An Epic Florida Gang’s RICO Tax Fraud – Act 1: The Individuals

Join me to hear an epic story of a 10 person RICO tax fraud ring that tried make over $45m over 4 years! This is eCrimeBytes Season 3 Episode 2, An Epic Florida Gang’s RICO Tax Fraud – Act 1: The Individuals.

Sources:

Transcript:

00:00:10:00 – 00:00:39:04
Keith
What’s up, you crazy bastards. Welcome to eCrimeBytes. This is where I research the court documentation and roast the criminal so you don’t have to. So this week, this is season three, episode two. This is an epic, epic Florida Gang’s RICO tax fraud. All right. I say epic because there’s nine individuals that are alive that were involved with this.

00:00:39:04 – 00:01:05:15
Keith
And there was an individual that’s dead that was involved with this. So ten people total. And the dates were between December of 2015 and March of 2019. That this whole crime occurred. So the crime here we have a bunch. We have RICO conspiracy, which is a racketeering like organized crime charge. We have conspiracy to commit wire fraud. We have aggravated ID theft.

00:01:05:15 – 00:01:32:14
Keith
We have all these crimes coming together. And when you add up the total of what this gang tried to make, it was $45 million over four years. Now, the IRS said that they definitely lost $7 million. So there’s a lot of money at stake here. So anywhere from $7 million up to $45 million, depending on how you look at this.

00:01:32:19 – 00:01:57:48
Keith
So the victims in this case, there’s a ton. There’s over 9000 people actual people that are identity victims here. There’s multiple corporations that become a victim because they’re in their computer networks are intruded upon. They become a victim because data stolen from them. But they become a victim because then this crew uses them to file tax returns through them.

00:01:57:52 – 00:02:28:24
Keith
It’s mind blowing. You got to stick around. So that’s a whole class of victims. And then there’s the IRS, United States, all of us that live in the United States. You know, we’re victims because you know, money stolen from the United States. The technology here compromised accounts. So here, the criminals buy compromised accounts where basically they can be on the desktop of a computer inside one of these victim companies.

00:02:28:24 – 00:02:55:11
Keith
And these victim companies are CPA firms or accounting firms or firms that create tax returns for customers. That’s the type of corporations that we’re talking about here. Another thing we’re going to be talking about are tax banking products. And we’ve talked about this in other episodes where it’s the specialized bank accounts that tax preparers are allowed to have because sometimes they hold the money for a customer.

00:02:55:16 – 00:03:12:17
Keith
So it’s not really their money, but it’s also coming from the government and it’ll make a little more sense later on when I describe a little bit of the background here. So I picked this case because it’s huge. It’s huge. There’s a lot of people involved. There’s ten people and a lot of money involved, many millions of dollars.

00:03:12:17 – 00:03:36:20
Keith
And you’re going to see that this is one particular case I can’t give you chronologically in order because we’ll be here for a week. There are so many things that they do. There’s so many people. There’s so many events, and it goes over four years. I just can’t give you a play by play. So this is one of the first episodes that I’m going to give you, where I’m going to talk about the people behind the crimes in this act today.

00:03:36:25 – 00:03:52:07
Keith
And that’s act number one. The individuals I’m going to give you a flavor of what they did. And I’m gonna go through all their names and then tomorrow and act two, I’m going to go through all the corporations that are involved, and then I’m going to talk about what happened when everybody was caught, when all the shit went down, what happened.

00:03:52:12 – 00:04:11:01
Keith
So that’s how I’m going to present this episode to you. And I know it’s a little bit different, but I think it’ll go a little better because I got confused trying to do it chronologically, and I know I couldn’t explain it to you well enough so you could go and understand it chronologically. So in this method, this is what I’m trying for this episode, so I hope you stick with me.

00:04:11:06 – 00:04:30:11
Keith
So with that, let’s start act one the individuals. Now, before we do that, I got to give you some background here. So tax preparers, they need some things to do their job. One thing is called an EFIN number. And this you get from the government. It’s called an electronic filing identification number. So let’s start a fictitious scenario.

00:04:30:16 – 00:04:58:21
Keith
Keith Jones. I have a tax preparation service. Keith Jones Tax Preparation Service, Inc. Okay. I need a EFIN number in order to file tax returns for all my customers. And I need this any time as an individual, I file anything more than more than ten returns. They consider that bulk and you need an EFIN number. So basically, any tax preparer.

