25-10274 Info
25-10274 Info
DISTRICT OF MASSACHUSETTS
)
Criminal No. 25cr10274 NMG
UNITED STATES OF AMERICA )
) Violations:
v. )
) Count One: Conspiracy to Commit
KEJIA WANG, ) Wire and Mail Fraud
a/k/a “Tony Wang,” ) (18 U.S.C. § 1349)
)
Defendant. ) Count Two: Money Laundering Conspiracy
) (18 U.S.C. § 1956(h))
)
) Count Three: Conspiracy to Commit
) Identity Theft
) (18 U.S.C. §§ 1028(a)(7) and (f))
)
) Forfeiture Allegations:
) (18 U.S.C. § 981(a)(1)(C) and 28 U.S.C.
) § 2461(c); 18 U.S.C. §§ 981(a)(1) and (a)(2)(B),
) 1028(b)(5), 1030(i); and 19 U.S.C. § 1595a(d))
)
INFORMATION
Korea”) has been under sanction by the United Nations (“UN”) due to, among other things, its
nuclear weapons program. Since 2016, the United States has likewise had comprehensive trade
and economic sanctions against North Korea due to the national security threats posed by North
Korea, including its nuclear weapons program. The sanctions effectively cut North Korea off from
the U.S. marketplace and financial system and restricted the ability of U.S. persons and companies
from doing business with DPRK institutions. As a result, North Korea has sponsored a variety of
schemes to evade the U.S. and U.N. sanctions and earn money for the regime.
2. One such scheme involves the use of highly skilled information technology (“IT”)
workers to obtain remote, pseudonymous employment with companies around the world, including
the United States, using false or stolen identities. According to a May 2022 advisory by the U.S.
Department of State, the U.S. Department of Treasury, and the Federal Bureau of Investigation
(“FBI”), North Korea has dispatched thousands of IT workers around the world (hereinafter,
“overseas IT workers”), earning revenue that contributes to the North Korean weapons programs,
in violation of U.S. and U.N. sanctions. These workers: (i) misrepresent themselves as foreign
documents (including U.S. driver’s licenses and passports); (ii) obfuscate their location using
virtual private networks (“VPNs”), virtual private servers (“VPS”), third country internet protocol
(“IP”) addresses, and proxy accounts; (iii) surreptitiously obtain remote IT jobs with companies
spanning a range of sectors and industries around the world; (iv) develop applications and software
for their employers; (v) in some instances, use privileged access gained through such employment
for illicit purposes, including obtaining sensitive, proprietary information from an employer’s
computer network without authorization; and (vi) use U.S. financial institutions to funnel wages
paid by victimized companies to overseas accounts controlled by DPRK actors and their money
laundering co-conspirators. While some of these IT workers operate from cities inside North
Korea, many work in China in cities near the North Korean border, including in Dandong and
Shenyang.
3. In order to circumvent controls that targeted U.S. and global companies have
designed and implemented to prevent the hiring of illicit IT workers and to otherwise prevent
unauthorized access and damage to the companies’ computer networks, the overseas IT workers
obtained assistance from persons residing in the United States. Among other things, these U.S.
facilitators received and hosted multiple laptop computers and other hardware issued by U.S.
2
victim companies at their residences in the U.S. Using login credentials provided to them by the
overseas IT workers—and unbeknownst to and without authorization from the U.S. victim
companies—the U.S. enablers then facilitated remote access to the laptops by the overseas IT
hardware device designed to allow for remote access (often referred to as a keyboard, video, and
mouse switch or “KVM” switch). The U.S. facilitators also established accounts at U.S. banks
and online money transfer services to facilitate the movement of money paid by U.S. victim
companies to the overseas IT workers and other persons located abroad. In exchange for these and
other services, many U.S. facilitators were paid a substantial fee. Most of the money generated by
this scheme, however, was funneled to the overseas IT workers and their overseas co-conspirators.
