Crime

Man Jailed In UK's First Treason Conviction In 40 Years Was Encouraged By AI Chatbot (vice.com) 21

An anonymous reader quotes a report from Motherboard: A man who admitted attempting to assassinate Queen Elizabeth II with a crossbow after discussing his plan with an AI-powered chatbot has been sentenced to 9 years in prison for treason. It's the UK's first treason conviction in more than 40 years. Jaswant Singh Chail, who was 19 at the time of his arrest on Christmas Day, 2021, scaled the walls of Windsor Castle's grounds with a mask and a loaded high-power crossbow. He said his intent was, as a British Sikh, to assassinate the Queen in a Star Wars-inspired plan to avenge the 1919 Jallianwalla Bagh massacre, a colonial-era atrocity during British rule in India. Prosecutors said that Chail was encouraged to undertake this plot after discussing it at length with an AI-powered chatbot that egged him on and bolstered his resolve. [...] Chail is currently being held at Broadmoor high-security hospital and will remain there until he is psychologically well enough to serve his sentence.
Crime

Hundreds of US Schools Hit By Potentially Organized Swatting Hoaxes, Report Says (arstechnica.com) 60

An anonymous reader quotes a report from Ars Technica: Within the past year, there have been approximately five times more school shooting hoaxes called in to police than actual school shootings reported in 2023. Where data from Everytown showed "at least 103 incidents of gunfire on school grounds" in 2023, The Washington Post recently uncovered what seems to be a coordinated campaign of active shooter hoaxes causing "swattings" -- where police respond with extreme force to fake crimes -- at more than 500 schools nationwide over the past year. In just one day in February, "more than 30 schools were targeted," The Post reported.

The Post "examined police reports, emergency call recordings, body-camera footage, or call logs in connection with incidents in 24 states," which seemed to reveal a "distinct pattern" potentially linking swatting hoaxes nationwide. A man who "speaks with a heavy accent" -- and possibly uses a device or app to alter his voice in real time -- relies on a virtual private network (VPN) to mask his IP address, then places the hoax calls on non-emergency lines using free Internet-calling services. He frequently pretends to be a teacher hiding from the fake shooter on campus and sometimes falsely reports student shootings. To some law enforcement officials, the voice sounds too similar from call to call to be chalked up to coincidence. The Post stitched together audio that shows why many authorities believe these hoax calls might be coming from the same caller, whose motivations are currently unknown. It's possible the hoax calls are being orchestrated by one person with a hostile compulsion or by one or several perpetrators advertising swatting services available for hire online. [...]

According to The Post, the FBI has been investigating this string of school shooting hoaxes, but it's unclear how far that investigation has gotten -- mostly because tracing the hoax calls has perplexed many law enforcement agencies nationwide. Tracing calls is difficult partly because many VPN providers outside the US don't always cooperate with law enforcement, and some of the most popular free Internet-calling services only require an email address to sign up. However, The Post reported that it has increasingly become clear to law enforcement that one particular Internet-calling service appears to be the most popular choice for hoax callers reporting school shootings: TextNow. One police captain in Lousiana, Shannon Mack -- who is described as specializing in "cases involving Internet-based phone services -- told The Post that "nine times out of 10," hoax calls she has investigated have come from a TextNow number.

Crime

Predictive Policing Software Terrible At Predicting Crimes (wired.com) 62

An anonymous reader quotes a report from Wired: Crime predictions generated for the police department in Plainfield, New Jersey, rarely lined up with reported crimes, an analysis by The Markup has found, adding new context to the debate over the efficacy of crime prediction software. Geolitica, known as PredPol until a 2021 rebrand, produces software that ingests data from crime incident reports and produces daily predictions on where and when crimes are most likely to occur. We examined 23,631 predictions generated by Geolitica between February 25 and December 18, 2018, for the Plainfield Police Department (PD). Each prediction we analyzed from the company's algorithm indicated that one type of crime was likely to occur in a location not patrolled by Plainfield PD. In the end, the success rate was less than half a percent. Fewer than 100 of the predictions lined up with a crime in the predicted category, that was also later reported to police. Diving deeper, we looked at predictions specifically for robberies or aggravated assaults that were likely to occur in Plainfield and found a similarly low success rate: 0.6 percent. The pattern was even worse when we looked at burglary predictions, which had a success rate of 0.1 percent.
Crime

