How About the Chinese Interfering with Voting in America?

The super PAC Women Vote got a $5.4 million contribution in the form of stock in Chinese tech company Baidu. (notice the date too, seems like foreign interference to me)

In 2016, Women Vote raised almost $38 million and spent just over that. In 2018, they are in the $5 million range, so they need some help right? The political action committee, Women Vote was launched by Emily’s List. Ellen Malcolm is the Founder and Chairman of the Board of Emily’s List and her operation(s) are comprised of top leaders, entrepreneurs and activists committed to pro-choice democratic women according to the website. Another Board member is Lisa Jackson. You remember her right? She was head of the EPA during the Obama administration that too used an alias and non-government emails to conduct official government business. Another Board member is Laura Ricketts. She is the owner of the Chicago Cubs and is a member of the Democratic National Committee’s Executive Committee and was the co-chair of the DNC Finance Committee’s LGBT Leadership Council. Add in Maria Teresa Kumar. She is the founding President and CEO of VOTO Latino. She also serves on the Board of Planned Parenthood, the Latino Leaders Network.

Heck there are many progressive liberals on the Board of Emily’s List. Travel over to the site and check it out.

If you have had some weird messages as a Skype user from Baidu…here is the deal. It is a Chinese multinational technology company. Baidu is a top developer of Artificial Intelligence and highly aligned with China president Xi Jinping. What is interesting is Baidu is under a holding company based in the Cayman Islands. The company is also traded on NASDAQ.

According to Wikipedia, there is some shady history with Baidu.

Domain name redirection attack

On January 12, 2010, Baidu.com’s DNS records in the United States were altered such that browsers to baidu.com were redirected to a website purporting to be the Iranian Cyber Army, thought to be behind the attack on Twitter during the 2009 Iranian election protests, making the proper site unusable for four hours.[23] Internet users were met with a page saying “This site has been attacked by Iranian Cyber Army“.[24] Chinese hackers later responded by attacking Iranian websites and leaving messages.[25] Baidu later launched legal action against Register.com for gross negligence after it was revealed that Register.com’s technical support staff changed the email address for Baidu.com on the request of an unnamed individual, despite failing security verification procedures. Once the address had been changed, the individual was able to use the forgotten password feature to have Baidu’s domain passwords sent directly to them, allowing them to accomplish the domain hijacking.[26][27]

Baidu workers arrested

On August 6, 2012, the BBC reported that three employees of Baidu were arrested on suspicion that they accepted bribes. The bribes were allegedly paid for deleting posts from the forum service. Four people were fired in connection with these arrests.[28]

91 Wireless acquisition

On July 16, 2013, Baidu announced its intention to purchase 91 Wireless from NetDragon. 91 Wireless is best known for its app store, but it has been reported that the app store faces piracy and other legal issues.[29] On August 14, 2013, Baidu announced that its wholly owned subsidiary Baidu (Hong Kong) Limited has signed a definitive merger agreement to acquire 91 Wireless Web-soft Limited from NetDragon Web-soft Inc.[30] for 1.85 billion dollars in what was reported to be the biggest deal ever in China’s IT sector.[31]

There is more like the death of a student from cancer while working at headquarters.

Pretty weird that a Chinese tech company is getting involved with women voting and a political action committee right?

 

Former FBI McCabe Sues Government

In September of 2017, a lawsuit was filed to obtain records under FOIA in a request to obtain documents regarding Andrew McCabe’s conflicts of interests.

Then in February of 2018, the Office of Inspector General issued a 39 page report complete with allegations relating to the former Deputy Director Andrew McCabe. The investigation included evidence of McCabe’s lying and failure to adhere to policies and practices regarding media contacts.

Since that time, McCabe went to crowd-funding to pay for his legal fees as he pursues legal protection as well as a lawsuit against the FBI and the Department of Justice.

Five things to watch: Acting FBI Director Andrew McCabe ... photo

He has officially sued both. The complaint is found here.

A lawyer for fired former FBI Deputy Director Andrew McCabe is suing the FBI, the Justice Department and its inspector general for refusing to turn over documents related to McCabe’s termination.

McCabe, who worked at the FBI in various roles for more than 20 years, was dismissed only hours before his planned retirement in March, for what the Justice Department called a “lack of candor.”

