A guy says he gave $3M of Bitcoin to a stranger to sell in Hong Kong and, you guessed it, says he never saw it again

By Christine Duhaime | March 7th, 2019

This is one of those stories that could only happen in the Bitcoin world.

In June 2017, a guy named Nico Constantijn Samara, from the Netherlands, who owned over 1,000 Bitcoin worth US$3.1 million, travelled to Hong Kong to sell them to a stranger. When he arrived, he discovered that under Hong Kong banking law, non-residents cannot open accounts. So he agreed to transfer his Bitcoin to a stranger, who would use an exchange to cash out the Bitcoin, and because he could not obtain a bank account, he would allow the proceeds from the Bitcoin sales to go to the stranger’s bank account at Citi.

The stranger’s name was Stive Jean-Paul Dan, aka Steve jean-Paul Dan, aka Stive Jean Paul Dan, aka Steve Jean Paul Dan.

According to Court documents, Mr. Samara transferred 1,000 Bitcoin away, to a wallet address at Gatecoin, where Mr. Dan had an account. And Mr. Samara started selling some of the Bitcoin and cashed out, from time to time, from the exchange to his Citi bank account.

According to Court documents, the stranger gave Mr. Samara access to his Citi bank account online so that he could transfer the proceeds to Germany, where Mr. Samara had a bank account.

Allegedly, a total of $520,000 was transferred from the exchange to Citibank and accessed by Mr. Samara from Hong Kong, where he transferred it to Germany. But Mr. Samara had transferred $3,118,139 in Bitcoin to Mr. Dan. Soon after, his access to the Citi bank account was removed and he was out $2.5 million, and shortly thereafter, he was unable to reach Mr. Dan.

Mr. Samara asked the exchange, Gatecoin, to place a hold on the Bitcoin wallet of Mr. Dan, which they did without a Court order. They informed Mr. Samara that Mr. Dan had only 40 Bitcoin left. A month after that blockage, Mr. Dan tried to withdraw funds at Gatecoin, which Gatecoin informed Mr. Samara of.

Mr. Samara applied to the Hong Kong Court ex parte, for a mareva injunction successfully over the bank account and Bitcoin wallet.

Mr. Dan applied to have the mareva injunction set aside on the basis that there was no basis for it to have been done ex parte.

The Hong Kong Court held that there was no reason for Mr. Samara to have applied ex parte because Citi bank and Gatecoin had already, without Court orders, frozen the accounts and the lack of movement for 3 months on a mareva made it non-urgent. Mr. Samara’s delayed for three months because his law firm appears to have taken that long to work on it, according to the affidavit evidence.

The Hong Kong Court accepted that a mareva injunction is a nuclear weapon in law and there must be objective evidence that ties the order to the person for the Court to agree to launch a nuclear weapon against a person. It will not be done on mere allegations, unsupported by real evidence. At the hearing, the defendant denied all the allegations.

A mareva injunction requires an undertaking as to damages by the applicant (for the harm they cause by that nuclear weapon if they are later determined to have been wrong). Mr. Samara was asked to provide an undertaking to continue the mareva injunction, but refused to show his financials. As a result, the mareva was removed.

This case is additionally odd because while a mareva injunction is a nuclear weapon, this one was not – it was merely over two account which held funds owned by Mr. Samara.

We don’t know what happened to Mr. Samara’s $3M in Bitcoin.

Share this Post:
  • Facebook
  • Twitter
  • LinkedIn
  • Print
  • email

Alleged drug dealer in Vancouver tied to Silk Road facing extradition

By Christine Duhaime | March 3rd, 2019

A Vancouver man, James Ellingson, is the subject of an extradition request by the US, based on charges that include money laundering and narcotics importation from the Southern District of New York.

Ellingson was arrested in Vancouver on October 29, 2018, under an Extradition Act provisional warrant. According to the SDNY, Ellingson sold drugs on the darknet site Silk Road, that was shut down by the FBI. He is alleged to have been a user named “Marijuanaismymuse” and under that user name, allegedly was a prolific drug seller, selling 19 kilos of marijuana (this is what 19 kilos of marijuana looks like), 7 kilos of MDMA, 4 kilos of meth (this is what 4 kilos of meth looks like), 2 kilos of cocaine (this is what 2 kilos of cocaine looks like) and 100 grams of heroin to various online purchasers and was paid over time, with $2 million in Bitcoin.

