Cezary Podkul

Your bank account may be at risk as $44 million pig-butchering scam is exposed

Reporting Highlights

  • Struggling Gatekeepers: In the face of some $44 billion a year in pig-butchering scams conducted by Asian crime syndicates, U.S. banks have failed to prevent mass scale money laundering.
  • Black Market Bank Accounts: Chinese-language Telegram channels offer to rent U.S. bank accounts to pig-butchering scammers, who use the accounts to move victims’ cash into crypto.
  • One Address, 176 Clients: Bank of America allowed hundreds of unverified customers to open accounts, prosecutors alleged, including 176 who claimed the same small home as their address.

These highlights were written by the reporters and editors who worked on this story.

Brian Maloney Jr. was flummoxed when he was served with a lawsuit against his family’s business, Middlesex Truck and Coach, in January. Maloney and his father, also named Brian, run the operation, located in Boston, which boasts that it can repair anything “from two axles to ten.” A burly man in his mid-50s who wears short-sleeved polo shirts emblazoned with the company name, Maloney Jr. has been around his dad’s shop since he was 8. The garage briefly surfaced in the media in 2012 when then-presidential candidate Mitt Romney made a campaign stop there and the Boston Herald featured Maloney Sr. talking about how he had built the business from nothing in a neighborhood he described as having been a “war zone.”

Now Middlesex was being sued by a New Jersey man who claimed he had been defrauded of $133,565 in a cryptocurrency scheme. The suit claimed Middlesex “controlled and maintained” a bank account at Chase that had been used to collect the fraudulent payment. The purported victim wanted his money back.

None of this made any sense to Maloney Jr. His company did not have an account at Chase, and he barely knew what crypto was. “For God’s sake, we fix trucks and still have AOL,” he would later say.

It was only after Maloney went to Chase to investigate that he was able to piece together at least part of the explanation. It turned out that Chase had allowed an unknown individual, who applied online with no identification, to open an account under Middlesex’s name, according to information Chase provided to Maloney. The account was then used to solicit hundreds of thousands of dollars from fraud victims, including the $133,565 from the man who was now trying to reclaim his funds.

Middlesex’s experience, as bizarre as it seems, is part of a global problem that plagues the banking industry. The account falsely opened in Middlesex’s name, and many others like it, are way stations in a sophisticated multistep money laundering process that transports cash from U.S. scam victims to crime syndicate bosses in Asia.

There’s been an explosion in international online fraud in recent years. Particularly widespread are “pig-butchering” schemes, as ProPublica reported in 2022. The macabre name derives from the process of methodically “fattening” victims by getting them to contribute more and more money to an investment scheme that seems to be succeeding, before eventually “butchering” them by taking all their deposits. Often operated by Chinese gangs out of prison-like compounds in Cambodia, Laos and Myanmar, pig-butchering in that region has reached a staggering $44 billion per year, according to a report by the United States Institute of Peace, and it likely involves millions of victims worldwide. The report called the Southeast Asian scam syndicates the “most powerful criminal network of the modern era.”

A huge portion of such fraud is transacted in cryptocurrency. But given that the typical consumer doesn’t own crypto, many scams unfold with a victim tapping a traditional bank account to wire dollars to swindlers, who receive the funds in their own accounts, then convert them into crypto to move across borders. Later in the process, the scammers will typically transfer their crypto back into standard currency.

Bank accounts are so crucial to this process that a thriving international black market has developed to rent accounts for fraud. That, it seems, is how a Chase account in the name of Middlesex ended up as a repository for the proceeds of pig-butchering.

The huge demand for accounts used for misbehavior gives banks a crucial, and not always welcome, role as gatekeepers — a responsibility required by U.S. law — to prevent criminals from opening accounts or engaging in money laundering. Yet from the U.S. to Singapore, Australia and Hong Kong, banks have consistently failed at that responsibility, according to experts who have investigated money laundering, as well as reviews of fraudulent account details shared by victims and court cases reviewed by ProPublica. The list of financial institutions whose accounts pig-butchering scammers have made use of includes global behemoths like Bank of America, Chase, Citibank, HSBC and Wells Fargo and many other U.S. and foreign lenders.

The banks said in statements to ProPublica that they make extensive efforts to fight fraud by investing in systems to detect suspicious activity and to report it to authorities (read the banks’ statements here). The American Bankers Association, which represents the industry, acknowledged that “with more than 140 million bank accounts opened every year bad actors can sometimes get through despite determined and ongoing efforts to stop them.” But the group said other industries like telecommunications providers and social media platforms need to do more to fight fraud because there’s only so much that financial institutions can do.

Pig-butchering scams present some unique challenges for banks. Among other things, a customer in thrall to a fraudster will sometimes foil their own bank’s attempts to prevent them from sending money to a criminal. And foreign-based scammers have become adept at finding middlemen in the U.S. to exploit the banking system. “Cyber-enabled fraud operations in Southeast Asia have taken on industrial proportions,” according to an October report by the United Nations Office on Drugs and Crime. John Wojcik, one of the authors of the report, told ProPublica, “Banks have never been targeted at this scale, in these ways.”

It doesn’t help that there are “no real standards as to what a bank has to do for detecting fraud or money laundering,” said Lester Joseph, a financial compliance consultant who used to oversee money laundering cases at the Department of Justice and later worked at Wells Fargo. The main law governing U.S. compliance regimes, the Bank Secrecy Act, requires financial institutions to maintain programs to know their customers and to detect and report suspicious activity to the government. That might mean noticing, say, that a newly opened account is suddenly receiving and sending hundreds of thousands of dollars of wire payments each month.

But it is up to banks to design those programs. The regulations don’t even require that the programs be effective. That gives banks wide flexibility on how much due diligence and monitoring to do — or not do. More scrutiny upfront means slowing down business and adding costs. Many banks don’t ask questions until it’s too late.

If you’re a criminal looking to obtain a bank account with no pesky formalities, it’ll take you only minutes to find one on the messaging app Telegram. Chinese forums there feature ads for “cars” or “fleets” — bank accounts or other online payment platforms that can be used to collect stolen funds. (The vehicle metaphor stems from the fact that in Chinese slang, money laundering operations are known as “motorcades.”) One Telegram ad offered accounts at PNC, Chase, Citi and Bank of America and boasted of “firsthand” control of the accounts: “People can go to the bank to transfer money,” the ad said.

Another Telegram channel listed various flavors of pig-butchering scams for which it provided bank accounts. The group, named KG Pay, boasted of accepting wire transfers, making withdrawals from U.S. banks and converting deposits into crypto to transfer them to scammers. KG offered to handle deposits of up to $1 million in accounts that imitate “normal business transactions.” To avoid suspicion, KG said, it sliced big amounts into smaller batches. If banks grew suspicious and froze one of its accounts, KG said, it had agents ready to call customer service to persuade them to lift the freeze. For smaller transfers, a video tutorial inside the channel showed how easy it was to send cash using the Chase app. (Telegram deleted the KG Pay channel after ProPublica asked about it. In a statement, Telegram said it “expressly forbids money laundering, scams and fraud and such content is immediately removed whenever discovered. Every month, over 10 million accounts, groups and channels are removed for breaching Telegram’s terms of service — including rules that prohibit money laundering and fraud.”)

Demand for money laundering is huge in Sihanoukville, a seedy gambling hub in Cambodia notorious for hosting massive scam operations. In some hotels above casinos there, blocks of guest rooms have been converted into offices where workers help fraudsters find motorcades to move illicit funds, according to a 2024 report by a doctoral anthropology student.

Inside those offices, the tap of keyboards and buzz of Telegram notifications suggested a trading floor at a stock exchange. But the work of the people interviewed by Yanyu Chen, the doctoral student, was very different. The workers, all Chinese and speaking on the condition of anonymity, were candid. They said they were tasked with matching cyberscam gangs with providers who could supply them with bank accounts to collect and move proceeds from fraud victims. In Telegram chat groups, the workers could see bank account suppliers and swindlers in need of accounts and would match the two and keep track of trades and commissions.

