Former PG&E Employee Sentenced to 22 Months in Prison for Fraud Conspiracy Involving $82.1M (DOJ Release)
Federal securities laws require that FINRA member firms fingerprint most associatedpersons prior to or upon association with a firm. The firms review the fingerprint results as part of their background check to determine, among other things, whether aprospective associated person has previously engaged in misconduct that subjects thatperson to a statutory disqualification. As set forth in Section 3(a)(39) of the SecuritiesExchange Act of 1934, certain criminal and regulatory events will subject a person to astatutory disqualification.Between January 2015 and November 2019, Goldman failed to fingerprint and screen for statutory disqualification a significant number of its U.S.-based non-registered associated persons, Between January 2015 to January 2018, Goldman failed to timely fingerprint at least 1,061 non-registered associated individuals. The Firm was unable to determine whether it timely fingerprinted an additional 4,089 non-registered associated persons because it failed to locate any documentation reflecting that the Firm fingerprinted these individuals. In addition, the Firm failed to maintain fingerprint records for an additional 466 non-registered associated persons whom the Firm did fingerprint.Separately, between April 2018 and November 2019, Goldman permitted two nonregistered associated persons, who were subject to statutory disqualification, to associate with the Firm.The Firm's failure to fingerprint and properly screen its associated persons to meet Exchange Act and FINRA requirements arose from its failure to maintain a reasonable supervisory system and written procedures to identify and properly screen individuals who became associated with the Firm in a non-registered capacity. The Firm self-reported this matter to FINRA and commenced a remedial review and screening process of non-registered associated persons at Goldman.As a result of the foregoing, Goldman violated Section 17(f) of the Exchange Act and Rule 17f-2 thereunder, FINRA By-Laws, Article III, Section 3(b), Section 17(a) of the Exchange Act and Rule 17a-3 thereunder, and FINRA Rules 4511, 3110 and 2010.
Fulle formerly was a branch manager of a Comerica bank in Tustin. From February 2013 to April 2014, she targeted a vulnerable customer - an elderly man with dementia - and cultivated an exclusive banking relationship with him. Fulle then opened various bank accounts with the victim and used them to create a confusing web in which she could hide unauthorized transfers, and forged withdrawals with cashier's checks.Between February 2013 and May 2013, Fulle embezzled approximately $43,400 over the course of six transactions. After Fulle lost an anticipated promotion at work in May 2013, she began embezzling larger amounts of the victim's money, unilaterally changing the address for one of the victim's accounts, which prevented the statements from being delivered to the victim and his bookkeeper. Fulle manipulated this account for her embezzlement and, after she changed the address, significant amounts of the victim's money began flowing through it. Fulle also conducted much of the victim's banking activities one-on-one in private, away from the view of other bank personnel or security cameras.During the scheme, Fulle used the money she stole from the victim to pay for Tiffany jewelry, at least one Louis Vuitton bag, spa days for herself and her then-boyfriend, and trips to Las Vegas, where she gambled.Comerica fired Fulle in April 2014 for embezzling money from her cash drawer. When Comerica subsequently discovered the fraud Fulle committed against the victim, it reimbursed the victim nearly $1.3 million for disputed transactions that Fulle processed, lost interest and attorneys' fees. The total loss that Fulle caused to the victim was $1,057,230. The restitution amount includes the victim's attorneys' fees.
[B]etween at least October 2014 and November 2016, Epifaniou was a teenage hacker in Cyprus who searched website traffic rankings to identify potential targets of his extortion scheme. After selecting targets, Epifaniou worked with co-conspirators to steal personally identifiable information from user and customer databases at victim websites. Epifaniou stole the sensitive information either by directly exploiting a security vulnerability at the websites or by obtaining a portion of the victim website's user data from a co-conspirator who had hacked into the victim network. Once the personally identifiable information was obtained, Epifaniou used proxy servers located in foreign countries to log into online email accounts and send messages to the victim websites threatening to leak the sensitive data unless a ransom was paid in cryptocurrency.During his scheme, Epifaniou's victims included:
- An online sports news website owned by Turner Broadcasting System Inc. in Atlanta, Georgia;
- A free online game publisher based in Irvine, California;
- A hardware company based in New York, New York;
- An online employment website headquartered in Innsbrook, Virginia;
- A consumer report website headquartered in Phoenix, Arizona.
conspired to obtain contracts from PG&E for his cousin's transportation business in exchange for kickbacks from that business worth approximately 2.5% of the value of the contracts. Schoenfeld concealed from PG&E his familial relationship with his co-conspirator from PG&E, provided confidential information to his co-conspirator, and, at times, directly intervened in the consideration of contracts between PG&E and his co-conspirator's business, all contrary to PG&E's policies.From March 2007 through February 2015, PG&E paid at least $82.1 million to the business operated by Schoenfeld's cousin for services it provided pursuant to PG&E contracts. During the same period, Schoenfeld's co-conspirator paid him at least $1,476,295.15 in kickbacks for his role in the conspiracy.