Former City Treasurer in Alaska Indicted for Wire Fraud, Money Laundering, and Tax Evasion

Source: United States Department of Justice News

A federal grand jury in Anchorage returned an indictment on March 21, 2023, charging an Alaska man with wire fraud, money laundering and tax evasion.

According to the indictment, from 2015 to 2022, Jess George Adams of Willow, Alaska, embezzled a total of more than $1.16 million from the City of Houston, Alaska, and from a Wasilla-based equipment company.

The indictment alleges that from 2015 through 2018, Adams was the Treasurer for the City of Houston, entrusted with bookkeeping responsibilities and administrative access to the City’s accounting records and software. Adams allegedly used this access to direct electronic transfers from the City’s bank account to a personal account in his name, maintained by Adams to hide the embezzled funds. It is further alleged that Adams used fictitious entries in the City’s accounting software to make it appear as though these payments were made for legitimate business expenses.

In October 2018, the City of Houston allegedly placed Adams on administrative leave, and he resigned his position in November 2018. A year later, Adams allegedly was employed as a bookkeeper by an equipment company, where he exercised control over the company’s accounting records and software. The indictment charges that, using this access, Adams directed electronic transfers from the company’s bank account to other personal accounts that Adams opened in his name to hide the embezzled money. To conceal his activity, Adams allegedly used fictitious entries in the company’s accounting software to make it appear as though these funds were transferred for the payment of legitimate business expenses.

Adams allegedly laundered the embezzled money he obtained from the equipment company by making several wire transfers from his personal bank account to other accounts, each at a value greater than $10,000.

The indictment further charges that in another attempt to conceal his embezzlement and evade the assessment of income taxes, Adams filed false individual income tax returns for tax years 2016 through 2021, which did not disclose the additional income he diverted to himself.  According to the indictment, Adams was a former seasonal tax return preparer for a national tax advisory company.

Adams is scheduled to make his initial court appearance today before U.S. Magistrate Judge Kyle F. Reardon of the U.S. District Court for the District of Alaska. If convicted, he faces a maximum penalty of 20 years in prison for each wire fraud count, 10 years in prison for each money laundering count, 5 years in prison for each tax evasion count. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

Acting Deputy Assistant Attorney General Stuart M. Goldberg of the Justice Department’s Tax Division and U.S. Attorney S. Lane Tucker for the District of Alaska made the announcement.

IRS-Criminal Investigation is investigating the case with substantial assistance from the Alaska State Troopers.

Trial Attorney Boris Bourget of the Justice Department’s Tax Division and Assistant U.S. Attorney George Tran of the District of Alaska are prosecuting the case.

An indictment is merely an allegation and all defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

New Braunfels Men Plead Guilty to Selling Misbranded Drugs

Source: United States Department of Justice News

SAN ANTONIO – Two New Braunfels men pleaded guilty in a federal court in San Antonio to selling non-controlled but dangerous substances through the mail.

According to court documents, Evan Asher Field, 42, and Michael Dominic Diaz, 30, purchased bulk quantities of various drugs, including synthetic opioids and benzodiazepines, and re-sold them through a website Field created in September 2019.  The drugs, most of which originated in China and were not regulated or approved for any use by the FDA, can potentially cause toxic and fatal overdoses if consumed by humans.  The two defendants, assisted by employee co-conspirators, repackaged the drugs into consumer-size containers and shipped them to various locations throughout the United States.  The initial website remained online until September 2021, when Diaz launched a second website offering a nearly identical service.  Despite disclaimers on the website and product packaging stating “for research purposes only,” and “not for human consumption,” the two defendants were aware that customers were purchasing the substances for personal use and consuming the drugs.

Field pleaded guilty on March 28 to conspiracy to defraud the United States and traffic in misbranded drugs.  Diaz pleaded guilty on April 4 to the same charge.  They each face a maximum penalty of five years in prison and are scheduled to be sentenced on Aug. 8, 2023.  A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

U.S. Attorney Jaime Esparza of the Western District of Texas; Associate Commissioner for Regulatory Affairs Judy McMeekin, Pharm.D., for the U.S. Food and Drug Administration; and Special Agent in Charge Daniel Comeaux for the Drug Enforcement Administration’s Houston Field Office made the announcement.

