Tumgik
#Billion Dollar Bank Heist
theghostwhotumbles · 1 year
Text
How to stop being poor
Requirements: Computer skills, willingness to take risks. “I’ve been poor my whole life. So were my parents, their parents before them. It’s like a disease passing from generation to generation.” — Chris Pine as Toby Howard in ‘Hell or High Water.’  “The only crime is getting caught. In a world of thieves, the final sin is stupidity.” — Hunter S. Thompson. In February 2016, a hacker sent…
Tumblr media
View On WordPress
0 notes
half-oz-eddie · 7 months
Text
I am so utterly obsessed with rag-tag team heist movies so I made a Stranger things heist crew AU roster
Tumblr media
Steve "Moneybags" Harrington's heist crew used to be a team of 2, the other being Dustin "Phisher" Henderson. Steve was the only person Claudia Henderson trusted to look after her son, and as Dustin grew older, the two of them became close friends.
Steve watched Dustin hack into all sorts of databases, uncover the truth behind town conspiracies and even hack a few of his bullies.
When Mr. harrington cut Steve off financially, he wanted to get back at him, and pull a "prank" with Dustin to empty out an offshore bank account that his father kept hidden from Mrs. Harrington.
The plan went smoothly. A little too smoothly, maybe. Or perhaps Dustin was a natural at this, that's what Steve believed. And since it was that easy for Steve and Dustin to get their hands on $1.5 Million, they decided to take their pranks to another level.
Steve proposed for their next prank, they should clean out one of Mr. Harrington's friends' cryptocurrency. He explains to Dustin how the asshole keeps his assets on a physical drive in his house that they could wipe while he was away on vacation.
Dustin agrees and suggests they bring Eddie "Safecrack" Munson into the fold. He tells Steve Eddie's trustworthy and knows how to pick locks and hotwire cars, y'know, just in case.
Eddie, of course, is thrilled by the idea. Not only does he love a little mischief, he'd love to get his hands on some money and a fast car. "However," Eddie told them "we'll need someone to drive one of those fancy cars outta there. We may be good drivers...but we're not that good. But not to worry, I know a guy."
The guy in question? Billy "Wheels" Hargrove. A California bad boy who knows plenty about fast cars and fast cash, so he's in without question. He also doesn't mind hassling pretty boy Harrington. (there's so much sexual tension between them. Billy's the one who gave Steve his code name. He said 'the hair' didn't quite fit.). But Billy's not doing anything unless his stepsister, Max "Sticky Fingers" Mayfield can come in and swipe whatever isn't nailed down for a cut.
They used to have a complicated relationship, but they bonded by shoplifting whatever Billy's dad wouldn't let them have. Max was a skilled thief. She could get out of any store with anything that she wanted, and Billy would drive away like a bat outta hell. She lifted consoles, games and even a little lipgloss, for Billy.
So their first heist goes without a hitch, and after wiping millions in crypto off some hard drives, swiping some expensive paintings and a 2020 Mclaren, they can't resist the urge to plan bigger heists together.
Billy suggests they call up his coworker Heather "Chameleon" Holloway. "She's got more wigs than personalities" He joked. When they brought Heather onto the team, she showed them her massive walk in closet, full of clothes, wigs, shoes and more. Not to mention, she could use her charm and distract anyone. Heather was bored at home, spending time perfecting her hair and makeup skills. She could change her appearance to look like a completely different person. It was all the fun she had. Her mom was always wine drunk, and her dad was a jerk who ignored her because he wanted a son, so she was happy to be part of a team that didn't treat her like she was invisible.
Under normal circumstances, they'd never spend time together, but now? They're an inseperable friend group.
They've made some friends (and enemies) in their line of work, but everyday is an adventure.
They recently took on a half a billion dollar heist job for a mysterious man by the name of Henry Creel, unaware of the dangers that lie ahead...
Tagging some people: @shieldofiron @adelacreations @dragonflylady77 @harringroveera @bigdumbbambieyes
Because I love your writing and I'd love to hear how y'all would include some other characters/ships in the mix. I just love heist AUs so much~
138 notes · View notes
redphienix · 3 months
Text
I don't really understand why the already extremely niche genre of heisting games is currently being front run by "futuristic" heists when the entire idea runs counter to the appeal of heisting.
Heisting games at their core are about big well thought out hits on banks and mcguffins in worlds where it "Makes sense" for that to be possible. It's about STEALING **THINGS**.
I mean. Most heists are based on movie heists which are almost all based in the 80s and 90s because those are periods of time in which Super Mega Finger Print Eye Scan Bio Lock safety measures don't exist, and 99.99% of assets are PHYSICAL- as in, cash, or jewelry, or drugs- physical things you can hold in your hand-something for you to STEAL that would be irreplaceable if stolen.
The shift payday 3 and the upcoming den of wolves or whatever seem to be so focused on- of "Modernizing" heisting, or in den's case future-izing, doesn't make sense.
Today everything is digital, it's all credit cards and fake assets that a bank says exist.
You CAN steal in this environment, but let's be honest, it's lame.
Modern "heist level" theft is just corps scamming poor people or companies stealing hours.
You have to apply a layer of fiction that makes it fail the "makes sense" aspect of a hit by saying "Oh, this CRYPTO WALLET is worth TEN BILLION and we'll be able to sell it EASILY" I don't care. Where's the cash. Where's the Thing I'm stealing. I know crypto idiots get scammed all the time, but where's the physical item I grab and it's money, I'm phishing a password, where's the fun thing I'm taking.
I go in and plug a usb in or steal a hard drive and then get told it was a major super big successful heist- who cares, where's the Thing I stole.
We live in a time of so many safeties put around assets, so much value being digitized- so as a dev you have to justify why stealing something can even be done when it's just numbers in a database we have no access to, and then the justification often falls apart because if we have access... then take it all? How is our ownership being respected when we make such a hit when we stole /nothing/?
We went from stealing millions of dollars worth of gold to stealing the credit card info of everyone with a PSN account and I'm supposed to say both of these scenarios are equally fun in a heisting game.
So you end up with scifi concepts like cracking bio-locks to steal an SSD that is somehow not backed up anywhere and has the sole copy stored in a physical safe at a warehouse because?????
And then with dens, we're getting into scifi brainhack level territory and the objects we steal are being further obfuscated from reality- LET ME STEAL THINGS.
MAKE THE FUCKING GAME IN A PERIOD OF TIME WHERE THINGS EXIST THAT CAN BE STOLEN.
IT'S A HEISTING GAME, I WANT TO STEAL **THINGS** NOT *IDEAS* AND *BIZARRELY ONE OF A KIND UNBACKED UP CODE* AND WHATEVER ELSE NUMBER-IN-COMPUTER NONSENSE.
Sigh.
I hope den is good. GTFO was fun.
20 notes · View notes
Note
Yesterday was a big win for Remnant's king and queen of crime, Roman Torchwick and Neopolitan. They managed to rob the biggest bank in Mistral and got away with billions of dollars without even being noticed and back in Vale in hours. To celebrate this score the two lovers decided to give the little perverted fans of their side hustle, their porn channel known as The Ice-Cream Parlor, a treat. A 24 hour stream of non-stop, lewd entertainment for free.
Neopolitan smiled devilishly at the stream chat, their fans practically begging for the show to begin. Neo was ready to go but some people take longer. She groaned, irritated and walked into the other room to see what was taking him so long, snapping her fingers to get Roman's attention.
Tumblr media
Roman sighed as he closed his scroll, grinning inwardly as he stripped himself of his jacket and shirt. He'd just wrapped up a call to the info broker that got them the information they needed to pull off the heist so flawlessly, promising them their cut by week's end. Now, though, the debonair con artist and gentleman villain had other, far more important things on his mind.
Roman heard the snap of his lover's fingers, grinning inwardly as he pretended not to hear her and kept undressing, leaving only his slacks remaining before he turned around to face her. His winning smile only grew as he saw what Neo was wearing.
"Amazing, Neo. Did you chose this for me, or was this just for the naughty little boys and girls that watch our fun?"
209 notes · View notes
unichrome · 1 year
Text
The biggest heist that almost was
Let me tell you about the most insane bank heist that is going to sound like I'm just leaking the script for the next American hacking movie. The goal? Steal one billion USD. And it all began with an email and a printer, which as we all know is where problems usually start. Another weapon in this heist was... Weekends and time zones.
As usual, no prior computer science education needed.
What happened?