The business has become so mainstream that even one of Cambodia’s most prominent financial services firms, Huione Group, runs an online marketplace that allegedly facilitates such transactions. Its Telegram channels, including the one that included the aforementioned ad offering “firsthand” control of U.S. bank accounts, have helped launder funds for pig-butchering scams as well as heists linked to North Korea, according to the U.S. Treasury’s Financial Crimes Enforcement Network. (Huione said in a statement that it is working to prevent abuse of its services and is “fully committed to collaborating with the U.S. Treasury Department to address expeditiously any and all concerns.”)

The workers interviewed by Chen were unperturbed about enabling fraud. One described the work as boring, little more than copying and pasting bank account info between scammers and motorcades. Another worker told her that he viewed himself as “solving a very old problem of getting into the banking system people who have long been shut out of it.”

The fraud that ensnared Middlesex Truck and Coach as a tangential victim covered thousands of miles via electronic byways. By all appearances, it emanated from Cambodia, then reached New Jersey, where a mark was persuaded to wire a total of $716,000 to accounts tied to purported businesses in Boston, New York, California, Hong Kong and elsewhere. All but a few appeared to have been incorporated by Chinese individuals, sometimes just days before their accounts started accepting large sums.

The fleecing of Kevin, who ProPublica agreed to identify by first name only, was a textbook example of pig butchering. Kevin had reached the stage in life when he wanted to ease his workload after a varied career as a financial planner, small-business owner and fitness instructor. Just before Christmas 2022, someone purporting to be a San Diego woman named Viktoria Zara friended Kevin on Facebook. She soon introduced him to a sleek crypto trading website called 3A on which she claimed to have made $700,000 on bitcoin futures. (Facebook deactivated Zara’s profile after ProPublica inquired about it, and a spokesperson said the social media company has “detected and disrupted over seven million accounts associated with scam centers” in Asia and the Middle East since the start of 2024.)

Kevin acknowledges he was seduced by the thrall of easy money. “Something came over me,” he said. Kevin accepted Zara’s offer to teach him how to trade and, within a few weeks, he was routinely wiring tens of thousands of dollars to various bank accounts to fund his trading.

The accounts were not registered to 3A. They were listed under a variety of companies he’d never heard of, such as Guangda Logistics and Danco Global.

Kevin found this odd. But Zara, his supposed friend, told him that was just how 3A operated, and Kevin felt safe wiring funds to accounts at Chase because of its size and reputation. Every time he did so, the sum showed up in his online 3A portal, making him think the transactions were real. Better yet, his investments had apparently soared; his account balance now read $1.4 million.

Like many a pig-butchering victim, Kevin realized something was off only when he went to withdraw his profits and 3A demanded that he first pay a “tax” of almost $134,000. Kevin knew from his financial planning days that wasn’t how things worked. But he set aside his doubts and went to his bank late one afternoon in April 2023 to wire the tax payment. He’d been given a fresh Chase account to send funds to and pressured to wire money within two hours.

This time, his money was addressed to Middlesex Truck and Coach. Kevin was so under the sway of his scammers at that point that he did not question the money’s destination. Nor did the teller at the TD Bank branch he went to. (TD declined to comment on Kevin’s case but said it trains employees to challenge customers when transactions seem suspicious and to warn them never to wire funds to people they do not know.)

As soon as Kevin got home, panic set in: 3A told him the Chase account to which he’d just wired $134,000 was frozen and that his tax payment would not go through. He would need to send another $134,000 to a different account. Confused, Kevin went back to TD first thing the next day and asked the teller to reverse the wire. Over the next two weeks, Kevin said, his bankers at TD called Chase three times but never got a response. (Chase did not answer ProPublica’s questions about Kevin’s efforts to recall his wire but said the wire recall process is challenging and rarely succeeds.)

It is possible to reverse a wire transfer if customers inform their banks quickly, before the transaction has been completed, according to lawyers and experts. But banks have no obligation to reverse a transfer even when a customer reports potential fraud. “It’s really up to the receiving institution if they release the funds and how they go after the customer on their end,” said Saskia Parnell, a banking industry veteran who now volunteers for an anti-scam group called Operation Shamrock.

As Kevin agonized, the 3A customer service reps dangled a solution: Just wire the funds again and unlock your $1.4 million. He feared TD wouldn’t let him send the wire again, so he switched to PNC Bank and sent a fresh $134,000 wire to another recipient at Cathay Bank in California. That yielded yet another tale about a purported government roadblock and the demand for yet another payment.

Kevin wasn’t thinking clearly. His son, who had struggled with substance abuse, had suddenly died of a fentanyl overdose. Kevin was overwhelmed with grief. He agreed to make another payment.

By June 2023, even a call from PNC’s fraud department declining his outgoing wire could not dissuade him. It was the only instance, out of the 11 times he attempted to wire money to scammers, that a bank stopped the transaction, according to Kevin, who did not have a history of making wire payments before. (PNC said in a statement that “we believe we took appropriate action.”)

It made no difference. Kevin’s mind was so clouded that he instead opened a new account at Wells Fargo. The switch illustrated another challenge: Even if one bank succeeds in preventing fraud, criminals can still win if another bank isn’t as diligent. (Wells Fargo said it invests hundreds of millions of dollars a year to fight scams).

After wiring $150,000 from Wells Fargo to two Chinese entities listed at a Singaporean bank, Kevin waited to receive his trading proceeds. But when all that resulted was another request that he wire money — $40,000 this time — Kevin finally grasped reality. He was now without a son, and his finances lay in ruins. “The whole world was coming to an end,” he recalled.

Kevin had preserved enough savings to hire a private investigator, John Powers of Hudson Intelligence, to follow the financial trail. Powers found a litany of red flags among the entities that had gotten bank accounts and received Kevin’s funds. Some of the businesses gave phony addresses, such as a vacant home. Another was registered to a one-bedroom apartment in Los Angeles that was also listed as the headquarters of a dozen other businesses set up since 2022 by different Chinese individuals. Contact info was scarce; official emails for two companies included the temporary email domain “netsmail.us,” which doesn’t connect to a functioning website. All of these ersatz businesses had accounts at Chase, Cathay or Singapore’s DBS Bank.

Chase said that it has policies to identify and verify the identities of its customers, and that it continually evaluates and enhances them. Cathay said it also reviews its systems and policies to detect and prevent fraudulent activity. DBS did not respond to requests for comment.

Another clue indicated that the banks had been doing business with a larger criminal enterprise. Two of the companies Kevin sent funds to, Guangda Logistics (which lists no contact information) and Danco Global (which did not respond to ProPublica’s request for comment), showed up on a list of more than six dozen shell entities that had been used to defraud Americans of nearly $60 million. The information was uncovered in an investigation by the U.S. Secret Service into KG Pay, one of the money laundering groups that was on Telegram.

The case of the man behind KG Pay sheds further light on how motorcades use U.S. banks. Daren Li, a Chinese national in his early 40s, went by the alias KG Perfect. Based in Cambodia, he directed the movement of large sums of pig-butchering proceeds from the U.S. to overseas. Li, who was arrested in April 2024 at the airport in Atlanta, pleaded guilty in November to conspiracy to commit money laundering. He admitted that at least $73.6 million of victim funds were deposited into bank accounts he and his co-conspirators controlled. Li, who is in federal detention awaiting sentencing, could not be reached for comment through his lawyer. Seven other people have pleaded guilty to conspiring with Li.

KG exploited a weakness in the U.S. banking system: Banks are reluctant to share account information, even after they’ve identified suspicious activity. A law enacted in the wake of the Sept. 11, 2001, attacks gave banks a reprieve from secrecy rules if they alert one another to potential terrorism or money laundering activities. But the information sharing is voluntary and “banks are not communicating with each other,” according to Matt O’Neill, who led many money laundering investigations for the U.S. Secret Service during his 25 years there. “Fraudsters know it and fraudsters are clearly making hundreds of millions or billions of dollars off of this glaring gap in the system,” said O’Neill, who now runs 5OH Consulting.