The firing stripped McCabe and his family of their health care benefits and delayed his ability to collect a federal pension, which he otherwise would have been able to draw on his 50th birthday.

McCabe’s lawyer, David Snyder, maintains in a new lawsuit that the dismissal violated federal law and departed from rules and policies. But he said authorities have refused to turn over materials related to McCabe’s disciplinary process.

“Those requests have been denied by some of the same high-ranking officials who were involved in, or responsible for, the investigation, adjudication, and/or dismissal of Mr. McCabe,” the legal complaint said.

McCabe’s legal team at the Boies Schiller firm has sued to demand the information under the Freedom of Information Act. They’re arguing the documents could help them build a larger case against the Justice Department for wrongful termination and due process violations.

“We don’t create secret law in this country,” Snyder told NPR in an interview.

McCabe has been the subject of political attacks by President Trump and Republican supporters since the 2016 presidential campaign. McCabe’s wife, Jill, ran for the state legislature in Virginia as a Democrat and accepted campaign contributions via then-Gov. Terry McAuliffe, a longtime Clinton loyalist.

Jill McCabe lost her election and the FBI and Justice Department said she and Andrew observed the relevant ethics requirements, but Trump and allies called it an obvious conflict of interest.

Shortly after McCabe’s ouster at the FBI, Trump wrote on Twitter that it was a “great day for democracy.”

Word comes of McCabe’s legal case as the inspector general, Michael Horowitz, prepares to release a massive 500-odd page report on the FBI and Justice Department’s handling of the Hillary Clinton email investigation during the heart of the 2016 election.

McCabe, Comey, and former DoJ leaders including then-Attorney General Loretta Lynch have been under scrutiny in connection with that report, which is expected to become public on Thursday.

Meanwhile, McCabe’s conduct is also under review for possible criminal prosecution by the U.S. Attorney’s Office in Washington, D.C., which has already interviewed McCabe’s onetime boss, former FBI chief James Comey.

The IG concluded that McCabe misled investigators.

McCabe has denied any intentional wrongdoing. Instead, he said, any lapses in his memory or mistakes in his interviews with the IG and others were mistakes derived from the chaos inside the FBI under siege from President Trump and his allies.

Chinese Front Company Used to Recruit Double Agents

THE TRUMP ADMINISTRATION JUST CAUGHT A NEW LEAKER! - US ... photo

Mallory, who had top secret security clearance, worked as a CIA officer, and was stationed in Iraq, China and Taiwan.

Mallory is a self-employed consultant with GlobalEx, LLC. and resides in Leesburg, Virginia. According to the criminal complaint, he graduated from Brigham Young University in 1981 with a bachelor’s degree in political science.

Shortly thereafter, Mallory worked full-time in a military position for five years. Once he left that job, he continued his military service as an Army reservist and worked as a special agent for the State Department Diplomatic Security Service for three years (1987-1990).

 

Kevin Mallory Criminal Complaint by Chris on Scribd

Revealed: Chinese Front Company Used to Recruit U.S. Double Agents

A single reference buried deep within hundreds of pages of court filings in the case of convicted CIA turncoat Kevin Mallory reveals the name of a Shanghai-based “executive search firm” that bears the hallmarks of a classic espionage front, former intelligence operatives from the U.S. and Russia tell The Daily Beast.

The U.S. government’s evidence against Mallory, who was found guilty Friday of espionage-related charges, included a photograph of a business card belonging to alleged Chinese Ministry of State Security (MSS) agent Richard Yang, who presented himself as a corporate headhunter. Prosecutors said he was one of Mallory’s handlers. According to court documents, the picture was taken at Darren & Associates, a supposed corporate recruiter with no listed phone number or executives and an address that traces back to a rent-by-the-hour space on Shanghai’s Hubin Road.

Darren & Associates’ connection to the Mallory case has not been previously reported. The firm has been in business for either “around 40 years,” as its website claims, or since 2014, as stated on its LinkedIn page. The job networking site lists no actual former or current employees, and the company has a near-zero web presence, which is highly unusual for an organization that describes itself as a successful global enterprise.

