Two U.S.-based business executives have recently pleaded guilty to their involvement in enabling extensive tech-support fraud operations that are associated with call centers in India. This significant development has emerged from an investigation conducted by the U.S. Department of Justice, shining a light on the potential complicity of corporate leaders in cybercrimes.
The two executives, identified as Adam Young, 42, a former CEO of a telecommunications services company headquartered in Miami, and Harrison Gevirtz, 33, a former Chief Strategy Officer from Las Vegas, admitted to facilitating clients who were engaged in fraudulent tech-support schemes. Both individuals have pleaded guilty to the charge of misprision of a felony. They are scheduled for sentencing on June 16, 2026.
Court documents indicate that the operations run by Young and Gevirtz provided essential infrastructure that aided these fraudulent networks. Such infrastructure included various tools and services critical for the execution of the scams, specifically:
– Telephone numbers and VoIP services
– Call routing and forwarding systems
– Call tracking and analytics tools
These services allowed call centers based in India to target victims across the United States and other countries, effectively masking their true origin. Despite the seemingly technological nature of their services, the executives were aware of the detrimental impact their offerings had on unsuspecting individuals.
Investigation findings revealed that between 2016 and 2022, both executives were fully aware that several of their clients were running elaborate tech-support scams. They received numerous complaints from both telecom providers and law enforcement agencies. Nevertheless, rather than act upon these reports, they continued providing services, demonstrating a troubling disregard for the consequences of their actions.
The fraud campaigns designed and executed by these call centers employed deceptive tactics that preyed on vulnerable populations. Common methods of deception included:
– Fake pop-up alerts claiming that a victim’s computer was infected with malware
– Urgent warnings that prompted users to call fake “support” numbers
– The use of remote access tools to control victims’ computers
– Requests for payment for unnecessary or fictitious services
Victims of these scams often included elderly or vulnerable individuals, many of whom were persuaded to part with hundreds or even thousands of dollars. In some cases, attackers accessed sensitive personal and financial information, further exacerbating the victims’ plight.
Beyond merely being passive conduits for fraud, prosecutors have indicated that Young and Gevirtz actively aided these fraudulent operations in several alarming ways. They provided advice to clients on how to avoid detection and complaints, assisted in preventing account suspensions enforced by telecom providers, and even facilitated the exchange of fraudulent call traffic among different groups. Their entanglement was so deep that they actively promoted their services to known scam operators, demonstrating a clear concerted effort to sustain and incentivize illegal activities.
Moreover, the executives operated a call center in Tunisia, where certain employees were also implicated in the tech-support fraud schemes, indicating an even more extensive network of deceitful practices spanning across international borders.
This case has its roots in a multi-year investigation conducted by the FBI, which commenced in 2020. The inquiry has led to multiple convictions, including several individuals based in India, such as Sahil Narang, Chirag Sachdeva, Abrar Anjum, and Manish Kumar. Another conviction includes Jagmeet Singh Virk, who is linked to a separate U.S. case.
Authorities have highlighted the staggering scale of losses attributed to tech-support scams, estimating that these fraud schemes resulted in approximately $2.1 billion in losses across the U.S. in the last year alone. FBI officials have underscored the seriousness of enabling cybercrime infrastructure, emphasizing that those who provide legitimate-looking telecom and SaaS services can become critical enablers of criminality.
The case draws attention to the growing scrutiny faced by organizations that offer communication and routing services. There is increasing pressure on these entities to act responsibly when it comes to handling abuse reports and to refrain from knowingly facilitating malicious actors.
Overall, this situation underscores a pivotal shift in focus, where not only the scammers are held accountable but also the service providers who facilitate their fraudulent activities. The global nature of tech-support fraud is laid bare in this case, highlighting an interconnected web of operators, victims, and infrastructure spread across multiple countries. As investigations continue, it stands to be seen how the industry will adapt and respond to the looming threat of cybercrime within its ranks.