One of the most prolific cogs in Li’s motorcade, according to civilandcriminalcases, was a Chinese national named Hailong Zhu. He entered the U.S. on a tourist visa around 2019 and then stayed, working odd jobs in construction and at a restaurant. In 2022, Zhu was recruited to help Li’s other operatives set up businesses and bank accounts near Los Angeles in exchange for $70,000.

Zhu turned the assignment into a full-time job, eventually juggling seven accounts at Bank of America, Chase, East West Bank and Wells Fargo tied to two entities set up in his name: Sea Dragon Trading and Sea Dragon Remodel. When Bank of America restricted Zhu’s Sea Dragon Trading account due to suspected fraud on Oct. 19, 2022, Zhu got another account at Bank of America the next day using Sea Dragon Remodel. By Nov. 1, 2022, he had secured four more accounts at Chase, Wells Fargo and East West Bank. Except for varying his address and email, investigators found that Zhu provided largely the same info when opening accounts for the two shell entities.

Zhu’s account opening spree happened just a few months after federal prosecutors blamed “the corruption of BofA bankers” for a scheme in which a handful of employees opened 754 accounts at Bank of America registered to 13 false addresses in the Los Angeles suburbs. In that case, shadowy middlemen dispensed bribes of $200 to $250 per account to Bank of America employees who overrode internal compliance systems to open accounts for overseas Chinese citizens who weren’t physically present at the branch to open the accounts, in violation of the bank’s rules. Even when the bankers registered 176 customers to one small home, the accounts were still opened. (Two of the bankers later pleaded guilty to making false entries in bank records; Bank of America said in a statement that it “uncovered illegal activity using its monitoring systems, terminated the employees, and cooperated with law enforcement, who successfully prosecuted those involved. This is how our anti-money laundering program is designed to work.”)

With banks always one step behind, Zhu’s accounts kept receiving hundreds of thousands of dollars from victims across the U.S. Zhu would bundle the proceeds and transfer them abroad. During one week in November 2022, for example, he received six wires totaling almost $52,000 into one of his accounts and wired out one lump sum of $53,000. The destination was a bank account in the Bahamas controlled by Li and others, who converted the funds into cryptocurrency for their journey to scam centers located overseas, including in Sihanoukville. Investigators discovered a crypto wallet address they believed Li controlled. Data from cryptocurrency analytics firm Crystal Intelligence shows the wallet address sent and received about $341 million of crypto across 16,800 transactions between April 2021 and April 2024.

Zhu was arrested in March 2023 and charged with bank fraud. His lawyers acknowledged at trial that their client opened bank accounts and moved funds but said that Zhu did not know his bosses were using them for criminal purposes. Zhu was acquitted after the attorneys persuaded the trial judge that using false information to obtain a bank account does not constitute a scheme to defraud a bank. Only months after the acquittal, Zhu was charged again, this time with money laundering offenses, in an indictment filed in December 2023. Zhu, who couldn’t be reached for comment, did not enter a plea and was listed as a fugitive as of March 2025.

In January 2024, Kevin, desperate to get his money back, sued the 10 companies to which he had wired money at the scammers’ behest, including Middlesex Truck and Coach. None replied to his lawsuit — most were shell entities, after all — until January 2025, when Kevin’s lawyer got an email from Brian Maloney Jr.

Maloney confessed that his staff had ignored the lawsuit when it was initially served because it looked like a scam. He said he’d never banked with Chase and had no idea about any account that had been used to defraud Kevin. Maloney agreed to go to the local Chase branch to investigate and try to help Kevin get his money back.

“I went to the bank and said, ‘What the hell is going on?’” Maloney told ProPublica. After spending nearly two hours with the local Chase branch manager, Maloney realized that he, too, was a victim of the bank’s lax procedures: He said the branch manager told him that Chase had allowed someone to obtain an account online in his company’s name in March 2023 with nothing more than a digital signature and an employer identification number, but no personal identification. That account had then accepted hundreds of thousands of dollars of wire transfers. And now Maloney’s family business — not Chase — was the defendant in a lawsuit. “How is this legal?” he wondered. (Colin Schmitt, a retired FBI agent, said Chase could have mitigated the fraud by at least pausing incoming wire transfers to the fake Middlesex account and asking its owner to justify the transactions. “If you’re just using an account just for wires, that’s a big red flag,” Schmitt said.)

Still, there was a silver lining: The funds remained in the account. Not only Kevin’s $134,000, but almost $100,000 more from several other victims sat frozen inside since spring 2023.

Kevin was glad the money was still there, but he wondered why it took a lawsuit to unearth the info. “It does not seem like the system is tailored to give any deference to the victim,” he said. “That’s what frustrates me.” His lawyers advised him to seek an order from a federal judge to get his funds back and filed such a petition in March. After ProPublica asked Chase about Kevin’s funds in April, the bank agreed to return the money to him without a court order.

The $134,000 landed back in Kevin’s bank account in mid-May. Finally, he felt a sense of relief. (He has now dropped the suit against Middlesex.) But Kevin also wondered what would happen to the other people whose money got siphoned up by the fake Middlesex account. Would Chase wait for them to file lawsuits too?

Banks are starting to face lawsuits by pig-butchering victims who allege laxness in opening accounts. In December, a California man who was defrauded of nearly $1 millionsued DBS and two other banks for alleged failures to comply with know-your-customer and anti-money-laundering laws. A college professor from Iowa who lost $700,000filed a lawsuit in January against Hang Seng Bank in Hong Kong for failing to do proper due diligence on the people who opened accounts used to defraud him. Hang Seng reached an agreement with the Iowa professor to dismiss the suit and declined to comment further. DBS did not reply to requests for comment on the California case, but the bank asserted that the lawsuit contains “fatal flaws,” according to a filing in the suit.

Such cases are long shots, according to Carla Sanchez-Adams, senior attorney at the National Consumer Law Center. The suits typically fail because it’s hard to show that financial institutions knew or should have known about potential fraud.

Still, banks are well aware that fraud is on the rise. Nearly 1 in 3 Americans say they have been the victim of online fraud or cybercrime, according to a 2023 poll commissioned by Wells Fargo. “The scale of fraud taking place every day is a massive burden for our country and for the millions of hard-working women and men whose lives are affected by it,” Rob Nichols, president of the American Bankers Association, said in an October speech.

Nichols contends that “consumers credit the banking industry with doing more than other industries to protect them from fraud and keep their information safe.” He cited an initiative by the ABA to create a database of fraud contacts to help banks figure out who to call when there’s a problem. And he urged the Trump administration to develop a national fraud prevention strategy.

Other countries are taking more aggressive steps. In October, the U.K. began requiring banks to reimburse scam victims up to £85,000, or about $116,000, per claim when they make a fraudulent payment on behalf of their customers, even if the customers authorized the transfer. Australia recently enacted a law that will require banks to share suspect account info with one another. Thailand has gone even further, creating a Central Fraud Register intended to compel banks to identify and close accounts used for money laundering.

The U.S. lacks such rules. O’Neill, the former Secret Service agent, thinks that updating the Patriot Act, the post-9/11 law meant to encourage banks to share intel, would be a good place to start. But Congress has not moved in that direction and the Trump administration has shown no sign that it plans to prioritize this issue. (Asked what steps the administration is taking, a spokesperson told ProPublica to Google the administration’s sanctions related to pig-butchering scams.)

For now, bank accounts remain easy for fraudsters to obtain. A sleek-looking brokerage akin to 3A has been online for months, soliciting deposits for what a researcher at the Global Anti-Scam Organization identified as a pig-butchering scheme. Anyone wishing to “invest,” the brokerage said, can wire money to a shifting array of banks, including Chase.

Doris Burke contributed research.