“Clearly this is phony,” said former KGB sleeper agent Jack Barsky. “The first thing you do to figure out how real [a company is] is look at their website, and this is just not the footprint of a solid company.”

“Clearly this is phony… The first thing you do to figure out how real [a company is] by looking at their website, and this is just not the footprint of a solid company.”
— former KGB sleeper agent Jack Barsky

It’s a “flimsy mechanism for them to use,” agreed former CIA officer Christopher Burgess. “To me, this is what someone would put up so that their business contact isn’t naked. But what it doesn’t do is talk about who they are, where they are, doesn’t give you names, and their mission is so general that it can cover anything.”

Richard Yang subsequently introduced Mallory to an associate, Michael Yang, who claimed to be affiliated with the Shanghai Academy of Social Sciences (SASS). It has a close relationship with the Shanghai State Security Bureau (SSSB), a sub-component of the Ministry of State Security, according to the FBI. The Shanghai security bureau “uses SASS employees as spotters and assessors,” says one court filing, and “FBI has further assessed that SSSB intelligence officers have also used SASS affiliation as cover identities.”

Chinese think tanks like the Shanghai academy “can be used to invite someone over who is either a person of interest or a source,” Peter Mattis of the Jamestown Foundation’s China Program told Bethany Allen-Ebrahimian and Elias Groll of Foreign Policy last year. “That person comes over and gives a talk, and they’ll be met and have meetings with the local state security element or the People’s Liberation Army.”

via Facebook

Others are based in the U.S., they pointed out. The China Institute of Contemporary International Relations describes itself as a “comprehensive research institution” but is also “an official numbered bureau of the Ministry of State Security, functioning rather like the CIA’s Open Source Center.”

Darren & Associates, the erstwhile headhunting firm, seems rather less sophisticated. Either the MSS was “too lazy” to create a more realistic front company, or they thought “no one would give a shit about this Mallory guy and no one would be checking it,” said a former Russian FSB officer now living in the U.S. under the pseudonym “Jan Neumann.”

But U.S. authorities did care, and Mallory’s scheme unraveled in 2017 when he was selected for secondary screening at Chicago’s O’Hare Airport after a trip to China. Although he said he had nothing to declare, customs officers found $16,500 in cash on him.

““An individual like Mallory, with 20-plus years of high-end intelligence community engagement should have known better than [to use] this weak cover story that the Chinese gave him.”
— former CIA officer Christopher Burgess

“An individual like Mallory, with 20-plus years of high-end intelligence community engagement should have known better than [to use] this weak cover story that the MSS gave him,” said Burgess. “He should have picked up the phone and called the FBI and said, ‘Hey, these people say they’re legitimate businesspeople, and I don’t think they are.’ And he should have done that years ago.”

The details of exactly what Mallory gave up have yet to be publicly revealed, and probably won’t ever be, said Burgess. But according to prosecutors, Mallory gave away the most precious secrets of all—the names of U.S. agents in China.

A CIA information review officer said in court last year that the documents Mallory gave to the Chinese contained sensitive intelligence, analysis, and the names of assets that “could reasonably be expected to cause the loss of critical intelligence and possibly result in the lengthy incarceration or death of clandestine human sources.”

”It’s a betrayal in the truest sense of the term,” former CIA Inspector General Frederick Hitz told The Daily Beast.

FBI analysts further determined that Mallory “had completed all of the steps necessary to securely transmit at least four documents…one of which contained unique identifiers for human sources who had helped the U.S. government.”

Some of these files were stored on a Toshiba SD card, which Mallory concealed in aluminum foil and hid in his bedroom closet.

“We overlooked it twice,” FBI Special Agent Melinda Capitano testified Thursday.

“What made you think to open it?” the prosecutor asked.

“Usually in my training, small bits of foil like this contain drugs,” Capitano replied.

via PACER

The foil-wrapped SD card found in Mallory’s home.

Mallory’s defense team claims that the documents were worthless and that he was actually operating as an independent, self-directed counterintelligence officer of sorts to reel in the Chinese agents so he could eventually turn them into U.S. authorities. Burgess calls that “hogwash.” Mallory wasn’t freelancing in counterintelligence, he “was all-in” as an asset, in Burgess’ opinion.

