everify.com

from: Emmy email:emmy.valenstein@gmail.com
to: scamfraudalert@gmail.com
date: Wed, Oct 23, 2013 at 8:20 AM
subject: your site scamfraudalert.org
mailed-by: gmail.com
signed-by: gmail.com
: Important mainly because of the people in the conversation.

___________________________

My name is Emmy with eVerify.com. I’m interested in acquiring traffic on scamfraudalert.org. Either through an Affiliate relationship or media buy. My product provides instant background checks. Past partnerships with similar scam warning sites have been fruitful.

Please contact me to further discuss.

Thanks!
everify

800-791-1427

Advertisements

2 thoughts on “everify.com

  1. SFA Reporter says:

    Address lookup
    canonical name http://www.everify.com.
    aliases
    addresses 74.206.234.188
    Domain Whois record

    Queried whois.internic.net with “dom everify.com”…

    Domain Name: EVERIFY.COM
    Registrar: DOMAIN.COM, LLC
    Whois Server: whois.domain.com
    Referral URL: http://www.domain.com
    Name Server: NS.WEBAIR.NET
    Name Server: NS2.WEBAIR.NET
    Status: clientDeleteProhibited
    Status: clientTransferProhibited
    Status: clientUpdateProhibited
    Updated Date: 11-may-2012
    Creation Date: 28-sep-2003
    Expiration Date: 28-sep-2017

    >>> Last update of whois database: Thu, 24 Oct 2013 00:13:08 UTC <<<

    Queried whois.domain.com with "everify.com"…

    Registrant:
    EVERIFY
    P.O. Box 990043
    Boston, MA 02199
    US

    Domain name: EVERIFY.COM

    Administrative Contact:
    Pay, Info info@everify.com
    P.O. Box 990043
    Boston, MA 02199
    US
    6172629317 Fax: 6172629325

    Technical Contact:
    Pay, Info info@everify.com
    P.O. Box 990043
    Boston, MA 02199
    US
    6172629317 Fax: 6172629325

    Registration Service Provider:
    Dotster.com, support@dotster-inc.com
    +1.8004015250
    This company may be contacted for domain login/passwords,
    DNS/Nameserver changes, and general domain support questions.

    Registrar of Record: Domain.com
    Record last updated on 15-Jun-2012.
    Record expires on 28-Sep-2017.
    Record created on 28-Sep-2003.

    Domain servers in listed order:
    NS.WEBAIR.NET
    NS2.WEBAIR.NET

    Domain status: clientDeleteProhibited
    clientTransferProhibited
    clientUpdateProhibited

    Network Whois record

    Whois query for 74.206.234.188 failed: TimedOut

    Queried whois.arin.net with "n 74.206.234.188"…

    NetRange: 74.206.224.0 – 74.206.255.255
    CIDR: 74.206.224.0/19
    OriginAS: AS27257
    NetName: WEBAIRINTERNET3
    NetHandle: NET-74-206-224-0-1
    Parent: NET-74-0-0-0-0
    NetType: Direct Allocation
    Comment: rwhois://rwhois.webair.com:4321
    RegDate: 2008-05-14
    Updated: 2012-03-02
    Ref: http://whois.arin.net/rest/net/NET-74-206-224-0-1

    OrgName: Webair Internet Development Company Inc.
    OrgId: WAIR
    Address: 501 Franklin Avenue
    Address: Suite 200
    City: Garden City
    StateProv: NY
    PostalCode: 11530
    Country: US
    RegDate: 2001-03-12
    Updated: 2012-01-12
    Comment: Reassignment information for this block is available at rwhois.webair.com port 4321
    Ref: http://whois.arin.net/rest/org/WAIR

    ReferralServer: rwhois://rwhois.webair.com:4321

    OrgTechHandle: ZW64-ARIN
    OrgTechName: IPAdmin-Webair
    OrgTechPhone: +1-516-938-4100
    OrgTechEmail: ipadmin@webair.com
    OrgTechRef: http://whois.arin.net/rest/poc/ZW64-ARIN

    OrgNOCHandle: ZW64-ARIN
    OrgNOCName: IPAdmin-Webair
    OrgNOCPhone: +1-516-938-4100
    OrgNOCEmail: ipadmin@webair.com
    OrgNOCRef: http://whois.arin.net/rest/poc/ZW64-ARIN

    OrgAbuseHandle: ABUSE2550-ARIN
    OrgAbuseName: Abusehandle
    OrgAbusePhone: +1-516-938-4100
    OrgAbuseEmail: abuse@webair.com
    OrgAbuseRef: http://whois.arin.net/rest/poc/ABUSE2550-ARIN

    RNOCHandle: ZW64-ARIN
    RNOCName: IPAdmin-Webair
    RNOCPhone: +1-516-938-4100
    RNOCEmail: ipadmin@webair.com
    RNOCRef: http://whois.arin.net/rest/poc/ZW64-ARIN

