Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- https://twitter.com/UnitedStatesV/status/1234529937387859969
- https://assets.documentcloud.org/documents/6791952/Complaint.pdf
- UNITED STATES DISTRICT COURT
- FOR THE DISTRICT OF COLUMBIA
- UNITED STATES OF AMERICA,
- Plaintiff,
- v.
- 113 VIRTUAL CURRENCY ACCOUNTS
- Defendants.
- Civil Action No. 20-606
- VERIFIED COMPLAINT FOR FORFEITURE IN REM
- COMES NOW, Plaintiff the United States of America, by and through the United States
- Attorney for the District of Columbia, and brings this Verified Complaint for Forfeiture in Rem
- against the defendant properties, namely: 113 virtual currency accounts (the “Defendant
- Properties”), which are listed in Attachment A. The United States alleges as follows in accordance
- with Rule G(2) of the Federal Rules of Civil Procedure, Supplemental Rules for Admiralty or
- Maritime Claims and Asset Forfeiture Actions:
- THE DEFENDANT PROPERTIES
- 1. The Defendant Properties are comprised of miscellaneous financial instruments
- (listed in Attachment A).
- NATURE OF ACTION AND THE DEFENDANTS IN REM
- 2. This in rem forfeiture action arises out of an investigation by the Internal Revenue
- Service – Criminal Investigation’s Cyber Crimes Unit (“IRS-CI”), Homeland Security
- Investigations (“HSI”), and the Federal Bureau of Investigation (“FBI”) into the laundering of
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 1 of 38
- monetary instruments, in violation of 18 U.S.C. §1956, and operation of an unlicensed money
- service business in violation of 18 U.S.C. § 1960.
- 3. The Defendant Properties are subject to forfeiture pursuant to 18 U.S.C.
- § 981(a)(1)(A), as property involved in, or traceable to, a financial transaction in violation of 18
- U.S.C. §§ 1956 and 1960.
- JURISDICTION AND VENUE
- 4. This Court has jurisdiction over this action pursuant to 28 U.S.C. §§ 1345 and 1355.
- These statutes confer original jurisdiction to district courts of all civil actions, suits, or proceedings
- commenced by the United States and any action for the forfeiture of property incurred under any
- act of Congress.
- 5. Venue is proper pursuant to 28 U.S.C. § 1355(b)(1)(A) because acts or omissions
- giving rise to the forfeiture occurred within the District of Columbia.
- 6. Venue is also proper within this judicial district pursuant to 28 U.S.C. § 1355(b)(2),
- because the property subject to forfeiture is located in a foreign country.
- FACTS GIVING RISE TO FORFEITURE
- I. Background
- A. Bitcoin and Ethereum
- 7. Bitcoin (BTC) and Ether (ETH) are pseudonymous virtual currencies. Although
- transactions are visible on a public ledger, each transaction is referenced by a complex series of
- numbers and letters (as opposed to identifiable individuals) involved in the transaction. The public
- ledger containing this series of numbers and letters is called a blockchain. This feature makes
- BTC and ETH pseudonymous; however, it is often possible to determine the identity of an
- individual involved in BTC and ETH transactions through several different tools. For this reason,
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 2 of 38
- many criminal actors who use BTC and ETH to facilitate illicit transactions online (e.g., to buy
- and sell drugs or other illegal items or services) look for ways to make their transactions even more
- anonymous.
- 8. BTC/ETH addresses are unique tokens; however, BTC/ETH are designed such that
- one person may easily operate many such accounts. Like an email address, a user can send and
- receive BTC/ETH with others by sending BTC/ETH to a BTC/ETH address. People commonly
- have many different addresses, and an individual could theoretically use a unique address for every
- transaction in which they engage.
- 9. To spend BTC/ETH held within a BTC/ETH address, the user must have a private
- key, which is generated when the BTC/ETH address is created. Similar to a password, a private
- key is shared only with the BTC/ETH-address key’s initiator and ensures secured access to the
- virtual currency. Consequently, only the holder of a private key for a BTC/ETH address can spend
- BTC/ETH from the address. A BTC user can also spend from multiple BTC addresses in one
- transaction; for example, five addresses each holding five BTC can collectively send 25 BTC in a
- single transaction.
- 10. Although generally, the owners of BTC/ETH addresses are not known unless the
- information is made public by the owner (for example, by posting the address in an online forum
- or providing the BTC/ETH address to another user for a transaction), analyzing the public
- transaction ledger can sometimes lead to identifying both the owner of an address and any other
- accounts that the person or entity owns and controls.
- 11. BTC/ETH are often transacted using a virtual currency exchange, which is a virtual
- currency trading and storage platform. An exchange typically allows trading between the U.S.
- dollar, other foreign currencies, BTC, ETH, and other virtual currencies. Many virtual currency
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 3 of 38
- exchanges also store their customers’ virtual currencies. These exchanges act as money services
- businesses and are legally required to conduct due diligence of their customers and have antimoney laundering checks in place. Virtual currency exchanges doing business in the United States
- are regulated under the Bank Secrecy Act, codified at 31 U.S.C. § 5311 et seq., and must collect
- identifying information of their customers and verify their clients’ identities.
- B. Blockchain Analysis
- 12. While the identity of the BTC/ETH address owner is generally anonymous (unless
- the owner opts to make the information publicly available), law enforcement can identify the
- owner of a particular BTC/ETH address by analyzing the blockchain. The analysis can also reveal
- additional addresses controlled by the same individual or entity. For example, a user or business
- may create many BTC addresses to receive payments from different customers. When the user
- wants to transact the BTC that it has received (for example, to exchange BTC for other currency
- or to purchase goods or services), it may group those addresses together to send a single
- transaction. Law enforcement uses commercial services offered by several different blockchainanalysis companies to investigate virtual currency transactions. These companies analyze the
- blockchain and attempt to identify the individuals or groups involved in the virtual currency
- transactions. Specifically, these companies create large databases that group transactions into
- “clusters” through analysis of data underlying the virtual currency transactions.
- C. Peel Chains
- 13. A “peel chain” occurs when a large amount of BTC sitting at one address is sent
- through a series of transactions in which a slightly smaller amount of BTC is transferred to a new
- address each time. In each transaction, some quantity of BTC “peel off” the chain to another
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 4 of 38
- address – frequently to be deposited into a virtual currency exchange – and the remaining balance
- is transferred to the next address in the chain.
- 14. The chart below illustrates a simple peel chain example in which a subject seeking
- to deposit 100 BTC into Exchange A uses a peel chain to make the transaction difficult to track.
- From left to right, the subject forwards 100 BTC through a series of transactions with 20 peels in
- inconsistent amounts, ultimately depositing the final five BTC into an exchange, at which point all
- 100 BTC are deposited.
- 15. The above chart is a relatively simple example of a peel chain. In practice,
- sophisticated criminals often use peel chains of hundreds of transactions to obfuscate the path of
- funds on the blockchain.
- D. North Korea’s Documented Hacking of Virtual Currency Exchanges
- 16. In its August 2019 report, the Panel of Experts established by the United Nations
- Security Council to investigate compliance with sanctions against North Korea (“Panel of
- Experts”) noted how the North Korean government has “used cyberspace to launch increasingly
- sophisticated attacks to steal funds from financial institutions and cryptocurrency exchanges to
- generate income.” 2019 Report of the Panel of Experts, at 4.
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 5 of 38
- 17. The Panel of Experts investigated:
- the widespread and increasingly sophisticated use by the Democratic People’s
- Republic of Korea of cyber means to illegally force the transfer of funds from
- financial institutions and cryptocurrency exchanges, launder stolen proceeds and
- generate income in evasion of financial sanctions. In particular, large-scale attacks
- against cryptocurrency exchanges allow the Democratic People’s Republic of
- Korea to generate income in ways that are harder to trace and subject to less
- government oversight and regulation than the traditional banking sector.
- Democratic People’s Republic of Korea cyber actors, many operating under the
- direction of the Reconnaissance General Bureau, raise money for the country’s
- weapons of mass destruction programmes, with total proceeds to date estimated at
- up to $2 billion.
- Id.
- 18. Based on information provided by member countries and open source reports, the
- Panel of Experts undertook investigations of at least 35 reported instances of North Korean actors
- attacking financial institutions, cryptocurrency exchanges, and mining activity designed to earn
- foreign currency.
