throbber
Case 2:20-cv-00474-BMC Document 1 Filed 01/28/20 Page 1 of 24 PageID #: 1
`
`UNITED STATES DISTRICT COURT
`
`EASTERN DISTRICT OF NEW YORK
`
`FILED
`. ^ IN CLERK'S OFFICE
`U.S. DISTRICT COURT E.D.N.Y.
`* JAN 2 8 2020 ^
`
`BROOKLYN OFFICE
`
`UNITED STATES OF AMERICA,
`
`Plaintiff,
`
`V.
`
`JON KAHEN, a/k/a JON KAEN, GLOBAL
`VOICECOM, INC., GLOBAL
`TELECOMMUNICATION SERVICES INC., and
`KAT TELECOM, INC.,
`
`Defendants.
`
`COMPLAINT
`
`Civil Action No.
`
`cv
`
`iar;
`
`COGAN, J.
`
`Plaintiff, the UNITED STATES OF AMERICA, by and through the undersigned attorneys,
`
`hereby alleges as follows:
`
`INTRODUCTION
`
`1.
`
`The United States brings this action for a temporary restraining order, preliminary
`
`and permanent injunctions, and other equitable relief pursuant to 18 U.S.C. § 1345, in order to
`
`enjoin the ongoing commission of criminal wire fraud in violation of 18 U.S.C. § 1343 and
`
`conspiracy to commit wire fraud in violation of 18 U.S.C. § 1349. The United States seeks to
`
`prevent continuing and substantial injury to the victims of fraud.
`
`2.
`
`Since at least 2017 and continuing through the present, Defendant John Kahen,
`
`a/k/a Jon Kaen ("Kaen"), together with one or more co-conspirators, has used the U.S. telephone
`
`system to engage in predatory wire fraud schemes that victimize individuals throughout the United
`
`States, including individuals within the Eastern District of New York and significant numbers of
`
`elderly and vulnerable victims. Kaen controls various corporate entities that he utilizes in
`
`furtherance of the fraudulent scheme, including Defendants Global Voicecom, Inc.; Global
`
`1
`
`

`

`Case 2:20-cv-00474-BMC Document 1 Filed 01/28/20 Page 2 of 24 PageID #: 2
`
`Telecommunications Services Inc.; and KAT Telecom, Inc. (the "Corporate Defendants," and
`
`together with Kaen, the "Defendants). The Corporate Defendants, based in New York, are VoIP'
`
`carriers that serve as "gateway carriers"^ facilitate the delivery of millions of fraudulent
`
`"robocalls"^ every day from foreign call centers and foreign VoIP carriers to the U.S.
`
`telecommunications system and ultimately to phones throughout the United States. The
`
`Defendants thus provide foreign fraudsters the means to access the U.S. telephone system,
`
`knowingly passing millions of fraudulent robocalls intended to deceive the recipient into: (I)
`
`answering or returning the call, and (2) paying money to the perpetrators of the schemes.
`
`3.
`
`Through these robocalls, fraudsters operating overseas impersonate government
`
`entities and well-known businesses by "spoofing'"' legitimate phone numbers and sending
`
`recorded messages that are transmitted across the internet to telephones throughout the United
`
`States. These robocalls purport to be from federal government agencies, elements of foreign
`
`governments, and legitimate businesses, conveying alarming messages, such as that the call
`
`recipient's social security number or other personal information has been compromised or
`
`otherwise connected to criminal activity; the recipient faces imminent arrest; the recipient's assets
`
`are being frozen; the recipient's bank and credit accounts have suspect activity; the recipient's
`
`' VoIP stands for voice-over-internet protocol and allows users to place phone calls over a
`broadband internet connection.
`
`^ As set forth in further detail herein, "gateway" carriers are the first in a chain of VoIP carriers
`located in the United States that facilitate the delivery of foreign VoIP calls to receipients in the
`United States.
`
`^ "Robocall" means a call made through an automated process that places large volumes of
`telephone calls over the internet in order to deliver recorded messages, in contrast to calls placed
`one at a time by a live person.
`
`The practice of making a false number appear on the recipient's caller ID is known as
`"spoofing."
`
`2
`
`

