throbber
Case 1:20-cv-00473-EK-RLM Document 1 Filed 01/28/20 Page 1 of 22 PageID #: 1
`Case 1:20-cv-OO473-EK-RLM Document 1 Filed 01/28/20 Page 1 of 22 Pageé-gjtf: 1
`IN CLERK'S OFFICE
`U.S. DISTRICT COURT E.D.N.Y.
`
`UNITED STATES DISTRICT COURT
`
`EASTERN DISTRICT OF NEW YORK
`
`
`* JAN 2 8 2020
`
`.‘k
`
`BROOKLYN 0mm;
`
`UNITED STATES OF AMERICA,
`
`COMPLAINT
`
`V.
`
`
`
`Plaintiff,
`
`
`Defendants.
`
`NICHOLAS PALUMBO, NATASHA
`
`PALUMBO, ECOMMERCE NATIONAL, LLC
`
`d/b/a Tollfreedealscom, and SIP RETAIL d/b/a
`
`sipretailcom,
`
`Plaintiff, the UNITED STATES OF AMERICA, by and through the undersigned
`
`attorneys, hereby alleges as follows:
`
`INTRODUCTION
`
`1.
`
`The United States brings this action for a temporary restraining order, preliminary
`
`and permanent injunctions, and other equitable relief pursuant to 18 U.S.C. § 1345, in order to
`
`enjoin the ongoing commission of criminal wire fraud in violation of 18 U.S.C. § 1343 and
`
`conspiracy to commit wire fraud in Violation of 18 U.S.C. § 1349. The United States seeks to
`
`prevent continuing and substantial injury to the victims of fraud.
`
`2.
`
`Since at least 2016 and continuing through the present, Defendants, together with
`
`one or more co-ccnspirators, have used the US. telephone system to engage in predatory wire
`
`fraud schemes that victimize individuals throughout the United States, including individuals within
`
`the Eastern District of New York and significant numbers of elderly and vuinerable victims.
`
`
`
`
`
`

`

`Case 1:20-cv-00473-EK-RLM Document 1 Filed 01/28/20 Page 2 of 22 PageID #: 2
`Case 1:20-cv-OO473-EK-RLM Document 1 Filed 01/28/20 Page 2 of 22 PageID #: 2
`
`Defendants are VoIP1 carriers, and their principals, that serve as “gateway carriers,”2 facilitating
`
`the delivery of millions of fraudulent “robocalls
`
`every day from foreign call centers and foreign
`
`”3
`
`,VoIP carriers to the U.S. telecommunications system and ultimately to phones throughout the
`
`United States. The Defendants thus provide foreign fraudsters the means to access the U.S.
`
`telephone system, knowingly passing millions of fraudulent rohocalls intended to deceive the
`
`recipient into: (1) answering or returning the call, and (2) paying money to the perpetrators of the
`
`schemes.
`
`3.
`
`Through these robocalls, fraudsters operating overseas impersonate government
`
`entities and well—known businesses by “spoofing”4 legitimate phone numbers and sending
`
`recorded messages that are transmitted across the internet to telephones throughout the United
`
`States. These robocalls purport to be from federal government agencies, elements of foreign
`
`governments, and legitimate businesses, conveying alarming messages, such as that the call
`
`recipient’s social security number or other personal information has been compromised or
`
`otherwise connected to criminal activity; the recipient faces imminent arrest; the recipient’s
`
`assets are being frozen; the recipient’s bank and credit accounts have suspect activity; the
`
`recipient’s benefits are being stopped; the recipient faces imminent deportation; or combinations -
`
`1 VoIP stands for voice-over-internet protocol and allows users to place phone calls over
`a broadband internet connection.
`
`2 As set forth in greater detail herein, “gateway carriers” are the first in a chain of VolP
`carriers located in the United States that facilitate the delivery of foreign VoIP calls to recipients
`in the United States.
`
`3 “Robocall” means a call made through an automated process that places large volumes
`of telephone calls over the internet in order to deliver recorded messages, in contrast to calls
`placed one at a time by a live person.
`
`4 The practice of making a false number appear on the recipient’s caller ID is known as
`“spoofing.”
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`Case 1:20-cv-00473-EK-RLM Document 1 Filed 01/28/20 Page 3 of 22 PageID #: 3
`Case 1:20-cv-OO473-EK-RLM Document 1 Filed 01/28/20 Page 3 of 22 PageID #: 3
`
`of these things—all lies intended to induce potential Victims to speak to the fraudsters. When
`
`individuals answer the calls or return voicemail messages, the fraudsters offer to “resolve” these
`
`legal matters by immediate transfers of funds to settle the purported legal obligation, or to hold
`
`the individual’s assets only temporarily while the crisis resolves. ‘In reality, the individual is
`
`neither under investigation nor in legal jeopardy, and the same threatening robocall was made
`
`simultaneously to thousands of other US. telephones.
`
`4.
`
`Not only do Defendants deliver vast numbers of fraudulent robocalls every day,
`
`but they also participate in the fraudulent schemes by providing return-calling services the
`
`fraudsters use to establish contact with potential victims. Robocall messages will often provide
`
`domestic and toll—free call—back numbers; potential victims who call these numbers connect to
`
`the overseas fraudsters, who then try to extort and defraud the potential victims.
`
`5.
`
`Defendants profit from these fraudulent robocall schemes by receiving payment
`
`from their conconspirators for the services Defendants provide. Often, these payments consist of
`
`victim proceeds, a portion of which is deposited directly into Defendants“ accounts in the United
`
`States, before the remainder is transmitted to the fraudsters overseas.
`
`6.
`
`Since at least 2016 and continuing through the present, as a result of their
`
`conduct, Defendants and their couconspirators have defrauded numerous victims out of millions
`
`of dollars, including victims in the Eastern District of New York.
`
`7.
`
`For the reasons stated herein, the United States requests injunctive relief pursuant
`
`to 18 U.S.C. § 1345 to enjoin Defendants’ ongoing schemes to commit wire fraud in violation of
`
`18 U.S.C. § 1343 and conspiracy to commit wire fraud in violation of 18 U.S.C. § 1349. 5
`
`5 This case is one of two cases being filed simultaneously in which the United States
`Department of Justice, for the first time, seeks to enjoin telecommunications companies from
`participating in robocalling fraud schemes pursuant to 18 U.S.C. § 1345.
`
`3
`
`