The proceeds of crime earned in Vancouver in Bitcoin was apparently funnelled through a Canadian digital currency exchange. Drug sales over the darknet, if they involve Vancouver traffickers, are shipped by Canada Post in little packages to buyers, so one can imagine that the extent of the operation and number of transactions was likely quite high.

Ellingson has a long criminal record in Vancouver, including convictions for criminal harassment, assault, possession of a prohibited weapon, drug trafficking and drug possession and according to the allegations, appears to have continued criminal activities on the darknet.

In order to locate the user behind “Marijuanaismymuse”, the FBI undertook Bitcoin wallet tracing and obtained a court order for Gmail records. According to affidavit evidence, Ellingson communicated with Ross Ulbricht, the founder of the darknet site, Silk Road.

It is also alleged that Ellingson may be the user “redandwhite.” Redandwhite is significant because it is the person who Ross Ulbright contacted about killing another Silk Road user who lived in Vancouver who was blackmailing Ulbright.

Ulbright wrote to Redandwhite for the contract killing, writing:  ‘I would like to put a bounty on his head if it’s not too much trouble for you. What would be an adequate amount to motivate you to find him? Necessities like this do happen from time to time for a person in my position.’ Ulbright went on to clarify that it didn’t need to be ‘clean’.

You can read the transcript for the contract killing here.

Redandwhite quoted a price of $300k+ for clean and $150–$200k for non-clean, to which Ulbright replied: ‘Are the prices you quoted the best you can do? I would like this done asap.’

They allegedly agreed on a price of 1,670 Bitcoin for the job and the payment was recorded on the Blockchain.  A day later, Redandwhite informed Ulbright that the problem was taken care of and allegedly sent photographs to confirm the murder had occurred.

Ellingson is currently out on bail in Vancouver, waiting for a hearing on the application for his extradition to the US, and has been ordered not to communicate with Ross Ulbricht.

Russell Ulbricht is incarcerated in the US, serving a jail term of life imprisonment plus 40 years with no possibility of parole.

Some people theorize that Ulbright was played and the person who blackmailed Ulbright was the same person who offered to help kill the blackmailer, and ergo, the murder didn’t actually take place. And that person, it would appear, is Redandwhite. But that theory is unlikely to be true unless evidence is not being disclosed because Ulbright would have known if the communications came from the same IP address. So would the FBI in their investigation. And so would the digital currency exchange in Canada that provided Bitcoin exchange services in Vancouver. Ulbright did not introduce evidence at his trial in respect of IP addresses or Bitcoin wallet intersections, to show that the blackmailer and the hitman were one and the same person and that no one was at risk of being murdered.

No one appears to know where the $2 million in proceeds of crime that passed through Ellingson’s two Bitcoin wallets for drug trafficking at a Canadian digital currency exchange is currently sitting.

And no one appears to know where the 1,670 Bitcoin in proceeds of crime paid to Redandwhite in Vancouver, worth $8.4 million, is currently sitting. Possibly parked in a Vancouver bank account, a fancy mansion and a lambo. Or still parked in a digital currency exchange in Canada.

Share this Post:
  • Facebook
  • Twitter
  • LinkedIn
  • Print
  • email

2018 Review of our Financial Crime Blog

By Christine Duhaime | February 16th, 2019

Every year, we review the analytics of the Financial Crime Blog at year end, and share the results of what countries visit the site; what stories attract them to it; and what sorts of financial crime information people are looking for. Here is our review, below.

For 2018, the number of hits to our website exceeded 1 million views, which is consistent with our normal range, however, many of those are bots and crawlers which scrape websites daily and so our readership is significantly less when crawlers and bots are factored in.

Number of countries that read our Financial Crime Blog in 2018: 

  • 185

Top 10 countries that read our Blog regularly by order of readership: 

  • Canada
  • United States
  • UK
  • China
  • India
  • Australia
  • France
  • Hong Kong
  • Singapore
  • Germany

Top 5 articles read on our Blog in 2018:

Number of cities where readers came from in 2018:

  • 3,835

Fun facts from 2018:

  • US federal law enforcement agencies mostly read up about Canada’s money laundering issues and money movements from China to Vancouver, as well as story 4, above, about the Canadian investor jailed in the Dominican Republic, as well as all things Bitcoin or Iran-related and the fentanyl crisis.
  • Iran, which ranked 25th in terms of countries reading our Blog, came to read about what the US says about their developments in the digital currency space, they also came to learn about AML law, and about the convicted Iranian in Toronto who left Iran with billions of dollars allegedly stolen from a bank and was given Canadian citizenship.
  • Globally, there was a marked shift towards readers who were from institutional investment firms, Fortune 500 companies and senior agencies and organizations such as the OECD, World Bank, EU Parliament, several agencies of the UN and such.
  • There was also a shift to increased readership of articles that address risks of digital currencies and money laundering, terrorist financing, tax evasion or sanctions avoidance and movements of money from China illegally to places like Vancouver.
  • Mostly just readers from the US came to read about the fentanyl crisis, even though per capita, it has killed more people in Vancouver than in any US city.
  • In terms of banks, way more US correspondent banks and bank regulators in the US visited our Blog this year, and they read stories about money laundering in Canada, digital currencies and how money is moved from China to Vancouver.
Share this Post:
  • Facebook
  • Twitter
  • LinkedIn
  • Print
  • email

Vancouver, Venezuela, Crypto

By Christine Duhaime | February 15th, 2019

According to this article in Vancouver, a Vancouver based charity called GiveCrypto.org, is sending, transferring or donating (perhaps all 3), digital currencies from the US (via Coinbase, a digital currency exchange) to people in Venezuela. The article does not say who receives the digital currencies in Venezuela, how they receive it or how much they receive. Is it via an exchange in Venezuela? Does that exchange trade the sanctioned Petrocoin? Are any persons on sanctions lists in Canada or the US receiving the digital currency? So many issues – so few answers.

Share this Post:
  • Facebook
  • Twitter
  • LinkedIn
  • Print
  • email

How artificial intelligence is changing investigations, policing and law enforcement

By Christine Duhaime | February 13th, 2019

Artificial intelligence is having a significant positive impact on the ability of law enforcement to identify criminals and to detect and investigate crime.  In the process, it is changing the face of policing.

Early AI in Money Laundering

AI in law enforcement is not new. Two areas where AI was used early on in law enforcement were for border control and anti-money laundering law in the US.

The US Customs and Border Protection Agency created an AI system using rule-based reasoning to identify suspiciousness for immigration purposes in the mid-1980s.

And in 1993, FinCEN developed a system called the FinCEN Artificial Intelligence System, which links and evaluates financial transactions for indications of suspicious transactions characteristic of money laundering or terrorist financing to identify unknown, high value leads for investigation and, if warranted, prosecution.  In its first two years, FinCEN’s AI System identified over US$1 billion in potential laundered funds that humans alone could not detect.

AI systems are changing investigations.  They allow investigators to detect criminality in ways not before possible of transactional data to be processed and linked to identify patterns and connections.  AI systems can process big data rapidly, reducing the amount of time investigators would otherwise spend manually combing through large data sets for leads and patterns in financial crime. In financial crime law especially, investigations are often hampered by manpower shortages.  Mining and processing by data solve manpower shortage problems and accelerates pattern detection to identify anomalous behaviour and detect criminal actors.

This is especially useful for transnational criminal organizations.  They usually involve repetitive patterned behaviour in select areas of criminality, such as drug trafficking, extortion, cybercrime and money laundering.  They also involve multiple offenders connected through various relationships such as family, friendship or business associates.  In terms of behaviour, they typically travel and dine together. Learning and linking associations between members of criminal organizations and their business enterprises is a critical part of how anti-money laundering legal experts and law enforcement uncover criminal activities and criminal networks.  Combining AI and traditional link analysis in investigations is enabling the public and private sector to have deeper intelligence.

At FinCEN, because specialized money laundering and terrorist financing expertise is distributed among FinCEN agents, the system incorporates a wide range of shared knowledge.  The design of the suspiciousness evaluation modules, with individual rule sets addressing specific money laundering indicators, facilitates the incorporation of additional indicators and improves accuracy of findings. Using AI technology, an organization like FinCEN can identify multiple businesses linked to certain financial transactions to detect money laundering activities, criminal associations to support enforcement.

Facial Recognition

Facial recognition is undergoing a renaissance with AI and changing policing.  Facial recognition was developed in the late 1980s by the Central Intelligence Agency.  Back then, the CIA’s facial recognition system combined image analysis technology with collateral information tied to a database that was used to identify people.  Since then, facial recognition technology has played a role in law enforcement since the mid-1990s.  For example, border agencies at airports in China and Japan have deployed facial recognition systems for years to control immigration and in the process, built two of the world’s largest facial recognition databases.  China’s federal facial recognition database is tied to national identity cards and intelligence agencies.