Federal Judge Gives Man 8-Year Sentence For Running Unlicensed Bitcoin Exchange (apnews.com) 78

Ian Freeman, a New Hampshire man in his 40s, has been sentenced to eight years in prison for running an unlicensed bitcoin exchange business. He will also be fined at least $40,000, although the exact amount still has to be determined in a hearing. The Associated Press reports: Ian Freeman was taken away in handcuffs following his sentencing in U.S. District Court in Concord. Prosecutors said Freeman, a libertarian activist and radio show host, created a business that catered to fraudsters who targeted elderly women with romance scams, serving as "the final step in permanently separating the victims from their money." Freeman, who is in his 40s, said in court he did not believe he broke the law. He said he was trying to get people to adopt bitcoin. He said there were times he detected fraud and protected many potential scam victims. He apologized for not being able to help them all. "I don't want people to be taken advantage of," said Freeman, who said he cooperated with law enforcement to help some people get their money back.

Freeman said he devised a series of questions for customers, including whether a third party was putting them up to their transactions or if they were under duress. Some victims lied about their circumstances, he said. Freeman also said he didn't learn about scam victims until he saw their stories in the news. "It didn't matter how strict I was or how many questions I asked," he said. After a two-week trial, he was convicted of eight charges in December, although his conviction on a money laundering charge was later overturned by the judge. The prosecution is appealing it to the 1st Circuit Court of Appeals.

Freeman was sentenced on the remaining charges, which include operating an unlicensed money transmitting business and conspiracy to commit money laundering and wire fraud. Freeman's lawyers said they planned to appeal and asked that he remain free on bail for now, but U.S. District Court Judge Joseph LaPlante didn't allow it. The sentencing guidelines called for much longer term, ranging from about 17 years to nearly 22 years in prison.

Privacy

UK Passport Images Database Could Be Used To Catch Shoplifters (theguardian.com) 67

An anonymous reader quotes a report from The Guardian: Britain's passport database could be used to catch shoplifters, burglars and other criminals under urgent plans to curb crime, the policing minister has said. Chris Philp said he planned to integrate data from the police national database (PND), the Passport Office and other national databases to help police find a match with the "click of one button." But civil liberty campaigners have warned the plans would be an "Orwellian nightmare" that amount to a "gross violation of British privacy principles".

Foreign nationals who are not on the passport database could also be found via the immigration and asylum biometrics system, which will be part of an amalgamated system to help catch thieves. The measures have been deemed controversial by campaigners as the technology could get a match even if images are blurred or partially obscured. Speaking at a fringe event of the Conservative party conference hosted by the Policy Exchange thinktank, Philp said: "I'm going to be asking police forces to search all of those databases -- the police national database, which has custody images, but also other databases like the passport database -- not just for shoplifting but for crime generally to get those matches, because the technology is now so good that you can get a blurred image and get a match for it.

"Operationally, I'm asking them to do it now. In the medium term, by which I mean the next two years, we're going to try and create a new data platform so you can press one button [and it] lets you search it all in one go. Until the new platform is created, he said police forces should search each database separately. [...] Philp said he has already ordered police forces that have access to the passport database to start searching it alongside the police national database, which stores custody images. Officers will be able to compare those facial images against CCTV, dashcam and doorbell technology to help find a match for criminals as prosecution rates are at record lows. He later added: "I would also just remind everyone that the wider public, including shop staff and security guards, do have the power of citizen's arrest and where it's safe to do so I would encourage that to be used. Because if you do just let people walk in and take stuff and walk out without proper challenge, including potentially a physical challenge, then it will just escalate."

Crime

YouTuber Jailed For Large-Scale Cable Piracy Scheme (jalopnik.com) 20

Bill Omar Carrasquillo, better known by his YouTube name Omi In a Hellcat, has been arrested after the feds found Carrasquillo had amassed a $30 million fortune with a large-scale piracy scheme in which he was buying and reselling copyrighted material from cable TV. Jalopnik reports: He was sentenced to five years in prison for "piracy of cable TV, access device fraud, wire fraud, money laundering, and hundreds of thousands of dollars of copyright infringement," along with having to forfeit his millions and pay $15 million in restitution. Those millions helped pay for the car collection now going up for auction.