Inside the infrastructure of one of the largest fraud waves in history

ProPublica is a Pulitzer Prize-winning investigative newsroom. Sign up for The Big Story newsletter to receive stories like this one in your inbox.

A Bronx man allegedly received $1.5 million in just ten months. A California real estate broker raked in more than $500,000 within half a year. A Nigerian government official is accused of pocketing over $350,000 in less than six weeks.

What they all had in common, according to federal prosecutors, was participation in what may turn out to be the biggest fraud wave in U.S. history: filing bogus claims for unemployment insurance benefits during the COVID-19 pandemic. (The broker has pleaded guilty, while the Bronx man and Nigerian official have pleaded not guilty.)

Fraudsters have filed in high volumes, sometimes obtaining payments from multiple states, despite the fact that a jobless person is barred from getting assistance in more than one state. One person, according to the U.S. Department of Labor, used a single Social Security number to file unemployment insurance claims in 40 states. Twenty-nine states paid up, sending $222,532.

But the problem extends far beyond a plague of solo scammers. A ProPublica investigation reveals that much of the fraud has been organized — both in the U.S. and abroad. Fraudsters have used bots to file online claims in bulk. And others, located as far away as China and West Africa, have organized low-wage teams to file phony claims.

In addition, the fraud has been enabled by a burgeoning online infrastructure, whose existence has not previously been reported in the mainstream press. Much of it is geared toward exploiting aging or obsolete state unemployment systems whose weaknesses have drawn warnings for decades. Communities have sprouted on messaging apps such as Telegram, where fraudsters trade tips on how to cash in. Hustlers advertise their techniques — or “sauces" (apparently short for “secret sauce") — for filing bogus claims, along with state-specific instructions on how to get around security checks, according to a ProPublica review of messages on more than 25 such chat forums.

Some of the forums have thousands of participants and regularly offer stolen identities for sale, alongside tech tips, screenshots that ostensibly prove the methods work and advice on which states are easiest to game and which are “lit" — that is, still paying out fake claims. Users have created two Telegram channels in which they trade tips for filing claims in Maryland, whose labor department recently said it detected some 508,000 potentially fraudulent jobless claims between the start of May and mid-June. Participants in those forums have been talking about turning their efforts to Pennsylvania, where officials recently said they have “noticed an uptick" in fraudulent claims.

Telegram did not respond to requests for comment. But after ProPublica's inquiry, 10 of the channels we asked about suddenly went dark, marked with this notice: “This channel can't be displayed because it violated Telegram's Terms of Service."

Nobody has yet come close to putting a definitive number on the dollar value of fraud relating to pandemic-era unemployment benefits. But ProPublica performed a data analysis that hints at the massive scope. In state after state, the volume of initial jobless claims has far exceeded the number of estimated job losses. Across the U.S. from March to December 2020, the number of initial claims equated to 68% of the country's labor force, which stood at around 164 million before the pandemic. In five states — Arizona, Georgia, Hawaii, Nevada and Rhode Island — the initial claims outnumbered the entire pool of civilian workers. By contrast, about 23% of American workers were out of a job or underemployed at the peak of the pandemic, according to the Bureau of Labor Statistics; in the most recent report that figure is just under 10%. (There are innocent explanations for at least some of the disparity: If a person loses a job more than once during a given year, they can legitimately file for benefits more than once during that time.)

The fraud estimates provided by states so far range from high to jaw-dropping. In Vermont, as many as 90% of claims in some months were determined to be fraudulent, state officials said in June. Rhode Island's labor agency said in March that it suspected fraud in 43% of the claims it had received. The equivalent agency in California has confirmed fraud in about 10% of its payments and said it's investigating a further 17%. The numbers have tailed off in Texas, whose agency says it now suspects fraud in about 14% of its claims.

“The system was the victim of what is one of the largest internet crimes in history, perpetrated against all 50 states at extraordinary levels," said James Bernsen, a spokesperson for the Texas Workforce Commission. (Bernsen and officials for other states say the damage could've been even worse: They say they've been able to stop billions of dollars' worth of bogus claims before they got paid.)

The U.S. Department of Labor's inspector general estimates that at least $87 billion in fraudulent and improper payments will have made their way through the system by the time pandemic-linked jobless aid programs expire in September. That estimate is based on a historic assumption that fraud and waste eat up about 10% of unemployment insurance aid. The inspector general acknowledges that figure is likely too conservative in an environment where unemployment insurance fraud has “exploded" to “unprecedented" levels.

Other experts anticipate a dramatically higher tally. “From my experience, when this is all said and done, we are going to be counting in the hundreds of billions of dollars, not the tens of billions," said Jon Coss, who heads a unit within Thomson Reuters that is helping states detect fake unemployment insurance claims.

Coss bases that assessment on the widespread fraudulent activity he's seen. He said one U.S. state, which he declined to name, received fake claims — all purportedly from state residents — that originated from IP addresses in nearly 170 countries. They included countries historically linked to fraud, such as China, Nigeria and Russia, as well as more surprising ones, such as Cuba, Eritrea, Fiji and Monaco. Overall, Coss said, between 40% and 50% of the claims his group has analyzed seem highly suspect. He added, “It's mind-boggling the level of fraud that we're seeing."

Defrauding unemployment insurance, or UI, programs, which pay out weekly benefits to workers who've lost jobs through no fault of their own, is likely as old as the programs themselves. But the rise of internet-based crime over the past 25 years or so, particularly the use of stolen identities to file fake claims on someone else's behalf, opened the way to fraud on an epic scale.

The problem was already described as ongoing as early as 1998, when the Labor Department's inspector general warned about the “continued proliferation of UI fraud schemes." Four years later, a report by the inspector general said, “We are particularly concerned with identity theft or imposter schemes, which occur when individual identities are stolen and then used to apply for UI benefits." The report noted that “individuals have the opportunity to defraud multiple states from a single location."

In 2015, the agency detailed the “systemic weaknesses" that make UI programs vulnerable to fraud. (More on those later.) At least twice during the Obama administration, the Labor Department proposed reforms to Congress to address some of these inadequacies, primarily by boosting information sharing among states and federal agencies. Both times these efforts went nowhere. President Donald Trump included similar reforms in each of his four budget proposals to Congress. They, too, were never enacted.

Meanwhile, states' funding for unemployment insurance administration was falling, largely because the economy strengthened and unemployment fell. At the start of the pandemic, funding for states' unemployment insurance administration stood at a 30-year low, according to the National Association of State Workforce Agencies.

The funding squeeze led to some predictable results. California, which had hired Coss's firm to help detect fraud, canceled that contract in 2016 to save money. Budget cuts also trimmed the ranks of the federal Labor Department's inspector general's office, which lost 28% of its criminal investigators between 2012 and 2020, according to figures provided in response to a Freedom of Information Act request.

At the same time, online criminals were expanding their targets. Years ago, Agari Data, a cybersecurity firm that helps catch email scams, began tracking a Nigerian cybercrime group it dubbed “Scattered Canary." Agari produced a timeline of the group's evolution that looks like an ever-branching tree: It grew out of Craigslist scams (2009) into phishing (2015) and then tax return fraud and credit card fraud (2016). Scattered Canary started targeting unemployment aid, too. “Similar to how the group pivoted from individual victims to business targets during the previous three-year period," Agari wrote in a 2019 report, “Scattered Canary again set their sights on a new type of target in 2017 — government agencies."

A steady procession of large-scale hacks of corporations and governments over the past decade provided the raw material needed to defraud government benefit programs. What scammers call “fullz" — a suite of data ranging from a person's name and address to their Social Security number, date of birth and more — was increasingly easy to obtain. The Privacy Rights Clearinghouse, which tracks data breaches, tallied 2,229 hacks from 2010 to 2019, according to a database of such incidents. Those hacks exposed nearly 6.9 billion records.