The Jiao Tong University has built a facial recognition system that can identify criminals with 89.5% accuracy rate using machine vision algorithms based on examinations of photographic records of known criminals and non-criminals.

The FBI has facial recognition systems as well that access and scan over 411 million photos in state and federal databases.

US Customs and Border Patrol is developing drones with sensors, cameras and facial recognition capabilities to allow it to film persons near borders to see if they are matched in law enforcement databases using remote drones, including matching from the IDENT database which has more than 170 million facial images collected from foreign nationals as they enter the US.

The UAE has built police robots whose primary function is to scan faces using facial recognition programs for enforcement.

In the private sector, Google and Facebook apply facial recognition on photographs voluntarily uploaded by users on their platforms, and they group photographs of people together, informing their AI systems to associate photographs with the same person automatically.  However, such automatic linking of a person by tech companies raises privacy law issues in respect of the collection, retention and use of the likeness of a person, and issues of informed consent.

Also in the private sector, organizations such as casinos, use facial recognition programs to take images of the public and extrapolate certain information for compliance and enforcement purposes to detect if a person is to be prohibited from gambling for any number of reasons, including if they are a member of organized crime.

CCTVs in public places operate the same as in casinos in the sense that facial recognition systems work with machine learning systems to scan faces and inform law enforcement of suspicious activities, such as when the same people appear at the same locations more often than statistically probable.

For example, facial recognition and machine learning tech can detect if the same person interacts on the same street corner frequently and the system may then predict that the person is selling illegal drugs or will record a person entering a high end hotel at the same time frequently and predict that they are selling prostitution services.

There are obvious concerns with such judgement calls.  In the example above, the person who interacts at the street corner frequently could be a girl selling Girl Guide cookies and not a drug trafficker.

For a response to be sufficient to justify reasonable grounds to suspect and justify a search or seizure or reporting, it must be accurate and be based on an understanding of the law.  Systems are only as good as the coding and if that coding involves criminal prosecutions and is not done with lawyers, it may fail constitutional thresholds.

Predictive AI

Another area where AI is changing investigations and law enforcement is predictive AI.

Predictive AI is expected to become embedded in policing to predict and stop crimes before they happen.  In the future, it is highly probable that a machine will identify criminals all on its own and alert law enforcement on how and where to locate a suspect, with the evidence detailing the crime packaged by systems for arrest and prosecution.

Chicago is already evaluating predictive AI with the use of public data, such as social media data, and other sources to identify people likely to be criminals before they commit crimes.  The research is controversial because it assumes criminality can be predicted.

Automating the process cuts down on the time a human would take to identity the data and come to the same conclusion.  The advantage of using data vacuumed from a social media account is that it can pick up repeat information (such as the hashtag #drugs), correlations among social media posts, repeat locations, connections and references to other people that a human could not detect without years of analysis.

Moreover, using social media as the collateral information allows financial crime investigators to detect, within seconds, things that are out of pattern – for example, if a person has geo-tagged frequent visits to expensive resorts or restaurants that are inconsistent with their salary, that may be indicative of possession of proceeds of crime.

Today, we can identify criminal actors in organized crime before there is sufficient evidence to prove criminal conduct but that is markedly different from predicting criminality of an individual.  With respect to the former, identity is based on the fact that members of criminal organizations and gangs are part of the same circles and networks.  Statistically speaking, they are likely to so-called infect each other with criminal interests.

It sounds great in theory that we can predict criminality but there are risks because machines are not infallible and neither are humans.  Often humans make bad judgment calls in their life decisions, or lack the maturity, intellect or education to comprehend the consequences of what they post online for the world to see and how it is being used. People who are unaware of data vacuuming may be harmed by the storing of their social media in a permanent database when it is later used for criminal predictability.

Borg Collective?

Accessing big data and undertaking data vacuuming and then applying machine learning to that data may lead to a form of constructive knowledge, legally speaking, allowing for law enforcement to have constructive awareness of predictions of criminality, ignoring the individual reasonable suspicion requirements.  One scholar has suggested that this would turn our police agencies into something like the “Hive Mind” that collects and processes data from millions of datasources, CCTVs and drones, similar to the Borg Collective in Star Trek allowing police agencies in the future to rely on global real-time updated databases in respect of individuals for law enforcement.