4. From in and around 2021 until approximately October 2024, one group of overseas
IT workers, along with defendant KEJIA WANG and other co-conspirator facilitators in New
Jersey, New York, California, and overseas, perpetrated such a coordinated scheme to conduct
remote work for U.S. companies. The scheme resulted in the transmission of false and misleading
information to dozens of U.S. companies, U.S financial institutions, and U.S. government
agencies, including the U.S. Department of Homeland Security (“DHS”), the Internal Revenue
Service (“IRS”), and the Social Security Administration (“SSA”). Specifically, this group of
DPRK IT workers and their co-conspirators stole the identities of U.S. citizens; applied for and
obtained remote jobs at hundreds of U.S. companies, including many Fortune 500 companies;
caused false and fraudulent employment verification information to be sent to DHS; received
laptop computers and other hardware from U.S. companies; accessed, without authorization, the
internal systems of the U.S. companies using remote desktop software or other means; and
received millions of dollars from the U.S. companies, much of which was falsely reported to the
3
IRS and SSA in the name of the actual U.S. persons whose identities were stolen.
5. The overseas IT workers were assisted in this scheme by defendant KEJIA WANG
and at least four other U.S. persons. Among other things, KEJIA WANG and other U.S. facilitators
received and/or hosted laptop computers belonging to U.S. victim companies at their residences
so that the U.S. companies believed the IT workers were located in the United States; facilitated
remote access to the computers by the overseas IT workers by, among other things, downloading
software to the computers without authorization from the U.S. companies or connecting the U.S.
corresponding websites and financial accounts, including Hopana Tech LLC and Tony WKJ LLC,
to make it appear as though the overseas IT workers were affiliated with legitimate U.S.
businesses; and established accounts at U.S. financial institutions and online money transfer
services to receive money from victimized U.S. companies, much of which was subsequently
transferred to overseas co-conspirators. In exchange for his services, defendant KEJIA WANG
and other co-conspirators in the U.S. collected substantial fees. Defendant KEJIA WANG acted
knowing that the overseas IT workers were, in fact, not located in the United States, that the
overseas IT workers used false and/or stolen identities to gain employment as IT workers, and that
6. The conspiracy perpetrated a massive fraud that impacted more than 100 U.S.
companies, compromised the identities of more than 80 U.S. persons, caused false information to
be conveyed to DHS, IRS, and SSA on dozens of occasions, generated at least $5 million in
revenue for the overseas IT workers, and caused U.S. victim companies to incur legal fees,
computer network remediation costs, and other damages and losses of at least $3 million. The
victimized U.S. companies spanned multiple industries across much of the United States, including
4
Massachusetts, California, New York, New Jersey, Florida, New Mexico, Georgia, Maryland,
Alabama, North Carolina, Illinois, Ohio, South Carolina, Michigan, Texas, Indiana, Arkansas,
The Co-Conspirators
7. Defendant KEJIA WANG, a/k/a “Tony Wang,” was a United States citizen residing
in New Jersey. KEJIA WANG was the founder of two New Jersey-based limited liability
companies, Hopana Tech and Tony WKJ, that purported to specialize in software development.
In fact, Hopana Tech and Tony WKJ were both shell companies used by KEJIA WANG and his
co-conspirators to facilitate the criminal schemes described in this Information. Among other
things, KEJIA WANG communicated with overseas IT workers and other overseas co-
conspirators about the scheme via text message and email; traveled to Shenyang and Dandong,
cities near the North Korean border, to meet with overseas co-conspirators about the scheme,
including Jing Bin Huang, Tong Yuze, and Baoyu Zhou; received laptops belonging to U.S. victim
companies at his residence addressed to persons whose identities had been stolen or fabricated;
caused the laptops to be sent to the residences of other U.S. facilitators, including Zhenxing Wang
and at least four other U.S. facilitators, where they were remotely accessed by overseas IT workers;
and received money from U.S. victim companies into bank and other financial accounts that he
