Monday, 27 June 2011

BALTIMORE STORE OWNER SENTENCED TO 30 MONTHS IN PRISON FOR SELLING COUNTERFEIT LUXURY APPAREL AND ACCESSORIES


3,600 Counterfeit Items Seized from Three Stores Worth Over $400,000

Baltimore, Maryland - U.S. District Judge Catherine C. Blake sentenced Marvin Anthony Johnson, age 47, of Baltimore, today to 30 months in prison followed by three years of supervised release for trafficking in counterfeit goods in connection with selling of counterfeit items with brand names such as Coach, Louis Vuitton, Dolce & Gabbana, Prada, Chanel, Gucci, Polo and Nike. Judge Blake also required Johnson to forfeit $23,957 in unlawful proceeds seized by law enforcement in September 2010.

The sentence was announced by United States Attorney for the District of Maryland Rod J. Rosenstein; Special Agent in Charge William Winter of U.S. Immigration and Customs Enforcement, Homeland Security Investigations; Chief James W. Johnson of the Baltimore County Police Department; and Colonel Terrence Sheridan, Superintendent of the Maryland State Police.

"Counterfeiters like Mr. Johnson rip off consumers by selling substandard products," said William Winter, Special Agent in Charge of U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations (HSI) in Baltimore. "The protection of intellectual property is a top priority for HSI, as counterfeit products represent a triple threat by delivering shoddy and sometimes dangerous, goods into commerce, by funding organized criminal activities and by denying Americans good-paying jobs."
According to his guilty plea, Johnson owned and operated a retail
store known as "Prestigious Fashions" located at 501-A Pennsylvania, Avenue in Baltimore; a sales booth known as "Marvin's Prestigious" located within the North Point Flea Market on North Point Road in Baltimore; and.another sales booth within Hunter's Sales Barn, located on Jacob Tome Memorial Highway in Port Deposit, Maryland. From July to September 3, 2010, Johnson sold counterfeit luxury apparel and accessories from those stores that bore trademarks identical to trademarks used by Coach, Louis Vuitton, Dolce & Gabbana, Prada, Chanel, Gucci, Polo and Nike.

In August 2010, undercover Baltimore County Police officers twice purchased counterfeit goods from Johnson at the two sales booths. Johnson said the items were "fake" and also told undercover officers that he hosts "purse parties" in order to sell the counterfeit items. Baltimore County police officers observed Johnson selling other counterfeit goods.

On September 2 and 3, 2010, law enforcement executed search warrants at six locations and vehicles associated with Johnson and seized approximately 3,600 items of counterfeit luxury wearing apparel and accessories with the above stated brand names, among others. The lost retail value, or infringement amount, of the goods seized is estimated to be between $400,000 and $1 million. Officers also seized approximately $23,957 in cash. Also located in Johnson's van was a cease and desist letter from Coach, directed at the owners/operators of a flea market, and outlines the illegalities of selling counterfeit goods. Johnson’s handwriting appeared on the back of the letter in which he made notations regarding further sales of counterfeit goods.

United States Attorney Rod J. Rosenstein commended the Baltimore County Police Department, ICE - HSI and the Maryland State Police for their work in the investigation. Mr. Rosenstein thanked Assistant United States Attorney Sandra Wilkinson, who prosecuted the case.

Wednesday, 15 June 2011

MAN PLEADS GUILTY TO TRAFFICKING IN COUNTERFEIT GOODS

BUFFALO, N.Y.-- U.S. Attorney William J. Hochul, Jr. announced today that Marvin R. Hardy, Jr., 36, of Buffalo, New York, pleaded guilty before Chief U.S. District Judge William M. Skretny, to trafficking in counterfeit goods and access device fraud. Trafficking in counterfeit goods carries a maximum penalty of 10 years in prison and a fine of $2,000,000. Access device fraud is punishable by up to 15 years in prison and a $250,000 fine.

Assistant U.S. Attorney Marie P. Grisanti, who handled the case, stated that Hardy sold counterfeit purses bearing counterfeit marks from Versace, Burberry, Kate Spade, Gucci, Dolce & Gabbana, Prada, Coach, Balenciaga and Coco Chanel at the “The Purse Barn” in West Seneca, New York. The defendant also charged $2,900 for transactions that never occurred on the credit cards of four customers. Those customers had previously used their credit cards at The Purse Barn.

The plea is the culmination of an investigation on the part of Special Agents of the Federal Bureau of Investigation, under the direction of Richard W. Kollmar, Acting Special Agent In Charge. The West Seneca Police Department assisted in the investigation under the direction of Chief Edward Gehen.

Sentencing is scheduled for September 21, 2011 at 9:00 a.m. EST, in Buffalo, N.Y., before Judge Skretny.

