Anonymous ID: 90f89a Oct. 19, 2020, 6:59 p.m. No.11162499   🗄️.is 🔗kun   >>2847 >>3081

https://www.justice.gov/opa/pr/ceo-multibillion-dollar-software-company-indicted-decades-long-tax-evasion-and-wire-fraud

 

CEO of Multibillion-dollar Software Company Indicted for Decades-long Tax Evasion and Wire Fraud Schemes

Allegedly Used Secret Swiss and Bermudian Bank Accounts in Scheme to Conceal Approximately Two Billion Dollars of Capital Gains Income

 

NANCY PELOSI'S BACK YARD.

 

A federal grand jury in San Francisco, California, returned a 39 count indictment charging Robert T. Brockman, the Chief Executive Officer of an Ohio-based software company, with tax evasion, wire fraud, money laundering, and other offenses

 

“Today’s indictment reflects the Department of Justice’s commitment to finding and prosecuting the costliest and most sophisticated tax crimes in the United States,” said Principal Deputy Assistant Attorney General of the Tax Division Richard E. Zuckerman.

 

“Complexity will not hide crime from law enforcement,” said U.S. Attorney Anderson. “Sophistication is not a defense to federal criminal charges. We will not hesitate to prosecute the smartest guys in the room.”

 

“As alleged, Mr. Brockman is responsible for carrying out an approximately two billion dollar tax evasion scheme,” said Jim Lee, Chief of IRS Criminal Investigation. “IRS Criminal Investigation aggressively pursues tax cheats domestically and abroad. No scheme is too complex or sophisticated for our investigators. Those hiding income or assets offshore are encouraged to come forward and voluntarily disclose their holdings.”

 

According to the indictment, Brockman, a resident of Houston, Texas, and Pitkin County, Colorado, used a web of offshore entities based in Bermuda and Nevis to hide from the IRS income earned on his investments in private equity funds which were managed by a San Francisco-based investment firm. As part of the alleged scheme, Brockman directed untaxed capital gains income to secret bank accounts in Bermuda and Switzerland. The indictment further alleges that to execute the fraud, between 1999 and 2019, Brockman took measures such as backdating records and using encrypted communications and code words to communicate with a co-conspirator, among other alleged actions.

 

In addition to the tax offenses, the indictment alleges that, between 2008 and 2010, Brockman engaged in a fraudulent scheme to obtain approximately $67.8 million in the software company’s debt securities. As CEO, Brockman was contractually restricted from purchasing any of the software company’s debt securities without prior notice, full disclosure, and amending the associated credit agreements. The indictment alleges that Brockman used a third-party to circumvent those requirements, to acquire the debt securities, and to conceal from the sellers valuable economic information. The indictment further alleges that Brockman used material, non-public information about the software company to make decisions about purchasing the debt. In addition, Brockman allegedly persuaded another individual to alter, destroy, and mutilate documents and computer evidence with the intent to impair the use of such evidence in a grand jury investigation.

 

Brockman is charged with conspiracy, in violation of 18 U.S.C. § 371; seven counts of tax evasion, in violation of 26 U.S.C. § 7201; six counts of failing to file foreign bank account reports, in violation of 31 U.S.C. §§ 5314 & 5322(b); 20 counts of wire fraud affecting a financial institution, in violation of 18 U.S.C. § 1343; two counts of concealment money laundering, in violation of 18 U.S.C. § 1956(a)(1)(B)(i)), and tax evasion money laundering, in violation of 18 U.S.C. § 1956(a)(1)(A)(ii)); and one count each of international concealment money laundering, in violation of 18 U.S.C. § 1956(a)(2)(B)(i)); evidence tampering, in violation of 18 U.S.C. § 1512(b)(2)(B), and destruction of evidence, in violation of 18 U.S.C. § 1512(c)(1).

Anonymous ID: 90f89a Oct. 19, 2020, 7 p.m. No.11162519   🗄️.is 🔗kun   >>2576

https://www.justice.gov/opa/pr/officials-announce-international-operation-targeting-transnational-criminal-organization

 

HMMM

 

Officials Announce International Operation Targeting Transnational Criminal Organization QQAAZZ that Provided Money Laundering Services to High-Level Cybercriminals

U.S. Victims of Various Cybercriminal Malware Schemes throughout the United States Had Stolen Multi-Million Dollar Funds Laundered by QQAAZZ

 

Fourteen members of the transnational criminal organization, QQAAZZ, were charged by a federal grand jury in the Western District of Pennsylvania in an indictment unsealed today. A related indictment unsealed in October 2019 charged five members of QQAAZZ. One additional conspirator, a Russian national, was arrested by criminal complaint in late March 2020 while visiting the United States, bringing the total number of charged defendants to 20. Acting Assistant Attorney General Brian C. Rabbitt of the U.S. Department of Justice’s Criminal Division and U.S. Attorney Scott W. Brady for the Western District of Pennsylvania, made the announcement today.