`

`Case 2:20-cv-00474-BMC Document 1 Filed 01/28/20 Page 3 of 24 PageID #: 3
`
`benefits are being stopped; the recipient faces imminent deportation; or combinations of these
`
`things—all lies intended to induce potential victims to speak to the fraudsters. When individuals
`
`answer the calls or return voicemail messages, the fraudsters offer to "resolve" these legal matters
`
`by immediate transfers of funds to settle the purported legal obligation, or to hold the individual's
`
`assets only temporarily while the crisis resolves. In reality, the individual is neither under
`
`investigation nor in legal jeopardy, and the same threatening robocall was made simultaneously to
`
`thousands of other U.S. telephones.
`
`4.
`
`Not only do Defendants deliver vast numbers of fraudulent robocalls every day, but
`
`they also participate in the fraudulent schemes by providing return-calling services to the fraudsters
`
`used to establish contact with potential victims. Robocall messages will often provide domestic
`
`and toll-free call-back numbers; potential victims who call these numbers connect to the overseas
`
`fraudsters, who then try to extort and defraud the potential victims.
`
`5.
`
`The Defendants profit from these fraudulent robocall schemes by receiving
`
`payment from their co-conspirators for the services Defendants provide. In addition, on at least
`
`one occasion Defendants received a direct payment from a victim of one of the fraudulent schemes.
`
`6.
`
`Since 2017 and continuing through the present, as a result of their conduct.
`
`Defendants and their co-conspirators have defrauded numerous victims out of millions of dollars,
`
`including victims in the Eastern District of New York.
`
`7.
`
`For the reasons stated herein, the United States requests injunctive relief pursuant
`
`to 18 U.S.C. § 1345 to enjoin Defendants' ongoing scheme to commit wire fraud in violation of
`
`18 U.S.C. § 1343 and conspiracy to commit wire fraud in violation of 18 U.S.C. § 1349.^
`
`^ This case is one of two cases being filed simultaneously in which the United States
`Department of Justice, for the first time, seeks to enjoin telecommunications companies from
`participating in robocalling fraud schemes pursuant to 18 U.S.C. § 1345.
`
`

`

`Case 2:20-cv-00474-BMC Document 1 Filed 01/28/20 Page 4 of 24 PageID #: 4
`
`JURISDICTION AND VENUE
`
`8.
`
`The Court has subject matter jurisdiction over this action pursuant to 18 U.S.C.
`
`§ 1345 and 28 U.S.C. §§ 1331 and 1345.
`
`9.
`
`Venue lies in this district pursuant to 28 U.S.C. § 1391(b)(2).
`
`10.
`
`Plaintiff is the United States of America.
`
`PARTIES
`
`11.
`
`Defendant Kaen resides in Nassau County, New York, in the Eastern District of
`
`New York. Kaen controls Defendants Global Voicecom, Inc., Global Telecommunication
`
`Services Inc., and KAT Telecom, Inc., which he uses in furtherance of the fraudulent robocall
`
`scheme. Kaen operates the Corporate Defendants as a single enterprise from his home in the
`
`Eastern District of New York. One or more of the Defendants also conducts business as "IP Dish."
`
`12.
`
`Defendant Global Voicecom, Inc. is a New York corporation. The New York
`
`Department of State, Division of Corporations Entity Information database identifies Global
`
`Voicecom's principal executive office as being located in Great Neck, New York, in the Eastern
`
`District of New York, and Kaen as the corporation's Chief Executive Officer.
`
`13.
`
`Defendant Global Telecommunication Services Inc. is a New York corporation.
`
`Global Telecommunication Service's principal place of business is located in Great Neck, New
`
`York, in the Eastern District of New York.
`
`14.
`
`Defendant KAT Telecom, Inc. is a New York corporation. KAT Telecom's
`
`principal place of business is located in Great Neck, New York, within the Eastern District of New
`
`York.
`
`OVERVIEW OF THE ROBOCALLING FRAUD SCHEMES
`
`A. Robocalling Fraud Targeting Individuals in the United States
`
`

