Language Selection

English French German Italian Portuguese Spanish

Ex-Sun-Times Publisher Charged With Fraud

Filed under
Legal

Former Chicago Sun-Times publisher David Radler is cooperating with federal prosecutors in their investigation of $32 million that allegedly was fraudulently pocketed by him and others through a series of secret deals.

Radler, Mark S. Kipnis, the former top in-house lawyer for Chicago-based Hollinger International, and Toronto-based Ravelston Corp., a private company owned until this spring by Conrad Black, were indicted on federal fraud charges Thursday.

They were accused of cheating shareholders in the United States and Canada, as well as Canadian tax authorities. The indictment alleged the three diverted the money by disguising it as noncompete fees connected to the sale of newspaper publishing groups.

Each was charged with five counts of mail fraud and two counts of wire fraud.

Fallen media titan Black, the ousted CEO of Hollinger International, was not accused of wrongdoing.

Prosecutors said Radler, 63, of Vancouver, British Columbia, was cooperating with the government's investigation and was expected to plead guilty.

"Shareholders in public companies have a right to expect that their monies will be managed properly by officers and directors and that the officers and directors won't steal it," U.S. Attorney Patrick Fitzgerald said in announcing the charges.

Radler's attorney did not return a phone call seeking comment, while Kipnis' attorney said his client was disappointed and disagreed with the indictment. "We will enter a plea of not guilty and expect to be vindicated," Michael Swartz said.

Black had no comment, spokesman Jeff McAndrews said. Hollinger Inc. was satisfied with the indictment.

"We're pleased that the U.S. attorney has made significant progress in its investigations," spokesman Larry Parnell said. "Hollinger Inc. will continue to cooperate in these and other related investigations."

Hollinger Inc. is the Toronto-based holding company that has voting control over Hollinger International. Ravelston - the privately held Canadian company that Black and Radler used to control and which went into receivership after they resigned this April - is the majority owner of Hollinger Inc.

Federal prosecutors said in March they were conducting a fraud investigation into Hollinger Inc., Black and Radler.

According to the indictment, noncompete fees were paid by companies that bought newspapers from Hollinger International so Hollinger International wouldn't later operate a rival newspaper.

The money should have gone to Hollinger International, but prosecutors allege that Ravelston, Radler and others took millions of dollars in noncompete fees for themselves and didn't disclose those deals to Hollinger International's audit committee.

Prosecutors allege that Radler supervised the business terms of each of the transactions and Kipnis, 58, of Northbrook, Ill., participated in the documentation and closing of each deal.

In one of six examples outlined by prosecutors, Hollinger International sold American Trucker for $75 million in May 1998. The closing documents for the sale said Hollinger International would sign a noncompete agreement and that $2 million of the sale proceeds would be paid to Hollinger International in exchange for its promise not to compete, according to the indictment. Radler signed the purchase and noncompete agreements on behalf of Hollinger International, prosecutors said.

Prosecutors allege that in January 1999, Ravelston's agents, including Radler, decided that Hollinger International would pay the $2 million to Hollinger Inc., which prosecutors said was "essentially stealing" from Hollinger International's corporate assets.

They allege Kipnis signed the $2 million check Hollinger International issued and sent to Hollinger Inc. around Feb. 1, 1999. The defendants did not disclose the payment to Hollinger International's audit committee, according to the indictment.

Prosecutors also allege that the defendants took bonus payments from Hollinger International and falsely labeled them as noncompete fees to defraud Canadian tax authorities.

Federal prosecutors acknowledged the criminal investigation in court papers in March when it asked to intervene in a U.S. Securities and Exchange Commission lawsuit filed in November against Hollinger Inc., Black and Radler.

The SEC alleged the men engaged in a "fraudulent and deceptive scheme" to take cash and other assets from Hollinger International and conceal the actions from shareholders.

If convicted, Radler and Kipnis face up to five years in prison and a $250,000 fine for each count of the indictment. The court also could impose an alternative fine of twice the gross profit to any defendant or twice the loss to any victim, whichever is greater.

If Ravelston is convicted, it faces a fine of $500,000 for each count or the alternative fine.

Associated Press

More in Tux Machines

Today in Techrights

Security Leftovers

  • One-stop counterfeit certificate shops for all your malware-signing needs

    The Stuxnet worm that targeted Iran's nuclear program almost a decade ago was a watershed piece of malware for a variety of reasons. Chief among them, its use of cryptographic certificates belonging to legitimate companies to falsely vouch for the trustworthiness of the malware. Last year, we learned that fraudulently signed malware was more widespread than previously believed. On Thursday, researchers unveiled one possible reason: underground services that since 2011 have sold counterfeit signing credentials that are unique to each buyer.

  • How did OurMine hackers use DNS poisoning to attack WikiLeaks? [Ed: False. They did not attack Wikileaks; they attacked the DNS servers/framework. The corporate media misreported this at the time.
    The OurMine hacking group recently used DNS poisoning to attack WikiLeaks and take over its web address. Learn how this attack was performed from expert Nick Lewis.
  • Intel didn't give government advance notice on chip flaws

    Google researchers informed Intel of flaws in its chips in June. The company explained in its own letter to lawmakers that it left up to Intel informing the government of the flaws.

    Intel said that it did not notify the government at the time because it had “no indication of any exploitation by malicious actors,” and wanted to keep knowledge of the breach limited while it and other companies worked to patch the issue.

    The company let some Chinese technology companies know about the vulnerabilities, which government officials fear may mean the information was passed along to the Chinese government, according to The Wall Street Journal.

  • Intel hid CPU bugs info from govt 'until public disclosure'

    As iTWire reported recently, Intel faces a total of 33 lawsuits over the two flaws. Additionally, the Boston law firm of Block & Leviton is preparing a class action lawsuit against Intel chief executive Brian Krzanich for allegedly selling a vast majority of his Intel stock after the company was notified of the two security flaws and before they became public.

  • Intel did not tell U.S. cyber officials about chip flaws until made public [iophk: "yeah right"]

    Current and former U.S. government officials have raised concerns that the government was not informed of the flaws before they became public because the flaws potentially held national security implications. Intel said it did not think the flaws needed to be shared with U.S. authorities as hackers [sic] had not exploited the vulnerabilities.

  • LA Times serving cryptocurrency mining script [iophk: "JS"]

    The S3 bucket used by the LA Times is apparently world-writable and an ethical hacker [sic] appears to have left a warning in the repository, warning of possible misuse and asking the owner to secure the bucket.

  • Facebook's Mandatory Malware Scan Is an Intrusive Mess

    When an Oregon science fiction writer named Charity tried to log onto Facebook on February 11, she found herself completely locked out of her account. A message appeared saying she needed to download Facebook’s malware scanner if she wanted to get back in. Charity couldn’t use Facebook until she completed the scan, but the file the company provided was for a Windows device—Charity uses a Mac.

  • Tinder plugs flaw that enabled account takeover using just a phone number

    As Tinder uses Facebook profile pics for its users to lure in a mate or several, the 'dating' app is somewhat tied to the social network. When a swipe-hungry Tinder user comes to login to their account they can either do so via Facebook or use their mobile number.

  • `

Android Leftovers

Report from Debian SnowCamp and a Look at Solyd XK, a Debian-Based Distribution

  • Report from Debian SnowCamp: day 1
  • Report from Debian SnowCamp: day 2
    Of course, we’re still sorely lacking volunteers who would really care about mentors.debian.net; the codebase is a pile of hacks upon hacks upon hacks, all relying on an old version of a deprecated Python web framework. A few attempts have been made at a smooth transition to a more recent framework, without really panning out, mostly for lack of time on the part of the people running the service. I’m still convinced things should restart from scratch, but I don’t currently have the energy or time to drive it… Ugh.
  • Installing Solyd XK, a Debian based Linux distribution : Cooking With Linux
    It's time for some more "Cooking With Linux" without a net, meaning the video you are about to watch was recorded live. Today, I'm going to install a new Linux distribution (new to me, anyhow) called Solyd XK.