 

The QQAAZZ members, acting in concert with cybercriminals across the world, are accused of conspiring to launder money stolen from victims of computer fraud in the United States and elsewhere. More than 40 house searches were conducted in Latvia, Bulgaria, the United Kingdom, Spain and Italy, with criminal prosecutions initiated in the United States, Portugal, Spain and the United Kingdom. The largest number of searches and arrests were carried out in Latvia by the Latvian State Police (Latvijas Valsts Policija), and an extensive bitcoin mining operation associated with the group was seized in Bulgaria. Today’s announcement is in coordination with announcements by Europol and several law enforcement agencies across Europe who collaborated with the United States to develop parallel investigations and prosecutions of the QQAAZZ members in their own countries.

 

“Today’s charges, brought in coordination with our European law enforcement partners, reflect the Criminal Division’s steadfast efforts to work with authorities worldwide to protect the public from fraudsters and the money launderers who help them hide their stolen money,” said Acting Assistant Attorney General Brian C. Rabbitt. “Our message to money laundering organizations like QQAAZZ is simple: international borders will not stop the dedicated efforts of law enforcement across the globe to bring you to justice. In addition to the Criminal Division team, I would like to recognize the outstanding efforts of the team led by U.S. Attorney Scott Brady, FBI Pittsburgh, and our European partners.”

 

“Cybercrime victimizes individuals and companies all over the world, so our work to identify and disrupt cybercriminals requires global collaboration,” said U.S. Attorney Scott W. Brady for the Western District of Pennsylvania. “For the past several years, law enforcement from 16 countries has been conducting coordinated investigations of this criminal gang, and now parallel prosecutions will commence in the United States, Portugal, United Kingdom and Spain. As this case demonstrates, we will be relentless in our pursuit of cybercriminals regardless of where they reside.”

 

“This was an extensive investigation that had implications around the world,” said FBI Pittsburgh Special Agent in Charge Michael Christman. “Partnerships are essential, as no one agency can combat cybercrime alone. This case highlights the FBI’s strategy to target and dismantle the most significant cybercriminal enterprises through a global task force approach. I can assure everyone that the FBI and our partners will continue to work tirelessly to combat these cyber threats.”

 

“Cybercriminals are constantly exploring new possibilities to abuse technology and financial frameworks to victimize millions of users in a moment from anywhere in the world,” said Fernando Ruiz, Head of Europol’s European Cybercrime Centre. “Today’s operation shows how through a proper law enforcement international coordination we can turn the table on these criminals and bring them to justice.”

 

The indictment alleges that the QQAAZZ network laundered, or attempted to launder, tens of millions of dollars’ worth of stolen funds from victims of cybercrimes since 2016.

 

Comprised of several layers of members from Latvia, Georgia, Bulgaria, Romania, and Belgium, among other countries, the QQAAZZ network opened and maintained hundreds of corporate and personal bank accounts at financial institutions throughout the world to receive money from cybercriminals who stole it from bank accounts of victims. The funds were then transferred to other QQAAZZ-controlled bank accounts and sometimes converted to cryptocurrency using “tumbling” services designed to hide the original source of the funds. After taking a fee of up to 40 to 50 percent, QQAAZZ returned the balance of the stolen funds to their cybercriminal clientele.

Anonymous ID: 90f89a Oct. 19, 2020, 7:04 p.m. No.11162565   🗄️.is 🔗kun   >>2847 >>3081

https://www.justice.gov/opa/pr/department-justice-seeks-recover-approximately-3-million-illegal-proceeds-foreign-bribe

 

Department of Justice Seeks to Recover Approximately $3 Million in Illegal Proceeds from Foreign Bribe Payments

 

WASHINGTON – The Department of Justice has filed a forfeiture action against accounts worth nearly $3 million that are alleged to be the proceeds of a wide-ranging conspiracy to bribe public officials in Bangladesh and their family members in connection with various public work projects, Acting Assistant Attorney General Matthew Friedrich of the Criminal Division announced today.

 

The forfeiture action was filed Jan. 8, 2009, in U.S. District Court in the District of Columbia against funds located in Singapore held by multiple account holders. The forfeiture complaint relates primarily to alleged bribes paid to Arafat "Koko" Rahman, the son of the former prime minister of Bangladesh, in connection with public works projects awarded by the government of Bangladesh to Siemens AG and China Harbor Engineering Company. According to the forfeiture complaint, the majority of funds in Koko’s account are traceable to bribes allegedly received in connection with the China Harbor project, which was a project to build a new mooring containment terminal at the port in Chittagong, Bangladesh.

 

Read more at the web site, but it's 2020 and this was back in 2008. Seriously? 12 years to get on the stick?

Anonymous ID: 90f89a Oct. 19, 2020, 7:12 p.m. No.11162697   🗄️.is 🔗kun

>>11162492

NOTABLE.. This so much fucking this!!!!!

 

I wil not use the cloud. The cloud was marketed as more secure, not there are ads on the radio to protect yourself from the cloud being hacked. Budda bing…

Anonymous ID: 90f89a Oct. 19, 2020, 7:19 p.m. No.11162818   🗄️.is 🔗kun   >>2828 >>2844

>>11162714

As a Texan I see this first hand. In my own conservative back yard, thanks to politicizing with high density housing. Enough to throw the local elections. However what is really prevalent is media indoctrination…it's really bad. It's not 4 to 6% it's 35% if not more.