00:04:58:25 – 00:05:26:25
Keith
So another thing you need. So that usually covers a corporation that would cover the Keith Jones tax preparing scenario. Keith Jones would work inside there. Okay. So I would need my own type of preparer number. And this is called a PTIN PTIN preparer tax I.D. number. Now, you can imagine a corporation will have an EFIN and then a preparer inside that corporation will have a PTIN.

00:05:26:30 – 00:06:06:06
Keith
These numbers are going to be a little more important later on. Tax preparers, they can buy products. Now, once they have these numbers, now there’s something out there called Drake Software and there’s taxslayer. This allows tax preparers to have a method to electronically submit their customers tax returns. So basically, you can imagine if in my fictitious scenario, if I’m doing tax preparation services, I would have customers come to me, I would do their tax return, and then I would go to my Drake software, Taxslayer software, and then submit that on behalf of the customer.

00:06:06:11 – 00:06:24:49
Keith
Now, that’s part of the process. Let me talk about the other part of the process. Imagine the government gets it, they process it back and they’re like, Hey, this guy gets $1,000 check, right? So there is this thing called a refund transfer. That’s a technical term for refund transfer. And I’m not I’m going to try not to use that phrase because it just sounds weird.

00:06:24:54 – 00:06:54:47
Keith
But this process, what this happens what happens here is banks will give tax preparers special privileges. They’ll give them these temporary accounts where the preparers can store a customer’s tax return, refund, where it gets deposited, but it would be minus any other preparers fees. So you can imagine a my scenario, if I did your tax return and you get $1,000, maybe my the cost of me doing it was $50.

00:06:54:51 – 00:07:15:28
Keith
So what would happen is it would go to the government. The government would say, hey, this guy gets $1,000. It would come back to me, the preparer. I would subtract my $50 and you would get $950 through this temporary account that I’m describing right now to you. How would you get that money? Well, there’s three different main methods here.

00:07:15:29 – 00:07:37:18
Keith
One is this temporary account can direct deposit to some account you give me. That’s probably the most popular method, right? As a prepaid debit card. So as preparer, I can make a physical card that I give you. And it would have that $950 on it. You could go to ATMs and take money out or it’s a debit card.

00:07:37:18 – 00:08:00:10
Keith
So you could actually probably use it at a store too. Or if you’re old fashioned, print a check. So I could just print a check out of that temporary account and you get the money that way. All this stuff is important because this is this process here, the special treatment that taxpayers get. This is what the criminal enterprise exploited.

00:08:00:14 – 00:08:20:13
Keith
Now, I’m going to switch gears a little bit on ya. Imagine, imagine you’re a bad guy and you want access into a CPA firm like this crew I’m talking about. They wanted access into CPA firms. Now, from what I read in the documentation, they didn’t have personnel to go out there and run exploits and gain a foothold in the network and do all the reconnaissance and all that kind of stuff

00:08:20:13 – 00:08:42:16
Keith
it takes to get a compromised server with with somebody personally identifiable information on it. They wanted a easy button, right? They wanted to press a button and go, I have access. And there’s a way to do this. On the dark web. There’s marketplaces. Pretty much everything. You can buy drugs you can buy hitman, you can buy anything.

00:08:42:17 – 00:09:05:05
Keith
We’ve we’ve covered this in our prior episodes. You can go buy compromised accounts to your favorite company if if one exists. So let’s say the Keith Jones tax preparer service. Let’s say that company wanted to target me. They would go looking on these forums, and now I’m just going to call it generically the marketplace, because in the court documentation, they didn’t tell us where it was.

00:09:05:05 – 00:09:30:10
Keith
They just said the marketplace. Maybe that’s actually the name. I don’t know. But they just kept saying the marketplace, that’s what I’m going to be saying here. And I kind of just mean it generically. So this is on the dark web. This is not something you go to on your day to day Web browser. This is something you have to download the special tor browser and go on a different network to access.

00:09:30:15 – 00:09:57:33
Keith
This crew, used this market place generically to buy accounts, compromised accounts in these CPA firms. Okay, let me repeat that. They didn’t break in themselves. They went and bought the access from this marketplace, so they just had easy button for them and they just had access to compromised servers in the CPA firm. So think about that for a minute.

00:09:57:38 – 00:10:19:09
Keith
If you had access unauthorized into a CPA firm, you didn’t work there. Imagine the data you had in your hands. It would be pretty close to a law firm because you had all the financial information about all the customers there. It would be unbelievable. And that’s what they had here. So they could steal personally identifiable information of the CPA firm’s customers.