[Road & Track reports Omi In A Hellcat's entire 57 vehicle collection is up for auction.] As of this writing, the auction features 32 cars and 25 bikes and off road vehicles. Despite his crimes, the man had decent taste in cars. There's good stuff to be had like.

Businesses

H&R Block, Meta, and Google Slapped With RICO Suit, Allegedly Schemed to Scrape Taxpayer Data (gizmodo.com) 31

Anyone who has used H&R Block's tax return preparation services since 2015 "may have unintentionally helped line Meta and Google's pocket," reports Gizmodo: That's according to a new class action lawsuit which alleges the three companies "jointly schemed" to install trackers on the H&R Block site to scan and transmit tax data back to the tech companies which then used elements of the data to engage in targeted advertising.

Attorneys bringing the case forward claim the three companies' conduct amounts to a "pattern of racketeering activity" covered under the Racketeer Influenced and Corrupt Organizations Act (RICO), a tool typically reserved for organized crime. "H&R Block, Google, and Meta ignored data privacy laws, and passed information about people's financial lives around like candy," Brent Wisner, one of the attorneys bringing forward the complaint said.

The lawsuit, filed in the Northern District of California this week, stems from a bombshell Congressional report released earlier this year detailing the way multiple tax preparation firms, including H&R Block, "recklessly" shared the sensitive tax data of tens of millions of Americans without proper safeguards. At issue are the tax preparation firms' use of tracking "pixels" placed on their websites. These trackers, which the lawsuit refers to as "spy cams" would allegedly scan tax documents and reveal a variety of personal tax information, including a filer's name, filing status, federal taxes owed, address, and number of dependents. That data was then anonymized and used for targeted advertising and to train Meta's AI algorithms, the congressional report notes.

The attorneys argue that H&R Block, Meta, and Google "explicitly and intentionally" entered into an agreement to violate taxpayers' privacy rights for financial gain, according to the article. The suit seeks refunds and punitive damages.
Crime

FBI Indicts Goldman Sachs Analyst Who Tried Using Xbox Chat for Insider Trading (kotaku.com) 38

Kotaku reports: A newly unsealed FBI indictment accuses a former analyst at Goldman Sachs of insider trading, including allegedly using an Xbox to pass tips onto his close friends. The friend group earned over $400,000 in ill-gotten gains as a result, federal prosecutors claim. "There's no tracing [Xbox 360 chat]," the analyst allegedly told his friend who was worried they might be discovered.

He appears to have made a grave miscalculation.

The FBI arrested Anthony Viggiano and alleged co-conspirator Christopher Salamone, charging them with securities fraud on September 28. Viggiano is accused of using his previous position at Goldman Sachs to share trading tips with Salamone and others. Salamone has already pleaded guilty. Bloomberg reports that this is the fifth incident in recent years of a person associated with the investment bank allegedly using their position to do crimes...

Probably best to keep the crime talk on Xbox to a minimum either way, especially now that Microsoft is using AI to monitor communications for illicit and toxic activities.

In a statement an FBI official said "This indictment is yet another example of individuals believing they can get away with benefiting from trading on material non-public information.
Crime

Three Arrows Capital Co-Founder Zhu Apprehended, Liquidator Says (bloomberg.com) 4

Three Arrows Capital co-founder Su Zhu was apprehended in Singapore while trying to leave the country on Friday. From a report: Teneo, which is liquidating the defunct firm's estate, said it received a committal order against Zhu after he failed to comply with an earlier Singapore court order compelling him to cooperate with the liquidation investigation. The order sentenced Zhu to four months in prison, according to a statement by Teneo. Zhu was apprehended at Singapore's Changi Airport on Friday afternoon, Teneo said, adding that the Sept. 25 order also saw Zhu's co-founder Kyle Davies receive the same sentence. Zhu didn't immediately respond to a request for comment.
AI

