SlideShare a Scribd company logo
Case 1:20-cr-00254-AJT Document 7 Filed 11/20/20 Page 1 of 3 PageID# 13
IN THE UNITED STATES DISTRICT COURT FOR THE
EASTERN DISTRICT OF VIRGINIA
ALEXANDRIA DIVISION
UNITED STATES OF AMERICA
v. Case No. 1:20-CR-
JIN HORNG HONG,
Defendant.
CRIMINAL INFORMATION
THE UNITED STATES ATTORNEY CHARGES THAT:
The Conspiracy
1. From on or about October 1, 2019, to on or about March 9, 2020, in the Eastern
District of Virginia and elsewhere, the defendant, JIN HORNG HONG, knowingly and
intentionally conspired and agreed with He Li, Shouming Sun, Yuchen Zhang, and others to
commit wire fraud, contrary to Title 18, United States Code, Section 1343, by knowingly devising
and intending to devise a scheme and artifice to defraud and to obtain money and property by
means of materially false and fraudulent pretenses, representations, and promises, and by
concealment of material facts, and to transmit and cause to be transmitted interstate wire
communications in furtherance of the conspiracy, in violation of Title 18, United States Code,
Section 1349.
The Object of the Conspiracy
2. It was the object of the conspiracy for the defendant and co-conspirators Li, Sun,
and Zhang to redeem the value of gift cards that were obtained by other unidentified co-
conspirators through means of materially false or fraudulent pretenses, representations, and
promises.
Case 1:20-cr-00254-AJT Document 7 Filed 11/20/20 Page 2 of 3 PageID# 14
Manner and Means of the Conspiracy
3. In order to effect the object of the conspiracy, the defendant and his co-conspirators
engaged in the following conduct in the Eastern District of Virginia and elsewhere:
a. Unidentified co-conspirators contacted victims by telephone or through
social media.
b. Unidentified co-conspirators assumed fictitious identities, including falsely
claiming to be from the Internal Revenue Service, the Social Security Administration, or
employees of businesses or financial institutions known to the victims, and, among others ruses,
falsely told victims they were entitled to grants or refunds, or in some cases had their personal
identification information compromised. In other cases, unidentified co-conspirators developed
on-line relationships with victims as a means to commit the fraud and effect the object of the
conspiracy.
c. Based on false representations, unidentified co-conspirators fraudulently
induced more than 500 victims to purchase gift cards, including gift cards to be redeemed at
Walmart and Sam’s Club stores.
d. Unidentified co-conspirators then directed the victims to send to members
of the conspiracy through wire communications the gift cards’ redemption codes, which are codes
used to redeem the value of the gift cards without having the physical cards.
e. Defendant HONG and co-conspirators Li, Sun, and Zhang were provided
the redemption codes and used the redemption codes obtained by fraud to purchase goods and
services for their personal benefit and the benefit of their co-conspirators primarily at Walmart and
Sam’s Club locations. These transactions occurred in the Eastern District of Virginia and
elsewhere and each transaction transmitted and caused to be transmitted interstate wire
Case 1:20-cr-00254-AJT Document 7 Filed 11/20/20 Page 3 of 3 PageID# 15
communications in furtherance of the conspiracy.
In violation of Title 18, United States Code, Section 1349.
Respectfully submitted,
G. Zachary Terwilliger
United States Attorney
By: /s/
William Fitzpatrick
Assistant United States Attorney,
Viviana Vasiu
Special Assistant United States Attorney
Date: October 23, 2020

More Related Content

What's hot

Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theftvcrisafulli
 
25 Internet Crimes
25 Internet Crimes25 Internet Crimes
25 Internet Crimes
Daily 10 Minutes
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
Experian_US
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
hewie
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
milfamln
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
Fairfax County
 
Computer Crimes - Identity Theft
Computer Crimes - Identity TheftComputer Crimes - Identity Theft
Computer Crimes - Identity TheftJlove Minguez
 
Senior Citizen Crime Prevention
Senior Citizen Crime PreventionSenior Citizen Crime Prevention
Senior Citizen Crime Prevention
nilescop053
 
Fraudulent bank wiring
Fraudulent bank wiringFraudulent bank wiring
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect Yourself
Digital EYE Media
 
Public private partnership Identity Theft
Public private partnership Identity TheftPublic private partnership Identity Theft
Public private partnership Identity Theft
Palmbeachpolicechiefsassociation
 
