FinCEN Fines BTC-e Virtual Currency Exchange $110 Million for Facilitating Ransomware, Dark Net Drug Sales

July 26, 2017

Treasury’s First Action Against a Foreign-Located Money Services Business

WASHINGTON—The Financial Crimes Enforcement Network (FinCEN), working in coordination with the U.S. Attorney’s Office for the Northern District of California, assessed a $110,003,314 civil money penalty today against BTC-e a/k/a Canton Business Corporation (BTC-e) for willfully violating U.S. anti-money laundering (AML) laws. Russian national Alexander Vinnik, one of the operators of BTC-e, was arrested in Greece this week, and FinCEN assessed a $12 million penalty against him for his role in the violations.

BTC-e is an internet-based, foreign-located money transmitter that exchanges fiat currency as well as the convertible virtual currencies Bitcoin, Litecoin, Namecoin, Novacoin, Peercoin, Ethereum, and Dash. It is one of the largest virtual currency exchanges by volume in the world. BTC-e facilitated transactions involving ransomware, computer hacking, identity theft, tax refund fraud schemes, public corruption, and drug trafficking.

“We will hold accountable foreign-located money transmitters, including virtual currency exchangers, that do business in the United States when they willfully violate U.S. anti-money laundering laws,” said Jamal El-Hindi, Acting Director for FinCEN. “This action should be a strong deterrent to anyone who thinks that they can facilitate ransomware, dark net drug sales, or conduct other illicit activity using encrypted virtual currency. Treasury’s FinCEN team and our law enforcement partners will work with foreign counterparts across the globe to appropriately oversee virtual currency exchangers and administrators who attempt to subvert U.S. law and avoid complying with U.S. AML safeguards.”

FinCEN acted in coordination with law enforcement’s seizure of BTC-e and Vinnik’s arrest. The Internal Revenue Service-Criminal Investigation Division, Federal Bureau of Investigation, United States Secret Service, and Homeland Security Investigations conducted the criminal investigation.

Among other violations, BTC-e failed to obtain required information from customers beyond a username, a password, and an e-mail address. Instead of acting to prevent money laundering, BTC-e and its operators embraced the pervasive criminal activity conducted at the exchange. Users openly and explicitly discussed criminal activity on BTC-e’s user chat. BTC-e’s customer service representatives offered advice on how to process and access money obtained from illegal drug sales on dark net markets like Silk Road, Hansa Market, and AlphaBay.

BTC-e also processed transactions involving funds stolen between 2011 and 2014 from one of the world’s largest bitcoin exchanges, Mt. Gox. BTC-e processed over 300,000 bitcoin in transactions traceable to the theft. FinCEN has also identified at least $3 million of facilitated transactions tied to ransomware attacks such as “Cryptolocker” and “Locky.” Further, BTC-e shared customers and conducted transactions with the now-defunct money laundering website Liberty Reserve. FinCEN previously issued a finding under Section 311 of the USA PATRIOT Act that identified Liberty Reserve as a financial institution of primary money laundering concern.

BTC-e has conducted over $296 million in transactions of bitcoin alone and tens of thousands of transactions in other convertible virtual currencies. The transactions included funds sent from customers located within the United States to recipients who were also located within the United States. BTC-e also concealed its geographic location and its ownership. Regardless of its ownership or location, the company was required to comply with U.S. AML laws and regulations as a foreign-located MSB including AML program, MSB registration, suspicious activity reporting, and recordkeeping requirements. This is the second supervisory enforcement action FinCEN has taken against a business that operates as an exchanger of virtual currency, and the first it has taken against a foreign-located MSB doing business in the United States.

###

FinCEN’s mission is to safeguard the financial system from illicit use and combat money laundering and promote national security through the collection, analysis, and dissemination of financial intelligence and strategic use of financial authorities.

CONTACT: Steve Hudak 703-905-3770

Assessment:

http://links.govdelivery.com:80/track?type=click&enid=ZWFzPTEmbXNpZD0mYXVpZD0mbWFpbGluZ2lkPTIwMTcwNzI3Ljc2MzQ4NTgxJm1lc3NhZ2VpZD1NREItUFJELUJVTC0yMDE3MDcyNy43NjM0ODU4MSZkYXRhYmFzZWlkPTEwMDEmc2VyaWFsPTE3MDg0NDE4JmVtYWlsaWQ9am9hbi5tYXJzaGFsbEBnZXllcmdvcmV5LmNvbSZ1c2VyaWQ9am9hbi5tYXJzaGFsbEBnZXllcmdvcmV5LmNvbSZ0YXJnZXRpZD0mZmw9Jm12aWQ9JmV4dHJhPSYmJg==&&&102&&&https://www.fincen.gov/sites/default/files/enforcement_action/2017-07-26/Assessment%20for%20BTCeVinnik%20FINAL%20SignDate%2007.26.17.pdf

Former Virtual Currency CEO Pleads Guilty to $9 Million Fraud Scheme

Thursday, July 20, 2017

Deirdre M. Daly, United States Attorney for the District of Connecticut, and Patricia M. Ferrick, Special Agent in Charge of the New Haven Division of the Federal Bureau of Investigation, announced that HOMERO JOSHUA GARZA, 32, of Texas, formerly of Somers, Conn., waived his right to be indicted and pleaded guilty today in Hartford federal court to one count of wire fraud related to his role in his companies’ purported generation and sale of virtual currency.

According to court documents and statements made in court, “virtual currency” is a digital representation of a value that can be traded and functions as a medium of exchange. Virtual currency generally is not issued or guaranteed by any jurisdiction or government, and its value is decided by consensus within the community of users of the virtual currency. A virtual currency generally self-generates units of currency through a process called “mining.” A virtual currency “miner” is computer hardware that runs special computer software to solve complex algorithms that validate groups of transactions in that virtual currency. Once a complex algorithm is solved, a unit of currency, such as a bitcoin, is awarded to the individual operating the miner. This process is known as “mining.”

Between approximately May 2014 and January 2016, GARZA, through GAW, GAW Miners, ZenMiner, and ZenCloud, companies he founded and operated, defrauded victims out of money in connection with the procurement of virtual currency on their behalf. The companies sold miners, access to miners, and the right to purchase a virtual currency called “paycoin,” as well as “hashlets.” A hashlet entitled an investor to a share of the profits that GAW Miners or ZenMiner would purportedly earn by mining virtual currencies using the computers that were maintained in their data centers. In other words, hashlet customers, or investors, were buying the rights to profit from a slice of the computing power owned by GAW Miners and ZenMiner.

To generate business and attract customers and investors, GARZA made multiple false statements related to the scheme, including stating that GAW Miners’ parent company purchased a controlling stake in ZenMiner for $8 million and that ZenMiner became a division of GAW Miners. In fact, there was no such transaction. GARZA also stated that the hashlets GARZA’s companies sold engaged in the mining of virtual currency. In fact, GARZA’s companies sold more hashlets than was supported by the computing power maintained in their data centers. Stated differently, GARZA’s companies sold the customers the right to more virtual currency than the companies’ computing power could generate. GARZA also stated that the market value of a single paycoin would not fall below $20 per unit because GARZA’s companies had a reserve of $100 million that the companies would use to purchase paycoins to drive up its price. In fact, no such reserve existed.

During the scheme, GARZA, through his companies, used money his companies had made from new hashlet investors to pay older hashlet investors. The payments were money that the companies owed the older investors based on the purported mining GAW Miners and ZenMiner had done on the investors’ behalf.

The loss attributable to GARZA from the scheme was $9,182,000.

GARZA is scheduled to be sentenced by U.S. District Judge Robert N. Chatigny on October 12, 2017, at which time he faces a maximum term of imprisonment of 20 years.

This matter is being investigated by the Federal Bureau of Investigation and is being prosecuted by Assistant U.S. Attorneys John T. Pierpont, Jr. and Jonathan Francis.