FBI Agents Are Using Face Recognition Without Proper Training (wired.com) 32

An anonymous reader quotes a report from Wired: The U.S. Federal Bureau of Investigation (FBI) has done tens of thousands of face recognition searches using software from outside providers in recent years. Yet only 5 percent of the 200 agents with access to the technology have taken the bureau's three-day training course on how to use it, a report from the Government Accountability Office (GAO) this month reveals. The bureau has no policy for face recognition use in place to protect privacy, civil rights, or civil liberties. Lawmakers and others concerned about face recognition have said that adequate training on the technology and how to interpret its output is needed to reduce improper use or errors, although some experts say training can lull law enforcement and the public into thinking face recognition is low risk.

Since the false arrest of Robert Williams near Detroit in 2020, multiple instances have surfaced in the US of arrests after a face recognition model wrongly identified a person. Alonzo Sawyer, whose ordeal became known this spring, spent nine days in prison for a crime he didn't commit. The lack of face recognition training at the FBI came to light in a GAO report examining the protections in place when federal law enforcement uses the technology. The report was compiled at the request of seven Democratic members of Congress. Report author and GAO Homeland Security and Justice director Gretta Goodwin says, via email, that she found no evidence of false arrests due to use of face recognition by a federal law enforcement agency.

The GAO report focuses on face recognition tools made by commercial and nonprofit entities. That means it does not cover the FBI's in-house face recognition platform, which the GAO previously criticized for poor privacy protections. The US Department of Justice was ordered by the White House last year to develop best practices for using face recognition and report any policy changes that result. The outside face recognition tools used by the FBI and other federal law enforcement covered by the report comes from companies including Clearview AI, which scraped billions of photos of faces from the internet to train its face recognition system, andThorn, a nonprofit that combats sex trafficking by applying face recognition to identify victims and sex traffickers from online commercial sex market imagery.The FBI ranks first among federal law enforcement agencies examined by the GAO for the scale of its use of face recognition. More than 60,000 searches were carried out by seven agencies between October 2019 and March 2022. Over half were made by FBI agents, about 15,000 using Clearview AI and 20,000 using Thorn.
"No existing law requires federal law enforcement personnel to take training before using face recognition or to follow particular standards when using face recognition in a criminal investigation," notes Wired.

"The DOJ plans to issue a department-wide civil rights and civil liberties policy for face recognition but has yet to set a date for planned implementation, according to the report. It says that DOJ officials, at one point in 2022, considered updating its policy to allow a face recognition match alone to justify applying for a search warrant."
Businesses

JPEX Appears To Be a $178 Million Fraud (web3isgoinggreat.com) 45

Web3 is Going Great reports: After the Hong Kong-based JPEX exchange limited withdrawals amidst what appeared to be an impending collapse of the platform, things are now looking a lot more like fraud. Police have received more than 2,200 complaints pertaining to the exchange, involving $178 million in possible losses. Eleven people, including various crypto influencers who had promoted the exchange, were taken in for questioning. However, police have said those eleven people were not likely central to the fraud, and that the leaders of the JPEX project are on the run.
Robotics

New York City Deploys 420-Pound RoboCop to Patrol Subway Station (gothamist.com) 82

"New York City is now turning to robots to help patrol the Times Square subway station," quipped one local newscast.

The non-profit New York City blog Gothamist describes the robot as "almost as tall as the mayor — but at least three-times as wide around the waist," with a maximum speed of 3 miles per hour-- but a 360-degree field of vision, equipped with four cameras to send live video (without audio) to the police. A 420-pound, 5-foot-2-inch robocop with a giant camera for a face will begin patrolling the Times Square subway station overnight, the New York Police Department announced Friday morning. At a press conference held underground in the 42nd Street subway station, New York City Mayor Eric Adams said the city is launching a two-month pilot program to test the Knightscope K5 Autonomous Security Robot. During the press conference, the K5 robot — which is shaped like a small, white rocketship — stood silently along with uniformed officers and city officials in suits. Stripes of glowing blue lights indicated it was "on."

