Monday, 27 June 2011

BALTIMORE STORE OWNER SENTENCED TO 30 MONTHS IN PRISON FOR SELLING COUNTERFEIT LUXURY APPAREL AND ACCESSORIES


3,600 Counterfeit Items Seized from Three Stores Worth Over $400,000

Baltimore, Maryland - U.S. District Judge Catherine C. Blake sentenced Marvin Anthony Johnson, age 47, of Baltimore, today to 30 months in prison followed by three years of supervised release for trafficking in counterfeit goods in connection with selling of counterfeit items with brand names such as Coach, Louis Vuitton, Dolce & Gabbana, Prada, Chanel, Gucci, Polo and Nike. Judge Blake also required Johnson to forfeit $23,957 in unlawful proceeds seized by law enforcement in September 2010.

The sentence was announced by United States Attorney for the District of Maryland Rod J. Rosenstein; Special Agent in Charge William Winter of U.S. Immigration and Customs Enforcement, Homeland Security Investigations; Chief James W. Johnson of the Baltimore County Police Department; and Colonel Terrence Sheridan, Superintendent of the Maryland State Police.

"Counterfeiters like Mr. Johnson rip off consumers by selling substandard products," said William Winter, Special Agent in Charge of U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations (HSI) in Baltimore. "The protection of intellectual property is a top priority for HSI, as counterfeit products represent a triple threat by delivering shoddy and sometimes dangerous, goods into commerce, by funding organized criminal activities and by denying Americans good-paying jobs."
According to his guilty plea, Johnson owned and operated a retail
store known as "Prestigious Fashions" located at 501-A Pennsylvania, Avenue in Baltimore; a sales booth known as "Marvin's Prestigious" located within the North Point Flea Market on North Point Road in Baltimore; and.another sales booth within Hunter's Sales Barn, located on Jacob Tome Memorial Highway in Port Deposit, Maryland. From July to September 3, 2010, Johnson sold counterfeit luxury apparel and accessories from those stores that bore trademarks identical to trademarks used by Coach, Louis Vuitton, Dolce & Gabbana, Prada, Chanel, Gucci, Polo and Nike.

In August 2010, undercover Baltimore County Police officers twice purchased counterfeit goods from Johnson at the two sales booths. Johnson said the items were "fake" and also told undercover officers that he hosts "purse parties" in order to sell the counterfeit items. Baltimore County police officers observed Johnson selling other counterfeit goods.

On September 2 and 3, 2010, law enforcement executed search warrants at six locations and vehicles associated with Johnson and seized approximately 3,600 items of counterfeit luxury wearing apparel and accessories with the above stated brand names, among others. The lost retail value, or infringement amount, of the goods seized is estimated to be between $400,000 and $1 million. Officers also seized approximately $23,957 in cash. Also located in Johnson's van was a cease and desist letter from Coach, directed at the owners/operators of a flea market, and outlines the illegalities of selling counterfeit goods. Johnson’s handwriting appeared on the back of the letter in which he made notations regarding further sales of counterfeit goods.

United States Attorney Rod J. Rosenstein commended the Baltimore County Police Department, ICE - HSI and the Maryland State Police for their work in the investigation. Mr. Rosenstein thanked Assistant United States Attorney Sandra Wilkinson, who prosecuted the case.

Wednesday, 15 June 2011

MAN PLEADS GUILTY TO TRAFFICKING IN COUNTERFEIT GOODS

BUFFALO, N.Y.-- U.S. Attorney William J. Hochul, Jr. announced today that Marvin R. Hardy, Jr., 36, of Buffalo, New York, pleaded guilty before Chief U.S. District Judge William M. Skretny, to trafficking in counterfeit goods and access device fraud. Trafficking in counterfeit goods carries a maximum penalty of 10 years in prison and a fine of $2,000,000. Access device fraud is punishable by up to 15 years in prison and a $250,000 fine.

Assistant U.S. Attorney Marie P. Grisanti, who handled the case, stated that Hardy sold counterfeit purses bearing counterfeit marks from Versace, Burberry, Kate Spade, Gucci, Dolce & Gabbana, Prada, Coach, Balenciaga and Coco Chanel at the “The Purse Barn” in West Seneca, New York. The defendant also charged $2,900 for transactions that never occurred on the credit cards of four customers. Those customers had previously used their credit cards at The Purse Barn.

The plea is the culmination of an investigation on the part of Special Agents of the Federal Bureau of Investigation, under the direction of Richard W. Kollmar, Acting Special Agent In Charge. The West Seneca Police Department assisted in the investigation under the direction of Chief Edward Gehen.