When the pandemic seemed to threaten the foundations of the economy in March 2020, Congress responded quickly, launching the biggest expansion of unemployment insurance since the system was created amid the Great Depression. Lawmakers created three massive programs that workers could tap as states shut down to halt the spread of the deadly virus.

One program provided workers 13 additional weeks of aid once they exhausted their regular unemployment benefits. Another gave laid-off workers an extra $600 per week on top of existing benefits. A third, known as Pandemic Unemployment Assistance, funded 39 weeks of jobless benefits for workers traditionally excluded from unemployment insurance, such as self-employed “gig economy" contractors.

As of July 17, 2021, the three programs have collectively paid out about $604 billion, a total projected to reach up to $873 billion by the time the programs expire in September. That's on top of states' regular unemployment insurance plans, which paid out another $166 billion in jobless benefits between March 2020 and June 2021. That means total payments to the jobless could add up to about $1 trillion over 18 months.

Augmenting UI payments was not an unusual move for Congress — but the scale and speed were vastly different. For example, in the aftermath of the 2008 financial crisis, Congress funded an extra $25 a week on top of regular state unemployment benefits, then averaging around $300 a week. This time, Congress authorized a weekly $600 payment that was automatically added to regular UI payments, which require verification of prior income and employment.

But in its urgency to get cash to people with no work, Congress chose not to require such verification in the PUA program. It requested only self-certification of eligibility and no proof of income or identity. And successful applicants could get the extra $600 weekly payment, too.

With its loose application requirements, PUA instantly drew throngs of scammers. California state authorities have said that 95% of its confirmed fraudulent UI payments originated in PUA claims. Pennsylvania's agency estimated that nearly 84% of its PUA claims were phony.

A scroll through the thousands of messages exchanged in Telegram chat forums provides a vivid illustration of what state unemployment agencies have been up against. The forums are easy to find: Simply searching for the acronym “PUA" can lead any Telegram user to a bunch of them (even after Telegram shut 10 of them in the wake of our questions). They have proliferated since the start of the pandemic, providing bustling marketplaces for criminals looking to obtain stolen IDs, methods for filing fake jobless claims or other advice. The most common products sold on the forums — state-specific sauces for filing claims — are hawked with daily frequency.

A Telegram user who posts under the handle “VerifiedFraud" recently offered his 1,300 chat room participants a new sauce for Pennsylvania's system that he said would pay $700 a week. (VerifiedFraud also posted an earnest “new month prayer" on July 1, asking God to help his customers: “My prayer is all your sleepless night & day coming to this forum working & praying to God shall come through and Success will locate u.")

Pennsylvania said it's unable to speak to the validity of the guide. When ProPublica asked about the guide, VerifiedFraud responded with two emojis: 🙄🙄. Fifteen minutes later, he posted a message in his channel that seemed to rationalize fraud: “Virtually all these wealthy entrepreneurs you see around 90% of them started with something illegal to make enough money to run their business."

The guides available on Telegram include lengthy step-by-step directions and screenshots detailing where to input stolen information. They offer advice on how to avoid triggering anti-fraud software, such as not to fill out part of the application on one device or from one IP address, then switch to another. One guide for filing claims in New York state warns users, “Don't Copy and Paste in the text box. Type in the details while filling the text boxes. A script monitors activities like Copy&Paste to raise red flags."

When such guides outlive their usefulness, new ones quickly pop up. “New CALI SAUCE WAVE," read one of several messages posted in late June alongside a screenshot of what purported to be a successful unemployment aid application for California. The ad, offered by someone who calls himself the “King of Cali," touted a video guide and a PDF walk-through. California's Employment Development Department declined to comment.

Many of the pitches are blunt. One ad features the 2021 edition of a “Fraud Bible" for sale alongside 19 other sauces, including a guide for obtaining loans under the government's Paycheck Protection Program, another frequent fraud target. The PPP loan program ended on May 31, underscoring the risk that the people selling the Fraud Bible may not be on the up and up. (When ProPublica requested comment, the seller or sellers of the Fraud Bible responded with variations of “fuck you." The “King of Cali" responded by asking, “Are you ready to pay? I'll give you everything you need." Hours later, his profile was deleted and replaced with a warning: “Many users reported this account as a scam or a fake account. Please be careful, especially if it asks you for money.")

Concerns about fraud are rampant inside the forums — but only insofar as the users fear they could become victims of it rather than perpetrators, say, by paying for a fraud strategy that no longer works. One Telegram forum called “$CAM C3NT£R" promises a “trusted" escrow service that clears sales of sauces, stolen identities and other services to make sure participants don't rip each other off while preparing to rip the government off. (The administrator of $CAM C3NT£R told ProPublica he's just trying to stop fraud inside his channel: “lot of fake people around and I'm doing escrow to protect my people.")

To convey the success of their methods, sellers frequently post photos of wads of cash or screenshots of unemployment payments seemingly landing in their bank accounts or mobile payment apps. One user who recently advertised a Michigan sauce elegantly arranged $20 bills in the shape of the words “tap in" to encourage users to pay $200 via Bitcoin for his method, along with a screenshot of Michigan's jobless aid website and the claim that “Michigan still hittin and is payin good money." (A spokesperson for Michigan's Unemployment Insurance Agency said the state is having success stopping fraudulent payments before they're made and that “these type of messages amount to false advertising in order to elicit money from those who would steal identities.")

Social Security numbers, names and dates of birth are frequently exposed in the forums by sellers wishing to give buyers a taste of what they've got. Sometimes users post links to files of data purportedly stolen via corporate hacks. In another dark web forum called White House Market, some participants offer to create identity profiles tailored to specific states where buyers want to file jobless claims. “No guarantee in success, but all pros would be made just for you," read one such ad. The asking price was $70 per profile.

Such forums have attracted users from around the world, but user messages suggest that one country in particular appears to provide a significant set of followers: Nigeria.

That's where Abidemi Rufai was bound on the evening of May 14 when he was getting ready to board the first-class cabin of a flight at John F. Kennedy International Airport after visiting his brother in New York. Instead, he was arrested by FBI agents and charged with stealing more than $350,000 in unemployment benefits from Washington state.

Details of that indictment shed light on how federal prosecutors believe such schemes are carried out, and the sheer variety of participants they have attracted: Rufai serves as a senior special assistant to the governor of a Nigerian state.

He allegedly used stolen identities to file fake unemployment benefits in 11 states, including over 100 applications in Washington, where state auditors have tallied a total of $1.1 billion in possible imposter fraud from nearly 250,000 potentially bogus claims.

Prosecutors say Rufai filed his claims using variations on the same email, sandytangy58@gmail.com, which he modified by inserting periods in different places, like san.dyta.ngy58@gmail.com or sa.ndyt.a.ngy58@gmail.com. Servers for state unemployment agencies treat those as different email addresses, but Google disregards periods when routing messages to a gmail account. That allowed Rufai and his co-conspirators the convenience of filing in multiple states while handling all of their correspondence from one email account. It's a popular strategy: Another Nigerian national allegedly used it to claim more than $489,000 of unemployment payouts from 15 states, according to an affidavit filed in a similar case.

When completing unemployment benefit applications, Rufai and his co-conspirators directed states to pay benefits into Green Dot online banking accounts, one of several fintech platforms favored by criminals for their ability to quickly link debit cards with checking accounts that can be used to receive government benefit payments. In other cases, they directed payments into bank accounts controlled by “money mules," people who would receive funds and then transfer them to Rufai and his co-conspirators in exchange for a fee. (Green Dot Chief Risk Officer Philip Lerma said the company has been working with state agencies to combat fraudulent activity. “This is an ongoing process of learning and refinement across the industry," he said in a statement.)

Prosecutors said Rufai's email account contained a “staggering" amount of stolen information, including passwords to people's email accounts, security questions and answers, driver's license numbers, and bank account and routing numbers, as well as more than 1,000 stolen tax returns.