“He was responsive to tasking, he used covert communications to reduce face-to-face interactions with his PRC contact,” said Burgess. “If I was validating a source, those are all indications that I have a good one.”

“He’s throwing something at the wall to see if it sticks,” laughed former Defense Intelligence Agency officer Ray Semko. “Just as long as they get one fool [on the jury] to believe it.”

Mallory’s attorney, Geremy Kamens, declined a request for comment.

Mallory, his wife, and one of his three kids lived in a four-bedroom, four-bathroom, 7,100-square foot house in Leesburg, Virginia, complete with a home theater and two fireplaces. He paid $1.15 million in 2005, a lot of money for a guy prosecutors said earned only $25,000 in the three years—all of it from his Chinese handlers.

He also has three adult children from a previous marriage. A court filing said Mallory had $50,000 in credit card debt, and about $2,500 in cash and investments. His wife, Mariah Nan-Hua Mallory, drives a school bus and earns roughly $9,000 a year.

In a motion previously filed with the court arguing against Mallory’s release pending trial, prosecutors said he had “demonstrated a pattern of dishonesty.”

“The defendant says and does anything he wishes to suit his particular needs, which seem largely to be finding an easy path out of his financial hardship, by betraying his government,” the motion stated.

A disguise kit found by FBI agents during a search of Mallory’s home.

However, Patsy Harrington, a real estate broker and close friend of Mallory’s who sold him his home, insists that Mallory is being totally mischaracterized.

“He is a loyal serviceman that was hurt in the line of duty in the Middle East, he’s a wonderful family man and a devoted Mormon with a wonderful wife and three highly accomplished grown children,” Harrington told The Daily Beast. “He’s a good man. I was a single mom and he was wonderful to me. He’s much better than 97 percent of the human beings I know.”

A LinkedIn recommendation from Min Xu, an associate professor at Central China Normal University describes Mallory as “a very faithful, honest, loyal, serious but kind, helpful, contagious person, very nice to everyone around, I will always remember his timely help and the warmth he gave to us when we were in trouble. He is really an amazing man.”

In fact, the Chinese agents who targeted Mallory initially reached out to him on LinkedIn. It’s a virtual goldmine for those looking to identify members of the “cleared community,” said Christopher Burgess, who has been contacted by people he assumed were foreign intelligence operatives more times than he can count.

via PACER

Yet Chinese intelligence isn’t only interested in people with active security clearances. Anyone with access or influence can potentially be of value, and everyone from professors to scientists to journalists have received overtures from foreign spy services.

National security reporter Garrett Graff was targeted on LinkedIn by Evgeny Buryakov, a Russian SVR operative posing as a New York City investment banker. And a Chinese agent used LinkedIn to reach out to journalist Nate Thayer last year.

“On the day I received my first message from Chinese intelligence agents from the Ministry of State Security, they, of course, didn’t say they were Chinese spies,” Thayer wrote on his blog. “The note was from ‘Frank Hu,’ a ‘project assistant’ from Shanghai Pacific & International Strategy Consulting Co, saying he had found me on the Internet and was writing to ‘seek potential cooperation opportunities.’”

Predictably, there is no “Shanghai Pacific & International Strategy Consulting Co,” which doesn’t even maintain a rudimentary Darren & Associates-style website. “Hu” told Thayer the company was “a consulting firm, specializing in independent policy analysis and advisory services. We strive to help our clients properly assess political dynamics, risks and opportunities in countries and regions they operate in.”

“In terms of human source operations, the PRC ‘services’ are not all that sophisticated,” an intelligence community source told Thayer, “until they get you on their turf. So don’t go there–to Shanghai, that is–for any reason.”

Of course, there is no such thing as a foolproof system in espionage, and breaches like Mallory’s will surely happen again.

As Joseph Wippl, a 30-year veteran of the CIA’s National Clandestine Service, told The Daily Beast, “It’s part of the business.”

When a Fishing Ship is a Chinese Spy Ship

The Chinese are relentless in all parts of the world.

It may not have looked like much of a match — or a showdown for that matter — but when Australia’s largest warship HMAS Adelaide arrived at the Fijian port of Suva on Saturday, it had an interesting neighbour.

