SlideShare a Scribd company logo
1 of 3
Download to read offline
Case 1:20-cr-00254-AJT Document 7 Filed 11/20/20 Page 1 of 3 PageID# 13
IN THE UNITED STATES DISTRICT COURT FOR THE
EASTERN DISTRICT OF VIRGINIA
ALEXANDRIA DIVISION
UNITED STATES OF AMERICA
v. Case No. 1:20-CR-
JIN HORNG HONG,
Defendant.
CRIMINAL INFORMATION
THE UNITED STATES ATTORNEY CHARGES THAT:
The Conspiracy
1. From on or about October 1, 2019, to on or about March 9, 2020, in the Eastern
District of Virginia and elsewhere, the defendant, JIN HORNG HONG, knowingly and
intentionally conspired and agreed with He Li, Shouming Sun, Yuchen Zhang, and others to
commit wire fraud, contrary to Title 18, United States Code, Section 1343, by knowingly devising
and intending to devise a scheme and artifice to defraud and to obtain money and property by
means of materially false and fraudulent pretenses, representations, and promises, and by
concealment of material facts, and to transmit and cause to be transmitted interstate wire
communications in furtherance of the conspiracy, in violation of Title 18, United States Code,
Section 1349.
The Object of the Conspiracy
2. It was the object of the conspiracy for the defendant and co-conspirators Li, Sun,
and Zhang to redeem the value of gift cards that were obtained by other unidentified co-
conspirators through means of materially false or fraudulent pretenses, representations, and
promises.
Case 1:20-cr-00254-AJT Document 7 Filed 11/20/20 Page 2 of 3 PageID# 14
Manner and Means of the Conspiracy
3. In order to effect the object of the conspiracy, the defendant and his co-conspirators
engaged in the following conduct in the Eastern District of Virginia and elsewhere:
a. Unidentified co-conspirators contacted victims by telephone or through
social media.
b. Unidentified co-conspirators assumed fictitious identities, including falsely
claiming to be from the Internal Revenue Service, the Social Security Administration, or
employees of businesses or financial institutions known to the victims, and, among others ruses,
falsely told victims they were entitled to grants or refunds, or in some cases had their personal
identification information compromised. In other cases, unidentified co-conspirators developed
on-line relationships with victims as a means to commit the fraud and effect the object of the
conspiracy.
c. Based on false representations, unidentified co-conspirators fraudulently
induced more than 500 victims to purchase gift cards, including gift cards to be redeemed at
Walmart and Sam’s Club stores.
d. Unidentified co-conspirators then directed the victims to send to members
of the conspiracy through wire communications the gift cards’ redemption codes, which are codes
used to redeem the value of the gift cards without having the physical cards.
e. Defendant HONG and co-conspirators Li, Sun, and Zhang were provided
the redemption codes and used the redemption codes obtained by fraud to purchase goods and
services for their personal benefit and the benefit of their co-conspirators primarily at Walmart and
Sam’s Club locations. These transactions occurred in the Eastern District of Virginia and
elsewhere and each transaction transmitted and caused to be transmitted interstate wire
Case 1:20-cr-00254-AJT Document 7 Filed 11/20/20 Page 3 of 3 PageID# 15
communications in furtherance of the conspiracy.
In violation of Title 18, United States Code, Section 1349.
Respectfully submitted,
G. Zachary Terwilliger
United States Attorney
By: /s/
William Fitzpatrick
Assistant United States Attorney,
Viviana Vasiu
Special Assistant United States Attorney
Date: October 23, 2020

More Related Content

What's hot

Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theftvcrisafulli
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftExperian_US
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Riskmilfamln
 
Computer Crimes - Identity Theft
Computer Crimes - Identity TheftComputer Crimes - Identity Theft
Computer Crimes - Identity TheftJlove Minguez
 
Senior Citizen Crime Prevention
Senior Citizen Crime PreventionSenior Citizen Crime Prevention
Senior Citizen Crime Preventionnilescop053
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfDigital EYE Media
 
New Utility Scam: Alert from David Lerner Associates
New Utility Scam: Alert from David Lerner AssociatesNew Utility Scam: Alert from David Lerner Associates
New Utility Scam: Alert from David Lerner AssociatesDavid Lerner Associates
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Themmilfamln
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Identity Theft: Protecting Our Seniors
Identity Theft: Protecting Our SeniorsIdentity Theft: Protecting Our Seniors
Identity Theft: Protecting Our SeniorsGlennerCenters
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 

