Information for Victims in Large Cases
|Case Name||Familiar Names and Terms||District or Division||Overview|
|U.S. v. Evans Concrete, LLC, et al.||Evans Concrete, Concrete||Antitrust Division||
One company and four individuals, Evans Concrete LLC, James Clayton Pedrick, Gregory Hall Melton, John “David” Melton, and Timothy “Bo” Strickland, were charged with participating in a conspiracy to fix prices, rig bids, and allocate markets. The conduct applied to the sale of ready-mix concrete used in residential, commercial and public projects in the greater Savannah, Georgia area. The conduct began at least as early as 2010 and continued until in or about July 2016. James Clayton Pedrick is also charged with making false statements and Timothy “Bo” Strickland is charged with making false statements and perjury.
|U.S. v. Taro Pharmaceuticals U.S.A., Inc.||Taro Pharmaceuticals U.S.A., Inc, Generic Drugs||Antitrust Division||
Taro Pharmaceuticals U.S.A., Inc. was charged with participating in two conspiracies to suppress and eliminate competition by agreeing to fix prices, allocate customers, and rig bids for generic drugs. The charged conspiracies took place between 2013 and 2015.
|United States v. Milton Ayimadu a/k/a Don Milton||Don Milton, Milton Ayimadu, http://www.babypuupu.com, BabyPuuPu, Evolosion||USAO - Georgia, Northern||
The defendant has been charged with hoarding and price gouging in violation of the Defense Production Act of 1950.
|U.S. v. Davit Simonyan, et al.||Varham Imonyan, Arsen Minasyan, Gor Plavchyan, Arsen Galstyan, Mukuch Mkrtchyan, Smbat Shahinyan||USAO - California, Southern||
This case charges a ring of fraudsters who used skimming devices to steal unwitting victims’ account information from gas pumps, ATMs, and similar common points of sale. The defendants then allegedly used that information to make fraudulent debit and credit cards, which they used to withdraw cash from victims’ accounts and make fraudulent purchases (like hundreds of thousands of dollars of postal money orders). According to the indictment, these crimes were committed in and around San Diego, Los Angeles, New York, St. Louis, and Oklahoma.
|U.S. v. Glenmark Pharmaceuticals Inc., USA||Pharmaceuticals, Generic Drugs, Pravastatin, Glenmark Pharmaceuticals, Inc., USA||Antitrust Division||
Glenmark Pharmaceuticals Inc., USA is charged with knowingly entering into and engaging in a conspiracy to suppress and eliminate competition by agreeing to increase and maintain prices of pravastatin and other generic drugs sold in the United States. The charged conspiracy began at least as early as May 2013 and continued at least until December 2015.
|U.S. v. Andrey Turchin||fxmsp||USAO - Washington, Western||
The indictment charges TURCHIN with conspiracy to commit computer hacking, two counts of computer fraud and abuse (hacking), conspiracy to commit wire fraud, and access device fraud. TURCHIN and his accomplices perpetrated an ambitious hacking enterprise broadly targeting hundreds of victims across six continents. TURCHIN employed a collection of hacking techniques and malicious software (malware) to gain and maintain access to victim networks. For instance, he often used specially designed code to scan the Internet for open Remote Desktop Protocol (RDP) ports and conduct brute-force attacks to initially compromise victim networks. Once inside the victim’s system, he moved laterally throughout the network and deployed additional malicious code to locate and steal administrative credentials and establish persistent access. The conspirators often modified antivirus software settings to allow malware to continue to run undetected. TURCHIN and his co-conspirators then marketed and sold the network access on various underground forums commonly frequented by hackers and cybercriminals, such as Exploit.in, fuckav.ru, Club2Card, Altenen, Blackhacker, Omerta, Sniff3r, and L33t, among others. As has been publicly reported, the “fxmsp” group has been linked to numerous high-profile data breaches, ransomware attacks, and other cyber intrusions.
