Navigation
Download the AMN app for your mobile device today - FREE!
  •  

Fake cars, real cash: How a multimillion-dollar Romanian scheme imploded in Kentucky

Commercial computer networks. (Aleksandar Radovanovic/Dreamstime/TNS)

A Romanian fraud enterprise made more than $2.7 million by scamming Americans before a Kentucky money launderer-turned federal informant ruptured the operation from within.

The scheme took advantage of victims who thought they were buying cars online via Amazon, AutoTrader, eBay and the like with official-looking documents to prove it. Instead, customers handed over money for products that didn’t exist.

The organization, which was dubbed by authorities as the “Alexandria Online Auction Fraud Network,” had operated since 2013. In late 2014, the criminal enterprise began employing an anonymous associate in Kentucky who laundered money for the criminals residing 5,000 miles away, investigators say.

Federal investigators confronted the Kentuckian, who wasn’t identified in court records, about illegal activity and converted the associate into a confidential source. Evidence mounted as the confidential informant moved millions of dollars through the commonwealth.

As of Friday, investigators had accounted for $2.7 million, which had been moved through Kentucky by the criminal enterprise, according to Gabrielle Dudgeon, a spokesperson for the Department of Justice. That was likely a “sliver” of the actual amount of money the scammers made, Dudgeon said.

- ADVERTISEMENT -

Now 15 Eastern European residents and a few Americans — many of whom successfully posed as employees of the well-known commerce sites — are paying the price for fooling customers with convincing emails and invoices that prolonged the enterprise. The network tried to scam people in several Kentucky cities and elsewhere in the United States.

After four indictments, a wave of extraditions and 15 guilty pleas, the accused criminals are either being sentenced in Lexington federal court or they’re already sitting in prisons all over the United States, according to court records.

The players: Romanian nationals, American launderers

The network had a hierarchy. There was a “high-level manager” named Bogdan-Stefan Popescu, who was accused of facilitating the fraud, according to court records.

Popescu owned a car wash called Spalatorie Auto Red Link located in Bucharest, Romania. He pleaded guilty to a federal racketeering conspiracy charge on June 11 of this year and was forced to forfeit money and two homes. He awaits sentencing. His other charges were dropped as part of a plea agreement.

Two of Popescu’s car wash employees — Florin Arvat and Alin-Ionut Dobrica — also worked for Popescu in the fraud network. They were low-level employees.

There was a mid-to-high level manager named Andrei-Catalin Stoica. He owned Design Plast PVC Usi Si Ferestre, a door and window company with an office in Romania, and Design Plast Menuiserie, a carpentry company located in Belgium.

Stoica, like Popescu, pleaded guilty to a federal racketeering conspiracy. His other charges were dropped as part of a plea agreement.

Operating below Stoica and Popescu were at least nine “mid-level” managers: Victor-Aurel Grama, Liviu-Sorin Nedelcu, Ionut Ciobanu, Marius-Dorin Cernat, Alexandru Ion, Stefan-Alexandru Paiusi, Eugen-Alin Badea, Cristisor Olteanu and Adrian Mitan.

Popescu, Stoica, and most of the others were from Alexandria, Romania. Four were from other areas in Romania.

For assistance, the Romanians called on U.S. money launderers: Austin Edward Nedved of Massachusetts; Dimitrious Antoine Brown of Georgia or Florida; Rashawd Lamar Tulloch of Georgia; and Andrew Gilbert Ybarra II of California, according to court records.

Beniam-Filip Ologeanu, another Romanian native, also laundered money for the enterprise, according to court records.

The scheme: Defrauding Americans with non-existent products

“It was the purpose of the conspiracy to entice victims based in the United States to send money to purchase items on the internet that did not exist,” a criminal indictment read.

The fraud team’s method was to create fake advertisements on websites that operate primarily on consumer-to-consumer transactions.

The advertisements generated interest from potential purchasers. From that point, the associates in the network used phony email accounts, social media accounts, trademarked materials and phone numbers to convince the purchasers they were getting legitimate goods.

