United States v. Radu Miclaus

CourtCourt of Appeals for the Sixth Circuit
DecidedOctober 5, 2021
Docket19-4273
StatusPublished

This text of United States v. Radu Miclaus (United States v. Radu Miclaus) is published on Counsel Stack Legal Research, covering Court of Appeals for the Sixth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Radu Miclaus, (6th Cir. 2021).

Opinion

RECOMMENDED FOR PUBLICATION Pursuant to Sixth Circuit I.O.P. 32.1(b) File Name: 21a0231p.06

UNITED STATES COURT OF APPEALS FOR THE SIXTH CIRCUIT

┐ UNITED STATES OF AMERICA, │ Plaintiff-Appellee, │ > Nos. 19-4247/4273 │ v. │ │ BOGDAN NICOLESCU (19-4247); RADU MICLAUS │ (19-4273), │ Defendants-Appellants. │ │ ┘

Appeal from the United States District Court for the Northern District of Ohio at Cleveland. No. 1:16-cr-00224—Patricia A. Gaughan, District Judge.

Argued: March 3, 2021

Decided and Filed: October 5, 2021

Before: WHITE, LARSEN, and NALBANDIAN, Circuit Judges. _________________

COUNSEL

ARGUED: David L. Doughten, Cleveland, Ohio, for Appellant in 19-4247. Catherine Adinaro Shusky, OFFICE OF THE FEDERAL PUBLIC DEFENDER, Cleveland, Ohio, for Appellant in 19-4273. Laura McMullen Ford, UNITED STATES ATTORNEY’S OFFICE, Cleveland, Ohio, for Appellee. ON BRIEF: David L. Doughten, Cleveland, Ohio, for Appellant in 19-4247. Catherine Adinaro Shusky, OFFICE OF THE FEDERAL PUBLIC DEFENDER, Cleveland, Ohio, for Appellant in 19-4273. Laura McMullen Ford, UNITED STATES ATTORNEY’S OFFICE, Cleveland, Ohio, for Appellee.

WHITE, J., announced the judgment and delivered the opinion of the court in which she joined in all but Section III.D., and LARSEN and NALBANDIAN, JJ., joined in full. WHITE, J. (pp. 28–29), delivered a separate opinion dissenting from Part III.D. of the court’s opinion. Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 2

_________________

OPINION _________________

HELENE N. WHITE, Circuit Judge [Except as to Section III.D.]. For nine years, Defendants-Appellants Radu Miclaus and Bogdan Nicolescu ran a sophisticated, multimillion- dollar cyber-fraud ring out of Romania. They were extradited to the United States, and a federal jury in Ohio convicted them of wire fraud, conspiracy to commit wire fraud, conspiracy to commit computer fraud, aggravated identity theft, conspiracy to commit money laundering, and conspiracy to traffic in counterfeit service marks. The district court sentenced them to eighteen and twenty years’ imprisonment, respectively. On appeal, they raise several challenges to their convictions and sentences. We AFFIRM their convictions, VACATE their sentences, and REMAND for resentencing.

I.

Beginning around 2007, Nicolescu, Miclaus, and a handful of coconspirators began posting fake car auctions on eBay. Their group, dubbed “Bayrob” by the FBI (a combination of “eBay” and “robbery”), set up auctions that appeared to show vehicles for sale by US-based sellers. In reality, Bayrob had neither vehicles to sell nor a US address. Operating from in and around Bucharest, Romania, the group used various technologies to conceal its IP addresses, and employed US-based “money mules,” (falsely described to victims as “eBay Escrow Agents”) to collect payments from unsuspecting buyers. The money mules then wired the victims’ payments to various locations in Europe, where individuals associated with Bayrob collected the payments and brought them to Miclaus and Nicolescu in Romania. All told, the Bayrob group orchestrated the eBay fraud more than 1,000 times and reaped between $3.5 million and $4.5 million.

At some point in 2014, Bayrob began employing a custom-made trojan horse virus to facilitate new money-making schemes. Nicolescu, a skilled computer programmer, created the virus, which he embedded in links in the group’s eBay auctions and in spam emails widely disseminated by Bayrob. Once a victim clicked the link and downloaded the virus onto the victim’s computer, it ran quietly in the background until the unsuspecting victim tried to visit Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 3

certain popular websites, including eBay, Facebook, PayPal, Gmail, Yahoo, and Walmart. At that point, instead of connecting to the real website, the virus discreetly redirected the victim’s computer to a look-a-likewebsite created by Bayrob, which collected the victim’s account credentials, identities, and credit-card information, and stored it all on Bayrob’s servers in Romania. Bayrob collected more than 70,000 account credentials this way, including 25,000 stolen credit-card numbers. Bayrob used the stolen credit cards to pay its own expenses, including costs for server space, VPNs, and registering domain names, and it sold some of the stolen credit cards on AlphaBay, a website on the dark web frequented by criminals, for prices ranging from $1–$35.