On the morning of February 5th 2016, a printer had stopped working in the central bank of Bangladesh (Bangladesh Bank). But it wasn't just any printer, it was the printer responsible for printing all the records of the multimillion transfers going in and out of the bank. When the poor employees finally won the printer battle and had it resume normal operation, they saw a very concerning account transfer in the records that was coming out. The bank had an USD account in the USA, at Federal Reserve Bank, with approximately 1 billlion Dollars in it, and the Federal Reserve Bank had received instructions to drain almost the entire amount. In the records that came out in the printer, the American bank had attempted to urgently message the Bangladesh bank regarding this transfer, but couldn't get through to them. This was because the hack had actually started the day before, Thursday 4th, at around 20:00 Bangladesh time, when the bank was closed. However, USA had just started their day, giving the American bank plenty of time to follow through with the instructions from the Bangladesh bank to drain their entire account while they were closed. And that wasn't the end of it, as weekends are from Friday to Saturday in Bangladesh, meaning that the Bangladesh bank headquarters in Dhaka wouldn't discover this withdrawal until Sunday morning. That's when they immediately tried to reach the American bank, which of course didn't work as over there it was Saturday evening, and the American weekend is from Saturday to Sunday, meaning that they wouldn't be reachable until Monday.
You see what I mean by the hackers using time zones and weekends, finding the perfect time for the American bank to execute their orders while Bangladesh discovers the withdrawal several days too late, and again several days too late for Americans to be reachable. But it didn't stop there with their timehacking.
The money had to go somewhere from the American bank, and it would be stupid to send it directly to the hackers own account without laundering the money first. So they had set up four different bank accounts in the Philippines, using fake names and credentials. Why the Philippines? Because the Lunar new year was on Monday the 8th, which is a holiday and holiday means no bank activities in either Bangladesh or the Philippines, buying the hackers even more time. As a final act, they messed with the printer responsible for printing transaction records, adding another few hours to their schedule. Moon and stars really aligned perfectly for this plan.
But how did they do it?
It all began one year prior, in January 2015, with an email sent to several employees at the Bangladesh Bank. The email seemingly contained a job application from a person who didn't actually exist, but who was very polite in his request for a position at the bank, with a link to his CV and cover letter. Naturally this link led to a document with a little surprise gift - malware. Since the heist happened, at least one of the recipients must have clicked the link, and successfully deployed a RAT - Remote Access Trojan, malware that lets you control a computer from the comfort of your own home, as well as a toolkit with various malware to move from computer to computer, avoiding discovery, and covering their tracks.
From there, the hackers slowly made their way through the bank offices network, one step at a time to avoid setting off alarms, looking for any computer that had control of the banks SWIFT setup. SWIFT lets banks transfer large amounts of money between themselves and other banks connected to SWIFT. And as soon as they found one of those computers, they stopped. They didn't need to hack SWIFT in the traditional sense of the word - since they operated in a bank computer, the SWIFT-software assumed they naturally had to be bank employees. However, one of the parts of the malware used in the heist was for manipulating the SWIFT system, as the hackers weren't physically there to press anything. Additionally, since they were laying dormant for the time to strike, they needed to keep an eye out for SWIFT updates that could detect any tampering with the system, and adapt accordingly.
Then they waited many months for the stars to align on February 4th, 2016.
There were 35 transfers made by the hackers from the American bank account, totaling almost 1 billion USD, but there were two of these tiny little seemingly insignificant details that prevented this from becoming the worlds largest bank heist in history. The hackers biggest enemy became this concept known as “words”.
The Philippine bank accounts were all located in the same RCBC Bank office on Jupiter Street in Manila. And this would be the hackers downfall, as USA had sanctions put on an Iranian cargo ship called Jupiter. Since the transactions went to a recipient that contained the word “Jupiter”, it created a security alert in the Federal Reserve Bank that the employees needed to investigate. When they saw what was going on, they managed to stop all but five of the initial 35 transactions, thus “only” roughly 100 million USD made it to the Philippines. The Bangladesh bank requested to reverse the transactions, but since the money was in the Philippines, they would need bureaucracy in form of a court order to reclaim the money, and we all know that's not a 5 minute project. It was when Bangladesh filed the court order in late February that the case became public (since court orders are public documents) and the news broke to the country.
Once in the RCBC bank accounts, the money arrived on Friday the 5th and was immediately moved again. First the 100 million was converted to local currency, and some of it was withdrawn in cash, while the rest was sent off to other hacker-controlled locations. And this is where the second tiny little detail cut off even more of the hackers precious payday. 20 million USD had been sent to Shalika Foundation, a charity organisation in Sri Lanka. But,  once again the hackers worst enemy - words - decided to strike again. A typo was made in their transaction, sending the money to “Shalika Fundation”, and a bank employee who must have had their morning coffee spotted this typo and rejected the transfer and kept the funds frozen. This left the hackers with 80 million USD.
✨Now comes the money laundering!✨
There was a second reason for choosing the Philippines as deposit zone; gambling is legal and the casinos had no money laundering regulations imposed. The accomplices of the heist booked private rooms in two casinos located in Manila - Solaire and Midas - and proceeded to purchase tokens to gamble for with the stolen money. Since they played with a room consisting of their fellow accomplices, winning was not really much of a challenge. Then the tokens could be exchanged back to money that would now be clean. To avoid suspicion, they didn't gamble all of the money at once, but over the course of several weeks gambled away the dirty money to clean money.
Who was behind it?
It's normally difficult to pinpoint where the more sophisticated hacking groups come from. Oftentimes, they will leave false clues behind that points to another group so they will face more trouble instead of the group that did it. They may even place clues from several different groups, just to mess with the analysts. It's also quite common to simply “steal” a way of working from another group, or use a leaked/stolen tool from another group (criminals aren't safe from other criminals, especially not in this business) - there are new malware coming out all the time with code that is just a slight modification of a well-known malware actor that had their source code leaked or simply had hired the same programmer. Or they may leave no clues as to who was behind it. Attribution to the guilty part is usually the single most difficult mission in IT-security - often it's just pure guesswork with little to no solid evidence to back it up, if you're lucky there's circumstantial evidence.
This case was no different. The first clue came from the IP the bad guys used to connect to the Bangladesh bank from. It was located in Pyongyang, North Korea. But, as I mentioned, this is not a conclusive verdict, as the IP may simply be planted false evidence to throw the analysts off their track. After the heist, the hackers used a data-wiper to scrub as much of their malware off the bank systems, but they didn't succeed in deleting all of it, some of the tools were still present, including the wiper.
Due to the scale of this operation, it caught the attention of every single IT-security person and IT-security company worldwide, who all of course wanted to know who and how they did it. With the remaining malware, a joint effort was made, comparing malware code to other malware code for similarities. Some was found in Poland, after an analyst noted the similarities from another suspected North Korean hack. Some was found in another infamous North Korean hack targeting Sony Pictures. More and more signs pointed towards the same actor. Some were false leads, the hackers seemed to be wanting to implicate the Russians did it, but failed quite miserably at that, just sprinkling random Russian words into the malware and making it way too obvious it was a ruse.
You may not believe this, but the North Korean government has one of the most notorious hacking groups in the world, known as the Lazarus Group. Some of its more well-known adventures include an extremely data-destructive hack of Sony Pictures (as punishment for releasing “The Interview”), creation of the ransomware WannaCry which was used against many targets worldwide (including hospitals), and various attempts at gathering information from governments and government-affiliated corporations all over the world. And, of course, this heist.
Eventually, after months of collaboration all over the world, the final verdict fell on North Korea, and specifically one of their programmers. His name is Park Jin Hyok, and worked for Chosun Expo - a front company for the North Korean government, located in Dalian (China) who used the funds of the fake corporation gained from legitimate programming jobs from customers worldwide to create the malware and plan the heist with all of its expenses. Of course he wasn't the sole person involved in this project, but it's the only person we know was in it.
This particular heist had been meticulously planned for several years, and Park Jin Hyok had moved to Dalian, set up fake IDs and built a network of contacts there to avoid suspicion. However, he didn't manage to delete all of his online footprints, and became the number one suspect when his internet activities suddenly came from Pyongyang, North Korea.
Additionally, several Chinese business men - many associated with the casino industry in China's Macau territory - were also charged and arrested for assisting with setting up the gambling rooms and coordinating the money laundering process. One unknown Chinese business man managed to get away with 31 million USD of the 80 million that remained after the heist, and as you would expect, he was never to be seen again.