Key points:

  • Chinese fishing boat believed to be carrying wide range of surveillance equipment
  • Fiji tipped off Australian Navy about Chinese spy ship expected to dock next to HMAS Adelaide
  • China has a strong commercial and military presence in the South Pacific

A Chinese ship fitted with communications equipment docked alongside the new Canberra-class landing helicopter dock.

The Royal Australian Navy suspects the Chinese vessel is a spy ship, which deliberately arrived at the same time to carry out surveillance on the Australians.

HMAS Adelaide and other Australian warships visiting Fiji will “take the appropriate security precautions”, but the surveillance craft is “just another ship”, Captain Jim Hutton, Commander of the Navy’s Joint Task Group 661, said.

Deputy Chief of Navy Rear Admiral Mark Hammond also played down concerns about the presence of the Chinese vessel.

“That’s a space surveillance ship, it’s a scientific ship,” he told reporters on board HMAS Adelaide.

ABC News understands the primary purpose of the Chinese ship is to track satellite launches from out on the ocean, but it does have the capability to also collect intelligence on other naval vessels.

Australia’s High Commissioner to Fiji John Feakes also revealed the skipper of the Chinese vessel had even been invited to an on-board reception, although it is not clear whether the offer was accepted.

Australia’s Navy, like every navy around the world, is well-versed in these sorts of nautical games.

“If you’re in the Navy you presume that anytime that a fishing vessel or even merchant fleets of nations like China are around that they may have a dual purpose,” ANU academic and retired Australian Naval Commodore Richard Menhinick said.

“You just presume that they may well be tasked by government for other activities.”

China’s looking for South Pacific foothold

Chinese presence — both commercial and military — is common in the South Pacific.

Beijing sees economic opportunity in the region and economic imperatives commonly herald other strategic interests.

Agriculture and aquaculture projects in Vanuatu, Fiji, Tonga and other Pacific nations have been given significant help by the Chinese over the years, as have roads, ports and other infrastructure.

Media player: “Space” to play, “M” to mute, “left” and “right” to seek.

When you have more than 1.3 billion people back home to feed, finding secure food supplies are critical.

As China grows, Mr Menhinick said it was not surprising that the nation’s presence in the Pacific was also increasing.

“China’s a rising power… economic power’s always led and the military’s followed, and the Chinese economic interest in the south-west Pacific has increased substantially over the last fifteen year,” he said.

But Australia and its strategic partners are anxious China does not use its presence to jeopardise regional structures — political, economic and diplomatic.

Now a visiting US General has given the strongest public indication yet that his nation would like Australia to join in naval and air patrols to challenge Beijing’s claims in the South China Sea.

Asked whether joint American-Australian patrols would be welcomed by America, the commander of US Marines in the Pacific, Lieutenant General David Berger gave an enthusiastic response.

“Obviously that’s Australia’s decision, would we welcome that? Absolutely yes,” Lt Gen Berger said.

Meanwhile, all eyes are on Singapore….but in advance of the talks between the United States and North Korea in Singapore, there was a LOT of nefarious activity.

Related reading: Emissary Panda – A potential new malicious tool

photo

Independent: Hackers from China and Russia are targeting South Korea with cyber espionage attacks ahead of the summit between the US and North Korea, a leading security firm has claimed.

The foreign ministry and financial institutions were identified as potential targets by, US cyber security firm FireEye.

The company’s analysts noted the timing of the attacks and said they expected the intensity of the operations to increase in the build up to the historic meeting between US President Donald Trump and North Korean Chairman Kim Jong-un.

“South Korea has frequently been the target of cyber espionage. Though the biggest threat is North Korea actors. [FireEye] believes that China- and Russia- [based hackers] also target South Korea,” Ben Read, a cyber espionage analyst at the firm, told The Independent.

“With the heightened attention to inter-Korean relations in the lead up to a potential Trump–Kim meeting, we expect this targeting to continue at an increased pace.”

Scheduled to take place on 12 June in Singapore the leader are expected to discuss the denuclearisation of North Korea.

It will be the first meeting between a sitting US president and leader of North Korea.

Some experts have suggested that a formal end to the  Korean War – more than six decades after the 1950-1953 conflict – could be declared.

Although an armistice was signed, no peace treaty has ever been signed to formally end the war.