`

`Case 1:20-cv-00473-EK-RLM Document 1 Filed 01/28/20 Page 4 of 22 PageID #: 4
`Case 1.:20-cv-OO473-EK-RLM Document 1 Filed 01/28/20 Page 4 of 22 PageID #: 4
`
`JURISDICTION AND VENUE
`
`3
`
`8.
`
`The Court has subject matter jurisdiction over this action pursuant to 18 U.S.C.
`
`§1345 and 28 U.S.C. §§ 1331 and 1345.
`
`9.
`
`Venue lies in this district pursuant to 28 U.S.C. § 1391(b)(2).
`
`10.
`
`Plaintiff is the United States of America.
`
`PARTIES
`
`I 1.
`
`Defendants Nicholas and Natasha Palumbo own and control Econnnerce
`
`National, LLC, doing business as TollFreeDeals.com and SIP Retail, LLC, also doing business
`
`as SipRetail.com (the “Corporate Defendants”), which the Palumbos utilize in furtherance of the
`fraudulent robocall schemes. The Palumbos operate the Corporate Defendants from their home
`in Paradise Valley, Arizona, and on information and belief, the Palurnbos operate SIP Retail as
`an alter ego ofEcommerce. From their home in Paradise Valley, Arizona, the Palumbos operate
`
`the Corporate Defendants as fraudulent enterprises.
`
`12.
`
`Defendant Ecommerce is a‘ corporation organized and existing under the laws of
`
`the State of Arizona. Ecommerce does business as TollFreeDeais.001n, and will be referred to
`
`throughout this Complaint as TollFreeDeals. TollFreeDeals’ principal place of business is
`
`located at the Palumbos’ home in Paradise Valley, Arizona. Nicholas Palumbo is the Chief
`
`Executive Officer of TollFreeDeals and Natasha Palurnbo is the Vice President of Business
`
`Development.
`
`13.
`
`Defendant SIP Retail, LLC, also doing business as SipRetail.com (“SIP Retail”),
`
`is a ceiporation organized and existing under the laws of the State of Arizona. SIP Retail’s
`
`principal place of business is located at the Palumbos’ home in Paradise Valley, Arizona.
`
`Natasha Palumbo is the Chief Executive Officer of SIP Retail. SIP Retail provides VoIP carrier
`
`services for some of the same customers as TollFreeDeals, including foreign VolP carriers that
`
`4
`
`
`
`
`
`