The K5 will act as a crime deterrent and provide real-time information on how to best deploy human officers to a safety incident, the mayor said. It features multiple cameras, a button that can connect the public with a real person, and a speaker for live audio communication... During the pilot program, the K5 will patrol the Times Squares subway station from midnight to 6 a.m. with a human NYPD handler that will help introduce it to the public. After two months, the mayor said the handler will no longer be necessary, and the robot will go on solo patrol...

Knightscope, which manufactures the robot, reports that it has been deployed to 30 clients in 10 states, including at malls and hospitals. The K5 has been in some sticky situations in other cities. One was toppled and slathered in barbecue sauce in San Francisco, while another was beaten by an intoxicated man in Mountain View, California, according to news reports. Another robot fell into a pool of water outside an office building in Washington, D.C.

When asked whether the robot was at risk of vandalism in New York City, the mayor strode over to it and gave it a few firm shoves. "Let's be clear, this is not a pushover. 420 pounds. This is New York tested," he said.

The city is leasing the robot for $9 an hour — And yes, local newscasts couldn't resist calling it a robocop. One shows the mayor announcing "We will continue to stay ahead of those who want to harm everyday New Yorkers."

Though the robot is equipped with facial recognition capability, it will not be activated.
Crime

Did Teens Ally with Ransomware Gangs for MGM Breach? (msn.com) 24

Recent breaches of MGM's casino systems "were probably carried out by teens and young adults who have allied themselves with one of the world's most notorious ransomware gangs," writes the Washington Post's technology reporter.

Their alliance with the "Scattered Spider" group is described as "part of a trend that has alarmed security experts and defenders of corporate computer networks." The group is said to be "very active in the past two years, targeting large companies via stolen employee credentials and tricks such as convincing tech support employees that they have been accidentally locked out of their computers and need a new password." They moved from cryptocurrency thefts to targeting businesses that provide third-party business functions such as help desks and call center staffing, allowing them to infiltrate networks of many customers. And they extorted Western Digital and other technology firms after stealing internal data before heading for the jackpots in Las Vegas. But their willingness to deploy crippling ransomware while demanding money is a major escalation, as is their choice of a business partner: ALPHV, a hacking group whose affiliates include members of the former Russian powerhouses BlackMatter and DarkSide, the groups responsible for the Colonial Pipeline hack that awoke Washington to the national security risk of ransomware. ALPHV provided the BlackCat ransomware that the young hackers installed in the casinos' systems...

[According to new research presented Friday at the LABScon security conference] they came together through crimes enabled by SIM-swapping, which usually involves convincing phone company employees to hand over control of someone else's phone number. Because of poor security controls around those numbers, such gambits have allowed criminals to amass millions of dollars by beating SMS text-based two-factor authentication on cryptocurrency accounts. The extra money has made alliances possible with criminals who have different skills to bring to the table, including some who had hacked police servers and could send emails from purported officers demanding emergency disclosures of information on phone and internet customers. Worse, the researchers said, they have now attracted recruiters for the Russian gangs who want to combine their business savvy with the techniques and local knowledge of the native English speakers.

Crime

Sysadmin, Spouse Admit To Part in 'Massive' Pirated Avaya Licenses Scam (theregister.com) 83

A sysadmin and his partner pleaded guilty this week to being part of a "massive" international ring that sold software licenses worth $88 million for "significantly below the wholesale price." From a report: Brad and Dusti Pearce admitted one count of conspiracy to commit wire fraud and each face a maximum penalty of 20 years in prison. After agreeing to a plea deal, the Pearces must also forfeit at least $4 million as well as gold, silver, collectible coins, cryptocurrency, and a vehicle, and "make full restitution to their victims," the US Department of Justice said. The pair from Tuttle, Oklahoma -- a city better known for its cattle ranchers and alfafa hay than pirated software -- were alleged to have sold pirated Avaya business telephone system software licenses.

The licenses were then used to unlock features of the popular telephone system, which is used by thousands of companies around the globe. Dusti Pearce was said by prosecutors to have looked after the accounting side of the business, although only the wire fraud charge remains under the plea deal. Brad Pearce had previously worked as a customer service employee at Avaya, and was said to have used his admin privileges to "generate tens of thousands of ADI software license keys" that he sold to his main customer, Jason Hines, as well as "other customers, who in turn sold them to resellers and end users around the globe," said the DoJ.