8. Zhenxing Wang, a/k/a “Danny,” was a United States citizen residing in New Jersey.
Zhenxing Wang was the founder of Independent Lab, a New Jersey based limited liability
company that purported to specialize in software development. In fact, Independent Lab was a
5
shell company used by Zhenxing Wang and others to facilitate the criminal schemes described is
this Information. Among other things, Zhenxing Wang received laptops belonging to U.S. victim
companies addressed to persons whose identities had been stolen; hosted the laptop computers at
his residence; accessed, without authorization, U.S. victim companies’ laptops; facilitated remote
access to the laptops by overseas IT workers; and received money from U.S. victim companies
into bank and other financial accounts that he established and controlled, a significant portion of
9. Jing Bin Huang was a Chinese citizen residing in Dandong, China, a city near the
border of North Korea, who, among other things, registered multiple accounts with money transfer
services (“MTS”) and foreign banks that were used to receive and transfer proceeds generated
through the conspiracy, including from KEJIA WANG and Zhenxing Wang. In 2023, Huang
twice met in person with KEJIA WANG and other co-conspirators in Shenyang, China.
10. aoyu ZHOU was a Chinese citizen residing in China. Among other things, ZHOU
registered MTS and foreign bank accounts that were used to receive and transfer proceeds
generated through the conspiracy, including from KEJIA WANG and Zhenxing Wang. In 2023,
ZHOU met in person with Kejia WANG and other co-conspirators in Shenyang, China.
11. Tong Yuze was a Chinese citizen residing in China. Among other things, Yuze
registered MTS and foreign bank accounts that were used to receive and transfer proceeds
generated through the conspiracy, including from KEJIA WANG and Zhenxing Wang. The
Hopana Tech website identified Yuze as a China-based representative of the company. In 2023,
Yuze met in person with KEJIA WANG and other co-conspirators in Shenyang, China.
12. Yongzhe Xu was a Chinese citizen, born in the Yanbian Korean Autonomous
Prefecture located in China, residing in the United Arab Emirates (“UAE”). Among other things,
6
Xu registered MTS and foreign bank accounts that were used to receive and transfer proceeds
generated through the conspiracy, including from KEJIA WANG and Zhenxing Wang. The
13. Ziyou Yuan was a Chinese citizen residing in the UAE. Among other things, Yuan
registered and paid for multiple online accounts and other infrastructure that were used in
furtherance of the conspiracy, including the Hopana Tech, Tony WKJ, and Independent Lab web
domains, and an account with an online background check service provider used to conduct
14. Mengting Liu and Enchia Liu were individuals residing in Taiwan. Among other
things, Mengting Liu and Enchia Liu registered MTS and foreign bank accounts that were used to
receive and transfer proceeds generated through the conspiracy, including from KEJIA WANG
15. Individual A was a resident of New York and a close friend of KEJIA WANG who,
in exchange for a fee, received and hosted U.S. victim company laptop computers at Individual
A’s residence and facilitated remote access to the laptops by overseas IT workers.
16. Individual B was a resident of California who, in exchange for a fee, received and
hosted U.S. victim company laptop computers at Individual B’s residence and facilitated remote
17. Individual C was a Chinese national who, among other things, managed an
information technology company based in North Korea, directed KEJIA WANG to create a U.S.
company through which Individual C’s employees could obtain remote IT work with other U.S.
companies, and directed KEJIA WANG to establish corresponding financial accounts to receive
payments from the U.S. companies on behalf of his IT workers. Twice in 2023, Individual C met
7
with Kejia WANG and other co-conspirators in Shenyang and Dandong, China.
COUNT ONE
Conspiracy to Commit Wire Fraud and Mail Fraud
(18 U.S.C. § 1349)
18. The United States Attorney re-alleges and incorporates by reference paragraphs 1-
17 of the Information.
19. From in or around 2021, the exact date being unknown to the United States
Attorney, and continuing until in or around October 2024, in the District of Massachusetts and
KEJIA WANG,
conspired with others known and unknown to the United States Attorney to commit the following
offenses:
a. wire fraud, that is, having devised and intending to devise a scheme and artifice
to defraud and to obtain money and property by means of materially false and
commerce, writings, signs, signals, pictures and sounds, for the purpose of
executing the scheme to defraud, in violation of Title 18, United States Code,
b. mail fraud, that is, having devised and intending to devise a scheme and artifice
to defraud, and for obtaining money and property by means of materially false
and fraudulent pretenses, representations, and promises, did, for the purpose of
8
delivered by mail and by any private and commercial interstate carrier
according to the direction thereon, in violation of Title 18, United States Code,
Section 1341.