Around the same time, Bayrob concocted a third money-making scheme. This time it harnessed the processing power of its network of 33,000 virus-infected computers to “mine” for cryptocurrency. Nicolescu’s trojan horse virus worked by commandeering an infected computer’s processor and forcing it to solve difficult mathematical equations that generate bitcoin, a process known as “cryptomining.” With their computers’ processing power tied up generating bitcoin for Bayrob, the victims’ computers slowed to a crawl. Bayrob exchanged the bitcoins generated by its cryptomining activities for cash, generating approximately $10,000–$20,000 per month in 2014, and $30,000–$40,000 per month in 2015 and 2016.

The FBI caught on to Bayrob’s activities in 2015 and executed a search warrant on the cell phone of Tiberiu Danet, a Bayrob member, as he traveled through the Miami airport. Using information obtained from Tiberiu’s phone, the FBI and Romanian police executed a search warrant on Nicolescu’s, Miclaus’s, and Tiberiu’s residences in Romania. The searches turned up a trove of servers, hard drives, and other computing equipment used by the group. The FBI was not able to decrypt much of the information on Bayrob’s servers, but the cache of seized files the FBI was able to review included spreadsheets the group used to keep track of its victims and spreadsheets showing money Bayrob had moving through its money-mule network in the United States and Europe.

In 2016, Nicolescu and Miclaus were indicted for conspiracy to commit wire fraud, twelve counts of wire fraud, conspiracy to commit computer fraud, conspiracy to traffic in Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 4

counterfeit service marks, five counts of aggravated identity theft, and conspiracy to commit money laundering. They were convicted on all counts after a two-and-a-half-week jury trial.1

At Defendants’ sentencing hearing, FBI agent Ryan MacFarlane testified that the eBay scheme generated between $3.5 million and $4.5 million in losses. The FBI calculated that figure by reviewing spreadsheets Bayrob used to keep track of its victims and cross-referencing the information in the spreadsheets with victim complaints filed with the FBI’s Internet Crime Complaint Center (ICCC). MacFarlane estimated that the true eBay loss figure was substantially higher than $3.5 to $4.5 million, since only 30–35% of victims filed complaints with the ICCC. According to MacFarlane, true losses may have been as high as $10 million to $30 million.

At the conclusion of the sentencing hearing, the district court calculated Nicolescu’s and Miclaus’s Guidelines range for the conspiracy-to-commit-money-laundering grouping (Counts 1–15 and 21). The district court added eighteen levels to their Guidelines calculation under U.S.S.G. § 2B1.1(b)(1)(J) for causing a loss between $3.5 and $9.5 million, two levels under U.S.S.G. § 2B1.1(b)(4) for being in the business of receiving and selling stolen property, two levels under U.S.S.G. § 2B1.1(b)(11)(B)(i) for trafficking unauthorized access devices, four levels under U.S.S.G. § 2B1.1(b)(19)(A)(ii) for having been convicted of an offense under 18 U.S.C. § 1030(a)(5)(A), and four levels under U.S.S.G.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Sutton
77 F.3d 91 (Fifth Circuit, 1996)
Pinkerton v. United States
328 U.S. 640 (Supreme Court, 1946)
Turner v. United States
396 U.S. 398 (Supreme Court, 1970)
Jackson v. Virginia
443 U.S. 307 (Supreme Court, 1979)
Griffin v. United States
502 U.S. 46 (Supreme Court, 1991)
Stinson v. United States
508 U.S. 36 (Supreme Court, 1993)
Hibbs v. Winn
542 U.S. 88 (Supreme Court, 2004)
Sosa v. Alvarez-Machain
542 U.S. 692 (Supreme Court, 2004)
United States v. McMinn
103 F.3d 216 (First Circuit, 1997)
United States v. Jones
551 F.3d 19 (First Circuit, 2008)
United States v. Gregory Wiley
407 F. App'x 938 (Sixth Circuit, 2011)
United States v. Vigil
644 F.3d 1114 (Tenth Circuit, 2011)
DePierre v. United States
131 S. Ct. 2225 (Supreme Court, 2011)
United States v. Bradley
644 F.3d 1213 (Eleventh Circuit, 2011)
Johnny Baugh v. United States
540 F.2d 1245 (Fourth Circuit, 1976)
United States v. Fred S. Braslawsky
913 F.2d 466 (Seventh Circuit, 1990)
United States v. Tolbert
668 F.3d 798 (Sixth Circuit, 2012)
United States v. Michael Koehler
24 F.3d 867 (Sixth Circuit, 1994)

Cite This Page — Counsel Stack

Bluebook (online)
United States v. Radu Miclaus, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-radu-miclaus-ca6-2021.