Other AI in Law Enforcement

In other contexts, securities commissions, including the US Securities Exchange Commission and the Australian Securities and Investments Commission, use AI to detect rogue market behaviour among traders and brokers. Nasdaq is looking at developing AI software to use machine intelligence to understand the language used by traders and identify key indicators of fraud or criminal activities when they happen.

In the same vein, autonomous boats equipped with sonar AI capabilities are used to detect and report illegal fishing in oceans and other illegal activities, such as drug trafficking off coastal waters.

AI is also being used to create safer cities.  Students at Berkeley University developed an app that brings real-time crime incident information to users, using historic and location data to identify safe navigation paths and alerts.  The app features a dynamic crime map, notifications about nearby crimes and automated reporting of incidents.  It draws upon various data sources, including police dispatch data, crowd-sourced information and historic data.

The world is rapidly changing with AI and policing is no different.

Share this Post:
  • Facebook
  • Twitter
  • LinkedIn
  • Print
  • email

Listed terrorist organization asks for Bitcoin

By Christine Duhaime | January 30th, 2019

According to an article in CCN today, a person who may be a supporter of HAMAS, a listed terrorist organization, allegedly took to social media – in particular Twitter – to solicit financial support with Bitcoin. The Twitter account is still operational even though, if the story is accurate, the tweet constitutes an attempt at terrorist financing given that HAMAS is a listed terrorist organization. There is no way provided in the tweet to send Bitcoin except that the tweet contains a photo of the Shehab News Agency. The US government and others believe HAMAS is materially funded by Iran, although there continue to be debates about their closeness.

The article on CCN mentions the foray of Iran and other states into digital currencies, a topic that we covered in the past here, here and here. There is a concern that Bitcoin and other digital currencies, as well as currencies derived from mining, can be used for financial crimes, including sanctions avoidance and terrorist financing without visibility on the part of the banking partners or law enforcement agencies.

That is because digital currency exchanges, to the extent they are used, are largely unsophisticated in financial crime and in on-boarding at the standard we use at financial institutions; and even if a few have competent AML/CTF procedures in place that are operational, they have no control over the actual control of external wallets which hold digital currencies.

With respect to mining, they cannot know who is mining what where when or how, or where the digital currencies mined are sent. Added to which, several countries are creating initial coin offerings to engage in sanctions avoidance and a Vancouver digital currency currency is known to have listed and traded a digital currency called the NEM, whose platform the Venezuela government said it was using for sanctions avoidance, which opens it up to similarly listing and conducting financial transactions for the Venezuela Petra coin. Not just that, the Vancouver digital currency exchange transacted not just in any NEM, but stolen NEM that was proceeds of crime.

A number of Bitcoin people are relocating to Malta because it is ICO-friendly and has extremely relaxed money laundering controls, as well as at least one questionable banking connection to Iran and Venezuela – not unsurprisingly, the same two countries working feverishly on sanctions avoidance strategies with digital currencies.

Digital currency exchanges and banks that bank them should refresh their memory in respect of what I call crystal ball liability when it comes to terrorist financing, namely that if you provide banking or digital currency exchange services and the resulting funds in the hands of the recipient are used to harm US citizens in another continent during a terrorist attack, you are liable. And for triple damages. I’ve heard Canadian banks and often their external lawyers say for years that crystal ball liability does not apply to Canadian banks because they are not US banks but even if that is true, which it is not in the case of the big banks who have large US operations, correspondent banking law makes Canadian banks subject to crystal ball liability. The demise of the Wegelin Bank, founded in 1751, over what amounted to an incorrect external legal opinion on correspondent banking, is an important case for all non-US banks and digital currency exchanges to keep in mind.

Share this Post:
  • Facebook
  • Twitter
  • LinkedIn
  • Print
  • email

World’s first bi-national government issued digital currency launched in Middle East

By Christine Duhaime | January 20th, 2019

Saudi Arabia and the United Arab Emirates announced yesterday in Abu Dhabi that they have created and launched a joint new bi-national digital currency. The name of the coin has not been released, not the type, not the amount issued, nor its price per coin. According to the governments of both nations, the new Saudi / UAE coin will be used by partnering banks so that those two governments can obtain an understanding of how Blockchain functions. The central banks of both countries are also participating in the coin issuance and its operation. The creation of a bi-national government issued digital currency is the first in the world.