`

`Case 2:20-cv-00474-BMC Document 1 Filed 01/28/20 Page 5 of 24 PageID #: 5
`
`15.
`
`The robocalling fraud schemes in which the Defendants are engaged share the same
`
`characteristics. Individuals at call centers located abroad, many of which are operating out of
`
`India, are bombarding the U.S. telephone system every day with millions of robocalls intended to
`
`defraud individuals in the United States. Many of these fraudsters impersonate U.S. government
`
`officials, foreign government officials, or well-known American businesses, in order to threaten,
`
`defraud, and extort money from robocall recipients. Robocalling technology, which allows
`
`fraudsters to send millions of calls per day all transmitting the same pre-recorded, fraudulent
`
`message, enables fraudsters to cast a wide net for elderly and vulnerable victims who are
`
`particularly susceptible to the threatening messages the fraudsters are sending. Even if only a
`
`small percentage of the recipients of a fraudulent call center's robocalls connect with potential
`
`victims, the fraudsters can still reap huge profits from their schemes.
`
`16.
`
`Foreign fraudsters operate many different schemes targeting individuals in the
`
`United States, but the Defendants' robocall schemes include the following categories of
`
`impersonation scams:
`
`a. Social Security Administration ("SSA ") Imposters: Defendants transmit recorded
`
`messages in which SSA imposters falsely claim that the call recipient's social
`
`security number has been used in criminal activity, the individual's Social Security
`
`benefits will be suspended, the individual has failed to appear before a grand jury
`
`and face imminent arrest, or the individiual's social security number will be
`
`terminated. When a call recipient calls back or connects to the fraudster, the
`
`fraudster claims to be an SSA employee and typically tells the individual to transfer
`
`substantial funds to the SSA for safekeeping until a new social security number can
`
`be issued, at which point the individual's funds purportedly will be returned.
`
`

`

`Case 2:20-cv-00474-BMC Document 1 Filed 01/28/20 Page 6 of 24 PageID #: 6
`
`b. Internal Revenue Service ("IRS") and Treasury Imvosters: Defendants transmit
`
`recorded messages in which IRS imposters falsely claim that the call recipient has
`
`been implicated in tax fraud, the individual has avoided attempts to enforce criminal
`
`laws, the individual has avoided court appearances, or the individual faces
`
`imminent arrest. When a recipient calls back or connects to the fraudster, the
`
`fraudster claims to be an IRS or Treasury employee and typically tells the recipient
`
`to transfer funds to the IRS to resolve various fictitious tax and legal liabilities, or
`
`for safekeeping in order to avoid seizure of assets.
`
`c. United States Citizenship and Immisration Services CUSCIS") Imvosters:
`
`Defendants transmit recorded messages in which USCIS imposters falsely claim
`
`that the call recipient has failed to fill out immigration forms correctly, the
`
`individual faces imminent arrest or deportation, that the individual's home country
`
`has taken formal action that may result in deportation, or the individual has
`
`transferred money in a way that will result in deportation. When a call recipient
`
`calls back or connects to the fraudster, the fraudster claims to be a USCIS employee
`
`and typically tells the individual to pay various fees or fines to avoid immigration
`
`consequences.
`
`d. Foreisn Government Imvosters: Defendants transmit recorded messages in which
`
`foreign government imposters, often in foreign languages, falsely claim to be from
`
`the U.S.-based consulate of a foreign government and that the call recipient faces
`
`problems with immigration status or a passport. When a call recipient calls back
`
`or connects to the fraudster, the fraudster falsely claims that the individual must
`
`