Sunday, 5 June 2011

COMPUTER PROGRAMMER SENTENCED TO FEDERAL PRISON FOR UNAUTHORIZED COMPUTER ACCESS

The Defendant Accessed ATMs Using Malicious Computer Code

CHARLOTTE, NC - A former Bank of America (BOA) computer programmer was sentenced to 27 months in federal prison yesterday, to be followed by two years of supervised release for unauthorized access to the financial institution’s protected computers, announced Anne M. Tompkins, U.S. Attorney for the Western District of North Carolina. U.S. Attorney Tompkins is joined in making today’s announcement by Russell F. Nelson, Special Agent in Charge of the U.S. Secret Service, Charlotte Field Division

U.S. District Judge Frank D. Whitney also ordered Rodney Reed Caverly, 54, of Mint Hill to pay restitution in the amount of $419,310.90. The restitution amount includes $284,750 Caverly stole from ATMs and $134,750.90 in costs incurred by BOA to remove from the bank’s ATM computer system a malicious computer code entered by Caverly. U.S. Secret Service agents also recovered $167,010 of stolen cash based on information provided by the defendant.

According to court records and sentencing proceedings, Caverly, who was hired by BOA to design and maintain its computer systems, had been assigned to work on a project involving the bank’s automated teller machine (ATM) system. Filed documents and court records show that from March 2009 to October 2009, Caverly knowingly and with intent to defraud exceeded his authorized access by gaining access to one or more protected BOA computers and deployed a malicious computer code to select BOA ATMs. The malicious code caused a limited number of infected ATMs to disburse cash from the ATMs without any transaction record of the cash disbursements. The code Caverly entered caused only the unauthorized disbursement of cash stored in the ATM machines and did not affect any financial accounts of BOA’s customers.

Caverly pleaded guilty on April 13, 2010 and was released pending his sentencing hearing. Upon designation to a federal facility, he will report to the custody of the Federal Bureau of Prisons. Federal sentences are served without the possibility of parole.

The investigation was handled by the U.S. Secret Service, Charlotte Field Office, and was prosecuted by Assistant U.S. Attorney Thomas O’Malley of the U.S. Attorney’s Office in Charlotte.

.

Saturday, 28 May 2011

Charges Filed Involving Distribution of Pirated Motion Pictures

Richard Arnold Also Indicted for Social Security Fraud

GREENEVILLE, Tenn.-- A federal grand jury in Greeneville returned a five-count indictment on May 11, 2011, against Richard and Melissa Arnold of Hampton, Tenn., Kristen Bailey, of Erwin, Tenn., and Reginald Garner of Johnson City, Tenn., for a conspiracy to infringe copyrights, and a conspiracy to traffic in counterfeit labels. Richard Arnold was also indicted for defrauding the Social Security Administration. The Arnolds and Bailey appeared in court on May 12, 2011, before U.S. Magistrate Judge Dennis H. Inman. Garner appeared in court on May 16, 2011. Each defendant entered a plea of not guilty to the charges in the indictment. The defendants were released on bond pending trial, which has been set for July 21, 2011 in U.S. District Court, in Greeneville.

The indictment alleges that the defendants were engaged for over five years in a conspiracy which made unauthorized copies of copyrighted motion pictures on DVDs and the labels for the DVDs, and then sold those pirated DVDs to customers in the Tri-Cities area. As a result of the sale of the pirated DVDs, the indictment also seeks forfeiture of property used to commit the offense and property derived from proceeds obtained from the sale of the pirated DVDs. Furthermore, a money judgment is sought from the Arnolds of at least $300,000, representing proceeds from the sale of pirated DVDs.

The indictment further alleges that Richard Arnold defrauded the Social Security Administration to receive Social Security Disability Insurance benefits to which he was not entitled, resulting in an overpayment of benefits of over $59,000.

If convicted, the defendants face a term of up to five years in prison, a fine of up to $250,000 and supervised release of three years for each count, in addition to the forfeiture of the criminal proceeds of the crimes.

This indictment is the result of a joint investigation by the Federal Bureau of Investigation, Social Security Administration, Office of the Inspector General (SSA-OIG), and Carter County Sheriff's Office. Assistant U.S. Attorney J. Gregory Bowman will represent the United States.

Members of the public are reminded that an indictment constitutes only charges and that every person is presumed innocent until their guilt has been proven beyond a reasonable doubt.