New Utility Scam: Alert from David Lerner Associates
New Utility Scam: Alert from David Lerner AssociatesNew Utility Scam: Alert from David Lerner Associates
New Utility Scam: Alert from David Lerner Associates
David Lerner Associates
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
milfamln
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Identity Theft: Protecting Our Seniors
Identity Theft: Protecting Our SeniorsIdentity Theft: Protecting Our Seniors
Identity Theft: Protecting Our Seniors
GlennerCenters
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
carlgiardina
 

What's hot (20)

Features of-scam
Features of-scamFeatures of-scam
Features of-scam
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
 
25 Internet Crimes
25 Internet Crimes25 Internet Crimes
25 Internet Crimes
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Computer Crimes - Identity Theft
Computer Crimes - Identity TheftComputer Crimes - Identity Theft
Computer Crimes - Identity Theft
 
Senior Citizen Crime Prevention
Senior Citizen Crime PreventionSenior Citizen Crime Prevention
Senior Citizen Crime Prevention
 
Fraudulent bank wiring
Fraudulent bank wiringFraudulent bank wiring
Fraudulent bank wiring
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect Yourself
 
Public private partnership Identity Theft
Public private partnership Identity TheftPublic private partnership Identity Theft
Public private partnership Identity Theft
 
New Utility Scam: Alert from David Lerner Associates
New Utility Scam: Alert from David Lerner AssociatesNew Utility Scam: Alert from David Lerner Associates
New Utility Scam: Alert from David Lerner Associates
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Identity Theft: Protecting Our Seniors
Identity Theft: Protecting Our SeniorsIdentity Theft: Protecting Our Seniors
Identity Theft: Protecting Our Seniors
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 

Similar to Edva horng 0

Implied representation
Implied representationImplied representation
Implied representation
eleanorrrxo
 
Ch 9 White Collar and Organized Crime
Ch 9 White Collar and Organized CrimeCh 9 White Collar and Organized Crime
Ch 9 White Collar and Organized Crimerharrisonaz
 
Of all the forms of finance finance crimes discussed, which do you c.pdf
Of all the forms of finance finance crimes discussed, which do you c.pdfOf all the forms of finance finance crimes discussed, which do you c.pdf
Of all the forms of finance finance crimes discussed, which do you c.pdf
aryan041
 
Assignment 5 consumer fraud protection
Assignment 5 consumer fraud protectionAssignment 5 consumer fraud protection
Assignment 5 consumer fraud protection
Bayo Cary
 
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaks
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaksCitizenfour producers-face-legal-challenges-over-edward-snowden-leaks
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaksWaqas Amir
 
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaks
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaksCitizenfour producers-face-legal-challenges-over-edward-snowden-leaks
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaks
Waqas Amir
 
Dossier diaspora 1,50 $ Gov.uscourts.nyed.427196.1.0
Dossier diaspora 1,50 $ Gov.uscourts.nyed.427196.1.0Dossier diaspora 1,50 $ Gov.uscourts.nyed.427196.1.0
Dossier diaspora 1,50 $ Gov.uscourts.nyed.427196.1.0
Daniel Alouidor
 
Module 4
Module 4Module 4
Module 4
alliedccd
 
The internet prospects
The internet prospects The internet prospects
The internet prospects
FawazIbraheem1
 
Gov.uscourts.nyed.427196.52.0 (1)
Gov.uscourts.nyed.427196.52.0 (1)Gov.uscourts.nyed.427196.52.0 (1)
Gov.uscourts.nyed.427196.52.0 (1)
Daniel Alouidor
 
Celestin_et_al_v_Martelly_et_al__nyedce-18-07340__0158.0 (1).pdf
Celestin_et_al_v_Martelly_et_al__nyedce-18-07340__0158.0 (1).pdfCelestin_et_al_v_Martelly_et_al__nyedce-18-07340__0158.0 (1).pdf
Celestin_et_al_v_Martelly_et_al__nyedce-18-07340__0158.0 (1).pdf
RezoNdws
 
White collar crime
White collar crimeWhite collar crime
White collar crime
Asian Paint Bangladesh Ltd
 
06-30-2005 DOJ Press Release 1
06-30-2005 DOJ Press Release 106-30-2005 DOJ Press Release 1
06-30-2005 DOJ Press Release 1Keith Mathews
 
