Opinion Offers Narrow View of “Safe Harbor” Provision for Defense Attorneys Accepting Tainted Funds from Clients

Second in Series of Two Blog Posts Pertaining to Attorneys Convicted of Money Laundering

On April 25, the U.S. Court of Appeals for the Fourth Circuit affirmed the conviction of Baltimore defense attorney Kenneth Ravenell (“Ravenell”) for money laundering conspiracy, in violation of 18 U.S.C. § 1956(h).  Ravenell had proceeded to trial and had been acquitted of six charges, including conspiracy to distribute narcotics.  However, he was convicted on the single count of money laundering conspiracy, based on his alleged assistance to two drug dealer clients, and received a sentence of 57 months of imprisonment.

The Ravenell opinion (“Opinion”) involves a splintered set of findings across the three-judge panel.  It involves findings on important technical issues pertaining to the statute of limitations and the use of the conscious avoidance/willful blindness theory of prosecution, which is often critical in cases involving third-party professionals such as lawyers, accountants, and real estate agents.  But, more importantly, it involves a discussion of when defense attorneys may accept illegally-obtained proceeds from their clients as payment for legal representation, and if such funds ever may be provided through third parties.  As we will discuss, the Fourth Circuit interpreted very narrowly a “safe harbor” provision under 18 U.S.C. § 1957(f) for defense attorneys – and did so in a case in which the evidence, if accepted, made clear that the safe harbor did not apply.  Stated otherwise, bad facts may have resulted in inappropriately broad language applicable to other cases.

As we just blogged, the U.S. Attorney’s Office for the Southern District of New York also announced on April 25 that Robert Wise (“Wise”), a New York attorney, had pled guilty to a single count of conspiring to commit money laundering, in violation of 18 U.S.C. § 371.  This case arose out of the indictment of Vladimir Voronchenko, who has been charged in connection with a scheme to make payments to maintain multiple properties in New York and Florida owned by his friend and associate, sanctioned Russian oligarch Viktor Vekselberg.  

These two cases are very different.  But they both illustrate how attorneys – either business attorneys, or criminal defense attorneys – can get caught up in the problems of their own clients, particularly given the ability of the government to pursue a theory of willful blindness.

Continue Reading  Fourth Circuit Upholds Money Laundering Conspiracy Conviction of Baltimore Defense Attorney

On March 15, 2023, the United States Attorney for the Southern District of New York unsealed a twelve-count Indictment that charges Ho Wan Kwok (“Kwok”) and his financier, Kin Ming Je (“Je”), with various sprawling schemes – including one involving cryptocurrency – in which the defendants solicited investments in several entities and other programs via fraudulent misrepresentations to hundreds of thousands of Kwok’s online followers. Moreover, the Indictment alleges that Kwok and Je misappropriated hundreds of millions of dollars in fraudulently obtained funds during the conspiracy.

Specifically, the Indictment charges Kwok with conspiracy to commit wire fraud, securities fraud, bank fraud, and money laundering. He was also charged with the underlying acts of wire fraud, securities fraud, international “promotional” money laundering (in violation of 18 U.S.C. § 1956(a)(2)(A)), international “concealment” money laundering (in violation of 18 U.S.C. § 1956(a)(2)(B)(i)), and “spending” money laundering (in violation of 18 U.S.C. § 1957), with the last charge resting on a single $100 million wire transfer. Je was also charged with these crimes, in addition to obstruction of justice.

In regards to the money laundering schemes, the Indictment alleges that the defendants attempted to conceal the source of their illicit proceeds by transferring “money into and through more than approximately 500 accounts held in the names of at least 80 different entities or individuals[,]” through bank accounts in the U.S., the Bahamas, and the United Arab Emirates (“UAE”).  Further, the Indictment alleges that the defendants used over $300 million of fraudulent proceeds for the benefit of themselves and their family members.  The Indictment therefore contains a detailed notice of forfeiture, listing numerous assets that allegedly constituted or were derived from proceeds traceable to the charged offenses.  These assets include numerous bank account balances collectively amounting to hundreds of millions of dollars, as well as a luxurious mansion in New Jersey, several extremely high-end automobiles, and a 46-meter “superyacht.”  The government’s press release includes photos of some of these assets, included in the visual above.

Continue Reading  Indictment Alleges Investor Fraud of Over $1 Billion – And Elaborate Money Laundering and Lavish Spending

The U.S. Department of Justice (“DOJ”) announced on March 15, 2023 that in a coordinated effort between U.S. Federal Bureau of Investigations, Europol, and German police, the darknet cryptocurrency mixing service ChipMixer has been shut down.  The operation involved the U.S. government’s court-authorized seizure of two domains that directed users to the ChipMixer service and one Github account.  In addition, German authorities seized $46 million in cryptocurrency, as well as ChipMixer’s back-end servers used to run the site. 

Further, the U.S. Attorney’s Office for the Eastern District of Pennsylvania filed a criminal complaint against ChipMixer’s suspected founder, Vietnamese national, Minh Quoc Nguyen (“Nguyen”), alleging that Nguyen openly flouted financial regulations and instructed users how to use ChipMixer to evade reporting requirements while obscuring his true name under a series of stolen and fictitious identities. The complaint also alleges that ChipMixer, described as a popular platform for laundering illicit funds gained from unlawful activities like drug trafficking, ransomware attacks (according to Europol, ransomware actors Zeppelin, SunCrypt, Mamba, Dharma, Lockbit have used ChipMixer), and payment card fraud, was used to launder more than $3 billion in cryptocurrency since 2017.  Nguyen has been charged with money laundering, operating an unlicensed money transmitting business, and identity theft in connection with the operation of ChipMixer. 

Continue Reading  Darkweb Cryptocurrency Mixer ChipMixer Shut Down for Allegedly Laundering $3 Billion Worth of Crypto

Rodeo Drive

Indictment Alleges Use of Shell Companies, Nominees, Foreign Bank Accounts and Real Estate

On December 7, 2022, the United States Attorney’s Office for the Eastern District of New York (“DOJ”) unsealed a seven-count indictment against Andrii Derkach.  In the corresponding press release, Derkach is described as a “Kremlin-backed Ukrainian politician and oligarch” who attempted to “influence the 2020 U.S. Presidential election on behalf of the Russian Intelligence Services.”  Derkach was charged with conspiracy to violate the International Emergency Economic Powers Act (“IEEPA”), bank fraud conspiracy, money laundering conspiracy, and four counts of money laundering.  His wife, Oksana Terekhova, is alleged to be a co-conspirator and is referred to as “Co-Conspirator 1” in the indictment.  The investigation was “coordinated through the Justice Department’s Task Force KleptoCapture, an interagency law enforcement task force dedicated to enforcing the sweeping sanctions, export controls, and economic countermeasures that the United States . . . has imposed in response to Russia’s unprovoked military invasion of Ukraine.”

In connection with the indictment, the DOJ is requesting both criminal forfeiture of two Beverly Hills condominiums at issue in the indictment, as well as civil forfeiture in a parallel proceeding.  If successful, the DOJ would seize both the condominiums and proceeds in an investment and banking account held by Derkach’s alleged business entity.  Derkach remains at large.

This appears to be another in the long line of actions and sanctions brought against alleged Russian oligarchs and Russian agents, especially those with close connections to Russian Intelligence Services, in response to Russia’s invasion of Ukraine (of which we have blogged about here and here).  As long as Russia remains active in Ukraine, it is likely that federal law enforcement will continue to focus on the actions and assets of high-profile Russian oligarchs and agents in the U.S.  Financial institutions should continue to remain vigilant, as we have blogged about here, in rooting out attempts to evade sanctions.

Continue Reading  Russian Agent’s Beverly Hills Condominiums Subject to Forfeiture Based on Alleged Violations of Bank Fraud, Money Laundering, and U.S. Sanctions Statutes

Sanctions involving Russia is a front-burner issue for all businesses, but particularly for financial institutions. As we previously blogged, the Financial Crimes Enforcement Network (“FinCEN”) issued on March 7 an alert calling for increased vigilance in the face of potential evasion of Russian sanctions. On March 16, FinCEN issued its second alert on the topic (the “Alert”), reiterating the need for increased vigilance and assisting financial institutions in detecting suspicious transactions involving high-value assets to evade sanctions.

We discuss here the Alert, which provides guidance to financial institutions on how to identify suspicious transactions relating to the use of certain high-value assets by Russian elites, their family members and their “proxies.” The Alert reminds financial institutions of the importance of quickly identifying suspicious activity related to the disposition of sanctioned Russian assets. The Alert also highlights the international and domestic task forces that were formed to effectuate the sanctions laws we describe below, emphasizing the need for cross-agency collaboration and information sharing to achieve the common goal of sanctioning Russia’s power players.  However, and as we discuss, the Alert unfortunately offers no guidance on how “proxies” should be identified or defined.
Continue Reading  Russian Sanctions Redux: FinCEN Issues Guidance on Suspicious Transactions and Evasion Using High-Value Assets

On February 8, 2022, the Department of Justice announced the seizure of a record $3.6 billion in stolen BTC it alleges was tied to the 2016 hack of Bitfinex, a virtual currency exchange.  A husband-wife duo, Ilya “Dutch” Lichtenstein and Heather Morgan of New York, New York were arrested the same day and charged via a criminal complaint with conspiracy to commit money laundering and conspiracy to defraud the United States.  Lichtenstein and Morgan are being held on $5 million and $3 million in bail, respectively, and will be on house arrest pending trial.

The Statement of Facts by the government in support of the criminal complaint filed against the defendants reveals a vast and complicated web of transactions that allegedly permitted Lichtenstein and Morgan to transfer approximately 25,000 of the 119,754 BTC stolen by hackers—valued at “only” $71 million at the time of the theft but now worth about $4.5 billion—to various virtual currency exchangers.  According to the Statement of Facts, the stolen BTC was shuttled to an unhosted wallet (i.e., a cryptocurrency wallet not controlled by a third-party but by the user) with over 2,000 BTC addresses, then to various accounts at the “darknet market AlphaBay,” later to a number of accounts at four different virtual currency exchangers, then to more unhosted BTC wallets, and finally to accounts at six more virtual currency exchangers where it was converted into fiat currency, gift cards, and precious metals.  The defendants further allegedly liquidated BTC through a BTC ATM and purchasing non-fungible tokens.

As if the sheer volume and layers of accounts was not enough, the duo allegedly:

  • Moved the funds in a “series of small amounts, totaling thousands of transactions”;
  • Used software to “automate transactions” which allowed for “many transactions to take place in a short period of time”;
  • “Layered” transactions by depositing and withdrawing the BTC through many accounts to obfuscate the trail, including through extensive layering activity that employed the “peel” chain technique; and
  • “Chain hopped” by converting BTC to anonymity-enhanced virtual currency to cut and disguise the blockchain trail.


Continue Reading  A Record $3.6 Billion Seizure and the Twisting Paths of Money Laundering in the Digital World

“Front” Seafood Businesses Allegedly Hid the Proceeds From Smuggled Shark Fins and Marijuana Distribution

Last week, the U.S. Attorney’s Office for the Southern District of Georgia unsealed an indictment returned in July, charging twelve defendants and two businesses with wire and mail fraud conspiracy, drug trafficking conspiracy, and money laundering conspiracy. The indictment describes a transnational criminal organization that allegedly began as early as 2010 and spanned multiple locations including, Georgia, District of Columbia, California, Florida, Michigan, Arizona, Hong Kong, Mexico, and Canada. The indictment accuses the defendants of submitting false applications for import/export licenses to the U.S. Fish and Wildlife Services, and using two seafood businesses and dozens of bank accounts to hide the proceeds of illegal activities.

According to the indictment, the criminal organization engaged in an international wildlife trafficking scheme involving shark finning—where a shark is caught at sea, its fins are removed, and the remainder of the living shark is discarded and left to die in the ocean. According to the indictment, shark finning supports the demand for shark fin soup, an Asian delicacy. Shark finning is among many illegal wildlife trade practices.
Continue Reading  DOJ and Multi-Agency Task Force Charge International Money Laundering, Drug Trafficking, and Illegal Wildlife Trade Scheme