20. The object of the conspiracy was to commit wire fraud and mail fraud. The goals
of the conspiracy were, among other things, to obtain employment for the overseas IT workers
with U.S. companies using false or stolen identities in violation of U.S. laws, and to generate
revenue for the DPRK IT workers, the defendant, and his co-conspirators.
21. Among the manner and means by which the defendant and his co-conspirators
carried out the conspiracy and the scheme to defraud were the following:
b. Validating the stolen U.S. person identities using online background check
Security cards, and driver’s licenses, containing the pictures of the overseas
9
information about their eligibility to work in the United States;
other equipment to the defendant’s residence and the residences and other
U.S. facilitators;
other U.S. enablers, who then used credentials provided to them by the
overseas IT workers;
h. Directing the U.S. companies to deposit payroll and wages issued in the
names of stolen or fake U.S. person identities into accounts at U.S. banks,
MTS, and online payment platforms opened and controlled by the defendant
i. Transferring and causing the transfer of money between and among U.S.
bank accounts, MTS, and online payment platforms, much of which was
create the false appearance that the overseas IT workers were affiliated with
the U.S.
10
Acts in Furtherance of the Conspiracy and the Scheme to Defraud
22. In furtherance of the conspiracy and scheme to defraud, and to accomplish its goals,
the following overt acts, among others, were committed in the District of Massachusetts and
elsewhere:
a. On or about May 11, 2021, Ziyou Yuan registered an account with a U.S. based
account was to search for and verify the personal identifying information—
names, addresses, dates of birth, social security numbers, etc.—of U.S. persons
whose identities the DPRK IT workers intended to steal and use to apply for
concerning, and to verify the personal information of, more than 700 U.S.
11
Sub ¶ U.S. Identity
7 Daniel A.
8 Dennis L.
9 Deven C.
10 Don C.
11 Donald R.
12 Eric J.
13 Eric P.
14 Erin H.
15 Gary F.
16 Gerardo A.
17 Hanjay W.
18 Jacob B.
19 James B.
20 James E.
21 Jason R.
22 Jeffrey W.
23 Jeremy A.
24 Jeremy J.
25 Jie L.
26 Kevin W.
27 Lan Duc N.
28 Marcus C.
29 Matthew M.
30 Michael A.
31 Michael C.
32 Nate L.
33 Robert L.
34 Steven F.
35 Steven L.
36 Steven R.
37 Thomas H.
38 Wandee C.
39 William R.
a second online background check service (“OBCS-2”) to search for and verify
overseas IT workers intended to steal and use to apply for remote IT positions
12
at U.S. companies, including companies whose laptop computers were received
d. In 2021, the exact date being unknown, Individual C instructed KEJIA WANG
Secretary of State, listing his home address in New Jersey as the company’s
f. On or about February 18, 2022, KEJIA WANG registered Tony WKJ LLC, a
New Jersey Secretary of State, listing his home address in New Jersey as the
copy of the following fake California driver’s license and U.S. Social Security
13
h. The co-conspirator posing as Thomas H. obtained full-time, remote
2023.
j. In order to receive direct deposits of salary and wages from Company A, the
Liu.