`

`Case 1:20-cv-00473-EK-RLM Document 1 Filed 01/28/20 Page 5 of 22 PageID #: 5
`Case 1:20-cv-OO473-EK-RLM Document 1 Filed 01/28/20 Page 5 of 22 PageID #: 5
`
`transmit millions of calls every week destined for the phones of residents of the Eastern District
`
`of New York.
`
`OVERVIEW OF THE ROBOCALLING FRAUD SCHEMES
`
`A. Robocalling Fraud Targeting Individual in the United States
`
`14.
`
`The robocalling fraud schemes in which the Defendants are engaged share the
`
`same characteristics. Individuals at call centers located abroad, many ofwhich-are operating out
`
`of India, are bombarding the US. teiephone system daily with millions of robocalls intended to
`
`defraud individuals in the United States. Many of these fraudsters impersonate US. government
`
`officials, foreign government officials, or well-known American businesses, in order to tln‘eaten,
`
`defraud, and extort money from robocall recipients. Robocalling technology, which allows
`
`fraudsters to send millions of calls per day all transmitting the same pro-recorded, fraudulent
`
`message, enables fraudsters to cast a wide net for elderly and vulnerable victims who are
`
`particularly susceptible to the threatening messages the fraudsters are sending. Even if only a
`
`small percentage of the recipients of a fraudulent call center’s robocalls connect with potential
`
`victims, the fraudsters can still reap huge profits from their schemes.
`
`15.
`
`Foreign fraudsters operate many different scams targeting individuals in the
`
`United States, butthe Defendants’ robocall schemes include the following categories of
`
`impersonation scams:
`
`a. Social Securit Administration "SSA” Im asters: Defendants transmit recorded
`
`
`
`messages in which SSA imposters falsely claim that the call recipient’s social
`
`security number has been used in criminal activity, the recipient’s Social Security
`
`benefits will be suspended, the recipient has failed to appear'before a grand jury
`
`and faces imminent arrest, or the recipient’s social security number will be
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`Case 1:20-cv-00473-EK-RLM Document 1 Filed 01/28/20 Page 6 of 22 PageID #: 6
`Case 1:20-cv-OO473-EK-RLM Document 1 Filed 01/28/20 Page 6 of 22 PageID #: 6
`
`tenninated. When a recipient calls back or connects to the fraudster, the fraudster
`
`claims to be an SSA employee and typically tells the individual to transfer
`
`substantial fiJnds to the SSA for safekeeping until a new social security number
`
`can be issued, at which point the funds purportedly will be returned.
`
`b.
`
`Internal Revenue Service “IRS” Im esters: Defendants transmit recorded
`
`messages in which IRS imposters falsely claim that the call recipient has been
`
`implicated in tax fraud, has avoided attempts to enforce criminal laws, has
`
`avoided court appearances, or the recipient faces imminent arrest. When a
`
`recipient calls back or connects to the fraudster, the fraudster claims to be an IRS
`
`or Treasury employee and typically directs the recipient to transfer funds to the
`
`IRS to resolve various fictitious tax and legal liabilities, or for safekeeping in
`
`order to avoid seizure of assets.
`
`
`
`
`United States Citizensht and Immi ration Services
`
`1111 asters:
`
`Defendants transmit recorded messages in which USCIS imposters falsely claim
`
`that the recipient has failed to fill out immigration forms correctly, the recipient
`
`faces imminent arrest or deportation, the recipient’s home country has taken
`
`formal action against the recipient that may result in deportation, or the recipient
`
`has transferred money in a way that will result in deportation. When a recipient
`
`calls back or connects to the fraudster, the fraudster claims to be a USCIS
`
`employee and typically tells the recipient to pay various fees 01' fines to avoid
`
`immigration consequences.
`
`(1. Tech Support Imposters: Defendants transmit recorded messages in which
`
`fraudsters operating tech support scams impersonate various well-known tech
`
`'
`
`
`
`I
`
`
`
`
`
`
`
`