Sentencing is scheduled for September 21, 2011 at 9:00 a.m. EST, in Buffalo, N.Y., before Judge Skretny.

Sunday, 5 June 2011

COMPUTER PROGRAMMER SENTENCED TO FEDERAL PRISON FOR UNAUTHORIZED COMPUTER ACCESS

The Defendant Accessed ATMs Using Malicious Computer Code

CHARLOTTE, NC - A former Bank of America (BOA) computer programmer was sentenced to 27 months in federal prison yesterday, to be followed by two years of supervised release for unauthorized access to the financial institution’s protected computers, announced Anne M. Tompkins, U.S. Attorney for the Western District of North Carolina. U.S. Attorney Tompkins is joined in making today’s announcement by Russell F. Nelson, Special Agent in Charge of the U.S. Secret Service, Charlotte Field Division

U.S. District Judge Frank D. Whitney also ordered Rodney Reed Caverly, 54, of Mint Hill to pay restitution in the amount of $419,310.90. The restitution amount includes $284,750 Caverly stole from ATMs and $134,750.90 in costs incurred by BOA to remove from the bank’s ATM computer system a malicious computer code entered by Caverly. U.S. Secret Service agents also recovered $167,010 of stolen cash based on information provided by the defendant.

According to court records and sentencing proceedings, Caverly, who was hired by BOA to design and maintain its computer systems, had been assigned to work on a project involving the bank’s automated teller machine (ATM) system. Filed documents and court records show that from March 2009 to October 2009, Caverly knowingly and with intent to defraud exceeded his authorized access by gaining access to one or more protected BOA computers and deployed a malicious computer code to select BOA ATMs. The malicious code caused a limited number of infected ATMs to disburse cash from the ATMs without any transaction record of the cash disbursements. The code Caverly entered caused only the unauthorized disbursement of cash stored in the ATM machines and did not affect any financial accounts of BOA’s customers.

Caverly pleaded guilty on April 13, 2010 and was released pending his sentencing hearing. Upon designation to a federal facility, he will report to the custody of the Federal Bureau of Prisons. Federal sentences are served without the possibility of parole.

The investigation was handled by the U.S. Secret Service, Charlotte Field Office, and was prosecuted by Assistant U.S. Attorney Thomas O’Malley of the U.S. Attorney’s Office in Charlotte.

.

Saturday, 28 May 2011

Charges Filed Involving Distribution of Pirated Motion Pictures

Richard Arnold Also Indicted for Social Security Fraud

GREENEVILLE, Tenn.-- A federal grand jury in Greeneville returned a five-count indictment on May 11, 2011, against Richard and Melissa Arnold of Hampton, Tenn., Kristen Bailey, of Erwin, Tenn., and Reginald Garner of Johnson City, Tenn., for a conspiracy to infringe copyrights, and a conspiracy to traffic in counterfeit labels. Richard Arnold was also indicted for defrauding the Social Security Administration. The Arnolds and Bailey appeared in court on May 12, 2011, before U.S. Magistrate Judge Dennis H. Inman. Garner appeared in court on May 16, 2011. Each defendant entered a plea of not guilty to the charges in the indictment. The defendants were released on bond pending trial, which has been set for July 21, 2011 in U.S. District Court, in Greeneville.

The indictment alleges that the defendants were engaged for over five years in a conspiracy which made unauthorized copies of copyrighted motion pictures on DVDs and the labels for the DVDs, and then sold those pirated DVDs to customers in the Tri-Cities area. As a result of the sale of the pirated DVDs, the indictment also seeks forfeiture of property used to commit the offense and property derived from proceeds obtained from the sale of the pirated DVDs. Furthermore, a money judgment is sought from the Arnolds of at least $300,000, representing proceeds from the sale of pirated DVDs.

The indictment further alleges that Richard Arnold defrauded the Social Security Administration to receive Social Security Disability Insurance benefits to which he was not entitled, resulting in an overpayment of benefits of over $59,000.

If convicted, the defendants face a term of up to five years in prison, a fine of up to $250,000 and supervised release of three years for each count, in addition to the forfeiture of the criminal proceeds of the crimes.

This indictment is the result of a joint investigation by the Federal Bureau of Investigation, Social Security Administration, Office of the Inspector General (SSA-OIG), and Carter County Sheriff's Office. Assistant U.S. Attorney J. Gregory Bowman will represent the United States.

Members of the public are reminded that an indictment constitutes only charges and that every person is presumed innocent until their guilt has been proven beyond a reasonable doubt.