Wang.
l. Between on or about January 2023 and June 6, 2023, Zhenxing Wang logged
14
WANG and installed remote desktop software, all without authorization from
Company A.
m. Between on or about January 21, 2023, and on or about May 6, 2024, KEJIA
of “Lan Duc N.,” a United States citizen, applied for a remote IT position at
license and U.S. Social Security card containing Lan Duc N.’s personal
identifying information:
15
falsely affirmed, under penalty of perjury, that he was a resident of California
q. In order to receive direct deposits of salary and wages from Company B, the
unidentified co-conspirator.
s. Between on or about January 25, 2023, and on or about November 23, 2023,
Zhenxing Wang logged into the Company B laptop computer and, without
remotely.
t. Between on or about January 30, 2023, and on or about November 23, 2023,
16
Fraudulent Employment with U.S. Company C
stolen identity of “Lan Duc. N.,” a United States citizen, applied for a remote
license and United States Social Security Card containing Lan Duc N.’s
under penalty of perjury, that he was a resident of California and citizen of the
United States.
w. In order to receive direct deposits of salary and wages from Company C, the
17
Company C, linked to an MTS account registered to unidentified overseas co-
conspirator.
6, 2024, KEJIA WANG received the Company C laptop computer and caused
y. On or about January 19, 2024, Zhenxing WANG logged into the Company C
computer and installed two remote desktop applications for the purpose of
z. Between on or about January 19, 2024, and on or about April 2, 2024, without
from Company C’s servers, including information controlled under the ITAR
aa. Between on or about January 9, 2024, and April 4, 2024, KEJIA WANG and
bb. On or about March 20, 2022, an overseas co-conspirator used the stolen identity
18
overseas IT worker falsely told Company D that he was a United States citizen
information:
ee. In order to receive direct deposits of salary and wages from Company D, the
ff. On or about April 26, 2022, the overseas coconspirator posing as Wandee C.
19
gg. Between on or about April 26, 2022, and on or about September 14, 2022,
hh. On or about September 21, 2022, approximately one week after Company D
Wang via text message to return the Company D laptop computer to Company
ii. Between on or about April 18, 2022, and September 2022, KEJIA WANG and
MTS account.
companies to be delivered via the U.S. mail and private postal carriers to KEJIA
WANG’s residence in New Jersey, all in the names of the following stolen U.S.
person identities:
20
Sub ¶ Delivery Date Recipient Identity
16. 2022-07-30 Marcus C.
17. 2022-08-01 Marcus J. B.
18. 2022-08-04 Kevin C.
19. 2022-08-11 William M.
20. 2022-08-18 Damian T.
21. 2022-09-01 Robert W.
22. 2022-09-01 Bradley H.
23. 2022-09-07 Bradley S.
24. 2022-09-10 Michael L.
25. 2022-09-12 William M.
26. 2022-09-16 rhomas [sic] H.
27. 2022-09-26 Chris B.
28. 2022-09-28 Steven J. F.
29. 2022-10-07 Chris B.
30. 2022-10-12 Jake B.
31. 2022-10-20 Steven F.
32. 2022-10-21 Jeffrey S.
33. 2022-11-07 Jeffrey W.
34. 2022-11-12 Bradley S.
35. 2022-11-16 Lee S.
36. 2022-11-29 Jeffrey S.
37. 2022-12-05 Lucas C.
38. 2022-12-16 Jeffrey S.
39. 2022-12-16 Lucas H.
40. 2022-12-27 Harold H.
41. 2022-12-29 Jeffrey S.
42. 2023-01-05 Jeffrey S.
43. 2023-01-26 Jason N.
44. 2023-01-30 Jason N.
45. 2023-02-02 Robert L.
46. 2023-02-03 Michael C.
47. 2023-02-11 Jake B.
48. 2023-02-13 Harold H.
49. 2023-02-22 Michael C.
50. 2023-02-27 Tannika R.
51. 2023-03-29 Brian C.
52. 2023-03-30 Michael C.
53. 2023-03-31 Robert L.
54. 2023-03-31 Brian C.
55. 2023-04-05 Michael L.
56. 2023-04-14 Gary F.
57. 2023-04-17 Lucas C.
58. 2023-04-20 Brian C.
59. 2023-05-13 Daniel A.
60. 2023-05-15 William M.
61. 2023-05-25 Gary F.
62. 2023-05-25 Gary F.
63. 2023-06-05 Michael C.
64. 2023-07-17 Michael C.
65. 2023-08-04 Charles L.
66. 2023-09-08 Jeremy J.
67. 2023-09-11 James B.