`

`
`
`i iii || i|Ii i.
`
`Case 1:20-cv-00473-EK-RLM Document 1 Filed 01/28/20 Page 7 of 22 PageID #: 7
`Case 1:20-cv-OO473-EK-RLM Document 1 Filed 01/28/20 Page 7 of 22 PageID #: 7
`
`companies such as Apple or Microsoft, and falsely claim that the recipient has
`
`computer Security problems that require assistance. When an individual connects
`
`with the fraudster, the fraudster instructs the individual to pay for fictitious tech
`
`support and computer security services, and to allow the fraudster remote access
`
`to the victim’s bank accounts.
`
`e. Lean Approval Scams: Defendants transmit recorded messages in which
`
`fraudsters operating loan approval scams impersonate a “lender” offering a great,
`
`guaranteed rate on a “pie—approved” loan. When a customer connects with the
`
`fraudster, the fraudster will emphasize that a poor credit history does not matter,
`
`and all the call recipient has to do to secure the pre—approved loan is pay a one—
`
`time fee up front.
`
`16.
`
`These robocails are often “spoofed” so that they falsely appear on a victim’s
`
`caller ID to originate from US. federal government agency phone numbers, such as the SSA’s
`
`main customer service number, local police departments, 91 1, or the actual customer service
`
`phone numbers of legitimate US. businesses. These “spoofed” numbers are used to disguise the
`
`origin of the robocalls and the caller’s identities, and to cloak them with the authority of
`
`government agencies or large businesses to induce potential victims to answer or return the calls.
`
`In reality, the calls originate from fraudsters operating abroad, and have no connection to any
`
`US. government agency or other legitimate enterprise.
`
`17.
`
`Individuals who answer or return these calls eventually speak to live fraudsters
`
`who tell the individuals lies intended to frighten and confuse them so that the fraudsters may
`
`begin to control their behavior and isolate them from authorities, friends, and family members.
`
`These lies often include that the individual’s social security number or other personal
`
`

`

`
`
`
`
`
`
`Case 1:20-cv-00473-EK-RLM Document 1 Filed 01/28/20 Page 8 of 22 PageID #: 8
`Case 1:20-cv-00473-EK-RLM Document 1 Filed 01/28/20 Page 8 of’22 PageID #: 8
`
`information has been implicated in criminal activity, that the individual faces imminent arrest or
`
`deportation, and that the individual’s assets are about to be forfeited to the government. Once an
`
`individual is overcome by fear and panic, the fraudsters keep them on the phone and offer
`
`reassurances that the individual’s purported legal probiems can be resolved through payment of
`
`money, or that the individual’s money must be transferred to the government agency the
`
`fraudsters are impersonating. The fraudsters often claim that the victim’s payment will be
`
`returned in the immediate future. In reality, once the fraudsters are convinced they have extorted
`
`as much money as possible from the victim, they drop all contact, leaving the victim without
`
`meaningful recourse. Fraudsters receive victims” money through retail gift cards, bank wires,
`
`cash payments, cryptocurrency transfers, and other methods.
`
`18.
`
`Since October 2018, the most prolific robocalling scam impersonating US.
`
`government officialseand one engaged in by Defendants—is impersonation ,of the SSA. For
`
`example, a robocall sent to millions of phones in the United States in early 2019 contained the
`
`following message:
`
`Hello this call is from Department of Social Security Administration the reason
`you have received this phone call from our department is to inform you that there
`is a legal enforcement actions filed on your social security number for fraudulent
`activities so when you get this message kindly call back at the earliest possible on
`our number before we begin with the legal proceedings that is 619—XXX—XXXX I
`repeat 619—XXX-XXXX thank you.
`-
`
`l9.
`
`SSA received more than 465,000 complaints about fraudulent telephone
`
`impersonation of the Administration from October 1, 2018 through September 30, 2019. Losses
`
`associated with these complaints exceed $14 million. Similarly, the Federal Trade Commission
`
`(“FTC”) reported that during 2018, its Consumer Sentinel database received more than 39,000
`
`fraud complaints about SSA imposters, with estimated victim losses of approximately $11.5
`
`million; for 2019, the FTC reported that SSA imposter call complaints rose to approximately
`
`