What's hot (20)

Features of-scam
Features of-scamFeatures of-scam
Features of-scam
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
 
25 Internet Crimes
25 Internet Crimes25 Internet Crimes
25 Internet Crimes
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Computer Crimes - Identity Theft
Computer Crimes - Identity TheftComputer Crimes - Identity Theft
Computer Crimes - Identity Theft
 
Senior Citizen Crime Prevention
Senior Citizen Crime PreventionSenior Citizen Crime Prevention
Senior Citizen Crime Prevention
 
Fraudulent bank wiring
Fraudulent bank wiringFraudulent bank wiring
Fraudulent bank wiring
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect Yourself
 
Public private partnership Identity Theft
Public private partnership Identity TheftPublic private partnership Identity Theft
Public private partnership Identity Theft
 
New Utility Scam: Alert from David Lerner Associates
New Utility Scam: Alert from David Lerner AssociatesNew Utility Scam: Alert from David Lerner Associates
New Utility Scam: Alert from David Lerner Associates
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Identity Theft: Protecting Our Seniors
Identity Theft: Protecting Our SeniorsIdentity Theft: Protecting Our Seniors
Identity Theft: Protecting Our Seniors
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 

Similar to Edva horng 0

Implied representation
Implied representationImplied representation
Implied representationeleanorrrxo
 
Ch 9 White Collar and Organized Crime
Ch 9 White Collar and Organized CrimeCh 9 White Collar and Organized Crime
Ch 9 White Collar and Organized Crimerharrisonaz
 
Of all the forms of finance finance crimes discussed, which do you c.pdf
Of all the forms of finance finance crimes discussed, which do you c.pdfOf all the forms of finance finance crimes discussed, which do you c.pdf
Of all the forms of finance finance crimes discussed, which do you c.pdfaryan041
 
Assignment 5 consumer fraud protection
Assignment 5 consumer fraud protectionAssignment 5 consumer fraud protection
Assignment 5 consumer fraud protectionBayo Cary
 
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaks
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaksCitizenfour producers-face-legal-challenges-over-edward-snowden-leaks
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaksWaqas Amir
 
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaks
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaksCitizenfour producers-face-legal-challenges-over-edward-snowden-leaks
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaksWaqas Amir
 
Dossier diaspora 1,50 $ Gov.uscourts.nyed.427196.1.0
Dossier diaspora 1,50 $ Gov.uscourts.nyed.427196.1.0Dossier diaspora 1,50 $ Gov.uscourts.nyed.427196.1.0
Dossier diaspora 1,50 $ Gov.uscourts.nyed.427196.1.0Daniel Alouidor
 
The internet prospects
The internet prospects The internet prospects
The internet prospects FawazIbraheem1
 
Gov.uscourts.nyed.427196.52.0 (1)
Gov.uscourts.nyed.427196.52.0 (1)Gov.uscourts.nyed.427196.52.0 (1)
Gov.uscourts.nyed.427196.52.0 (1)Daniel Alouidor
 
Celestin_et_al_v_Martelly_et_al__nyedce-18-07340__0158.0 (1).pdf
Celestin_et_al_v_Martelly_et_al__nyedce-18-07340__0158.0 (1).pdfCelestin_et_al_v_Martelly_et_al__nyedce-18-07340__0158.0 (1).pdf
Celestin_et_al_v_Martelly_et_al__nyedce-18-07340__0158.0 (1).pdfRezoNdws
 
06-30-2005 DOJ Press Release 1
06-30-2005 DOJ Press Release 106-30-2005 DOJ Press Release 1
06-30-2005 DOJ Press Release 1Keith Mathews
 
Два федеральных агента, которые вели дело Silk Road, обвиняются в краже битко...
Два федеральных агента, которые вели дело Silk Road, обвиняются в краже битко...Два федеральных агента, которые вели дело Silk Road, обвиняются в краже битко...
Два федеральных агента, которые вели дело Silk Road, обвиняются в краже битко...Anatol Alizar
 
White collar crime by waseem i. khan
White collar crime by waseem i. khanWhite collar crime by waseem i. khan
White collar crime by waseem i. khanwaseemkhanpbn
 