68. 2023-09-13 Robert L.
69. 2023-09-15 Gary F.
70. 2023-09-15 Harold H.
71. 2023-09-19 Gary F.
72. 2023-09-25 Deven C.
73. 2023-10-02 James L.
21
Sub ¶ Delivery Date Recipient Identity
74. 2023-10-04 Robert L.
75. 2023-10-06 Steven L.
76. 2023-10-13 Jeremy A.
77. 2023-10-13 Jason N.
78. 2023-10-20 Jeremy A.
79. 2023-10-20 Deven C.
80. 2023-10-23 John L.
81. 2023-10-26 Edjose C.
82. 2023-11-10 Lucas F.
83. 2023-11-10 Charles L.
84. 2023-11-20 Jeremy J.
85. 2023-12-14 Jason N.
86. 2023-12-15 Lucas H.
87. 2023-12-20 John H.
88. 2023-12-23 Lan N.
89. 2023-12-29 Lucasn H.
90. 2024-01-04 Kevin C.
91. 2024-01-12 John H.
92. 2024-01-12 Phillip P.
93. 2024-01-26 Jason H.
94. 2024-02-08 Mitchell M.
95. 2024-02-23 Jamie M.
96. 2024-02-29 Matthew D.
97. 2024-03-07 Michael A.
98. 2024-03-12 Zackary L.
99. 2024-03-15 Matthew D.
100. 2024-03-21 Zackary L.
101. 2024-03-22 Tanikka R.
102. 2024-03-25 Jeff S.
103. 2024-04-02 John L.
104. 2024-04-04 Jamie M.
105. 2024-04-06 Chris B.
106. 2024-04-11 Matt D.
107. 2024-04-17 Matthew D.
108. 2024-04-19 Jamie M.
109. 2024-04-24 Lucas H.
110. 2024-04-26 Matt D.
111. 2024-05-03 Charles C.
112. 2024-05-10 John H.
113. 2024-05-11 James B.
114. 2024-05-21 Christopher C.
115. 2024-05-22 Christopher C.
116. 2024-06-12 John H.
117. 2024-06-28 Jamie M.
established bank and other financial accounts in their names, and the names of
22
Tech, Tony WKJ, and Independent Lab, for the purpose of receiving salary and
wage payments from U.S. victim companies and sharing those funds with their
overseas co-conspirators.
ll. On or about January 15, 2022, KEJIA WANG registered a business checking
account in the name of Hopana Tech at a U.S. bank (hereinafter, “U.S. Bank
1”). Between on or about January 20, 2022, and on or about April 26, 2024,
mm. On or about the dates indicated below, the following funds were transferred
from the Hopana Tech account at U.S. Bank 1 to various accounts controlled
23
nn. On or about April 29, 2021, KEJIA WANG registered an account at a money
oo. On or about the date ranges indicated below, the following funds were
transferred from the Tony WKJ account at MTS-2 to bank accounts associated
pp. Between on or about July 27, 2021, and on or about August 31, 2023, KEJIA
qq. On or about April 25, 2021, KEJIA WANG registered an account in his own
rr. Between on or about February 16, 2022, and on or about July 21, 2023,
MTS-2 account by multiple U.S. victim companies. During this same time
24
approximately $208,127.00 from his personal MTS-2 account to accounts
registered to and controlled by Jing Bin Huang and Tong Yuze, among other
overseas co-conspirators.
ss. Between on or about April 28, 2023, and on or about March 29, 2024, using his
living in California. Most of these transfers contained notes that referenced the
month the transfer took place and “CA laptops.” For example, “September CA
11 shipping fee.”
tt. Between on or about April 3, 2023, and on or about April 1, 2024, using his
these transfers contained notes that referenced “NY” and “laptops.” For
account in the name of Tony WKJ LLC at a U.S. financial technology services
vv. Between on or about September 14, 2023, and August 20, 2024, approximately
$352,949.24 was deposited into the Tony WKJ account at MTS-3 by multiple
25
ww. On or about September 27, 2023, an employee of MTS-3 emailed KEJIA
WANG to inquire about a deposit into the Tony WKJ MTS-3 account from a
U.S. victim company (“U.S Company E”) in the name of “Wandee C.” In
response, KEJIA WANG falsely told the MTS-3 employee that “Wandee C[] is
a software engineer who was initially hired by TONY WKJ LLC. However, he
[U.S. Company E] sent a payment for Wandee [C] to TONY WKJ LLC.” In
fact, Tony WKJ was a front company with no employees, and “Wandee C.”