The FDA and DEA are investigating the case.  This case was prosecuted utilizing resources from the Dark Market and Digital Currency Crimes (DMDCC) Task Force. The DMDCC Task Force is a joint effort between the U.S. Attorney’s Office, HSI – Baltimore, the U.S. Secret Service, the U.S. Postal Inspection Service; the Food and Drug Administration, the Internal Revenue Service – Criminal Investigation, the Drug Enforcement Administration, the Defense Criminal Investigative Service, the Baltimore Police Department, and the Baltimore County Police Department, targeting the use of dark net marketplaces and digital currencies to facilitate criminal activities.

Assistant U.S. Attorneys Justin Chung and Amy Hail are prosecuting the case.

###

Convicted Felon Pleads Guilty to Possession of a Firearm After Being Identified on SnapChat

Source: United States Department of Justice News

CONCORD – A Manchester man, Reda Shehabeldin, 26, pleaded guilty in federal court to one count of possession of a firearm by a prohibited person, U.S. Attorney Jane E. Young announces.

U.S. District Court Judge Samantha Elliott scheduled sentencing for July 12, 2023.  Mr. Shehabeldin was indicted on January 10, 2023.

On July 15, 2022, Shehabeldin was identified—in a video posted by another individual on SnapChat—holding a Glock, model 30 Gen 4 .45 caliber subcompact pistol.  At the time, he was a convicted felon.  Hillsborough County Superior Court convicted Shehabeldin in January 2022 for reckless conduct, a class B felony offense under the state laws of New Hampshire.

The charging statute provides a sentence of no greater than 15 years in prison, three years of supervised release, and a maximum fine of $250,000.00.  Sentences are imposed by a federal district court judge based upon the U.S. Sentencing Guidelines and statutes which govern the determination of a sentence in a criminal case.

The investigation was led by the Bureau of Alcohol, Tobacco, Firearms & Explosives (“ATF”) and the Manchester Police Department.  Assistant U.S. Attorneys John Kennedy and Geoffrey Ward are prosecuting the case.  

This case is part of Project Safe Neighborhoods (“PSN”), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone.  On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities; supporting community-based organizations that help prevent violence from occurring in the first place; setting focused and strategic enforcement priorities; and measuring the results.

###

 

Nurse Practitioner Sentenced in Twelve Million Dollar Health Care Fraud Scheme

Source: United States Department of Justice News

PROVIDENCE, R.I. – A registered nurse and nurse practitioner, who defrauded commercial health insurers and Medicare of nearly $12 million by devising and executing fraudulent billing schemes in three states seeking payment for patient services that were never performed, has been sentenced to seven years in federal prison, announced United States Attorney Zachary A. Cunha.

Alexander A. Istomin, 57, pleaded guilty in October 2022 to an eleven-count Information charging him with health care fraud, mail fraud, aggravated identity theft, and causing the introduction of misbranded drugs into interstate commerce. Istomin admitted that he routinely submitted fraudulent claims for in-person patient services that he did not perform, including supposed patient visits at a “ghost office” in Rhode Island and at offices in Florida and New York. Istomin used seven different tax identification numbers while defrauding eight insurers out of a total of $11,923,686.30.

The “ghost office” was an address that Istomin maintained in East Greenwich, Rhode Island, that he claimed was part of his medical practice when, in fact, he used the location solely for the purpose of receiving mail, including fraudulently obtained insurance payments.

“By billing for services that he never performed, including at a Rhode Island location that was little more than a mail drop, Alexander Istomin thought he could make off with millions in taxpayer and insurance dollars that were meant to fund real medical care, for real people, all without consequence,” remarked U.S. Attorney Zachary Cunha.  “He was very much mistaken. The sentence imposed reflects both this Office’s commitment to bring to justice individuals who perpetrate this kind of brazen fraud and abuse of our health care system, and should serve notice of the consequences for those who seek to enrich themselves through schemes like these.” 