Rufai had also used his gmail account to submit claims for Federal Emergency Management Agency disaster relief in 2017, according to prosecutors, followed by fraudulent submissions to the Small Business Administration and the Internal Revenue Service. After Rufai was charged, investigators at the IRS disclosed they had been investigating the sandytangy58@gmail.com account for several years. They told prosecutors that the agency had received 652 applications for fraudulent tax refunds from “dot variants" of that email, totaling $1.6 million. Of that, about $900,000 was approved for payment.

Rufai has pleaded not guilty. His lawyer, Michael Barrows, did not respond to repeated requests for comment. Barrows wrote in a bail filing in late June that Rufai has no criminal record and that prosecutors are offering “intentionally false and/or misleading information in an effort to exaggerate the crimes alleged while tarnishing the reputation of a well-respected Nigerian government official."

Some scammers employ similar techniques on a mass scale by writing computer scripts, or bots, to automatically populate stolen identities into states' application portals. New York suffered an attack from one such bot, which was able to repeatedly navigate and complete its application process, according to a person familiar with the episode. New York's labor commissioner has said that the state is “aggressively deploying advanced resources" to fight fraud, including computer algorithms of its own.

Other fraudsters outsource such activity to human labor farms in low-wage countries, according to cybersecurity firm F5. Patterns of UI applications indicate workers in China, Brazil, Bolivia, Mexico and West African nations have been hired to input data into U.S. unemployment portals, according to Carlos Asuncion, F5's director of solutions engineering. Asuncion said job ads to do that kind of work often pop up on websites catering to “microworkers" — people who earn pennies per task for such actions as creating gmail accounts, inputting email addresses or zip codes and solving captchas (the latter for as little as five hundredths of a cent per captcha). The labor can be even cheaper, according to Asuncion, than developing and updating a computer algorithm. As he put it, “It's kind of an arms race."

State unemployment agencies, burdened by aging technologies and siloed databases that don't effectively communicate with each other, have been unable to keep up with any sort of arms race.

Federal rules require states to cross-check applicants' information against a handful of databases when determining eligibility for jobless benefits. These include a national directory of new hires, quarterly wage records submitted by employers, and an immigration database that allows states to verify applicants' citizenship status. The Labor Department also recommends that states check a database aimed at preventing claims in multiple states, as well as the Social Security Administration, prisoner records and an interstate data hub meant to help flag foreign IP addresses, suspicious email domains and applicants, according to a May 2020 compliance bulletinbulletin.

But performing all those checks requires modern technology. Many states are running their UI systems on software so obsolete that it's hard to even find anyone able to service it. North Dakota had to recruit programmers from Latvia to prop up its systems last year, since the tiny Eastern European nation is one of the few places that still teaches the software used by the state's unemployment insurance system. The clunky mainframe was “miraculously patched together, at considerable cost, to get us through the pandemic surge," the state's governor said in his December 2020 budget proposal, which sought to replace the system.

Amid the surge in claims, databases frequently froze up or slowed to a crawl, according to the Labor Department's inspector general. States also reported not having the mainframe capacity to perform cross-matches for the large volumes of claims they were getting.

The result was that many cross-checks simply didn't happen. Twenty states did not perform all the required database cross-matches, and 44 states did not perform all recommended ones, the inspector general found.

Even when states perform the checks, they can still be fooled. After all, the extent of identity theft means that criminals often input the information of a real person. Validating that the data is accurate doesn't necessarily verify whether the claim was filed by the person whose data was used. “Verification and validation are two different things," said John Pallasch, an assistant secretary of labor during the Trump administration. “That was the inherent flaw in all of this."

Violinist Philip Payton got caught on the wrong end of this after he lost his job playing in Disney's “Frozen" musical. When the pandemic shut down all Broadway performances in March 2020, word got around the orchestra that musicians could apply for unemployment insurance. By early April, Payton was receiving $504 a week plus the extra $600 authorized by Congress, his account shows. “This just helped me stay normal," he said. “I could pay my bills and pay my half of the rent."

But things changed in mid-September when the weekly payments suddenly stopped. He called New York's Department of Labor and was told, he said, that he had a claim in another state. The agent didn't tell him which state. A follow-up conversation in October ended the same way.

Many have shared Payton's plight. In 2020, consumers filed nearly 400,000 complaints claiming their identities were stolen and used to claim government benefits. That was up more than 2,900% from about 13,000 such complaints in 2019, according to Federal Trade Commission data.

Unsure what to do, Payton kept calling until he finally got through to someone who told him the other claim was in Texas. Payton called the Texas Workforce Commission's fraud line, but couldn't get through to anyone.

By then, it was January and Payton was beginning to run low on cash. He kept calling and leaving messages but couldn't get a call back. Eventually, through a chain of contacts, Payton reached an agent at the Texas commission, who told him he was listed as having filed claims in multiple states. The agent told him to call New York's labor department to get his benefits restarted.

That prompted yet another round of phone calls. It was now early April. Payton had drained his savings and was falling behind on rent. Sometimes he'd spend three to four hours a day on hold while practicing violin or browsing job ads on the internet. He also started contacting organizations he thought might be able to help. Eventually, he connected with a paralegal at the Legal Aid Society, who sent an email to two New York labor department officials asking to expedite his case.

A day later, after eight months of missed payments and little work, Payton's unemployment benefits finally restarted (and covered the earlier missed payments). But the experience shook his faith in the program. “There just has to be a better system," Payton said.

The state unemployment agencies in New York and Texas both declined to comment on Payton's situation, citing privacy restrictions. But Bernsen, the spokesperson for the Texas Workforce Commission, said in a statement that the state generally blocks suspicious claims by placing a “fraud block" on them. “This becomes a problem when the legitimate person needs to access those funds." He added, “Fundamentally, the system is trying to do two things simultaneously that are at odds with one another: ensure quick payments to individuals and prevent fraud."

Of the two issues, fraud prevention is now much more on the minds of officials in Washington. Gene Sperling, President Biden's top official in charge of the pandemic response, said the issue goes beyond just unemployment insurance. The deluge of fraudulent claims has slowed as the surge in federal aid draws to a close, but he sees the proliferation of identity theft for government benefits as the larger threat. “It's always a bad thing when somebody cheats and gets a few thousand dollars by doing this or that," Sperling told ProPublica. “But we seem to be seeing something much larger and systemic."

Sperling said the White House asked federal agencies to provide preliminary recommendations by mid-July on what the government can do to prevent criminal syndicates from using stolen identities to access government aid, whether unemployment benefits, small business loans or disaster aid given out by FEMA.

One idea that's already being implemented is improving the Labor Department inspector general's access to states' unemployment compensation data, so that federal watchdogs can analyze claims for fraud in real time instead of individually subpoenaing states for the data.

The administration is also planning to spend $2 billion to modernize states' unemployment insurance programs and strengthen them against fraud. The Labor Department is still figuring out how to allocate the funds, which were appropriated under the $1.9 trillion coronavirus stimulus bill enacted in March. One approach under consideration involves having the federal government develop centralized technology to help the 53 states and territories manage their jobless aid programs, instead of having them all fend for themselves and scramble to implement changes during crises.

Recent increases in funding to bolster fraud detection have also been a boon for ID.me, a company that has been hired by 27 states since mid-2020 and recently won a $1 billion federal contract to provide its services to more states. ID.me verifies that claimants are who they say they are by having them take selfies or asking them to appear on video and checking to make sure their faces match the photos on identity documents used to apply for benefits.

ID.me's chief executive, Blake Hall, made headlines last month when he told Axios that he thinks taxpayers' losses from UI fraud will top $400 billion. Hall defends that estimate, which some commentators criticized as wildly inflated. Hall based the figure on the precipitous drop-offs in new claim applications that states have experienced after implementing ID.me verification. In New York, for instance, state data confirms that new claims for PUA fell by 89% after ID.me went live in late March. And more than 50% of people who have already filed for UI benefits don't even try to confirm their identities when asked to do so, according to Hall, who cited data from five states the company has worked with.