- 19. “With regard to the foreign currency earned through cyberattacks, according to one
- Member State, ‘These activities contribute to the DPRK’s WMD programme.’ Implementing such
- attacks is low risk and high yield, often requiring minimal resources (e.g., a laptop and Internet
- access).” Id. at 27. The Panel of Experts further noted that,
- Democratic People’s Republic of Korea cyber actors steal cryptocurrency, use it to
- launder proceeds in evasion of financial sanctions and mine it through
- cryptojacking attacks for the purposes of revenue generation. According to a
- Member State, cryptocurrency attacks allow the Democratic People’s Republic of
- Korea to more readily use the proceeds of their attacks abroad. In order to obfuscate
- their activities, attackers use a digital version of layering in which they create
- thousands of transactions in real time through one-time use cryptocurrency wallets.
- According to that Member State, stolen funds following one attack in 2018 were
- transferred through at least 5,000 separate transactions and further routed to
- multiple countries before eventual conversion to fiat currency, making it highly
- difficult to track the funds.
- Id.
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 6 of 38
- 20. The Panel of Experts noted that North Korea mostly targets South Korean
- cryptocurrency exchanges, and launches such hacking campaigns from within North Korea. The
- Panel of Experts concluded that North Korea’s “cyberattacks on Republic of Korea [South Korean]
- targets have been increasing in number, sophistication and scope since 2008, including a clear shift
- in 2016 to attacks focused on generating financial revenue. In 2019, Democratic People’s
- Republic of Korea cyber actors shifted focus to targeting cryptocurrency exchanges. Some
- cryptocurrency exchanges have been attacked multiple times.” Id.
- 21. The facts giving rise to this complaint involve the theft of virtual currency by North
- Korean co-conspirators from four virtual currency exchanges (“The Exchange 1,” “The Exchange
- 2,” “The Exchange 3,” and “The Exchange 4”), three of which were based in South Korea, and the
- related laundering of the proceeds.
- E. Money Transmission Business Regulatory Framework
- 22. Federal law requires money transmitting businesses to be registered with the
- Financial Crimes Enforcement Network (“FinCEN”), which is located in the District of Columbia.
- The failure to register with FinCEN is a federal felony offense.
- 23. Federal law bars money transmitting businesses from transmitting funds that were
- known to be derived from a criminal offense or intended to be used to promote unlawful activity.
- 24. In March of 2013, FinCEN issued guidance “to clarify the applicability of the
- regulations implementing the Bank Secrecy Act (‘BSA’) to persons creating, obtaining,
- distributing, exchanging, accepting, or transmitting virtual currencies.” March 2013 Guidance at
- 1, available at https://www.fincen.gov/sites/default/files/shared/FIN-2013-G001.pdf.
- 25. The March 2013 Guidance confirmed that “[t]he definition of a money transmitter
- does not differentiate between real currencies and convertible virtual currencies.” Id. at 3.
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 7 of 38
- “Accepting and transmitting anything of value that substitutes for currency makes a person a
- money transmitter under the regulations implementing the BSA.” Id.
- 26. The March 2013 Guidance sets forth the types of virtual currency businesses that
- must register under the BSA regulations. In particular, it states that an “exchanger that (1) accepts
- and transmits a convertible virtual currency or (2) buys or sells convertible virtual currency for
- any reason is a money transmitter under FinCEN’s regulations, unless a limitation to or exemption
- from the definition applies to the person.” Id. at 3. The Guidelines define an “exchanger” as “a
- person engaged as a business in the exchange of virtual currency for real currency, funds, or other
- virtual currency.”
- II. Phase One: The Intrusion and Theft
- 27. In late 2018, IRS-CI’s Cyber Crimes Unit learned that The Exchange 1 had been
- hacked. The perpetrators of the hack stole nearly $250 million worth of virtual currencies (as
- detailed below). The intrusion and subsequent laundering involved numerous electronic
- communications made in furtherance of the scheme, including e-mail messages and other wire
- communications related to the intrusion and the submission of false Know-Your-Customer
- information to various virtual currency exchanges. These communications include wire
- communications that transited through the United States.
- 28. In mid-2018, an employee of The Exchange 1 communicated with a “potential
- client” via email. While communicating with the “potential client,” the employee unwittingly
- downloaded malware which attacked The Exchange 1.
- 29. On or about the same day that The Exchange 1 was hacked, a co-conspirator in
- North Korea researched The Exchange 1 and its CEO. This research, much of which was in
- Korean, referenced:
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 8 of 38
- a. Hacking;
- b. Gmail hacker extension;
- c. How to conduct phishing campaigns; and
- d. How to exchange large amounts of ETH to BTC.
- 30. Ultimately, the malware unwittingly downloaded by The Exchange 1 employee
- provided remote access to The Exchange 1 and unauthorized access to private keys controlling
- wallets to multiple virtual currencies.
- 31. With control of The Exchange 1’s private keys, the North Korean co-conspirators
- stole the following virtual currencies:
- Currency Est. Amount Est. Dollar Value
- BTC 10,777.94 $94,145,839.41
- ETH 218,790 $131,005,511.85
- Zcash (ZEC) 3,783 $1,020,809.45
- Dogecoin (DOGE) 99,999,000 $560,944.39
- Ripple (XRP) 3,043,268 $2,660,100.78
- Litecoin (LTC) 11,000 $1,639,699.05
- Ethereum Classic (ETC) 175,866 $3,304,763.96
- Total $234,337,668.88
- 32. The North Korean co-conspirators withdrew approximately 10,777.94 BTC from
- The Exchange 1. Generally speaking, a single deposit of over 10,000 BTC would be easy to trace
- as it would generate multiple “red flags” for the exchange that received the deposit. Additionally,
- the exchange receiving the large deposit could freeze the account and leave the hackers with no
- recourse. Thus, to obfuscate the BTC trail and decrease scrutiny, the North Korean co-conspirators
- engaged in hundreds of automated transactions with new BTC addresses as “peel chains” to four
- different exchanges.
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 9 of 38
- 33. The North Korean co-conspirators failed to conduct a peel chain for the LTC they
- stole from The Exchange 1. Instead they transferred all 11,000 LTC to
- LLzTJFu3UcwXRrwaq2gLKnJaWWt3oGHVMK (Defendant Property 81).
- III. Initial Laundering of the Proceeds of Phase One via Peel Chains
- 34. Analysis of the blockchain and additional investigation revealed that over 10,500
- of the BTC stolen from The Exchange 1 was deposited primarily into accounts at four virtual
- currency exchanges (“VCE1,” “VCE2,” “VCE3,” and “VCE4”).
- 35. Further analysis revealed that a substantial amount of other virtual currencies stolen
- from The Exchange 1 was also deposited into accounts at VCE1, VCE2, VCE3, and VCE4. In
- particular, one account at VCE1 (Defendant Property 64) directly received nearly all DOGE and
- XRP stolen from The Exchange 1.
- 36. The account at VCE4 into which the funds were laundered controlled the addresses
- listed as Defendant Properties 98 through 111. This account was the same account that received
- proceeds from approximately $30 million worth of virtual currency stolen by North Korean coconspirators from The Exchange 4, a South Korea-based virtual currency exchange, in or about
- the summer of 2018.
- 37. The main account at VCE1 (Defendant Property 64) was registered using an email
- account from a South Korean engineering company, whose email accounts were compromised by
- North Korean co-conspirators. In addition to the approximately 5,600.42737261 BTC
- ($39,765,175.16), the account received approximately 600.1 ETH, 99,998,987 DOGE, 3,043,200
- XRP, and 1,500 ZEC, which were converted to BTC and withdrawn. The South Korean
- engineering firm was unaware that its infrastructure was being used for this purpose.
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 10 of 38
- 38. In an attempt to circumvent VCE1’s Know-Your-Customer (“KYC”) program, the
- North Korean co-conspirators submitted two fraudulent identification photos. As depicted below
- in KYC Photo 1, one photo is of what appears to be an Asian male sitting in a chair holding his
- South Korean government-issued photo ID in front of his face with two hands. Behind the
- individual is a computer monitor displaying an encrypted web browser which conceals IP
- addresses. Metadata from the photo revealed that it was altered.