“The Office of Inspector General will continue to fervently pursue those who defraud the Medicare system.  Greed, at the expense of our most vulnerable citizens, will not be tolerated,” said Phillip M. Coyne, Special Agent in Charge for the Office of Inspector General of the U.S. Department of Health and Human Services. “Today’s sentencing is a strong reminder that we will spare no resource to bring to justice those that undermine the integrity of our federal health care system and those served by it.”

“Alexander Istomin went to great lengths to conceal his multi-state, multi-million-dollar health care fraud scheme, billing for services he never provided and patients he never saw. With the proceeds of his illegally gotten gains, he bought a million-dollar home in Florida and expensive cars. This sentence is more than just, given that this is not the first time Mr. Istomin has been accused of health care fraud, nor is it his first brush with the law,” said Joseph R. Bonavolonta, Special Agent in Charge of the FBI Boston Division. “The unscrupulous tactics he used to steal from taxpayers is what drives our investigators to combat healthcare fraud. After all, these taxpayer-funded programs are designed to provide essential medical services to the elderly and disadvantaged, not to enrich corrupt health care professionals and other fraudsters.”

According to documents and information provided to the court, in many instances, patients that Istomin claimed he met with in person were, in fact, out of the country at the time of the supposed visits. On other occasions that Istomin claimed to have been seeing patients, he himself was either in a different state or another country, often visiting his native Russia.

As part of his schemes, Istomin waived copayments for some Medicare patients, despite being aware that waiving copayments is prohibited. He did so to induce his patients not to report his fraudulent billing to Medicare. Additionally, Istomin used patient names and information to get prescriptions filled at various pharmacies and be returned to him. Istomin then distributed those drugs to individuals other than those in whose names the prescriptions were filled.

On Tuesday, U.S. District Court Chief Judge John J. McConnell, Jr., sentenced Istomin to 84 months of incarceration to be followed by three years of federal supervised release; to pay a fine of $30,000; and to pay restitution to Medicare and private insurers totaling $11,923,686.30.

The case was prosecuted by Assistant U.S. Attorney Dulce Donovan, with the assistance of Assistant U.S. Attorneys Milind M. Shah and Mary Rogers.

The matter was investigated the U.S. Department of Health and Human Services, Office of Inspector General; Federal Bureau of Investigation; and the Food and Drug Administration, Office of Criminal Investigations.

###

Criminal Marketplace Disrupted in International Cyber Operation

Source: United States Department of Justice News

The Justice Department announced today a coordinated international operation against Genesis Market, a criminal online marketplace that advertised and sold packages of account access credentials – such as usernames and passwords for email, bank accounts, and social media – that had been stolen from malware-infected computers around the world.

“Working across 45 of our FBI Field Offices and alongside our international partners, the Justice Department has launched an unprecedented takedown of a major criminal marketplace that enabled cybercriminals to victimize individuals, businesses, and governments around the world,” said Attorney General Merrick B. Garland. “Our seizure of Genesis Market should serve as a warning to cybercriminals who operate or use these criminal marketplaces: the Justice Department and our international partners will shut down your illegal activities, find you, and bring you to justice.”

“Yesterday, the Department of Justice and its partners dismantled the Genesis Market and arrested many of its users around the world,” said Deputy Attorney General Lisa O. Monaco. “Genesis falsely promised a new age of anonymity and impunity, but in the end only provided a new way for the Department to identify, locate, and arrest on-line criminals.  The Department of Justice is shining a light on the internet’s darkest corners – in the last year alone, our agents, prosecutors, and partners have dismantled the darknet’s largest marketplaces – Hydra Market, BreachForums, and now Genesis. Each takedown is yet another blow to the cybercrime ecosystem.” 