Два федеральных агента, которые вели дело Silk Road, обвиняются в краже битко...
Два федеральных агента, которые вели дело Silk Road, обвиняются в краже битко...Два федеральных агента, которые вели дело Silk Road, обвиняются в краже битко...
Два федеральных агента, которые вели дело Silk Road, обвиняются в краже битко...
Anatol Alizar
 
White collar crime by waseem i. khan
White collar crime by waseem i. khanWhite collar crime by waseem i. khan
White collar crime by waseem i. khan
waseemkhanpbn
 
Defendants google, microsoft and yahoo bring their own judge
Defendants google, microsoft and yahoo bring their own judgeDefendants google, microsoft and yahoo bring their own judge
Defendants google, microsoft and yahoo bring their own judge
susanne kayser-schillegger
 
Madhavi Vuppalapati and Prithvi Information Solutions Involved in Million Fraud
Madhavi Vuppalapati and Prithvi Information Solutions Involved in Million FraudMadhavi Vuppalapati and Prithvi Information Solutions Involved in Million Fraud
Madhavi Vuppalapati and Prithvi Information Solutions Involved in Million Fraud
mh37o
 
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docx
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docxTorts, Crimes and BusinessChapter 7 & 8Intent vs.docx
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docx
edwardmarivel
 
Short Answer41) Sally operates a large manufacturing firm near.docx
Short Answer41) Sally operates a large manufacturing firm near.docxShort Answer41) Sally operates a large manufacturing firm near.docx
Short Answer41) Sally operates a large manufacturing firm near.docx
lesleyryder69361
 
New Kmart Data Breach lawsuit spotlights PCI DSS
 New Kmart Data Breach lawsuit spotlights PCI DSS New Kmart Data Breach lawsuit spotlights PCI DSS
New Kmart Data Breach lawsuit spotlights PCI DSS
David Sweigert
 

Similar to Edva horng 0 (20)

Implied representation
Implied representationImplied representation
Implied representation
 
Ch 9 White Collar and Organized Crime
Ch 9 White Collar and Organized CrimeCh 9 White Collar and Organized Crime
Ch 9 White Collar and Organized Crime
 
Of all the forms of finance finance crimes discussed, which do you c.pdf
Of all the forms of finance finance crimes discussed, which do you c.pdfOf all the forms of finance finance crimes discussed, which do you c.pdf
Of all the forms of finance finance crimes discussed, which do you c.pdf
 
Assignment 5 consumer fraud protection
Assignment 5 consumer fraud protectionAssignment 5 consumer fraud protection
Assignment 5 consumer fraud protection
 
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaks
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaksCitizenfour producers-face-legal-challenges-over-edward-snowden-leaks
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaks
 
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaks
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaksCitizenfour producers-face-legal-challenges-over-edward-snowden-leaks
Citizenfour producers-face-legal-challenges-over-edward-snowden-leaks
 
Dossier diaspora 1,50 $ Gov.uscourts.nyed.427196.1.0
Dossier diaspora 1,50 $ Gov.uscourts.nyed.427196.1.0Dossier diaspora 1,50 $ Gov.uscourts.nyed.427196.1.0
Dossier diaspora 1,50 $ Gov.uscourts.nyed.427196.1.0
 
Module 4
Module 4Module 4
Module 4
 
The internet prospects
The internet prospects The internet prospects
The internet prospects
 
Gov.uscourts.nyed.427196.52.0 (1)
Gov.uscourts.nyed.427196.52.0 (1)Gov.uscourts.nyed.427196.52.0 (1)
Gov.uscourts.nyed.427196.52.0 (1)
 
Celestin_et_al_v_Martelly_et_al__nyedce-18-07340__0158.0 (1).pdf
Celestin_et_al_v_Martelly_et_al__nyedce-18-07340__0158.0 (1).pdfCelestin_et_al_v_Martelly_et_al__nyedce-18-07340__0158.0 (1).pdf
Celestin_et_al_v_Martelly_et_al__nyedce-18-07340__0158.0 (1).pdf
 
White collar crime
White collar crimeWhite collar crime
White collar crime
 
06-30-2005 DOJ Press Release 1
06-30-2005 DOJ Press Release 106-30-2005 DOJ Press Release 1
06-30-2005 DOJ Press Release 1
 
Два федеральных агента, которые вели дело Silk Road, обвиняются в краже битко...
Два федеральных агента, которые вели дело Silk Road, обвиняются в краже битко...Два федеральных агента, которые вели дело Silk Road, обвиняются в краже битко...
Два федеральных агента, которые вели дело Silk Road, обвиняются в краже битко...
 