- KYC Photo 1
- 39. Another account at VCE1 (Defendant Property 63) received approximately
- 112.047 ETH and converted it to BTC. North Korean co-conspirators also submitted two
- fraudulent photos for this account as well, in a continued attempt to circumvent VCE1’s KYC
- policy. As demonstrated below in KYC Photo 2, one photo is of what appears to be a Caucasian
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 11 of 38
- male standing behind a computer monitor holding a German government-issued photo ID in front
- of his face with two hands. The face in the photo is noticeably altered. There are publicly available
- versions of the photo depicting this person, one of which was used in this photo. The white t-shirt
- with black writing being worn by the individual is the exact same t-shirt being worn in the photo
- submitted for the other account. That is, the North Korean co-conspirators used the exact same
- photo of the body, but added in different photos of the faces when submitting KYC documents.
- KYC Photo 2
- 40. The account at VCE3 receiving the 264.454103 BTC ($1,818,972.13) (which
- included Defendant Properties 50 through 52) also involved altered KYC photos. One photo is a
- Caucasian male holding a sheet of paper with the name of VCE3 and the date written on it in one
- hand and an Australian passport open to the photo page in the other hand. The face in the photo
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 12 of 38
- was noticeably altered. Ultimately, VCE3 was not satisfied with the image and requested a video
- conference with the account holder, which the account holder refused.
- 41. An account at VCE2 (Defendant Property 112) received approximately 406.095468
- BTC ($3,408,849.46). This account at VCE2 was linked to the account at VCE4 (which included
- Defendant Properties 98 through 111) that received BTC from The Exchange 1 and the summer
- 2018 theft from The Exchange 4. In total, the VCE4 account received approximately
- 6,138.10855889 BTC ($46,461.524.35).
- 42. The BTC received by the accounts was then withdrawn from the four exchanges,
- and again the North Korean co-conspirators reconstituted the funds by conducting hundreds of
- transactions with new BTC addresses and multiple peel chains. During this period, additional
- BTC was included in the layering.
- 43. Included below as Exhibit 1 is a diagram that details a sample of the larger peel
- chain that IRS-CI’s Cyber Crimes Unit analyzed in the course of the investigation.
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 13 of 38
- 44. Exhibit 1 reflects that:
- - After The Exchange 1 was hacked, 5,600.42737261 BTC was laundered into an
- account at VCE1 (Defendant Property 64) via 146 transactions from May 10, 2018 to
- July 6, 2018.
- - The North Korean co-conspirators then laundered 3,484.46623432 BTC (of the
- approximately 5,600 BTC) to 80 BTC addresses via 83 transactions from June 25,
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 14 of 38
- 2018 to July 6, 2018.
- July 11, 2018
- - On July 11, 2018, at 3:35 am, the subjects then had all 80 addresses transfer 3,800 BTC
- to Address B.
- o That is, a review of the blockchain shows the 80 addresses sent the BTC as
- part of a single transaction to Address B.
- o Such transactions typically occur when a user storing BTC in software on their
- computer creates a single transaction to transfer the funds to an exchange so
- that the user can begin the process of cashing out the BTC for fiat currency.
- - The subjects began peeling off bitcoin from this large address and sent it in small
- transactions to two other virtual currency exchanges (“VCE5” and “VCE6”).
- Accounts at VCE5 (Defendant Properties 65-70) and VCE6 (Defendant Properties 55-
- 62) received the bulk of the laundered funds from the hack of The Exchange 1. An
- example of how the funds were laundered into VCE5 and VCE6 is as follows:
- July 12, 2018
- - At 1:00 am, the subjects laundered 20 BTC from Addresses A to an account at VCE6
- (Defendant Property 59).
- - At 1:00 am, the subjects laundered 30 BTC from Addresses A to an account at VCE5
- (Defendant Property 68).
- - At 2:02 am, the subjects peeled off 20 BTC from Address B and laundered it to an
- account at VCE5 (Defendant Property 68).
- - At 2:02 am, the subjects laundered the remaining 3,780 BTC from Address B to
- Address C.
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 15 of 38
- - At 2:02 am, the subjects peeled off 30 BTC from Address C and laundered it to an
- account at VCE6 (Defendant Property 59).
- - At 2:02 am, the subjects laundered the remaining 3,750 BTC from Address C to
- Address D.
- - At 2:11 am, the subjects peeled off 1 BTC from Address D and laundered it to another
- address.
- - At 2:11 am, the subjects laundered the remaining 3,749 BTC from Address D to
- Address E.
- - At 2:11 am, the subjects peeled off 500 BTC from Address E and laundered it to
- Address F.
- - At 2:11 am, the subjects laundered the remaining 3,249 BTC from Address E to
- Address G.
- - At 2:11 am, the subjects peeled off 1,000 BTC from Address G and laundered it to
- Address F.
- - At 2:11 am, the subjects laundered the remaining 2,249 BTC from Address G to
- Address H.
- - At 2:28 am, the subjects peeled off 300 BTC from Address H and laundered it to
- Address F.
- July 14, 2018
- - At 12:59 am, the subjects peeled off 10 BTC from Address H and laundered it to an
- account at VCE5 (Defendant Property 68).
- - At 12:59 am, the subjects peeled off 30 BTC from Address F and laundered it to an
- account at VCE6 (Defendant Property 57).
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 16 of 38
- - At 12:59 am, the subjects laundered the remaining 290 BTC from Address H to
- Address I.
- - At 1:40 am, the subjects peeled off 25 BTC from Address I and laundered it to an
- account at VCE5 (Defendant Property 65).
- - At 1:40 am, the subjects laundered the remaining 265 BTC from Address I to Address
- J.
- - At 2:21 am, the subjects peeled off 39 BTC from Address J and laundered it to an
- account at VCE5 (Defendant Property 68).
- - At 2:21 am, the subjects laundered the remaining 226 BTC from Address J to Address
- K.
- July 15, 2018
- - At 2:12 am, the subjects peeled off 30 BTC from Address K and laundered it to an
- account at VCE5 (Defendant Property 68).
- - At 2:12 am, the subjects laundered the remaining 196 BTC from Address K to Address
- L.
- - At 2:12 am, the subjects peeled off 20 BTC from Address L and laundered it to an
- account at VCE5 (Defendant Property 68).
- July 16, 2018
- - At 3:29 am, the subjects peeled off 35 BTC from Address F and laundered it to an
- account at VCE6 (Defendant Property 58).
- 45. The transactions that occurred in the peel chain were automated. That is, the North
- Korean co-conspirators had a computer script that rapidly laundered the BTC to and from
- addresses and exchanges. In fact, many of the transactions occurred during the same minute. This
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 17 of 38
- is a known tactic used by money launderers when trying to move large amount of BTC rapidly.
- Because of the complexity of addresses and number of transactions, human error could easily lead
- to the loss of funds. While a bank can claw back funds sent to an errant address, no such remedy
- exists for BTC. As such, money launderers use computer programs to ensure precision when
- transferring in high volumes at a high frequency.
- 46. The above peel chain analysis is a representative sample of the many peel chains
- involved in the money laundering scheme. The funds stolen from The Exchange 1 continued to
- be laundered via hundreds of peel chain transactions largely mirroring those described above,
- illustrated in substantive part in Exhibit 1. Within the many peel chains, multiple BTC address
- (Defendant Properties 35-43) maintained a balance of BTC traceable to the theft.
- IV. North Korean Attribution and Obfuscation in Phase One
- A. Celas LLC
- 47. Proceeds of the theft of BTC from The Exchange 1 were used to perpetuate
- additional schemes by paying for infrastructure, to include domain registration for websites like
- Celas LLC, site hosting from service providers that focus on client anonymity, and virtual private
- networks. The North Korean co-conspirators sent 0.003526 BTC ($22.43) of the stolen BTC,
- which was previously laundered via the peel chain layering process, to pay for the registration of
- 12 months of business email services for celasllc.com on or about July 11, 2018.
- 48. The same North Korean co-conspirators registered the domain “celasllc.com.”
- According to its website, Celas LLC, a/k/a Celas Limited, purported to offer a cryptocurrencytrading platform, called Celas Trade Pro, which could be downloaded from celasllc.com. In
- actuality, forensic analysis revealed that Celas Trade Pro was a malicious software code that
- provided the North Korean co-conspirators direct access to the downloader’s system.
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 18 of 38
- 49. According to security researchers, Celas LLC shared a server IP address and an
- encryption key with the known malware named Fallchill. A joint technical alert published by the
- Department of Homeland Security and the Federal Bureau of Investigation associated Fallchill
- with the government of North Korea.
