Sie sind auf Seite 1von 26

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 1 of 26

2015R00078/55

U NITED STATKS DISTRICT COU RT


DISTRICT OF NEW JERSEY

UNITED STATRS O F AM ERICA

Crim inalNo. 15-

18 U.S.C. 371
18 U.S.C.j 1349

V.

Zuuovuvuwxosw x,
a/k/a lMark Iryd,f

l% .-(0679 -VQJ?C-

TOM ASZ CHM IELARZ,and


DEW N M CARTHUR
1 N D IC T M E N T

The Grand JuU in and for the DistrictofNew Jersey,sitting atNewark,


charges:
CO U NT O NR

(ConsqH ey to CommltFraud and Related


Actiw ty ln Conneetlon wlth Com puters)

1.

Ata11tim es relevantto this Indictm ent:


Relevant IndM duass and Kntltles
.

a.

DefendantTIM OTHY LM NGSTON,a/k/a GM ark Ixydl

resided in oraround FortLauderdale,Florida,and w asthe sole ow nerofA W hole

IrtofNothing LLC CAW LND.a company thatsentunsolicited em ailsin bulk (or


*spam')on behalfofitscustom ersfora fee.DefendantLIW NGSTON wasthe
organizer and leader ofthe com puter hacking and illegalspam m ing schem es

described herein.
b.

DefendantTOM ASZ CH M IELARZ resided in oraround Clifton,

New Jersey,and was a com puter program m er.Am ong other things,defendant
CHM IEI,APZ authored the hacking tools and other program s used to facilitate

the com puter hacking and illegalspam m ing schem es described herein.

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 2 of 26

DefendantDKW N M CARTHUR resided in oraround Ellicott

Cil ,M e land.Am ong other things,defendantM CARTH UR worked atCorporate


Victim #4 and used his access to CorporateVictim #4's com puter networks to
installhacking tools on them in order to facilitate the eM ltration ofdata from

Corporate Victim #4's networks.


d.

*com orate Victim # 1*was a telecom m unications com pany

headqum ered in New York that,nm ong other things,provided em ailsew ices to
its custom ers.
e.

V orporate Victim #2*was a technolor and consulting

com pany headqum ered in New York.


f.

lcorporate Victim #3*w as a com pany thatprovided credit

m onitoring seN ices and was headquartered in Texas.

g.

*corporate Victim #4*was a telecom m unications com pany

headqum ered in Pennsylvania.


Relen nt Term s

h.

A Jbotnet*was a collection ofcom puters infected with

m alw are withoutthe users'authode>tion and controlled by a hackerusing a


centralGcom m and and contror com puter.
i.

An GlnternetProtocoladdress,'or *IP address,'w as a unique

num ericaddress used by a com puteron the internet.Every com puterconnected


to the internetwas assigned an IP address.

j.

lproxy servers*were computersystem sorapplicationsthat

acted asinterm ediariesforrequestsfrom com puterusers seekingresourcesfrom


-

2-

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 3 of 26

other servers.Proe sem ers had a large variety ofpotentialuses,including


hiding one's true IP address from others,thereby rem nlning anonym ous, and

evading anti-spnm lters and other spnm -blocling techniques.


k.

A drem ote adm inistration toolfwas a piece ofsoftw are that

allowed a rem ote operator to controla com putersystem as ifhe had physical
access to thatsystem .
overd ew

2.

From in or aboutJanuau 20 12 through in or aboutJuly 2015,

defendants LIW NGSTON,CH M IEIA RZ,and M CARTHUR,togetherV G others:

(1)hacked into thecom puternetworksofCom orateVictim #3 and Corporate

Victim #4 to stealthe personally identiEableinform ation CP1I*)oftensofmillions


ofindividuals;(2)com prom ised the personalemailaccountsofnum erous

individuals.includingcustom ersofCorporateVictim #1;(3)com prom ised a


num ber ofwebsites,including CorporateVictim #2's,in orderto use itin their

illegalspnm m ing activities;and (4)used stolen PIIaswellascomprom ised


corporate com puter networks and em ailaccounts to send illegalspnm on behalf

ofothersfora fee.In total,the schem egenerated m ore than $2 M llion in illegal


prots.

The llleY Spam m lnz Infrastn cture


3.

Beginning as early as 2011,defendantLM NG STON togetherV :II

othersoperated AW LN --a business that specialized in sending spam on behalf

ofits clients.LIW NGSTON'S clients included legitim ate businesses,such as

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 4 of 26

insurance com panies thatw ished to send bulk em ails to adv'


ertise their
businesses,as w ellas illegalentities,such as online phgrm acies thatsold

narcoticswithoutprescriptions.A pically,defendantLIVINGSTON charged


between $5 and $9 foreach spam em ailthatresulted in a com pleted transaction
for a client.
4.

During the period ofthe schem es described herein,m any internet

service providers utilized spnm lters designed to preventspnm from reaching

theircustom ers'em ailaccounts.Beginning in oraboutJanuary 20lQ, however,


defendantLM NGSTON solicited defendantCH M IELARZ to w rite com puter
program s to send spam in a m annerthatwould concealthe true origin ofthe
em ailand bypass spam filters.

5.

Also beginnl g in oraround January 2012,defendants LIW NGSTON

and CH M IELARZ started using proxy servers to send out spam m essages using
botnets to hide the true origin ofthe spam ,help them rem ain anonm ous, and to

evade anti-spnm lters and other spam blocu ng techniques.Defendant


LIW NG STON also registered cerfnin websitesused in the spnm cnm paignsin the

nnm e ofhis alias,dM ark Lloyd,' to avoid detection.


6.

In addition,defendants LM NGSTON and CHM IELARZ also hacked

into the em ailaccountsofindividuals and com prom ised and seized controlofthe
m ailse> ers ofcerf>in ofthe Com orate Victim s to furthertheir spam cam paigns.

4 -

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 5 of 26

Corporake Victlm #1?s Custom er Aceounts

For exam ple,defendants LIW NGSTON and CHM IEI-AZZ created


custom software designed to hack into the em ailaccounts ofCorporate Victim

#l'scustom ers (theJEmailAccountSoftwaref).Oncethe Em ailAccount


Software gnined access to a Com orate Victim #1 user's account, itthen created
sub-accounts on the accountand used those sub-accounts to send outspam . To
avoid detection,defendants LIW NGSTON and CHM IELARZ program m ed the
Em ailAccountSoftware to access the m ailserverofCorporate Victim #1 through

proxy servers to obscure their tn e identities.In effect,this allow ed defendants


LM NGSTON and CHM IELARZ to send outm assive am ounts ofem ailspam

withoutident#
' ingthem selvesasthe true senders,and instead using Corporate
Victim #1's m ailservers and Corporate Victim #1's custom eraccounts.
8.

On or aboutOctober 24,2012,defendantLIW NG STON sent

defendantCHM IEI,APZ the usernam e and password for severalem ailaccounts


hosted by Com orate Victim # 1 so thatdefendantCHM IELARZ could use them to
testthe Em ailAccount Softw are.
9.

On or aboutJuly 23,2015,1aw enforcem entseized defendant

LIVINGSTON'Scomputer(thelbivingston Computed).A subsequentsearch of


thatcom puter revealed thatdefendantLIW NGSTO N m aintnined on that
com putera listoftens ofthousands ofusernam es and passwords for em ail
accounts hosted by C om orate Victim #1.

5-

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 6 of 26

Use ofcoo orate Victim #2?s W ebslte ln x rtherance ofthe schem e


1O. Defendants LM NGSTO N and CHM IELARZ also created custom

software thatleveraged vulnerabilities in the websites ofa num ber of

corporations,includingCorporateVictim #2 (the*W eb Form Software*).TheW eb


Form Software allow ed defendants LIW NGSTO N and CH M IELARZ to use
Corporate Victim #2's em ailservers to send outspam thatappeared to be from
Corporate Victim #2.Specifk ally,the conspirators used the W eb Form Software
to enter com m ands into the user subm itted form s portion ofCorporate Victim
#2's websites.Those com m ands essentially directed Corporate Victim #2's m ail

sew ersto send specic spnm to individuals as directid by the conspirators;to its
recipients,the spnm appeared to originate from Corporate Victim #2.
11. To further avoid detection,defendants LM NGSTO N and

CHM IELAU program m ed the W eb Form Software to access Corporate Victim


#2's networks using proxy servers to obscure their true identities.In effect,this
allowed the conspirators to send outm assive am ounts ofspam without
identifying them selves as the tm e senders.

12. In an online chatdated on or aboutM arch 15,2013,defendants


LIW NGSTO N and CHM IELAU discussed creadng a m odised version ofthe W eb

Form Software to targetthe website ofCozw rate Victim #2.Subsequently,on or


aboutM arch 16,2013,defendantCH M IELAPZ sentdefendantLM NG STON
whathe purported to be a m odied version ofthe W eb Form Software to target
the website ofCorporate Victim #2.Shortly thereafter,on or aboutM arch 22,
-

6-

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 7 of 26

2013,Corporate Victim #2 was notied by Google thattheirm ailsew erhad been


com prom ised and w as sending outspam .
The Com puterH aeklnx W etim s

13. Defendants LM NGSTON,CH M IRIA RZ,and M CARTHUR also

worked together to stealthe consdentialbusiness infonnation ofthe Corporate


Victim s,including databases containing the PIIofm illions ofAm ericans,so that
they could use thatinform ation in spam cam paigns.
The Com prom lse ofCoo orate Vletlm #3#s Ne ork
14. ln oraround M ay of2013,defendants LM NGSTON and

CHM IELARZ discussed stealing condentialbusiness inform ation from


Corporate Victim #3.Specically,in an online chatdated on or aboutM ay 9,
20 13,defendantLM NGSTON told defendantCHM IELARZ,*here is the site I

need scrapped (sfc),*and provided defendantCHMIEI.APZ with an addressfor


Corporate Victim #3's website and the login credentials for an em ployee of

CorporateVictim #3.Jscraping isa techniqueem ployed to extractlargenm ount


ofdata from websites.
15. Thereafter,in an online chatdated on or aboutM ay 10,20 13,

defendantLIW NGSTON told defendantCHM IEI,APZ thatthe database they were


going to stealfrom Corporate Victim #3 contained approxim ately 10 m illion
records.DefendantLM NGSTON subsequently paid defendantCHM IEI-ARZ to
write a com puter program to stealthe database from Corporate Victim #3.

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 8 of 26

16. In another online chatdated on or aboutM ay 10,2013,defendant

LIW NGSTON told defendantCHMI/LARZ thattheprogram hewrotewas


working and thatithad dow nloaded 200,000 records so far.
The com prom lse ofcorpom te V letlm #*#s Network

17. From in oraboutFebrue 2014 through in oraboutFebruo 2015,


defendantM CARTHUR w as em ployed as a salesrepresentative atCorporate

Victim #4.ln a series ofonline chats dated in oraboutAugust2014,defendants


LIW NGSTON ,CHM IELARZ,and M CARTHUR discussed using defendant
M CARTHUR'S position atCorporate Victim #4 to stealconEdentialbusiness
inform ation from Corporate Victim #4,including the PIIofm illions ofCorporate

Victim #4's custom ers.

18. On or aboutAugust 11,2014,defendantM CARTHUR provided


defendantLIW NGSTON V tH access to a rem ote adm inistration toolon a
com puter M :IAaccess to the com puter network ofCorporate Victim #4 without

authoriz-qtion from his em ployer.Thereafter,on or aboutAugust 15,2014,

defendantM CARTHUR gave defendants LM NGSTON and CHM IELARZ access to


CorporateVictim #4's com puternetwork using the rem oteadm inistration toolfor

the purpose ofstealing the nam es,addresses,phone num bers,and em ail


addresses ofpotentialcustom ers,current custom ers,and form ercustom ers of
CorporateVictim #4 so thatdefendantsLM NG STON,CHM IELARZ,M CARTHUR,
and others cotzld use thatinform ation to send spam to those individuals.

8-

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 9 of 26

19. In an online chatdated on or aboutAugust 15,2014,defendant

LIW NGSTO N told defendantCH M IELARZ thathe estlm ated thatCorporate


Vicdm #4's database had records forapproxim ately 50 m illion people;defendant
LM NGSTO N alo discussed the technicalchallenges associated M tII stealing

such a large volum e ofdata from Corporate Victim #4.


20. On oraboutAugust 15,2014,defendantLIW NGSTON agreed to pay
defendantCHM IELARZ to design a com puterprogram to stealthe database from
Corporate Victim #4 using the rem ote adm inistration toolthatdefendant
M CARTHUR had installed.M so,on oraboutAugust 15,2014,defendant
LM NGSTO N provided defendantCHM IELARZ V tIZdefendantM CARTHUR'S

network usernam e and password,which allowed defendantCH M IELARZ to

access thedatabaqe ofCorporateVictim #4.


2 1, ln an online chatdated on or aboutSeptem ber 3,2014,defendants
LIW NG STON and M CARTHUR discussed the contents ofthe database thatthey
had stolen from Corporate Victim #4.In thatconversation,defendant

M CARTHUR estim ated thatthey had succeeded in stenling over 24.5 m illion
records from Corporate Victim #4.Defendants LM NGSTON and M CARTHUR
further discussed whether they should sellthe database,butultim ately agreed
to use itErstto send outspm .
22. As referenced in paragraph 9,on or aboutJuly 23,2015,1aw
enforcem entseized the Livingston Com puter.A subsequentsearch ofthat
com puter revealed thatdefendantLIW NG STO N retained a portion ofthe
-

9 -

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 10 of 26

database stolen from Corporate Victim #4 containing m ore than approxim ately 7
m illion records.

23. Ultim ately,defendants LIW NGSTON,CHM IEIA RZ and

MACARTHUR earned m orethan $2 m illion dollars selling spnm m ing se> ices
using the m eans and m ethods discussed above.
The consplracv
24. From atleastas early as in or aboutFebrtzazy 2011 through in or
about Septem ber2015,in Passaic County,in the DistrictofNew Jersey,and

elsew here,defendants
TIM OTHY LM NGSTON,

a/k/a *M ark O yd,o


TOM ARZ CHMIET.AON and
DPW N M eM TH UR

did knowingly and intentionally conspire and agreeV :IAeach otherand othersto
com m itan offense againstthe United States,nnm ely,to intentionally access a
com puterw ithoutauthoriM tion and to exceed authorized access to a com puter,
and thereby obtain inform ation from a protected com puter forthe purposes of

com m ercialadvantage and private nancialgain,w here the value ofthe

inform ation obtained exceeded $5,000,contraa toTitle 18.United StatesCode,

Sections 1030(a)(2)(C),1030(c)(2)(B)(i),and 1030(c)(2)(B)(iii).


obleet ofthe consplracv
.

25. The objectofthe conspiracy wasfordefendantLM NGSTON,


defendantCHM IEI-ARZ,defendantM CARTHUR,and others to enrich them selves
10 -

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 11 of 26

by:(1)hackingintothecomputernetworksofCorporateVictim #3 and Corporate

Victim #4 to stealthe PI1oftens ofm illionsofindividuals;(2)com promising the


personalem ailaccounts ofnum erous individuals,including custom ers of

CorporateVictim #19(3)exploiting a vulnerability in the website ofCorporate

Victim #2 to use itin theirspnmming activities;and (4)usingthe stolen PIIas


wellas the com prom ised corporate com puter networks and em ailaccounts to
send illegalspnm on behalfofothers fora fee.
M anner and M eans ofthe Conspiraev

26. Itwas partofthe conspiracy that,atdefendant LIW NGSTON'S

direction,defendantCHM IRLARZ wrotecomputerprogrnm s to:(1)steal


consdentialbusiness inform ation,including PII,from the com puter sew ers of

cerfnin ofthe CorporateVictims;(2)accessthe emailaccountsofCorporate


Victim #1's custom ers;(3)tnke controloftheem ailsew ers ofcerfnin ofthe

CorporateVictim s,including CorporateVictim #2;and (4)send spnm in a


m anner thatwould concealthe tm e origin ofthe em ailand bypass spam Elters.
27. Itwas further partofthe conspiracy thatthe conspirators used a

variety oftechniques,including proxy servers,botnets.and fake identities,to


avoid detection,concealtheir identities,and evade spnm Elters and sim ilar
anti-spam softw are.

28. Itwas further partofthe conspiracy thatdefendant M CARTHUR.


who was em ployed by CorporateVictim #4,installed a rem ote adm inistration
toolon a com puter V :IAaccess to Corporate Victim #4's network w ithout
-

11

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 12 of 26

authorig-qtion from Corporate Vicfim #4,and then provided access to Corporate


Victim #4's network to defendants LM NG STON and CHM IEI.AP? for the
pum ose ofstealing consdentialbusiness inform ation,including the PIIof
m ilnons ofindividualvictim s.

29. Itwas further partofthe conspiracy thatthe conspirators sent


unlawfulspam m essages using stolen PIIand em ailse> ers ofcertnin ofthe

Corporate Victim s and the em ailaccounts ofCorporate Victim # 1's custom ers.
O vert A ets

30. In flarfherance ofthe conspiracy and to effectit unlawfulobjects,


defendantLM NG STON,defendantCHM IELARZ,defendantM CARTHUR,and
others com m itted and caused to be com m itted the following overtacts in the
DistrictofNew Jersey and elsewhere:

a.

On orabout Septem ber 19,2012,defendantLIW NG STON

initiated,via an onlinepam entsystem ,a transferofapproxim ately $1,500 to


defendantCHM IELARZ,who logged into his accountfrom an IP Address in New
Jersey on thatsam e date.

b.

O n or aboutOctober 24,2012,defendantLIVINGSTON sent

defendantCH M IELARZ an online m essage containing the usernam e and

passw ord for severalem ailaccounts hosted by Corporate Victim #1.


c.

On oraboutM arch 15,2013,defendantLM NG STON

initiated,via an onlinepam entsystem ,a transferofapproxim ately $250 to


defendantCHM IEI,AQZ,who logged into his account from an IP Address in New
-

12 -

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 13 of 26

Jersey on thatsam e date.


d.

On or aboutM ay 10,2013,defendantLM NG STON sent

defendantCHM IELARZ an online m essage stating thata database they were


stealing from Corporate Victim #3 contained records forapproxim ately 10 m illion

individuals.
e.

On or aboutM ay 10,2013,defendantLM NG STO N initiated,

via an online pam entsystem ,a transferofapproxim ately $400 to defendant


CHM IEI-APZ.
f.

On oraboutAugust 15,2014,defendantM CARTHUR provided

defendants LIW NGSTO N and CH M IELARZ access to Corporate Victim #4's

com puter network using a rem ote adm inistration tool.


g.

On or aboutAuw st 15,2014,defendantLIW NG STON sent

defendantCHM IEM RZ an online m essage in w hich he estim ated thatCorporate


Victim #4's database contained records forapproxim ately 50 m illion individuals.

A11in violation ofTitle 18,United States Code,Section 37 1.

13 -

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 14 of 26

COUNT TW 0

(Consplraty to Com m ltW lre Fraud)


1.

The allegations contained in paragraphs 1 through 23 ofCountOne

ofthislndictm entare re-alleged and incorporated as though fully setforth in this


paragraph.

2.

From atleastas early as in or aboutJanuary 2012 through in or

aboutJuly 2015,in Passaic County,in the DistrictofNew Jersey,and elsewhere,


defendants
TIM OTHY LW INGSTO N,

a/k/a RM ark O ydro


TOM ASZ CHM IELAR? and

DEWN MCART- 4

did knowingly and intentionally conspire and agree M :Iaeach otherand others to

devise a schem e and nrtice to defraud Corporate Victim #3,Corporate Victim


#4,and others,and to obtain m oney and property,including the consdential
business inform ation ofCorporate Victim #3,Com orate Victim #4,and others,
by m eans ofm aterially false and fraudulentpretenses,representations,and
prom ises,and,for the purpose ofexecuting such schem e and nrtisce to defraud,
to transrnitand cause to be transm itted by m eans ofwire com m unications in
interstate and foreign com m erce.cerfqin writings.signs,signals,pictures,and
sounds,contraa to Title 18,United States Code,Section 1343.

ohlect of the consplracv

3.

The objectofthe conspiracy wasfordefendantLIW NGSTON,

defendantCHM IELARZ,defendantM CARTHUR,and others to enrich them selves

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 15 of 26

by hacking into the com puter networks ofCorporate Victim #3 and Corporate
Victim #4 to stealthe consdentialbusiness inform ation ofCorporate Victim #3
and Corporate Victim #4.including the P1Ioftens ofm illions oftheircustom ers.
M onner and M eans ofthe consplracg

4.

Itwas partofthe conspiracy thatdefendantLM NGSTON,defendant

CHM IELARZ,defendant M CARTHUR,and others,em ployed the m anner and


m eans setforth in paragraphs 26 through 29 ofCount One ofthis Indictm ent.
ln violation ofTitle 18,United States Code,Sections 1349.

15 -

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 16 of 26

CO U NT TH R KE

(consplracy to com m ltM ud and Reh ted


Aetlvlty ln Conneetlon wlth lleetronle M aI1)
1.

The allegationscontained in paragraphs 1through 23 ofCouptOne

ofthisIndictm entare re-alleged and incom orated as though fully setforth in this

paragraph.
2.

From atleastas early as in or aboutJanuazy 2012 through in or

aboutJuly 20 15,in Passaic County,in the DistrictofNew Jersey,and elsewhere,


defendants
TIM OTHY LM NGSTON ,

a/k/a GM ark R ydyfand


TOM ASZ CH M IKT.AV?

did u owingly and intentionally conspire and agreeV tI4each otherand othersto
com m itoffenses againstthe United States,nnm ely,to knowingly access a
protected com puterw ithoutauthorizmtion,and intentionally initiate the

transm ission ofm ultiple com m ercialelectronic m ailm essages from and through
such com puter;to knowingly use a protected com puter to relay and retransm it
m ultiple com m ercialelectronic m ailm essages,V LIAthe intentto deceive and
m islead recipients,and any Internetaccess service,as to the origin ofsuch

m essages;and to know ingly m aterially falsl


'fy header inform ation in m ultiple
com m ercialelectronic m ailm essages and intendonally initiate the transm ission

ofsuch m essages;and to knowingly register,using inform adon thatm aterially


falsies the identity ofthe actualregistrant,for five or m ore electronic m ail
accotm ts or online user accounts,and tw o or m ore dom nin nnm es,and
-

16 -

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 17 of 26

intentionally initiat the transm ission ofm ultiple com m ercialelectronic m ail
m essages from any com bination ofsuch accounts and dom nln nnm es,contr-

to Title 18,United States Code,Sections 1037(a)(1),1037(a)(2),1037(a)(3),


1037(a)(4),And 1037(b)(2).

Obqectofthe conspiraev
3.

The objectofthe conspiracy wasfordefendantLM NGSTON,

defendantCHM IEI-APZ,defendantM CARTHUR,and others to enrich them selves

by:(1)comprom isingthe personalem ailaccountsofnum erousindividuals,

including custom ers ofCom orateVictim #1;(2)exploiting a vulnerability in the


websiteofCorporateVictim #2 touseitin theirspnmm ingactivities;(3)using the
stolen P11in conjunction V tIAcom promised corporatecom puternetworksand
em ailaccounts to send illegalspam on behalfofothers fora fee;and (4)
em ploying practices thatobscured the truesource ofthe spam em u s being sent.
M anner and M eans ofthe coxspH cv
Itw aspartofthe conspiracy thatdefendantLIW NG STON,defendant
CHM IELARZ,defendantM CARTHUR,and others,em ployed the m anner and
m eans setforth in paragraphs 26 through 29 ofCountOne ofthis Indictm ent.
Overt Aets

5.

ln furtheranceoftheconspiracy and to effectitsunlawfulobjects,

defendantLIW NGSTON,defendantCHM IELARZ,defendantM M RTHUR,and


others com m itted and caused to be com m itted the overtacts referenced in
paragraph 30 ofCountOne ofthis lndictm ent.
-

17 -

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 18 of 26

In violation ofTitle 18,United States Codq,Section 371.


.

-.

18 -

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 19 of 26

FO R FEIT UM

1.

M LO ATIO N A S TO C O U NT 0 N E

U pon conviction ofthe offense ofconspiracy to com m itcom puter

fraud,contraa to 18 U.S.C.j 1030.in violation of18 U.S.C. 371,ascharged in


CountOne ofthis Indictm ent,defendants
TIM OTHY LM NGBTO N,

a/k/a eMark O yd,*


TOM ASZ CHM IKLAOE and

DKW N MeM T- 4

shallforfeitto the Unlted States:

a. pursuantto 18 U.S.C.bj982(a)(2)(B)and 1030(i),any property,real


orpersonal,constituting,orderived from ,proceeds obtnlned directly
or indirectly as a resultofsuch conspiracy offense;and

b. pursuantto 18 U.S.C.! 103O(i),any personalproperty thatwas


used or l tended to be used to com m itor to facilitate the
com m ission ofsuch conspiracy offense.

2.

The property subjectto forfeiture includes,butisnotlim ited to,a

slam ofm oney represene g the am ountofproceeds obY ned as a result ofthe

conspiracy offense charged in CountOne,forwhich thedefendantsarejointly


and severally liable;and a11right,title,and interestofthe defendants in the
follow ing property:

a. approximately $70,387.99 seized on oraboutJuly 27,2015 from


W ellsFargo Bank AccountNo.
Tim othy Livingston;

9855,held in the nam e of

b. approxim ately $76,915.48 seized on oraboutJuly 27,2015 from


W ells Fargo Bank AccountNo.
A W hole lr tofNothing,LLC;

19

783,held in the nam e of

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 20 of 26

approxim ately $4,802.40 seized on oraboutJuly 27,2015 from


W ells Fargo Bank Account No.
A W hole Lot ofNothing,LLC ;

4593,held in the nam e of

d. approxim ately $147,547.93 seizcd on oraboutJuly 27,2015 from


W ells Fargo Bank AccountNo.
Tim othy Livingston;and

6185,held in the nam e of

one 2006 FerrariF430 two-doorSpider Convertible,V1N


Z17'12EW 59A66014492 1,seized on or aboutJuly 27,2015 in Fort
Lauderdale,Florida;
the contents ofScottrade Account #
Tim othy Livingston;and

8422 held in the nam e of

g. one 2009 Cadillac Escalade SUV,VIN:1GY12C23299R215132.

20 -

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 21 of 26

FO R FEIT UM

1.

A LLO AT IO N A S T0 CO U NT TW 0

Upon conviction ofthe offense ofconspiracy to com m itwire fraud,

contrau to 18 U.S.C.j 1343,in violation of18 U.S.C.: 1349,ascharged in


Count'N o ofthis Indictm ent,defendants
TIM OTH Y LM NRBTON,

a/k/a,RMark D ydyo
TO M ASZ CH M IBI.AO? ahd

DIW N Mcu T- 4

shallforfeitto the United States,pursuantto 18 U.S.C.j 981(a)(1)(C)and 28


U.S.C.b 2461(c),al1property,realand personal,thatconstim tesor is derived
from proceeds traceable to the com m ission ofthe said conspiracy offense,and all
property traceable thereto.

2.

The property subjectto forfeiture includes,butisnotlim ited to,a

sum ofm oney representing the nm ountofproceeds obtained as a resultofthe

conspiracy offense charged in CountTwo,forwhich thedefendantsarejointly


and severally liable;and a11right,title and interest ofthe defendants in the
follow ing property:

a. approximately $70,387.99 seized on oraboutJuly 27,2015 from


W ellsFargo Bank AccountNo.
Tim othy Livingston;

9855,held in the nnm e of

b. approxim ately $76,915.48 seized on oraboutJuly 27,2015 from


W ells Fargo Bank AccountNo.
A W hole lrtofNothing,LLC;

783,held in the nam e of

c. approxim ately $4,802.40 seized on oraboutJuly 27,2015 from


W ells Fargo Bank AccountNo.
A W hole LotofNothing,LLC;

21 -

593,held in the nam e of

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 22 of 26

d.approxim ately $147,547.93 seized on oraboutJuly 27,2015 from


W ells Fargo Bank AccountNo.
Tim othy Livingston;

6185,held in the nam e of

e. one 2006 FerrariF430 two-doorSpider Convertible,VlN


Z121?E2W 59A66014492 1,seized on or aboutJu ly 27,20 15 in Fort
Lau derdale,Florida;

the contents ofthe contents ofScottrade Account#


in the nam e ofTim othy Livingston;and

8422 held

g. one 2009 Cadillac Escalade SUV,VIN:1C1YFC23299R2 15132.

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 23 of 26

FO RFEITVM ALLBGATTQN AS TO COUNT THR EE


Upon conviction ofthe offense ofconspiracy to com m itfraud and

related activit'
y in connection with electronicm ail,contrazy to 18 U.S.C.j 1037,
in violation of18 U.S.C.j 371,ascharged in CountThree ofthisIndictment,
defendants
TIM O TIW LIW NG STO N ,

a/k/a,'tM ark Loyd,''and


TOM ASZ CHM IELARZ

shallforfeitto the United States,ptlrsuantto 18 U.S.C.!b 98l(a)(1)(C)and

lO37(c)and 28 U.S.C.j 2461(c):


a, any property,realorpersonal,constituting or traceable to gross
proceeds obtained from such offense;and
b. equipm ent,software,orother technolor used or intended to be
used to com m itor to facilitate the com m ission ofsuch offense.

The property subjectto forfeiture includes,butisnotlim ited to,a


sum ofm oney representing the am ountofproceeds obtained as a resultofthe

conspiracy offense charged in CountThree,forwhich tlnedefendantsarejointly


and severally liable;and a11right,titlc and interestofthe defendants in the
following property:

a. approxim ately $70,387.99 seized on oraboutJuly 27,2015 from


W ells Fargo Bank AccountNo.
Tim othy Livingston;

9855,held in the nam e of

b. approxim ately $76,915.48 seized on oraboutJuly 27,2015 from


W ells Fargo Bank AccountNo.
A W hole Lot ofN othing,LLC;

23 -

9783,held in the nam e of

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 24 of 26

c approxim ately $4,802.40 '


seized on oraboutJuly 27,2015 from
W ells Fargo B ank Account No.
A W hole Lot ofN othing,LLC;

4593, held in the nam e of

d. approxim ately $147,547.93 seized on oraboutJuly 27,2015 from


W ells Fargo Bank AccountNo.
Tim othy Livingston;and

6185,held in the nam e of

e. one 2006 FerrariF430 two-doorSpider Convertible,V1N


Z1+ E2W 59A66014492 1,seized on oraboutJuly 27,2015 in Fort
Lauderdale,Florida;

the contents ofScottrade Account#


Tim othy Livingston;and

8422 held in the nam e of

g. one 2009 Cadillac E scalade SUV ,V 1N : 1G Y12C 23299R2 15 132.

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 25 of 26

SUB STITUT E A SSET S PR OV ISIO N

(Applicable to M 1Forfelture M lelationsl


lfany ofthe property described above,as a result ofany act or

om ission ofthe defendantts):


a. cannot be located upon the exercise ofdue diligence;

b. has been transferred or sold to,or deposited with,a third party;

c. hasbeen placed beyond thejurisdiction ofthecourt;


d. has been substantially dim inished in value;or
e. has been com m ingled with other property w hich cannotbe divided
withoutdifficulty,

the United States shallbeentitled,pursuantto 21 U.S.C.j 853(p),as

incorporated by 18 U.S.C.jj 982(b),1030(i)and 1O37(c)(2),and 28 U.S.C.


j 2461(c),to forfeitureofany otherpropertyofthedefendantts)up to the valueof
the above-described forfeitable property.

A TRU E B ILL

FO R EPE RSO N
r ..

tt.
>

'l
.
,z',

jj

... .

'- ..

(.
j

y .
-)q jvktu,o

PA U L J .FISH M AN
U NITE D STATES AW O

EY

25 -

Case 0:15-mj-06529-AOV Document 1 Entered on FLSD Docket 12/15/2015 Page 26 of 26

<
)

t
O 1
>)A

1 &
.1
'

%d
>,j o
z

Z #D

'
g$
:
QZ

*
=

j(;

irl Q
Q

'k
D

O
rx >' <.
(n
i (9 ..
ze = =
m

ow
j
.
S
j5
jj Xr* (;cj
VJ
=k
k
yx
)x
z : su
s1 :7
o
;*

y *kQ
i-

Q**
a--

a s

C
O
Q.

<

ja
:
zs
j
:

r
cya
m
'$ x s:
gz
rzlj
:v

O
N

<
I
X
=

z
e
0
9-

E
9'
L
(

<

u
6
)

&'

* 7X
'

< .u
D

Das könnte Ihnen auch gefallen