With the middlemen from China paid off, not much remained of the original 1 billion to North Korea. But the heist has fascinated the whole IT-security world nonetheless.
I remember when the news of this case dropped to the IT-security world, who all wanted to take part in the hunt. It was a very fun time, we were all sitting at the edge of our seats waiting for the next update. I hope it was at least somewhat exciting for you too to read about, and thank you for reading this long post! If you liked it, please consider reblogging as it motivates me to write more. You may also like malware stuff I've written about before, such as Stuxnet or just plain evil malware that is a threat to our daily lives.
As always my inbox is open if you have any questions.
79 notes · View notes
unproduciblesmackdown · 11 months
Text
forgot i had the thought like if anyone's leaving b/c they're so totally to nice for this business why isn't it ben (ft. tuk as a duo) the person who's always been [hey this guy doesn't fit in here! he's too nice!!] thee most, as well as actually committed the whole time to Not bullying anyone around him
if ben & tuk had just left / stayed away then (a) maybe they were so loath to possibly have an episode without ben kim, speaking of the [s1 shit] priority put on the overall season. but it's a sacrifice that could be considered for the tradeoff of "why not give that [walking away b/c you just can't accept being So Mean]" which would of course also feel much more relevant for ben being told like "yeah you'd have to do what i did to step on tuk specifically, for example" versus rian who was just turning her own [is herself actually among the Constant Workplace Bullies] on tuk 4 min prior. and (b) then i guess we could have rian just standing there in the end too like oh right who are you again? and that also would've made it all the clearer like oops she's just become a generic employee who Could blend in with victor and dollar bill b/c she's just Another bully with Another slight variation in her style of being so, but that's a matter of like: yeah you made this bed now lie in it. she stopped having a chance to be a funny little guy of a tertiary rank & file character b/c she started to be an inconsistent plot device instead, & was never given the prominence to at least truly drive plots instead of staying that [plot device who just veers off in whatever direction another, truly prominent character's plot needs] like yeah you should've picked one for this character, or if not, had her leave at the end of s5. and if not, had her leave at the end of s6. and if not, well, here we are dealing with billions having to insist she's had an arc, as well as that she hasn't Already just been yet another employee with the bullying spirit completely suited to just stick around here forever
meanwhile billions seemed to focus not on "the thing about ben, & tuk, isn't that they don't fit in b/c way too much they're among the people who try not to be awful to everyone else whenever they feel like it" but instead focused on "the thing about ben & tuk is that [sound of luke bradford crashing their fake married bank heist moment] people think they're PUSSIES!!!!!!!!!!"
2 notes · View notes
mariacallous · 1 year
Text
A mention of North Korean hackers typically conjures images of either crippling cyberattacks or, more often, massive cryptocurrency heists. But a new report on the authoritarian state’s capabilities and tendencies paints a different picture.
The report, prepared by cyber-intelligence firm Recorded Future and shared exclusively with Foreign Policy, labels espionage as the predominant motive of North Korea’s cyberprogram. Recorded Future analyzed 273 cyberattacks over a 14-year period linked to North Korean state-sponsored groups and found that information collection was the primary motivation for more than 70 percent of them.
“The narrative seems to be that North Korea is a bunch of cybercriminals that are backed by a state, but they’re just pulling off all of this financially motivated cybercrime, and that is one aspect of their strategy,” said Mitch Haszard, a senior threat intelligence analyst at Recorded Future and lead author of the report.
“But what this report shows is that they’re still heavily focused on information collection, or cyber-espionage, and they conduct more of those operations than they do financially motivated or financial theft operations.”
Pyongyang predominantly seeks to use cyber-operations to either “gain insight into how its adversaries think” or “access to information on technologies” that will help it in a conflict with those adversaries, the report said. Government entities are the most frequent targets, followed by cryptocurrency, media, finance, defense, and nongovernmental organizations.
“North Korea’s leadership appears to be much more interested in learning about what others think of them, gathering information that can help them develop nuclear and ballistic missile technology, and stealing money to fund their regime,” the report added.
However, North Korea’s obsession with cryptocurrency is unique, and the country’s cyber-operations are one of its biggest avenues to prop up its nuclear arsenal. Anne Neuberger, the White House’s cyber czar, said at an event in Washington last month that half of the regime’s missile program is funded by cryptocurrency and cyberheists.
“There aren’t really any other states or countries that are trying to steal cryptocurrency, so North Korea is unique in that perspective, but they still do a lot of things that other states do,” Haszard said.
The heists tend to make headlines, with North Korean hackers linked to thefts worth billions of dollars from cryptocurrency exchanges around the world in recent years, with two high-profile attacks on exchanges in Estonia and California so far this year. Beyond crypto, North Korea has been linked to larger and more disruptive global attacks, starting with the crippling of Sony Pictures just under a decade ago that put its cybercapabilities on the map. That was followed by a hack of Bangladesh’s central bank that compromised the global financial transfer system known as Swift, and a crippling of the United Kingdom’s National Health Service.
However, Haszard and his colleagues found that the vast majority of North Korea’s cyberactivity goes after targets much closer to home. Nearly 80 percent of the attacks for which geographic information is available took place in Asia, according to the report. Most of that is in its immediate neighborhood: South Korea accounted for just over 65 percent of the targets among the 29 countries where attacks took place. The United States is a distant second, at 8.5 percent, and no other country accounted for more than 3 percent of North Korean attacks.
Recorded Future found that Lazarus, the most notorious and high-profile hacking group linked to the authoritarian regime, tends to go after more global targets but is not the most common perpetrator of cyberattacks. That distinction belongs to a group called Kimsuky, which mainly targets Asian government and civil society entities and accounted for more than one-third of total attacks. According to multiple U.S. law enforcement agencies, Kimsuky hackers pose as South Korean journalists, exchanging emails with their targets on the pretext of setting up interviews before sending them a link or document embedded with malware. That malware, known as BabyShark, gives hackers access to the victims’ device and communications. “Kimsuky actors have also been known to configure a victim’s email account to quietly auto-forward all emails to another actor-controlled email,” a joint cybersecurity advisory by the FBI, National Security Agency, and South Korean authorities earlier this month said.
While Pyongyang has established its ability to disrupt critical infrastructure in the West and conduct ransomware attacks, it is increasingly less likely to conduct those types of attacks compared to other cyber-capable adversaries such as Russia and China. It prefers to go smaller, faster, and more frequently, deploying more basic techniques such as stealing passwords or phishing emails, which infect systems with viruses by fooling users into clicking on dodgy links.
“The thing that I see in my tracking of North Korean threat actors is an incredible amount of activity that is generally low-sophistication in nature,” Haszard said, adding that that’s likely a matter of strategy rather than ability. “They’re achieving a lot of success doing the kind of lowest-common-denominator cyberattacks. So if it were me, why would I change?”
3 notes · View notes
newspress24-blog · 2 years
Text
The Cashier in Dubai
Investigative report tracks tangled route for money flowing to offshore companies from Moldova.
Part One
Moldovan oligarch Vladimir Plahotniuc left his home country in 2019 to avoid corruption charges. But an investigation into his business affairs, supported by newspress24-blog, shows that money continued to flow into his pockets long after he fled.
Black Box Plus, the investigative show of Moldova’s independent Tv channel TV8, acquired documents showing that Plahotniuc profited from every document Moldova’s Public Services Agency (ASP) issued between 2014-2019. Black Box TV followed the traces left by the businessman Alexandru Vilcu and Vladimir Andronachi, a former lawmaker with the Democratic Party (PD).
Documents show that the money reached Plahotniuc via Garsų Pasaulis, the Lithuanian printing house that won the public procurements for supplying blank cards the ASP uses to issue Moldovan documents, including passports. The financial circuit leads to a network of offshore companies registered in Cyprus, Hong Kong and the United Arab Emirates (UAE).
In the summer of 2020, the scheme Plahotniuc built over the years was taken over by two Bulgaria-registered companies that appeared overnight.
These companies were the identical financial offshore vehicles through which Plahotniuc, former leader of the PD, raised alleged dividends from the auctions organised by the state telecom company Moldtelecom, the purchase of electricity from the breakaway region of Transnistria, the public-private partnership for hemodialysis services and the so–called heist of one billion US dollars from the Moldovan banking system.
The Lithuanian UAB (an acronym of uždaroji akcine bendrove, or private limited company) started supplying blank cards for Moldovan passports following tenders in 2014 and 2017. The main beneficiary of the Garsu Pasaulis company is Albert Mario Karaziwan, a Belgian citizen who owns Semlex Europe, an identification document and biometric device production company whose business practices have come under scrutiny. The Syrian-Belgium businessman has been targeted in several countries in criminal corruption cases and journalistic investigations by Reuters and OCCRP.
In 2014, Moldova’s minister of information and communications technology was Plahotniuc’s fellow party member Pavel Filip. The CRIS Registru state enterprise which in 2017 was re-organised as ASP, was headed by Sergey Railean, godfather of Filip's older son.
Between 2014 and 2021, ASP transferred 59.5 million euros to the Garsu Pasaulis company "for raw material, blank cards and personalisation services," according to documents obtained by Black Box.
ASP also paid the Lithuanian company a royalty fee for software developed for Moldova and used on three types of documents. For example, the royalty fee for each passport issued was 13.61 euros (14.49 US dollars). On October 22, 2021, prosecutors opened a criminal case against nine people from the Public Services Agency “targeted in a criminal case of abuse of office”. Prosecutors estimated that the state lost around 41 million euros (43.6 million dollars) in the case.
A LONG AND TANGLED PATH
A note from the Moldovan service for the Prevention and Combating of Money Laundering obtained by Black Box shows that more than 24 million euros (25.54 million dollars) did not stop in the company's accounts in Vilnius but ended up in Cyprus and the UAE.
“Of the 135 payments made throughout this period [2014-2019], I can tell you that the final beneficiary is obvious. At least, from what the criminal investigation bodies say, it is clear that the actual beneficiary is Vladimir Plahotniuc,” said ASP director Mircea Esanu.
Sergey Railean, the ASP former director under whose mandate the two contracts with Garsu Pasaulis were signed, said that he knew nothing about benefits for Plahotniuc.
"The tender took place according to the procedures. Therefore, nothing was outside the law," Railean said.
Told that Black Box reporters had established money transfers from Garsu Pasaulis to offshore companies affiliated with Plahotniuc, Railean was asked if he knew anything about it.
"No, absolutely not. Now it is a criminal case. The file must be completed after the trial,"he said. “[…] We did not order any software."
Railean added that ASP paid royalty fees to Garsu Pasaulis "because that was the contract".
On May 5, 2022 the Moldovan anti-corruption prosecutor's office announced that Railean had the status of accused in the so-called passport affair.
Filip, who held the post of prime minister in 2016-2019, did not answer the phone calls or requests for comment.
In May 2018, during a TV show broadcast by Prime, one of Plahotniuc's TV stations, Filip hinted that the state signed a more advantageous contract with Garsu Pasaulis than the previous one agreed in 2011 with a French company.
In 2011, Garsu Pasaulis had in fact tried to win a tender, but its application failed as it did not meet ASP’s criteria. A key condition was that applicants had experience manufacturing electronic passports for at least three European countries, as established by a decision of the Supreme Court of Justice. Garsu Pasaulis did not meet this requirement.
Garsu Pasaulis replied via e-mail that the company won the tenders and successfully delivered blank passport cards for ASP.
“As for the exact details of other commercial contracts, we cannot provide any details as confidentiality commitments bind us,” Andrius Lukosevicius, director of Garsu Pasaulis’ printing security department, wrote. “However, we can confirm that we have never had and do not currently have commercial or other relations with Mr Plahotniuc and [Romanian businesswoman] Mrs Ileana-Mihaela Burcea.”
The passport cash headed south, to the UAE firm Prime Union Solutions FZ LLC. Between January 1, 2018 and July 30, 2019 itreceived transfers for over 4.7 million euros ( five million dollars) from Garsu Pasaulis. The money continued to flow into Plahotniuc's coffers even after he fled Moldova in June 2019 when his name was linked to the disappearance of over a billion dollars - nearly one-eighth of Moldova's GDP - from the country's biggest banks between 2012 and 2014.
Employees at the Moldovan Money Laundering Prevention and Combating Service obtained information from their colleagues in Dubai and stated that the company's majority shareholders were the Romanian citizen Ileana-Mihaela Burcea and the company Inter Gnathonize Limited.
Between October 29, 2018, and July 30, 2019, a total of seven million euros (about 7.4 million dollars) were credited into Prime Union Solutions’ UAE bank account, largely sent from Garsu Pasaulis. The money then traveled to Burcea’s private account in UAE and six other offshore companies.
In liaison with UAE and Cyprus’ authorities, Moldova’s law enforcement agencies determined that Garsu Pasaulis transferred another 19.6 million euros (20.8 million dollars) to another Cyprus offshore company, Gnathonize Limited, also connected to Burcea.
The Cypriot firm opened a bank account in July 2014, four months after Garsu Pasaulis won the Moldova tender. The Lithuanian firm was the main contributor to the account until August 2018. After that, the money was transferred to the company Prime Union INC LTD in Hong Kong and marked as a "dividend payment".
Part Two
Documents from the Hong Kong public registry show that Burcea was one of Prime Union’s shareholders and in 2014-2019 the director. In 2020, Burcea requested the closing of the company. In 2018, over 600,000 euros (639,000 dollars) were transferred from one of Prime Union’s bank accounts to another offshore in Gibraltar.
In addition, 1.5 million euros (1.6 million dollars) arrived in Burcea`s personal account in the UAE and almost 800,000 euros (852,600 dollars) were directed to Recon Business Data Service, a company registered in Dubai led by Burcea. The company was closed in December 2019.
Burcea’s lawyer Cristina Savulescu declined to comment on the financial transfers from Garsu Pasaulis to her client. She also did not comment on Burcea’s connection with Plahotniuc. Savulescu said that any association of her client with an alleged criminal case was damaging to her client's image.
"The judicial procedure in any criminal case, from the time of notification to the competent bodies until the time of sending a particular person to court, is non-public and confidential, meaning that third parties cannot know the content of the carried-out procedures," Savulescu said.
Documents obtained by Black Box with the support of the OCCRP network of investigative journalists show that Plahotniuc used the same infrastructure of offshore companies to take yet more funds out of Moldova.
The former politician used the offshore network for the money obtained from other auctions organised by state enterprises including Moldtelecom, Moldova’s largest telecommunication operator, gas supplier Energocom and the health ministry for dialysis-related services.
The UAE’s Recon Business Data Services, connected to Burcea, was also involved in the financial circuit of money leaked by Plahotniuc from another scheme related to Moldtelecom, concerning public tenders won by Bass Systems SRL in PD`s ruling period.
Between March 2017 to January 2019 the Chisinau-based IT company delivered technical equipment and services for Moldtelecom worth about 41 million euros (43.6 million dollars). Out of this amount, eight million euros (8.5 million dollars) and six million dollars followed the same route to the UAE through Recon Business Data Services.
OFFSHORE ACCOUNTS
Another document obtained from the Moldovan service for the Prevention and Combating of Money Laundering shows that the Dubai-based company made several transactions to two offshores used by Plahotniuc: the UAE-based Vanguard International LTD and Vanguard International Group, registered in Samoa.
Both companies appeared in Plahotniuc's wealth statements in 2018. However, in the document submitted to Moldova’s Central Electoral Commission on the eve of the February 24, 2019 parliamentary elections, the oligarch declared 4.5 million euros (4.78 million dollars), over 11 million lei (around 585,000 dollars) and 347,000 dollars as dividends obtained from the Dubai-based Vanguard International Ltd.
Moldovan prosecutors established the origin of the money collected by Plahotniuc as "dividends".
Vanguard International LTD received 8.2 million euros (8.72 million dollars) and 2.5 million dollars from UAE-registered RECON SPC LIMITED from December 2017 to May 2019.
Burcea and another Romanian citizen, Silviu Tutuianu, were behind the company in different periods. Almost the entire amount came from the other similarly named firm, the Dubai-based Recon Business Data Service.
Plahotniuc also collected "dividends" worth 1.7 million euros (1.80 million dollars) and almost 350,000 US dollars through another offshore company, TGME INVESTMENTS SPC LTD, managed by Tutuianu.
All these companies were liquidated between the end of 2019 and the beginning of 2020, after Plahotniuc fled Moldova. The Moldovan anti-corruption prosecutor's office opened a case for the purchase of equipment and services by Moldtelecom from SRL Bass Systems. The prosecutors confirmed that Burcea was interviewed in this criminal case, but did not disclose her status.
Burcea also managed a company that benefited from transfers from Plahotniuc’s Cyprus-registered Asia Pacific Textile Limited. This had transactions with the Cypriot offshore Melopmania Limited, the founder of BB-Dializa, a company which managed the dialysis services for the Moldovan health ministry.
BB Dializa also benefited from legal services from Cyprus-registered Kinanis offshore, founded by Burcea. The company also provided secretarial and legal services for Assentis Holdings Limited, one of the founders of Bass Systems SRL.
Asia Pacific Textile LTD received money from the Energokapital shell company. Between 2014 and 2016, the firm was used by Plahotniuc and Evgheni Shevciuk, former leader of Moldova’s breakaway region of Transnistria, to sell the electricity produced by the Russian-owned Moldgres Power Plant to Moldovan consumers.
The Black Box team tracked Energokapital's connections with Plahotniuc and the involvement of former DP deputy Vladimir Andronachi in the company's management.
Moldova’s service for the Prevention and Combating of Money Laundering established the connection between Burcea and two other offshore companies involved in looting a billion dollars from the country’s banking system: Sharp Prospects Limited and Lazomar Trading Limited, registered in Hong Kong and Cyprus respectively.
According to an international independent financial audit named the Kroll report, the Lazomar company received 5.6 million dollars in transfers to a Cypriot bank account. The Kroll report was commissioned by the National Bank of Moldova to investigate the theft that ravaged the country’s banking system.
Plahotniuc did not respond to requests for comment. His lawyer Lucian Rogac said that the former politician pleaded not guilty in the case generically called "blank passport cards".
"An indictment was presented to us. Other evidence to prove guilt was not shown by the prosecution. The only comment I can give you is that my client pleads not guilty to the charges," Rogac said.
In September 2022 Plahotniuc received an arrest warrant in absentia regarding the "blank passport cards" case, alongside Vladislav Zara, former director of the civil registry ASP, ex-PD deputy Andronachi and businessman Alexandru Vilcu. All of them have fled the country. According to Moldova’s ministry of justice, Plahotniuc is currently in Northern Cyprus.
0 notes
rmlnewstimes · 2 years
Text
The Cashier in Dubai
Investigative report tracks tangled route for money flowing to offshore companies from Moldova.
Part One
Moldovan oligarch Vladimir Plahotniuc left his home country in 2019 to avoid corruption charges. But an investigation into his business affairs, shows that money continued to flow into his pockets long after he fled.
Black Box Plus, the investigative show of Moldova’s independent Tv channel TV8, acquired documents showing that Plahotniuc profited from every document Moldova’s Public Services Agency (ASP) issued between 2014-2019. Black Box TV followed the traces left by the businessman Alexandru Vilcu and Vladimir Andronachi, a former lawmaker with the Democratic Party (PD).
Documents show that the money reached Plahotniuc via Garsų Pasaulis, the Lithuanian printing house that won the public procurements for supplying blank cards the ASP uses to issue Moldovan documents, including passports. The financial circuit leads to a network of offshore companies registered in Cyprus, Hong Kong and the United Arab Emirates (UAE).
In the summer of 2020, the scheme Plahotniuc built over the years was taken over by two Bulgaria-registered companies that appeared overnight.
These companies were the identical financial offshore vehicles through which Plahotniuc, former leader of the PD, raised alleged dividends from the auctions organised by the state telecom company Moldtelecom, the purchase of electricity from the breakaway region of Transnistria, the public-private partnership for hemodialysis services and the so–called heist of one billion US dollars from the Moldovan banking system.
The Lithuanian UAB (an acronym of uždaroji akcine bendrove, or private limited company) started supplying blank cards for Moldovan passports following tenders in 2014 and 2017. The main beneficiary of the Garsu Pasaulis company is Albert Mario Karaziwan, a Belgian citizen who owns Semlex Europe, an identification document and biometric device production company whose business practices have come under scrutiny. The Syrian-Belgium businessman has been targeted in several countries in criminal corruption cases and journalistic investigations by Reuters and OCCRP.
In 2014, Moldova’s minister of information and communications technology was Plahotniuc’s fellow party member Pavel Filip. The CRIS Registru state enterprise which in 2017 was re-organised as ASP, was headed by Sergey Railean, godfather of Filip's older son.
Between 2014 and 2021, ASP transferred 59.5 million euros to the Garsu Pasaulis company "for raw material, blank cards and personalisation services," according to documents obtained by Black Box.
ASP also paid the Lithuanian company a royalty fee for software developed for Moldova and used on three types of documents. For example, the royalty fee for each passport issued was 13.61 euros (14.49 US dollars). On October 22, 2021, prosecutors opened a criminal case against nine people from the Public Services Agency “targeted in a criminal case of abuse of office”. Prosecutors estimated that the state lost around 41 million euros (43.6 million dollars) in the case.
A LONG AND TANGLED PATH
A note from the Moldovan service for the Prevention and Combating of Money Laundering obtained by Black Box shows that more than 24 million euros (25.54 million dollars) did not stop in the company's accounts in Vilnius but ended up in Cyprus and the UAE.
“Of the 135 payments made throughout this period [2014-2019], I can tell you that the final beneficiary is obvious. At least, from what the criminal investigation bodies say, it is clear that the actual beneficiary is Vladimir Plahotniuc,” said ASP director Mircea Esanu.
Sergey Railean, the ASP former director under whose mandate the two contracts with Garsu Pasaulis were signed, said that he knew nothing about benefits for Plahotniuc.
"The tender took place according to the procedures. Therefore, nothing was outside the law," Railean said.
Told that Black Box reporters had established money transfers from Garsu Pasaulis to offshore companies affiliated with Plahotniuc, Railean was asked if he knew anything about it.
"No, absolutely not. Now it is a criminal case. The file must be completed after the trial,"he said. “[…] We did not order any software."
Railean added that ASP paid royalty fees to Garsu Pasaulis "because that was the contract".
On May 5, 2022 the Moldovan anti-corruption prosecutor's office announced that Railean had the status of accused in the so-called passport affair.
Filip, who held the post of prime minister in 2016-2019, did not answer the phone calls or requests for comment.
In May 2018, during a TV show broadcast by Prime, one of Plahotniuc's TV stations, Filip hinted that the state signed a more advantageous contract with Garsu Pasaulis than the previous one agreed in 2011 with a French company.
In 2011, Garsu Pasaulis had in fact tried to win a tender, but its application failed as it did not meet ASP’s criteria. A key condition was that applicants had experience manufacturing electronic passports for at least three European countries, as established by a decision of the Supreme Court of Justice. Garsu Pasaulis did not meet this requirement.
Garsu Pasaulis replied via e-mail that the company won the tenders and successfully delivered blank passport cards for ASP.
“As for the exact details of other commercial contracts, we cannot provide any details as confidentiality commitments bind us,” Andrius Lukosevicius, director of Garsu Pasaulis’ printing security department, wrote. “However, we can confirm that we have never had and do not currently have commercial or other relations with Mr Plahotniuc and [Romanian businesswoman] Mrs Ileana-Mihaela Burcea.”
The passport cash headed south, to the UAE firm Prime Union Solutions FZ LLC. Between January 1, 2018 and July 30, 2019 itreceived transfers for over 4.7 million euros ( five million dollars) from Garsu Pasaulis. The money continued to flow into Plahotniuc's coffers even after he fled Moldova in June 2019 when his name was linked to the disappearance of over a billion dollars - nearly one-eighth of Moldova's GDP - from the country's biggest banks between 2012 and 2014.
Employees at the Moldovan Money Laundering Prevention and Combating Service obtained information from their colleagues in Dubai and stated that the company's majority shareholders were the Romanian citizen Ileana-Mihaela Burcea and the company Inter Gnathonize Limited.
Between October 29, 2018, and July 30, 2019, a total of seven million euros (about 7.4 million dollars) were credited into Prime Union Solutions’ UAE bank account, largely sent from Garsu Pasaulis. The money then traveled to Burcea’s private account in UAE and six other offshore companies.
In liaison with UAE and Cyprus’ authorities, Moldova’s law enforcement agencies determined that Garsu Pasaulis transferred another 19.6 million euros (20.8 million dollars) to another Cyprus offshore company, Gnathonize Limited, also connected to Burcea.
The Cypriot firm opened a bank account in July 2014, four months after Garsu Pasaulis won the Moldova tender. The Lithuanian firm was the main contributor to the account until August 2018. After that, the money was transferred to the company Prime Union INC LTD in Hong Kong and marked as a "dividend payment".
Part Two
Documents from the Hong Kong public registry show that Burcea was one of Prime Union’s shareholders and in 2014-2019 the director. In 2020, Burcea requested the closing of the company. In 2018, over 600,000 euros (639,000 dollars) were transferred from one of Prime Union’s bank accounts to another offshore in Gibraltar.
In addition, 1.5 million euros (1.6 million dollars) arrived in Burcea`s personal account in the UAE and almost 800,000 euros (852,600 dollars) were directed to Recon Business Data Service, a company registered in Dubai led by Burcea. The company was closed in December 2019.
Burcea’s lawyer Cristina Savulescu declined to comment on the financial transfers from Garsu Pasaulis to her client. She also did not comment on Burcea’s connection with Plahotniuc. Savulescu said that any association of her client with an alleged criminal case was damaging to her client's image.
"The judicial procedure in any criminal case, from the time of notification to the competent bodies until the time of sending a particular person to court, is non-public and confidential, meaning that third parties cannot know the content of the carried-out procedures," Savulescu said.
Documents obtained by Black Box with the support of the OCCRP network of investigative journalists show that Plahotniuc used the same infrastructure of offshore companies to take yet more funds out of Moldova.
The former politician used the offshore network for the money obtained from other auctions organised by state enterprises including Moldtelecom, Moldova’s largest telecommunication operator, gas supplier Energocom and the health ministry for dialysis-related services.
The UAE’s Recon Business Data Services, connected to Burcea, was also involved in the financial circuit of money leaked by Plahotniuc from another scheme related to Moldtelecom, concerning public tenders won by Bass Systems SRL in PD`s ruling period.
Between March 2017 to January 2019 the Chisinau-based IT company delivered technical equipment and services for Moldtelecom worth about 41 million euros (43.6 million dollars). Out of this amount, eight million euros (8.5 million dollars) and six million dollars followed the same route to the UAE through Recon Business Data Services.
OFFSHORE ACCOUNTS
Another document obtained from the Moldovan service for the Prevention and Combating of Money Laundering shows that the Dubai-based company made several transactions to two offshores used by Plahotniuc: the UAE-based Vanguard International LTD and Vanguard International Group, registered in Samoa.
Both companies appeared in Plahotniuc's wealth statements in 2018. However, in the document submitted to Moldova’s Central Electoral Commission on the eve of the February 24, 2019 parliamentary elections, the oligarch declared 4.5 million euros (4.78 million dollars), over 11 million lei (around 585,000 dollars) and 347,000 dollars as dividends obtained from the Dubai-based Vanguard International Ltd.
Moldovan prosecutors established the origin of the money collected by Plahotniuc as "dividends".
Vanguard International LTD received 8.2 million euros (8.72 million dollars) and 2.5 million dollars from UAE-registered RECON SPC LIMITED from December 2017 to May 2019.
Burcea and another Romanian citizen, Silviu Tutuianu, were behind the company in different periods. Almost the entire amount came from the other similarly named firm, the Dubai-based Recon Business Data Service.
Plahotniuc also collected "dividends" worth 1.7 million euros (1.80 million dollars) and almost 350,000 US dollars through another offshore company, TGME INVESTMENTS SPC LTD, managed by Tutuianu.
All these companies were liquidated between the end of 2019 and the beginning of 2020, after Plahotniuc fled Moldova. The Moldovan anti-corruption prosecutor's office opened a case for the purchase of equipment and services by Moldtelecom from SRL Bass Systems. The prosecutors confirmed that Burcea was interviewed in this criminal case, but did not disclose her status.
Burcea also managed a company that benefited from transfers from Plahotniuc’s Cyprus-registered Asia Pacific Textile Limited. This had transactions with the Cypriot offshore Melopmania Limited, the founder of BB-Dializa, a company which managed the dialysis services for the Moldovan health ministry.
BB Dializa also benefited from legal services from Cyprus-registered Kinanis offshore, founded by Burcea. The company also provided secretarial and legal services for Assentis Holdings Limited, one of the founders of Bass Systems SRL.
Asia Pacific Textile LTD received money from the Energokapital shell company. Between 2014 and 2016, the firm was used by Plahotniuc and Evgheni Shevciuk, former leader of Moldova’s breakaway region of Transnistria, to sell the electricity produced by the Russian-owned Moldgres Power Plant to Moldovan consumers.
The Black Box team tracked Energokapital's connections with Plahotniuc and the involvement of former DP deputy Vladimir Andronachi in the company's management.
Moldova’s service for the Prevention and Combating of Money Laundering established the connection between Burcea and two other offshore companies involved in looting a billion dollars from the country’s banking system: Sharp Prospects Limited and Lazomar Trading Limited, registered in Hong Kong and Cyprus respectively.
According to an international independent financial audit named the Kroll report, the Lazomar company received 5.6 million dollars in transfers to a Cypriot bank account. The Kroll report was commissioned by the National Bank of Moldova to investigate the theft that ravaged the country’s banking system.
Plahotniuc did not respond to requests for comment. His lawyer Lucian Rogac said that the former politician pleaded not guilty in the case generically called "blank passport cards".
"An indictment was presented to us. Other evidence to prove guilt was not shown by the prosecution. The only comment I can give you is that my client pleads not guilty to the charges," Rogac said.
In September 2022 Plahotniuc received an arrest warrant in absentia regarding the "blank passport cards" case, alongside Vladislav Zara, former director of the civil registry ASP, ex-PD deputy Andronachi and businessman Alexandru Vilcu. All of them have fled the country. According to Moldova’s ministry of justice, Plahotniuc is currently in Northern Cyprus.
Part Three
The scheme was taken over in the summer of 2020 by two Bulgarian companies.
In May 2020, the Lithuanian company UAB Garsu Pasaulis transferred the right for using the blank cards software to Optimo Service Ltd in Bulgaria, which ASP had co-opted to manage the documents’ personalisation programme.
"ASP proposed to have a third party take over the maintenance of the software from us. At the same time, we received proposals for cooperation from Optimo in Bulgaria," Garsu Pasaulis’ executive Andrius Lukosevicius said in a statement.
"Therefore, we wanted to avoid having any direct relationship with Optimo. While ASP persisted with its complaints [about improper maintenance of the software], we proposed to the client [ASP] that it consider entering into an agreement with Optimo (without us being involved in such a relationship) whereby Optimo would take over the software from us and its maintenance. We would no longer be responsible for this," he concluded.
Headquartered in Sofia’s luxury district of Manastirski Livadi, Optimo Service Ltd was founded on November 27, 2019, half a year before taking over the right to manage the software from Garsu Pasaulis. The founder is Russian citizen Sergey Pirojkov, while the manager is Bulgarian citizen Tsvetan Stoyanov Dimitrov.
The Bivol Investigative Journalism Centre reporter in Bulgaria, one of Black Box's partners in this investigation, went to the company's headquarters to talk to the owners. According to the documents detailing the company’s address, the offices are on the top floor of a residential building, where a beauty salon is also located. There is no plaque indicating the presence in this location of businesses involving ASP and Garsu Pasaulis.
In November 2022, a Bivol reporter knocked on the door. An employee of the beauty salon opened it and said that at the end of the corridor there was an office where "two Russian guys are working on computers, Serioja and Anton". The two men "rarely come to work".
On October 26, 2020, Optimo Service transferred its commitments to ASP to another Bulgarian company, Optimo IT Solutions LTD, whose owner is none other than Stoyanov, Optimo Service’s manager.
Two weeks before this deal, Stoyanov bought an older company and changed its name to Optimo IT Solutions.
Almost two months after Stoianov’s take over, the ASP funds began to flow into the accounts of Optimo IT Solutions as royalty fees for delivering the IDs and passports
According to documents seen by the Black Box team, between November 24, 2020, and August 13, 2021, ASP made 19 payments totaling 5.6 million euros (5.96 million dollars), to the newly established Optimo IT Solutions LTD.
The director of ASP, Mircea Esanu, told Black Box about the shady software rights transfer to Bulgarian companies.
"I assume who is [the beneficiary of those companies]. I have yet to see documents demonstrating where the money went from those accounts of the Bulgarian companies. But for me, it is strange when a company, even a printing house, sells practically for free to a Bulgarian company created overnight and later collects 5.6 million euros (5.96 million dollars) for a year,” he said.
On the same day in November 2022, the Bivol reporter returned to Optimo IT Solutions’ offices in central Sofia, to talk to the company's owner. The office is in an old building and access to the courtyard is prohibited. Employees of the company providing the space for rent refused to grant allow the reporter inside the building. The accountant of the same company refused to give any details.
Black Box called Optimo IT Solutions headquarters to talk to Stoyanov. The company secretary said to send questions by e-mail, but reporters did not receive an answer.
NEW MANAGEMENT
Returning to the summer of 2020, Optimo Service took over the royalty scheme. One month after transferring the rights to the document personalisation software, the Bulgarian company decided to take a Moldovan partner to represent its interests with ASP.
The company wrote to ASP that IT-LAB GRUP SRL would manage the software. The connections led to the Moldovan businessman Alexandru Vilcu.
According to the letter sent to the ASP by the Bulgarian company, IT-LAB GRUP was to deal not only with the technical servicing of the software but to also manage the entire business administration process.
Furthermore, the Moldovan business would be allowed to hold the Optimo Service company stamp, sign documents, and receive and make payments on behalf of the Bulgarian enterprise.
In November 2022, the founder of IT-LAB GRUP, Alexey Cioban, told Black Box that he did not provide any services to ASP because he no longer cooperated with the Bulgarian company. He claims that he was contacted directly from Sofia but did not say with whom he negotiated.
"We had some discussions about a potential partnership. I also went to ASP, and we discussed concluding a contract, but [we did not], with neither ASP nor the Bulgarian company. We did not reach an agreement. We didn't do any work. We didn't get any money and wanted to avoid collaborating with this company [Optimo],” Cioban said. "We had to take care of the technical part, the software, and the equipment installed at ASP. I talked with ASP, found out more details, and said it differs from our line of work. We refused."
Documents however show that the partnership between Optimo Service and IT-LAB lasted half a year and their collaboration contract was terminated in January 2021.
Cioban's firm, delegated by the Bulgarians to defend their interests in Moldova, has its legal address in Chisinau’s Rascani neighbourhood. According to the land registry, the building in which IT-LAB operates belongs to Tehnovin, a machinery manufacturing company owned by Vilcu.
Cioban categorically denied he ever collaborated with Vilcu in the business of Moldova’s public service agency.
In an exchange of messages with Black Box, Vilcu admitted that he tried to arrange a partnership with the company from Bulgaria and proposed a collaboration with IT-LAB. This contradicts Cioban, who denied his partner's involvement in the ASP case.
"We tried with Alexei [Cioban] to partner with those from Lithuania, but after an analysis, Alexei understood that he would not be able to cope with this and refused. And there, believe me, there was no mention of the figures I read in the files and the press,” Vilcu said.
He added it was a "decent proposal for Moldova," about "tens of thousands, not millions".
In September 2020, Vilcu received an arrest warrant in absentia; he did not appear at the hearing as requested by prosecutors.
Vilcu denies allegations that he was one of the beneficiaries of the ASP scheme and claims he initiated his own investigation to find out who benefited from the money stolen from the passports.
"I want to assure you that I did not participate in this affair. I had nothing to do with passports or other documents from Moldova. I have never dealt with a business that is outside the law. I was less interested in the Bulgarian company. I was more interested in the documents based on which the criminal file was opened against me," Vilcu said.
MULTIPLE CONNECTIONS
Another character targeted in the passport blanks case was the former deputy Vladimir Andronachi.
The anti-corruption prosecutor's office has established connections between the Bulgarian companies Optimo Service and Optimo IT Solutions with Andronachi and relationships with businessman Alexandru Vilcu.
The prosecutor's office stated that it is verifying Andronachi and Vilcu’s involvement in the ASP scheme.
“We inform you that a preliminary link of connection has been established between these natural and legal persons, but the criminal prosecution body still verifies the factual circumstances of these links. In this sense, requests for rogatory commissions are to be formulated," the statement read.
An official source said that the connection between Andronachi and the companies in Bulgaria was ensured by his family’s lawyer, Carolina Andriuta, who allegedly managed the Bulgarian companies from Chisinau. Black Box reporters have not been able to independently verify these allegations.
The anti-corruption prosecutor's office confirmed that Andriuta is accused in the criminal case “for complicity in the abuse of office and money laundering” but stated that the investigation continues.
Andriuta managed several companies connected to Andronachi. Currently, she is on the accused bench in a case concerning bank fraud, together with Nadejda Andronachi, Vladimir Andronachi’s wife.
Oleg Mita, Vladimir Andronachi’s lawyer, who was recently detained in Ukraine and extradited to Moldova on November 2, 2022 did not respond to questions.
Andronachi remains in prison and Mita states that he pleads not guilty in the “passport affairs” case.
"Mr Andronachi had been officially charged in this case. But he does not admit his fault. He explained to the prosecutors that he knew nothing about such actions related to so-called passport forgery schemes," the lawyer said.
Mita is also Carolina Andriuta's lawyer. Mita claims that Andriuta was not accused and also pleaded not guilty.
Melvin Kramer
1 note · View note
howandreviews · 11 months
Text
How to Find Your Unclaimed Money: A Simple Guide
It’s a little-known fact that billions of dollars in unclaimed money are sitting in various accounts across the United States, just waiting for their rightful owners to claim them. And no, this isn’t the plot of a heist movie. This money could belong to you, stashed away in forgotten bank accounts, uncashed checks, or even unused utility deposits. This article will guide you through the process of finding and claiming your lost financial assets, because who couldn’t use a little extra cash?
The Basic Steps
Gather Personal Information
Before embarking on this treasure hunt, arm yourself with essential details like your social security number, last name, and any maiden name or additional information that might be connected to financial assets. Having these details readily available will speed up the search process and increase your chances of successful identification.
Deep Dive
Don’t just stop at the basics; delve into your own records as well. Look for old bank account numbers, addresses where you’ve lived, and names of former employers. These pieces of information are often linked to unclaimed assets like security deposits, uncashed paychecks, or insurance policies you might have forgotten about.
UNCLAIMED MONEY
The Michigan Treasury Department (for example) is holding onto a ton of lost or forgotten money and stuff. This includes money from old bank accounts, checks nobody cashed, items from safe deposit boxes, and even stock certificates. Since banks and companies couldn’t find the owners, the law says they have to give all these unclaimed things to the state. Each state has its own way for you to check if relatives have left behind any unclaimed money. Let’s use Michigan as an example.
Step 1
Look for the place where your relative lived and search “unclaimed money” along with the state’s name on Google. Here’s what I found when I did that.
Or if you lived in Ohio, you would click here.
Step 2
You’ll need to enter some details about the person, like their name, business, city, and zip code. Once you do that, any available unclaimed money should appear.
Step 3
From here you can click on claim if your state allows the search to be online. If not, you can request any paperwork. Once you make a claim you have to be able to prove that you are a relative.
Reclaiming your property
Types of unclaimed property can range from cash in old bank accounts, uncashed checks, and utility or security deposits, to stock certificates, insurance policies, and even safe deposit box contents. Essentially, if a financial institution, company, or government agency owes you money and can’t get it to you, it eventually becomes “unclaimed” and is handed over to the state or federal government to hold until you claim it. If the person is deceased obviously they can’t claim it so it goes to the nearest relative.
Confirmation Email
After you submit a claim, you’ll likely receive a confirmation email that has more steps to follow. For example, when I filed a claim, I got an email that included a link where I could upload all the documents that prove my identity.
What’s Next?
The time it takes to hear back can vary by state and it might take a few months. If they need more info, they’ll reach out to you. Double-check your address to make sure it’s correct so you get your check. You might also have to mail in some papers or get them officially signed by a notary.
The Proof You Need
To prove you’re eligible to receive unclaimed money, you’ll generally need a mix of identification and proof of connection to the account or asset. Here’s a handy list for you:
Proof of Identity: This could be a government-issued ID like a driver’s license, passport, or Social Security card.
Proof of Address: You might need utility bills, bank statements, or even a lease agreement to show that you lived at the address connected to the unclaimed money.
Social Security Number: Often, you’ll need to provide your Social Security Number as an additional form of identification.
Legal Documents: If the unclaimed money is from an inheritance, wills, death certificates, or letters of administration may be required.
Relationship Proof: If you’re claiming on behalf of a relative, you might need birth or marriage certificates to prove your relationship.
Tax Documents: Sometimes, you may need to present tax records as part of the claim process.
Additional Information: Old bank account numbers, employee IDs from former employers, or insurance policy numbers related to the unclaimed money can strengthen your claim.
Notarized Claim Forms: Some states require the claim form to be notarized, essentially getting an official stamp that verifies your identity.
Remember, each state or organization might have its own set of rules, so always check the specific requirements where you’re claiming the money. It’s a bit like a scavenger hunt, but the prize at the end could be your own long-lost treasure!
Don’t Fall for Scams
Watch out for locator services asking for money to find your unclaimed cash. Always use secure, official government websites. Confirm they’re legit before sharing any sensitive info. I came across some sketchy sites asking for fees — avoid those! If you’re unsure about a site, give your local agency a call to double-check. You will be able to obtain this information for free.
Wrapping Up on Unclaimed Money
You probably won’t strike it rich finding unclaimed money, but hey, it’s worth a look. You might stumble upon some extra cash you never knew about! First, arm yourself with your personal info. Then kick off your treasure hunt at your state’s unclaimed property office before moving on to national databases. Stick to secure, official sites and guard your sensitive info like a treasure chest. Your hidden loot could be just a few clicks away!
So, here’s the next step on your quest for fiscal fabulousness. Head over to my website, designed especially for the 50 and wiser crowd, focusing exclusively on how to save that hard-earned treasure. No jargon, no complicated schemes — just simple, actionable tips that you can start using today. We’re talking cutting bills without cutting quality and scoring discounts you never knew existed.
Click on over to Life After Fiftyish to delve into a world of savings that’s as seasoned and savvy as you are. Why wait? Your next big financial win could be just a click away!
0 notes
antonio-velardo · 1 year
Text
Antonio Velardo shares: ‘Billion Dollar Heist’ Review: How to Rob a Bank, Digitally by Natalia Winkelman
By Natalia Winkelman This documentary chronicles a 2016 digital bank heist by pairing commentary from cybersecurity experts with a toolbox of visualization techniques. Published: August 17, 2023 at 10:41AM from NYT Movies https://ift.tt/jcMhvmC via IFTTT
Tumblr media
View On WordPress
0 notes
ericvanderburg · 1 year
Text
‘Billion Dollar Heist’ Review: How to Rob a Bank, Digitally
http://i.securitythinkingcap.com/Stn95y
0 notes
qudachuk · 1 year
Link
A hit-and-miss documentary often struggles to explain the hows and whys of the Bangladesh Central Bank cyber heist of 2016Cybercrime, on top of being difficult to detect and even more so to prove, is notoriously tricky to visualize. The...
0 notes
movienation · 1 year
Text
Documentary Preview: The Biggest "Cyber" Theft of them all -- "Billion Dollar Heist"
This looks fascinating, a “hack” that hit the weakest link in a banking/Federal Reserve chain. “Billion Dollar Heist” comes out Aug. 18.
youtube
View On WordPress
0 notes
bewitchingbaker · 1 year
Note
Send 🚁 for our muses to go on the run from the law together
"Hurry up!"
Chris anxiously tapped the passenger seat, foot ready to stomp on the gas. They come so far with this heist, there was no way they could get caught now. 2 billion dollars from one of New York's most secure banks. With an impenetrable firewall, high end security, and complicated lock.
Well...until Chris and Nate found a crack in their system.
With just a few weeks of planning, the duo was able to get away scott-free. Almost. Those damn security cameras always put a damper on things. That and Nate's habit of shooting the nearest security guard that pissed him off.
The second Nate hopped in the car, they were off. Speeding through the city to their hideout.
"You could have just grabbed the money! But no! No! One security guard says one thing and you gotta blow his brains out!"
[ @predatorymaniac ]
1 note · View note
particularj · 1 year
Text
Okay I’m going to call out some bullshit on this trend of news covering a supposed amazing spike in crime.
And federal authorities now warn it's become an "absolute threat" to public safety and public health, declaring that violent gangs, dangerous international crime syndicates, and even groups with suspected ties to terrorism are increasingly dabbling in organized retail crime across the United States.
International terrorists are not sending cadres of people to America to steal power drills to sell online. It’s just not profitable enough, there’s too much of a paper trail, and they just don’t need to.
Raul Aguilar, who oversees international organized crime cases for Homeland Security Investigations, the primary investigative arm of the U.S. Department of Homeland Security [says]: “And because it's hundreds of millions of dollars, [the money they make] can easily be diverted for [other] kinds of activities."
We’ll come back to this figure in a minute.
"Organized retail crime is what I call theft for greed, not theft for need," said Scott Glenn, vice president for asset protection at The Home Depot
We’re also gonna follow this guy because he’s a fucking idiot trying to further the spin on this story.
And what about theft for need? And how do you know these people aren’t stealing to feed families? I’m willing to bet they are earning more than you pay many of your seasonal, non-union employees.
Glenn said The Home Depot investigated about 400 cases of suspected organized retail theft in the past year alone. … Home Depot alone loses "billions of dollars a year" to organized retail crime, according to Glenn.
So, if it is nationally hundreds of millions of dollars, how is it billions for just Home Depot?
For it to even reach ONE billion, each of those 400 cases would have to be theft of $2.5 million EACH.
That isn’t happening. Especially when the surveillance photos show and the article estimates it’s clearly about $3,000 or so.
These aren’t bank heists or jewelry store robberies, come on. Because if it was that level, we’d be hearing about it.
Asked what's behind the recent spike of organized retail crime, Glenn cited two things in particular: the proliferation of masks during the COVID-19 pandemic, which allowed people to stay "a little bit more anonymous," as he put it, and the explosion of online marketplaces, where people can be even more anonymous.
And there it is. It’s the masks! It’s the anonymity! We need mass surveillance everywhere online and in person! We need cameras tracking everybody! We need a police surveillance state!
This is a bullshit story puff piece blindly unchecked by the reporter by corporate conglomerate retailers (the article cites their retail association, which is NOT unbiased) and pro-police and surveillance systems.
A Homeland Security Investigations report issued last year said estimates regarding organized retail crime found "the average American family will pay more than $500 annually in additional costs due to the impact."
They even try to claim this hurts YOU! Don’t you want to stop this because it hurts you!
Bullshit, it doesn’t hurt me. Retailers are hurting me by charging more even while they make billions in profit and can eat this loss. Retailers are hurting me by harming my community with poverty wages while getting tax breaks through dealing or force. (Google “dark store theory” to see how these retailers have actually won $0 tax assessments by claiming if they magically left tomorrow the property would be worthless.)
They also give two examples of employees being killed by robbers.
Yes, this is sad, and the killers should be held accountable.
But I want to point out the number of retail workers harmed and killed each year due to shitty corporations not granting sick leave, violating OSHA regulations, and put their staff in dangerous situations at far higher rates than organized thieves.
In addition, said Aguilar, "some of these networks are tied to the terrorist financing networks around the world."
When pressed for more details, he said, "There's still too many active investigations, so I can't really specifically get into those."
So it’s bullshit. Got it.
Some media reports and others have questioned whether law enforcement officials and retailers have been exaggerating the scope of organized retail theft and the threat it poses to the U.S. homeland. As far back as 2021, the Los Angeles Times reported that although retail and law enforcement sources cite "eye-popping figures," there is "reason to doubt the problem is anywhere near as large or widespread as they say."
But Aguilar rejected such suggestions, insisting organized retail theft "absolutely is a threat."
Uh huh. The LA Times had facts and figures to back it up. Aguilar rejects it without evidence and this reporter just reports that as the facts and truth? What the fuck.
Glenn said The Home Depot is looking to stem the tide of organized retail theft by "taking a multifaceted approach": locking up often-targeted items behind cages, launching new forms of technology, and pushing Congress and law enforcement to do more.
There it is. We don’t want to spend our profits, we need more police!
Retailers expect the newly-passed INFORM Act, which requires online retailers to verify certain information about their sellers, to help combat the sale of stolen and counterfeit goods -- but they say they also want Congress to allocate funds for a federal task force specifically targeting organized retail crime. The Combating Organized Retail Crime Act, which would establish a coordinated multi-agency response and create new tools to tackle evolving trends in organized retail theft, was introduced by the House of Representatives in February.
Again, we need more money for cops and surveillance! These won’t stop this, but will create problems for all of us and lead to more surveillance tools and privacy invasions.
"The feds ... actually have some really, really good data-sharing and intelligence-sharing capabilities," Glenn said.
How the fuck would you know, Mr. Home Depot man? How the fuck would you even know?
But Aguilar said that to really help stop organized retail crime, consumers need to be "part of the solution."
Go fuck yourself.
The end.
0 notes