White collar crime by waseem i. khan
White collar crime by waseem i. khanWhite collar crime by waseem i. khan
White collar crime by waseem i. khan
 
Defendants google, microsoft and yahoo bring their own judge
Defendants google, microsoft and yahoo bring their own judgeDefendants google, microsoft and yahoo bring their own judge
Defendants google, microsoft and yahoo bring their own judge
 
Madhavi Vuppalapati and Prithvi Information Solutions Involved in Million Fraud
Madhavi Vuppalapati and Prithvi Information Solutions Involved in Million FraudMadhavi Vuppalapati and Prithvi Information Solutions Involved in Million Fraud
Madhavi Vuppalapati and Prithvi Information Solutions Involved in Million Fraud
 
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docx
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docxTorts, Crimes and BusinessChapter 7 & 8Intent vs.docx
Torts, Crimes and BusinessChapter 7 & 8Intent vs.docx
 
Short Answer41) Sally operates a large manufacturing firm near.docx
Short Answer41) Sally operates a large manufacturing firm near.docxShort Answer41) Sally operates a large manufacturing firm near.docx
Short Answer41) Sally operates a large manufacturing firm near.docx
 
New Kmart Data Breach lawsuit spotlights PCI DSS
 New Kmart Data Breach lawsuit spotlights PCI DSS New Kmart Data Breach lawsuit spotlights PCI DSS
New Kmart Data Breach lawsuit spotlights PCI DSS
 

More from fadliwiryawirawan

KEAMANAN WEBISTE
KEAMANAN WEBISTE KEAMANAN WEBISTE
KEAMANAN WEBISTE
fadliwiryawirawan
 
Premium profile-cta
Premium profile-ctaPremium profile-cta
Premium profile-cta
fadliwiryawirawan
 
Draft20212022 budgetbooko(1)
Draft20212022 budgetbooko(1)Draft20212022 budgetbooko(1)
Draft20212022 budgetbooko(1)
fadliwiryawirawan
 
Block ben whitepaper
Block ben whitepaperBlock ben whitepaper
Block ben whitepaper
fadliwiryawirawan
 
2020 amendsandrepeals
2020 amendsandrepeals2020 amendsandrepeals
2020 amendsandrepeals
fadliwiryawirawan
 
Australia professional-membership-application frm-eng_0720
Australia professional-membership-application frm-eng_0720Australia professional-membership-application frm-eng_0720
Australia professional-membership-application frm-eng_0720
fadliwiryawirawan
 
CBO- ECONOMIC 2020 -230
CBO- ECONOMIC 2020 -230 CBO- ECONOMIC 2020 -230
CBO- ECONOMIC 2020 -230
fadliwiryawirawan
 
Presentasiakhir2020developer(fadliwiryawirawan)
Presentasiakhir2020developer(fadliwiryawirawan)Presentasiakhir2020developer(fadliwiryawirawan)
Presentasiakhir2020developer(fadliwiryawirawan)
fadliwiryawirawan
 
Gov belgium id
Gov belgium idGov belgium id
Gov belgium id
fadliwiryawirawan
 
Nist.sp.800 63-3 (google cloude)
Nist.sp.800 63-3 (google cloude) Nist.sp.800 63-3 (google cloude)
Nist.sp.800 63-3 (google cloude)
fadliwiryawirawan
 

More from fadliwiryawirawan (10)

KEAMANAN WEBISTE
KEAMANAN WEBISTE KEAMANAN WEBISTE
KEAMANAN WEBISTE
 
Premium profile-cta
Premium profile-ctaPremium profile-cta
Premium profile-cta
 
Draft20212022 budgetbooko(1)
Draft20212022 budgetbooko(1)Draft20212022 budgetbooko(1)
Draft20212022 budgetbooko(1)
 
Block ben whitepaper
Block ben whitepaperBlock ben whitepaper
Block ben whitepaper
 
2020 amendsandrepeals
2020 amendsandrepeals2020 amendsandrepeals
2020 amendsandrepeals
 
Australia professional-membership-application frm-eng_0720
Australia professional-membership-application frm-eng_0720Australia professional-membership-application frm-eng_0720
Australia professional-membership-application frm-eng_0720
 