Fraudsters are trying to adapt. Telegram forums have lit up with offers of sauces and software that sellers claim can bypass ID.me. Hall said his firm monitors such ads and maintained that he has yet to find any that work. “There is no bypass," he asserted.

That may be true today. But, as one recent post on a dark web marketplace noted, “The fraud business is an ever-changing type of business, meaning methods are constantly being updated because of new security implementations on the market."

King of debt: Trump promised to slash the deficit — instead it skyrocketed

ProPublica is a Pulitzer Prize-winning investigative newsroom. Sign up for The Big Story newsletter to receive stories like this one in your inbox.

One of President Donald Trump's lesser known but profoundly damaging legacies will be the explosive rise in the national debt that occurred on his watch. The financial burden that he's inflicted on our government will wreak havoc for decades, saddling our kids and grandkids with debt.

The national debt has risen by almost $7.8 trillion during Trump's time in office. That's nearly twice as much as what Americans owe on student loans, car loans, credit cards and every other type of debt other than mortgages, combined, according to data from the Federal Reserve Bank of New York. It amounts to about $23,500 in new federal debt for every person in the country.

The growth in the annual deficit under Trump ranks as the third-biggest increase, relative to the size of the economy, of any U.S. presidential administration, according to a calculation by a leading Washington budget maven, Eugene Steuerle, co-founder of the Urban-Brookings Tax Policy Center. And unlike George W. Bush and Abraham Lincoln, who oversaw the larger relative increases in deficits, Trump did not launch two foreign conflicts or have to pay for a civil war.

Economists agree that we needed massive deficit spending during the COVID-19 crisis to ward off an economic cataclysm, but federal finances under Trump had become dire even before the pandemic. That happened even though the economy was booming and unemployment was at historically low levels. By the Trump administration's own description, the pre-pandemic national debt level was already a “crisis" and a “grave threat."

The combination of Trump's 2017 tax cut and the lack of any serious spending restraint helped both the deficit and the debt soar. So when the once-in-a-lifetime viral disaster slammed our country and we threw more than $3 trillion into COVID-19-related stimulus, there was no longer any margin for error.

Our national debt has reached immense levels relative to our economy, nearly as high as it was at the end of World War II. But unlike 75 years ago, the massive financial overhang from Medicare and Social Security will make it dramatically more difficult to dig ourselves out of the debt ditch.

Falling deeper into the red is the opposite of what Trump, the self-styled “King of Debt," said would happen if he became president. In a March 31, 2016, interview with Bob Woodward and Robert Costa of The Washington Post, Trump said he could pay down the national debt, then about $19 trillion, “over a period of eight years" by renegotiating trade deals and spurring economic growth.

After he took office, Trump predicted that economic growth created by the 2017 tax cut, combined with the proceeds from the tariffs he imposed on a wide range of goods from numerous countries, would help eliminate the budget deficit and let the U.S. begin to pay down its debt. On July 27, 2018, he told Sean Hannityof Fox News: “We have $21 trillion in debt. When this [the 2017 tax cut] really kicks in, we'll start paying off that debt like it's water."

Nine days later, he tweeted, “Because of Tariffs we will be able to start paying down large amounts of the $21 trillion in debt that has been accumulated, much by the Obama Administration."

That's not how it played out. When Trump took office in January 2017, the nonpartisan Congressional Budget Office was projecting that federal budget deficits would be 2% to 3% of our gross domestic product during Trump's term. Instead, the deficit reached nearly 4% of gross domestic product in 2018 and 4.6% in 2019.

There were multiple culprits. Trump's tax cuts, especially the sharp reduction in the corporate tax rate to 21% from 35%, took a big bite out of federal revenue. The CBO estimated in 2018 that the tax cut would increase deficits by about $1.9 trillion over 11 years.

Meanwhile, Trump's claim that increased revenue from the tariffs would help eliminate (or at least reduce) our national debt hasn't panned out. In 2018, Trump's administration began hiking tariffs on aluminum, steel and many other products, launching what became a global trade war with China, the European Union and other countries.

The tariffs did bring in additional revenue. In fiscal 2019, they netted about $71 billion, up about $36 billion from President Barack Obama's last year in office. But although $36 billion is a lot of money, it's less than 1/750th of the national debt. That $36 billion could have covered a bit more than three weeks of interest on the national debt — that is, had Trump not unilaterally decided to send a chunk of the tariff revenue to farmers affected by his trade wars. Businesses that struggled as a result of the tariffs also paid fewer taxes, offsetting some of the increased tariff revenue.

By early 2019, the national debt had climbed to $22 trillion. Trump's budget proposal for 2020 called it a “grave threat to our economic and societal prosperity" and asserted that the U.S. was experiencing a “national debt crisis." However, that same budget proposal included substantial growth in the national debt.

By the end of 2019, the debt had risen to $23.2 trillion and more federal officials were sounding the alarm. “Not since World War II has the country seen deficits during times of low unemployment that are as large as those that we project — nor, in the past century, has it experienced large deficits for as long as we project," Phillip Swagel, director of the CBO, said in January 2020.

Weeks later, COVID-19 erupted and made the financial situation far worse. As of Dec. 31, 2020, the national debt had jumped to $27.75 trillion, up 39% from $19.95 trillion when Trump was sworn in. The government ended its 2020 fiscal year with the portion of the national debt owed to investors, the metric favored by the CBO, at around 100% of GDP. The CBO had predicted less than a year earlier that it would take until 2030 to reach that approximate level of debt. Including the trillions owed to various governmental trust funds, the total debt is now about 130% of GDP.

Normally, this is where we'd give you Trump's version of events. But we couldn't get anyone to give us Trump's side. Judd Deere, a White House spokesman, referred us to the Office of Management and Budget, which is a branch of the White House.

OMB didn't respond to our requests. The Treasury directed us to comments made by OMB director Russell Vought in October, in which he predicted that as the pandemic eases and economic growth rebounds, the “fiscal picture" will improve. The OMB blamed legislators for deficits when Trump submitted his proposed 2021 budget: “Unfortunately, the Congress continues to reject any efforts to restrain spending. Instead, they have greatly contributed to the continued ballooning of Federal debt and deficits, putting the Nation's fiscal future at risk."

Still, the deficit growth under Trump has been historic. Steuerle, of the Tax Policy Center, has done a comparison of every American president using a metric called the “primary deficit." It's defined as the deficit minus interest costs, because interest is the only budget expense that presidents and Congress can't control unless they want to do the unthinkable and default on the debt. Steuerle examined the records of 45 presidents to see how the primary deficit had shrunk or grown relative to the size of the economy between the first and final years of each president's administration.

Trump had the third-biggest primary deficit growth, 5.2% of GDP, behind only George W. Bush (11.7%) and Abraham Lincoln (9.4%). Bush, of course, not only passed a big tax cut, as Trump has, but also launched two wars, which greatly inflated the defense budget. Lincoln had to pay for the Civil War. By contrast, Trump's wars have been almost entirely of the political variety.

Our national debt is now at its highest level relative to our economy since the end of World War II. After the war ended, the extraordinary military expenses disappeared, a postwar recovery began and the debt began to fall rapidly relative to the size of the economy.

But that's not going to happen this time. When World War II ended 75 years ago, Social Security was in its infancy and Medicare didn't exist. Today, many of our biggest and most rapidly growing expenses, especially Social Security and Medicare, are baked into the budget because of our nation's aging population. These outlays are slated to rise sharply. Steuerle recently calculated that Social Security, health care and interest costs are projected to absorb 122% of the total growth in federal revenues from 2019 to 2030.

What's more, our investment in the future — things like research and development, education, infrastructure, workforce training and such — is declining as a proportion of the budget. OMB data shows that in 1970, mandatory spending (such as Social Security and Medicare, but not including interest on the debt) and investment each made up around 30% of total federal spending. But as of 2019, the most recent available year, mandatory spending had doubled to around 61% of total federal spending while investment fell by more than half, to around 12.5%.