`

`
`
`Case 1:20-cv-00473-EK-RLM Document 1 Filed 01/28/20 Page 9 of 22 PageID #: 9
`Case 1:20-cv-OO473-EK-RLM Document 1 Filed 01/28/20 Page 9 of 22 PageID #: 9
`
`166,000 with associated losses of more than $37 million. 6 Complaint numbers substantially
`
`underrepresent the extent of the problem, because most victims do not report their losses to the
`
`government.
`
`B. How Calls From Foreign Fraudsters Reach U.S. Telephones
`
`20.
`
`The Defendants’ robocaliing fraud schemes, which involve rohocalls that
`
`originate abroad and target individuals in the United States, are all dependent on VoIP and
`
`related technology to create the calls. VoIP calls use a broadband Internet connection w as
`
`opposed to an analog phone line e to place telephone calls locally, long distance, and
`
`internationally, without regard to whether the call recipient uses a cellular phone or a traditional,
`
`wired phone. The robocalling fraud schemes also require U.S. based telecommunications
`
`companies — referred to as “gateway carriers” m to introduce the foreign phone traffic into the
`
`U.S. phone system. A foreign call center or telecommunications company that places VolP calls
`
`to US. telephones must have a relationship with a U.S. gateway carrier. From the gateway
`
`carrier, most VoIP calls will pass through a series of U.S.-based VolP carriers before reaching a
`
`consumer—facing “common carrier” such as AT&.T or Verizon, and ultimately a potential
`
`‘Victim’s phone. One of the Defendants” roles in the fraudulent schemes is to serve as a gateway
`
`carrier for the fraudulent robocalls.
`
`21.
`
`Each provider in the chain that transmits a VOIP call maintains records, primarily
`
`for billing reasons, of all of the calls that pass through it. These records include the following
`
`information:
`
`the date and time of the call, the destination number (intended recipient), the source
`
`6 Regarding government imposter fraud more broadly and not limited just to SSA
`imposters, the FTC’S Consumer Sentinel database contains 255,223 complaints reflecting
`$128,479,054 in losses for 2018, and 389,563 complaints reflecting $152,946,623 in losses for
`2019.
`
`

`

`Case 1:20-cv-00473-EK-RLM Document 1 Filed 01/28/20 Page 10 of 22 PageID #: 10
`Case 1:20-cv-OO473-EK-RLM Document 1 Filed 01/28/20 Page 10 of 22 PageID #: 10
`
`number from which the call was placed (sometimes a real number and sometimes a spoofed
`
`number), the name of the company that sent the call to the provider, and the downstream
`
`company to which the provider sent the call. These records are generated automatically as a call
`
`is routed through telecommunications infrastructure in a manner that achieves the lowest cost to
`
`transmit a given call, known in the industry as “least—cost routing.” Calls may be traced through
`
`these records back to their gateway carrier, and thus to their foreign source. The
`
`telecommunications industry refers to this process as “traceback.”
`
`22.
`
`Tracebacks of many different robocalling fraud schemes have led to the
`
`identification of Defendants as a gateway carrier willing to transmit huge volumes of fraudulent
`
`robocalls into the country, despite clear indicia of fraud in the call traffic and actual notice of
`
`fratid.
`
`DEFENDANTS’ ONGOING PARTICIPATION IN ROBOCALLING FRAUD SCHEMES
`
`23.
`
`' Since at least 2016, and continuing through the present, Defendants have
`
`knowingly provided U.S.;bou11d calling services to foreign fraudsters operating robocall scams,
`
`acting as a gateway carrier and passing robocalls into the US. telephone system by the millions.
`
`The Defendants are paid for each call they pass into and through the U.S. phone system. In
`
`addition, the Defendants have provided return—calling services to the fraudsters operating the
`
`robocall scams, for which Defendants are also paid, enabling fraudsters to establish contact with
`
`unwitting individuals after the individuals are deceived by a robocall.
`
`24.
`
`There is substantial evidence of the Defendants’ knowledge of the fraudulent
`
`nature of the calls they transmit, including call records showing high percentages of short~
`
`10
`
`