May 16, 2011

Monday, 23 May 2011

COMPUTER PROGRAMMER SENTENCED TO FEDERAL PRISON

The Defendant Accessed ATMs Using Malicious Computer Code 
CHARLOTTE, NC - A former Bank of America (BOA) computer programmer was sentenced to 27 months in federal prison yesterday, to be followed by two years of supervised release for unauthorized access to the financial institution’s protected computers, announced Anne M. Tompkins, U.S. Attorney for the Western District of North Carolina. U.S. Attorney Tompkins is joined in making today’s announcement by Russell F. Nelson, Special Agent in Charge of the U.S..
Secret Service, Charlotte Field Division

U.S. District Judge Frank D. Whitney also ordered Rodney Reed Caverly, 54, of Mint Hill to pay restitution in the amount of $419,310.90. The restitution amount includes $284,750 Caverly stole from ATMs and $134,750.90 in costs incurred by BOA to remove from the bank’s ATM computer system a malicious computer code entered by Caverly. U.S. Secret Service agents also recovered $167,010 of stolen cash based on information provided by the defendant.

According to court records and sentencing proceedings, Caverly, who was hired by BOA to design and maintain its computer systems, had been assigned to work on a project involving the bank’s automated teller machine (ATM) system. Filed documents and court records show that from March 2009 to October 2009, Caverly knowingly and with intent to defraud exceeded his authorized access by gaining access to one or more protected BOA computers and deployed a malicious computer code to select BOA ATMs. The malicious code caused a limited number of infected ATMs to disburse cash from the ATMs without any transaction record of the cash disbursements. The code Caverly entered caused only the unauthorized disbursement of cash stored in the ATM machines and did not affect any financial accounts of BOA’s customers.

Caverly pleaded guilty on April 13, 2010 and was released pending his sentencing hearing. Upon designation to a federal facility, he will report to the custody of the Federal Bureau of Prisons. Federal sentences are served without the possibility of parole.

The investigation was handled by the U.S. Secret Service, Charlotte Field Office, and was prosecuted by Assistant U.S. Attorney Thomas O’Malley of the U.S. Attorney’s Office in Charlotte.

Source: http://www.usdoj.gov/usao/ncw

Saturday, 21 May 2011

Cybercriminals Reinvent Methods of Malicious Attacks

Date: July 11, 2008
Source: Trend Micro Incorporated
Trend Micro Incorporated (TSE: 4704), a global leader in Internet content security, reported on July 7 that cybercriminals are not only leveraging new technologies to propagate cybercrime, but are also reinventing forms of social engineering to cleverly ensnare both consumers and businesses, according to the "Trend Micro Threat Roundup and Forecast 1H 2008" report. As a result, the last six months saw an upswing in Web threats, but steady decreases in adware and spyware that are generated by outdated technical methods and can no longer compete with high-level security solutions.

Exploiting human nature through social engineering and phishing techniques


While social engineering tactics such as the Nigerian phishing scam and the Spanish prisoner scam have been around for decades, cybercriminals continue to refresh and modernize this standard form of trickery based on whatever the trend appears to be. For example, the tools and technologies used to create the interactive nature of popular social networking sites have become a land mine for cybercrime. In March, Trend Micro discovered that over 400 phishing kits designed to generate phishing sites were targeting top Web 2.0 sites (i.e. social networking, video sharing and VoIP sites), free email service providers, banks and popular e-Commerce Web sites.

Recently, a new form of phishing warned potential victims about phishing emails as a way to legitimize that email and then tricked them into clicking on a link that leads to a fraudulent site. Spammers are also recycling old techniques. In February, Trend Micro investigated a voice phishing (aka "vishing") attempt. The message appeared convincing, with all links leading to corresponding, legitimate target pages, but included a phony number for recipients to call to reactivate their account, which had been supposedly "placed on hold." Upon calling the phone number, users were asked for their bank card number and PIN, unwittingly opening their bank accounts to the phishers.

Developing malware for blended threats

Malware variants have generally been treated as separate individual threats. Today, profit-motivated Web threats blend various malicious software components into a singular Web threat business model. For example, a cyber criminal sends a message (spam) with an embedded link in the email (malicious URL) or contained in an instant message. The user clicks on the link and is redirected to a Web site where a file (Trojan) automatically downloads onto the user's computer. The Trojan then downloads an additional file (spyware) that captures sensitive information, such as bank account numbers (spy-phishing). Although seemingly one incident, blended threats are much more difficult to combat and much more dangerous for the user.

Exploiting new technologies

The fast-flux technique is an additional example of criminals abusing technology developments. Fast-flux is a domain-name-server (DNS) switching mechanism that combines peer-to-peer networking, distributed command and control, Web-based load-balancing, and proxy redirection to hide phishing delivery sites. Fast-flux helps phishing sites stay up for longer periods to lure more victims. For example, researchers are challenged to identify malicious Storm domains because developers are using fast-flux techniques to evade detection.