Defendants google, microsoft and yahoo bring their own judge
Defendants google, microsoft and yahoo bring their own judgeDefendants google, microsoft and yahoo bring their own judge
Defendants google, microsoft and yahoo bring their own judgesusanne kayser-schillegger
 
Madhavi Vuppalapati and Prithvi Information Solutions Involved in Million Fraud
Madhavi Vuppalapati and Prithvi Information Solutions Involved in Million FraudMadhavi Vuppalapati and Prithvi Information Solutions Involved in Million Fraud
Madhavi Vuppalapati and Prithvi Information Solutions Involved in Million Fraudmh37o
 
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docx
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docxTorts, Crimes and BusinessChapter 7 & 8Intent vs.docx
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docxedwardmarivel
 
Short Answer41) Sally operates a large manufacturing firm near.docx
Short Answer41) Sally operates a large manufacturing firm near.docxShort Answer41) Sally operates a large manufacturing firm near.docx
Short Answer41) Sally operates a large manufacturing firm near.docxlesleyryder69361
 
New Kmart Data Breach lawsuit spotlights PCI DSS
 New Kmart Data Breach lawsuit spotlights PCI DSS New Kmart Data Breach lawsuit spotlights PCI DSS
New Kmart Data Breach lawsuit spotlights PCI DSSDavid Sweigert
 

Similar to Edva horng 0 (20)

Implied representation
Implied representationImplied representation
Implied representation
 
Ch 9 White Collar and Organized Crime
Ch 9 White Collar and Organized CrimeCh 9 White Collar and Organized Crime
Ch 9 White Collar and Organized Crime
 
Of all the forms of finance finance crimes discussed, which do you c.pdf
Of all the forms of finance finance crimes discussed, which do you c.pdfOf all the forms of finance finance crimes discussed, which do you c.pdf
Of all the forms of finance finance crimes discussed, which do you c.pdf
 
Assignment 5 consumer fraud protection
Assignment 5 consumer fraud protectionAssignment 5 consumer fraud protection
Assignment 5 consumer fraud protection
 
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaks
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaksCitizenfour producers-face-legal-challenges-over-edward-snowden-leaks
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaks
 
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaks
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaksCitizenfour producers-face-legal-challenges-over-edward-snowden-leaks
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaks
 
Dossier diaspora 1,50 $ Gov.uscourts.nyed.427196.1.0
Dossier diaspora 1,50 $ Gov.uscourts.nyed.427196.1.0Dossier diaspora 1,50 $ Gov.uscourts.nyed.427196.1.0
Dossier diaspora 1,50 $ Gov.uscourts.nyed.427196.1.0
 
Module 4
Module 4Module 4
Module 4
 
The internet prospects
The internet prospects The internet prospects
The internet prospects
 
Gov.uscourts.nyed.427196.52.0 (1)
Gov.uscourts.nyed.427196.52.0 (1)Gov.uscourts.nyed.427196.52.0 (1)
Gov.uscourts.nyed.427196.52.0 (1)
 
Celestin_et_al_v_Martelly_et_al__nyedce-18-07340__0158.0 (1).pdf
Celestin_et_al_v_Martelly_et_al__nyedce-18-07340__0158.0 (1).pdfCelestin_et_al_v_Martelly_et_al__nyedce-18-07340__0158.0 (1).pdf
Celestin_et_al_v_Martelly_et_al__nyedce-18-07340__0158.0 (1).pdf
 
White collar crime
White collar crimeWhite collar crime
White collar crime
 
06-30-2005 DOJ Press Release 1
06-30-2005 DOJ Press Release 106-30-2005 DOJ Press Release 1
06-30-2005 DOJ Press Release 1
 
Два федеральных агента, которые вели дело Silk Road, обвиняются в краже битко...
Два федеральных агента, которые вели дело Silk Road, обвиняются в краже битко...Два федеральных агента, которые вели дело Silk Road, обвиняются в краже битко...
Два федеральных агента, которые вели дело Silk Road, обвиняются в краже битко...
 