The Courts

The International Criminal Court In The Hague Says It Has Been Hacked (apnews.com) 50

An anonymous reader quotes a report from the Associated Press: The International Criminal Court said Tuesday that it detected "anomalous activity affecting its information systems" last week and took urgent measures to respond. It didn't elaborate on what it called a "cybersecurity incident." Court spokesman Fadi El Abdallah said in a written statement that extra "response and security measures are now ongoing" with the assistance of authorities in the Netherlands, where the court is based. "Looking forward, the Court will be building on existing work presently underway to strengthen its cyber security framework, including accelerating its use of cloud technology," his statement added. The court declined to go into any more detail about the incident, but said that as it "continues to analyze and mitigate the impact of this incident, priority is also being given to ensuring that the core work of the Court continues."
Crime

Las Vegas Still Struggling to Recover from Last Sunday's Cyberattack (go.com) 46

"Chaos and Concern in Sin City," read this morning's headline on a video report from ABC News about "the massive cyberattack in Las Vegas crippling several hotels and casinos, and putting a damper on getaways for thousands of tourists there." "Today marks a week since that cyberattack hit Las Vegas, and MGM hotels and casinos are still working on getting systems back up and running.. The online reservation site for MGM is still down, ATMs not working, and those playing the slot machines or even video poker having to wait for attendants to pay them out in cash. All of this fiasco leading to long lines at check-in, and now a cyber investigation with the FBI...

Other gaming resorts also having issues. Caesar's entertainment says they too were a victim of a cyberattack, but their online operations were not impacted. Then this weekend at the Venetian, an outage shutting down some slots, but the resort says they're back up, and that at least thankfully was not due to a cyber attack.

They report MGM properties were affected as far away as Atlantic City, New Jersey.
Crime

Swedish Criminal Gangs Using Fake Spotify Streams To Launder Money (theguardian.com) 67

Criminal gangs behind a rise in bombings and shootings in Sweden in recent years are using fake Spotify streams to launder money, a Swedish newspaper reported earlier this month. From a report: Criminal networks have for several years been using money from drug deals, robberies, fraud and contract killings to pay for false Spotify streams of songs published by artists with ties to the gangs, an investigative report in Svenska Dagbladet claimed. They then get paid by the platform for the high number of streams, thereby laundering the money. The newspaper said its information had been confirmed by four gang members from separate criminal networks in Stockholm, as well as an anonymous police investigator.
Crime

'Cryptoqueen' Sidekick Gets 20 Years For $4 Billion Ponzi 32

The cofounder and main promoter of the $4 billion OneCoin pyramid scheme was sentenced to 20 years in prison for his role in one of the first and biggest criminal frauds involving cryptocurrency. Bloomberg: Karl Sebastian Greenwood, 46, was sentenced in New York Tuesday, after pleading guilty in December to creating and promoting a phony cryptocurrency. Greenwood was the wingman of Ruja Ignatova, the so-called "Cryptoqueen" and most wanted crypto fugitive in the world. US District Judge Edgardo Ramos called the fraud "massive in many respects," noting that OneCoin had no blockchain, no real cryptocoin and no trading market. Victims could not withdraw their investments and most face the likelihood they'll never get any of their money back. "At base, it involved nothing more than old-fashioned snake oil," the judge said. Greenwoood's sentencing closes one chapter of the OneCoin case, which authorities describe as one of the largest pyramid schemes in history. It impacted 3.5 million victims across the globe and foreshadowed a broader crackdown on crime in the cryptocurrency markets.
Crime

Roblox Cancelled Awards Presentation Due To Security Incident (marketwatch.com) 77

Slashdot reader quonset writes: Roblox Corporation was to have its award ceremony for developers on Saturday when it cancelled the event at the last moment. According to reports, a game developer was reportedly arrested on gun charges outside the event.
More from MarketWatch: Citing jail records, the San Francisco Chronicle reported Sunday that a man identified as game developer Mikhail Olson, known by the nickname Simbuilder, was arrested by U.S. Park Police on suspicion of having a concealed firearm in his vehicle, along with armor-piercing ammunition and a large-capacity magazine.