00:10:19:14 – 00:10:43:24
Keith
So not only is a CPA firm a victim, but the CPA firm’s customers are now a victim. This is why I’m saying this is this crime is huge. So I’m trying to bring you the names that they use on these marketplaces and e-mails because I kind of find them interesting. And I hope you do, too. So the first person I’m going to talk about in this case, let me let me back up.

00:10:43:24 – 00:11:07:15
Keith
Okay. I try to pronounce everybody’s name as correct as I can the first time. And throughout I try to be very respectful of criminals and otherwise. I know that the name Keith Jones is very easy to pronounce. So I try my darndest. Please leave me some leeway in this episode because all these names sound French. I’m going to try my best to pronounce them.

00:11:07:15 – 00:11:51:31
Keith
I know, I know upfront. I’m going to murder them. I know up front I’m going to murder them, but do know I’m not doing this on purpose. I’m trying my best. Our first individual, Jeff Jordan Propht-Francisque. I probably murdered that one. So I will put a picture of him on your screen right now. Jeff. He purchased compromised server credentials and stole PII from those servers so that fictitious, that fictitious example of the Keith Jones tax preparer service that I told you about, they would break into a company like that and then they would steal the PII that I would have on my customers.

00:11:51:32 – 00:12:16:14
Keith
That’s what happened here. That’s what Jeff did. His marketplace name was moneybaby954, which I thought was kind of cool. And that please, please. That’s his formal one. His less formal one is just moneybaby if you want to if you want to refer to him with that account. So he had two accounts, moneybaby954 and just moneybaby.

00:12:16:19 – 00:12:36:16
Keith
Now his email associated with this was let’s an S there’s two S’s in there, so it’s let’s go go DLST at Yahoo.com. Now I try to look at these things and make a little sense of them. I don’t understand why he wrote that. It’s like I see the let’s go go. But I don’t know what the DLST stands for.

00:12:36:16 – 00:12:59:35
Keith
So hey, if you know what it is, put a comment on this video because I’m curious. All right. So Jeff was caught later on when they do the investigation. He once paid $4,527 for stolen server credentials. I’m telling you this money because keep this in mind, I told you some of the crime numbers. I said $45 million. Right.

00:12:59:40 – 00:13:23:47
Keith
So we’re talking about millions of dollars of crime. And to get it, it was only thousands of dollars per stolen server. It’s about $1,000. When I looked at just average of what they were saying in the court paperwork, it’s about $1,000 per server that they bought that was compromised. So he was one of the people directly in the mix here.

00:13:23:52 – 00:13:59:59
Keith
The next person, this is a Louis Louis Noel Michel, I hope I’m pronouncing that correctly. Now Louis, he purchased compromised accounts from the marketplace as well. His username was not as interesting it was just mil underscore life 1804 or mil underscore life 1804 four. Now, Lewis paid at least $23,000 for 27 compromised servers. That’s where I start to get that number of about $1,000 per server.

00:14:00:04 – 00:14:24:58
Keith
You see, in some instances they say they spent more per server. And then you see like this where it’s 23,000 for 27 their servers. So that’s about a thousand per server. Now, Louis’s emails here boss bg 1804, which I thought maybe that was boss big? Oh all these are at Gmail by the way, so it’s boss Bg 1804 is one of them.

00:14:25:03 – 00:15:00:24
Keith
DRBG1804. I think that stands for Dr. Big I don’t know. The third one is Boss H B 1804 So obviously 1804 means something. I uh. Maybe it’s a date. I don’t know. I that’s my guess if you, if you have guess what it is comment on this video. I’m curious what your guess is. So Louis he helped operate businesses that were involved in this crime and I haven’t talked a lot about the businesses yet because that’s a whole focus of my next topic area of this episode.

00:15:00:28 – 00:15:21:41
Keith
So do know I’m going to talk about these businesses in a minute. Somebody had to set them up and operate them. Michel is one of those people because this blows my mind. Okay, So imagine imagine for a moment you’re a you’re an assassin and you murder for a living, right? And then you have coconspirators that also help you murder for a living.

00:15:21:46 – 00:15:55:58
Keith
Do you go on your email and show a bloody murder picture to your friend and go, Hey, look at this fucker I just murdered? Oh my God, I totally took his head off. That’s kind of what happened here digitally in this case, because Michel, he was caught sending emails with photos, with tax return info on it and these intrusion connections, this these remote desktop protocol intrusions into these CPA firms that I told you about earlier on, they have photos and they were sending it to each other over email.