Since its inception in March 2018, Genesis Market has offered access to data stolen from over 1.5 million compromised computers around the world containing over 80 million account access credentials. Account access credentials advertised for sale on Genesis Market included those connected to the financial sector, critical infrastructure, and federal, state, and local government agencies. Genesis Market was also one of the most prolific initial access brokers (IABs) in the cybercrime world. IABs attract criminals looking to easily infiltrate a victim’s computer system. Genesis Market offered for sale the type of access sought by ransomware actors to attack computer networks in the United States and around the world, and published private-sector reports indicate that they indeed were used by ransomware actors to attack such systems.

Genesis Market was user-friendly, providing users with the ability to search for stolen access credentials based on location and/or account type (e.g., banking, social media, email, etc.). In addition to access credentials, Genesis Market obtained and sold device “fingerprints,” which are unique combinations of device identifiers and browser cookies that circumvent anti-fraud detection systems used by many websites. The combination of stolen access credentials, fingerprints, and cookies allowed purchasers to assume the identity of the victim by tricking third party websites into thinking the Genesis Market user was the actual owner of the account.

Genesis Market users were located all over the world. Federal law enforcement has worked to identify prolific users of Genesis Market who purchased and used stolen access credentials to commit fraud and other cybercrimes. This effort resulted in hundreds of leads being sent to FBI field offices throughout the United States, as well as to foreign law enforcement partners. Further, as part of this operation, dubbed Operation Cookie Monster, law enforcement seized 11 domain names used to support Genesis Market’s infrastructure pursuant to a warrant authorized by the U.S. District Court for the Eastern District of Wisconsin.

“The operation being announced today is the direct result of the hard work, dedication, and exceptional collaborative efforts of the FBI and its partners around the globe,” said U.S. Attorney Gregory J. Haanstad for the Eastern District of Wisconsin. “Along with investigative partners and our Justice Department colleagues, my office remains committed to using all available tools to protect individuals from cybercriminals like those who operate these types of online marketplaces.”

“Today’s takedown of Genesis Market is a demonstration of the FBI’s commitment to disrupting and dismantling key services used by criminals to facilitate cybercrime,” said FBI Director Christopher Wray. “The work in this case is a great example of the FBI’s ability to leverage our technical capabilities and work shoulder-to-shoulder with our international partners to take away the tools cyber criminals rely on to victimize people all across the world.”

The FBI Milwaukee Field Office investigated the case, with assistance from 44 other field offices, the U.K. National Crime Agency, Italy’s Polizia de Stato, Police of Denmark, Australian Federal Police, Royal Canadian Mounted Police, Canada’s Sûreté du Québec, Romanian Police, Cybercrime Sub-directorate for French judicial police, Spain’s Policia Nacional, Spain’s Guardia Civil, Germany’s Federal Criminal Police Service, Swedish Police Authority, Poland’s Central Bureau for Combating Cybercrime, Dutch National Police, Finland’s National Bureau of Investigation, Switzerland’s Office of the Attorney General, Swiss Federal Police, Estonia’s Prosecutor General’s Office, Iceland’s Metropolitan Police, New Zealand Police, Eurojust, and Europol.

The Department appreciates the assistance provided by authorities in Bulgaria and Latvia in response to Mutual Legal Assistance requests.

Trial Attorneys Benjamin Proctor and Jessica Peck of the Criminal Division’s Computer Crime and Intellectual Property Section and Assistant U.S. Attorney Farris Martini for the Eastern District of Wisconsin are handling the investigation. The Justice Department’s Office of International Affairs provided significant assistance. 

Victim credentials obtained over the course of the investigation have been provided to the website Have I Been Pwned, which is a free resource for people to quickly assess whether their access credentials have been compromised (or “pwned”) in a data breach or other activity. Victims can visit HaveIBeenPwned.com to see whether their credentials were compromised by Genesis Market so that they can know whether to change or modify passwords and other authentication credentials that may have been compromised.

If you have been active on Genesis Market, in contact with Genesis Market administrators, or have been a victim and need to report, please email the FBI at FBIMW-Genesis@fbi.gov.