Posts Tagged ‘Scam’

PAYMENT OF US$800,000.00 INTEREST INTO YOUR ACCOUNT:

Yes, it is true. As the following email states I am about to have $800,000 of someone else’s money deposited into my account!!!!! Continue reading

Man accused of trying to scam immigrant kin

Continue reading

CIA Agent Pleads Guilty to Defrauding Covert Credit Cards

By Kevin Poulsen EmailFebruary 06, 2009 | 4:41:53 PMCategories: Spooks Gone Wild  

Cia

A 16-year veteran of the CIA pleaded guilty Thursday to a federal fraud charge after using undercover agency credit cards to run up $75,000 in personal expenses, including costly hotel stays and a $700 watch.

Steven J. Levan, 48, worked as a case agent at the CIA until his recent termination over the fraud.  According to an affidavit (.pdf) by a U.S. postal inspector who investigated the case, Levan made unauthorized personal use of four special credit cards that, while not officially billed to the government, are “customarily paid by the agency.”

“The agency had to pay the defendant’s fraudulent charges on those credit cards, in order to maintain the means by which the agency protects the identity of certain of its employees,” reads the affidavit.

Despite the relatively mild charges, Levan’s been held without bail since his arrest on January 12, based on the government’s assertion that the former spy could begin peddling national security secrets to foreign powers to raise more money.  Levan’s attorney slammed the espionage rhetoric as “rank speculation” in a motion for bail (.pdf) last month.

Veteran CIA spy Steven J. Levan used a covert government credit card to buy himself a $700 Raymond Weil watch — garrote not included.

“Nothing about the underlying allegations relate to espionage or the deprivation of honest services,” wrote Federal Public Defender Michael Nachmanoff. The lawyer acknowledged that Levan has suffered from financial difficulties.

Government filings in the case don’t name the CIA as Levan’s former employer, but Nachmanoff’s bail motion does. Levan apparently joined the agency after graduating from the Virginia Military Institute in 1982, then receiving a Master’s degree in national security studies from the Naval War College and spending four years in the Army.

Judging from his salary tier, Levan occupied a fairly senior position in the CIA: as a GS-15, he earned between $115,000 and $149,000 a year, the top level for government civil service. He’s lived in Virginia — where the CIA is headquartered — and the Washington DC area since 1987, “with the exception of several tours overseas,” wrote Nachmanoff.

In a plea deal with prosecutors this week, Levan agreed to abandon his bid for release on bail, and he pleaded guilty to a single count of access device fraud for running up $7,446 on one of the CIA credit cards at the Staybridge Suites hotel in McLean, Virginia.

Levan also admitted (.pdf) using the identity information on the CIA cards to obtain two more credit cards he had sent to his home. Additionally, he stole another covert credit card from a different, unnamed, government agency, and lifted a coworker’s personal credit card to ring up another $15,000.  In all, the losses topped $100,000.

The government has agreed to recommend a term of no more than a year in prison, and full restitution, when Levan is sentenced on May 1.

Levan is the second CIA official to be outed by allegations of criminal conduct in recent weeks. In late January, ABC News published the name of the former station chief of the CIA’s outpost in Algeria, who’s come under suspicion in the alleged date-rape of several women there.

According to court records, Levan is separated from his wife, who lives in his house with the couple’s children. He committed much of the fraud while living at a Residence Inn in Tyson’s Corner, Virginia. Under an assumed identity, naturally.

Restaurant manager accused of stealing customers identity

By Michelle Durand

from the Daily Journal

The manager of Roti, an Indian bistro in downtown Burlingame, stole identifying information from restaurant customers and used it to buy gift cards and other items from his wife who worked at a South San Francisco Safeway store, according to prosecutors.

Atin Singh, 23, and Iris Singh, 27, of South San Francisco, are both charged with 42 crimes including identity theft, credit card theft and commercial burglary, said Chief Deputy District Attorney Steve Wagstaffe.

They have pleaded not guilty and return to court Feb. 25 for a Superior Court review conference.

According to prosecutors, Antil Singh took customer information from his work place and used it to purchase goods from his wife’s register at the Safeway deli counter.

Antil Singh was reportedly arrested at the restaurant while his wife was apprehended at home and prosecutors charged the couple Jan. 21.

The exact amount of money allegedly taken was not available and a call to the Park Road restaurant went unanswered.

Both Singhs remain in custody in lieu of $500,000 bail. Neither have a criminal history in San Mateo County, according to court records.

 

Michelle Durand can be reached by e-mail: michelle@smdailyjournal.com or by phone: (650) 344-5200 ext. 102. 

Teen accused of sex assaults in Facebook scam

MILWAUKEE – An 18-year-old male student is accused of posing as a girl on Facebook, tricking at least 31 male classmates into sending him naked photos of themselves and then blackmailing some for sex acts.