|US v. Mario Castro, et al||Mario Castro, Salvador Castro, Jose Castro, Miguel Castro, Andrea Burrow, Jose Mendez||USAO - Nevada||
The indictment charges Mario Castro, 51, Jose Salud Castro, 70, Salvador Castro, 53, Miguel Castro, 55, Jose Luis Mendez, 45, and Andrea Burrow, 49, with mail fraud and conspiracy to commit mail fraud. According to the indictment, the defendants ran a fraudulent prize-notification scheme that tricked hundreds of thousands of consumers, many of whom were elderly and vulnerable, into paying a $20 or $30 fee to claim a large cash prize. None of the victims who submitted fees ever received a large cash prize, the indictment alleges.
|US v. Blue Bell Creameries; US v. Paul Kruse (related)||Civil Division||
Texas-based ice-cream maker Blue Bell Creameries pleaded guilty to a criminal information filed in the Western District of Texas resolving charges that Blue Bell shipped listeria-contaminated products in 2015. Blue Bell pleaded guilty to two misdemeanor counts of distributing adulterated ice cream products and was sentenced to pay a criminal fine and forfeiture amount totaling $17.25 million. Blue Bell also agreed to pay an additional $2.1 million to resolve civil False Claims Act allegations regarding ice cream products manufactured under insanitary conditions and sold to federal military facilities.
Blue Bell’s former president, Paul Kruse, was indicted separately on October 20, 2020 in connection with his alleged role in covering up from customers what the company knew about the contaminated ice cream. The case against Mr. Kruse is currently set for trial on July 26, 2021. The following is information relevant to the case against Mr. Kruse.
CASE NO. 1:20-CR-00249-RP (W.D.TX)
Court Assigned: The case of U.S. v. Kruse is assigned to the Honorable Robert Pitman, U.S. District Court for the Western District of Texas, U.S. Federal Building and Courthouse, 501 West Fifth Street, Suite 5300, Austin, TX, 787011
U.S. District Court Judge Pitman set the trial to begin on July 26, 2021. The trial will take place at the Federal Courthouse in Austin, Texas at 501 West Fifth Street, Austin, TX.
For more information about the charges, please see below link to the press release and indictment:
The information on this website will be updated as new developments arise in the case.
Presumption of Innocence: It is important to keep in mind that an indictment contains allegations only, and that defendants are presumed innocent until proven guilty and that presumption requires both the court and our office to take certain steps to ensure that justice is served.
|U.S. v. Florida Cancer Specialists & Research Institute||Florida Cancer Specialists, FCS, Oncology||Antitrust Division||
Florida Cancer Specialists & Research Institute, LLC was charged with participating in a conspiracy to suppress and eliminate competition by agreeing to allocate the provision of medical and radiation oncology services. Specifically, FCS and its co-conspirators agreed not to compete to provide chemotherapy and radiation treatments to cancer patients in Southwest Florida. Beginning as early as 1999 and continuing until at least 2016, FCS entered into an illegal agreement that allocated chemotherapy treatments to FCS and radiation treatments to a competing oncology group.
|US v. Ankur Khemani, et al||Azure Support, Cloudcomm Technologies, IDT Info Solutions, Tech Crew, AGA Tech Experts, Geek Tech Support, Alignteq, M&A Tech, Toler Tech, Tydan Tech, Deltron Support, Peler Technologies, Gradient Info Solutions||USAO - Tennessee, Eastern||
The defendants operated a bogus computer technical support company. Victims would obtain the toll-free number for the phony service through either (1) a pop-up advertisement that would appear on the victim’s computer, or (2) through an Internet search for technical support services. Victims’ calls would be routed to a call center in India, where an individual posing as a technical support technician would obtain remote access to their computers and falsely inform the victims that their computers had been targeted by hackers and/or had been infected with malware. The phony technician would then pretend to perform repairs and/or install unneeded computer programs. The victim would be billed between $300 and $1,500 for the bogus work performed, and would be instructed to send payment, either by U.S. Postal Service or FedEx, to an address inside the United States. Upon receipt of the payments, defendants inside the United States would send the money to defendants in India.