Share this Post:
  • Facebook
  • Twitter
  • LinkedIn
  • Print
  • email

Dark Overlord hacks into US law firm systems and obtains 9/11 files

By Christine Duhaime | January 6th, 2019

According to news media, the hacking group Dark Overlord has hacked the systems of a large law firm in the US and obtained privileged and confidential records that were published online at Pastebin. The files are allegedly encrypted and the group is seeking payment in Bitcoin, failing which they will make all the documents available. Some documents were published in a preview on Twitter on an account since deactivated. Dark Overlord is the group that hacked over 50 targets, including Netflix and the computer systems of a plastic surgeon in London where they obtained ‘before and after’ photos of celebrities.

Dark Overlord allegedly sent a ransom note to professional firms involved in 9/11 litigation to “pay the fuck up” in Bitcoin. They are allegedly seeking compensation from banks, law firms, insurance companies and law enforcement agencies that were involved in 9/11 settlements.

In a podcast on Motherboard, a reporter who communicated with Dark Overlord, explains that they go where other hackers won’t go, but interestingly, says that all they actually care about is the acquisition of Bitcoin. The Motherboard reporter published a voice message of a sample demand for payment from Dark Overlord in which the person asks for Bitcoin with a UK accent.

So far, the affected US law firm has not sought a Court Order to prevent the disclosure of privileged and confidential documents and surprisingly, neither have their clients apparently demanded that they do so.

In addition to being media savvy, Dark Overlord allegedly asks victims to sign releases when payments of Bitcoin are made, although such releases are not legally enforceable.

The Bitcoin address to pay ransom in Bitcoin for the law firm hack is 192ZobzfZxAkacLGmg9oY4M9y8MVTPxh7U. Dark Overload is seeking 3.27 BTC as an initial payment. You can have a look and see if payments have come through on the Explorer. So far, one wallet address paid $11,830.09 in Bitcoin to Dark Overlord at 1 am on January 4, 2019.

Share this Post:
  • Facebook
  • Twitter
  • LinkedIn
  • Print
  • email

Former DEA Agent says they were caught off guard on “deep infiltration” of Mexican cartel drug trafficking operation in Canada

By Christine Duhaime | January 1st, 2019

Notorious Sinaloa cartel

Andrew Hogan, a former agent of the Drug Enforcement Agency (DEA), who, as part of a multi-agency task force that included Homeland Security Investigations, successfully hunted and located the most wanted cartel leader in the world, El Chapo Guzman, says that when monitoring the Sinaloa’s activities, they [the DEA] were most surprised by the extent of El Chapo’s operations in Canada.

El Chapo was the head of the Sinaloa cartel in Mexico and the Sinaloa cartel was the most powerful drug cartel under his tenure.

Hunting El Chapo

In his bookHunting El Chapo“, Hogan describes how he and his colleagues monitored and traced cell phone records to locate El Chapo, and during that process, they learned how the Sinaloa was expanding to the Philippines, the UK, and the Netherlands, searching for commercial properties with refrigeration capabilities for drug trafficking purposes.

[Transnational criminal organizations seek refrigeration services because drugs are often trafficked internationally in bulk food shipments - steaks, vegetables. For example, the Montreal mafia are allegedly known to send drugs from the Dominican Republic to Canada hidden in refrigerated food products such as eggplants or green peppers.]

El Chapo’s “deep infiltration of Canada”

But Hogan writes: “We were caught off guard by his [El Chapo's] deep infiltration of Canada.” Keep in mind, this was late 2015 – not that long ago.

He writes: “In terms of profit, Chapo was doing more cocaine business in Canada than in the United States [... because retail cocaine in the United States is less profitable than in Canada].”

“His key cartel  lieutenants could exploit weaknesses in the Canadian system – the top heavy structure of the Royal Canadian Mounted Police hampered law enforcement efforts for even the most routine drug arrest and prosecution. It was a perfect match for Chapo – hindered law enforcement and an insatiable Canadian appetite for high grade coke,” writes Hogan.

Not surprising, most of what Hogan writes about Mexican drug cartel activities in Canada are connected only to Vancouver.

Mexican cartel helped by Iranians in Vancouver to traffic drugs

He describes how Iranians in Vancouver are in bed with the Sinaloa cartel and El Chapo, and work on the importation of drugs into Canada for the cartel.

He writes: “The Sinaloa cartel had built a formidable distribution structure, smuggling loads of cocaine across the Arizona border and hauling them to stash pads and warehouses in Tucson and Phoenix before they were driven by car to the Washington border where the loads would be thrown into private helicopters. The helicopters would jump the border and drop the coke out among the tall lodge pole pines of British Columbia. Chapo’s men had connections with Iranians in Canada.”

He describes how Canadian Iranians working for the cartel buy airplanes and smart phones for the cartel. Once the drugs are in Vancouver, it appears that the Iranians pass the drugs to the Hells Angels who are in charge of moving the drugs across Canada.

Fake Bananas Filled with Cocaine Shipped to Vancouver

In his book, Hogan describes how as they got deep into Sinaloa and cartel land in Mexico, nearing in on the capture of El Chapo, they came across a warehouse of green bananas and remnants of cocaine-cutting agents. The green bananas were plastic, used for international shipments. A single fake banana holds half a kilo of cocaine and Hogan writes: “Immediately I remembered how Hondo in British Columbia was constantly looking for a warehouse large enough to store fruit deliveries for the ‘Boss’. These fake bananas were most likely going directly to Vancouver to be unloaded then shipped out to cities all across Canada.”

Sinaloa cartel sends Mexican cartel member to live in Vancouver and launder their drug money

In “Hunting El Chapo,” Andrew Hogan also describes how the Sinaloa cartel sent one of their people to Vancouver, 22-year-old Jesus Esperanza, to run the money laundering and drug distribution operation for the cartel.

Esperanza’s front was to register as a student at a school called Columbia College in Vancouver. In actuality his job was to collect the proceeds of crime across Canada for El Chapo and arrange to launder it back to Mexico. Hogan describes how Esperanza sent reports to El Chapo providing a daily status report about the cartel’s business in Canada, which the DEA would read, such as:

  • Vancouver – Day X – Collected $560,000 [in proceeds of crime] and sold 95 kilos of cocaine in Vancouver;
  • Winnipeg – Day X – Collected $275,000 [in proceeds of crime] and sold 48 kilos of cocaine in Winnipeg; and
  • Toronto – Day X – Collected $2,000,000[ in proceeds of crime] and sold 150 kilos of cocaine in Toronto.

Over $1 billion annually from Canada in Mexican cartel proceeds of crime

As you can see, El Chapo pulled in $2,835,000 in cocaine sales on one day’s report in just three cities in Canada. Since drugs sales are 24/7, the annual take for El Chapo in Canada on an annual basis can probably be estimated to be $1,040,250,000, or slightly over $1 billion, which would have to be laundered back to Mexico from his lieutenants in Vancouver through financial intermediaries. You can read here how El Chapo and Sinaloa cartel members sent cocaine and fentanyl to Buffalo disguised as, or hidden in, food imports using private companies, and laundered the proceeds of crime through US banks.

El Chapo was captured on January 8, 2016, in Mexico, extradited to the US and is now on trial in New York for drug trafficking, money laundering and organized criminal activities.

In “Hunting El Chapo”, Hogan describes how officials at the Canadian phone manufacturer, Blackberry, provided intelligence related to the cellular phone use of El Chapo and other cartel members to the DEA and in the book, says that such information was provided quickly due to relationships forged with Blackberry. It is the intelligence from the use of Blackberry phones by El Chapo and the Sinaloa cartel, and the interception of Blackberry PIN messages and the pinging of Blackberry phones that led to the location and capture of El Chapo.

Columbian cartel in the mix in Canada

Hogan also makes passing reference to a Blackberry user named “Panchito”, who he believes was Hildebrando Alex Cifuentes-Villa, a member of the Columbia drug trafficking cartel Cifuentes-Villa, who worked with the Sinaloa cartel in Mexico. According to the cellular records analyzed by Hogan, members of the Sinaloa cartel sent “command and control messages” to Panchito “mostly about El Chapo’s Canada operations”, which seems to suggest that the Cifuentes-Villa family in Medellin, Columbia, was also involved in drug trafficking in Canada for El Chapo. The brother of Panchito is testifying in the trial of El Chapo in New York.

Well-known cartel leader obtains Canadian passport

Since El Chapo’s arrest, it is believed that the Cartel Jalisco Nueva Generacion (CJNG) led by former police officer El Mencho, whose real name is Nemesio Oseguera-Cervantes, is now Mexico’s most powerful cartel. The US government is offering a $10 million reward for the arrest of El Mencho.

The brother in law of El Mencho, Abigael Gonzalez Valencia, despite being a well-known cartel leader and international drug kingpin and on the US OFAC list [which prohibits anyone from providing financial or other services to him], was somehow able to obtain a Canadian passport (passport no. JX755855), which if not a fake passport, means that he acquired Canadian citizenship. He was indicted in the US in 2014 and is in jail. He has several other aliases on identity products including aliases Paul Jonathan Tak Toledo, Luis Angel Gomez Flores and Luis Angel Gonzalez Valencia and several dates of birth on his identity products ranging from October 1972 to 1979.

Abigael Gonzalez Valencia is also the brother of El Mencho’s wife, Rosalinda González Valencia. She is believed to be in charge of laundering all the proceeds of crime for the global operations of the CJNG. She was just released from jail on bail in Mexico. It is not known if El Mencho’s wife, the sister of the drug kingpin with the Canadian passport, Abigael Gonzalez Valencia, also obtained a Canadian passport or if El Mencho was able to obtain a Canadian passport as well.

The US Department of Justice considers the CJNG to be one of the five most dangerous transnational criminal organizations in the world.

One more Vancouver connection? Guiseppe Bugge, the Vancouver man who operated a digital currency exchange selling Bitcoin, and who police say was associated with organized crime, was gunned down at a shopping mall in CJNG-controlled territory in August 2018 in a cartel-style hit with over 140 bullets from machine guns.

Share this Post:
  • Facebook
  • Twitter
  • LinkedIn
  • Print
  • email

Two US lawmakers introduce bills to prevent Iran from developing an ICO

By Christine Duhaime | December 27th, 2018

Two US lawmakers introduced bills to prevent Iran from being able to grow its planned government issued sovereign initial coin offering, or its own digital currency. Both bills add criminal liability to persons, financial institutions, correspondent banks and digital currency exchanges that facilitate transactions involving an Iranian digital currency. That criminal liability is in addition to existing liability for sanctions avoidance.

The US has expressed concern because the Iranian government has suddenly realized that digital currencies are ideal for sanctions avoidance and two Iranian government agencies recently made public statements for advancing the development of a sovereign ICO for several purposes, including sanctions avoidance.

The first, Bill HR 7321, introduced by Michael Gallagher in the House of Representatives, called the Blocking Iran Illicit Finance Act:

  • Would prohibit all transactions, financial and digital, related to Iran’s sovereign ICO in or through (e.g., correspondent banks) the US;
  • Would require the Secretary of the Treasury to report to Congress on the status of Iran’s ICO, and the involvement of the Central Bank of Iran, and in that report, to describe the technical assistance that China, Venezuela and Turkey are providing to develop the sovereign ICO, as well as how an ICO by Iran could be used for sanctions avoidance;
  • Would permit the US government to impose sanctions against persons or companies that assist Iran develop its sovereign ICO, including Blockchain development, or that list or re-sell the ICO or allow financial transactions to occur through a digital currency exchange or financial institution;
  • And with respect to foreign persons, companies and digital currency exchanges assisting Iran to list or re-sell its sovereign ICO, would include provisions prohibiting correspondent banks from opening, using or transferring digital currency assets associated with Iran’s sovereign ICO; blocking the transfer of sanctions digital currency assets from entering the US; and visa banning foreign persons who assist Iran with respect to its sovereign ICO, from entering the US;

The Bill describes a digital currency exchange expansively to include persons who sell or purchase, or facilitate the sale or purchase of digital currencies, even if not incorporated and as such would include employees of digital currency exchanges conducting, or approving trades.

The second, Bill S.3758, introduced by Ted Cruz, of the same name, is the same as HR 7321.

Iran has lax money laundering and terrorist financial laws and more relaxed implementation of what little law there is. For example, in this interview, the owner of an Iranian digital currency exchange that provided services to Iranians wanted for SamSam computer intrusions and Bitcoin ransoms, describes his compliance with AML and CTF law as follows for on-boarding customers –> they obtain a selfie with a bank card and the national ID card plus a telephone number of the customer. That’s it – no verification of ID, no third party confirmation, no verification of whether the photo is fake. And he goes on to explain that in Iran, once you “KYC” a person, “there’s no reason to be suspicious.”

Share this Post:
  • Facebook
  • Twitter
  • LinkedIn
  • Print
  • email