Gallant Pharma International Inc. Indicated

FOR IMMEDIATE RELEASE

August 7, 2013

ALEXANDRIA, Va. – Seven arrests have been made in a coordinated operation spanning several states, related to the unsealing of a 17-count indictment and criminal complaint involving Gallant Pharma International Inc., an allegedly unlicensed company that is accused of distributing misbranded prescription drugs from its headquarters in Crystal City, Virginia, and an office in Springfield, Virginia.  The individuals arrested were:

  • Syed “Farhan” Huda, 38, of Arlington, Virginia;
  • Deeba Mallick, 36, of Arlington, Virginia;
  • Anoushirvan R. Sarraf, 47, of Rockville, Maryland;
  • Talib Khan, 42, of Montreal, Canada, and Barbados;
  • Harvey Whitehead, 67, of Troy, Michigan;
  • Lisa Coroniti, 46, of Devon, Pennsylvania; and
  • Robert J. Sparks, 30, of Springfield, Virginia.

Munajj Rochelle, 36, a dual U.S.-Canadian citizen, is currently incarcerated in Montreal, Canada, on unrelated charges.  Arrest warrants have been issued for the remaining three defendants, Robert Wachna of Ottawa, Canada, Mirwaiss Aminzada, 43, of Montreal, Canada.

Neil H. MacBride, United States Attorney for the Eastern District of Virginia, Antoinette V. Henry, Special Agent in Charge, FDA’s Office of Criminal Investigations, Gary Barksdale, Inspector in Charge of the Washington Division of the United States Postal Inspection Service, and Special Agent in Charge John P. Torres, U.S. Immigration and Customs Enforcement (ICE), Homeland Security Investigations (HSI) Washington, made the announcement after the four defendants arrested in the Eastern District of Virginia – Huda, Mallick, Sarraf, and Sparks – made their initial appearances before Judge John F. Anderson.

According to the 17-count indictment unsealed today, Khan and Huda were principals of Gallant Pharma, which allegedly began illegally importing prescription drugs, including intravenous chemotherapy drugs and injectable cosmetics, into the United States in or around August 2009.  Gallant Pharma represented itself as a “Canadian company” and told potential customers that it sold drugs from Canada.  The indictment alleges, however, that Khan, with the assistance of Huda, Mallick, Aminzada, and others, acquired drugs from other parts of the world, including India, Switzerland, and Turkey. These drugs were allegedly not manufactured and packaged in accordance with FDA requirements and, in some cases, were not approved by the FDA for use in the United States.  The indictment states that Gallant Pharma imported the drugs with the assistance of co-conspirators in Canada and the United Kingdom, including Aminzada, who broke large shipments into many small packages, mislabeled the contents of packages, and addressed deliveries to Dr. Sarraf at his medical practice in McLean, Virginia, in order to lessen scrutiny by Customs and Border Protection.  Initially, Gallant Pharma allegedly operated out of the apartment of Huda and his wife, Mallick, in Crystal City, where Huda is alleged to have served as the day-to-day head of Gallant Pharma in the United States and Mallick had primary responsibility for processing sales invoices and customer payments.  Until June 2013, Gallant Pharma allegedly stored the misbranded drugs at an office in Springfield, Virginia.

According to the indictment, Gallant Pharma was not licensed to distribute prescription drugs in the United States.  Nonetheless, Gallant Pharma is alleged to have sold drugs to doctors, hospitals, and medical practices across the United States, generating more than $8.6 million in revenue since August 2009.

Gallant Pharma allegedly employed a cadre of sales representatives with dedicated sales territories across the United States.

The defendants are charged with the following offenses: conspiracy to commit importation fraud, introduction of misbranded drugs into interstate commerce, unlicensed medical wholesaling, wire fraud, and to defraud the FDA, each of which is punishable by a maximum term of imprisonment of five years; importation contrary to law, which is punishable by a maximum term of imprisonment of twenty years; introduction of misbranded drugs into interstate commerce, which is punishable by a maximum term of imprisonment of three years; unlicensed medical wholesaling, which is punishable by a maximum term of imprisonment of three years; wire fraud, which is punishable by a maximum term of imprisonment of twenty years; and monetary transactions with criminally derived proceeds, which is punishable by a maximum term of imprisonment of ten years.

The investigation was conducted by FDA Office of Criminal Investigations, Drug Enforcement Agency Group 33 Diversion Task Force, Department of Homeland Security Office of Immigration and Customs Enforcement, the United States Postal Inspection Service, with assistance from the Arlington County Police Department.  Assistant United States Attorneys Lindsay A. Kelly, Alexander T.H. Nguyen, and Ryan K. Dickey are prosecuting the case on behalf of the United States.

Criminal indictments are only charges and not evidence of guilt.  A defendant is presumed to be innocent until and unless proven guilty.

A copy of this press release may be found on the website of the United States Attorney’s Office for the Eastern District of Virginia at
http://www.justice.gov/usao/vae.
Related court documents and information may be found on the website of the District Court for the Eastern District of Virginia at
http://www.vaed.uscourts.gov
or on
https://pcl.uscourts.gov

WhoIs ~ www.mydailycashleveraging.com

Email header analysis report
All valid IP Addresses found in the header.
Ip Address 3rd Party Info Provider City Flag Country
* 75.70.44.91 Check 75.70.44.91 at Senderbase.org Check 75.70.44.91 at Reputationauthority.org Comcast Cable Colorado Springs United States
174.132.146.2 Check 174.132.146.2 at Senderbase.org Check 174.132.146.2 at Reputationauthority.org Websitewelcome Houston United States
173.192.111.51 Check 173.192.111.51 at Senderbase.org Check 173.192.111.51 at Reputationauthority.org Website Welcome New York United States
67.18.124.7 Check 67.18.124.7 at Senderbase.org Check 67.18.124.7 at Reputationauthority.org Websitewelcome Houston United States

*Probable originating IP address

__________________________________
Delivered-To: scamfraudalert@gmail.com
Received: by 10.205.102.194 with SMTP id df2csp78345bkc;
Sat, 24 Aug 2013 09:50:09 -0700 (PDT)
X-Received: by 10.60.50.135 with SMTP id c7mr5286541oeo.41.1377363008223;
Sat, 24 Aug 2013 09:50:08 -0700 (PDT)
Return-Path: <Ed@mydailycashleveraging.com>
Received: from gateway04.websitewelcome.com ([67.18.124.7])
by mx.google.com with ESMTP id c5si1961806oeu.4.1969.12.31.16.00.00;
Sat, 24 Aug 2013 09:50:08 -0700 (PDT)
Received-SPF: neutral (google.com: 67.18.124.7 is neither permitted nor denied by domain of Ed@mydailycashleveraging.com) client-ip=67.18.124.7;
Authentication-Results: mx.google.com;
spf=neutral (google.com: 67.18.124.7 is neither permitted nor denied by domain of Ed@mydailycashleveraging.com) smtp.mail=Ed@mydailycashleveraging.com
Received: by gateway04.websitewelcome.com (Postfix, from userid 5007)
id 7C8F01FDF8F6B; Sat, 24 Aug 2013 11:49:49 -0500 (CDT)
Received: from ham02.websitewelcome.com (unknown [173.192.111.51])
by gateway04.websitewelcome.com (Postfix) with ESMTP id 71B161FDF8F4B
for <scamfraudalert@gmail.com>; Sat, 24 Aug 2013 11:49:49 -0500 (CDT)
Received: by ham02.websitewelcome.com (Postfix, from userid 666)
id 6D3F5CDC64BF; Sat, 24 Aug 2013 11:50:07 -0500 (CDT)
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on
ham02.websitewelcome.com
X-Spam-Flag2999: NO
X-Spam-Level2999:
X-Spam-Status2999: “No, score=-1.9 required=5.0 tests=BAYES_00 autolearn=ham
version=3.3.1
Received: from gator777.hostgator.com (gator777.hostgator.com [174.132.146.2])
by ham02.websitewelcome.com (Postfix) with ESMTP id 05082CDC5B1D
for <scamfraudalert@gmail.com>; Sat, 24 Aug 2013 11:50:05 -0500 (CDT)
Received: from [75.70.44.91] (port=63843 helo=EarthKeeper)
by gator777.hostgator.com with esmtpa (Exim 4.80)
(envelope-from <Ed@mydailycashleveraging.com>)
id 1VDH2I-0005yA-98
for scamfraudalert@gmail.com; Sat, 24 Aug 2013 11:50:04 -0500
From: “Ed” <Ed@mydailycashleveraging.com>
Subject: RE: Important marketing information…
To: scamfraudalert@gmail.com
Reply-To: Ed@mydailycashleveraging.com
Date: Sat, 24 Aug 2013 10:47:54 -0700
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname – gator777.hostgator.com
X-AntiAbuse: Original Domain – gmail.com
X-AntiAbuse: Originator/Caller UID/GID – [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain – mydailycashleveraging.com
X-BWhitelist: no
X-Source:
X-Source-Args:
X-Source-Dir:
X-Source-Sender: (EarthKeeper) [75.70.44.91]:63843
X-Source-Auth: info+getlegitonlinejob.com
X-Email-Count: 236
X-Source-Cap: Z2xvajM7Z2xvajM7Z2F0b3I3NzcuaG9zdGdhdG9yLmNvbQ==
Message-Id: <20130824165005.05082CDC5B1D@ham02.websitewelcome.com>
____________________________


from: Ed <Ed@mydailycashleveraging.com>
reply-to: Ed@mydailycashleveraging.com
to: scamfraudalert@gmail.com
date: Sat, Aug 24, 2013 at 9:47 AM
subject: RE: Important marketing information…

Hi,

Ed Here… If your business is not producing income that you know it should, I CAN GUARANTEE it’s a Marketing Issue.

Now listen closely,

I don’t know any marketers out there who have the desire or the ability to share this with you, but I think you could really benefit from this…

…This is the exact system I personally use to Make $500 to $6500 in profits per Sale repeatedly on auto pilot!

The Best Part is,

Our Automated System generates hundreds of pre-qualified leads daily, and the system also contacts and sorts your leads for you, so you never have to waste time talking to people who are not interested or personally deal with rejections.

You’ll never believe how simple this is. Our team leaders will even close your SALES for you if you wish.

let me know what you think after you watch THE ENTIRE WEBINAR at: http://MyDailyCashLeveraging.com

Best wishes & Continued Success!
Ed@MyDailyCashLeveraging.com

P.S.
Just so you know, I hate spam as much as the next guy, You HAVE NOT been added to any email list, so you will never receive this email from me again.

Andrew.Ferguson@Hilton.com ~ garykenedy@outlook.com

Email header analysis report
All valid IP Addresses found in the header.
Ip Address 3rd Party Info Provider City Flag Country
* 169.254.3.29 Check 169.254.3.29 at Senderbase.org Check 169.254.3.29 at Reputationauthority.org n/a n/a
169.254.2.29 Check 169.254.2.29 at Senderbase.org Check 169.254.2.29 at Reputationauthority.org n/a n/a
167.187.100.2 Check 167.187.100.2 at Senderbase.org Check 167.187.100.2 at Reputationauthority.org Red Lion Hotels & Inns Beverly Hills United States
68.232.140.118 Check 68.232.140.118 at Senderbase.org Check 68.232.140.118 at Reputationauthority.org Cisco Systems Ironport Division San Bruno United States

*Probable originating IP address

_______________________

scamalertDelivered-To: scamfraudalert@gmail.com
Received: by 10.205.102.194 with SMTP id df2csp79006bkc;
Sat, 24 Aug 2013 10:11:20 -0700 (PDT)
X-Received: by 10.236.228.137 with SMTP id f9mr5774561yhq.44.1377364279248;
Sat, 24 Aug 2013 10:11:19 -0700 (PDT)
Return-Path: <prvs=9418cc540=Andrew.Ferguson@hilton.com> Received: from esa5.hilton.iphmx.com (esa5.hilton.iphmx.com. [68.232.140.118])
by mx.google.com with ESMTPS id f5si2629081yhd.241.1969.12.31.16.00.00
(version=TLSv1 cipher=RC4-SHA bits=128/128);
Sat, 24 Aug 2013 10:11:19 -0700 (PDT)
Received-SPF: pass (google.com: domain of prvs=9418cc540=Andrew.Ferguson@hilton.com designates 68.232.140.118 as permitted sender) client-ip=68.232.140.118;
Authentication-Results: mx.google.com;
spf=pass (google.com: domain of prvs=9418cc540=Andrew.Ferguson@hilton.com designates 68.232.140.118 as permitted sender) smtp.mail=prvs=9418cc540=Andrew.Ferguson@hilton.com
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: Ap8AAAjoGFKnu2QCmWdsb2JhbABagkOBSoMnqwSRZh58Fg4BAQEBAQ
YNCwcUKIIbAQoFBBwzOAEGBQEJFVYmAQoBDAiFboILiQKMS450CJIHgSe
PIIMeECZ9A54/ji48gW4
X-IPAS-Result: Ap8AAAjoGFKnu2QCmWdsb2JhbABagkOBSoMnqwSRZh58Fg4BAQEBAQYNCwc
UKIIbAQoFBBwzOAEGBQEJFVYmAQoBDAiFboILiQKMS450CJIHgSePIIMeECZ9A54/
ji48gW4
X-IronPort-AV: E=Sophos;i=”4.89,947,1367989200″;
d=”scan’208,217″;a=”34322933″
Received: from unknown (HELO mail.hilton.com) ([167.187.100.2])
by esa5.hilton.iphmx.com with ESMTP/TLS/AES128-SHA; 24 Aug 2013 12:11:00 -0500
Received: from HFWMXMSG05PH.hotels.ad.hilton.com (10.80.40.25) by
HFWMRMSG02PH.hotels.ad.hilton.com (10.80.200.52) with Microsoft SMTP Server
(TLS) id 14.2.342.3; Sat, 24 Aug 2013 13:10:56 -0400
Received: from HFWMXMSG03PH.hotels.ad.hilton.com ([169.254.2.29]) by
HFWMXMSG05PH.hotels.ad.hilton.com ([169.254.3.29]) with mapi id
14.02.0342.004; Sat, 24 Aug 2013 13:10:57 -0400
From: Andrew Ferguson <Andrew.Ferguson@Hilton.com>
Subject: RE
Thread-Topic: RE
Thread-Index: Ac6g7OWpg6LodkHkS525FS6TJ4rcDA==
Date: Sat, 24 Aug 2013 17:10:56 +0000
Message-ID: <DAF30024411FD3488FFA317D89C3085D1445E561

@HFWMXMSG03PH.hotels.ad.hilton.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.80.202.30]
Content-Type: text/html; charset=”koi8-r”
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
To: Undisclosed recipients:;
Return-Path: <Andrew.Ferguson@Hilton.com>

This transmission is not a digital or electronic signature and cannot be used to form, document, or authenticate a contract. Hilton and its affiliates accept no liability arising in connection with this transmission.Copyright 2013 Hilton Worldwide Proprietary and Confidential

________________________________________________

Din e-mail-id er blevet udvalgt til kontanter 1.000.000,00 fra selskabet Jumbo som den heldige vinder. Send Navne …… Nationalitet ….. telefon …. til denne e-mail: garykenedy@outlook.com
___________________________________________

North Carolina AG Warns of Corporate Records Service

Don’t Fall for the Latest Corporate Records Scam

If you own or work for a business, don’t respond to an official looking mailing from scamalerta group called Corporate Records Service.  Businesses across the state have reported getting the letter, which asks you to fill out an annual corporate records form and send $125 to an address in Raleigh by September 4.

The letter includes references to state law on corporate records, which is enforced by the North Carolina Secretary of State.  But the Secretary of State’s Office does not issue letters like the ones sent by Corporate Records Service, nor does the agency collect fees for filing these records.

We’re investigating these misleading letters, and have taken action against a possibly related scam in the past.  In that case, we barred a California company that sent similar mailings from operating in the state and returned $90,000 in checks it had collected to small businesses across North Carolina.

If you receive one of these letters, don’t respond.  Report scams like this one to the Attorney General’s Consumer Protection Division by calling 1-877-5-NO-SCAM or filing a complaint online at www.ncdoj.gov.

This message brought to you on behalf of North Carolina Attorney General Roy Cooper.

Bennie@googleapps-us.com

The Purpose of this post is to ALERT you that the job you are about to apply for orscamalert may have applied FOR or is CONSIDERING APPLYING FOR is FRAUDULENT. The identities of an individual or a business entity have been stolen along with fund from their bank accounts.

These job postings are an attempt to lure you into accepting and cashing counterfeit checks into your bank accounts. You are being recruited to wire transfer these funds via WESTERN UNION or MONEYGRAM from your bank into a DOMESTIC BANK  or OFFSHORE BANK ACCOUNT.

 Essentially You Become A Money or Repackage Mule

  1. Money Mule Explained 
  2. Understanding The Cyber Theft Ring
  3. Protecting Yourself Against Money Mule
  4. KrebsOnSecurity – Cyberheist
  5. Washingtonpost.com by Brian Krebs
  6. Interview With A Money Mule
  7. Bobbear.co.UK ~ Historical Money Mule Sites

____________________

  1. Hallie@google-trade.com
  2. Peggy@google-trade.com
  3. Milton@google-trade.com
  4. Earl@googleapp-consult.com
  5. Dane@googleapp-consult.com
  6. Annabelle@googleapp-consult.com
  7. Michele@googleapps-consult.com
  8. Landerico@googleapps-spain.com
  9. carrer-trade.com
  10. googleapps-euro.com
  11. googleapps-career.com
  12. googleapps-consult.com
  13. googleapps-espana.com
  14. googleapps-gb.com
  15. googleapps-group.com
  16. googleapps-italy.com
  17. googleapps-japan.com
  18. googleapps-spain.com
  19. googleapps-usa.com
  20. googleapps-work.com
  21. apple-praca.com
  22. careerin-google.com
  23. europcv.com
  24. google-trade.com
  25. carrer-trade.com
  26. googleapps-euro.com
  27. googleapps-career.com
  28. googleapps-consult.com
  29. googleapps-espana.com
  30. googleapps-gb.com
  31. googleapps-group.com
  32. googleapps-italy.com
  33. googleapps-japan.com
  34. googleapps-spain.com
  35. googleapps-usa.com
  36. googleapps-work.com
  37. apple-praca.com
  38. careerin-google.com
  39. europcv.com
  40. google-trade.com
Email header analysis report
All valid IP Addresses found in the header.
Ip Address 3rd Party Info Provider City Flag Country
* 110.122.7.1 Check 110.122.7.1 at Senderbase.org Check 110.122.7.1 at Reputationauthority.org China Tietong Beijing China
181.67.207.129 Check 181.67.207.129 at Senderbase.org Check 181.67.207.129 at Reputationauthority.org Telefonica Del Peru Lima Peru
98.138.212.248 Check 98.138.212.248 at Senderbase.org Check 98.138.212.248 at Reputationauthority.org Yahoo Sunnyvale United States

*Probable originating IP address

We are a National leader in the Media/Internet/Marketing services industry looking for the perfect candidates to help our business grow and expand.

The opportunities are limitless!
We are looking primarily for dynamic energetic positive people who want to be their own boss!
If you are shy, need a lot of direction or looking for a job as opposed to a career, this position is not for you.

If you have a high level of integrity, are energetic and ambitious,
think big and want a career where the earning potential is limitless, keep reading!

NO COLD CALLING! We generate WARM exclusive leads!
Our potential business contacts us and want what we have!
No sales/internet/marketing services experience necessary!

People who generally EXCEL in this position have the following qualities:
Sales-minded with a passion for working with people
Self-motivated and goal-oriented
Honesty, Ethical & Ambitious
Passionate about your SUCCESS
Great networking skills with high energy
Excellent communication skills with ability to listen
Success-driven and focused on achievements and goals
Coachable and willing to learn from SUCCESSFUL people

Compensation:
Part Time: up to75k first year + residuals and bonuses
Full Time: 75k to 250k+ first year + residuals and bonuses
Paid Five Star vacations prizes, cash, and much more for those who excel

If you are interested, please reply to: Bennie@googleapps-us.com

Email resume and those selected who we think have what it takes to succeed
will be contacted by email with more details and our website link.

Extortion Scam Related to Delinquent Payday Loans

Washington, D.C. December 07, 2010

FBI National Press Office (202) 324-3691

The Internet Crime Complaint Center have received many complaints from victims of payday loan telephone collection scams. Callers IC3claim the victim is delinquent in a payday loan and must repay the loan to avoid legal consequences. The callers purport to be representatives of the FBI, Federal Legislative Department, various law firms, or other legitimate-sounding agencies. They claim to be collecting debts for companies such as United Cash Advance, U.S. Cash Advance, U.S. Cash Net, and other Internet check-cashing services.

According to complaints received from the public, the callers have accurate data about victims, including Social Security numbers, dates of birth, addresses, employer information, bank account numbers, and the names and telephone numbers of relatives and friends. How the fraudsters obtained the personal information varies, but in some cases victims have reported they completed online applications for other loans or credit cards before the calls started.

The fraudsters relentlessly call the victim’s home, cell phone, and place of employment. They refuse to provide any details about the alleged payday loans and become abusive when questioned. The callers have threatened victims with legal actions, arrests, and, in some cases, physical violence if they do not pay. In many cases, the callers harass victims’ relatives, friends, and employers.

Some fraudsters have instructed victims to fax a statement agreeing to pay a certain amount, on a specific date, via a pre-paid Visa card. The statement further declares the victim will never dispute the debt.

If you receive these calls, do not follow the caller’s instructions. Rather, you should:

Notify your banking institutions.
Contact the three major credit bureaus and request an alert be put on your file.
Contact your local law enforcement agencies if you feel you are in immediate danger.
File a complaint at http://www.IC3.gov.

Tips to avoid becoming a victim of this scam:

Never give your Social Security number—or personal information of any kind—over the telephone or online unless you initiate the contact.
Be suspicious of any e-mail with urgent requests for personal financial information. The e-mail may include upsetting or exciting but false statements to get you to react immediately.
Avoid filling out forms in e-mail messages that request personal information.
Ensure that your browser is up-to-date and security patches have been applied.
Check your bank, credit, and debit card statements regularly to make sure that there are no unauthorized transactions. If anything looks suspicious, contact your bank and all card issuers.
When you contact companies, use numbers provided on the back of cards or statements

http://www.fbi.gov/news/pressrel/press-releases/paydayloanscam_120710