00:15:56:12 – 00:16:21:15
Keith
So they just did the digital equivalent of what I said of sending pictures of my assassinations over email. It’s unbelievable. This is not the first and only time it happened either. Stick around. You’re going to hear more of this that that happens in this case. So another mind blowing thing. Imagine you’re a criminal doing all this. You would probably not want it traced back to your phone or email or your residence or anything to do with you.

00:16:21:20 – 00:16:49:14
Keith
Well, Louis attached his real phone number as a recovery phone number and the fraudulent emails he used in this criminal spree. Let me say that again a different way. He used his real phone number as the identifying information on his fraudulent accounts for the crime. Yeah, he also so I’m going to bring you most of the crime.

00:16:49:14 – 00:17:12:19
Keith
I’d say like 90% plus of the crime involves either breaking into businesses and using their ability to file taxes or setting up other companies that can file taxes and siphoning off money into accounts that this enterprise owns. There’s a little bit of a ripple in that at some point they kind of do these self prepared tax returns. So there’s like this side crime kind of going on.

00:17:12:19 – 00:17:35:04
Keith
It was a smaller but it was the self prepared tax returns pile of crime. And you’ll hear me say that a couple of times because there’s a couple of individuals that did this where it looked like they took victim data and then just made it look like the victim filed it on the behalf of the victim themselves, which was different than all the other crime that they did.

00:17:35:09 – 00:17:57:28
Keith
Louis also pulled money out of these prepaid debit cards for these tax preparation services that they had the fraudulent money. And and I have a chart for this later on. I don’t want to show it now because I there’s another individual tied to this as well. And I’ll show you then. But I have a chart of some of the ATM withdrawals and it’s anywhere from about $2,000 up to about $7,000.

00:17:57:33 – 00:18:22:04
Keith
It’s a lot. I didn’t want to bring in this chart like three times in this episode. So stick around and I’ll bring it again on one of these other individuals that I talk about. So the next individual I don’t have a picture for. I tried. I looked at as many mug shots as I could find. This is Alain Jean Louis, and I don’t have a picture, but I will tell you about him.

00:18:22:09 – 00:18:53:01
Keith
He used the marketplace to purchase credentials of compromised servers to these CPA firms. His marketplace account was, quote unquote shit got to stop, which is probably my favorite one out of this whole episode. Shit. Got to stop. He once paid $1,120 for server credentials for a CPA firm. So that’s again where I start to get that $1,000 per compromised account.

00:18:53:06 – 00:19:19:23
Keith
And that just seemed like the going rate that this crew paid for servers. He had his marketplace account linked to an email called a Wicked Hive at Icloud.com, and he was also seen sending the stolen, personally identifiable information from the CPA firm’s customers to other conspirators over email. So again, that’s like those murder pictures that I told you about earlier.

00:19:19:28 – 00:19:43:28
Keith
But just in the digital sense. And Alain also involved with the self prepared fraudulent return scheme. Now, Andi Junior Jacques so I put a picture of Andi on for you and he kind of had his hand in almost everything from what I could read. He set up and operated all these businesses that I’ll bring you later. And again, don’t don’t concentrate on the businesses.

00:19:43:28 – 00:19:58:15
Keith
I don’t the business names don’t they don’t matter. They had to set up a bunch of them to sort of spread out their crime and make it look like normal activity. So there’s a bunch of business names that I’m going to throw only once at you later on. Somebody had to set these up, somebody had to manage them.

00:19:58:15 – 00:20:34:02
Keith
Somebody had to keep the books straight and, you know, the emails and all that kind of stuff. Right. And he was one of those people. They had their hand in that pot. And he also used victim PII or personal identifiable information to register these tax preparer EFINs and PTINs, too. So you can imagine as a victim having your refund stolen because these fuckers all came together and you became a victim and they filed something fraudulently on behalf and they got the money for it, imagine being that victim.

00:20:34:07 – 00:20:54:40
Keith
But then imagine going further and the government going, Hey, your information’s used as the preparer information too. That would just be horrible because you’d have to clear your name of that as well. So when the government did an investigation, they did find that Andi took out some money. He had his hands on the money that was made from this enterprise.

00:20:54:40 – 00:21:39:50
Keith
There was at least $19,000 that they could trace directly to him. And so the next person, Vladimyr Cherelus. Now Vladimyr. Vladimyr purchased compromised account information. And I saw that he spent at least $6,455 and said data or said access information or said access to this these victims. He emailed himself himself so not even like I needed to tell somebody but himself screenshots of the victim networks over RDP, which only could mean he was accessing these victims as a criminal.