- 50. A specific command line in the Celas Trade Pro application and Fallchill are
- consistent with North Korean hacking campaigns against the financial industry dating back to
- 2016.
- 51. Celas Trade Pro used a language code associated with North Korea.
- 52. The North Korean co-conspirators caused the upload of a version of Celas Trade
- Pro to Website A in June 2108, shortly after the application had been compiled. Website A is a
- website that aggregates many antivirus products and online scan engines to check for viruses.
- Within minutes of the upload, the North Korean co-conspirators voted on the file as being safe.
- That is, the North Korean co-conspirators were attempting to see whether the malware would be
- detected, and then attempted to provide credibility to the program by voting it as safe.
- B. Phishing Campaign
- 53. The North Korean co-conspirators who emailed The Exchange 1 malware were also
- engaged in a massive phishing campaign in an attempt to infect other users with malware. To
- provide credibility to the online personas, fake social media profiles were created. For example:
- a. A Twitter account was created with the name “Waliy Darwish” that made
- various posts related to cryptocurrency and included a link to celasllc.com;
- b. The same user created a LinkedIn page for “Waliy Darwish,” listing him as a
- business developer at Celas LLC with a bachelor’s degree from Rotterdam
- University; and
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 19 of 38
- c. The same user also created a Facebook and Instagram page.
- 54. The phishing campaign targeted thousands of email accounts at exchanges around
- the world and personal email accounts of prominent people within the cryptocurrency ecosystem,
- to include CEOs of major exchanges. The phishing emails were primarily three types:
- advertisements for Celas LLC; developers looking to work with/for the targeted exchange; or a
- prospective client. The emails often contained a link to celasllc.com or an attachment.
- Additionally, the Waliy Darwish LinkedIn account messaged multiple people as well.
- 55. To aid in the phishing campaign, the North Korean co-conspirators used various
- email plugins. Plugins are add-on tools that can help with email tracking, task management, and
- other tasks. Some of the plugins included:
- a. A tool to compose one email that is then automatically individually addressed to
- many recipients. It also allowed the sender to receive an email notifying them
- when a recipient has opened and read an email. This email contained the IP
- address, browser type, and user agent of the recipient.
- b. A tool to customize the email’s signature block with company contact
- information, pictures, and other information to make an email look professional.
- c. A tool that enables human editors to write and respond to email for a client,
- ensuring “perfect English.” The editors optimize grammar, punctuation, word
- choice, sentence rhythm, and tone.
- C. Additional Connections to North Korea
- 56. One of the North Korean co-conspirators who was involved with the conspiracy to
- deliver the malware to The Exchange 1 researched the following:
- a. North Korea;
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 20 of 38
- b. North Korean Special Forces and the North Korean military;
- c. the United States military in regard to the North Korean military; and
- d. Kim Jong Un.
- 57. In spite of using VPN services to mask their addresses, law enforcement was able
- to trace back logins to an IP address within North Korea.
- V. Laundering of Phase One and Phase Two Illicit Proceeds by "田寅寅" and "李家东"
- A. Laundering of Proceeds from Hack of The Exchange 1 (Phase One)
- 58. Ultimately, after being laundered via hundreds of peel chain transactions, a bulk of
- the stolen BTC was deposited into four accounts at VCE5 (Defendant Properties 67 and 70) and
- VCE6 (Defendant Properties 56 and 62).
- 59. The accounts at VCE5 and VCE6 (Defendant Properties 56, 62, 67, and 70)
- belonged to "田寅寅" (a/k/a Tian Yinyin) and "李家东" (a/k/a Li Jiadong), also known by their
- registered usernames “snowsjohn” and “khaleesi” respectively.
- 60. Tian Yinyin and Li Jiadong are both Chinese nationals with government
- identification numbers and Chinese phone numbers.
- 61. Between in or about 2018 through in or about April 2019, Tian Yinyin and Li
- Jiadong engaged in $100,812.842.54 in virtual currency transactions, which primarily consisted of
- their exchange of virtual currency traceable to the hack of The Exchange 1. Tian Yinyin and Li
- Jiadong would convert such virtual currency into fiat currency and transfer it to customers, for a
- fee.
- 62. Tian Yinyin’s and Li Jiadong’s virtual currency accounts at VCE5 (Defendant
- Properties 67 and 70) had multiple connections. The accounts had significant transfers between
- each other and third party accounts.
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 21 of 38
- 63. Tian Yinyin linked a bank account at China Guangfa Bank (“CGB”) to his VCE5
- account less than a week after the intrusion and theft of The Exchange 1. This CGB account
- received approximately 491 deposits from VCE5 for 233,889,970 CYN (approximately
- $34,504,173.43) and represents proceeds from his money laundering activities.
- 64. The same CGB bank account was linked to Tian Yinyin’s VCE6 account
- (Defendant Property 62).
- 65. Tian Yinyin’s accounts at VCE5 (Defendant Property 70) and VCE6 (Defendant
- Property 62) had no deposits for approximately two months prior to the hack of The Exchange 1.
- 66. Tian Yinyin also had an account at VCE7 (Defendant Property 83, which included
- the deposit address identified as Defendant Property 84), a U.S.-based exchange, where he sold
- BTC in exchange for prepaid Apple iTunes gift cards, a known method of money laundering.
- 67. Tian Yinyin’s VCE7 advertisement stated that no ID was necessary for trades.
- 68. On multiple occasions, Tian Yinyin, using his account at VCE7 (Defendant
- Property 83), engaged in financial transactions to convert virtual currency to U.S. dollars with
- customers in the United States.
- 69. Li Jiadong laundered approximately 9.71443 BTC from his VCE5 (Defendant
- Property 70) and VCE6 (Defendant Property 62) accounts to Tian Yinyin’s account at VCE7
- (Defendant Property 83).
- 70. Tian Yinyin exchanged approximately $1,448,694.74 worth of BTC for iTunes gift
- cards via 8,823 transactions from his account at VCE7 (Defendant Property 83).
- 71. Li Jiadong’s advertisement on another virtual currency exchange (“VCE8”) noted
- that he was operating a professional business and gave his hours and payment information. Li
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 22 of 38
- Jiadong maintained multiple addresses on VCE8, consisting of Defendant Properties 71 through
- 80.
- 72. Li Jiadong linked bank accounts at nine Chinese banks—Agricultural Bank of
- China, China Everbright Bank, China CITIC Bank, CGB, China Minsheng Bank, Huaxia Bank,
- Industrial Bank, Pingan Bank, and Shanghai Pudong Development Bank—to his VCE5 account
- (Defendant Property 70). These bank accounts received approximately 2,000 deposits from VCE5
- for 229,282,960.97 CYN (approximately $32,848,567.00) and represent proceeds from his money
- laundering activities.
- 73. Tian Yinyin’s VCE6 account (Defendant Property 62) sent approximately 25 BTC
- (approximately $175,000) to Li Jiadong’s VCE5 account (Defendant Property 67).
- 74. Tian Yinyin and Li Jiadong exchanged approximately 2,165.39 BTC
- (approximately $15,529,934.00) and equivalent fiat currency between each other via VCE5.
- 75. The chart in Exhibit 2, below, depicts an overview of the laundering of funds from
- the hack of the Exchange 1.
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 23 of 38
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 24 of 38
- B. Laundering of Proceeds from the Hack of The Exchange 2 (Phase Two)
- 76. YINYIN’s accounts at VCE5 and VCE6 were also used to launder the proceeds of
- the hack of The Exchange 2, a South Korea-based virtual currency exchange. Due to the role these
- funds played in the larger money laundering activity, the activity surrounding this hack is referred
- to herein as “Phase Two,” though it occurred earlier in time than Phase One.
- 77. On or about December 19, 2017, The Exchange 2 announced through its website
- and various media outlets that it had been a victim of a hack and subsequent theft of approximately
- 17% of its total assets.
- 78. The Panel of Experts subsequently attributed this hack to North Korean actors.
- 79. At or about the same time of the hack of The Exchange 2, a single virtual currency
- address at The Exchange 2 routed funds to two addresses in a rapid series of transactions. One
- address received approximately 16 deposits of the same amount over a period of 15 minutes,
- totaling approximately $2.49 million; the second address received approximately 20 deposits
- totaling approximately $2.88 million. Later that same day, the originating virtual currency address
- at The Exchange 2 stopped making withdrawals, just as The Exchange 2 stated it was suspending
- trading.