May 16, 2011

Monday, 23 May 2011

COMPUTER PROGRAMMER SENTENCED TO FEDERAL PRISON

The Defendant Accessed ATMs Using Malicious Computer Code 
CHARLOTTE, NC - A former Bank of America (BOA) computer programmer was sentenced to 27 months in federal prison yesterday, to be followed by two years of supervised release for unauthorized access to the financial institution’s protected computers, announced Anne M. Tompkins, U.S. Attorney for the Western District of North Carolina. U.S. Attorney Tompkins is joined in making today’s announcement by Russell F. Nelson, Special Agent in Charge of the U.S..
Secret Service, Charlotte Field Division

U.S. District Judge Frank D. Whitney also ordered Rodney Reed Caverly, 54, of Mint Hill to pay restitution in the amount of $419,310.90. The restitution amount includes $284,750 Caverly stole from ATMs and $134,750.90 in costs incurred by BOA to remove from the bank’s ATM computer system a malicious computer code entered by Caverly. U.S. Secret Service agents also recovered $167,010 of stolen cash based on information provided by the defendant.

According to court records and sentencing proceedings, Caverly, who was hired by BOA to design and maintain its computer systems, had been assigned to work on a project involving the bank’s automated teller machine (ATM) system. Filed documents and court records show that from March 2009 to October 2009, Caverly knowingly and with intent to defraud exceeded his authorized access by gaining access to one or more protected BOA computers and deployed a malicious computer code to select BOA ATMs. The malicious code caused a limited number of infected ATMs to disburse cash from the ATMs without any transaction record of the cash disbursements. The code Caverly entered caused only the unauthorized disbursement of cash stored in the ATM machines and did not affect any financial accounts of BOA’s customers.

Caverly pleaded guilty on April 13, 2010 and was released pending his sentencing hearing. Upon designation to a federal facility, he will report to the custody of the Federal Bureau of Prisons. Federal sentences are served without the possibility of parole.

The investigation was handled by the U.S. Secret Service, Charlotte Field Office, and was prosecuted by Assistant U.S. Attorney Thomas O’Malley of the U.S. Attorney’s Office in Charlotte.

Source: http://www.usdoj.gov/usao/ncw

Saturday, 21 May 2011

Cybercriminals Reinvent Methods of Malicious Attacks

Date: July 11, 2008
Source: Trend Micro Incorporated
Trend Micro Incorporated (TSE: 4704), a global leader in Internet content security, reported on July 7 that cybercriminals are not only leveraging new technologies to propagate cybercrime, but are also reinventing forms of social engineering to cleverly ensnare both consumers and businesses, according to the "Trend Micro Threat Roundup and Forecast 1H 2008" report. As a result, the last six months saw an upswing in Web threats, but steady decreases in adware and spyware that are generated by outdated technical methods and can no longer compete with high-level security solutions.

Exploiting human nature through social engineering and phishing techniques


While social engineering tactics such as the Nigerian phishing scam and the Spanish prisoner scam have been around for decades, cybercriminals continue to refresh and modernize this standard form of trickery based on whatever the trend appears to be. For example, the tools and technologies used to create the interactive nature of popular social networking sites have become a land mine for cybercrime. In March, Trend Micro discovered that over 400 phishing kits designed to generate phishing sites were targeting top Web 2.0 sites (i.e. social networking, video sharing and VoIP sites), free email service providers, banks and popular e-Commerce Web sites.

Recently, a new form of phishing warned potential victims about phishing emails as a way to legitimize that email and then tricked them into clicking on a link that leads to a fraudulent site. Spammers are also recycling old techniques. In February, Trend Micro investigated a voice phishing (aka "vishing") attempt. The message appeared convincing, with all links leading to corresponding, legitimate target pages, but included a phony number for recipients to call to reactivate their account, which had been supposedly "placed on hold." Upon calling the phone number, users were asked for their bank card number and PIN, unwittingly opening their bank accounts to the phishers.

Developing malware for blended threats

Malware variants have generally been treated as separate individual threats. Today, profit-motivated Web threats blend various malicious software components into a singular Web threat business model. For example, a cyber criminal sends a message (spam) with an embedded link in the email (malicious URL) or contained in an instant message. The user clicks on the link and is redirected to a Web site where a file (Trojan) automatically downloads onto the user's computer. The Trojan then downloads an additional file (spyware) that captures sensitive information, such as bank account numbers (spy-phishing). Although seemingly one incident, blended threats are much more difficult to combat and much more dangerous for the user.

Exploiting new technologies

The fast-flux technique is an additional example of criminals abusing technology developments. Fast-flux is a domain-name-server (DNS) switching mechanism that combines peer-to-peer networking, distributed command and control, Web-based load-balancing, and proxy redirection to hide phishing delivery sites. Fast-flux helps phishing sites stay up for longer periods to lure more victims. For example, researchers are challenged to identify malicious Storm domains because developers are using fast-flux techniques to evade detection.

A spike in Web threats accompanied by a decline in adware and keyloggers


Trend Micro witnessed a dramatic increase in Web threat activity during the first half of 2008. Web threats peaked in March to 50,000,000 from approximately 15,000,000 in December 2007.