    RAbuseHandle: ZW64-ARIN
    RAbuseName: IPAdmin-Webair
    RAbusePhone: +1-516-938-4100
    RAbuseEmail: ipadmin@webair.com
    RAbuseRef: http://whois.arin.net/rest/poc/ZW64-ARIN

    RTechHandle: ZW64-ARIN
    RTechName: IPAdmin-Webair
    RTechPhone: +1-516-938-4100
    RTechEmail: ipadmin@webair.com
    RTechRef: http://whois.arin.net/rest/poc/ZW64-ARIN

    DNS records

    DNS query for 188.234.206.74.in-addr.arpa returned an error from the server: NameError
    name class type data time to live
    http://www.everify.com IN A 74.206.234.188 900s (00:15:00)
    everify.com IN SOA
    server: ns.webair.net
    email: webmaster@everify.com
    serial: 2011030802
    refresh: 10800
    retry: 3600
    expire: 604800
    minimum ttl: 43200
    900s (00:15:00)
    everify.com IN NS ns.webair.net 900s (00:15:00)
    everify.com IN NS ns2.webair.net 900s (00:15:00)
    everify.com IN MX
    preference: 10
    exchange: mail.everify.com
    900s (00:15:00)
    everify.com IN A 74.206.234.188 900s (00:15:00)

    — end –

  2. SFA Reporter says:

     

    International Fraud
    Crime Ring Recruited Short-Term Visa Holders

     

    10/25/13

     

    The recruitment pitch to students on short-term visas must have seemed irresistible: give us your good name and some help in our fraud scheme, and we’ll put money—potentially thousands of dollars—in your wallet before your return trip home.

     

    In charges unsealed late last month in San Diego, FBI agents and their law enforcement partners named dozens of young visa holders from former Soviet-bloc countries who took the bait and became willing co-conspirators in a range of elaborate fraud schemes. In four separate indictments, a federal grand jury laid bare how a Los Angeles-based Armenian crime ring ran scams in L.A. and San Diego that relied on a steady tide of accomplices whose time was short in the U.S. While the crimes themselves were not especially novel—identity theft, bank fraud, tax fraud—the explicit recruitment of co-conspirators with expiring visas was a twist.

     

    “The J-1 visa holders are a commodity in these cases,” said Special Agent Davene Butler, who works in our San Diego Division. She described how a few masterminds enlisted young accomplices to do much of the legwork in their fraud schemes—opening bank accounts and securing apartments and post office boxes to route proceeds from bogus tax returns, for example. By the time a scam came to light, the “foot soldiers” holding J-1 and F-1 visas—which allow foreigners to study and travel in the U.S. for brief periods—would be long gone. “They were essential in the schemes,” Butler said.

     

    The charges announced on September 26 named 55 individuals and followed a two-year investigation led by the San Diego FBI, local authorities, and the IRS, which paid out more than $7 million in bogus tax refunds. About half of those charged were arrested last month in a nationwide sweep, but more than 25 remain at large, including 24 who are believed to have left the country. The FBI is asking for the public’s help locating some of the suspects, including one of the crime ring’s main architects, Hovhannes Harutyunyan, 34, an Armenian whose last known address was in Burbank, California.

     

    The charges show four primary schemes. Here’s how they worked:

     

    • Using stolen identities, the crime ring filed about 2,000 fraudulent tax returns claiming more than $20 million in refunds. J-1 students obtained addresses and bank accounts for the fraudulent refunds to be sent.
    • Conspirators set up bank accounts and began writing checks back and forth to create a good transaction history, which banks rewarded by shortening or eliminating holds on deposited checks. Then the so-called “seed” accounts wrote bad checks to 60 “bust-out” accounts, which paid out more than $680,000.
    • Conspirators obtained personal information about the identities and accounts of wealthy bank customers and disguised themselves as the account holders. They practiced forging documents and impersonating the account holders, and succeeded in obtaining $551,842. They laundered the money by purchasing gold with the stolen funds.
    • Conspirators obtained pre-paid debit cards in the names of identity theft victims and opened bank accounts in the names of visa holders who sold their account information before leaving the U.S. They then filed more than 400 fraudulent tax returns seeking more than $3 million.

     

    “This investigation involved multiple complex fraudulent schemes resulting in significant losses to financial institutions and American taxpayers,” said San Diego FBI Special Agent in Charge Daphne Hearn.

     

    Agent Butler said the charges and arrests send a message that these schemes are not without consequences. Those who have already fled won’t find it easy to get back to the U.S. “And they won’t be able to tell their friends that they can come to the U.S., commit fraud, get some quick cash, and that nothing will happen to them,” she said.

     

    If you have any information about these cases, please contact the FBI at (858) 320-1800 or online at tips.fbi.gov.

    Resource:

     

Leave A Comment

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s