26
COUNT TWO
Money Laundering Conspiracy
(18 U.S.C. § 1956(h))
23. The United States Attorney re-alleges and incorporates by reference paragraphs 1-
17 of this Information.
24. As described above, members of the conspiracy obtained payments from U.S.
victim companies for IT work. Such payments were frequently made by Automated Clearing
House (“ACH”) transfers between banks and other financial services companies. After receiving
the money, members of the conspiracy wired or otherwise transferred all or most of it to bank
25. From in or about 2021, the exact date being unknown to the United States Attorney,
through in or about October 2024, in the District of Massachusetts and elsewhere, the defendant,
KEJIA WANG,
conspired with others known and unknown to the United States Attorney to:
specified unlawful activity, that is, conspiracy to commit wire and mail
described in Count One, with the intent to promote the carrying on of the
27
(b) conduct, cause others to conduct, and attempt to conduct financial
specified unlawful activity, that is, conspiracy to commit wire fraud and
mail fraud in violation of Title 18, United States Code, Section 1349, as
described in Count One, and knowing that the transactions were designed,
in whole and in part, to conceal and disguise the nature, location, source,
28
COUNT THREE
Conspiracy to Commit Identity Theft
(18 U.S.C. §§ 1028(a)(7) and (f))
26. The United States Attorney re-alleges and incorporates by reference paragraphs 1-
17 of this Information.
27. From in or about 2021, the exact date being unknown to the United States Attorney,
through in or about October 2024, in the District of Massachusetts and elsewhere, the defendant,
KEJIA WANG,
did knowingly combine, conspire, and agree with other persons known and unknown to the United
States Attorney to transfer, possess, and use, without lawful authority, in and affecting interstate
and foreign commerce, the means of identification of another person, to wit, the names, Social
Security numbers, dates of birth, passport numbers, and state issued driver’s license and
identification numbers, with the intent to commit, and to aid and abet, and in connection with, any
unlawful activity that constitutes a violation of Federal Law, to wit, conspiracy to commit wire
fraud and mail fraud in violation of Title 18, United States Code, Section 1349, and conspiracy to
commit money laundering in violation of Title 18, United States Code, Section 1956(h).
All in violation of Title 18, United States Code, Sections 1028(a)(7) and (f).
29
FORFEITURE ALLEGATIONS
(18 U.S.C. § 981(a)(1)(C) and 28 U.S.C. § 2461(c); 18 U.S.C. §§ 981(a)(1) and (a)(2)(B),
1028(b)(5), 1030(i); and 19 U.S.C. § 1595a(d))
1. Upon conviction of the offense in violation of Title 18, United States Code, Section
KEJIA WANG,
shall forfeit to the United States, pursuant to Title 18, United States Code, Section 981(a)(1)(C),
and Title 28, United States Code, Section 2461(c), any property, real or personal, which
2. Upon conviction of the offense in violation of Title 18, United States Code, Section
KEJIA WANG,
,
shall forfeit to the United States, pursuant to Title 18, United States Code, Section 982(a)(1), any
property, real or personal, involved in such offense, and any property traceable to such property.
3. Upon conviction of the offense in violation of Title 18, United States Code, Section
KEJIA WANG
shall forfeit to the United States, pursuant to Title 18, United States Code, Section 1028(b)(5), any
personal property used or intended to be used to commit the offense and, pursuant to Title 18,
United States Code, Section 982(a)(2)(B), any property constituting, or derived from, proceeds the
30
Respectfully submitted,
LEAH B. FOLEY
United States Attorney
31