The two hacking groups identified by the FireEye researchers were TempTick and Turla, both of which are suspected of being state-sponsored operations.

TempTick has previously been involved in attacks on Chinese dissident organisations, as well as Japanese public and private sector institutions. It has been active since 2009.

The earliest known attacks linked to the group known as Turla are from 2006.

FireEye researchers noted: “They consistently target governments worldwide in search of information that can inform Russian government decision making.”

 

Hat Tip to the FBI for Operation Wire Wire

Beyond phishing, there is vishing and smishing.
Vishing is using the phone, either a land line or cell.
Smishing is scamming your text messages.
Tactics are constantly being developed. Are you paying attention?
Department of Justice
Office of Public Affairs

FOR IMMEDIATE RELEASE
Monday, June 11, 2018

74 Arrested in Coordinated International Enforcement Operation Targeting Hundreds of Individuals in Business Email Compromise Schemes

42 Alleged Fraudsters Arrested in the United States

Federal authorities announced today a significant coordinated effort to disrupt Business Email Compromise (BEC) schemes that are designed to intercept and hijack wire transfers from businesses and individuals, including many senior citizens.  Operation Wire Wire, a coordinated law enforcement effort by the U.S. Department of Justice, U.S. Department of Homeland Security, U.S. Department of the Treasury and the U.S. Postal Inspection Service, was conducted over a six month period, culminating in over two weeks of intensified law enforcement activity resulting in 74 arrests in the United States and overseas, including 29 in Nigeria, and three in Canada, Mauritius and Poland.  The operation also resulted in the seizure of nearly $2.4 million, and the disruption and recovery of approximately $14 million in fraudulent wire transfers.

BEC, also known as “cyber-enabled financial fraud,” is a sophisticated scam often targeting employees with access to company finances and businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments.  The same criminal organizations that perpetrate BEC also exploit individual victims, often real estate purchasers, the elderly, and others, by convincing them to make wire transfers to bank accounts controlled by the criminals. This is often accomplished by impersonating a key employee or business partner after obtaining access to that person’s email account or sometimes done through romance and lottery scams.  BEC scams may involve fraudulent requests for checks rather than wire transfers; they may target sensitive information such as personally identifiable information (PII) or employee tax records instead of, or in addition to, money; and they may not involve an actual “compromise” of an email account or computer network.  Foreign citizens perpetrate many BEC scams.  Those individuals are often members of transnational criminal organizations, which originated in Nigeria but have spread throughout the world.

“Fraudsters can rob people of their life’s savings in a matter of minutes,” said Attorney General Sessions. “These are malicious and morally repugnant crimes. The Department of Justice has taken aggressive action against fraudsters in recent months, conducting the largest sweep of fraud against American seniors in history back in February. Now, in this operation alone, we have arrested 42 people in the United States and 29 others have been arrested in Nigeria for alleged financial fraud. And so I want to thank the FBI, nearly a dozen U.S. Attorneys’ Offices, the Secret Service, Postal Inspection Services, Homeland Security Investigations, the Treasury Department, our partners in Nigeria, Poland, Canada, Mauritius, Indonesia, and Malaysia, and our state and local law enforcement partners for all of their hard work. We will continue to go on offense against fraudsters so that the American people can have safety and peace of mind.”

“This operation demonstrates the FBI’s commitment to disrupt and dismantle criminal enterprises that target American citizens and their businesses,” said FBI Director Christopher A. Wray. “We will continue to work together with our law enforcement partners around the world to end these fraud schemes and protect the hard-earned assets of our citizens. The public we serve deserves nothing less.”

“The Secret Service remains committed to aggressively investigating and pursuing those responsible for cyber-enabled financial crimes,” said U.S. Secret Service Director Randolph “Tex” Alles.  “Although the explosive expansion of the cyber domain has forced us to develop innovative ways of conducting these types of investigations, our proven model remains the same.”

“FinCEN has been a leader in the fight against BEC and other cyber-enabled crime,” said FinCEN Director Kenneth A. Blanco. “Since 2014, working with our domestic and international partners, our Rapid Response Program has helped recover over $350 million stolen from innocent Americans.  We must continue to be smarter, quicker, and better than the criminals that we face every day.  Today’s action is a victory, but it will take vigilance, time, and resources to take this fight into the future.  In defense of the victims of these crimes, we are ready for the challenge.”

