Criminal Alerts !|
We receive numerous orders from thieves because our software and supplies make checks and bank drafts. Therefore, we carefully verify bank and ID inforrmation on new customers BEFORE we deliver. We do this to protect people and businesses from becoming victims of financial crimes and ID theft through the misuse of ChecksNet Software, ChecksForms or printers with CheckToner MICR (magnetic) toner cartridges. Criminals have used our CheckToner MICR cartridges to print checks and then returned used cartridges (sometimes completely empty) to us in their attempt to get a refund. We also track all downloads of our software to prevent illegal use by unlicensed individuals or businesses.
ATTENTION CRIMINALS: We work with law enforcement to set up "stings" to help catch YOU !
We've assisted local police, state agencies, Secret Service, F.B.I. & I.R.S. in capture & conviction.
Congratulations to the LAPD for arresting 2 suspects within 8 hours after we reported an illegal transaction.
Why criminals target ChecksNet
Our products have been sold worldwide through many major retailers so we're easy to find. Our products and clients makes us as attractive to criminals as we are to legitimate banks, businesses and government agencies.
How we catch criminals using stolen bank information
Thanks in part to criminals, we developed our Banks Database which allows us to verify funds & other account information in the USA and Canada. Criminals may think the Privacy Act will stop us from verifying account information. However, we CAN obtain the information by using our database. When we detect fraud we inform the bank and contact appropriate law enforcement agencies. In many cases, we successfully locate the victim of Identity theft to inform them and help catch the suspect(s).
We catch criminals who used our CheckToner MICR cartridges
All our CheckToner MICR cartridges are marked several ways for identification and specially packaged so we can detect any tampering, We do not offer refunds on any opened or used toner cartridges.
We post names, phone numbers email addresses and other information about suspects for 4 reasons:
1. Search engines will index the names & other information which may lead to their arrest.
2. Law enforcement agents may recognize one or more names which can help solve a case.
3. Criminals will see this before attempting to purchase ChecksNet using stolen ID and/or bank information.
4. Internet & email service providers may see this and suspend service to the person(s) behind the email addresses.
NOTICE TO BANKS & CREDIT UNIONS: We report incidents where someone attempts to place an order using ID that does not match bank account information. We appreciate your cooperation when we call to verify funds & account information.
NOTICE TO ALL BUSINESSES: Do not trust cellphone numbers as positive ID. Cellular number & persons name can be ported (moved to another cellphone) without the immediate knowledge of the real owner. If you rely on caller ID, insist on contacting your customer ONLY at their home or verifiable place of employment.
NOTICE TO CRIMINALS: On 7/15/04 President Bush signed a federal law which imposes MANDATORY PRISON TIME for all ID theft crimes. Details.
SUSPECTS & CONVICTED CRIMINALS: Not in alphabetical or chronological order:
Jeremy Geddis firstname.lastname@example.org < This person used stolen bank info to get ChecksNet on 3/30/02. On 4/2/02 James Laurence Wilson (a/k/a Jeremy Geddis, John Avgoustiou and George Williams) was arrested by Secret Service. On June 20, 2002, he was sentenced to 33 months in prison for Identification Fraud and ordered to pay restitution to all known victims including $159.32 to Glenn Welt. As of November 2006, the court has forwarded full restitution on behalf of Mr. Wilson.
James P. Maguire < Person was arrested by the FBI for using ChecksNet to deposit unauthorized bank drafts, which is check fraud. As of December 2004, this person has been linked to 2 businesses using the names IBS, JM&M and may have also been using the name Jacque May of Palm Harbor FL.
Scott Wolfer 734-604-5181 email@example.com 3652 SE 32 Ave, Portland OR 97202 < Person who answers the phone# claims ID was stolen and cellphone# was ported (moved) to another phone. Person(s) posing as Scott Wolfer fraudulently obtained ChecksNet Software, ChecksForms & MICR cartridge C9700A .
Nina Matten a/k/a Amy Reed, Tucson AZ at 520-971-3156 using firstname.lastname@example.org and email@example.com . < Person is using stolen Wells Fargo Bank account information belonging to a business called Trees by Mike. Based on information we received, we believe this person is attempting to pass bad checks at retailers in the Tucson area. If you have information about this person, contact Detective Yerhart, Tucson Police 520-791-4499 X 1716
Morgan Momo, Euless TX a/k/a irie Computers, Inc. 817-793-9903 & 817-571-3724 firstname.lastname@example.org <Person(s) posing as Morgan Momo fraudulently obtained ChecksNet Software using what appears to be stolen Comerica Bank account information
Alphonzo E. Baylor Jr., Charleston SC email@example.com * < Has stolen Software
Michele Robinson, Kilgore TX a/k/a Shekinah Curriculum Cellar firstname.lastname@example.org * < Has stolen software
James Monroe email@example.com (202) 253-8265 < Attempted to place order using stolen bank information
Lora Martinolioch firstname.lastname@example.org * < "
Lee Kingen email@example.com * < "
Archie Ford firstname.lastname@example.org * < "
Philip K Rawlings email@example.com * < "
J SOlle firstname.lastname@example.org and email@example.com * < "
John R. Thackeray firstname.lastname@example.org * < "
Tom Blaine email@example.com * < "
Gerald Lehy Louisevans@mail.com * < "
Robert Schmidt firstname.lastname@example.org* < "
Kristine Wassuman Yogi3000@msn.com * < "
Brandon Bergmark email@example.com * < "
Michael Thierman or Ron Nadon firstname.lastname@example.org * < "
Dean Miller email@example.com * < "
John Avgoustiou firstname.lastname@example.org < James Laurence Wilson convicted 6/20/02 of Identification Fraud (see next listing below)
Ramin Samimi email@example.com * < Attempted to place order using stolen bank information
Shane Allen firstname.lastname@example.org < no such email address
Mina Gawly email@example.com * < Fraud investigation by US Bank
Will Brown firstname.lastname@example.org * < Attempted to place order using stolen bank information
Kelvin Johnson email@example.com * < "
Mordy Koslovsky firstname.lastname@example.org * < " NOTE: The REAL Mordy Koslovsky in New York from Mordy Koslovsky Bookkeeping & Tax Services is the victim and this is not his real email address
Dr. Jeffrey Sobel email@example.com * < "
Susan Kaminski firstname.lastname@example.org * < "
Michael Thompson email@example.com * < "
James Testa firstname.lastname@example.org* < "
Deidre Chattan email@example.com* < ID & check theft confirmed 10/4/02
James Lawton II firstname.lastname@example.org* < Attempted to place order using stolen bank information
Deondrae Dunn email@example.com* < "
Mark Anderson firstname.lastname@example.org < "
Rick Rochford email@example.com
Randy Harden firstname.lastname@example.org < This person has felony charge(s) filed. He deposited $thousands in fake bank drafts at Bank of America & U.S. Bank in Nevada. His brother, Hubert Harden is a known accomplice. The Harden brothers may also have victims in the Los Angeles,CA and Anchorage,AK areas. One of Randy's victims reported to us 10/02 that he may be hiding at his mother's home in Los Angeles: 1053 W 109 PL, LA CA 323-418-8150
May Anderson email@example.com * < Attempted to place order using stolen bank information
Ray Williams firstname.lastname@example.org * < This person has stolen copy of ChecksNet Standard and may be using it to commit further crimes. May also be using name of Aaron Byrd at (770) 438-2137.
Mark Laine email@example.com * < Attempted to place order using stolen bank information
Heidi Rosenfarb firstname.lastname@example.org * < Person with this email address using Heidi's stolen ID and bank info
Micheal Lee email@example.com
Joy Rothholtz firstname.lastname@example.org * < Person with this email attempted to place 2 orders using bogus bank information
email@example.com a/k/a firstname.lastname@example.org < Person with this email attempted to place orders using stolen bank information
Don Furman email@example.com <Attempted to place a rush order using bank account with insufficient funds. When we uncovered this fact, suspect phoned us from 319-338-3169 in Iowa City, IA on 12/31/04 and said he knew funds were not available but placed the order under duress.
Philip Warren a/k/a Lamin Mara firstname.lastname@example.org < Attempted to place order using fraudulent bank information
Alma Baez a/k/a Nathan L. Weber email@example.com < Attempted to place order using fraudulent bank information
David firstname.lastname@example.org 817-460-3428 <Attempted to place orders in 2004 and 2005 using what appears to be same stolen Saigon-Taipei Market ID and Wells Fargo account bank information.
Zachary Burkes email@example.com < Attempted to place orders 3/14/05 and 3/28/05 using bank accounts with insufficient funds. Suspect phoned us from 818-448-5923 and may also be using 323-947-8547. Suspect wanted software kit shipped to 7817 Lankershim Blvd, N Hollywood CA 91605. Suspect tried again on 4/9/06 This time wanted to use a Washington Mutual account but said he didn't have the account #.
Joe Havatian a/k/a Evelyn Williams a/k/a Coggan firstname.lastname@example.org < Placed 7/20/05 order using someone else's bank account at JP Morgan Chase Bank under the assumed name of Excellence Services, 100A Walnut, #701, Champlain NY 12919. Suspect receives stolen property at 5180 Gatineau, #179, Montreal QB H3T1W9 using 514-568-9908 which appears to be a disconnnected throw-away cellphone. Suspect may be working under another name at Corporate Wealth Management a/k/a alertpay.com in Canada or may have a co-conspirator working there. Suspect(s) may be in possession of stolen ChecksNet Software, gray ChecksForms, Hp 1012 laser printer and MICR toner cartridges. Any information on suspect(s) should be reported to the Montreal Police.
William Snyder a/k/a N. Nitton email@example.com < Placed 4/28/06 order using a closed bank account at Wachovia Bank. Suspect may be using the business name E Mini Holding Corp and receiving stolen goods at 6873 Douglas Blvd, Suite 208, Granite Bay CA 95746. Suspect has access to 916-484-4100 and 760-845-0099.
Deen Ahmed d/b/a Delta One Tech 514-824-3336 firstname.lastname@example.org using bogus TD Canada Trust Bank accounts to pass bad checks. Any information on suspect should be reported to Broussard Police in Quebec. Last known addresses: 3705 Avenue Colomb Apt 202 and 5612 Alain St.. Has stolen/unpaid copy of ChecksNet 12 Software obtained 7/16/07.
William and Nicole Bonchosky d/b/a Paint It Now, Henderson NV 702-467-8441 & 702-468-1407 issuing bad checks. Has a MICR cartridge for Okidata C5800 obtained 7/30/07. Known to associate with person or persons located at 4600 E. Sunset Rd in Henderson NV. Criminal activity related to these suspects should be reported to Henderson Police, Henderson, Nevada.
Kelver, Valerie 4455 Powell Ave, Las Vegas NV 89121 702-456-9799 & 702-528-4161. Theft of $110 computer parts and labor
MICHAEL WARN, 5247 Wilson Mills Road, Box 533, Richmond Heights, OH 44143, 216-904-7095 , email@example.com $710.61 credit card payment was disputed by suspect who claimed the transaction is as an unauthorized charge. If that is true, this may also be a case of identity theft, meaning the real Michael Warn is also a victim. ChecksNet has voicemail recordings of the suspect dated 4/9/2019 and 4/27/2018. On 4/18/2019 suspect purchased a toner cartridge for printing checks which he received on 4/27/2018. Detective Greg Patterson of Richmond Heights Police was contacted at 216-486-1234 on 5/8/2018. Suspect's billing and delivery address is a rental mailbox at a PostalAnnex retail store.
LESLIE ANNE FERGUSON, 953 Clipper Drive, Henderson, NV 89015, 702-788-9647, firstname.lastname@example.org.