CBO- ECONOMIC 2020 -230
CBO- ECONOMIC 2020 -230 CBO- ECONOMIC 2020 -230
CBO- ECONOMIC 2020 -230
 
Presentasiakhir2020developer(fadliwiryawirawan)
Presentasiakhir2020developer(fadliwiryawirawan)Presentasiakhir2020developer(fadliwiryawirawan)
Presentasiakhir2020developer(fadliwiryawirawan)
 
Gov belgium id
Gov belgium idGov belgium id
Gov belgium id
 
Nist.sp.800 63-3 (google cloude)
Nist.sp.800 63-3 (google cloude) Nist.sp.800 63-3 (google cloude)
Nist.sp.800 63-3 (google cloude)
 

Recently uploaded

Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AwangAniqkmals
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Dutch Power
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Rosie Wells
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
Frederic Leger
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
amekonnen
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Dutch Power
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
gharris9
 
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
SkillCertProExams
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
kkirkland2
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Gregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics PresentationGregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics Presentation
gharris9
 

Recently uploaded (19)

Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
AWANG ANIQKMALBIN AWANG TAJUDIN B22080004 ASSIGNMENT 2 MPU3193 PHILOSOPHY AND...
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
 
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Gregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics PresentationGregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics Presentation
 

Edva horng 0

  • 1. Case 1:20-cr-00254-AJT Document 7 Filed 11/20/20 Page 1 of 3 PageID# 13 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA ALEXANDRIA DIVISION UNITED STATES OF AMERICA v. Case No. 1:20-CR- JIN HORNG HONG, Defendant. CRIMINAL INFORMATION THE UNITED STATES ATTORNEY CHARGES THAT: The Conspiracy 1. From on or about October 1, 2019, to on or about March 9, 2020, in the Eastern District of Virginia and elsewhere, the defendant, JIN HORNG HONG, knowingly and intentionally conspired and agreed with He Li, Shouming Sun, Yuchen Zhang, and others to commit wire fraud, contrary to Title 18, United States Code, Section 1343, by knowingly devising and intending to devise a scheme and artifice to defraud and to obtain money and property by means of materially false and fraudulent pretenses, representations, and promises, and by concealment of material facts, and to transmit and cause to be transmitted interstate wire communications in furtherance of the conspiracy, in violation of Title 18, United States Code, Section 1349. The Object of the Conspiracy 2. It was the object of the conspiracy for the defendant and co-conspirators Li, Sun, and Zhang to redeem the value of gift cards that were obtained by other unidentified co- conspirators through means of materially false or fraudulent pretenses, representations, and promises.
  • 2. Case 1:20-cr-00254-AJT Document 7 Filed 11/20/20 Page 2 of 3 PageID# 14 Manner and Means of the Conspiracy 3. In order to effect the object of the conspiracy, the defendant and his co-conspirators engaged in the following conduct in the Eastern District of Virginia and elsewhere: a. Unidentified co-conspirators contacted victims by telephone or through social media. b. Unidentified co-conspirators assumed fictitious identities, including falsely claiming to be from the Internal Revenue Service, the Social Security Administration, or employees of businesses or financial institutions known to the victims, and, among others ruses, falsely told victims they were entitled to grants or refunds, or in some cases had their personal identification information compromised. In other cases, unidentified co-conspirators developed on-line relationships with victims as a means to commit the fraud and effect the object of the conspiracy. c. Based on false representations, unidentified co-conspirators fraudulently induced more than 500 victims to purchase gift cards, including gift cards to be redeemed at Walmart and Sam’s Club stores. d. Unidentified co-conspirators then directed the victims to send to members of the conspiracy through wire communications the gift cards’ redemption codes, which are codes used to redeem the value of the gift cards without having the physical cards. e. Defendant HONG and co-conspirators Li, Sun, and Zhang were provided the redemption codes and used the redemption codes obtained by fraud to purchase goods and services for their personal benefit and the benefit of their co-conspirators primarily at Walmart and Sam’s Club locations. These transactions occurred in the Eastern District of Virginia and elsewhere and each transaction transmitted and caused to be transmitted interstate wire
  • 3. Case 1:20-cr-00254-AJT Document 7 Filed 11/20/20 Page 3 of 3 PageID# 15 communications in furtherance of the conspiracy. In violation of Title 18, United States Code, Section 1349. Respectfully submitted, G. Zachary Terwilliger United States Attorney By: /s/ William Fitzpatrick Assistant United States Attorney, Viviana Vasiu Special Assistant United States Attorney Date: October 23, 2020