- 80. Almost immediately following the initial withdrawal of the stolen funds from The
- Exchange 2, the funds were directed to an account at VCE1. At VCE1, the North Korean coconspirators converted the stolen virtual currency to BTC, withdrew the funds, engaged in multiple
- peel chains, and ultimately deposited said proceeds into Tian Yinyin’s accounts at VCE5 and
- VCE6, as demonstrated in Exhibit 3, below.
- 81. While the BTC was being laundered, a portion was sent to a cluster that had sent
- funds to two North Korean co-conspirator accounts, including Defendant Property 64.
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 25 of 38
- VI. Phase Three: The November 2019 Intrusion and Theft
- 82. On or about November 27, 2019, The Exchange 3, a South Korea-based virtual
- currency exchange, had approximately 342,000 ETH ($48.5 million) stolen from it.
- 83. Over the subsequent few days, the ETH began to umbrella outward via multiple
- peel chains in attempt to obfuscate the trail before being deposited into various virtual currency
- exchanges. Exhibit 4, below, illustrates an example of the flow of a portion of stolen ETH from
- The Exchange 3 into an account at another exchange (Defendant Property 82) via approximately
- 14 transactions approximately seven days later.
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 26 of 38
- The Exchange 3
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 27 of 38
- 84. Notably, as the ETH splintered from the main trail, portions often circled back and
- regrouped with the main trail. This reflects that the stolen funds were still controlled by the same
- North Korean co-conspirators.
- 85. Ultimately, as shown in Exhibit 4, approximately 5 ETH was deposited into an
- account at another virtual currency exchange (“VCE9”) (Defendant Property 113) on December
- 4, 2019. The KYC information for this account reflected a purported South Korean individual.
- 86. A portion of the deposited ETH was converted into BTC using VCE9’s over-thecounter trading platform. Less than two hours after the ETH was deposited, BTC was withdrawn
- to a cluster. The deposits to this cluster originated at various exchanges that received stolen ETH
- that was converted to BTC.
- 87. By converting ETH to BTC, the North Korean co-conspirators switched the stolen
- proceeds from the ETH blockchain to the BTC blockchain. One of the primary purposes of doing
- this was to obfuscate the trail of the funds.
- 88. Included below as Exhibit 5 is a diagram that illustrates approximately 18 different
- clusters, comprised of approximately 200 different BTC addresses (including Defendant
- Properties 1 through 34 and Defendant Property 91), that received 383.79970162 BTC
- ($2,781,754.23) from November 29, 2019 through January 4, 2020. Each of these clusters
- received BTC that was converted from ETH proceeds traced to the theft of The Exchange 3. To
- further connect these clusters and illustrate the common ownership, the diagram shows how
- accounts at various exchanges withdrew to multiple clusters listed and some of the clusters
- exchanged BTC amongst themselves.
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 28 of 38
- 89. From these 18 clusters, the subjects began to layer with peel chains and mix the
- BTC, in order to obfuscate the trail as they converted it to fiat currency. The peel chains from
- these clusters were connected to each other. Some of the accounts that received the stolen ETH
- still maintain a balance of stolen virtual currency and are held at various virtual currency
- exchanges, including VCE 4 (Defendant Properties 92-97), VCE10 (Defendant Properties 44-49),
- VCE11 (Defendant Properties 85-90), and VCE12 (Defendant Properties 53 and 54).
- VII. North Korean Attribution and Obfuscation in Phase Three
- 90. The North Korean co-conspirators’ campaign, which included the theft of funds
- from The Exchange and related money laundering, continued with the theft from The Exchange 3
- and related money laundering.
- 91. North Korean co-conspirators had targeted The Exchange 3 in May 2019, although
- this previously attempted theft failed. Specifically, emails originating from North Korea falsely
- gave the impression that The Exchange 3 was requesting information from its customers about a
- fictional sweepstakes payout.
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 29 of 38
- 92. As to the November 2019 theft, the North Korean co-conspirators continued to
- submit digitally altered KYC photos to virtual currency exchanges. This included by again using
- publically available photos for identification documents as well manipulating images to
- circumvent KYC checks.
- 93. The North Korean co-conspirators logged in from Pyongyang and used North
- Korean cell phone infrastructure to perpetrate this scheme.
- 94. The North Korean co-conspirators researched reporting related to the hack of The
- Exchange 3. In one instance, they researched a cyber security platform that was tracking the ETH
- stolen from The Exchange 3 to various exchanges and naming such exchanges. Additionally, the
- North Korean co-conspirators researched hacking tactics in Korean.
- VIII. Failure to Register as a Money Transmitting Business
- 95. As explained in detail above, Tian Yinyin and Li Jiadong engaged in over $100
- million in virtual currency transactions. Tian Yinyin and Li Jiadong’s primary source of virtual
- currency was proceeds of the hacks of virtual currency exchanges, including The Exchange 1 and
- The Exchange 2.
- 96. Tian Yinyin and Li Jiadong would convert such virtual currency into fiat currency
- and transfer it to customers, for a fee. Tian Yinyin and Li Jiadong’s business included customers
- and financial accounts within the United States.
- 97. Tian Yinyin and Li Jiadong failed to register with FinCEN as money transmitting
- businesses.
- 98. Tian Yinyin and Li Jiadong maintained the BTC addresses identified in the property
- to be forfeited, which represent a portion of the defendant properties, further identified as
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 30 of 38
- Defendant Properties 55-62, 65-80, and 83-84, and previously referenced within the substantive
- descriptions of their illegal activity above.
- FIRST CLAIM FOR RELIEF
- (18 U.S.C. § 981(A)(1)(A))
- 99. The United States incorporates by reference the allegations set forth in Paragraphs
- 1 to 98 above as if fully set forth herein.
- 100. The Defendant Properties were involved in, and traceable to, a conspiracy to violate
- and substantive violations of:
- a. Title 18, United States Code, Section 1956(a)(1)(A)(i), that is, by
- conducting financial transactions which in fact involved the proceeds of
- specified unlawful activity, to wit, violations of: section 1343 (relating to
- wire fraud) and section 1960 (relating to illegal money transmitters),
- knowing that the property involved in such financial transactions
- represented the proceeds of some form of unlawful activity, with the intent
- to promote the carrying on of said specified unlawful activity;
- b. Title 18, United States Code, Section 1956(a)(1)(B)(i), that is, by
- conducting financial transactions which in fact involved the proceeds of
- specified unlawful activity, to wit, violations of: section 1343 (relating to
- wire fraud) and section 1960 (relating to illegal money transmitters),
- knowing that the property involved in such financial transactions
- represented the proceeds of some form of unlawful activity, and knowing
- that the transactions were designed in whole or in part to conceal or disguise
- the nature, the location, the source, the ownership, or the control of the
- proceeds of said specified unlawful activity; and
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 31 of 38
- c. Title 18, United States Code, Section 1956(a)(2)(A), that is, by transporting,
- transmitting, and transferring, or attempting to transport, transmit, and
- transfer monetary instruments and funds from places outside of the United
- States to and through a place inside the United States, and from a place in
- the United States to or through a place outside the United States, with the
- intent to promote the carrying on of specified unlawful activity, to wit,
- violations of: section 1343 (relating to wire fraud) and section 1960 (relating
- to illegal money transmitters).
- 101. As such, the Defendant Properties are subject to forfeiture, pursuant to Title 18,
- United States Code, Section 981(a)(1)(A), as property involved in a transaction or attempted
- transaction in violation of 18 U.S.C. § 1956, or property traceable to such property.
- SECOND CLAIM FOR RELIEF
- (18 U.S.C. § 981(A)(1)(A))
- 102. The United States incorporates by reference the allegations set forth in Paragraphs
- 1 to 98 above as if fully set forth herein.
- 103. The Defendant Properties were involved in a scheme to operate an unlicensed
- money transmitting business.
- 104. As such, the Defendant Properties are subject to forfeiture, pursuant to Title 18,
- United States Code, Section 981(a)(1)(A), as property involved in a transaction or attempted
- transaction in violation of 18 U.S.C. § 1960, or property traceable to such property.