00:21:39:55 – 00:22:00:21
Keith
He took pictures and sent them to himself. So that would be the equivalent of me murdering somebody and taking pictures of it and sending it to myself. Just unbelievable in the digital sense. His marketplace usernames included kids seven, five, 4 million. Now, I don’t want to judge. I mean, this guy looks like a stand up guy if you look at his picture.

00:22:00:26 – 00:22:24:20
Keith
But the word kids shows up in his online marketplace. So immediately, to me, that feels creepy, feels incredibly creepy. I try to put a little sense to the emails and and handles and things to try to I think if I’m a person, what what, what would that mean to me here? I couldn’t make sense of it. His email address also couldn’t make much sense of it.

00:22:24:20 – 00:22:48:29
Keith
It was vomy 78. So when I looked at his name Vladimyr Cherelus, I thought maybe vomy had something to do with Vladimyr. I don’t know. 78 maybe. That was the year he was born. I don’t know. That was my guess. If you have a guess, feel free to tag it in the comment here. So Vladimyr, he was involved with helping operate businesses that use the scheme.

00:22:48:29 – 00:23:07:23
Keith
So again, these businesses, they needed people to set them up, businesses they can’t set themselves up. Vladimyr was one of them. And then they need operation, they need maintenance, they need people to answer emails and stuff like that. When the IRS says, Hey, I need more information from you, Vladimyr was a person that would do that type of thing.

00:23:07:28 – 00:23:34:20
Keith
Vladimyr was also caught with at least $27,000 worth of ATM withdrawals. And I know this because now I’m going to show you that chart that I promised you. And this is the chart that they showed in the court paperwork when they were talking about sentencing and stuff later on. And you can see on the fifth column over, they talked about the conspirator on the ATM for the withdrawals of the deposit amounts on the third column on the left hand side there.

00:23:34:24 – 00:23:55:12
Keith
And you can see it somewhere range from $2,000 up to seven, almost $8,000. So it’s a lot of money. It’s a lot of money. It’s not your $200 I’m going to the bar withdrawal at the ATM. It’s thousands of dollars. I didn’t know you could get this much out of an ATM. Okay. So the next conspirator, Dickenson Elan.

00:23:55:12 – 00:24:20:34
Keith
And I can’t tell you much about Dickenson because Dickenson went to trial and the documents weren’t as easy to grab as the other ones that basically said I did it. So I could tell from the information in the documents that I could pull that Dickenson was involved with setting up and operating all these businesses that we talked about throughout here and that I’m going to name later on.

00:24:20:39 – 00:24:58:05
Keith
So just keep that in mind. Dickenson’s kind of one of those people that I have some vague information on, but not a ton. Now, Monika Shauntel Jenkins is another one of the, I would say, top people in this crew. She had her hand in a little bit of everything she collected, stolen, PII and filed false tax returns. Now, you can imagine when these filed false tax returns come in to the IRS and all these other places, if you’ve watched any of these episodes that I’ve done, you’ve gotten this thing called IP addresses, and it’s this computerized numerical address

00:24:58:05 – 00:25:27:13
Keith
that gets stuck on your phone or your computer. And what it does is it lets other computers on the Internet know where you are and how to get data to you. But as humans, we can trace those back to individuals. So in this case, law enforcement got the IP address off these fraudulent returns. They went through the court paperwork and then the process and it traced back to a residence belonging to Monika Shauntel Jenkins.

00:25:27:18 – 00:25:52:30
Keith
So there’s some pretty serious evidence in this case. Monika also collected refunds. So actual, you know, the money that came from those ATMs that I just talked about previously. Monika had a bunch of email addresses. Now, some of them had nothing to do with her. So go girl. At least, you know, you were trying to make it not look like you like Frank presto 13 at yahoo.com.

00:25:52:35 – 00:26:15:16
Keith
She stuck with yahoo.com. I’m not going to say that every time. So all these are Yahoo dot com. So there’s Frank presto 13. But then there’s my personal favorite, which is Ms. Jenkins 007 So Mr. Jenkins like her name, but double oh seven like James Bond. So I thought that was the coolest one. And then you have I don’t know how to pronounce this is like shalouisdor.

00:26:15:21 – 00:26:39:21
Keith
shalouisdor. And then you have terry.bouton, and then you have Joy Partridge, 42. So these are all names I imagine she used to try not to look like Monika Shauntel Jenkins, other than her real Ms. Jenkins zero zero seven in her email. Again, just like everybody else, she has these emails of murder scenes.