“The kind of manipulation that occurred here is really sinister in my estimation,” Waukesha County District Attorney Brad Schimel said Wednesday.

The students go to New Berlin Eisenhower High School in New Berlin, which is in Waukesha County about 15 miles west of Milwaukee.

Anthony Stancl, of New Berlin, was charged Wednesday with five counts of child enticement, two counts of second-degree sexual assault of a child, two counts of third-degree sexual assault, possession of child pornography, repeated sexual assault of the same child, and making a bomb threat.

Stancl’s attorney, Craig Kuhary, said Stancl plans to plead not guilty to the charges and hopes to reach a plea agreement with the district attorney

“It’s too early in the case for me to make a statement, other than the fact at some point we are going to go into events that had taken place earlier that might have had some impact on what he did here,” he said. He wouldn’t go into specifics.

The incidents allegedly happened from spring 2007 through November, when officers questioned Stancl about a bomb threat he allegedly sent to teachers and wrote about on a school’s bathroom wall. It resulted in the closing of New Berlin Eisenhower Middle and High School.

According to the criminal complaint, Stancl first contacted the students through the social networking site Facebook, pretending to be a girl named Kayla or Emily.

The boys reported that they were tricked into sending nude photos or videos of themselves, the complaint said.

Thirty-one victims were identified and interviewed and more than half said the girl with whom they thought they were communicating tried to get them to meet with a male friend to let him perform sex acts on them.

They were told that if they didn’t, she would send the nude photos or movies to their friends and post them on the Internet, according to the complaint. Stancl allegedly used the excuse to get the victims to perform repeated acts, the complaint said.

Seven boys were identified in the complaint by their initials as either having to allegedly perform sex acts on Stancl or Stancl on them. The complaint said Stancl took photos with his cell phone of the encounters.

Officers found about 300 nude images of juvenile males on his computer, according to the complaint. Prosecutors said the victims were as young as 15.

A preliminary hearing for Stancl has been scheduled for Feb. 26. The maximum penalty if convicted on all charges is nearly 300 years in prison.

 

Global ATM Caper Nets Hackers $9 Million in One Day | Threat Level from Wired.com

atm-scamy Kevin Poulsen February 03, 2009 | 2:43:39 PMCategories: Crime

A carefully coordinated global ATM heist last November resulted in a one-day haul of $9 million in cash, after a hacker penetrated a server at payment processor RBS WorldPay, New York’s Fox 5 reports.

RBS WorldPay announced on December 23 that they’d been hacked, and personal information on approximately 1.5 million payroll-card and gift-card customers had been stolen. (Payroll cards are debit cards issued and recharged by employers as an alternative to paychecks and direct-deposit.) Now we know that account numbers and other mag-stripe data needed to clone the debit cards were also compromised in the breach.

At the time, the company said it identified fraudulent activity on only 100 cards, making it sound like small beans. But it turns out the hacker managed to lift the withdrawal limits on those 100 cards, before dispatching an global army of cashers to drain them with repeated rapid-fire withdrawals. More than 130 ATMs in 49 cities from Moscow to Atlanta were hit simultaneously just after midnight Eastern Time on November 8.

A class action lawsuit has been filed against RBS WorldPay on behalf of consumers.

A nearly identical cybercrime feeding frenzy targeted payment card company iWire in late 2007. From September 30 to October 1 of that year — just two days — four iWire payroll cards were hit with more than 9,000 actual and attempted withdrawals from ATM machines around the world, resulting in losses of $5 million.

A similar MO was employed against Citibank account holders last year, after a processing server that handles withdrawals from Citibank-branded ATMs at 7-Eleven convenience stores was breached. In that case, cashers converged on New York and withdrew at least $2 million from Citibank accounts, sending 70 percent of the take back to a mysterious hacker kingpin in Russia.

Could all three breaches be the work of a single wealthy cybercrook sitting on piles of cash somewhere in Moscow? Some of the cashers in the iWire and Citibank caper are cooperating with the FBI, so we may eventually find out.

What’s clear is that this is a great time to be a hacker. In just over one year we’ve seen these kinds of breaches go from virtually unheard of into a multimillion dollar industry.

In September, Canadian police announced the arrest of Israeli hacker Ehud Tenenbaum for allegedly penetrating the Calgary-based financial services company Direct Cash Management and increasing the cash limits on prepaid debit cards he and his co-conspirators legitimately purchased. The caper allegedly netted the crooks the equivalent of $1.7 million U.S.

Despite much-ballyhooed payment card security standards, the industry responsible for protecting our money appears to be as leaky as a sieve. But, as always, consumers aren’t responsible for fraudulent withdrawals that they find and promptly report to their card issuer.

via Global ATM Caper Nets Hackers $9 Million in One Day | Threat Level from Wired.com.