LOS ANGELES
Federal officials stated that a former owner of a T-Mobile retail store in Eagle Rock was sentenced Friday to 12 years in federal prison for his multimillion-dollar scheme
He stole T-Mobile employee credentials and illegally accessed the company’s internal computer systems to illicitly “unlock” and “unblock” cell phones.
A previously filed indictment indicated that Khudaverdyan earned about $25 million from doing so.
United States District Judge Stephen V. Wilson sentenced Argishti Khudaverdyan, 44, of Burbank. Judge Wilson also ordered him to pay $28.4 million in restitution.
Khudaverdyan ran a multi-year scheme that illegally unlocked and unblocked cellphones, which generated tens of millions of dollars in criminal proceeds.
During this time, most cellphone companies – including T-Mobile – “locked” their customers’ phones to be used only on the company’s network until the customers’ phone and service contracts had been fulfilled.
If customers wanted to switch to a different carrier, their phones had to be “unlocked.” Carriers also “blocked” cell phones to protect consumers in the case of lost or stolen cell phones.
From August 2014 to June 2019, Khudaverdyan fraudulently unlocked and unblocked cell phones on T-Mobile’s network and the networks of Sprint, AT&T, and other carriers.
Removing the unlock allowed the phones to be sold on the black market and enabled T-Mobile customers to stop using T-Mobile’s services and thereby depriving T-Mobile of revenue generated from customers’ service contracts and equipment installment plans.
Khudaverdyan advertised his fraudulent unlocking services through brokers, email solicitations, and websites. He falsely claimed the fraudulent unlocks he provided were “official” T-Mobile unlocks.
From January 2017 through June 2017, Khudaverdyan and a former business partner were also co-owners of Top Tier Solutions Inc., a T-Mobile store in Eagle Rock Plaza.
However, after T-Mobile terminated Khudaverdyan’s contract in June 2017 based on his suspicious computer behavior and association with the unauthorized unlocking of cell phones, Khudaverdyan continued his fraud.
To gain unauthorized access to T-Mobile’s protected internal computers, Khudaverdyan obtained T-Mobile employees’ credentials through various dishonest means, including sending phishing emails that appeared to be legitimate T-Mobile correspondence and socially engineering the T-Mobile IT Help Desk.
Khudaverdyan used the fraudulent emails to trick T-Mobile employees to log in with their employee credentials, so he could harvest the employees’ information and fraudulently unlock the phones.
In total, Khudaverdyan and others compromised and stole more than 50 different T-Mobile employees’ credentials from employees across the United States.
They unlocked and unblocked hundreds of thousands of cell phones during the years of the scheme.
Khudaverdyan obtained more than $25 million for these criminal activities. He used these illegal proceeds to pay for, among other things, real estate in Burbank and Northridge.
In a sentencing memorandum, federal prosecutors argued that Khudaverdyan was “a sophisticated fraudster with no remorse for his crimes. He caused millions of dollars in losses to wireless carriers while furthering the trafficking of lost and stolen cell phones.”
After a four-day trial, a federal jury on Aug. 1 found Khudaverdyan guilty of 14 felonies: one count of conspiracy to commit wire fraud, three counts of wire fraud, two counts of accessing a computer to defraud and obtain value, one count of intentionally accessing a computer without authorization to obtain information, one count of conspiracy to commit money laundering, five counts of money laundering, and one count of aggravated identity theft.
Alen Gharehbagloo, 43, of La Cañada Flintridge, a co-defendant and a former co-owner of Top Tier Solutions Inc., plead guilty on July 5 to three felonies: conspiracy to commit wire fraud, accessing a protected computer with intent to defraud, and conspiracy to commit money laundering.
His sentencing hearing is scheduled for Feb.13.
The U.S. Secret Service’s Cyber Fraud Task Force (CFTF) and IRS Criminal Investigation investigated this matter.
Assistant U.S. Attorneys Lisa E. Feldman and Andrew M. Roach of the Cyber and Intellectual Property Crimes Section prosecuted this case.