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 32 of 38
- PRAYER FOR RELIEF
- WHEREFORE, the United States of America prays that notice issue on the Defendant
- Properties as described above; that due notice be given to all parties to appear and show cause
- why the forfeiture should not be decreed; that a warrant of arrest in rem issue according to law;
- that judgment be entered declaring that the Defendant Properties be forfeited for disposition
- according to law; and that the United States of America be granted such other relief as this Court
- may deem just and proper, together with the costs and disbursements of this action.
- Dated: March 2, 2020
- Respectfully submitted,
- TIMOTHY J. SHEA
- United States Attorney
- By: /s/
- Zia M. Faruqui, D.C. Bar No. 494990
- Christopher B. Brown
- Assistant United States Attorneys
- 555 Fourth Street, N.W.
- Washington, D.C. 20530
- (202) 252-7117 (Faruqui)
- /s/
- C. ALDEN PELKER
- Trial Attorney
- Computer Crime & Intellectual Property Section
- 1301 New York Ave NW
- Washington, D.C. 20005
- (202) 514-1026
- Attorneys for the United States of America
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 33 of 38
- VERIFICATION
- I, Christopher Janczewski, a Special Agent with the Internal Revenue Service-Criminal
- Investigations CCU, declare under penalty of perjury, pursuant to 28 U.S.C. § 1746, that the
- foregoing amended Verified Complaint for Forfeiture In Rem is based upon reports and
- information known to me and/or furnished to me by other law enforcement representatives and
- that everything represented herein is true and correct.
- Executed on this 2nd day of March, 2020.
- /s/ _
- Special Agent Christopher Janczewski
- Internal Revenue Service-Criminal Investigations
- I, Thomas Tamsi, a Special Agent with the Homeland Security Investigations, declare
- under penalty of perjury, pursuant to 28 U.S.C. § 1746, that the foregoing amended Verified
- Complaint for Forfeiture In Rem is based upon reports and information known to me and/or
- furnished to me by other law enforcement representatives and that everything represented herein
- is true and correct.
- Executed on this 2nd day of March, 2020.
- /s/ _
- Special Agent Thomas Tamsi
- Homeland Security Investigations
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 34 of 38
- I, Christopher Wong, a Special Agent with the Federal Bureau of Investigation, declare
- under penalty of perjury, pursuant to 28 U.S.C. § 1746, that the foregoing amended Verified
- Complaint for Forfeiture In Rem is based upon reports and information known to me and/or
- furnished to me by other law enforcement representatives and that everything represented herein
- is true and correct.
- Executed on this 2nd day of March, 2020.
- /s/ _
- Special Agent Christopher Wong
- Federal Bureau of Investigation
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 35 of 38
- PROPERTY TO BE FORFEITED
- Funds associated with the following virtual currency addresses and accounts:
- 1 113vSKMWvuM8Weee2neMScXqdtXFLvy8z7
- 2 12DCmGuX87aCzxCDneyAxZdVWapuza9UyR
- 3 12JSAKyUMFMFp2ao5Rqt3s3X4xrQMXMzkr
- 4 12urwZAF7JvdhiQcYVbNG7VtKP3165pPnf
- 5 13Bcq6AcWusG3YKsYadBRNwnfezUrhRDER
- 6 13u7zCciSC7yGKfe8qqvQxK7BnGiwpdAbQ
- 7 14jP1TjTjrFBVFKUMcGaPjGRHaWAK6QVr7
- 8 14umE3q9knsWKZhjPgLQyv4rrCNjfXpAuF
- 9 16RWbMVHvERVUjrh28rRugmrgeDW1nweoo
- 10 17PSv7hd2cvSmgMTFw8CA3hjdYtGWuPh98
- 11 18LX9wjgjDbmRZXYhDLzZWCQ3pkUGB6gFf
- 12 19RfkmQPS3wBF5XhjcZwnbpMkd96GoituJ
- 13 19V5YCatY8sfdNuskawrGmbrZEohLkqV3d
- 14 1Ax8m2gy1Ta6vQTMStnWdCh71oMX7Z4nen
- 15 1Bht2x8Y8tJLpXxqK9LX4ehtLNk6kh3FLk
- 16 1C3K6yYxr1xomotxkEbMLAcm3jVKDSyFBd
- 17 1C4hPundX3pBSiNbhkLpuLp246Ggc8gmwx
- 18 1C5S12fBSmeVedaEAqQzFf29H9hUucojPA
- 19 1JCWsAC86pokjDrvQsRWoU2jm9qA9Wc4qh
- 20 1K2FgtrdGk767RoLf8dN8tr5XsVc5st6RZ
- 21 1L5mPKvfKzGY2J99HtpoefxqbpLDxyMAZq
- 22 1LcsVyCd6yEyibDQS2WcxzTBT1iJGAqLhS
- 23 1MVkopW6PPWZtSAtP4295B6KfH93YKToZU
- 24 1Nmd7KBc3P6RgYcZ5n8ftdbw7z4jEzUSVj
- 25 1NMpPj2zUSPodncvZGp7owP2nttAgyFuY3
- 26 17UwTn7cVxu5ivkBnkPo83Gjtowi8dx75Q
- 27 1A3uGGvHFBauSmjZvdZFF6gjc8VSjgF7UY
- 28 1Bm659Wu5xVppUNRh7jKNFMboTbDepgmbm
- 29 18atn6kuyKzhnsWK554Uj6j1PAv3sPmx2p
- 30 18YNDeHouezsyxcvntohev9kANrMXiGBxr
- 31 1CD483mLYrMJwZF5drZnoPKSBbFTMSVvGf
- 32 1P8y7bj28tsq76anvKLgmhbbnTc1ZGcUVa
- 33 1Pa32FPFQJ5VdozwmMGE1ANNWVGB3XQJie
- 34 15pPmUErhTb8CaWF5x8iQggX3zK1y99ZN1
- 35 1EFWRRLUM3jy2poCpY7ALq2m7PPakyvns1
- 36 37JN1EDYCGYVabtofvyKKLtpA6uU3UBMLo
- 37 39PAYsdx2zi7GUhV71cx1zpp1N8495t58f
- 38 3ACmZQBNZsDDDs3UGoC6DeKMKHTe9RW1yu
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 36 of 38
- 39 3AUHHS4NQjJRAMbjdkeTdLDv9ZFeA9n1o3
- 40 3GAwA7PvLiHKjcmN2nsrHEpN7Qt9jwMQ4h
- 41 3HoJydELfq2kyZk9M6yug6CLQmYCS7FrJj
- 42 3M23QTysjRsfmJz4aDdc9RpaXjVZmbWKEt
- 43 3Nis34RW9uGV5mbovNidNNsxRTWwwqb1PS
- 44 User ID 36020326 at VCE10
- 45 User ID 35802038 at VCE10
- 46 User ID 35977393 at VCE10
- 47 User ID 35978286 at VCE10
- 48 0x8bdd991a7b8e2fe1bfcb6b19ac3cf3e146cba415
- 49 User ID 38785599 at VCE10
- 50 1FKMe2Nyue2SDufB4RciiXsEEpAxtuBxD3
- 51 0xc4f9ee31626c8dee0ec02744732051e8b416e63e
- 52 User ID 9fdbd2ca-3994-411b-9ddb-f5318b63049d at VCE3
- 53 VCE12 internal transaction ID Fnc4bjm7ehwhdk6h4d
- 54 VCE12 internal transaction ID pd7e8fxxkuy2gfge7f
- 55 1EfMVkxQQuZfBdocpJu6RUsCJvenQWbQyE
- 56 Account 1000079600 at VCE6
- 57 134r8iHv69xdT6p5qVKTsHrcUEuBVZAYak
- 58 14kqryJUxM3a7aEi117KX9hoLUw592WsMR
- 59 15YK647qtoZQDzNrvY6HJL6QwXduLHfT28
- 60 1F2Gdug9ib9NQMhKMGGJczzMk5SuENoqrp