“The U.S. Postal Inspection Service has a long history of successfully investigating complex fraud and corruption cases,” said Chief Postal Inspector Guy Cottrell. “We are proud to work alongside our fellow law enforcement partners in major efforts, such as Operation Wire Wire, to target those individuals who take advantage of the American public for illegal profits. Anyone who engages in deceptive practices like this should know they will not go undetected and will be held accountable, regardless of where they are. Postal Inspectors will continue to work tirelessly to protect our customers from fraud.”

A number of cases involved international criminal organizations that defrauded small to large sized businesses, while others involved individual victims who transferred high dollar funds or sensitive records in the course of business.  The devastating effects these cases have on victims and victim companies, affect not only the individual business but also the global economy.  Since the Internet Crime Complaint Center (IC3) began keeping track of BEC and its variant, Email Account Compromise (EAC), as a complaint category, there has been a loss of over $3.7 billion reported to the IC3.  BEC and EAC is a prevalent scam and the Justice Department along with our partners will continue to aggressively pursue and prosecute the perpetrators, including money mules, regardless of where they are located.

Money mules may be witting or unwitting accomplices who receive ill-gotten funds from the victims and then transfer the funds as directed by the fraudsters.  The money is wired or sent by check to the money mule who then deposits it in his or her own bank account.  Usually the mules keep a fraction for “their trouble” and then wire the money as directed by the fraudster.  The fraudsters enlist and manipulate the money mules through romance scams or “work-at-home” scams.

Starting in January 2018, this coordinated enforcement action targeted hundreds of BEC scammers.  In addition, law enforcement agents executed over 51 domestic actions including search warrants, money mule warning letters, and asset seizure warrants totaling nearly $1 million.  Local and state law enforcement partners on FBI task forces across the country, with the assistance of multiple District Attorney’s Offices, charged 15 alleged money mules for their role in defrauding victims.  These money mules were employed by the fraudsters to launder their ill-gotten gains by draining the funds into other accounts that are difficult to trace.

Among those arrested on federal charges in BEC schemes include:

  • Following an investigation by the FBI and the U.S. Secret Service, 23 individuals were charged in the Southern District of Florida with laundering at least $10 million from proceeds of BEC scams, including eight people charged in an indictment unsealed last week in Miami. These eight defendants are alleged to have conspired to launder proceeds from numerous BEC scams, totaling at least approximately $5 million, including approximately $1.4 million from a victim corporation in Seattle, as well as various title companies and a law firm.
  • Following an investigation led by the FBI with the assistance of the IRS Criminal Investigation, Gloria Okolie and Paul Aisosa, both Nigerian nationals residing in Dallas, Texas, were charged in an indictment filed on June 6 in the Southern District of Georgia.  According to the indictment, they are alleged to have victimized a real estate closing attorney by sending the lawyer a spoofing email posing as the seller and requesting that proceeds of a real estate sale in the amount of $246,000 be wired to Okolie’s account.  They are charged with laundering approximately $665,000 in illicit funds.  The attorney experienced $130,000 in losses after the bank was notified of the fraud and froze $116,000.
  • Adeyemi Odufuye aka “Micky,” “Micky Bricks,” “Yemi,” “GMB,” “Bawz” and “Jefe,” 32, and Stanley Hugochukwu Nwoke, aka Stanley Banks,” “Banks,” “Hugo Banks,” “Banky,” and “Jose Calderon,” 27, were charged in a seven-count indictment in the District of Connecticut in a BEC scheme involving an attempted loss to victims of approximately $2.6 million, including at least $440,000 in actual losses to one victim in Connecticut.  A third co-conspirator Olumuyiwa Yahtrip Adejumo, aka “Ade,” “Slimwaco,” “Waco,” “Waco Jamon,” “Hade,” and “Hadey,” 32, of Toledo, Ohio, pleaded guilty on April 20 to one count of conspiracy to commit wire fraud.  Odufuye was extradited from the United Kingdom to the United States and on Jan. 3, pleaded guilty to one count of conspiracy to commit wire fraud and one count of aggravated identity theft. Nwoke was extradited to the United States from Mauritius on May 25, marking the first extradition in over 15 years from Mauritius.  His case is pending.
  • Richard Emem Jackson, aka Auwire, 23, of Lagos, Nigeria, was charged in an indictment filed on May 17 in the District of Massachusetts with two counts of unlawful possession of a means of identification as part of a larger fraud scheme. According to the indictment, on two occasions in 2017, Jackson is alleged to have possessed the identifications of two victims with the intent to commit wire fraud conspiracy.  In another case being prosecuted in the District of Massachusetts, a 25-year-old Fort Lauderdale, Florida man was indicted in federal court in Boston on June 6 on one count of money laundering conspiracy. According to the indictment, the individual was part of a conspiracy that engaged in wire fraud. It is alleged that in early 2018, the defendant’s co-conspirators gained access to email accounts belonging to a Massachusetts real estate attorney and sent emails to recipients in Massachusetts that “spoofed” the real estate attorney’s account in an attempt to cause the email recipient to transfer nearly $500,000, which was intended to be used for payment in connection with a real estate transaction, to a shell account belonging to a money mule recruited and controlled by the defendant.

The BEC scam is related to other forms of fraud such as:

  • “Romance scams,” which lull victims to believe that their online paramour needs funds for an international business transaction, a U.S. visit or some other purpose;
  • “Employment opportunities scams,” which recruits prospective employees for work-from-home employment opportunities where employees are required to provide their PII as new “hires” and then are significantly overpaid by check whereby the employees wire the overpayment to the employers’ bank;
  • “Fraudulent online vehicle sales scams,” which convinces intended buyers to purchase prepaid gift cards in the amount of the agreed upon sale price and are instructed to share the prepaid card codes with the “sellers” who ignore future communications and do not deliver the goods;
  • “Rental scams” occur when renters forward a check in excess of the agreed upon deposit for the rental property to the victims and request the remainder be returned via wire or check and back out of the rental agreements and ask for a refund; and
  • “Lottery scams,” which involves persons randomly contacting email addresses advising them they have been selected as the winner of an international lottery.

The cases were investigated by the FBI, U.S. Secret Service, U.S. Postal Inspection Service, U.S. Immigration and Customs Enforcement’s Homeland Security Investigations, the U.S. Department of the Treasury Financial Crimes Enforcement Network (FinCEN) and IRS Criminal Investigation.  U.S. Attorney’s Offices in the Districts of Central California, Connecticut, Eastern Virginia, Massachusetts, Nebraska, New Jersey, Southern Florida, Southern Georgia, Southern Texas, Eastern Pennsylvania, Eastern Washington, Western Pennsylvania, Western Tennessee, Western Washington, Utah, and elsewhere have ongoing investigations some of which have resulted in arrests in Nigeria.  The Justice Department’s Computer Crime and Intellectual Property Section, Money Laundering and Asset Recovery Section and Office of International Affairs of the Criminal Division provided assistance. District Attorney’s Offices of Caddo Parrish in Shreveport, Louisiana; Harris County, Texas and Los Angeles are handling state prosecutions. Additionally, private sector partners and the Nigerian Economic and Financial Crimes Commission, Canadian law enforcement including the Toronto Police Service, the Mauritian Attorney-General and the Commissioner of Police, Polish Police Central Bureau of Investigation, Indonesian National Police Cyber Crimes Unit, and the Royal Malaysia Police provided significant assistance.

This operation, which was funded and coordinated by the FBI, serves as a model for international cooperation against specific threats that endanger the financial well-being of each member country’s residents.  Attorney General Sessions expressed gratitude for the outstanding efforts of the participating countries, including law enforcement actions that were coordinated and executed by the Economic and Financial Crimes Commission (EFCC) in Nigeria to curb business email compromise schemes that defraud businesses and individuals alike.

Victims are encouraged to file a complaint online with the IC3 at bec.ic3.gov. The IC3 staff reviews complaints, looking for patterns or other indicators of significant criminal activity, and refers investigative packages of complaints to the appropriate law enforcement authorities in a particular city or region. The FBI provides a variety of resources relating to BEC through the IC3, which can be reached at www.ic3.gov.

For more information on BEC scams, visit: www.ic3.gov/media/2018/180611.aspx