00:26:39:21 – 00:27:04:43
Keith
So in the digital sense or murder scenes of what they did because they had stolen PII on it they had active RDP, these remote desktop intrusion sessions, they had pictures of it in their email and they had fraudulent returns in their email. So all evidence that prosecutors probably got really excited to see in their email. Now, here’s a footnote in the court paperwork I want to bring you, because it could be missed very easily.

00:27:04:43 – 00:27:44:42
Keith
And this is one of those things I dig out of the research. They knew they knew the IRS was investigating these types of crimes that they’re committing because Jenkins, in December of 2016, emailed this other person that I’ll bring you in a second called Rich Forever. Again, I’ll explain why in a second. A screenshot of an IRS announcement about a quote unquote new wave of attacks that allow identity thieves to file fraudulent tax returns by remotely taking over practitioner’s computers. Then Rich forever took that email or that announcement and forwarded it it to Cherelus, one of the other coconspirators.

00:27:44:42 – 00:28:13:15
Keith
So they knew that the IRS knew what type of crimes they were doing because this, this phrase describes exactly the crime that they’re committing. So they’re kind of sharing this going, Hey, look at this. They’re they’re investigating stuff like us. So our next individual is might Michael Jean Poix, Poix spelled poix. Now Michael he looks pissed in his mugshot here. He helps set up and operate businesses used throughout the scheme.

00:28:13:16 – 00:28:42:01
Keith
Again, don’t worry about the company names. They don’t matter in this. There’s a bunch of them. He helped manage and set all those up. He reportedly had a long personal relationship with Jenkins. Now, I don’t know if that meant she and he were together or that he and she were just partners in crime. But I do know that in 2012, which was about five years before this crime started, Jenkins and Poix, they were they committed tax fraud together.

00:28:42:01 – 00:28:45:23
Keith
They were caught. So they were already caught once doing this.

00:28:45:24 – 00:29:03:39
Keith
Our next individual, I have to apologize. I’m going to murder this name. Louisaint Jolteus Jolteus. That’s what I’m going with. He helped operate the businesses and I’ll give you the names here in a minute. I know you’re going to want to hear all of them,

00:29:03:39 – 00:29:36:02
Keith
but again, they don’t really matter. There’s like ten or so. Louisaint also obtained these things that they needed to operate a business as a tax preparer, as a fraudulent one like the PTINs, the EFINs, etc.. Louisaint also did some of the withdrawals and the disbursement of the funds back to the crew. So you can imagine that he’s probably the main person that takes the bulk of the funds and goes, okay, well, Keith gets 10% and Bobby gets 4% and Monika gets such and such percent.

00:29:36:02 – 00:29:54:52
Keith
And that was that’s sort of like his job in the crew. That’s all the people that are alive. There’s one person that’s dead. We don’t know his name. We know his moniker, which is rich forever4431. That’s what he used on the marketplace. Since he died, he was unnamed. He was active in the marketplace with that name.

00:29:54:52 – 00:30:11:40
Keith
And you’re just going to hear him, me talk about him kind of throughout. So that’s it. That’s the end of Act one. That’s all the individuals. And that’s kind of a lay of the land of what they did. I’m going to bring you all the companies and what they did in Act two, which is called the Companies tomorrow.

00:30:11:40 – 00:30:33:18
Keith
But don’t leave me yet. Don’t leave me because I need you to hit like I need you to hit subscribe. I need you two thumbs up. I need you to follow whatever it is that’s positive on your application that you’re watching me out. That helps me out a lot. If you could share this with friends that like true crime podcasts, especially ones that don’t take life seriously and try to joke a little bit, that’s me.

00:30:33:23 – 00:30:55:15
Keith
Please reshare, please share to your friends that would help me out so much. That’s the only thing I ask of you. With that, I hope you come back tomorrow and you join me for Act two of this episode. And Act two is called the Companies. And I’m going to go through all these companies. You’re not going to need to know what their names are, but I’m gonna give you a little bit of a flavor of what each of them did and outline the crime.

00:30:55:15 – 00:31:03:41
Keith
And then I’m going to tell you what happens once the law catches up with them and what kind of punishment they get. So hope to see you back tomorrow. Thanks. Bye.

One response to “An Epic Florida Gang’s RICO Tax Fraud – Act 1: The Individuals”

Leave a Reply

Your email address will not be published. Required fields are marked *