On the decline are adware, trackware, keyloggers and freeloaders. In March 2007, Trend Micro found that approximately 45 percent of PCs were infected by adware; by April 2008, only 35 percent were reportedly infected. In May 2007, approximately 20 percent of PCs were infected by trackware; that number has dropped to less than 5 percent in April 2008. Keyloggers also showed a small, but steady decline with less than 5 percent of PCs being infected (from over 5 percent in September 2007.)

"This is a good example of how cybercriminals are evolving with the times -- they're moving away from threats that use old or waning technologies; instead, focusing on the lucrative threats that bring a bigger payload," said Raimund Genes, chief technology officer of Trend Micro.


Other notable findings from the report:


-- High-profile Web sites became highly targeted. In early January, several massive SQL injection attacks were launched on thousands of Web pages belonging to Fortune 500 corporations, state government agencies and educational institutions.

-- Mobile threats are continuing to play a small part in the new threat landscape. In January, Trend Micro discovered malware disguised as a multimedia file that was used to infect older Nokia mobile phones.

-- With skill comes precision. Cybercriminals are increasingly targeting more affluent users, such as C-level executives who represent a small number of wealthy, high-level individuals in positions of power to gain access to larger bank accounts, login credentials, or even email addresses that span an entire organization.

-- Spam volumes decreased briefly at the beginning of 2008 -- perhaps a post-holiday break for spammers. Volume spiked in March with a small slip in April. Whenever drops in spam activity occur, Trend Micro researchers interpret this as a sign that spammers are either regrouping to launch a new attack or testing new techniques.

-- Bots (compromised PCs) spiked from over 1,500,000 in January to over 3,500,000 in February. This was then followed by a dramatic drop in March.

Six-Month Forecast


According to research and observations of attacks that have occurred since the beginning of this year, Trend Micro researchers predict the following trends over the next six months:

-- Social engineering will remain a key attack method, with more sophisticated tricks evolving. Trend Micro expects cyber criminals to leverage events such as the Summer Olympics, back-to -school shopping, the U.S. election season, soccer and football events, and the holiday season in December.

-- Cybercriminals will continue to target newly discovered vulnerabilities in "third-party" software applications, such as QuickTime, RealPlayer, Adobe Flash, etc.

-- Crimeware that relies on technical methods that are becoming obsolete, such as dialers and keyloggers, will continue to slowly decline in number. Grayware such as trackware and browser hijackers will also slowly fall off in number as they cannot scale well in an era of million-member botnets.

-- Spam volume will continue to rise exponentially with average daily spam volumes predicted to increase by 30- to 50- billion messages per day. Spam and phishing will rise in August to correspond with back-to-school activities and the Olympics. A seasonal spike is also expected in November to correspond with the holidays, with spam forecasted to reach 170 to 180 billion messages per day.

-- As is occurring now, both spam and phishing will continue to play a part in blended threats. About 0.2 percent-one out of every 500 Web requests-are sent to Web sites hosted on infected PCs, and this trend is expected to continue.

-- Bots and botnets will continue to play an important part in the threat chain for spamming, information stealing, targeted attacks and large-scale attack campaigns.

Thursday, 19 May 2011

NEWS RELEASE


Jacques Duplessis was charged today by indictment with engaging in a scheme to sell approximately 6,000 boxes of counterfeit LifeScan One Touch diabetic test strips that he purchased from suppliers in China and England, announced U.S. Attorney Zane David Memeger. The indictment charges Duplessis with mail fraud, trafficking in counterfeit goods, entry of goods into the U.S. through a false statement on a customs form, and making a false statement to a federal agency. According to the indictment, defendant Duplessis was the president and sole shareholder of both America's Premier Supplier Corp. and Royal Global Wholesale Corp., which were both Florida based corporations. Defendant Jacques Duplessis allegedly engaged in a scheme to sell approximately 6,000 boxes of counterfeit LifeScan One Touch diabetic test strips that he purchased from suppliers in China and England to wholesale customers in the United States and Canada, who, in turn, sold those counterfeit products to purchasers in pharmacies and other stores throughout the United States, including in the Philadelphia area. According to the indictment, LifeScan, Inc. (LifeScan), a subsidiary of Johnson & Johnson (J&J), is the distributor of One Touch blood glucose test strips. Lifescan and J&J have registered federal trademarks for diabetic test strips including Lifescan, OneTouch, OneTouch Basic, and OneTouch Ultra.


INFORMATION REGARDING THE DEFENDANT

NAME                                         ADDRESS                                          AGE
---------------------------------------------------------------------------------
Jacques Duplessis                     Boynton Beach, FL                                   60

If convicted the defendant faces a maximum possible sentence of 57 years’ imprisonment, a $3,000,000 fine, three years’ supervised release, and a $500 special assessment.

The case was investigated by the United States Food and Drug Administration Office of Criminal Investigations and is being prosecuted by Assistant United States Attorney Nancy Rue.

May 17, 2011