- 61 1PfwHNxUnkpfkK9MKjMqzR3Xq3KCtq9u17
- 62 Account 1000021204 at VCE6
- 63 0xA4b994F1bA984371ecCA18556Fe1531412D5C337
- 64 User k*****@****** at VCE1
- 65 17UVSMegvrzfobKC82dHXpZLtLcqzW9stF
- 66 19YVKCETP8yHX2m2VbEByVgWgJUAZd5tnS
- 67 User IDs 458281 & 4582819 at VCE5
- 68 1AXUTu9y3H8w4wYx4BjyFWgRhZKDhmcMrn
- 69 1Hn9ErTCPRP6j5UDBeuXPGuq5RtRjFJxJQ
- 70 User IDs 1473600 & 14736005 at VCE5
- 71 39eboeqYNFe2VoLC3mUGx4dh6GNhLB3D2q
- 72 39fhoB2DohisGBbHvvfmkdPdShT75CNHdX
- 73 3E6rY4dSCDW6y2bzJNwrjvTtdmMQjB6yeh
- 74 3EeR8FbcPbkcGj77D6ttneJxmsr3Nu7KGV
- 75 3HQRveQzPifZorZLDXHernc5zjoZax8U9f
- 76 3JXKQ81JzBqVbB8VHdV9Jtd7auWokkdPgY
- 77 3KHfXU24Bt3YD5Ef4J7uNp2buCuhrxfGen
- 78 3LbDu1rUXHNyiz4i8eb3KwkSSBMf7C583D
- 79 3MN8nYo1tt5hLxMwMbxDkXWd7Xu522hb9P
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 37 of 38
- 80 3N6WeZ6i34taX8Ditser6LKWBcXmt2XXL4
- 81 LLzTJFu3UcwXRrwaq2gLKnJaWWt3oGHVMK
- 82 0x01facd1477e6df9e27fe9f0a459aaa0769c9af82
- 83 User 881051 at VCE7
- 84 3F2sZ4jbhvDKQdGbHYPC6ZxFXEau2m5Lqj
- 85 0X7175D1FA4461676AB8831483770FF84483F26501
- 86 Account 14167009 at VCE 11
- 87 0X93D8EDBC42E547C571CE5AF95F70C291D706925C
- 88 Account 14166934 at VCE 11
- 89 0XB35DFF36FF3D686A63353FA01327F3FF4874CF21
- 90 Account 14166961 at VCE 11
- 91 BC1Q39HKR7TA25E65D7U0PM09L99JVFNY4LP3VAM4Q
- 92 0X81B34F7A426B31E77E875B8D00D830F8A5B044CB
- 93 User DavidniColinDC3 at VCE4
- 94 0XFC3D6AEE062C45B31E946BA49A7AA5ADDF1B53C6
- 95 User Ep4444 at VCE4
- 96 0XBD72F2CFB28ED38B7CEA94E26603983CE028C927
- 97 User Sma414 at VCE4
- 98 17KS1C6DxViF68YaSAhWUrnaCtxzbMq7CB
- 99 1MP62xKDtbL79wQ8f8LbAg9dPpUHFTEVbJ
- 100 1GsAS3z7eG4Vw2QbyVqnR7cRQmpeRsCpt1
- 101 1K7cMd9RgwhThXi6VDu3Roti2W4241MLfG
- 102 1FhsTJ7hQKvpFXPRFFjsFPHQT4pQMQpgw1
- 103 1FzKR8XDmdrTRYfMcZRf3NPvSgyrUoG8kq
- 104 1AsHQhhCYwgd71cxnHA9a8dWeEh22ivdqn
- 105 1DZdJNQsEutzud3YX28DFXfzKVyEfoN8t2
- 106 1K83LzD1QR2iUVtHckFMUzzdF3xUhtNdYb
- 107 1DX3zJV4djK9CgCP48Ym3LEryq5RVdhWH8
- 108 1EFNjtGnJ7WohXd8L17NGA4N5osKRj98QN
- 109 1EU4tNd1RbhDCfkiQrtj6nfzxeRxRA9rBm
- 110 17Wx3A1tmiTnxJ9FAq7em1n6SxtXSG4r5F
- 111 1QBbEUUhG7CRJzJrSEnUvwrycYZzKB8YEq
- 112 1K1fa3ydmpWMuX8gWHk5W6gnVFX7nGQJsu
- 113 0xC137c3135EB8E94aa303D52c607296Ba470E1a57
- Case 1:20-cv-00606 Document 1 Filed 03/02/20 Page 38 of 38
- CIVIL COVER SHEET
- JS-44 (Rev. 5/12 DC)
- I. (a) PLAINTIFFS
- (b) COUNTY OF RESIDENCE OF FIRST LISTED PLAINTIFF _____________________
- (EXCEPT IN U.S. PLAINTIFF CASES)
- DEFENDANTS
- COUNTY OF RESIDENCE OF FIRST LISTED DEFENDANT _____________________
- (IN U.S. PLAINTIFF CASES ONLY) NOTE: IN LAND CONDEMNATION CASES, USE THE LOCATION OF THE TRACT OF LAND INVOLVED
- (c) ATTORNEYS (FIRM NAME, ADDRESS, AND TELEPHONE NUMBER) ATTORNEYS (IF KNOWN)
- II. BASIS OF JURISDICTION
- (PLACE AN x IN ONE BOX ONLY)
- III. CITIZENSHIP OF PRINCIPAL PARTIES (PLACE AN x IN ONE BOX FOR
- PLAINTIFF AND ONE BOX FOR DEFENDANT) FOR DIVERSITY CASES ONLY!
- o 1 U.S. Government
- Plaintiff
- o 2 U.S. Government
- Defendant
- o 3 Federal Question
- (U.S. Government Not a Party)
- o 4 Diversity
- (Indicate Citizenship of
- Parties in item III)
- Citizen of this State
- Citizen of Another State
- Citizen or Subject of a
- Foreign Country
- PTF
- o 1
- o 2
- o 3
- DFT
- o 1
- o 2
- o 3
- Incorporated or Principal Place
- of Business in This State
- Incorporated and Principal
- Place of Business in This State
- Foreign Nation
- PTF
- o 4
- o 5
- o 6
- DFT
- o 4
- o 5
- o 6
- IV. CASE ASSIGNMENT AND NATURE OF SUIT
- (Place an X in one category, A-N, that best represents your Cause of Action and one in a corresponding Nature of Suit)
- o A. Antitrust
- 410 Antirust
- o B. Personal Injury/
- Malpractice
- 310 Airplane
- 315 Airplane Product Liability
- 320 Assault, Libel & Slander
- 330 Federal Employers Liability
- 340 Marine
- 345 Marine Product Liability
- 350 Motor Vehicle
- 355 Motor Vehicle Product Liability
- 360 Other Personal Injury
- 362 Medical Malpractice
- 365 Product Liability
- 367 Health Care/Pharmaceutical
- Personal Injury Product Liability
- 368 Asbestos Product Liability
- o C. Administrative Agency
- Review
- 151 Medicare Act
- Social Security
- 861 HIA (1395ff)
- 862 Black Lung (923)
- 863 DIWC/DIWW (405(g))
- 864 SSID Title XVI
- 865 RSI (405(g))
- Other Statutes
- 891 Agricultural Acts
- 893 Environmental Matters
- 890 Other Statutory Actions (If
- Administrative Agency is
- Involved)
- o D. Temporary Restraining
- Order/Preliminary
- Injunction
- Any nature of suit from any category
- may be selected for this category of case
- assignment.
- *(If Antitrust, then A governs)*
- o E. General Civil (Other) OR o F. Pro Se General Civil
- Real Property
- 210 Land Condemnation
- 220 Foreclosure
- 230 Rent, Lease & Ejectment
- 240 Torts to Land
- 245 Tort Product Liability
- 290 All Other Real Property
- Personal Property
- 370 Other Fraud
- 371 Truth in Lending
- 380 Other Personal Property
- Damage
- 385 Property Damage
- Product Liability
- Bankruptcy
- 422 Appeal 27 USC 158
- 423 Withdrawal 28 USC 157
- Prisoner Petitions
- 535 Death Penalty
- 540 Mandamus & Other
- 550 Civil Rights
- 555 Prison Conditions
- 560 Civil Detainee – Conditions
- of Confinement
- Property Rights
- 820 Copyrights
- 830 Patent
- 840 Trademark
- Federal Tax Suits
- 870 Taxes (US plaintiff or
- defendant)
- 871 IRS-Third Party 26 USC 7609
- Forfeiture/Penalty
- 625 Drug Related Seizure of
- Property 21 USC 881
- 690 Other
- Other Statutes
- 375 False Claims Act
- 400 State Reapportionment
- 430 Banks & Banking
- 450 Commerce/ICC
- Rates/etc.
- 460 Deportation
- 462 Naturalization
- Application
- 465 Other Immigration
- Actions
- 470 Racketeer Influenced
- & Corrupt Organization
- 480 Consumer Credit
- 490 Cable/Satellite TV
- 850 Securities/Commodities/
- Exchange
- 896 Arbitration
- 899 Administrative Procedure
- Act/Review or Appeal of
- Agency Decision
- 950 Constitutionality of State
- Statutes
- 890 Other Statutory Actions
- (if not administrative agency
- review or Privacy Act)
- United States of America 113 VIRTUAL CURRENCY ACCOUNTS
- Zia M. Faruqui, Assistant U.S. Attorney
- U.S. Attorney's Office for the District of Columbia
- 555 Fourth Street, N.W.
- Washington, D.C. 20530
- Unknown
- Case 1:20-cv-00606 Document 1-1 Filed 03/02/20 Page 1 of 2
- o G. Habeas Corpus/
- 2255
- 530 Habeas Corpus – General
- 510 Motion/Vacate Sentence
- 463 Habeas Corpus – Alien
- Detainee
- o H. Employment
- Discrimination
- 442 Civil Rights – Employment
- (criteria: race, gender/sex,
- national origin,
- discrimination, disability, age,
- religion, retaliation)
- *(If pro se, select this deck)*
- o I. FOIA/Privacy Act
- 895 Freedom of Information Act
- 890 Other Statutory Actions
- (if Privacy Act)
- *(If pro se, select this deck)*
- o J. Student Loan
- 152 Recovery of Defaulted
- Student Loan
- (excluding veterans)
- o K. Labor/ERISA
- (non-employment)
- 710 Fair Labor Standards Act
- 720 Labor/Mgmt. Relations
- 740 Labor Railway Act
- 751 Family and Medical
- Leave Act
- 790 Other Labor Litigation
- 791 Empl. Ret. Inc. Security Act
- o L. Other Civil Rights
- (non-employment)
- 441 Voting (if not Voting Rights
- Act)
- 443 Housing/Accommodations
- 440 Other Civil Rights
- 445 Americans w/Disabilities –
- Employment
- 446 Americans w/Disabilities –
- Other
- 448 Education
- o M. Contract
- 110 Insurance
- 120 Marine
- 130 Miller Act
- 140 Negotiable Instrument
- 150 Recovery of Overpayment
- & Enforcement of
- Judgment
- 153 Recovery of Overpayment
- of Veteran’s Benefits
- 160 Stockholder’s Suits
- 190 Other Contracts
- 195 Contract Product Liability
- 196 Franchise
- o N. Three-Judge
- Court
- 441 Civil Rights – Voting
- (if Voting Rights Act)
- V. ORIGIN
- o 1 Original
- Proceeding
- o 2 Remand
- from State
- Court
- o 3 Remanded from
- Appellate Court
- o4 Reinstated or
- Reopened
- o 5 Transferred from
- another district
- (specify)
- o 6 Multi-district
- Litigation
- o7 Appeal to
- District Judge
- from Mag. Judge
- VI. CAUSE OF ACTION (CITE THE U.S. CIVIL STATUTE UNDER WHICH YOU ARE FILING AND WRITE A BRIEF STATEMENT OF CAUSE.)
- VII. REQUESTED IN
- COMPLAINT
- CHECK IF THIS IS A CLASS
- ACTION UNDER F.R.C.P. 23
- DEMAND $
- JURY DEMAND:
- Check YES only if demanded in complaint
- YES NO
- VIII. RELATED CASE(S)
- IF ANY
- (See instruction) YES NO If yes, please complete related case form
- DATE: _________________________ SIGNATURE OF ATTORNEY OF RECORD _________________________________________________________
- INSTRUCTIONS FOR COMPLETING CIVIL COVER SHEET JS-44
- Authority for Civil Cover Sheet
- The JS-44 civil cover sheet and the information contained herein neither replaces nor supplements the filings and services of pleadings or other papers as required
- by law, except as provided by local rules of court. This form, approved by the Judicial Conference of the United States in September 1974, is required for the use of the
- Clerk of Court for the purpose of initiating the civil docket sheet. Consequently, a civil cover sheet is submitted to the Clerk of Court for each civil complaint filed.
- Listed below are tips for completing the civil cover sheet. These tips coincide with the Roman Numerals on the cover sheet.
- I. COUNTY OF RESIDENCE OF FIRST LISTED PLAINTIFF/DEFENDANT (b) County of residence: Use 11001 to indicate plaintiff if resident
- of Washington, DC, 88888 if plaintiff is resident of United States but not Washington, DC, and 99999 if plaintiff is outside the United States.
- III. CITIZENSHIP OF PRINCIPAL PARTIES: This section is completed only if diversity of citizenship was selected as the Basis of Jurisdiction
- under Section II.
- IV. CASE ASSIGNMENT AND NATURE OF SUIT: The assignment of a judge to your case will depend on the category you select that best
- represents the primary cause of action found in your complaint. You may select only one category. You must also select one corresponding
- nature of suit found under the category of the case.
- VI. CAUSE OF ACTION: Cite the U.S. Civil Statute under which you are filing and write a brief statement of the primary cause.
- VIII. RELATED CASE(S), IF ANY: If you indicated that there is a related case, you must complete a related case form, which may be obtained from
- the Clerk’s Office.
- Because of the need for accurate and complete information, you should endure the accuracy of the information provided prior to signing the form.
- /s/Zia M. Faruqui
- 18 U.S.C. § 554(a), 18 U.S. C. § 981(a)(1)(C), and 18 U.S.C. § 1956 - money laundering and export control violations
- ✘
- ✘
- 03/02/2020
- Case 1:20-cv-00606 Document 1-1 Filed 03/02/20 Page 2 of 2
- CLERK=S OFFICE CO-932
- UNITED STATES DISTRICT COURT Rev. 4/96
- FOR THE DISTRICT OF COLUMBIA
- NOTICE OF DESIGNATION OF RELATED CIVIL CASES PENDING
- IN THIS OR ANY OTHER UNITED STATES COURT
- Civil Action No. 20-CV-606
- (To be supplied by the Clerk)
- NOTICE TO PARTIES:
- Pursuant to Rule 40.5(b)(2), you are required to prepare and submit this form at the time of filing any civil action which is
- related to any pending cases or which involves the same parties and relates to the same subject matter of any dismissed related cases.
- This form must be prepared in sufficient quantity to provide one copy for the Clerk=s records, one copy for the Judge to whom the
- cases is assigned and one copy for each defendant, so that you must prepare 3 copies for a one defendant case, 4 copies for a two
- defendant case, etc.
- NOTICE TO DEFENDANT:
- Rule 40.5(b)(2) of this Court requires that you serve upon the plaintiff and file with your first responsive pleading or motion
- any objection you have to the related case designation.
- NOTICE TO ALL COUNSEL
- Rule 40.5(b)(3) of this Court requires that as soon as an attorney for a party becomes aware of the existence of a related case
- or cases, such attorney shall immediately notify, in writing, the Judges on whose calendars the cases appear and shall serve such notice
- on counsel for all other parties.
- _______________
- The plaintiff , defendant or counsel must complete the following:
- I. RELATIONSHIP OF NEW CASE TO PENDING RELATED CASE(S).
- A new case is deemed related to a case pending in this or another U.S. Court if the new case: [Check appropriate box(e=s)
- below.]
- (a) relates to common property
- (b) involves common issues of fact
- (c) grows out of the same event or transaction
- (d) involves the validity or infringement of the same patent
- (e) is filed by the same pro se litigant
- 2. RELATIONSHIP OF NEW CASE TO DISMISSED RELATED CASE(ES)
- A new case is deemed related to a case dismissed, with or without prejudice, in this or any other U.S. Court, if the new case
- involves the same parties and same subject matter.
- Check box if new case is related to a dismissed case:
- 3. NAME THE UNITED STATES COURT IN WHICH THE RELATED CASE IS FILED (IF OTHER THAN THIS
- COURT):
- 4. CAPTION AND CASE NUMBER OF RELATED CASE(E=S). IF MORE ROOM IS NEED PLEASE USE OTHER SIDE.
- v. C.A. No.
- DATE Signature of Plaintiff /Defendant (or counsel)
- /s/Zia M. Faruqui/AUSA
- Case 1:20-cv-00606 Document 1-2 Filed 03/02/20 Page 1 of 1
Advertisement
Add Comment
Please, Sign In to add comment