The victims’ money was laundered through the United States and back into Europe, where it hit the conspirators’ pockets in the form of Romanian lei, Euros and other government-backed currencies.

Fake emails and identity fraud: The scammers went to great lengths

The organization’s efforts to appear legitimate were incredibly elaborate, according to voluminous court records.

The criminal associates set up fake accounts or got access to accounts that already existed on the e-commerce sites. Other people’s photos and fake names were used to make sales. Previous victims’ identities were sometimes stolen and used to sell and promote vehicles to customers.

By offering refunds, Stoica would get victims to provide copies of photo IDs or debit and credit card information.

The perpetrators also had success posing as members of the U.S. military.

Ciobanu used a Facebook account intended to look like the profile of an Air Force sergeant named Judith Lane. The account featured a photo of an Air Force member and was used to advertise automobile sales.

Cernat allegedly operated a Facebook account as an Air Force member who was being “sent to Iraq to fight against ISIS.”

Advertisements from legitimate sounding businesses peddling vehicles, including a 1969 Ford Mustang or Honda CRV, went directly to prospective customers.

The criminals set up fake customer service email accounts and sent victims invoices for their fake purchases. The emails and invoices featured trademarked branding from legitimate companies, according to criminal indictments.

For instance, [email protected], an email address associated with Popescu, was used to send payment confirmation to a victim. It included a counterfeit trademark for eBay.

Grama was one of the associates who oversaw efforts to make the operation appear believable, according to a criminal indictment. He established teams of individuals responsible for pretending to be customer service representatives, according to the indictment.

“These communications included posing as an employee of an online auction website and reassuring customers that the vehicle would arrive with all necessary documentation to obtain clear title,” one indictment read.

Nedelcu sent some of those convincing emails. One such email was an invoice that appeared to be from eBay Buyer Protection. Nedelcu explained to the victim who received the email why payment in prepaid debit cards was necessary.

Nedelcu “reassured” the victim there was a “payment guarantee policy,” according to a criminal indictment. He also told the victim the order had been verified through eBay’s finance department, provided an eBay customer support line and assured the victim a refund could be requested.

Other similar emails sent by multiple defendants had listed phone numbers for fake support departments like the “Amazon support department,” or they had bank account numbers for illegitimate companies like “Auto Value Remarketing Inc,” according to an indictment.

The Romanians “often” asked the Kentucky money launderer for help making invoices more believable or determining payment types, according to a criminal indictment.

Popescu admitted in a plea deal that he coordinated the fraud. He provided co-conspirators with the language and photographs to be used for advertisements and the language to use when responding to buyer inquiries. He also gave them login information for services that could make their IP addresses anonymous, according to the indictment.

Associates sent dirty money around the globe … and back again

The government’s confidential source was a money launderer who began working for the fraud network in late 2014, according to an indictment. The government approached them in June 2015 and the launderer cooperated.

The confidential source was located somewhere in the jurisdiction of the U.S. attorney for the Eastern District of Kentucky, court records say.

The fraud network’s accepted payment methods were usually Green Dot Moneypaks, Visa One Vanilla prepaid debit cards, PayPal My Cash cards, Amazon gift cards, money orders, cashier’s checks, MoneyGram, Western Union wires, or bank wires and deposits, according to court records.

After the Eastern European associates received payment, they sent necessary payment details, such as prepaid debit card codes, to money launderers in the United States.

The money launderers took the codes from the cards and re-encoded them to new “dummy” cards. The money launderers then converted the U.S. funds to bitcoin.

Bitcoin is a digital currency that can be exchanged into currencies that are more widely used by the general public. Users send and receive bitcoins using digital wallet software on electronic devices. Bitcoin is exchanged between bitcoin addresses, and every bitcoin transaction generates a transaction “hash,” which is forever stored on a public ledger.

The bitcoin was sent to addresses requested by the Eastern European associates.

The associates in the scheme also sometimes had victims send money directly to destinations where U.S. money launderers could retrieve it. Those methods included wire transfers, money orders and cashier’s checks, according to court records.

