Professional Documents
Culture Documents
Indictment - James Reno 05-27-2010
Indictment - James Reno 05-27-2010
Indictment - James Reno 05-27-2010
COUNT ONE
Entities
1
technical and billing support to consumers who purchased goods or services
“Victim Companies”).
Defendants
Definitions
mislead and deceive computer users into purchasing anti-virus and computer
warnings that a user’s computer was infected with a computer virus or was
2
otherwise experiencing a defect or performance deficiency that required the
on a user’s computer.
performance defects.
user’s internet browser was redirected to another website without the user’s
permission.
elsewhere,
defendants herein, together with others known and unknown to the grand
victim internet users and Victim Companies and to obtain money and
3
property by means of materially false and fraudulent pretenses,
below.
internet users into falsely believing that their computers were infected with
failed to pay the Victim Companies the fees promised by the fictitious
4
advertising agencies for the placement of internet-based advertisements on
caused the internet browsers of victim internet users who visited the Victim
prompted with a series of materially false error messages which claimed that
the user’s computer was experiencing a Critical Error and that the victim
5
more than sixty countries throughout the world, including the United States,
represented would rid the victim internet users’ computers of the purported
defects, when in fact the software products performed their stated function
Companies’ websites.
6
10. It was further part of the scheme that defendant JAMES RENO
adviser for the computer servers and networks used to facilitate the
the legitimate third-party entities were unaware of and had not authorized
party company unrelated to IM, but in fact contained hidden computer code
7
“hijacked” or redirected to a website defendants SUNDIN, JAIN, and others
13. It was further part of the scheme that on or about February 26,
A.
15. It was further part of the scheme that on or about March 25,
8
internet-based advertisement containing hidden computer code on the
website of Company D.
16. It was further part of the scheme that on or about April 4, 2008,
17. It was further part of the scheme that on or about April 3, 2008,
18. It was further part of the scheme that on or about July 25, 2007,
9
19. It was further part of the scheme that, in an effort to conceal the
hidden code and hijacking capabilities of the advertisements from the Victim
JAIN, and others caused the hidden code in the advertisements to recognize
when the advertisements were being run from computers used by the
20. It was further part of the scheme that after defendants BJORN
to be a website at all, but rather a warning message from the internet user’s
internet user that his or her computer had experienced a critical error and
prompted the user to click on a box to address the purported error. Further
error message prompts occurred regardless whether the user clicked the box
10
b. The IM Scareware website displayed an animated
graphical image that gave the appearance that the victim internet user’s
computer was being scanned for various errors or computer viruses, when in
fact no scan of the computer was actually occurring. At the conclusion of the
fake scan, the IM Scareware website displayed the purported results of the
scan, which falsely informed the internet user that the scan detected
scan of the user’s computer. During the progress and at the conclusion of the
false scan, the trial version of the IM software product displayed the
purported results of the scan, which falsely informed the internet user that
the scan detected multiple critical errors on the user’s computer. The critical
11
errors flagged by the IM software were generally a list of innocuous
21. It was further part of the scheme that, as a result of the browser
and others deceived users into purchasing the full paid version of IM
software products through a deceptive order screen that kept hidden certain
23. It was further part of the scheme that on or about April 2, 2007,
product.
12
24. It was further part of the scheme that on or about July 29, 2007,
product.
product.
26. It was further part of the scheme that on or about June 18, 2008,
27. It was further part of the scheme that on or about June 18, 2008,
13
JAMES RENO, and others caused to be transmitted from Chicago, Illinois to
28. It was further part of the scheme that on or about June 27, 2008,
29. It was further part of the scheme that on or about June 18, 2008,
14
H to an IM-controlled bank account to purchase the IM-distributed software
31. It was further part of the scheme that on or about May 21, 2008,
32. It was further part of the scheme that on or about August 27,
accounts were created in part to perpetuate the fraud scheme as, over time,
15
merchant accounts became unusable due to repeated requests for refunds or
software product.
34. It was further part of the scheme that, in an effort to hide the
scope of the fraud scheme and the relationship between the software
internet users were redirected to in order to make payment for the purchase
of IM software products.
caused credit card processors in the United States and elsewhere, including
payments received from victim internet users made on the multiple payment
16
bank account held in name of “Versata Software” at the First Caribbean
SUNDIN, JAIN, and others held throughout the world, including multiple
in Latvia; and
17
b. An electronic transfer on or about April 2, 2007, of
in Latvia.
computer errors from occurring in the future, when in fact the software
18
conceal the fraudulent nature of the IM software products and the manner in
40. It was further part of the scheme that the IM software products
41. It was further part of the scheme that, knowing the IM-
under fraudulent pretenses, defendant JAMES RENO and others caused call
and
19
falsely informed that the work they provided was not in furtherance of a
scheme to defraud because United States law did not apply to IM and its
internet users and discourage victim internet users from notifying their
credit card companies or law enforcement of the fact that they were deceived
44. It was further part of the scheme that on or about June 8, 2008,
20
Victim K’s preexisting legitimate anti-virus software and rely on “IE
Antivirus” as a replacement.
45. It was further part of the scheme that in or about June 2008,
the Byte Hosting call center representative informed Victim L that the call
46. It was further part of the scheme that on or about June 11, 2008,
the Byte Hosting call center representative informed Victim M that the call
21
47. It was further part of the scheme that on or about September 11,
XP.”
48. It was further part of the scheme that on or about October 16,
22
concealed, misrepresented, and hid and caused to be concealed,
misrepresented, and hidden, the existence of the scheme, and the purposes of
the scheme.
$100,000,000.
Companies to suffer total losses in excess of $85,000 in the form of the non-
defendants herein, for the purpose of executing the aforesaid scheme and
23
an electronic mail communication from “Burnads.com” to Company A in order
24
COUNT TWO
defendants herein, for the purpose of executing the aforesaid scheme and
25
COUNT THREE
elsewhere,
defendants herein, for the purpose of executing the aforesaid scheme and
commerce from the Bahamas to New York by means of wire and radio
26
COUNT FOUR
elsewhere,
defendants herein, for the purpose of executing the aforesaid scheme and
27
COUNT FIVE
elsewhere,
defendants herein, for the purpose of executing the aforesaid scheme and
28
COUNT SIX
elsewhere,
defendants herein, for the purpose of executing the aforesaid scheme and
29
COUNT SEVEN
elsewhere,
defendants herein, for the purpose of executing the aforesaid scheme and
30
COUNT EIGHT
defendants herein, for the purpose of executing the aforesaid scheme and
commerce from Mt. Prospect, Illinois to Ohio by means of wire and radio
product;
31
COUNT NINE
defendants herein, for the purpose of executing the aforesaid scheme and
commerce from Oak Lawn, Illinois to Ohio by means of wire and radio
product;
32
COUNT TEN
defendants herein, for the purpose of executing the aforesaid scheme and
product;
33
COUNT ELEVEN
defendants herein, for the purpose of executing the aforesaid scheme and
34
COUNT TWELVE
defendants herein, for the purpose of executing the aforesaid scheme and
35
COUNT THIRTEEN
defendants herein, for the purpose of executing the aforesaid scheme and
36
COUNT FOURTEEN
elsewhere,
defendants herein, for the purpose of executing the aforesaid scheme and
37
COUNT FIFTEEN
elsewhere,
defendants herein, for the purpose of executing the aforesaid scheme and
38
COUNT SIXTEEN
elsewhere,
defendants herein, for the purpose of executing the aforesaid scheme and
39
COUNT SEVENTEEN
elsewhere,
defendants herein, for the purpose of executing the aforesaid scheme and
40
COUNT EIGHTEEN
defendants herein, for the purpose of executing the aforesaid scheme and
foreign commerce from Latvia to Chicago, Illinois by means of wire and radio
41
COUNT NINETEEN
defendants herein, for the purpose of executing the aforesaid scheme and
foreign commerce from Latvia to Chicago, Illinois by means of wire and radio
42
COUNT TWENTY
defendants herein, for the purpose of executing the aforesaid scheme and
software product “IE Antivirus,” during which conversation the Byte Hosting
replacement;
43
COUNT TWENTY-ONE
defendants herein, for the purpose of executing the aforesaid scheme and
Byte Hosting call center representative informed Victim L that the call center
44
COUNT TWENTY-TWO
defendants herein, for the purpose of executing the aforesaid scheme and
Byte Hosting call center representative informed Victim M that the call
45
COUNT TWENTY-THREE
elsewhere,
defendants herein, for the purpose of executing the aforesaid scheme and
commerce from the United Kingdom to Ohio by means of wire and radio
the Byte Hosting call center representative refused to inform Victim N that
46
COUNT TWENTY-FOUR
defendants herein, for the purpose of executing the aforesaid scheme and
47
COUNT TWENTY-FIVE
paragraph one of Count One of this indictment as though fully set forth
herein.
defendants herein, conspired with each other and with others known and
48
and in many instances, encrypted computer code that, when displayed on a
causing the internet browser of any computer that visited the legitimate
website.
Scareware websites.
to conceal and hide the existence, purposes and acts done in furtherance of
the conspiracy.
Overt Acts
49
JAMES RENO, and others committed and caused to be committed the
Company A’s website by causing internet users who visited Company A’s
Company B’s website by causing internet users who visited Company B’s
50
website to be “hijacked” or redirected from the intended content of Company
an IM Scareware website.
Company D’s website by causing internet users who visited Company D’s
51
e. On or about April 4, 2008, at El Segundo, California, and
Company E’s website by causing internet users who visited Company E’s
Company F’s website by causing internet users who visited Company F’s
52
P. JAIN, and others caused to be transmitted by means of an electronic mail
Company G’s website by causing internet users who visited Company G’s
53
COUNT TWENTY-SIX
paragraph one of Count One of this indictment as though fully set forth
herein.
Company A’s website away from the intended content of Company A’s
54
In violation of Title 18, United States Code, Sections 1030(a)(5)(A)
and 2.
55
FORFEITURE ALLEGATION
indictment are hereby realleged and incorporated herein by reference for the
Section 982(a)(2).
Sections 1343, 371, and 1030, as alleged in Counts One through Twenty-Six,
defendants herein, shall forfeit to the United States, pursuant to Title 18,
United States Code, Section 982(a)(2), any and all right, title, and interest
they may have in any property constituting, and derived from, proceeds they
18, United States Code, Section 982(a)(2), include the sum of approximately
56
4. If any of the forfeitable property described above, as a result of
property under the provisions of Title 21, United States Code, Section 853(p),
A TRUE BILL:
FOREPERSON
57