Cyber Criminals Top Secret Service Most Wanted List

Monday, April 02, 2012



Sophisticated criminal schemes employing the most current technologies have overtaken the traditional check washing and counterfeiting operations of the past.

The majority of fugitives on the Secret Service's top ten most wanted list can be described as "cyber criminals" who employ information technology related skills and methodologies in the commission of their alleged crimes.

The prevalence of suspects wanted for computer-based crimes reflects a fundamental societal shift to dependence on IT systems for both business operations and in the everyday lives of the ordinary citizen.

While the objective of the criminal element remains the same, the ubiquity of the digital systems that pervade every aspect of our culture present a new set of challenges for law enforcement.

The Secret Service most wanted list includes the following:

Dzmitry Valeryevich

  • Dzmitry Valeryevich Burak is the subject of charges in the federal district of the Southern District of California and also the State of New York. In California, Burak and others who were involved in an international criminal group used the internet to traffic in stolen and counterfeit credit cards. An investigation of Burak's e-mail accounts uncovered more than 55,000 stolen credit card account numbers, which were associated with more than $21 million in actual losses. In New York, New York, Burak sold thousands of stolen credit card numbers and other personal identifying information online. During a five year period, Burak accessed or sold more than 9,000 stolen credit card numbers, more than $4 million worth of stolen property and defrauded credit card companies for more than $1 million.

James Wan Shing Kong

  • The United States Secret Service and the Internal Revenue Service identified James Kong as the primary suspect in an investigation of fraudulent transactions through a consumer credit card service for health consumers. The investigation determined that Kong used his knowledge of the targeted company's customer service support center's computer systems to steal the account numbers of 1,000 customers and 95 participating service providers. Kong made fictitious and unauthorized charges to customer accounts and posed as health service providers to redirect payments into bank accounts in Asia. On December 3, 2008, a 76 count federal indictment and arrest warrant was issued for Kong for Bank Fraud, Wire Fraud, Access Device Fraud, Computer Fraud, Identity Theft and Money Laundering by the Grand Jury of the United States District Court for the Southern District of Ohio.

Walid Osman Turk

  • On May 22, 2008, Walid Osmond Turk and Yasmeen Assaf Turk were indicted by federal grand jury in Syracuse, New York for conspiracy to traffic in counterfeit goods and fraudulent use of access devices. The Turks were involved in schemes that used fraudulent account numbers to ship counterfeit merchandise purchased via the internet, resulting in a loss of $9.9 million and a potential loss of $25 million. The couple travels frequently outside the United States to China, Japan, Qatar, Singapore, Jordan, UAE, Canada, St. Maarten, France, Great Britain and Germany. Yasmeen Assaf Turk is also known by the alias Nada Assaf.

Sean Lamar Gauthia

  • On September 21, 2011, a federal grand jury indicted Sean Lamar Gauthia for conspiracy to commit bank fraud, five counts of bank fraud and three counts of aggravated identity theft. Gauthia has knowledge of computers and has the ability to obtain personal identifying information. He then used those identities to remain undetected from law enforcement. Gauthia is knows to have connections and family members in Los Angeles, Las Vegas and Houston. Suspect is a violent offender with convictions for rape, manslaughter. He is wanted by the Los Angeles Police Department for failure to register as a sex offender. Gauthia also trains dogs and owns an attack-trained black German Shepherd.

Oladipo Sowunmi Coker

  • Oladipo Sowunmi Coker has been identified as part of a criminal enterprise targeting financial institutions in Minneapolis and throughout the United States. On March 8, 2011, an arrest warrant was issued following Coker’s indictment by a grand jury for the U.S. District Court for the District of Minnesota on 57 counts of bank fraud, bank fraud conspiracy, aggravated identity theft and money laundering. The suspect may be in Nigeria, but is known to travel between Nigeria and the United Kingdom. Information obtained that the suspect may be traveling to Mexico and attempt to enter the United States through Mexico. He has extensive knowledge of computers and travels with an iPad to conduct his fraudulent activities.

Juegers Veloz

  • Juegers Veloz has been identified as a suspect in a $250 million cell phone cloning scheme. Those participating in the scheme allegedly stole information from cell phone accounts and used this information to run a lucrative black market in international calling. He has a history of regular travel between the Dominican Republic and the U.S., and connections to others under investigation in this case in Boston, Philadelphia, Scranton, Wilmington (DE) and Miami.

The Secret Service advises that citizens "not attempt to apprehend any of these individuals. Contact the Secret Service or local police or if overseas, the nearest U.S. Embassy or Consulate if you have information regarding these individuals... Anyone with information regarding these people should contact the Secret Service at 1-877-242-3375."


Possibly Related Articles:
Identity Theft fraud Cyber Crime internet Information Technology Headlines hackers Law Enforcement Online Secret Service Most Wanted
Post Rating I Like this!
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.