization, and steal the victims’ personal and financial information through a variety of techniques, including web injects, keystroke loggers, and credit card grabbers. The victims’ stolen personal and financial data is then surreptitiously transmitted to C2 servers, where it is used to steal money from the victims’ financial accounts. Until dismantled, SpyEye was the preeminent malware banking Trojan from 2010-2012.