`

`Case 2:20-cv-00474-BMC Document 1 Filed 01/28/20 Page 7 of 24 PageID #: 7
`
`pay various fees or fines in order to avoid immigration consequences such as
`
`deportation.
`
`e. Tech Support Imposters: Defendants transmit recorded messages in which
`
`fraudsters operating tech support scams impersonate various well-knovm tech
`
`companies such as Apple or Microsoft, and falsely claim that the call recipient has
`
`computer security problems that require assistance. When an individual connects
`
`with the fraudster, the fraudster instructs the individual to pay for fictitious tech
`
`support and computer security services, and to allow the fraudster remote access to
`
`the victim's bank accounts.
`
`17.
`
`These robocalls are often "spoofed" so that they falsely appear on a victim's caller
`
`ID to originate from U.S. federal government agency phone numbers, such as the SSA's main
`
`customer service number, from local police departments, 911, or from the actual customer service
`
`phone numbers of legitimate U.S. businesses. These "spoofed" numbers are used to disguise the
`
`origin of the robocalls and the callers' identities, and to cloak them with the authority of
`
`government agencies or large businesses to induce potential victims to answer or return the calls.
`
`In reality, the calls originate from fraudsters operating abroad, and have no connection to any U.S.
`
`government agency or other legitimate enterprise.
`
`18.
`
`Individuals who answer or otherwise respond to these calls eventually speak to live
`
`fraudsters who tell the individuals lies intended to frighten and confuse them so that the fraudsters
`
`may begin to control their behavior and isolate them from authorities, friends, and family members.
`
`These lies often include that the individual's social security number or other personal information
`
`has been implicated in criminal activity, that the individual faces imminent arrest or deportation,
`
`and that the individual's assets are about to be forfeited to the government. Once an individual is
`
`

`

`Case 2:20-cv-00474-BMC Document 1 Filed 01/28/20 Page 8 of 24 PageID #: 8
`
`overcome by fear and panic, the fraudsters keep them on the phone and offer reassurances that the
`
`individual's purported legal problems can be resolved through payment of money, or that the
`
`individual's money must be transferred for safekeeping to the government agency the fraudsters
`
`are impersonating. The fraudsters often claim that the victim's payment will be retumed to them
`
`in the immediate future. In reality, once the fraudsters are convinced they have extorted as much
`
`money as possible from the victim, they drop all contact, leaving the victim without meaningful
`
`recourse. Fraudsters receive victims' money through retail gift cards, bank wires, cash payments,
`
`cryptocurrency transfers, and other methods.
`
`19.
`
`Since October 2018, the most prolific robocalling scam impersonating U.S.
`
`government officials—and one engaged in by Defendants—is impersonation of the SSA. For
`
`example, a robocall sent to millions of phones in the United States in early 2019 contained the
`
`following message:
`
`Hello this call is from Department of Social Security Administration the reason you
`have received this phone call from our department is to inform you that there is a
`legal enforcement actions filed on your social security number for fraudulent
`activities so when you get this message kindly call back at the earliest possible on
`our number before we begin with the legal proceedings that is 619-[XXX]-pCXXX]
`I repeat 619-[XXX]-[XXXX] thank you.
`
`20.
`
`SSA received more than 465,000 complaints about fraudulent telephone
`
`impersonation of the Administration from October 1, 2018 through September 30, 2019. Losses
`
`associated with these complaints exceed $14 million. Similarly, the Federal Trade Commission
`
`("FTC") reported that for 2018, its Consumer Sentinel database received more than 39,000 fraud
`
`complaints about SSA imposter calls, with estimated losses of approximately $11.5 million; for
`
`2019, the FTC reported that SSA imposter call complaints rose to approximately 166,000 with
`
`