White collar crime by waseem i. khan
White collar crime by waseem i. khanWhite collar crime by waseem i. khan
White collar crime by waseem i. khan
 
Defendants google, microsoft and yahoo bring their own judge
Defendants google, microsoft and yahoo bring their own judgeDefendants google, microsoft and yahoo bring their own judge
Defendants google, microsoft and yahoo bring their own judge
 
Madhavi Vuppalapati and Prithvi Information Solutions Involved in Million Fraud
Madhavi Vuppalapati and Prithvi Information Solutions Involved in Million FraudMadhavi Vuppalapati and Prithvi Information Solutions Involved in Million Fraud
Madhavi Vuppalapati and Prithvi Information Solutions Involved in Million Fraud
 
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docx
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docxTorts, Crimes and BusinessChapter 7 & 8Intent vs.docx
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docx
 
Short Answer41) Sally operates a large manufacturing firm near.docx
Short Answer41) Sally operates a large manufacturing firm near.docxShort Answer41) Sally operates a large manufacturing firm near.docx
Short Answer41) Sally operates a large manufacturing firm near.docx
 
New Kmart Data Breach lawsuit spotlights PCI DSS
 New Kmart Data Breach lawsuit spotlights PCI DSS New Kmart Data Breach lawsuit spotlights PCI DSS
New Kmart Data Breach lawsuit spotlights PCI DSS
 

More from fadliwiryawirawan

Draft20212022 budgetbooko(1)
Draft20212022 budgetbooko(1)Draft20212022 budgetbooko(1)
Draft20212022 budgetbooko(1)fadliwiryawirawan
 
Australia professional-membership-application frm-eng_0720
Australia professional-membership-application frm-eng_0720Australia professional-membership-application frm-eng_0720
Australia professional-membership-application frm-eng_0720fadliwiryawirawan
 
Presentasiakhir2020developer(fadliwiryawirawan)
Presentasiakhir2020developer(fadliwiryawirawan)Presentasiakhir2020developer(fadliwiryawirawan)
Presentasiakhir2020developer(fadliwiryawirawan)fadliwiryawirawan
 
Nist.sp.800 63-3 (google cloude)
Nist.sp.800 63-3 (google cloude) Nist.sp.800 63-3 (google cloude)
Nist.sp.800 63-3 (google cloude) fadliwiryawirawan
 

More from fadliwiryawirawan (10)

KEAMANAN WEBISTE
KEAMANAN WEBISTE KEAMANAN WEBISTE
KEAMANAN WEBISTE
 
Premium profile-cta
Premium profile-ctaPremium profile-cta
Premium profile-cta
 
Draft20212022 budgetbooko(1)
Draft20212022 budgetbooko(1)Draft20212022 budgetbooko(1)
Draft20212022 budgetbooko(1)
 
Block ben whitepaper
Block ben whitepaperBlock ben whitepaper
Block ben whitepaper
 
2020 amendsandrepeals
2020 amendsandrepeals2020 amendsandrepeals
2020 amendsandrepeals
 
Australia professional-membership-application frm-eng_0720
Australia professional-membership-application frm-eng_0720Australia professional-membership-application frm-eng_0720
Australia professional-membership-application frm-eng_0720
 
CBO- ECONOMIC 2020 -230
CBO- ECONOMIC 2020 -230 CBO- ECONOMIC 2020 -230
CBO- ECONOMIC 2020 -230
 
Presentasiakhir2020developer(fadliwiryawirawan)
Presentasiakhir2020developer(fadliwiryawirawan)Presentasiakhir2020developer(fadliwiryawirawan)
Presentasiakhir2020developer(fadliwiryawirawan)
 
Gov belgium id
Gov belgium idGov belgium id
Gov belgium id
 
Nist.sp.800 63-3 (google cloude)
Nist.sp.800 63-3 (google cloude) Nist.sp.800 63-3 (google cloude)
Nist.sp.800 63-3 (google cloude)
 

Recently uploaded

LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORNLITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORNtntlai16
 
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxBEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxthusosetemere
 
History of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathHistory of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathphntsoaki
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityHung Le
 
"I hear you": Moving beyond empathy in UXR
"I hear you": Moving beyond empathy in UXR"I hear you": Moving beyond empathy in UXR
"I hear you": Moving beyond empathy in UXRMegan Campos
 
ECOLOGY OF FISHES.pptx full presentation
ECOLOGY OF FISHES.pptx full presentationECOLOGY OF FISHES.pptx full presentation
ECOLOGY OF FISHES.pptx full presentationFahadFazal7
 
Using AI to boost productivity for developers
Using AI to boost productivity for developersUsing AI to boost productivity for developers
Using AI to boost productivity for developersTeri Eyenike
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoKayode Fayemi
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...David Celestin
 
Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20rejz122017
 
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESBIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESfuthumetsaneliswa
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...ZurliaSoop
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.thamaeteboho94
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfMahamudul Hasan
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalFabian de Rijk
 
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. MumbaiCall Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. MumbaiPriya Reddy
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfSkillCertProExams
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lodhisaajjda
 

Recently uploaded (20)

LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORNLITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
 
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxBEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
 
History of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathHistory of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth death
 
Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...
Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...
Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
 
"I hear you": Moving beyond empathy in UXR
"I hear you": Moving beyond empathy in UXR"I hear you": Moving beyond empathy in UXR
"I hear you": Moving beyond empathy in UXR
 
ECOLOGY OF FISHES.pptx full presentation
ECOLOGY OF FISHES.pptx full presentationECOLOGY OF FISHES.pptx full presentation
ECOLOGY OF FISHES.pptx full presentation
 
Using AI to boost productivity for developers
Using AI to boost productivity for developersUsing AI to boost productivity for developers
Using AI to boost productivity for developers
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20
 
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESBIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. MumbaiCall Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 

Edva horng 0

  • 1. Case 1:20-cr-00254-AJT Document 7 Filed 11/20/20 Page 1 of 3 PageID# 13 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA ALEXANDRIA DIVISION UNITED STATES OF AMERICA v. Case No. 1:20-CR- JIN HORNG HONG, Defendant. CRIMINAL INFORMATION THE UNITED STATES ATTORNEY CHARGES THAT: The Conspiracy 1. From on or about October 1, 2019, to on or about March 9, 2020, in the Eastern District of Virginia and elsewhere, the defendant, JIN HORNG HONG, knowingly and intentionally conspired and agreed with He Li, Shouming Sun, Yuchen Zhang, and others to commit wire fraud, contrary to Title 18, United States Code, Section 1343, by knowingly devising and intending to devise a scheme and artifice to defraud and to obtain money and property by means of materially false and fraudulent pretenses, representations, and promises, and by concealment of material facts, and to transmit and cause to be transmitted interstate wire communications in furtherance of the conspiracy, in violation of Title 18, United States Code, Section 1349. The Object of the Conspiracy 2. It was the object of the conspiracy for the defendant and co-conspirators Li, Sun, and Zhang to redeem the value of gift cards that were obtained by other unidentified co- conspirators through means of materially false or fraudulent pretenses, representations, and promises.
  • 2. Case 1:20-cr-00254-AJT Document 7 Filed 11/20/20 Page 2 of 3 PageID# 14 Manner and Means of the Conspiracy 3. In order to effect the object of the conspiracy, the defendant and his co-conspirators engaged in the following conduct in the Eastern District of Virginia and elsewhere: a. Unidentified co-conspirators contacted victims by telephone or through social media. b. Unidentified co-conspirators assumed fictitious identities, including falsely claiming to be from the Internal Revenue Service, the Social Security Administration, or employees of businesses or financial institutions known to the victims, and, among others ruses, falsely told victims they were entitled to grants or refunds, or in some cases had their personal identification information compromised. In other cases, unidentified co-conspirators developed on-line relationships with victims as a means to commit the fraud and effect the object of the conspiracy. c. Based on false representations, unidentified co-conspirators fraudulently induced more than 500 victims to purchase gift cards, including gift cards to be redeemed at Walmart and Sam’s Club stores. d. Unidentified co-conspirators then directed the victims to send to members of the conspiracy through wire communications the gift cards’ redemption codes, which are codes used to redeem the value of the gift cards without having the physical cards. e. Defendant HONG and co-conspirators Li, Sun, and Zhang were provided the redemption codes and used the redemption codes obtained by fraud to purchase goods and services for their personal benefit and the benefit of their co-conspirators primarily at Walmart and Sam’s Club locations. These transactions occurred in the Eastern District of Virginia and elsewhere and each transaction transmitted and caused to be transmitted interstate wire
  • 3. Case 1:20-cr-00254-AJT Document 7 Filed 11/20/20 Page 3 of 3 PageID# 15 communications in furtherance of the conspiracy. In violation of Title 18, United States Code, Section 1349. Respectfully submitted, G. Zachary Terwilliger United States Attorney By: /s/ William Fitzpatrick Assistant United States Attorney, Viviana Vasiu Special Assistant United States Attorney Date: October 23, 2020