A spike in Web threats accompanied by a decline in adware and keyloggers


Trend Micro witnessed a dramatic increase in Web threat activity during the first half of 2008. Web threats peaked in March to 50,000,000 from approximately 15,000,000 in December 2007.

On the decline are adware, trackware, keyloggers and freeloaders. In March 2007, Trend Micro found that approximately 45 percent of PCs were infected by adware; by April 2008, only 35 percent were reportedly infected. In May 2007, approximately 20 percent of PCs were infected by trackware; that number has dropped to less than 5 percent in April 2008. Keyloggers also showed a small, but steady decline with less than 5 percent of PCs being infected (from over 5 percent in September 2007.)

"This is a good example of how cybercriminals are evolving with the times -- they're moving away from threats that use old or waning technologies; instead, focusing on the lucrative threats that bring a bigger payload," said Raimund Genes, chief technology officer of Trend Micro.


Other notable findings from the report:


-- High-profile Web sites became highly targeted. In early January, several massive SQL injection attacks were launched on thousands of Web pages belonging to Fortune 500 corporations, state government agencies and educational institutions.

-- Mobile threats are continuing to play a small part in the new threat landscape. In January, Trend Micro discovered malware disguised as a multimedia file that was used to infect older Nokia mobile phones.

-- With skill comes precision. Cybercriminals are increasingly targeting more affluent users, such as C-level executives who represent a small number of wealthy, high-level individuals in positions of power to gain access to larger bank accounts, login credentials, or even email addresses that span an entire organization.

-- Spam volumes decreased briefly at the beginning of 2008 -- perhaps a post-holiday break for spammers. Volume spiked in March with a small slip in April. Whenever drops in spam activity occur, Trend Micro researchers interpret this as a sign that spammers are either regrouping to launch a new attack or testing new techniques.

-- Bots (compromised PCs) spiked from over 1,500,000 in January to over 3,500,000 in February. This was then followed by a dramatic drop in March.

Six-Month Forecast


According to research and observations of attacks that have occurred since the beginning of this year, Trend Micro researchers predict the following trends over the next six months:

-- Social engineering will remain a key attack method, with more sophisticated tricks evolving. Trend Micro expects cyber criminals to leverage events such as the Summer Olympics, back-to -school shopping, the U.S. election season, soccer and football events, and the holiday season in December.

-- Cybercriminals will continue to target newly discovered vulnerabilities in "third-party" software applications, such as QuickTime, RealPlayer, Adobe Flash, etc.

-- Crimeware that relies on technical methods that are becoming obsolete, such as dialers and keyloggers, will continue to slowly decline in number. Grayware such as trackware and browser hijackers will also slowly fall off in number as they cannot scale well in an era of million-member botnets.

-- Spam volume will continue to rise exponentially with average daily spam volumes predicted to increase by 30- to 50- billion messages per day. Spam and phishing will rise in August to correspond with back-to-school activities and the Olympics. A seasonal spike is also expected in November to correspond with the holidays, with spam forecasted to reach 170 to 180 billion messages per day.

-- As is occurring now, both spam and phishing will continue to play a part in blended threats. About 0.2 percent-one out of every 500 Web requests-are sent to Web sites hosted on infected PCs, and this trend is expected to continue.

-- Bots and botnets will continue to play an important part in the threat chain for spamming, information stealing, targeted attacks and large-scale attack campaigns.

Thursday, 19 May 2011

NEWS RELEASE


Jacques Duplessis was charged today by indictment with engaging in a scheme to sell approximately 6,000 boxes of counterfeit LifeScan One Touch diabetic test strips that he purchased from suppliers in China and England, announced U.S. Attorney Zane David Memeger. The indictment charges Duplessis with mail fraud, trafficking in counterfeit goods, entry of goods into the U.S. through a false statement on a customs form, and making a false statement to a federal agency. According to the indictment, defendant Duplessis was the president and sole shareholder of both America's Premier Supplier Corp. and Royal Global Wholesale Corp., which were both Florida based corporations. Defendant Jacques Duplessis allegedly engaged in a scheme to sell approximately 6,000 boxes of counterfeit LifeScan One Touch diabetic test strips that he purchased from suppliers in China and England to wholesale customers in the United States and Canada, who, in turn, sold those counterfeit products to purchasers in pharmacies and other stores throughout the United States, including in the Philadelphia area. According to the indictment, LifeScan, Inc. (LifeScan), a subsidiary of Johnson & Johnson (J&J), is the distributor of One Touch blood glucose test strips. Lifescan and J&J have registered federal trademarks for diabetic test strips including Lifescan, OneTouch, OneTouch Basic, and OneTouch Ultra.


INFORMATION REGARDING THE DEFENDANT

NAME                                         ADDRESS                                          AGE
---------------------------------------------------------------------------------
Jacques Duplessis                     Boynton Beach, FL                                   60

If convicted the defendant faces a maximum possible sentence of 57 years’ imprisonment, a $3,000,000 fine, three years’ supervised release, and a $500 special assessment.

The case was investigated by the United States Food and Drug Administration Office of Criminal Investigations and is being prosecuted by Assistant United States Attorney Nancy Rue.

May 17, 2011

Sunday, 15 May 2011

FBI set to kill secret-stealing Russian 'botnet'

The FBI has seized control of a Russian cybercrime enterprise, but to kill it completely, officials may ask to rip some malware out of your computer. US diplomatic secrets could be at stake.

The FBI might be asking your permission soon to reach into your computer and rip something out. And you don’t know it’s there.


In a first for US law enforcement efforts to make the Internet more secure, the Federal Bureau of Investigation has seized control of a Russian cybercrime enterprise that has enslaved millions of personal computers and may have gained access to US diplomatic, military, and law enforcement computer systems.

As if WikiLeaks wasn’t bad enough.

But in order to destroy the criminal “botnet” for good, the FBI has to take yet another aggressive step that is alarming privacy rights advocates: remove the malware from the computers in the network. Hopefully all that gets taken out is the malware.

MONITOR QUIZ: How much do you know about cybersecurity?

The FBI’s target is a “robot network” dubbed the “Coreflood botnet” by investigators. It’s a worldwide network created by a Russian cybercrime gang that took control of 2.3 million personal computers that vacuumed up vast amounts of US personal financial and government data for almost a decade before being targeted for extermination.

More than a million of the personal computers recruited into the botnet resided in the US, according to a filing by the Department of Justice in federal court in Connecticut last month.

As of three years ago, Coreflood was sucking up about a gigabyte of data per day and as much as 500 gigabytes a year – about equal to five library floors filled with academic journals. But it was not just credit card, wire transfer, and bank passwords – its primary target – that worried investigators.

At some point, investigators discovered, Coreflood sent back to Russia “master key” access to computer systems belonging to at least one US embassy in the Middle East – which made government officials more than a little nervous, a computer security firm investigator told the Monitor.

Also, as of this year, the Coreflood botnet had assimilated into the US portion of its network hundreds of thousands of computers belonging to 17 state or local government agencies, including one police department, three airports, and two defense contractors. Add to that list five banks or financial institutions, about 30 colleges or universities, and approximately 20 hospital or health care companies as well as hundreds of businesses, according to the Justice Department’s court filing.

Botnets are nearly ideal for criminals

Anonymous and cheap to build, botnets are a nearly ideal criminal platform on the Internet for attacks aimed at shutting down company websites – unless a payment is made – and especially pilfering personal banking credentials. Symantec, the antivirus company, reported nearly 7 million botnets on the Internet in 2009. As powerful as the Coreflood botnet became, it is old enough that most updated antivirus programs should protect computers from infection.

Millions of criminal botnets operate on the Internet today – turning individuals’ personal computers surreptitiously into “zombies” or “bots” that will do whatever their criminal “bot masters” order them to do – without the owner knowing anything about it.

Authorities have tried for years to stop botnets before – with mixed results.

But last month, the Department of Justice and FBI moved to take Coreflood down using an approach that could be a model for handling botnets more effectively in the future. The method?Basically, law enforcement authorities took control of the botnet by inserting into the network their own “command and control” computers capable of giving orders to the network’s individual PC “bots.” 

Source: http://www.crime-research.org/news/10.05.2011/3870/

Thursday, 12 May 2011

LOS ANGELES MAN PLEADS GUILTY TO ROLE IN TRAFFICKING COUNTERFEIT EXERCISE EQUIPMENT MADE IN CHINA

LOS ANGELES – A Los Angeles man pleaded guilty today to trafficking in counterfeit goods for bringing hundreds of bogus, Chinese-made Ab Circle Pro machines and related items into the United States.
Sok Hun Jin, who also uses the name “Eric Jin,” 36, of downtown Los Angeles,
pleaded guilty to trafficking in counterfeit goods.
In a plea agreement filed in federal court, Jin admitted that he was responsible for illegally bringing more than 2,000 bogus Ab Circle Pro machines into the United States. The counterfeit equipment was made in the People’s Republic of China and came to the United States in four containers last year. The retail value of the counterfeit goods is estimated to be approximately $650,000. Separate packages with fake DVDs, manuals and stickers were also shipped from China into the United States.
United States District Judge Percy Anderson is scheduled to sentence Jin on September 12. At that time, Jin faces a maximum statutory sentence of 10 years in prison and up to $2 million in fines.
The case is the product of an investigation by U.S. Immigration and Customs Enforcement’s Homeland Security Investigations and U.S. Customs and Border Protection.
Last year, in a separate case, a Chino woman received a 41-month prison sentence in federal court in Los Angeles for importing counterfeit exercise gear
 (see: http://www.justice.gov/usao/cac/pressroom/pr2010/155.html).
In another case in court today involving counterfeit items manufactured in China, the owners of a Los Angeles jewelry story were sentenced to prison for illegally importing and selling counterfeit designer jewelry, some of which tested positive for hazardous levels of lead.

Wednesday, 11 May 2011

COLUMBIA MAN SENTENCED FOR SELLING COUNTERFEIT MOVIES

Columbia, South Carolina---- United States Attorney Bill Nettles stated today that Johnnie B. Gray, age 29, of Columbia, South Carolina, was sentenced today in federal court for infringement of copyright, a violation of 18 U.S.C. § 2319. United States District Judge Joseph F. Anderson, Jr., sentenced Gray to 24 months imprisonment to be followed by 3 years of supervised release.

Gray previously pleaded guilty to using a five-bay DVD duplicator to make copies of movies that had been produced by Hollywood studios. Gray then sold these movies to his customers. During the investigation of the case, federal agents seized nearly 1,500 counterfeit movies from Gray.

During the sentencing hearing, Judge Anderson stated that one of the reasons for the sentence he imposed was that “intellectual property is an important part of free enterprise in the United States and should be promoted and fostered in the law.” The judge also emphasized that is was important to make sure the public was aware that “all those explicit warnings about penalties for illegal copying” that are routinely projected during the opening credits mean that courts can decline to issue “light weight sentences.”

The case was investigated by agents of the Federal Bureau of Investigation. Assistant United States Attorney Dean A. Eichelberger of the Columbia office handled the case.

Monday, 2 May 2011

MICHIGAN WOMAN PLEADS GUILTY TO SELLING MORE THAN $400,000 IN

WASHINGTON – A Michigan woman pleaded guilty today to selling more than $400,000 worth of counterfeit computer software, announced Assistant Attorney General of the Criminal Division Lanny A. Breuer and U.S. Attorney Barbara L. McQuade for the Eastern District of Michigan, Jacinda Jones, 31, of Ypsilanti, Mich., pleaded guilty to one count of willful copyright infringement before U.S. District Judge David M. Lawson in Detroit. According to court documents, between July 2008 and January 2010, Jones earned more than $400,000 by selling over 7,000 copies of pirated business software at discounted prices through the website www.cheapdl.com. The software had a retail value of more than $2 million and was owned by several companies, including Microsoft, Adobe, Intuit and Symantec. According to court documents, Jones’ activities came to the attention of U.S. Immigration and Customs Enforcement (ICE) agents, who made several undercover purchases of the pirated business and utility software.

At sentencing, Jones faces maximum penalties of five years in prison, a $250,000 fine and three years of supervised release. During her guilty plea hearing, Jones also agreed to forfeit any illegal proceeds from her criminal activity and pay restitution to the victims. Sentencing has been scheduled for Aug. 15, 2011, at 9 a.m.

The case is being prosecuted by Assistant U.S. Attorney Terrence Berg of the U.S. Attorney’s Office for the Eastern District of Michigan and Trial Attorney Thomas Dougherty of the Criminal Division’s Computer Crime and Intellectual Property Section. The investigation was conducted by the Field Support Unit of the National Intellectual Property Rights Coordination Center (IPR Center) and by ICE’s Office of Homeland Security Investigations in Detroit.

The enforcement action announced today is an example of the type of efforts being undertaken by the Department of Justice Task Force on Intellectual Property (IP Task Force). Attorney General Eric Holder created the IP Task Force to combat the growing number of domestic and international intellectual property crimes, protect the health and safety of American consumers, and safeguard the nation’s economic security against those who seek to profit illegally from American creativity, innovation and hard work. The IP Task Force seeks to strengthen intellectual property rights protection through heightened criminal and civil enforcement, greater coordination among federal, state and local law enforcement partners, and increased focus on international enforcement efforts, including reinforcing relationships with key foreign partners and U.S. industry leaders. To learn more about the IP Task Force, go to www.justice.gov/dag/iptaskforce/.

Friday, 29 April 2011

HACKER PLEADS GUILTY TO IDENTITY THEFT AND CREDIT CARD FRAUD RESULTING IN LOSSES OF MORE THAN $36 MILLION

WASHINGTON – Rogelio Hackett Jr., 26, of Lithonia, Ga., pleaded guilty today before U.S. District Judge Anthony J. Trenga in Alexandria, Va., to trafficking in counterfeit credit cards and aggravated identity theft, announced Assistant Attorney General Lanny A. Breuer of the Criminal Division and U.S. Attorney Neil H. MacBride for the Eastern District of Virginia.

According to court documents, U.S. Secret Service special agents executing a search warrant in 2009 at Hackett’s home found more than 675,000 stolen credit card numbers and related information in his computers and email accounts. Hackett admitted in a court filing that since at least 2002, he has been trafficking in credit card information he obtained either by hacking into business computer networks and downloading credit card databases, or purchasing the information from others using the Internet through various “carding forums.” These forums are online discussion groups used by “carders” to traffic in credit card and other personal identifying information.

Hackett also admitted that he sold credit card information, manufactured and sold counterfeit plastic cards, and used the credit card information to acquire gift cards and merchandise. According to court documents, credit card companies have identified tens of thousands of fraudulent transactions using the card numbers found in Hackett’s possession, totaling more than $36 million.

At sentencing, scheduled for July 22, 2011, Hackett will face maximum penalties of 10 years in prison and a $250,000 fine, or twice the gross gain or loss, on the access device fraud charge, and an additional mandatory two years in prison and a $250,000 fine on the identity theft charge.


The case was investigated by the U.S. Secret Service and prosecuted by Michael J. Stawasz, a Senior Counsel for the Criminal Division’s Computer Crime and Intellectual Property Section and a Special Assistant U.S. Attorney for the Eastern District of Virginia.

 http://www.cybercrime.gov/

Friday, 22 April 2011

FORMER SECURITY GUARD, WHO HACKED INTO HOSPITAL’S COMPUTER SYSTEM, IS SENTENCED TO 110 MONTHS IN FEDERAL PRISON

Defendant Posted Video of Himself
Compromising a Hospital’s Computer System on YouTube
 
DALLAS -- Jesse William McGraw, a former contract security guard at the North Central Medical Plaza on North Central Expressway in Dallas, who admitted hacking into that hospital’s computer systems, was sentenced late yesterday afternoon by U.S. District Judge Jane J. Boyle to 110 months on each of two counts, to be served concurrently, announced U.S. Attorney James T. Jacks of the Northern District of Texas. In reaching this sentence, Judge Boyle cited the need for those who commit computer crimes to understand the potentially devastating consequences of their actions, to promote respect for the law, and to deter others involved in or contemplating hacking. Judge Boyle ordered McGraw to make restitution to the occupants in the building affected by his criminal conduct, specifically the W.B. Carrell Memorial Clinic, the North Central Surgery Center, and the Cirrus Group.

In May 2010, McGraw, a/k/a “Ghost Exodus,” 26, of Arlington, Texas pleaded guilty without a plea agreement to an indictment charging two counts of transmitting a malicious code. He has been in custody since his arrest in June 2009.

During his 11:00 p.m. to 7:00 a.m. shift at the North Central Medical Plaza, McGraw gained physical access to more than 14 computers, including a nurses’ station computer on the fifth floor and a heating, ventilation and air conditioning (HVAC) computer located in a locked room. The nurses’ station computer was used to track a patient’s progress through the Carrell Memorial Clinic and medical staff also used it to reference patients’ personal identifiers, billing records and medical history. The HVAC computer was used to control the heating, ventilation and air conditioning for the first and second floors used by the North Central Surgery Center.

McGraw installed, or transmitted, a program to the computers that he accessed that allowed him, or anyone with his account name and password, to remotely access the computers. He also impaired the integrity of some of the computer systems by removing security features, e.g., uninstalling anti-virus programs, which made the computer systems and related network more vulnerable to attack. He also installed malicious codes (sometimes called“bots”) on most of the computers. Bots are usually associated with theft of data from the compromised computer, using the compromised computer in denial of service attacks (DDoS), and using the computer to send spam. McGraw knew his actions would damage the security and integrity of the computers and computer systems. McGraw was the self-proclaimed leader of a hacking organization called the “Electronik Tribulation Army” (ETA). He advocated compromising computers and computer systems in instructions that he posted online for members of the ETA and other individuals interested in engaging in computer frauds and participating in DDoS attacks.

In this case, McGraw admitted that he intended to use the bots and the compromised computers to launch DDoS attacks on the websites of rival hacker groups. ETA’s rival hacker groups included “Anonymous,” the hacker group currently claiming responsibility for attacks against PayPal and others in support of Wikileaks.

On Feb.12, 2009, McGraw abused the trust placed in him and bypassed the physical security to the locked room containing the HVAC computer. At approximately 11:35 p.m., he began downloading a password recovery tool from a website, which he used to re-recover passwords. By Feb. 13, 2009, at approximately 1:19 a.m., McGraw, again without authorization, physically accessed the HVAC computer and inserted a removable storage device and executed a program which allowed him to emulate a CD/DVD device. He remotely accessed the HVAC computer five times on April 13-14, 2009.

On April 28, 2009, at about 1:45 a.m., McGraw abused the trust placed in him as a security guard and accessed without authorization a nurses’ station computer. McGraw made a video and audio recording of what he called his “botnet infiltration.” While the theme of “Mission Impossible” played, McGraw described step by step his conduct, accessing without authorization an office and a computer, inserting a CD containing the OphCrack program into the computer to bypass any passwords or security, and inserting a removable storage device into the computer which he claimed contained a malicious code or program. The FBI found the CD containing the OphCrack program in McGraw’s house and found the source code for the bot on his laptop.

McGraw was aware that modifying the HVAC computer controls could affect the facility’s temperature. By affecting the environmental controls of the facility, he could have affected the treatment and recovery of patients who were vulnerable to changes in the environment. In addition, he could have affected treatment regimes, including the efficacy of all temperature-sensitive drugs and supplies.

He was also aware that the nurses’ station computer was used to access and review medical records. While he claims that he did not review or modify patient records, and the government is not aware of any evidence to the contrary, by gaining administrator access to these computers he would have had the ability to modify these records.

The case was investigated by the FBI and the Texas Attorney General’s Criminal Investigation Division. Assistant U.S. Attorney C. S. Heath prosecuted.


Saturday, 16 April 2011

Computer Crimes

INTERNATIONAL COMPUTER HACKER SENTENCED TO 82 MONTHS IN PRISON To pay almost $8 million in forfeiture and over $2.25 million in back income taxes
MONDAY, FEBRUARY 28, 2011


BOSTON, Mass. - A 37 year-old New Hampshire man was sentenced today in federal court for his role in an international computer hacking conspiracy and his failure to file income tax returns while living in Massachusetts.

ASU PALA was sentenced today by U.S. District Judge Nathaniel M. Gorton to 82 months in federal prison to be followed by two years of supervised release and a $12,500 fine. Judge Gorton also sentenced PALA to forfeit $7,941,336 and to repay the IRS $2,287,993 in back taxes. During sentencing, the Judge imposed a number of special conditions to include counseling for substance abuse, anger management, gambling, credit debt and other financial management problems which PALA must complete upon release from prison.

In April 2010, PALA pleaded guilty to one count of conspiracy to commit computer fraud and five counts of failure to file a United States income tax return. Had the case proceeded to trial, evidence would have proved that from 2003 through 2007, PALA and his coconspirators

infected German citizens’ computers with a program that would force the computers’ telephone modems to surreptitiously dial premium telephone numbers rented from German telephone companies by PALA’s co-conspirators. The premium telephone lines operated like 1-900 numbers such as those used for directory assistance or astrological predictions: the telephone companies charged callers for added expenses on top of standard connection fees and sent a portion of the added expenses to those who rented the premium lines, in this case PALA’s co-conspirators. The victims were generally unaware that their computers' telephone modems were calling these numbers and charging them these expenses. Victims paid the added charges if they did not notice them on their telephone bills. The telephone companies then sent the added charges to the premium telephone line renters, who divided the proceeds among the co-conspirators, including PALA. PALA participated in the conspiracy by employing computer programmers to write and edit the computer hacking software and by sending the hacks to co-conspirators.

Although PALA participated in the scheme while based in Massachusetts and elsewhere in New England, he did not target United States’ computers or computer users. Instead, PALA focused solely on computers and computer users in Germany and possibly other European countries, in order, he thought, to avoid prosecution in the United States. United States Attorney Carmen M. Ortiz, Richard DesLauriers, Special Agent in Charge of the Federal Bureau of Investigation, Boston Field Division, and William P. Offord, Special Agent in Charge of the Internal Revenue Service, Criminal Investigation, Boston Field Division, made the announcement today. The case was prosecuted by Assistant U.S. Attorney Scott L.

Garland of Ortiz’s Computer Crime Unit.