The co-conspirators kept records of their transactions in a Google spreadsheet that served as a ledger tracking payments from victims, according to an indictment.

Once the Romanians had the bitcoin, they called on “bitcoin exchangers” in Eastern Europe.

Vlad-Calin Nistor, a native of Cluj-Napoca, Romania, ran an exchange called Coinflux Services SRL, a business registered with the Romanian government in 2015, according to a criminal indictment. Nistor admitted to exchanging about $1.85 million worth of bitcoin for the criminal enterprise.

Another bitcoin exchanger charged in the case was Rossen Iossifov, a Bulgarian who ran an exchange called RG Coins, according to the indictment.

The bitcoin exchangers deposited the money into bank accounts that were accessible by associates of the enterprise, according to the indictment.

Now the offenders are paying it back — in more ways than one

Arrests in this case occurred across a one-year period, with the first coming in January 2019. At least some of the Eastern European residents faced extradition to the United States, according to court records.

Each of the 20 defendants faced various initial charges, including conspiracy, conspiracy to commit mail and wire fraud, conspiracy to commit money laundering, aggravated identity theft and attempt to commit mail fraud.

Fifteen of the defendants entered plea deals, allowing for most of their charges to be dropped. Only three have been sentenced to U.S. prisons so far.

— Badea admitted to laundering $35,500 with the federal government’s confidential informant in Kentucky. He was sentenced to 40 months in prison and ordered to pay $89,046 in restitution, according to court records.

— Arvat was sentenced to more than two years in prison and ordered to pay $85,000 in restitution, according to court records. He’d be slated for release in June of next year. He’ll be deported back to Romania once he’s released.

— Dobrica, 28, also admitted to distributing funds. He was ordered to serve more than three years in prison but was also given credit for time served since Dec. 11, 2018. He’ll be deported when he gets out next summer.

— Ologeanu pleaded guilty May 19 to one count of racketeering conspiracy. He hasn’t been sentenced.

— Four money launderers — Ologeanu, Nedved, Brown and Ybarra — pleaded guilty, according to court records. Only Nedved, 29, has been sentenced. He got eight years in prison, the most prison time of anyone who has been convicted in the case. Nedved admitted that he either attempted or succeeded in laundering $213,200. He was ordered to pay $365,016 in restitution to victims. Ybarra, who admitted that he either attempted or succeeded in laundering $230,871, was scheduled to be sentenced on Jan. 12. Ologeanu was scheduled to be sentenced on April 7.

Iossifov was found guilty by a jury after just over an hour of deliberation on Sept. 28, according to court records. He’s scheduled to be sentenced on Jan. 12.

As prison time looms, 1 family asks for mercy

Some of those awaiting sentencing have tried to avoid major prison time by having family and friends plead with the judge. Five such letters were sent on behalf of Mitan, one of the mid-level managers.

Mitan admitted that he had access to 16,000 different credit and debit cards. He also admitted that he laundered nearly $10,000 through the federal government’s confidential informant in Kentucky. Mitan also pleaded guilty to bank fraud conspiracy in North Carolina. He’s scheduled for sentencing Dec. 18 in Lexington.

“I understood that he did things that affected people and for that, I am very sorry, at the same time I hope it is not true,” wrote Adina Diaconu, who said in the letter filed with the court that she is Mitan’s concubine and the mother to his 4-year-old daughter.

Mitan, who pleaded guilty, had a job waiting for him in Romania, working for a family who owns a pizza restaurant and a pastry shop, Diaconu wrote.

“Even if he made a mistake and deserves to be punished because no one is above the law, regardless of the state and constitution, I believe that Adrian deserves to be given the chance to rehabilitate,” wrote Adrian Stanga, the owner of the family business

Seven others, including the ringleader, are scheduled for sentencing in Lexington federal court between November and May.

___

(c) 2020 the Lexington Herald-Leader

Distributed by Tribune Content Agency, LLC.