Spending more and more on past promises and shrinking the proportion of spending for the future doesn't bode well for our kids and grandkids. Had Trump done what he said he'd do and paid off part of the national debt before COVID-19 struck rather than adding significantly to the debt, the situation would be considerably less dire. And had Trump done a better job of coping with COVID-19, the economic and human costs would've been greatly reduced.

In addition to forcing us to reduce the proportion of the budget spent on the future to help pay for the past, there's a second reason that huge and growing budget deficits matter: interest costs.

Bigger debt ultimately means bigger interest costs, even in an era when the Federal Reserve has forced down Treasury rates to ultralow levels. The government's interest cost (including interest paid to government trust funds) was around $523 billion in the 2020 fiscal year. That outstrips all spending on education, employment training, research and social services, Treasury data shows.

Interest costs are way below where they'd be if the Fed hadn't forced rates down to try to stimulate the economy and mitigate the impact of the pandemic. One-year Treasury securities cost taxpayers a minuscule 0.10% in interest at year-end, down from 1.59% at the end of 2019. The 10-year Treasury rate was 0.93%, down from 1.92%.

In late December, the Fed reported boosting its Treasury holdings by more than $2 trillion from a year earlier. The increase is primarily in longer-term securities. That has kept the federal government from having to raise trillions of dollars in the capital markets, and therefore has kept longer-term interest rates way below where they would otherwise be.

But unless something changes, even the Fed's promise to keep interest rates near current levels for several years won't fend off future problems. Most of the government's borrowing to fund pandemic relief has been shorter-term borrowing that will have to be refinanced in the coming years. If rates rise, so will the government's interest expense.

Even with rates where they are, interest on the debt is already going to be the fastest-growing budget category this decade, according to the Peter G. Peterson Foundation, which tracks the issue. Annual net interest costs are projected to double in 10 years and grow so large beyond 2030 that interest will become a driving factor in annual deficit growth, according to Peterson estimates.

Listen to what CBO Director Swagel had to say on the subject in a report to congressional Republicans in December: “Although the current low interest rates indicate that the debt is manageable for now and that the United States is not facing an immediate fiscal crisis, in which interest rates abruptly escalated or other disruptions occurred, the risk and potential budgetary consequences of such a crisis become greater over time."

Trump was asked about this risk during a virtual discussion with the Economic Club of New York last October. “If we have another stimulus bill out of Congress, are you worried that the entire amount of federal debt will be too large for us to pay off in a sensible way?" asked David Rubenstein, a private equity executive.

Trump answered by falsely claiming that the U.S. was starting to pay off the national debt before the pandemic, and he claimed that future economic growth would let it do so. “I think you're going to see tremendous growth, David, and the growth is going to get it done," Trump said.

Two months later, when Congress finally approved $900 billion of economic stimulus that is being financed with debt, Trump challenged Congress to spend — and borrow — even more. Then he went golfing.

Here’s How Trump Transferred Wealth to His Son While Avoiding the Usual Taxes

This story was co-published with The Real Deal.

In April 2016, as Donald Trump was on the cusp of clinching the Republican nomination for the White House, he sold two luxury condos near Manhattan's Central Park for less than half the price his company had said they were worth. The lucky buyer: Trump's son, Eric.

Such family-friendly deals would normally incur hundreds of thousands of dollars in gift taxes.

But in this case, Trump appears unlikely to have been on the hook for anywhere near that, thanks to benefits only available to real estate developers.

Eric Trump bought the two condos on the two top floors of the Trump Parc East building at 100 Central Park South for $350,000 each. Trump Organization filings show that, as of February 2016 2014 two months before Trump sold the apartments to Eric 2014 the condos were priced at $790,000 and $800,000. A similar one-bedroom condo on a lower floor at the same building sold for $690,000 in 2014.

The transactions illustrate the unique advantages that real estate developers like Trump have when passing down valuable assets between generations.

"Not everyone has the opportunity to avoid gift taxes, just developers with developer units," said Beth Shapiro Kaufman, an estate planning attorney and president at Caplin & Drysdale in Washington, D.C. "The biggest game in gift taxes is valuation issues."

An owner who sells real estate for less than it's worth would typically have to pay gift tax on the difference between the sales price and the true market value. Any personal gifts that are worth more than $14,000 in a year are subject to up to 40 percent in federal taxes.

But as the building's developer selling the units for the first time, Trump had lots of flexibility within the law to determine the value of the apartments.

"This is really, really primo real estate," said Bob Lord, a tax attorney who reviewed the transaction records at ProPublica's request. "Why would you show a sale at $350,000 other than to play games for tax purposes?"

The units were originally rent regulated, which would typically lower the value of the apartments significantly.

New York City records state that the condos are no longer rent regulated. It's not clear when they were deregulated, but the result is that Eric Trump will likely be able to sell the apartments at significantly higher prices. It's also unclear if anyone currently lives in the condos. The younger Trump bought another, much larger, apartment in the building for $2 million in 2007.

It's ultimately unclear how much, if any, taxes Trump paid on the transactions. The Trump Organization, the White House and Eric Trump did not respond to requests for comment.

But other taxes paid on the transaction suggest gift taxes were not paid. Trump paid a total of $13,000 in city and state transfer taxes, New York City property records show. Those transfer taxes, according to a spokeswoman for the city's Department of Finance, are not usually paid when "bona fide gifts" are involved.

Also, when a sale is reported as a gift, buyers and sellers typically disclose in transfer records that the sale is taking place between two relatives. The Trumps did not.

Trump has said that he, like many Americans, wants to keep his taxes at a minimum. "I fight like hell and pay as little as possible," he told CBS' "Face the Nation" in August 2015. Trump has proposed repealing the estate tax entirely.

The condo sales were disclosed in President Trump's 2017 federal financial disclosure, which was released by the U.S. Office of Government Ethics last month. The buyers were listed as two limited liability companies. After we asked readers to help us analyze the documents, a reader flagged the deals and noted that the LLCs listed as the buyers were managed by Eric Trump.

Trump bought the Central Park South building in 1981 and later converted it into condos. The building's 80 units were initially filled mostly with wealthy rent-regulated tenants who had the right to keep renewing their leases at below-market rates as long as they chose to remain in the building. That interfered with Trump's plan to tear down the building and replace it with a condo project.

Under New York laws, developers who convert apartment buildings into condos must disclose to the New York state attorney general how much they're looking to sell units for to existing tenants as well as to the public.

Trump's 1997 disclosure to the attorney general, known as an offering plan, shows that units 13G and 14G were both rent regulated and originally listed for sale at $245,000 and $250,000, respectively. Over time, as market prices moved higher, Trump filed frequent amendments raising the listed prices, a standard practice for developers. ProPublica and The Real Deal obtained the offering plan and amendments through a public-records request.

Trump reported nearly $3.2 million in revenue in 2016 and the first half of 2017 from condo sales using the company, Trump CPS LLC. He resigned as president of that company on Jan. 19, the day before his inauguration.

As with the president's other assets, Trump CPS LLC is held by the Donald J. Trump Revocable Trust and is managed by one of Trump's lawyers and the president's sons. Trump put his businesses under the trust in response to criticism about conflicts. As we have reported, President Trump can take funds from the trust any time.

ProPublica is a Pulitzer Prize-winning investigative newsroom. Sign up for their newsletter.

Keep reading...Show less

How Wall Street Tobacco Deals Left States With Billions in Toxic Debt

In November 1998, attorneys general from across the country sealed a historic deal with the tobacco industry to pay for the health care costs of smoking. Going forward, nearly every cigarette sold would provide money to the states, territories and other governments involved — more than $200 billion in just the first 25 years of a legal settlement that required payments to be made in perpetuity.

Keep reading...Show less
BRAND NEW STORIES
@2025 - AlterNet Media Inc. All Rights Reserved. - "Poynter" fonts provided by fontsempire.com.