`

`Case 2:20-cv-00474-BMC Document 1 Filed 01/28/20 Page 9 of 24 PageID #: 9
`
`associated losses of more than $37 million.^ Complaint numbers substantially underrepresent the
`
`extent of the problem, because most victims do not report their losses to the government.
`
`B. How Calls From Foreign Fraudsters Reach U.S. Telephones
`
`21.
`
`The Defendants' robocalling fraud schemes, which involve robocalls that originate
`
`abroad and target individuals in the United States, are all dependent on VoIP and related
`
`technology to create the calls. VoIP calls use a broadband intemet connection—as opposed to an
`
`analog phone line—^to place telephone calls locally, long distance, and internationally, without
`
`regard to whether the call recipient uses a cellular phone or a traditional, wired phone. The
`
`robocalling fraud schemes also require U.S.-based telecommunications companies—^referred to as
`
`"gateway carriers"—^to introduce the foreign phone traffic into the U.S. phone system. A foreign
`
`call center or telecommunications company that places VoIP calls to U.S. telephones must have a
`
`relationship with a U.S. gateway carrier. From the gateway carrier, most VoIP calls will pass
`
`through a series of U.S.-based VoIP carriers before reaching a consumer-facing "common carrier"
`
`such as AT&T or Verizon, and ultimately a potential victim's phone. One of the Defendants' roles
`
`in the fraudulent schemes is to serve as a gateway carrier for the fraudulent robocalls.
`
`22.
`
`Each provider in the chain that transmits a VoIP call maintains records, primarily
`
`for billing reasons, of all of the calls that pass through it. These records include the follo'wing
`
`information: the date and time of the call, the destination number (intended recipient), the source
`
`number from which the call was placed (sometimes a real number and sometimes a spoofed
`
`number), the name of the company that sent the call to the provider, and the dovmstream company
`
`to which the provider sent the call. These records are generated automatically as a call is routed
`
`^ Regarding government imposter fraud more broadly and not limited just to SSA imposters, the
`FTC's Consumer Sentinel database contains 255,223 complaints reflecting $128,479,054 in
`losses for 2018, and 389,563 complaints reflecting $152,946,623 in losses for 2019.
`
`

`

`Case 2:20-cv-00474-BMC Document 1 Filed 01/28/20 Page 10 of 24 PageID #: 10
`
`through telecommunications infrastructure in a manner that achieves the lowest cost to transmit a
`
`given call, known in the industry as "least-cost routing." Calls may be traced through these records
`
`back to their gateway carrier, and thus to their foreign source. The telecommunications industry
`
`refers to this tracing process as "traceback."
`
`23.
`
`Tracebacks of many different robocalling fraud schemes have led to the
`
`identification of Defendants as a gateway carrier willing to transmit huge volumes of fraudulent
`
`robocalls into the country, despite clear indicia of fraud in the call traffic and actual notice of fraud.
`
`DEFENDANTS^ ONGOING PARTICIPATION IN ROBOCALLING FRAUD SCHEMES
`
`24.
`
`Since at least 2017, the Defendants have knowingly provided U.S.-bound calling
`
`services to foreign fraudsters operating robocall scams, acting as a gateway carrier and passing
`
`robocalls into the U.S. telephone system by the millions. The Defendants are paid for each call
`
`they pass into and through the U.S. telephone system. In addition, the Defendants have provided
`
`return-calling services to the fraudsters operating the robocall scams, for which Defendants are
`
`also paid, enabling the fraudsters to establish contact with unwitting individuals after the
`
`individuals are deceived by a robocall.
`
`25.
`
`There is substantial evidence of the Defendants' knowledge of the fraudulent nature
`
`of the calls they transmit, including call records showing high percentages of short-duration,
`
`unanswered calls^ passing through their systems by the millions; thousands of spoofed calls
`
`purporting to be from "911" and similar numbers originating from overseas; dozens of complaints,
`
`warnings, and inquiries from vendors and other telecommunications companies about fraud,
`
`spoofing, and short-duration "junk" calls; repeated warnings and inquiries from an industry trade
`
`^ Short-duration and unanswered calls include calls where recipients immediately hang up and
`calls that do not connect because robocalls are sent to numerous telephone numbers that are not
`in service.
`
`10
`
`

`

`Case 2:20-cv-00474-BMC Document 1 Filed 01/28/20 Page 11 of 24 PageID #: 11
`
`group about the scam robocalls passing through the Defendants' system; and receipt of numerous
`
`complaints from common-carrier telecommunications companies whose customers were victims
`
`of these fraud schemes.
`
`A. Defendants Knowingly Introduce Fraudulent Robocalls into the U.S. Telephone
`
`System
`
`26.
`
`In the telecommunications industry, high volumes of short-duration and
`
`unanswered calls are indicative of robocalls that are unwanted by the recipients, often because they
`
`are fraudulent. Defendants regularly transmit massive volumes of such calls. For example, the
`
`Government's investigation has revealed a sample of more than 7.7 million calls that Defendant
`
`Global Voicecom routed through a single downstream VoIP carrier over 19 days in May and June
`
`2019, months after Kaen's response to the FCC. Of those calls, approximately 86%, more than
`
`6.6 million calls, were one second or less in duration, indicating exceedingly high levels of junk
`
`and fraudulent robocalls. Moreover, a small sample of approximately 330,000 of these calls was
`
`examined in greater detail; of these approximately 330,000 calls in that 19-day period, more than
`
`270,000 (approximately 81%) were from source numbers (the numbers appearing on the
`
`recipients' caller IDs) identified as fraudulent robocalls. Similarly, of the more than 106,000
`
`robocalls spoofing the SSA's toll-free customer service number in January and February 2019 that
`
`Defendant Global Voicecom transmitted into the United States, nearly 60% had a call duration of
`
`less than one second, and another 38% were between one and 60 seconds in duration. During that
`
`same period in January and February 2019, Defendant Global Voicecom also ran through its
`
`systems thousands of calls spoofing 911, 1911, and 11911, with similar short call durations.
`
`27.
`
`Since 2017, significant numbers of fraudulent robocalls have been traced back to
`
`the Defendants and brought to their attention. For example, U.S. common carrier AT&T has
`
`11
`
`

`

`Case 2:20-cv-00474-BMC Document 1 Filed 01/28/20 Page 12 of 24 PageID #: 12
`
`notified Defendants on numerous occasions about fraud traced back to Defendants' operations.
`
`These notices include a November 16, 2017, email to IP Dish:
`
`The following calls to AT&T cell phone customers were received using the spoofed
`caller ID numbers of a non-working number at the US Department of Homeland
`Security headquarters. Callers impersonated US Citizenship and Immigration[ ]
`Services personnel and defrauded an AT&T customer of $1,450....
`Pursuant to the customer and carrier network fraud protection provisions of the
`Telecommunication Act and the Telephone Records Privacy Protection Act (47
`use 222(d)(2)), could you provide the name(s) of your upstream carriers? We are
`tracing these calls to their source so they can be stopped.
`
`AT&T sent similar emails about USCIS impersonation scams to Defendants Kaen and Global
`
`Voicecom in September 2017, November 2017, April 2018, and July 2018. Similarly, AT&T
`
`emailed Defendants about SSA and other imposter robocalls on January 29, 2019:
`
`We have been receiving AT&T customers complaints about spoofing fraud from
`your network. In the first complaint calls are originating from a toll free number
`owned by the US Social Security Administration. Callers falsely claim to be US
`Government officials and attempt to extort money from our customers. We have
`verified this number is not out-pulsed as a legitimate caller ID by the real US Social
`Security Administration....
`
`In the second complaint calls are originating from the toll free number of DirecTV
`(AT&T). Callers falsely claim to be AT&T/DirecTV technical reps and social
`engineer remote access to our customer's computers in order to make fraudulent
`wire transfers from online banking applications....
`Could you provide the names and contact numbers of the parties that sent these
`calls to your network.
`
`AT&T sent similar warning notices about SSA imposter calls to Defendants Kaen and Global
`
`Voicecom in February 2019 and May 2019.
`
`28.
`
`Another VoIP carrier that received call traffic from Defendants, Peerless Network,
`
`Inc., sent even more warning notices and inquiries to Defendants. For example. Peerless Network
`
`sent a warning notice about spoofed calls in September 2018 with a request that Defendants
`
`investigate and "take the appropriate action." Peerless Network sent approximately 12 of these
`
`warning notices between September 2018 and March 2019.
`
`12
`
`

`

`Case 2:20-cv-00474-BMC Document 1 Filed 01/28/20 Page 13 of 24 PageID #: 13
`
`29.
`
`Not only have other telecommunications companies provided warnings and notices
`
`to Defendants as a result of tracebacks, but a leading industry trade group, USTelecom, has done
`
`the same. For example, USTelecom traced back an August 19,2019 robocall that originated from
`
`India and came through Defendant Global Voicecom as the gateway carrier. The robocall was
`
`also routed through Defendant KAT Telecom. This robocall stated that there was "suspicious
`
`activity" associated with the individual's social security number. USTelecom provided the
`
`following warning notice in its correspondence to Defendant Global Voicecom on August 27,
`
`2019:
`
`Captured recordings suggest these calls are perpetrating a SERIOUS FRAUD.
`Caller is impersonating a federal official. Automated voice claims suspicious
`activity on your social security number; press 1. Calls are from apparently random
`8XX numbers or other geographic numbers. Call volume estimated at over a
`million per day. Because Caller-ID changes with each call, blocking the ANI^ is
`not effective.
`
`Blocking specific telephone numbers is an ineffective means to stop fraudsters who are willing—
`
`and have the ready ability—^to spoof any number as the caller ID number for their fraudulent
`
`robocalls. For example, in January and February 2019, Defendants transmitted fraudulent
`
`robocalls spoofing 911,1911, and 11911. Nevertheless, if the Defendants responded at all to these
`
`notices and warnings from other telecommunications-industry actors, they routinely responded
`
`that the "offending" number had been blocked, as though the spoofed telephone number and not
`
`the caller were responsible for the fraud.
`
`30.
`
`Similarly, USTelecom traced an October 3, 2019 robocall to Defendant Global
`
`Voicecom as the gateway carrier. This robocall also originated from India. USTelecom provided
`
`^ "ANI" means "Automatic Number Identification," and for these purposes refers to the
`purported source number for the call.
`
`13
`
`

`

`Case 2:20-cv-00474-BMC Document 1 Filed 01/28/20 Page 14 of 24 PageID #: 14
`
`the following warning notice in its October 11, 2019 correspondence to Defendant Global
`
`Voicecom:
`
`Captured recordings suggest these calls are perpetrating a SERIOUS FRAUD.
`Calls placed from specific numbers obtained by scammers, using an automated
`voice to inform called party that they are in trouble with IRS and will be arrested.
`Called party is instructed to call back to speak to an agent... We are using traceback
`to try to find the source(s) of the millions of outbound calls that are being made to
`initiate the scam.
`
`USTelecom's records indicate that this robocall was transcribed in part as follows:
`
`This call is from Federal Tax and audit division of internal revenue services. This
`message is intended to contact you regarding an enforcement action executed by
`the US treasury intending your serious attention. Ignoring this will be an intentional
`second attempt to avoid initial appearance before a magistrate judge or a grand jury
`for federal criminal offense. This is a final attempt to reach you to resolve this issue
`immediately and to speak to a federal agent to call us back on 510-[XXX]-[XXXX].
`I repeat 510-[XXX]-[XXXX].
`
`USTelecom identified Defendants as the gateway carrier for foreign fraudulent robocalls on at
`
`least eighteen other occasions in the latter half of 2019 alone, each time providing similar warning
`
`notices about the nature of the scam robocalls. USTelecom's records indicate that on nearly all of
`
`these 2019 tracebacks, the scam robocalls came from the same company in India.
`
`31.
`
`Defendants transmitted another group of fraudulent robocalls that spoofed the
`
`phone number for a foreign government consulate in New York, New York. These calls conveyed
`
`foreign-language messages about problems with the individual's immigration status or passport.
`
`Like with SSA imposter robocalls and other U.S. govemment-imposter scams, individuals who
`
`returned the calls to the consulate imposters were told lies intended to frighten them and make
`
`them think there are imminent consequences for involvement in criminal activity, and that funds
`
`must be transferred to the fraudsters to resolve the matters. Like with the SSA imposter scams,
`
`once the fraudsters are convinced they have extorted as much money as possible, they drop all
`
`contact with the victim. In 2018, the FCC traced this consulate imposter scam back to Kaen and
`
`14
`
`

`

`Case 2:20-cv-00474-BMC Document 1 Filed 01/28/20 Page 15 of 24 PageID #: 15
`
`IP Dish, who informed the FCC that the calls came from a Hong Kong entity that was making tens
`
`of thousands of calls per day. The FTC's Consumer Sentinel database reflects more than 1,000
`
`complaints related to the spoofed phone number of the consulate. These complaints relate
`
`hundreds of thousands of dollars in victim losses. Defendants continue to conduct business with
`
`this Hong Kong entity more than a year later.
`
`32.
`
`Despite these notices and numerous others. Defendants continue to pass fraudulent
`
`robocalls into the U.S. telephone system to millions of U.S. telephones every day.
`
`B. Defendants Provide Return-Calling and Toll-Free Services for Robocall Schemes
`
`33.
`
`Not only do Defendants knowingly pass fraudulent robocalls by the millions into
`
`the U.S. telephone system, but they also provide return-calling services to fraudsters so that
`
`potential victims can call them back. These toll-free and direct-inward-dial ("DID") telephone
`
`numbers^ and related services are provided in the robocall message as call-back numbers, and
`
`appear to be U.S. telephone numbers and thus enable fraudsters to further deceive individuals
`
`about the robocall's origin and the identities and locations of the fraudsters at the other end of the
`
`call. In reality, what appears to the individual to be a U.S. telephone number is actually a telephone
`
`number that Defendants register to an internet address designated by the foreign fraudsters. Thus,
`
`the DID and toll-free numbers can be used to ring telephones anywhere in the world.
`
`34.
`
`While DID and toll-free numbers used for return-calling purposes cannot be
`
`"spoofed" like outgoing robocalls, the use of a U.S. DID or toll-free number in Defendants'
`
`robocalls schemes serves much the same purpose as spoofing—deception. The DID and toll-free
`
`services provided by Defendants use VoIP technology to direct potential victims' retum calls from
`
`^ As applicable to the fraud schemes, direct-inward-dial numbers are phone numbers with U.S.
`area codes that are routed to fraudulent call centers in foreign countries through VoIP
`technology.
`
`15
`
`

`

`Case 2:20-cv-00474-BMC Document 1 Filed 01/28/20 Page 16 of 24 PageID #: 16
`
`the United States to the foreign fraudsters' call centers. The Defendants have knowingly provided
`
`hundreds of these DID and toll-free numbers and associated calling services to foreign robocall
`
`fraudsters.
`
`1. DID Numbers Used to Further Robocalling Fraud Schemes
`
`35.
`
`Like telephone numbers used to make U.S.-bound robocalls, DID numbers can be
`
`traced to identify their providers and users. This process was used to identify DID numbers
`
`provided by the Defendants for use in the fraudulent robocall schemes. For example, records
`
`obtained from one U.S. company demonstrate that it assigned 902 DID telephone numbers to
`
`Defendant Global Voicecom. Approximately 55% of these DID telephone numbers are associated
`
`with more than 28,000 complaints in the FTC's Consumer Sentinel database. One of the 902 DID
`
`telephone numbers appeared in a robocall sent to millions of U.S. telephones in early 2019:
`
`Hello this call is from Department of Social Security Administration the reason you
`have received this phone call from our department is to inform you that there is a
`legal enforcement actions filed on your social security number for fraudulent
`activities so when you get this message kindly call back at the earliest possible on
`our number b

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket