WTF AFRICA- MAN STABS MAN OVER LADY OF THE NIGH
Police in Gweru have arrested a 19-year-old from Riverside in Gweru after he allegedly fatally stabbed a rival suitor with a broken beer bottle in the stomach following a misunderstanding over a prostitute.
Acting Midlands police spokesperson, Inspector Emmanuel Mahoko confirmed the incident, which occurred last Thursday at Main Street Bar at around 8pm. By yesterday news going around was that the fight was over a girlfriend, but it has since come to light that it was a hooker.
Insp Mahoko said Mduduzi Makamu fatally stabbed Farai Chibvura (21) of Thornhill Airbase in Gweru in a fight over a prostitute.
“We have arrested a 19-year-old man in connection with the murder of Farai Chibvura who died after he was stabbed on the stomach by a broken bottle while drinking beer at a beerhall.
“Investigations show that the two had a misunderstanding over a prostitute who was drinking beer in the same bar,” he said.
Insp Mahoko said on the fateful day, the now deceased Chibvura was drinking beer at Main Street Bar in the company of Tichaona Maweni (24) and Ernest Musithu (24) both of Thornhill Airbase when they saw the suspect Makamu, in the company of a prostitute he had hired.
He said the now deceased Chibvura then approached and confronted Makamu accusing him of snatching his girlfriend.
“A heated argument ensued between two, which later degenerated into a fist fight. Maweni intervened trying to restrain the two, but Makamu broke a beer bottle and stabbed Maweni on the cheek.
“The three were then ordered to leave the bar by the bar manager,” he said.
Insp Mahoko said while outside, the fight continued between the now deceased Chibvura and Makamu leading to Makamu using the same broken bottle to stab his rival on the stomach.
“Makamu then stabbed Chibvura, ripping open his stomach before escaping from the scene of crime.
“Chibvura tried to walk towards his residence but collapsed and died on approaching Thornhill Airbase main entrance.
The deceased’s body was discovered by Thomas Chivindiso who then made a report,” he said.
Insp Mahoko said Makamu was later arrested after police investigations linked him to the crime.
“We appeal to members of the public to seek better ways of resolving disputes rather than resorting to violence,” he said.
YOUR MONEY ISNT SAFE UNLESS ITS WITH YOU
One of the World’s Largest Digital Currency Companies and Seven of Its Principals and Employees Charged in Manhattan Federal Court with Running Alleged $6 Billion Money Laundering Scheme
Liberty Reserve Allegedly Processed at Least 55 Million Illegal Transactions for at Least One Million Users Worldwide Facilitating Global Criminal Conduct; Investigation and Takedown Believed to Be the Largest International Money Laundering Prosecution in History, Involving Law Enforcement Actions in 17 Countries
Mythili Raman, Acting Assistant Attorney General for the Criminal Division of the U.S. Department of Justice; Preet Bharara, U.S. Attorney for the Southern District of New York; Steven G. Hughes, Special Agent-in-Charge of the New York Office of the U.S. Secret Service; Richard Weber, Chief of the Internal Revenue Service, Criminal Investigation (IRS-CI); and James T. Hayes Jr., Special Agent-in-Charge of the New York Field Office of the U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations (HSI), announced today the unsealing of an indictment charging Liberty Reserve, a company that operated one of the world’s most widely used digital currency services, and seven of its principals and employees with money laundering and operating an unlicensed money transmitting business. Liberty Reserve is alleged to have had more than one million users worldwide, including more than 200,000 users in the U.S., who conducted approximately 55 million transactions – virtually all of which were illegal – and laundered more than $6 billion in suspected proceeds of crimes including credit card fraud, identity theft, investment fraud, computer hacking, child pornography and narcotics trafficking.
Five defendants were arrested on May 24, 2013, including Arthur Budovsky, the principal founder of Liberty Reserve, who was arrested in Spain; Vladmir Kats, the co-founder of Liberty Reserve, who was arrested in Brooklyn, New York; Azzeddine El Amine, a manager of Liberty Reserve’s financial accounts, who was arrested in Spain; and Mark Marmilev and Maxim Chukharev, who helped design and maintain Liberty Reserve’s technological infrastructure, who were arrested in Brooklyn and Costa Rica, respectively. Two other defendants, Ahmed Yassine Abdelghani (Yassine) and Allan Esteban Hidalgo Jimenez (Hidalgo), are at large in Costa Rica.
In addition to the criminal charges brought in the indictment, five domain names were seized, namely, the domain name of Liberty Reserve and the domain names of four exchanger websites that were controlled by one or more of the defendants; 45 bank accounts were restrained or seized; and a civil action was filed against 35 exchanger websites seeking the forfeiture of the exchangers’ domain names because the websites were used to facilitate the Liberty Reserve money laundering conspiracy and constitute property involved in money laundering. The four exchangers whose domain names were seized, as well as the 35 exchangers whose domain names are the subjects of the civil forfeiture action, were all exchangers that transacted business with Liberty Reserve and were listed on Liberty Reserve’s website as “pre-approved exchangers.” The investigation and takedown involved law enforcement action in 17 countries, including Costa Rica, the Netherlands, Spain, Morocco, Sweden, Switzerland, Cyprus, Australia, China, Norway, Latvia, Luxembourg, the United Kingdom, Russia, Canada and the U.S.
In a coordinated action, the U.S. Department of the Treasury and its Financial Crimes Enforcement Network today announced that Liberty Reserve has been named as a financial institution of primary money laundering concern under Section 311 of the USA PATRIOT Act. This action includes a notice to the Federal Register proposing to prohibit covered U.S. financial institutions from opening or maintaining correspondent or payable-through accounts for foreign banks that are being used to process transactions involving Liberty Reserve.
Acting Assistant Attorney General Raman said: “As charged, Liberty Reserve operated, on an enormous scale, a digital currency system designed to provide cyber and other criminals with a way to launder their profits without leaving a trace. The company’s very purpose was to launder its users’ criminal proceeds through the U.S. and global financial system. By indicting Liberty Reserve and its principals, restraining over $25 million in criminal proceeds, forfeiting domain names, and seizing servers in countries around the globe, our message is clear: money launderers can run, but they can’t hide from the U.S. justice system. Combating the threat of global illicit finance requires using every tool we have at our disposal, and today we demonstrate our resolve to ensure that criminals who exploit the U.S. and global financial system will be held to account.”
U.S. Attorney Bharara said: “ As alleged, the only liberty that Liberty Reserve gave many of its users was the freedom to commit crimes – the coin of its realm was anonymity, and it became a popular hub for fraudsters, hackers, and traffickers. The global enforcement action we announce today is an important step towards reining in the ‘Wild West’ of illicit Internet banking. As crime goes increasingly global, the long arm of the law has to get even longer, and in this case, it encircled the earth.”
Secret Service Special Agent-in-Charge Hughes said: “These arrests are an example of the Secret Service’s commitment to investigate and apprehend criminals engaged in the misuse of virtual currencies to conduct global monetary fraud. Cyber criminals should be reminded today that they are unable to hide behind the anonymity of the Internet to avoid regulated financial systems. We are grateful to our many law enforcement partners throughout the world for assistance in this investigation, especially in Costa Rica, Spain and the Netherlands.”
IRS-CI Chief Weber said: “We are now entering the cyber age of money laundering. Technology advancements over the past several years have dramatically increased opportunities for criminals to move, conceal and enjoy their ill-gotten gains. Liberty Reserve and its principals have been charged with operating a sophisticated and complex system for structuring financial transactions which catered to those engaged in such criminal activity. What they did not anticipate was our robust partnerships with domestic and foreign law enforcement that allowed us collectively to follow the cyber money trail in the United States and around the world.”
ICE HSI Special Agent-in-Charge Hayes said: “The actions of the U.S. Secret Service, IRS, and HSI in dismantling the Liberty Reserve operation are critical because transnational criminal organizations can succeed only so long as they can funnel their illicit proceeds freely and without detection. HSI is proud of its partnership through the Global Illicit Financial Team and will continue to aggressively target financial institutions that deliberately enable businesses and individuals to evade global financial systems in furtherance of criminal schemes.”
According to the allegations in the indictment, the civil forfeiture complaint, and other documents filed in federal court:
Background
Liberty Reserve was incorporated in Costa Rica in 2006 and operated the digital currency commonly referred to as “LR.” While the company billed itself as the Internet’s “largest payment processor and money transfer system,” serving “millions” of people around the world, including the U.S., at no time did the company register with the U.S. Department of the Treasury as a money transmitting business, as required by law.
Budovsky, the principal founder of Liberty Reserve, directed and supervised its operations, finances, and corporate strategy. Kats, a co-founder, helped operate the company until 2009. The day-to-day operations of Liberty Reserve were managed, at different times, by Hidalgo and Yassine. El Amine managed various financial accounts controlled by Liberty Reserve, while Marmilev and Chukharev were primarily responsible for designing and maintaining the company’s technological infrastructure.
Overview of Liberty Reserve’s Money Laundering Operation
The defendants created, structured and operated Liberty Reserve as a criminal bank-payment processor designed to help users conduct illegal transactions anonymously and launder the proceeds of their crimes. It emerged as one of the principal money transfer agents used by cyber criminals around the world to distribute, store, and launder the proceeds of their illegal activity. The company grew into a financial hub of the cybercrime world, facilitating a broad range of online criminal activity, including credit card fraud, identity theft, investment fraud, computer hacking, child pornography and narcotics trafficking. Liberty Reserve was used extensively for illegal purposes, functioning as the bank of choice for the criminal underworld because it provided an infrastructure that enabled cyber criminals around the world to conduct anonymous and untraceable financial transactions.
The defendants also protected the criminal infrastructure of Liberty Reserve by, among other things, lying to anti-money laundering authorities in Costa Rica and pretending to shut down Liberty Reserve after learning the company was being investigated by U.S. law enforcement. They then continued operating the business through a set of shell companies, and moved tens of millions of dollars through shell company accounts maintained in Cyprus, Russia, China, Hong Kong, Morocco, Spain, Australia and elsewhere.
The Criminal Design of Liberty Reserve
In order to use LR currency, a user first had to open an account through the Liberty Reserve website and provide basic identifying information. Unlike traditional banks or legitimate online processors, Liberty Reserve did not require users to validate their identities. Users routinely established accounts under false names, including such blatantly criminal names as “Russia Hackers” and “Hacker Account.” As part of the investigation, a law enforcement agent opened and executed transactions through an undercover account at Liberty Reserve in the name of “Joe Bogus” and the address “123 Fake Main Street” in “Completely Made Up City, New York.”
Once an account was established, the user could conduct transactions with other Liberty Reserve users. In these transactions, the user could receive transfers of LR from other users’ accounts, and transfer LR from his or her own account to other users, including any “merchants” that accepted LR as payment. Liberty Reserve charged a one-percent fee up to a maximum of $2.99, every time a user transferred LR to another user through the Liberty Reserve system. For an additional “privacy fee” of 75 cents per transaction, a user could hide his or her own Liberty Reserve account number when transferring funds, effectively making the transfer completely untraceable, even within Liberty Reserve’s already opaque system.
To add an additional layer of anonymity, Liberty Reserve did not permit users to fund their accounts by transferring money to the company directly through a credit card transfer or other means. Users also could not withdraw funds from their accounts directly. Instead, Liberty Reserve users were required to make any deposits or withdrawals through the use of third-party “exchangers,” which enabled the company to avoid collecting any information about its users through banking transactions or other activity that would leave a centralized financial paper trail. Budovsky, Kats and El Amine owned and operated certain Liberty Reserve exchanger services.
The Liberty Reserve website recommended a number of “pre-approved” exchangers, which tended to be unlicensed money transmitting businesses operating in countries without significant governmental money laundering oversight or regulation, such as in Malaysia, Russia, Nigeria, and Vietnam. The exchangers charged transaction fees for their services that were much higher than the fees charged by mainstream banks or payment processors for comparable money transfers.
The Criminal Use of Liberty Reserve
To further enable the use of Liberty Reserve for criminal activity, its website offered a “shopping cart interface” that “merchant” websites could use to accept LR currency as a form of payment. The “merchants” who accepted LR currency were overwhelmingly criminal in nature. They included traffickers of stolen credit card data and personal identity information, peddlers of various types of online Ponzi and get-rich-quick schemes, computer hackers for hire, unregulated gambling enterprises, and underground drug-dealing websites.
In addition to being used to process payments for illegal goods and services online, Liberty Reserve was also used by cyber criminals to launder criminal proceeds and transfer funds among criminal associates. For example, Liberty Reserve was used by credit-card theft and computer-hacking rings operating in countries around the world, including Vietnam, Nigeria, Hong Kong, China, and the U.S., to distribute proceeds of these conspiracies among the members involved.
The defendants were well aware that Liberty Reserve functioned as an unlawful money-laundering enterprise. In an online chat between Kats and Yassine that was captured by law enforcement, Kats explicitly described Liberty Reserve’s activities as “illegal” and noted that “everyone in USA” such as “DOJ” knows “LR is [a] money laundering operation that hackers use.”
* * *
Liberty Reserve, Budovsky, 39, a citizen of Costa Rica who resides in the Netherlands, Kats, 41, of Brooklyn, New York, Yassine, 42, of Costa Rica, Hidalgo, 28, of Costa Rica, El Amine, 46, of Costa Rica, Marmilev, 33, of Brooklyn, New York, and Chukharev, 27, of Costa Rica, are each charged with one count of conspiracy to commit money laundering, which carries a maximum term of 20 years in prison, one count of conspiracy to operate an unlicensed money transmitting business, which carries a maximum term of five years in prison, and operation of an unlicensed money transmitting business, which carries a maximum term of five years in prison. The terms of incarceration apply to the individual defendants.
This case was investigated by the Secret Service, the IRS-CI and ICE HSI, which worked together in this case as part of the Global Illicit Financial Team. The Secret Service’s New York Electronic Crimes Task Force assisted with the investigation, as well as the Judicial Investigation Organization in Costa Rica, the National High Tech Crime Unit in the Netherlands, the Spanish National Police, Financial and Economic Crime Unit, the Cyber Crime Unit at the Swedish National Bureau of Investigation, and the Swiss Federal Prosecutor’s Office. The Shadowserver Foundation acted as the hosting provider for the domain names that were seized pursuant to the Court-authorized seizure warrants. The Department of Justice’s Office of International Affairs and Computer Crime and Intellectual Property Section also provided support.
This case is being prosecuted jointly with the Department of Justice’s Asset Forfeiture and Money Laundering Section, which is overseen by Acting Assistant Attorney General Mythili Raman; and the U.S. Attorney’s Office for the Southern District of New York’s Complex Frauds Unit and Asset Forfeiture Unit.
If you believe you were a victim of a crime and were defrauded of funds through the use of Liberty Reserve, and you wish to provide information to law enforcement and/or receive notice of future developments in the case or additional information, please contact (888) 238-0696 or (212) 637-1583.
The charges contained in the indictment are merely accusations and the defendants are presumed innocent unless and until proven guilty.
CHINA HACKING AGAIN
Chinese hackers ‘compromise’ US weapons systems designs Black Hawk helicopters were cited as one of the weapons systems compromised by hackers Chinese hackers have accessed designs for more than two dozen US weapons systems, a US newspaper has reported.
Designs for combat aircraft, ships and missile defences were among those compromised, a Pentagon paper found, the Washington Post reported.
A public version of the same Defense Science Board report said in January that the US was unprepared for a full-scale cyber attack.
The board did not return requests for comment from the BBC.
The Washington Post report comes as Australia discloses Chinese hackers stole floor plans for the new headquarters of its domestic intelligence agency.
The compromised US designs include those for advanced Patriot missile systems called PAC-3, an Army anti-missile system known as Thaad, and the Navy’s Aegis ballistic-missile defence system, according to the Washington Post.
The F/A-18 fighter jet, V-22 Osprey aircraft, Black Hawk helicopter and the Navy’s new Littoral Combat Ship were also compromised.
The F-35 Joint Strike Fighter, the most expensive weapons system ever built, was also cited on the list.
The reports do not describe the extent of the theft, but correspondents say the hack could give China information that may be used against the US in the event of a potential future conflict.
****RULES**** 1. Debates and rebuttals are allowed but disrespectful curse-outs will prompt immediate BAN 2. Children are never to be discussed in a negative way 3. Personal information eg. workplace, status, home address are never to be posted in comments. 4. All are welcome but please exercise discretion when posting your comments , do not say anything about someone you wouldnt like to be said about you. 5. Do not deliberately LIE on someone here or send in any information based on your own personal vendetta. 6. If your picture was taken from a prio site eg. fimiyaad etc and posted on JMG, you cannot request its removal. 7. If you dont like this forum, please do not whine and wear us out, do yourself the favor of closing the screen- Thanks! . To send in a story send your email to :- [email protected]
Recent Comments