The awards ceremony was held at Fort Mason Center, which is on federal property. According to the Chronicle, the suspect was arrested Saturday afternoon after allegedly assaulting U.S. Park Police officers who had been called over a report of a disturbance outside the Roblox conference.

Crime

Cheating in Tennis: How Cellphone Records Revealed a Massive Match-Fixing Ring (msn.com) 37

"On the morning of his arrest, Grigor Sargsyan was still fixing matches. Four cellphones buzzed on his nightstand with calls and messages from around the world.... The information on his devices would provide a remarkable window into what has become the world's most manipulated sport, according to betting regulators. Thousands of texts, gambling receipts and bank transfers laid out Sargsyan's ascent in remarkable detail..."

That's part one of a two-part story in which more than 181 tennis players are involved, and from more than 30 countries, fixing more than 375 professional tennis matches. The Washington Post reveals the years-long investigation that began when Belgium's gambling commission tipped off their federal prosecutor's office to "irregular wagers on obscure tennis matches played around the world."

The breakthrough came with geolocation data on a cellphone, cross-referenced against the the names of people who'd recently flown to that country... The bets were made in small towns in the Flemish countryside. The gamblers appeared to be acting on inside information; they consistently won even when they bet against steep odds... [Nicolas Borremans, a 45-year-old police investigator based in the Flanders region of Belgium] knew little about sports. He had never watched an entire tennis match. But even a cursory description of the case was enough for him to see how a gambling operation might be used to launder money...

Within a few months, he had traced the accounts of four men who had placed suspicious bets in Belgium, all Armenian immigrants. Their wagers were mostly small — a few hundred euros each — ostensibly to avoid scrutiny. Almost all of the bets were on low-level professional tennis tournaments, where players earned barely enough to pay for their travel. Borremans secured wiretaps on the gamblers' phones, and a team of Armenian interpreters listened in. It became clear that the gamblers were working for someone. They received detailed instructions about which matches to bet on. They weren't gambling just on the outcomes, but on specific scores for sets and games... Borremans added more gamblers to his diagram. "Money mules," he called them. Eventually, he would uncover 1,671 accounts at gambling establishments across Europe. Many were registered by working-class Armenians: mechanics, a pizza deliveryman, a taxi driver.

While the tennis tour "has in recent months issued a raft of bans and suspensions," the article points out that the scale of the gambler/tennis player network "has remained a secret until now, in part because the tour is still working on active investigations related to the operation." (The professional tennis tour has its own investigation unit "formed in part because of pervasive allegations of match-fixing in the sport," which assisted the Belgian police.)

The operation's "maestro" had tried to evade investigators. (One French player received his payment in 21 separate transfers from Armenia.) The maestro also gave the tennis players anonymously-registered SIM cards for communication. But unfortunately, the article points out, every professional tennis player "signs a contract agreeing to hand their phones over to tennis investigators at any time if required." Soon investigators were reading the mastermind's text messages — and even wiretapping his phone calls to his mother.

His phone's search history would later offer a glimpse into his life and concerns. Sargsyan scoured the internet for references to himself and his players ("maestro tennis," "match fixing tennis hossam"); he did some broader research into his world ("tennis corruption," "armenian mafia"); he searched for ways to spend his new fortune ("escort geneve," "villa rent close port mallorca") But, mostly, he searched for new bookmakers ("croatia betting shop," "usa betting," "mybet Australia").
Caught in the investigation were Sebastian Rivera, the Chilean coach based in the United States, and Slovakian tennis player Dagmara Baskova (who says she was paid 10,000 euros for each thrown match). Another French player told investigators "Since 2015, I estimate that I have accepted to deliberately lose or manipulate the outcome of 20 to 30 matches for Maestro, both in singles and doubles." Some tennis players infuriated the maestro by tipping off other gamblers about their plans to throw matches.

Leaving the courtroom for his own trial, the maestro gave this response to the Post reporter asking how he felt about the courtroom proceedings. "If the prosecutor knew what I know, there would be many more people on trial." Later the maestro was sentenced to five years in prison for fraud, money laundering, and leading a criminal organization.

Slashdot Top Deals