`

`Case 1:20-cv-00473-EK-RLM Document 1 Filed 01/28/20 Page 11 of 22 PageID #: 11
`Case 1:20-cv-OO473-EK-RLM Document 1 Filed 01/28/20 Page 11 of 22 PageID #: 11
`
`duration, unanswered calls7 passing through their systems by the millions; thousands of spodfed
`
`calls originating from overseas, purporting to be from “911” and similar numbers; dozens of
`
`complaints and warnings from other telecommunications companies about fraud, spoofing, and
`
`short~duration “junk” calls; repeated warnings and inquiries from a teieeommunications industry
`
`trade group about the fraudulent robocalls passing through the Defendants’ system; and receipt
`
`of payment from their foreign customers in the form of large, suspicious cash deposits by various
`
`individuals throughout the United States directly into Defendants’ bank accounts.
`
`A. Defendants Knowingly Introduce Fraudulent Robocalls into the U.S. Telephone
`System
`
`25.
`
`Defendants provide inbound VoIP calling to the United States telecommunication
`
`system (referred to in the industry as “U.S. call termination”) to customers located both here in
`the United States and abroad. Defendants provide unrestricted VoIP calling, meaning they do
`
`not monitor or restrict the inbound calls a customer can place for either volume of calls or call
`
`duration. Defendants are paid for each call they pass into and through the U.S. phone system.
`
`26.
`
`Defendants specifically market their services to foreign call centers and foreign
`
`VoIP carriers looking to transmit high volumes of robocalls to individuals in the United States.
`
`The TollFreeDeals website states “TollFreeDeals.com is your premier connection for call center
`
`and dialer termination. We are always looking for the best call center routes in the telecom
`
`industry. We specialize in short call duration traffic 01' call center traffic. We understand there is
`
`a need for it and we want to help you find all the channels you need!”
`
`7 Short-duration and unanswered calls include calls where recipients immediately hang
`up and calls that do not connect, because robocalls are sent to numerous telephone numbers that
`are not in service.
`
`ll“
`
`

`

`Case 1:20-cv-00473-EK-RLM Document 1 Filed 01/28/20 Page 12 of 22 PageID #: 12
`Case 1:20-cv-OO473-EK-RLM Document 1 Filed 01/28/20 Page 12 of 22 PageID #: 12
`
`27.
`
`The FAQs on the TollFreeDeals website state, “Do you handle CC (Call
`
`Center-)fDialer Traffic? Yes — unlike many carriers we will handle your dialer and call center
`
`VoIP termination minutes. If you are looking for USA Dialer, Canada Dialer, or Australia Dialer
`
`please fill out our online interop form to test our routes.”
`
`28.
`
`Defendants regularly transmit massive volumes of short duration calls. For
`
`example, over 23 days in May and June of 2019, TollFreeDeals transmitted more than 720
`
`million calls. Of those calls, more than 425 million, or 59% of the total calls, lasted less than one
`
`second in duration. In the telecommunications industry, high volumes of short-duration and
`
`unanswered calls are indicative of robocalls that are unwanted by the recipients, often because
`
`they are fraudulent. More than 24 million of those calls were placed to phone numbers with area
`
`codes in the Eastern District of New York. As Defendants’ phone records show the ultimate
`
`destination number of every VOIP call they transmit, Defendants know they transmit fraudulent
`
`calls to potential Victims in the Eastern District of New York.
`
`29.
`
`During May and June of 2019, the Palumbos facilitated the delivery of more than
`
`182 million calls through TollFreeDeals from a single India-based VoIP carrier co-conspirator to
`
`phones in the United States. One thousand different source numbers (the number from which a
`
`call is placed, and that shows up on the recipient’s caller ID) accounted for more than 90% of
`
`those calls. According to data obtained from a robocall blocking company about calls identified
`
`as fraudulent robocalls in 2019, 79% of those 1000 source numbers have been identified as
`
`sending fraudulent robocalls. Consequently, TollFreeDeals transmitted an estimated 143 million
`
`fraudulent robocalls on behalf of that single India-based co-conspirator during May and June of
`
`2019. Of those calls, an estimated 20% were Social Security imposter calls, 35% were loan
`
`12
`
`
`
`
`
`
`
`
`
`

`

`Case 1:20-cv-00473-EK-RLM Document 1 Filed 01/28/20 Page 13 of 22 PageID #: 13
`Case 1:20-cv-OO473-EK-RLM Document 1 Filed 01/28/20 ' Page 13 of 22 PageID #: 13
`
`approval scams, and 14% were Microsoft refund scams. The remaining calls were a mixture of
`
`IRS imposter, US Treasury imposter, miscellaneous tech support imposter and other schemes.
`
`30.
`
`Defendants’ knowledge of the fraudulent nature of the telephone calls they deliver
`
`to potential Victims on behalf of their co—conspirators is also evidenced by the numerous
`
`complaints, inquiries, and warnings regarding fraudulent robocalls that Defendants received from
`
`other telecommunications carriers and a telecommunications industry trade association since at
`
`least 2017. Despite receiving these complaints, inquiries, and warnings, Defendants nevertheless
`
`continued to transmit massive volumes of fraudulent robocalls from their co—conspirators to
`
`potential victims in the United States.
`
`31.
`
`For example, in May 2017, AT&T notified Nicholas Palumbo that it had traced
`
`back to TollFreeDeals robocalls received by its customers that spoofed phone numbers belonging
`
`to USCIS and the Office of the Inspector General of the US. Department of Homeland Security
`
`(“DHS—OIG”). AT&T informed Nicholas Palumbo that the callers who spoke to AT&T’s
`
`customers impersonated US. Immigration Officers, and that AT&T had confirmed with USCIS
`and DHS—OIG that those agencies did not use any of the phone numbers at issue as a legitimate
`
`outbound caller ID. Nicholas Palumbo responded that the calls were transmitted to
`
`TollFreeDeals from an India-based VoIP carrier, and that he had blocked those two specific
`
`phone numbers. Blocking specific numbers is an ineffective means to stop fraudsters who are
`
`willing and have the ability to spoof any number as the caller ID number for their fraud calls.
`
`32.
`
`In February 2019, AT&T notified Nicholas Palumbo that it had traced back 19
`
`separate calls to AT&T customers that spoofed a USCIS phone number in order to “extort
`
`money from our customers.” In Nicholas Palumbo’s response to AT&T,- he acknowledged that
`
`those calls were transmitted to TollFreeDeals from the same India—based VoIP carrier that had
`
`13
`
`
`
`
`
`

`

`Case 1:20-cv-00473-EK-RLM Document 1 Filed 01/28/20 Page 14 of 22 PageID #: 14
`Case 1:20-cv-OO473-EK-RLM Document 1 Filed 01/28/20 Page 14 of 22 PageID #: 14
`
`transmitted spoofed USCIS calls in 2017. Despite repeated warnings from AT&T that this
`
`foreign VoIP carrier was transmitting fraudulent govemrnent-impersonation robocalls, the
`
`Palurnbos continued transmitting VoIP calls on behalf of this customer through at least as
`
`recently as June 2019.
`
`33.
`
`The Palumbos have also received numerous warnings from telecommunications
`
`industry trade association USTelecom that both TollFreeDeals.com and SIP Retail have
`
`transmitted fraudulent robocails, including government impersonation robocalls.
`
`34.
`
`From May 2019 through January 2020, TollFreeDeais received 144 notifications
`
`from USTelecorn that a fraudulent robocall had been traced back to TollFreeDeals. Of these
`
`notifications, 83 referenced SSA imposter fraud calls, 24 referenced Tech Support imposter fraud
`
`calls, ten referenced IRS imposter fraud calls, and one referenced USClS impersonation fraud
`
`calls. Each of these emails were sent to Nicholas Palumbo at his @toilfreedeais.com email
`
`address. Each email stated that a suspicious call had been traced back to TollFreeDeals’s
`
`network and provided the call date, time and the source and destination phone numbers, to allow
`
`TollFreeDeais to identify the specific call at issue in its call logs (referred to in the industry as
`
`“call detail records”). Each email also provided a link to USTeiecorn’s web—based traceback
`
`portal, Where further information was provided about the specific fraudulent call at issue,
`
`included a recording of the fraudulent voicemail message that was sent to the recipient’s phone.
`
`in every case, either the email itself or the traceback portal included a short description of the
`
`type of fraud at issue and the details of the fraudulent robocall campaign, such as:
`
`Captured recordings suggest these calls are perpetrating a SERiOUS FRAUD.
`Caller is impersonating a federal official. Automated voice claims suspicious
`activity on your social security number; press 1. Calls are from apparently random
`8XX numbers or other geographic numbers. Call volume estimated at over a million
`
`14
`
`
`
`
`
`

`

`
`
`
`
`Iiii
`
`
`
`iie
`
`ii
`
`iiiIII II I
`
`Case 1:20-cv-00473-EK-RLM Document 1 Filed 01/28/20 Page 15 of 22 PageID #: 15
`Case 1:20-cv-00473-EK-RLM Document 1 Filed 01/28/20 Page 15 of 22 PageID #: 15
`
`per day. Because Caller-ID changes with each call, blocking the ANI [“Automatic
`Number Identification”3} is not effective.
`
`35.
`
`After receiving each of these notifications from USTelecom, Nicholas Palum‘oo
`
`logged into the USTelecom portal and provided information regarding the customers of
`
`ToilFreeDeals that had transmitted the fraudulent calls. Many of these fraudulent calis
`
`repeatedly traced back to the same Indiawbased customers of ToilFreeDeals.
`
`36.
`
`From August 2019 through January 2020, USTelecom also notified SIP Retail of
`
`35 tracebacks of fraudulent robocalls, including 19 tracebacks of SSA impersonation fraud calls,
`
`three tracebacks of Tech Support impersonation fraud calls, and one traceback of USCIS
`
`Impersonation fraud calls. Those notifications were emailed to help@sipretail.com. Upon
`
`information and belief, the Palumbos are the only individuals who monitor email traffic to
`
`@sipretail.corn domain email addresses. SIP Retaii logged into the USTeiecorn traceback portal
`
`and notified USTelecom that all 10 of the SSA impersonation caiis were sent to SIP Retail by
`two India-based companies. Both ofthese companies were also sending fraudulent SSA
`
`imposter call traffic through TollFreeDealscom, as the Paiumbos have been notified by
`
`USTelecom on multiple occasions.
`
`37.
`
`Further, Defendants regularly receive payment from their customers in the form
`
`of substantial cash deposits directly into Ecommerce’s bank account, from locations throughout
`
`the United States raising red flags about the nature of the business of De'fendants’ customers.
`
`B. Defendants Provide Toll-Free Services for Roboeail Schemes
`
`38.
`
`Not only do Defendants knowingly pass fraudulent robocaiis by the millions into
`
`the US. telephone system, but they also provide return-calling services to fraudsters so that
`
`8 ANI refers to the origination telephone number from which a call is placed.
`
`15
`
`

`

`Case 1:20-cv-00473-EK-RLM Document 1 Filed 01/28/20 Page 16 of 22 PageID #: 16
`Case 1:20-cv-OO473-EK-RLM Document 1 Filed 01/28/20 Page 16 of 22 PageID #: 16
`
`potential victims can call them back. These toll-free telephone numbers and related services are
`
`provided in the robocall message as call—back numbers, and appear to be US. telephone numbers
`
`and thus enable fraudsters to further deceive individuals about the robocall’s origin and the
`
`identities and locations of the fraudsters at the other end of the call. In reality, What appears to
`
`the individual to be a US. telephone number is just a telephone number that Defendants register
`
`to an internet address designated by the fraudsters. Thus, the toll-free numbers can be used to
`
`ring telephones anywhere in the world.
`
`39. While toll—free numbers used for return—calling purposes cannot be “spoofed” like
`
`outgoing robocalls, the use of a US. toll-free number in Defendants’ robocalls schemes serves
`
`much the same purpose as spoofingwdeception. The toll—free services provided by Defendants
`
`use VoIP technology to direct potential victims’ return calls from the United States to the foreign
`
`fraudsters’ call centers.
`
`The Defendants have knowingly provided toll-free numbers and
`
`associated calling services to foreign robocall fraudsters.
`40.
`All toll-free numbers in the United States are administered by Somos, ln

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket