NewzIntel.com

    • Checkout Page
    • Contact Us
    • Default Redirect Page
    • Frontpage
    • Home-2
    • Home-3
    • Lost Password
    • Member Login
    • Member LogOut
    • Member TOS Page
    • My Account
    • NewzIntel Alert Control-Panel
    • NewzIntel Latest Reports
    • Post Views Counter
    • Privacy Policy
    • Public Individual Page
    • Register
    • Subscription Plan
    • Thank You Page

Category: Department of Justice

  • MIL-OSI Security: Healthcare Providers and Laboratory Marketers Agree to Pay Over $1.9M to Settle Kickback Allegations

    Source: Office of United States Attorneys

    COLUMBIA, S.C. — Gerald Congdon, M.D., of Pawleys Island, South Carolina, Gbenga Aluko, M.D., of Charlotte, North Carolina, and Anup Banerjee, M.D., of Gastonia, North Carolina, and their medical practices, as well as Curis Healthcare Inc., of Chicago, Illinois, Omar Hussain, of South Miami, Florida, and Saeed Medical Group Ltd. d/b/a Alliance Immediate and Primary Care, of Chicago, Illinois, agreed to pay a total of $1,913,808 to resolve alleged False Claims Act violations arising from their involvement in laboratory kickback schemes. The parties have agreed to cooperate with the Department of Justice’s investigations of other participants in the alleged schemes.

    The Anti-Kickback Statute prohibits offering, paying, soliciting, or receiving remuneration to induce referrals of items or services covered by Medicare, TRICARE, and other federally funded healthcare programs. The Anti-Kickback Statute is intended to ensure that medical providers’ judgments are not compromised by improper financial incentives and are instead based on the best interests of their patients.

    The settlements announced today resolve allegations that healthcare providers received kickbacks in return for their referrals to a laboratory in Anderson, South Carolina, and that a marketer and his marketing company received kickbacks from that South Carolina laboratory to arrange for laboratory testing referrals, in violation of the Anti-Kickback Statute. The kickbacks allegedly resulted in the submission of false or fraudulent laboratory testing claims to Medicare and TRICARE in violation of the False Claims Act.

    • Dr. Gerald Congdon, Coastal Urgent Care, LLC, and Coastal Wellness Center, LLC. Dr. Congdon and his medical practices in Pawleys Island and Myrtle Beach, South Carolina agreed to pay $400,000 to resolve allegations that from May 2016 to November 2021, they received thousands of dollars in remuneration disguised as purported office space rental and phlebotomy payments from the South Carolina laboratory in return for ordering testing.
    • Dr. Gbenga Aluko and Eagle Medical Center, PC. Dr. Aluko and his medical practice in Charlotte, North Carolina agreed to pay $250,000 to resolve allegations that from May 2016 to November 2021, they received thousands of dollars in remuneration disguised as purported office space rental, phlebotomy, and toxicology payments from the South Carolina laboratory in return for ordering testing.
    • Dr. Anup Banerjee and Gastonia Medical Specialty Clinic P.A. Dr. Banerjee and his medical practice in Gastonia, North Carolina agreed to pay $206,000 to resolve allegations that from April 2017 to November 2021, they received thousands of dollars in remuneration disguised as purported office space rental and phlebotomy payments from the South Carolina laboratory in return for ordering testing.
    • Omar Hussain and Curis Healthcare Inc. Hussain and his marketing company agreed to pay $817,808 to resolve allegations that from April 2020 to August 2021, Hussain and his company received commissions from the South Carolina laboratory as independent contractors based on the volume and/or value of the Medicare and TRICARE referrals for laboratory testing that they arranged for and/or recommended.
    • Saeed Medical Group Ltd., Omar Hussain, and Curis Healthcare Inc. Saeed Medical Group and Hussain and his marketing company agreed to pay $240,000 to resolve allegations that from April 2020 to August 2021, Saeed Medical Group received thousands of dollars in remuneration in the form of cash payments from Hussain and his company in return for ordering testing from the South Carolina laboratory.

    “Integrity must be the standard in our health care system,” said Acting U.S. Attorney Brook B. Andrews for the District of South Carolina. “Kickback schemes divert funds and focus away from patients and their medical needs.”

    “The public puts immense trust in medical professionals, and disdain for the rule of law damages that trust and erodes their credibility,” said Steve Jensen, Special Agent in Charge of the FBI Columbia field office. “These settlements should serve as a reminder that the FBI and its partners are committed to holding medical practitioners accountable for kickbacks.”

    “Kickback schemes undermine medical decision-making and jeopardize the integrity of federally funded health care programs,” said Kelly Blackmon, Special Agent in Charge at the U.S. Department of Health and Human Services Office of Inspector General (HHS-OIG). “Our commitment is to safeguard taxpayer-funded health care and the patients who rely on it, and we will rigorously pursue any allegations of False Claims Act violations.”

    “The trust of the American taxpayer and the wellbeing of our Service members are undermined when laboratories and physicians engage in collusive financial relationships,” said Special Agent in Charge Christopher Dillard, Department of Defense Office of Inspector General, Defense Criminal Investigative Service (DCIS), Mid-Atlantic Field Office. “DCIS will continue to work with our law enforcement partners to bring to justice medical providers who illegally enrich themselves by prioritizing kickbacks over patient care.”

    The settlements were the result of a coordinated effort between the Civil Division’s Commercial Litigation Branch, Fraud Section and the U.S. Attorney’s Office for the District of South Carolina, with assistance from HHS-OIG, DCIS, and the FBI. The settlements announced today were handled by Senior Trial Counsel Christopher Terranova in the Civil Division’s Commercial Litigation Branch, Fraud Section and Assistant U.S. Attorney Beth C. Warren in the U.S. Attorney’s Office for the District of South Carolina. The United States previously resolved allegations that physicians in South Carolina, North Carolina, and Texas received kickbacks from the same South Carolina laboratory.

    The government’s pursuit of this matter illustrates the government’s emphasis on combating healthcare fraud. One of the most powerful tools in this effort is the False Claims Act. Tips and complaints from all sources about potential fraud, waste, abuse, and mismanagement can be reported to the Department of Health and Human Services, at 1-800-HHS-TIPS (800-447-8477).

    The claims resolved by the settlements are allegations only, and there has been no determination of liability.

    ###

    MIL Security OSI –

    March 7, 2025
  • MIL-OSI United Kingdom: CMA clears GBT / CWT corporate travel merger

    Source: United Kingdom – Executive Government & Departments

    Press release

    CMA clears GBT / CWT corporate travel merger

    Independent CMA inquiry group has cleared the merger of corporate travel companies Global Business Travel Group, Inc and CWT Holdings LLC.

    iStock

    An independent inquiry group leading the in-depth Phase 2 merger investigation into the merger of corporate travel management companies Global Business Travel Group, Inc (GBT) and CWT Holdings LLC (CWT) has decided it should be allowed to proceed.

    Both companies supply travel agency services to global businesses with high travel spend and employees who travel internationally. 

    The group has concluded that CWT is a significantly weaker competitor than in the past and is likely to continue to weaken in the future and that there are other suppliers who will offer customers an alternative to the merged business.

    The group is therefore satisfied that the merger is not expected to result in a substantial lessening of competition in the global market for the supply of business travel agency services and has cleared the deal.

    Martin Coleman, chair of the independent panel of experts conducting this investigation, said:

    Having reviewed all the evidence thoroughly over the course of our investigation we have concluded, given the weaker position CWT plays in the corporate travel market and the alternatives available, that this deal should be allowed to proceed.

    For more information, visit the Global Business Travel Group, Inc / CWT Holdings, LLC merger inquiry case page.

    Notes to editors

    1. On 10 January 2025 the United States Department of Justice filed a civil antitrust lawsuit seeking to block the merger. The case is currently before the US courts.
    2. New Phase 1 cases opened by the CMA after 25 April 2024 which are referred for an in-depth Phase 2 investigation are run under the new Phase 2 process. This is the first in-depth merger investigation that the CMA has conducted under its revised Phase 2 process.
    3. All media enquiries should be directed to the CMA press office by email on press@cma.gov.uk, or by phone on 020 3738 6460.

    Share this page

    The following links open in a new tab

    • Share on Facebook (opens in new tab)
    • Share on Twitter (opens in new tab)

    Updates to this page

    Published 6 March 2025

    MIL OSI United Kingdom –

    March 7, 2025
  • MIL-OSI USA: WATCH: Padilla Denounces Trump Administration’s Disregard for the Rule of Law

    US Senate News:

    Source: United States Senator Alex Padilla (D-Calif.)

    WATCH: Padilla: “A President feeling unconstrained by the courts, by the Constitution, and the rule of law is no President at all. It’s a power-hungry, wannabe king.”

    WASHINGTON, D.C. — Today, U.S. Senator Alex Padilla (D-Calif.), a member of the Senate Judiciary Committee, delivered remarks on the Senate floor denouncing President Trump and his Administration for their blatant disregard for the rule of law and sounded the alarm on their threats to our justice system.

    As the courts block many of President Trump’s blatantly illegal Executive Orders, Padilla condemned Vice President J.D. Vance and Elon Musk’s recent statements trying to intimidate judges and undermine the rule of law.

    Padilla also slammed Trump’s Department of Justice (DOJ) nominees who have repeatedly refused to commit to upholding their oaths to defend the Constitution. Last week, Padilla warned against these dangerous DOJ nominees, many of whom have represented Trump in a personal capacity.

    Key Excerpts:

    • I too rise today to defend the principles at the core of our democratic republic. That we are a government of laws and institutions, not of individuals. That no billionaire has more rights than any worker. And that no President has more rights than any citizen of our country. That we are a government of three coequal branches, providing checks and balances on each other. And bottom line: that no one is above the law.
    • Yet as we stand here today, the Trump Administration is clearly, openly laying the groundwork to reject all of these principles. They’re operating under their idea that the President, his cabinet of loyalists, and an unelected billionaire “advisor” can simply ignore the law or courts in rulings that they disagree with.
    • The Judiciary does not work for Donald Trump. It is a separate, coequal branch of government. The courts, colleagues, work for the American people.
    • For Americans watching from home, here’s how I can boil it down. Let’s ask ourselves, do you believe that the President can simply ignore the law? Do you believe that the President should be all-powerful? Do you believe that if you have to follow the law, then the President of our country should have to follow it as well?
    • For years, we’ve known that if a President did try to push the boundaries of what’s legal and what’s not — we could count on an independent Department of Justice to enforce court rulings. But over the past few weeks, what we’ve seen in Judiciary Committee is nominee after nominee appear before us and refuse to simply commit to upholding the law.
    • A President feeling unconstrained by the courts, by the Constitution, and the rule of law is no President at all. It’s a power-hungry, wannabe king.
    • What we’re asking of our Republican colleagues today isn’t anything radical. It’s the fundamental principle that men and women dedicated to themselves nearly 250 years ago in the founding of our nation — that we shall be ruled of, by, and for the people — not of, by, and for a king or dictator.

    Video of Senator Padilla’s remarks is available here.

    Footage of his remarks can be downloaded here.

    Senator Padilla has fought to hold Trump’s DOJ nominees accountable and has warned against the Trump Administration’s attack on the rule of law. Padilla opposed advancing Attorney General Bondi’s nomination after she refused to affirm birthright citizenship, which is constitutionally guaranteed, and declined to disavow the false claim that the 2020 election was stolen during her Senate Judiciary Committee confirmation hearing. He also sounded the alarm on Kash Patel’s reckless nomination to be Director of the Federal Bureau of Investigation (FBI), delivering remarks ahead of Patel’s confirmation at a press conference outside FBI headquarters in Washington, D.C. and in a speech on the Senate floor. Padilla also recently questioned three of President Trump’s DOJ nominees, raising concerns over Republican DOJ nominees’ apparent willingness to disregard the rule of law and ignore court orders they disagree with. Additionally, Padilla joined Senate Judiciary Committee Democrats earlier this year in demanding answers from Bondi, Patel, and other Trump Administration nominees and officials on the removal or reassignment of career law enforcement officials across the DOJ and FBI.

    MIL OSI USA News –

    March 6, 2025
  • MIL-Evening Report: How Trump is weaponising the Department of Justice, and the ‘dark’ tactic he’s using to get away with it

    Source: The Conversation (Au and NZ) – By Stephen Harrington, Associate Professor, School of Communication, Queensland University of Technology

    It’s hard to keep track of US President Donald Trump’s many notable acts since returning to the White House. His recent pro-Russia stance on the war in Ukraine has, rightly, received a lot of attention.

    But for every big moment, there are others that fly under the radar. One such issue is the politicisation of the Department of Justice (DoJ).

    Although there is longstanding precedent that the DoJ remains politically neutral in its operations, recent events have indicated a dramatic break from that tradition.

    And, importantly, Trump has been laying the groundwork to justify this for nearly two years, using a propaganda tactic that’s been employed by authoritarian governments throughout history.

    Strategic sidelining

    The current administration has attempted to fire or sideline anyone at the DoJ who was involved with prior investigations and prosecutions of the now-president.

    This includes special counsel Jack Smith’s investigations into several aspects of Trump’s wrongdoing, which have since ended. Several lawyers have been fired, ostensibly because “the Acting Attorney-General does not trust these officials to assist in faithfully implementing the President’s agenda”.

    This action is not only vindictive, but likely designed to intimidate would-be investigators and make them think twice before further examining any wrongdoing by Trump or his associates.

    Equally noteworthy has been the department’s attempts to drop corruption charges against New York mayor Eric Adams.
    The official reason is that pursuing the charges might “interfere” with Adams’ reelection campaign.

    In reality, however, Adams has been accused of cutting a deal with the administration: he agrees to assist with Trump’s immigration crackdown in return for having the charges against him withdrawn (although not dropped entirely).

    Adams denies the existence of a quid pro quo, but he did joke about it on national television with Tom Homan, Trump’s “Border Czar”.

    So deeply problematic was all this that two US attorneys for the Southern District of New York opted to resign in protest, rather than be party to what they saw as a nakedly corrupt act.

    The whole scenario is eerily reminiscent of 1973’s “Saturday Night Massacre”, when President Richard Nixon ordered his Attorney-General Elliot Richardson to fire the special prosecutor investigating the Watergate scandal.

    Nixon eventually had his way, but not before refusals and resignations from both Richardson, and the Deputy Attorney-General William Ruckleshaus.

    But, where Nixon’s move dramatically hastened his own downfall, Trump’s actions have barely raised an eyebrow. Why?

    The propaganda play

    The answer lies in a propaganda technique known as “accusation in a mirror”, which entails accusing one’s opponents of the very wrongdoing one plans to commit.

    As one legal scholar explains, it’s:

    a rhetorical practice in which one falsely accuses one’s enemies of conducting, plotting, or desiring to commit precisely the same transgressions that one plans to commit against them.

    Accusation in a mirror has been used in the past, including in the Rwandan genocide. There, trusted voices claimed the Tutsi wanted to “exterminate” the Hutu. Tragically, it helped bring about the exact opposite circumstance.

    Similarly, in February 2022 Russian President Vladimir Putin accused the Ukrainian government of committing genocide against Russian-speaking populations in the Donbas region. This baseless accusation provided a justification for invading Ukraine, which mirrored Russia’s own indiscriminate shelling of Ukrainian civilians.

    We suggest Trump has been using this technique since he was first criminally indicted, in early 2023, on 34 felony charges related to the falsification of business records. He and his supporters have insisted the department, under President Joe Biden, was “weaponised” against him.

    Trump repeatedly claimed those charges – and subsequent indictments – were a politically motivated “witch hunt”. He reiterated these claims in his first speech to Congress.

    Many elected Republicans have also supported and amplified that narrative.

    These claims of victimhood have helped prime Trump’s base to appraise any subsequent legal scrutiny of him as purely partisan, and therefore invalid.

    In reality, the facts were straightforward. Prosecutors were sure there was enough proof to proceed with the case, including evidence Trump illegally kept classified documents at his Mar-a-Lago residence, and obstructed attempts to retrieve them.

    In a functioning legal system, nobody is “above the law”. This means even former presidents can be prosecuted if there’s enough evidence.

    Yet Trump’s accusations of a partisan DoJ completely reframed legitimate investigations into alleged political vendettas. In doing so, it effectively justified his subsequent decisions.

    A self-fulfilling prophecy

    The idea that “if they did it to me, I’m entitled to do it back” was made explicit by Trump in late 2023.

    When asked if he would use the DoJ to go after his political rivals, Trump argued he would only be levelling the playing field, stating:

    they’ve already done it, but if they want to follow through on this, yeah, it could certainly happen in reverse.

    In short, Trump’s false claim of being victimised by a politicised DoJ served as moral cover for his own politicisation of it.

    This is a textbook example of how accusation in a mirror can help manufacture the reality it pretends to condemn.

    Addressing the problem

    This tactic has long been a play by totalitarian and authoritarian leaders.

    Foundational propaganda scholars such as Hannah Arendt and Jacques Ellul highlighted how authoritarian rulers often repeat falsehoods – flipping the aggressor and victim – until the masses become desensitised, alienated and confused.

    Once enough people believe the system is already corrupt and untrustworthy, they are less likely to be shocked by an actual purge (such as firing DoJ officials).

    The implications of such tactics extend internationally, not just to the US.

    History cries out to us about the risks of this sort of public discourse. It erodes trust in institutions and liberal democratic processes, paving the road for leaders to undermine them further, corrupting the system in the name of rooting out corruption.

    Ultimately, one of the best antidotes is awareness. By exposing these tactics, we can better safeguard against disinformation, protect the rule of law and hold leaders accountable.

    Stephen Harrington receives funding from the Australian Research Council, for the Discovery Project ‘Understanding and Combatting “Dark Political Communication”‘.

    Timothy Graham receives funding from the Australian Research Council (ARC) for his Discovery Early Career Researcher Award, ‘Combatting Coordinated Inauthentic Behaviour on Social Media’. He also receives ARC funding for the Discovery Project, ‘Understanding and Combatting “Dark Political Communication”‘.

    – ref. How Trump is weaponising the Department of Justice, and the ‘dark’ tactic he’s using to get away with it – https://theconversation.com/how-trump-is-weaponising-the-department-of-justice-and-the-dark-tactic-hes-using-to-get-away-with-it-250760

    MIL OSI Analysis – EveningReport.nz –

    March 6, 2025
  • MIL-OSI USA: Peters Reintroduces Bipartisan Legislation to Help Prevent Foreign Influence in U.S. Policy

    US Senate News:

    Source: United States Senator for Michigan Gary Peters

    Published: 03.06.2025

    WASHINGTON, DC – U.S. Senator Gary Peters (MI), Ranking Member of the Homeland Security and Governmental Affairs Committee, reintroduced two bipartisan bills to improve our nation’s ability to prevent foreign governments, including adversaries like the Chinese and Russian governments, from attempting to influence U.S. policy without making appropriate disclosures. The legislation would help close loopholes that foreign governments could exploit to conceal their roles in lobbying efforts.

    “The American people deserve complete transparency about who is trying to influence our political process,” said Senator Peters. “These bipartisan bills will help ensure foreign actors can’t exploit loopholes to hide their activities while attempting to shape policy in the United States. It’s a commonsense step to protect our national security and ensure our government is working in the best interests of the American people.” 

    The Lobbying Disclosure Improvement Act would improve transparency of the activities of lobbyists who represent foreign persons or organizations by requiring them to indicate whether they are taking advantage of an exemption under the Foreign Agent Registration Act (FARA) when they register under the Lobbying Disclosure Act. This would help the Department of Justice narrow the pool of registrants they are examining for potential violations, while not imposing any meaningful additional burden on registrants.

    The Disclosing Foreign Influence in Lobbying Act closes a loophole in the Lobbying Disclosure Act that foreign adversaries – including the Chinese government – can exploit to conceal their roles in lobbying efforts. Think tanks and law enforcement agencies have identified instances in which foreign adversaries exploited this loophole by using closely connected organizations and businesses to push their interests when lobbying the U.S. government. The bill makes clear that lobbying organizations must disclose when foreign governments and political parties participate in their lobbying efforts, regardless of any financial contribution to the lobbying effort.

    MIL OSI USA News –

    March 6, 2025
  • MIL-OSI USA: Governor Stein Announces Superior and District Court Appointments

    Source: US State of North Carolina

    Headline: Governor Stein Announces Superior and District Court Appointments

    Governor Stein Announces Superior and District Court Appointments
    lsaito
    Wed, 03/05/2025 – 17:32

    Raleigh, NC

    Today, Governor Josh Stein announced the following judicial appointments:

    Judge Stephen C. Stokes to the Superior Court for Judicial District 14A, serving part of Cumberland County. Stokes is filling the vacancy created after Judge Claire Hill retired.

    • Stokes most recently served as a District Court Judge in Cumberland County. He also served in the U.S. Army Judge Advocate General’s Corps as a Prosecutor, a Special Assistant United States Attorney, a Defense Attorney in the 82nd Airborne Division, and as an International Law Attorney for the U.S. Army Special Operations, Civil Affairs, and Psychological Operations Commands. Stokes graduated from the U.S. Army Ranger School and Advanced Airborne School, earning his Ranger Tab and Senior Jump Wings. Stokes received his B.S. from Florida State University, dual master’s degrees from Webster University, and his J.D. from Florida State University College of Law, where he was a Virgil Hawkins Fellow.

    Scott Skidmore to the District Court for Judicial District 22, serving Rockingham and Caswell Counties. Skidmore is filling the vacancy created after Judge Chris Freeman was elected to the North Carolina Court of Appeals.

    • Skidmore spent the last three decades as a partner at Farver, Skidmore & Hux, LLP, focusing on criminal defense and real estate. Skidmore received his B.S. from the University of North Carolina at Charlotte and his J.D. from the Cumberland School of Law at Samford University.

    Chris Brooks to the District Court for Judicial District 10F, serving part of Wake County. Brooks is filling the vacancy created after Judge Jennifer Bedford was elected to the Superior Court. 

    • Brooks has served in the Transportation Division of the North Carolina Department of Justice since 2006 and previously served in the Department’s Criminal Division. He received his B.S. from the University of North Carolina and his J.D. from the Norman Adrian Wiggins School of Law at Campbell University.

    “These public servants have a wealth of legal experience to draw on, and I am pleased to appoint them to serve as judges,” said Governor Josh Stein. “I am confident in their judgment and expertise, and I look forward to their service on the Superior and District Courts.” 

    Mar 5, 2025

    MIL OSI USA News –

    March 6, 2025
  • MIL-OSI Security: Security News: Alleged International Leader of MS-13 Extradited on RICO Charge

    Source: United States Department of Justice 2

    Moises Humberto Rivera-Luna, also known as Santos and Viejo Santos, 55, an alleged international leader of the violent MS-13 drug gang, made an initial appearance today in the District of Columbia following his extradition from Guatemala to the United States to face racketeering conspiracy charges.

    “Keeping Americans safe from transnational criminal gangs is one of the Department’s top priorities,” said Supervisory Official Antoinette T. Bacon of the Justice Department’s Criminal Division. “This defendant’s appearance in federal court in Washington today demonstrates our relentless commitment to seeking justice for victims, no matter how long it takes. Thanks to the incredible work by our federal prosecutors and law enforcement partners, we are one step closer to bringing closure for the many victims of this defendant’s alleged brutal violence.”

    “The decade-long pursuit of this alleged violent gang member illustrates our office’s resolve to remain focused and bring to justice those who violate the law no matter where they are, no matter how long it takes,” said U.S. Attorney Edward R. Martin Jr. for the District of Columbia.

    “Moise Humberto Rivera-Luna will have his day in court, but he stands accused of very serious crimes,” said U.S. Immigration and Customs Enforcement Homeland Security Investigations (ICE HSI) Washington, D.C., Acting Special Agent in Charge Christopher Heck. “His alleged criminal activity, combined with his leadership of the MS-13 transnational criminal organization, makes Rivera-Luna a significant threat to the safety of the American people. We are grateful for the strong relationships we enjoy with our local, state, federal and international law enforcement partners. Without their cooperation, none of this would be possible. ICE HSI Washington, D.C., will continue to work relentlessly and exhaust all resources to investigate and apprehend anyone who presents a threat to national security or the residents of our communities.”

    Rivera-Luna is one of seven defendants in a nine-count fourth superseding indictment, which was returned on May 3, 2013, charging the defendants with committing racketeering conspiracy, murder in aid of racketeering, kidnapping in aid of racketeering, assault with a deadly weapon in aid of racketeering, and other offenses. Rivera-Luna is charged only with committing racketeering conspiracy. The government alleges that Rivera-Luna, while incarcerated in El Salvador, supervised operations of MS-13 cliques in the Washington area. Upon release, he traveled to Guatemala where he was subject to extradition.

    The indictment alleges that MS-13 engages in racketeering activity to include murder, narcotics distribution, extortion, robberies, obstruction of justice, and other crimes. The indictment specifically states that some of the defendants allegedly participated in assaults against perceived rival gang members, made threats against people they believed to be cooperating with law enforcement, and carried out extortions.

    The range of criminal activity alleged in the indictment includes acts committed in the District of Columbia, Maryland, Virginia, and other states. The indictment alleges there was frequent contact between MS-13 members in the Washington metropolitan area and El Salvador, and that members incarcerated in El Salvador encouraged or ordered assaults and murders.

    Rivera-Luna is alleged to be an international leader of MS-13 who was sending orders and advice to an MS-13 clique operating in the Washington area via cellular telephone calls from his prison cell in El Salvador. The indictment alleges that he and another alleged MS-13 leader, Marvin Geovanny Monterrosa-Larios, also incarcerated in El Salvador, directed a coalition of MS-13 cliques to be formed in the Washington area. They advised local clique members that the coalition’s aim was to seek and kill MS-13 members who were found to be cooperating with law enforcement officials.

    Among other allegations, the indictment charges Rivera-Luna with ordering the murder of Louis Alberto Membreno-Zelaya, 27. Membreno-Zelaya was found stabbed to death on Nov. 6, 2008, in Northwest Washington.

    The indictment also alleges that Rivera-Luna authorized the murder of Felipe Enriquez, 25, whose body was found on March 31, 2010, in Montgomery County, Maryland.

    ICE HSI Washington, D.C., and the Metropolitan Police Department are investigating the case. The Montgomery County and Prince George’s County, Maryland, Police Departments; State Attorney’s Office for Montgomery County; and U.S. Attorneys’ Offices for the District of Maryland and the Eastern District of Virginia provided assistance.

    The Justice Department’s Office of International Affairs provided significant assistance in securing the extradition of Rivera-Luna from Guatemala.

    Trial Attorney Lakeita F. Rox-Love of the Criminal Division’s Violent Crime and Racketeering Section and Assistant U.S. Attorney Nihar Mohanty for the District of Columbia are prosecuting the case.

    This effort was part of an Organized Crime Drug Enforcement Task Forces (OCDETF) operation. OCDETF identifies, disrupts, and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach. Additional information about the OCDETF Program can be found at www.justice.gov/OCDETF.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI –

    March 6, 2025
  • MIL-OSI Security: McAllen resident sentenced to 25 years for using communication app to entice minor

    Source: Office of United States Attorneys

    McALLEN, Texas – A 28-year-old man has been sent to prison for coercion and enticement of a minor, announced U.S. Attorney Nicholas J. Ganjei.

    James Christopher Ruiz pleaded guilty Sept. 10, 2024. 

    U.S. District Judge Drew B. Tipton has now ordered Ruiz to serve 300 months in prison. At the hearing, the court heard additional information including testimony from the victim’s mother detailing significant trauma the victim is dealing with and how this crime has negatively impacted not just the her, but everyone in her family. After handing down the sentence, the court addressed the victim and informed her there was nothing wrong with or bad about her and she did not bring this upon herself. The court explained that all the blame lies with the Ruiz who will also serve the rest of his life on supervised release following completion of his prison term. During that time, he will have to comply with numerous requirements designed to restrict his access to children and the internet. He will also be ordered to register as a sex offender. 

    In August 2023, law enforcement learned Ruiz had been communicating with a 12-year-old minor online. The investigation revealed he had been chatting with the victim from June to July 2022 via Discord.

    “People like the defendant can make the internet a dangerous place for children,” said Ganjei. “Fortunately, law enforcement was able to discover and arrest Mr. Ruiz, bringing an end to his predatory online behavior.”

    Ruiz knew the minor victim was only 12 years of age. During their conversations, Ruiz sent sexually explicit photos and videos to the minor and enticed the victim to send nude images of her breasts and genitals on multiple occasions. He also explained what masturbating was and persuaded her to send videos of her doing so. 

    Ruiz admitted to communicating with other minors via Discord and virtual reality. He said he would tell the minor females to send him sexually explicit images and videos of themselves and instructed them on what to do.

    Ruiz has been and will remain in custody pending transfer to a U.S. Bureau of Prisons facility to be determined in the near future.

    Homeland Security Investigations conducted the investigation with the assistance of the New Castle County Police Department. 

    Assistant U.S. Attorney M. Alexis Garcia prosecuted the case, which was brought as part of Project Safe Childhood (PSC), a nationwide initiative the Department of Justice (DOJ) launched in May 2006 to combat the growing epidemic of child sexual exploitation and abuse. U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section leads PSC, which marshals federal, state and local resources to locate, apprehend and prosecute individuals who sexually exploit children and identifies and rescues victims. For more information about PSC, please visit DOJ’s PSC page. For more information about internet safety education, please visit the resources tab on that page. 

    MIL Security OSI –

    March 6, 2025
  • MIL-OSI Security: Ohio Man Sentenced to 15 Years in Prison for Child Pornography Crime

    Source: Office of United States Attorneys

    CHARLESTON, W.Va. – Leonard Samiia, 32, of Wapakoneta, Ohio, was sentenced today to 15 years in prison, to be followed by 15 years of supervised release, for production of child pornography. Samiia must register as a sex offender.

    According to court documents and statements made in court, on or about February 20, 2023, Samiia employed, used, persuaded, induced, and enticed a minor victim residing within the Southern District of West Virginia to send images of her nude vagina to him through the internet using an instant messaging service. Samiia also sent the images back to the minor victim using the messaging service.

    Samiia admitted that he sent a series of messages to the minor victim, directing her to make specific poses and take specific actions for these images. Samiia further admitted that he threatened the minor victim with the images she sent him, including by messaging her “(h)ave fun with these pics being posted now,” “being posted all over Facebook google snapchat twitch and everywhere,” and “THEY WILL BE POSTED ON YOUR SCHOOL WEBSITE TOO.” In one message, Samiia threatened to travel to where the minor victim lived and physically harm her and her family.

    Acting United States Attorney Lisa G. Johnston made the announcement and commended the investigative work of the West Virginia State Police and the U.S. Department of Homeland Security-Homeland Security Investigations (HSI).

    United States District Judge Thomas E. Johnston imposed the sentence. Assistant United States Attorneys Jennifer Rada Herrald and Holly Wilson prosecuted the case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    A copy of this press release is located on the website of the U.S. Attorney’s Office for the Southern District of West Virginia. Related court documents and information can be found on PACER by searching for Case No. 2:24-cr-18.

    ###

     

    MIL Security OSI –

    March 6, 2025
  • MIL-OSI Security: Mexican national sentenced for possession of child sexual assault material

    Source: Office of United States Attorneys

    BROWNSVILLE, Texas – A 26-year-old citizen of Mexico has been ordered to federal prison following his conviction of possession of child pornography, announced U.S. Attorney Nicholas J. Ganjei.

    Ezequiel Vallejo-Hernandez pleaded guilty Feb. 12, 2024.

    U.S. District Judge Rolando Olvera has now ordered him to serve 78 months in federal prison. Vallejo-Hernandez was further ordered to pay $57,500 in restitution to various victims and will serve 10 years on supervised release following the completion of his prison term. During that time, he will have to comply with numerous requirements designed to restrict his access to children and the Internet. He will also be ordered to register as a sex offender. 

    On Sept. 16, 2023, Vallejo-Hernandez attempted to enter the United States through the Gateway International Port of Entry, at which time authorities referred him to secondary inspection. At that time, they noticed that Vallejo-Hernandez had a “lookout” placed on him based on a Cybertip report from the National Center for Missing and Exploited Children. Law enforcement conducted a basic search of his cell phone which led to the discovery of child sexual assault material (CSAM) on the device.

    “Since its founding, the Department of Justice’s Project Safe Childhood (PSC) has allowed prosecutors and law enforcement to uncover and prosecute those that prey on children online. This case is a textbook example on how PSC is making the internet safer for children,” said Ganjei.

    A forensic analysis resulted in the discovery of a total of 557 CSAM files within his MEGA application – a cloud-based storage application – on his phone. 

    Vallejo-Hernandez admitted to downloading the CSAM files to his cell phone and acknowledged it was a crime to be in possession of that material.

    Homeland Security Investigations conducted the investigation.

    Assistant U.S. Attorney Ana C. Cano prosecuted the case, which was brought as part of PSC, a nationwide initiative the Department of Justice (DOJ) launched in May 2006 to combat the growing epidemic of child sexual exploitation and abuse. U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section leads PSC, which marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children and identifies and rescues victims. For more information about PSC, please visit DOJ’s PSC page. For more information about internet safety education, please visit the resources link on that page.

    MIL Security OSI –

    March 6, 2025
  • MIL-OSI Security: Stratford Man Sentenced to 7 Years in Federal Prison for Trafficking Firearms

    Source: Office of United States Attorneys

    Marc H. Silverman, Acting United States Attorney for the District of Connecticut, announced that STEFAN BAGLEY, JR., 23, of Stratford, was sentenced today by U.S. District Judge Omar A. Williams in Hartford to 84 months of imprisonment, followed by three years of supervised release, for trafficking firearms.

    According to court documents and statements made in court, on July 26, 2023, Bagley was shot and wounded while traveling in his vehicle in Bridgeport.  Later that day, Bagley’s vehicle was used in another shooting incident in Bridgeport.  An investigation revealed that, between October 2022 and October 2023, Bagley purchased more than 20 handguns from licensed firearm dealers and sold the guns to a network of customers, several of whom Bagley knew were prohibited by law from possessing firearms.  Bagley typically scratched the serial numbers off of the firearms before providing them to his customers, making the guns more difficult to trace.

    To date, law enforcement has recovered only five of the firearms that were purchased and trafficked by Bagley.  One of the recovered firearms was used in a shooting in Stamford.

    Bagley was arrested on December 18, 2023.  On August 19, 2024, he pleaded guilty to firearm trafficking conspiracy.

    Bagley, who is released on a $100,000 bond, is required to report to prison on May 5.

    This matter was investigated by Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF), the Bridgeport Police Department, and the Connecticut State Police.  The case was prosecuted by Assistant U.S. Attorney Kenneth L. Gresham.

    This case is part of Project Safe Neighborhoods (PSN), the centerpiece of the Department of Justice’s violent crime reduction efforts. PSN is an evidence-based program proven to be effective at reducing violent crime. Through PSN, a broad spectrum of stakeholders work together to identify the most pressing violent crime problems in the community and develop comprehensive solutions to address them.  As part of this strategy, PSN focuses enforcement efforts on the most violent offenders and partners with locally based prevention and reentry programs for lasting reductions in crime.  For more information about Project Safe Neighborhoods, please visit www.justice.gov/psn.

    MIL Security OSI –

    March 6, 2025
  • MIL-OSI USA: 25 Canadian nationals connected to nationwide multi-million dollar “grandparent scam” charged in Vermont

    Source: US Immigration and Customs Enforcement

    Burlington, Vt. – Canadian law enforcement provisionally arrested 23 Canadian nationals March 4 after they were indicted by federal grand jury in Vermont for participation in a “grandparent scam” uncovered by U.S. Immigration and Customs Enforcement. The scam allegedly defrauded elderly individuals in more than 40 states of over $21 million.

    According to the indictment returned by the grand jury Feb. 20 and unsealed on March 4, between the summer of 2021 and June 4, 2024, the defendants engaged in a “grandparent scam” involving phone calls made from call centers in and around Montreal, Québec. During these phone calls, defendants falsely claimed to be an elderly victim’s relative, typically a grandchild, who had been arrested following a car crash and needed money for “bail.” Other defendants posed as an “attorney” representing the elderly victim’s relative. Elderly victims were often told that there was a “gag order” in place to prevent the elderly victim from telling anyone about their family member’s supposed arrest. Elderly victims were convinced to provide bail money to an individual falsely posing as a bail bondsman, who would come to the elderly victim’s home to collect the money. This money was later transmitted to Canada following cash deliveries and financial transactions, sometimes involving cryptocurrency, which, the indictment alleges, obscured the source of the money and the identities of defendants.

    When Canadian law enforcement executed search warrants on June 4, 2024, at several call centers, many of the defendants were found in the act of placing phone calls to elderly victims in Virginia. The Indictment alleges the call centers were managed by Gareth West, Usman Khalid, Andrew Tatto, Stephan Moskwyn, and Ricky Ylimaki, and also charges these five defendants with conspiring to commit money laundering. The conspiracy defrauded elderly Americans out of more than $21 million.

    “These individuals are accused of an elaborate scheme using fear to extort millions of dollars from victims who believed they were helping loved ones in trouble. Today’s arrests are the result of domestic collaboration as well as our critical international partnerships with our colleagues in Canada, Sûreté du Québec and the Royal Canadian Mounted Police. Tackling transnational crime is one of our greatest priorities and we’re working hand-in-hand with our neighbors to dismantle organized criminal groups that threaten our safety and security,” said ICE Homeland Security Investigations Special Agent in Charge New England Michael J. Krol.

    “Today’s operation is an excellent example of ICE Canada’s partnership with the Sûreté du Québec and resulted in the disruption of a significant transnational criminal organization. We will continue to partner with the SQ, the Royal Canadian Mounted Police and other law enforcement agencies to identify and dismantle criminal organizations operating throughout North America and abroad that exploit our shared border and vulnerable population for illicit gain,” said ICE HSI Attache for Ottawa Magdalena Sigur.

    “The transnational criminal conspiracy described in the Indictment preyed on vulnerable Americans throughout the United States,” observed Acting United States Attorney Michael P. Drescher. “These charges reflect the painstaking investigatory work of the Vermont-based agents from Homeland Security Investigations and the Internal Review Service-Criminal Investigations. In addition, we recognize the extensive investigative assistance provided by Sûreté du Québec and the Royal Canadian Mounted Police.”

    “Today’s arrest of Gareth West and his co-conspirators demonstrates IRS-CI’s commitment to protecting the American people from bad actors, no matter where they are hiding.” said Thomas Demeo, Acting Special Agent in Charge of the Internal Revenue Service Criminal Investigation, Boston Field Office. “West and his associates lead a transnational criminal enterprise with the sole intent of defrauding hundreds of retirees of their life savings by preying on their emotions and deceiving them into thinking that their loved ones were in peril. IRS-CI is committed to continued collaboration with our law enforcement partners, both at home and abroad, to stop and deter anyone who seeks to profit off the hard work of U.S. citizens.”

    “For the Quebec Provincial Police and Homeland Security Investigations, transnational criminal organizations are a significant concern that requires close collaboration. Criminal networks operate beyond borders; thus, it is crucial to have strong partnerships among law enforcement. Today’s arrests highlight the efficiency of our joint efforts, demonstrating that our cooperation delivers concrete results in enhancing public safety on both sides of the border,” said Chief Inspector Michel Patenaude

    An indictment contains only allegations, and defendants are presumed innocent until and unless proven guilty.

    West, Khalid, Tatto, Moskwyn and Ricky Ylimaki face up to 40 years of imprisonment if convicted, and the remaining defendants face up to 20 years of imprisonment if convicted.

    The investigation was led by ICE and IRS-CI with the assistance of U.S. Customs and Border Protection and the Quebec Provincial Police (Sûreté du Québec) in Canada. The Royal Canadian Mounted Police conducted the provisional arrests in Canada. Significant assistance was provided by the U.S. Department of Justice Office of International Affairs as well as the International Assistance Group at Justice Canada. This case was investigated under the Organized Crime Drug Enforcement Task Forces (OCDETF). OCDETF identifies, disrupts, and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach.

    More information about Organized Crime Drug Enforcement Task Forces

    Individuals charged in the indictment:

    • Gareth West, a.k.a. “Buddy” and “Muscles,” (38 – Burlington, Ontario)
    • Usman Khalid, a.k.a. “Paul” and “Pauly,” (36 – Les Coteaux, Québec)
    • Andrew Tatto, a.k.a. “Chevy” and “Truck,” (43 – Pierrefonds, Québec)
    • Stephan Moskwyn, a.k.a. “HK,” (42 – Pierrefonds, Québec)
    • Ricky Ylimaki, a.k.a. “Ruffles,” (31 – Notre-Dame-de-l’Île-Perrot, Québec)
    • Richard Frischman, a.k.a. “Styx,” (31 – Montréal, Québec)
    • Adam Lawrence, a.k.a. “Carter,” (41 – Lasalle, Québec)
    • Michael Filion, a.k.a. “Elvis,” (45 – Pierrefonds, Québec)
    • Jimmy Ylimaki, a.k.a. “Coop,” (35 – Notre-Dame-de-l’Île-Perrot, Québec)
    • Nicolas Gonzalez, a.k.a. “Brady,” (27 – Kirkland, Québec)
    • Ryan Melanson, a.k.a. “Parker,” (27 – Montréal, Québec)
    • Joy Kalafatidis, a.k.a. “Blondie,” (31 – Pointe-Claire, Québec)
    • David Arcobelli, a.k.a. “Phil,” (36 – Pierrefonds, Québec)
    • Jonathan Massouras, a.k.a. “Borze,” (35 – Dollard-Des Ormeaux, Québec)
    • Nicholas Shiomi, a.k.a. “Keanu,” (42 – Montréal, Québec)
    • Antonio Iannacci, a.k.a. “DJ,” (33 – Pierrefonds, Québec)
    • Jonathan Ouellet, a.k.a. “Sunny,” (29 – Saint-Eustache, Québec)
    • Kassey-Lee Lankford, a.k.a. “Lex,” (28 – Vaudreuil-Dorion, Québec)
    • Sara Burns, a.k.a. “Ginger,” (31 – Dollard-Des Ormeaux, Québec)
    • Justin Polenz, a.k.a. “Happy,” (34 – Montréal, Québec)
    • Ryan Thibert, a.k.a. “Toast,” (37 – Vaudreuil-Dorion, Québec)
    • Michael Farella, a.k.a. “Honda,” (29 – Sainte-Geneviève, Québec)
    • Sebastian Guenole, a.k.a. “Tweeter,” (30 – Pierrefonds, Québec)
    • Ryan Bridgman, a.k.a. “Clint,” (37 – Deux-Montagnes, Québec)
    • Stephanie-Marie Samaras, a.k.a. “North” (29 – Laval, Québec)

    All but two of the above-named individuals were arrested in Canada on March 4. West and Jimmy Ylimaki remain at large.

    An additional nine individuals have previously been charged in the District of Vermont in connection with this grandparent scam, including Otmane Khalladi (32 – Miami, Florida), Jean Richard Audate (39 – New York, New York), Philippe Alvarez (34 – Montréal, Québec), Paul Conneh (37 – Guangzhou, China), Dave Leblanc (37 – Greenacres, Florida), Zavier Buchanan (27 – Wellington, Florida), William Comfort (29 – Los Angeles, California), Alejandro Garcia (34 – Miami, Florida), and Enmanuel Castillo (31 – Miami, Florida).

    If you or someone you know has been a victim of elder fraud, help is standing by at the National Elder Fraud Hotline (833-FRAUD-11). This hotline is a free resource created by the U.S. Department of Justice, Office for Victims of Crime for people to report fraud against anyone age 60 or older.

    View the indictment

    MIL OSI USA News –

    March 6, 2025
  • MIL-OSI Security: Colombian National Sentenced to Prison and Another Pleads Guilty for Roles in Conspiracy to Kidnap and Assault U.S. Army Soldiers in Colombia

    Source: United States Attorneys General 12

    A Colombian national was sentenced and another pleaded guilty in separate hearings today in the Southern District of Florida for their respective roles in kidnapping and assaulting two members of the U.S. military who were on temporary duty in Bogotá, Colombia.

    Pedro Jose Silva Ochoa, 47, was sentenced to 27 years and three months in prison. Silva Ochoa pleaded guilty in December 2024 to conspiracy to kidnap an internationally protected person.

    Kenny Julieth Uribe Chiran, 35, pleaded guilty to conspiracy to kidnap an internationally protected person. A sentencing date has not yet been set. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    “Protecting Americans, wherever they may be throughout the world, is of paramount importance, and the United States will use every available tool to bring to justice those who harm our citizens,” said Supervisory Official Antoinette Bacon of the Justice Department’s Criminal Division. “In particular, kidnapping and assaulting two U.S. military service members will not go unanswered, and we will hold to account anyone who commits these violent acts against those who protect us.”

    “Members of our military, whether serving here or abroad, can count on this Department of Justice’s respect, support, and protection,” said U.S. Attorney Hayden P. O’Byrne for the Southern District of Florida. “Kidnappings and assaults against U.S. service members will not be tolerated. To those who would dare commit such reprehensible acts against America’s heroes, know this: We will identify you; we will find you; and we will prosecute you as aggressively as the law permits.”

    “The FBI’s commitment to investigate criminal acts against the U.S. military beyond our borders is clearly demonstrated by our persistent pursuit of justice for the two kidnapped soldiers,” said Acting Special Agent in Charge Brett D. Skiles of the FBI Miami Field Office. “Our close cooperation with Colombian and Chilean law enforcement authorities was essential to this international investigation’s success. To all would be kidnappers the message is clear: target our citizens with violence anywhere in the world and we will hold you accountable for your actions.”

    According to court documents, Silva Ochoa and Uribe Chiran, both of Bogotá, and their co-defendant, Jeffersson Arango Castellanos, targeted, incapacitated, and kidnapped two U.S. soldiers in Bogotá. The two victims, while serving on orders in Colombia, went to an entertainment district in Bogotá to watch a soccer game on the evening of March 5, 2020. They eventually went to a pub, where they lost consciousness until the following day, by which point they had been separated. Medical examinations later confirmed the presence of benzodiazepines in the two victims. The defendants targeted the two victims at the pub, incapacitated them with drugs, and kidnapped them to acquire the victims’ valuables and credit and debit card information. Silva Ochoa and Arango Castellanos used one victim’s credit card and the other victim’s debit card to make purchases and withdraw money.

    Silva Ochoa was extradited in April 2024 from Chile to the United States. Uribe Chiran was extradited in September 2024 from Colombia to the United States. Co-defendant Arango Castellanos was extradited in May 2023 from Colombia to the United States, pleaded guilty in January 2024, and was sentenced in May 2024 to 48 years and nine months in prison.

    The FBI Miami Field Office is investigating the case. The Justice Department’s Office of International Affairs, the Criminal Division’s Narcotic and Dangerous Drug Section’s Office of the Judicial Attaché in Bogotá, and the FBI’s Legal Attaché Offices in Bogotá and Santiago, Chile, provided significant assistance in this matter. The United States thanks Colombian and Chilean law enforcement authorities for their valuable assistance.

    Trial Attorneys Clayton O’Connor and Elizabeth Nielsen of the Criminal Division’s Human Rights and Special Prosecutions Section and Assistant U.S. Attorney Bertila Fernandez for the Southern District of Florida are prosecuting the case.

    MIL Security OSI –

    March 6, 2025
  • MIL-OSI Security: Thibodaux Social Worker Sentenced to 30 Months for Healthcare Fraud

    Source: Office of United States Attorneys

    NEW ORLEANS – Acting United States Attorney Michael M. Simpson announced today that JOHN CHRISTOPHER BARRILLEAUX (“BARRILLEAUX”), age 64, of Thibodaux, Louisiana, was sentenced on February 27, 2025 to 30 months in prison, after previously pleading guilty to healthcare fraud, in violation of 18 U.S.C. § 1347.

    According to court documents, from 2008 through 2024, BARRILLEAUX submitted false claims to private insurance companies for millions of dollars of healthcare services that were not actually provided. To hide the fraud, BARRILLEAUX created fake patient notes and submitted them to the insurance companies to support his bills.

    United States District Judge Barry Ashe sentenced BARRILLEAUX to 30 months in prison, followed by 3 years of supervised release. BARRILLEAUX was also ordered to pay $4,592,650 in restitution to the victim companies, as well as a mandatory special assessment fee of $100.

    Acting U.S Attorney Simpson praised the work of the Federal Bureau of Investigation in investigating this matter. Assistant United States Attorney Nicholas D. Moses, of the Financial Crimes Unit and Health Care Fraud Coordinator, and Trial Attorney Kelly Z. Walters, of the Department of Justice’s Criminal Division’s Fraud Section, are in charge of the prosecution.

    MIL Security OSI –

    March 6, 2025
  • MIL-OSI Security: Baldwin County Man Sentenced to Decades in Prison for Attempted Sex Trafficking of a 9-year-old Child

    Source: Office of United States Attorneys

    BIRMINGHAM, Ala. – A Baldwin County man has been sentenced on a charge of attempted sex trafficking of a child, announced U.S. Attorney Prim F. Escalona and Bureau of Immigration and Customs Enforcement (ICE) Atlanta Special Agent in Charge Steven N. Schrank.

    U.S. District Court Judge Anna Manasco sentenced William Guy Long, 27, of Bay Minette, Alabama, to 276 months in prison, followed by a life term of supervised release.  Long was also ordered to pay $5,000 under the Justice for Victims of Trafficking Act of 2015. In October, Long pleaded guilty to the charge.

    According to the plea agreement, Long arranged a date with an escort and then offered the escort $500 if she would bring an underage girl to have sex with him. Long said he wanted someone 10-years-old or younger.  The escort told Long that she had a nine-year-old daughter.  Long said that he preferred younger, “like 4 or 5” but he would pay $800 if she would check her nine-year-old out of school that day and bring her to him.  An arrangement was made, but instead of getting the child, the escort contacted law enforcement.  Long’s abhorrent request was corroborated through text messages. ICE agents, along with the Hoover and Pelham Police Departments, conducted surveillance at the hotel.  When Long opened the door to his hotel room expecting to see the child with whom he planned to have sex, he instead was met by law enforcement.  Long admitted that he communicated with an escort for the purpose of soliciting a minor child for an unlawful sex act.  With Long’s consent, agents seized and searched his cell phone.  A review of Long’s messages revealed his correspondence with another individual whom he told, “get me a young one”—“the younger you find the more money I’ll pay FYI.”

    ICE investigated the case along with the Pelham Police Department and Hoover Police Department. Assistant U.S. Attorney R. Leann White prosecuted the case.

    Child sex trafficking is a serious issue.  The National Center for Missing and Exploited Children (NCMEC) received more than 27,800 reports of possible child sex trafficking in 2024.  This signifies more than a 30% increase since 2023. See https://www.missingkids.org/ for further information.

    The Justice for Victims of Trafficking Act of 2015 gave the Department of Justice more tools to address human trafficking.  One tool was creating a mandatory $5,000 special assessment that applies to non-indigent defendants for each count of conviction of certain offenses. The revenue generated from this special assessment is used to support programs to provide services to victims of human trafficking and other offenses.

    MIL Security OSI –

    March 6, 2025
  • MIL-OSI Security: New Haven Man Pleads Guilty to Possessing Gun While on Federal Supervised Release

    Source: Office of United States Attorneys

    Marc H. Silverman, Acting United States Attorney for the District of Connecticut, announced that ELBERT LLORRENS, 32, of New Haven, pleaded guilty today before U.S. District Judge Stefan R. Underhill in Bridgeport to unlawful possession of a firearm by a felon.

    According to court documents and statements made in court, on March 1, 2024, Llorrens possessed a loaded Smith & Wesson, model SD40 VE, .40 caliber pistol.

    In March 2017, Llorrens was sentenced in Hartford federal court to 60 months of imprisonment and five years of supervised release for committing multiple carjackings and armed robberies, and he was on federal supervised release when he possessed the firearm.

    It is a violation of federal law for a person previously convicted of a felony offense to possess a firearm that has moved in interstate or foreign commerce.

    Unlawful possession of a firearm carries a maximum term of imprisonment of 15 years.  Llorrens is scheduled to be sentenced on June 4.

    Llorrens has been detained since March 1, 2024.

    This matter has been investigated by the Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF), the New Haven Police Department, and the West Haven Police Department. The case is being prosecuted by Assistant U.S. Attorney Daniel E. Cummings.

    This case is part of Project Safe Neighborhoods (PSN), the centerpiece of the Department of Justice’s violent crime reduction efforts. PSN is an evidence-based program proven to be effective at reducing violent crime. Through PSN, a broad spectrum of stakeholders work together to identify the most pressing violent crime problems in the community and develop comprehensive solutions to address them. As part of this strategy, PSN focuses enforcement efforts on the most violent offenders and partners with locally based prevention and reentry programs for lasting reductions in crime.  For more information about Project Safe Neighborhoods, please visit www.justice.gov/psn.

    MIL Security OSI –

    March 6, 2025
  • MIL-OSI Security: Repeat Gun Offender Sentenced for Unlawful Possession of a Firearm and Aggravated Assault While Armed

    Source: Office of United States Attorneys

                WASHINGTON – Traquon Demonte McCalip, 21, of Washington D.C., was sentenced today in U.S. District Court to 114 months in federal prison for unlawfully possessing a Canik T9SF Elite 9mm handgun and using it to shoot a victim in the middle of the day at a busy fast-food restaurant parking lot on the 3900 block of Minnesota Avenue NE.

                The sentence was announced by U.S. Attorney Edward R. Martin, Jr., FBI Special Agent in Charge Sean T. Ryan of the Washington Field Office’s Criminal and Cyber Division, and Chief Pamela Smith of the Metropolitan Police Department (MPD).

                McCalip pleaded guilty on August 23, 2024, to unlawful possession of a firearm and ammunition by a person convicted of a crime punishable by imprisonment for a term exceeding one year and to aggravated assault while armed. In addition to the prison term, U.S. District Court Judge Amit P. Mehta ordered McCalip to serve five years of supervised release.

                According to court documents, on March 20, 2024, McCalip approached an individual standing in a fast-food parking lot on the 3900-block of Minnesota Avenue NE, and claimed that he wanted to buy cigarettes from him. After discussing cigarette prices, McCalip attempted to take the individual’s bag. McCalip then drew his loaded, concealed handgun and shot the individual in the abdomen. As a struggle ensued between McCalip and the victim, McCalip spotted a marked police vehicle that had arrived on scene. McCalip took his firearm’s magazine that had fallen out of his gun, and fled in a vehicle that he had parked in the lot with his firearm’s magazine but left behind his firearm. Police chased McCalip and ultimately arrested him near 1805 Bladensburg Road NE. Officers recovered the firearm magazine and ammunition on the driver’s seat of the car McCalip was driving.

                This case was investigated by the Metropolitan Police Department and the Federal Bureau of Investigation’s Washington Field Office. It was prosecuted by Trial Attorney Ethan Cantor of the Department of Justice.

    24cr161

    MIL Security OSI –

    March 6, 2025
  • MIL-OSI USA: U.S. Justice Department Launches Investigation of University of California Under Title VII of the Civil Rights Act of 1964

    Source: US State of North Dakota

    The Federal Task Force to Combat Anti-Semitism announced that the Justice Department has opened a civil pattern or practice investigation into the University of California (UC) under Title VII of the Civil Rights Act of 1964. The investigation will assess whether UC has engaged in a pattern or practice of discrimination based on race, religion and national origin against its professors, staff and other employees by allowing an Antisemitic hostile work environment to exist on its campuses.

    “This Department of Justice will always defend Jewish Americans, protect civil rights, and leverage our resources to eradicate institutional Antisemitism in our nation’s universities,” said Attorney General Pamela Bondi.

    “Our country has witnessed a disturbing rise of Antisemitism at educational institutions in California and nationwide,” said Acting Associate Attorney General and Department of Justice Chief of Staff Chad Mizelle. “The Department of Justice is committed to upholding Title VII of the Civil Rights Act and protecting Jewish Americans as we investigate this potential pattern of discrimination.”

    Leading Task Force member and Senior Counsel to the Assistant Attorney General for Civil Rights Leo Terrell said, “Following the October 7, 2023 Hamas terror attacks in Israel, there has been an outbreak of antisemitic incidents at leading institutions of higher education in America, including at my own alma mater at the UCLA campus of UC. The impact upon UC’s students has been the subject of considerable media attention and multiple federal investigations. But these campuses are also workplaces, and the Jewish faculty and staff employed there deserve a working environment free of antisemitic hostility and hate. The President, the Attorney General and this Task Force are committed to combatting antisemitism for all Jewish Americans.”

    The employment discrimination investigation will be conducted pursuant to Title VII of the Civil Rights Act of 1964, which prohibits employment discrimination on the basis of race, color, national origin, sex, and religion. Under Title VII, the Justice Department has the authority to initiate investigations against state and local government employers where it has reason to believe that a “pattern or practice” of employment discrimination exists.

    Collaboration between the Justice Department and other federal agencies plays an important role in combating antisemitism in schools and college campuses. The Department coordinates with other federal agencies as part of the multi-agency Task Force to Combat Anti-Semitism, as well as when sharing enforcement jurisdiction with other agencies. For state and local governments and related entities like public universities, the Department of Justice shares enforcement authority under Title VII with the Equal Employment Opportunity Commission (EEOC). The EEOC receives, investigates, and conciliates EEOC charges against state- and local-government employers, before referring those charges to the Civil Rights Division of the Department of Justice for potential litigation.

    “The EEOC is committed to partnering with the Department of Justice to stamp out the scourge of anti-Semitism on campus workplaces,” said EEOC Acting Chair Andrea Lucas.

    If you have been discriminated against, you can file a complaint with the Civil Rights Division, at Contact the Civil Rights Division | Department of Justice (https://civilrights.justice.gov). If you work for an university or college and have experienced anti-Semitic harassment at work, you can file a charge with the EEOC, at How to File a Charge of Employment Discrimination | U.S. Equal Employment Opportunity Commission (https://www.eeoc.gov/how-file-charge-employment-discrimination). Learn more about addressing anti-Semitism at work here: What To Do If You Face Antisemitism at Work.

    President Trump’s Executive Order can be found here: Additional Measures to Combat Anti-Semitism – The White House.

    MIL OSI USA News –

    March 6, 2025
  • MIL-OSI Security: U.S. Justice Department Launches Investigation of University of California Under Title VII of the Civil Rights Act of 1964

    Source: United States Attorneys General 2

    The Federal Task Force to Combat Anti-Semitism announced that the Justice Department has opened a civil pattern or practice investigation into the University of California (UC) under Title VII of the Civil Rights Act of 1964. The investigation will assess whether UC has engaged in a pattern or practice of discrimination based on race, religion and national origin against its professors, staff and other employees by allowing an Antisemitic hostile work environment to exist on its campuses.

    “This Department of Justice will always defend Jewish Americans, protect civil rights, and leverage our resources to eradicate institutional Antisemitism in our nation’s universities,” said Attorney General Pamela Bondi.

    “Our country has witnessed a disturbing rise of Antisemitism at educational institutions in California and nationwide,” said Acting Associate Attorney General and Department of Justice Chief of Staff Chad Mizelle. “The Department of Justice is committed to upholding Title VII of the Civil Rights Act and protecting Jewish Americans as we investigate this potential pattern of discrimination.”

    Leading Task Force member and Senior Counsel to the Assistant Attorney General for Civil Rights Leo Terrell said, “Following the October 7, 2023 Hamas terror attacks in Israel, there has been an outbreak of antisemitic incidents at leading institutions of higher education in America, including at my own alma mater at the UCLA campus of UC. The impact upon UC’s students has been the subject of considerable media attention and multiple federal investigations. But these campuses are also workplaces, and the Jewish faculty and staff employed there deserve a working environment free of antisemitic hostility and hate. The President, the Attorney General and this Task Force are committed to combatting antisemitism for all Jewish Americans.”

    The employment discrimination investigation will be conducted pursuant to Title VII of the Civil Rights Act of 1964, which prohibits employment discrimination on the basis of race, color, national origin, sex, and religion. Under Title VII, the Justice Department has the authority to initiate investigations against state and local government employers where it has reason to believe that a “pattern or practice” of employment discrimination exists.

    Collaboration between the Justice Department and other federal agencies plays an important role in combating antisemitism in schools and college campuses. The Department coordinates with other federal agencies as part of the multi-agency Task Force to Combat Anti-Semitism, as well as when sharing enforcement jurisdiction with other agencies. For state and local governments and related entities like public universities, the Department of Justice shares enforcement authority under Title VII with the Equal Employment Opportunity Commission (EEOC). The EEOC receives, investigates, and conciliates EEOC charges against state- and local-government employers, before referring those charges to the Civil Rights Division of the Department of Justice for potential litigation.

    “The EEOC is committed to partnering with the Department of Justice to stamp out the scourge of anti-Semitism on campus workplaces,” said EEOC Acting Chair Andrea Lucas.

    If you have been discriminated against, you can file a complaint with the Civil Rights Division, at Contact the Civil Rights Division | Department of Justice (https://civilrights.justice.gov). If you work for an university or college and have experienced anti-Semitic harassment at work, you can file a charge with the EEOC, at How to File a Charge of Employment Discrimination | U.S. Equal Employment Opportunity Commission (https://www.eeoc.gov/how-file-charge-employment-discrimination). Learn more about addressing anti-Semitism at work here: What To Do If You Face Antisemitism at Work.

    President Trump’s Executive Order can be found here: Additional Measures to Combat Anti-Semitism – The White House.

    MIL Security OSI –

    March 6, 2025
  • MIL-OSI USA: AG Labrador Announces Dismissal of EMTALA Challenge to Idaho Defense of Life Act

    Source: US State of Idaho

    [BOISE] – Attorney General Raúl Labrador announced today that the new Trump Administration’s Department of Justice is dismissing any further action against Idaho’s Defense of Life Act, argued in Idaho v. United States.“It has been our position from the beginning that there is no conflict between EMTALA and Idaho’s Defense of Life Act,” said Attorney General Labrador.  “The goal of each is to save lives in every circumstance, both the mother and their unborn child.  We are grateful that meddlesome DOJ litigation on this issue will no longer be an obstacle to Idaho enforcing its laws.  Idaho will continue defending life as intended by the legislature and our people.”
    After the passage of Idaho’s Defense of Life Act, the Biden Administration’s Department of Justice sued Idaho, refusing to accept the Supreme Court’s 2023 decision in Dobbs which remanded abortion policy to the individual states.  The Biden DOJ claimed that federal law under EMTALA (Emergency Medical Treatment and Labor Act), a 1986 federal statute designed to provide stabilizing treatment at emergency rooms regardless of a patient’s ability to pay, somehow instead mandated abortions, in contravention of Idaho’s Defense of Life Act.
    The Idaho Supreme Court made it very clear that Idaho’s Defense of Life Act permits an abortion based on the subjective, good-faith medical judgement of a doctor who believes the life of the mother is threatened.  Neither a doctor’s certainty nor immanency of death is required for this judgement.  Idaho has argued that EMTALA does not mandate a standard of care, nor requires abortion, but specifically states that emergency rooms are to treat both mothers and their unborn children.

    MIL OSI USA News –

    March 6, 2025
  • MIL-OSI Security: Baldwinsville Man Sentenced to 45 Years in Prison for Sexual Exploitation of a Child and Distribution and Receipt of Child Pornography

    Source: Office of United States Attorneys

    Kenneth Koegel, Jr. Had a Prior Conviction for Sexual Abuse in the 1st Degree Involving a 6-Year-Old

    SYRACUSE, NEW YORK – Kenneth Koegel, Jr., 40, of Baldwinsville, New York was sentenced today to 45 years in federal prison and lifetime supervised release following his conviction by guilty plea to seven counts of sexual exploitation of a child, one count of commission of a felony offense involving a minor by a registered sex offender, one count of distribution of child pornography, and one count of receipt of child pornography. Acting United States Attorney Daniel Hanlon and Craig L. Tremaroli, Special Agent in Charge of the Albany Field Office of the Federal Bureau of Investigation (FBI) made the announcement.

    As part of his prior guilty plea, Koegel admitted that he was convicted in 2004 in Monroe County Court of sexual abuse in the first degree for exposing his penis to a 6-year-old girl in a public park and touching her vagina with his hand and that he was required to register as a sex offender because of that conviction. He then admitted that, starting in or about 2014 and continuing until October 2022, he sexually abused a girl from the time she was approximately 2 years old until she was approximately 9 years old. During that time, Koegel created numerous sexually explicit images and videos depicting the sexual abuse of his victim, including Koegel subjecting her to multiple sex acts. He also used a social messaging application to distribute the material he produced to someone else, with whom he also traded thousands of other child pornography files.

    In addition to the 45-year imprisonment term and lifetime supervision, the district court also ordered Koegel to pay $12,000 in restitution and a $1,000 special assessment. Koegel will have to register as a sex offender upon release from prison.

    This case was investigated by the FBI’s Albany Division Child Exploitation and Human Trafficking Task Force – comprised of FBI Special Agents and state and local police investigators, including from the New York State Police. The case was prosecuted by Assistant United States Attorneys Michael D. Gadarian and Adrian S. LaRochelle as part of Project Safe Childhood.

    Project Safe Childhood is a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse. Launched in May 2006 by the Department of Justice and led by the U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit https://www.justice.gov/psc.

    MIL Security OSI –

    March 6, 2025
  • MIL-OSI Security: Security News: U.S. Justice Department Launches Investigation of University of California Under Title VII of the Civil Rights Act of 1964

    Source: United States Department of Justice 2

    The Federal Task Force to Combat Anti-Semitism announced that the Justice Department has opened a civil pattern or practice investigation into the University of California (UC) under Title VII of the Civil Rights Act of 1964. The investigation will assess whether UC has engaged in a pattern or practice of discrimination based on race, religion and national origin against its professors, staff and other employees by allowing an Antisemitic hostile work environment to exist on its campuses.

    “This Department of Justice will always defend Jewish Americans, protect civil rights, and leverage our resources to eradicate institutional Antisemitism in our nation’s universities,” said Attorney General Pamela Bondi.

    “Our country has witnessed a disturbing rise of Antisemitism at educational institutions in California and nationwide,” said Acting Associate Attorney General and Department of Justice Chief of Staff Chad Mizelle. “The Department of Justice is committed to upholding Title VII of the Civil Rights Act and protecting Jewish Americans as we investigate this potential pattern of discrimination.”

    Leading Task Force member and Senior Counsel to the Assistant Attorney General for Civil Rights Leo Terrell said, “Following the October 7, 2023 Hamas terror attacks in Israel, there has been an outbreak of antisemitic incidents at leading institutions of higher education in America, including at my own alma mater at the UCLA campus of UC. The impact upon UC’s students has been the subject of considerable media attention and multiple federal investigations. But these campuses are also workplaces, and the Jewish faculty and staff employed there deserve a working environment free of antisemitic hostility and hate. The President, the Attorney General and this Task Force are committed to combatting antisemitism for all Jewish Americans.”

    The employment discrimination investigation will be conducted pursuant to Title VII of the Civil Rights Act of 1964, which prohibits employment discrimination on the basis of race, color, national origin, sex, and religion. Under Title VII, the Justice Department has the authority to initiate investigations against state and local government employers where it has reason to believe that a “pattern or practice” of employment discrimination exists.

    Collaboration between the Justice Department and other federal agencies plays an important role in combating antisemitism in schools and college campuses. The Department coordinates with other federal agencies as part of the multi-agency Task Force to Combat Anti-Semitism, as well as when sharing enforcement jurisdiction with other agencies. For state and local governments and related entities like public universities, the Department of Justice shares enforcement authority under Title VII with the Equal Employment Opportunity Commission (EEOC). The EEOC receives, investigates, and conciliates EEOC charges against state- and local-government employers, before referring those charges to the Civil Rights Division of the Department of Justice for potential litigation.

    “The EEOC is committed to partnering with the Department of Justice to stamp out the scourge of anti-Semitism on campus workplaces,” said EEOC Acting Chair Andrea Lucas.

    If you have been discriminated against, you can file a complaint with the Civil Rights Division, at Contact the Civil Rights Division | Department of Justice (https://civilrights.justice.gov). If you work for an university or college and have experienced anti-Semitic harassment at work, you can file a charge with the EEOC, at How to File a Charge of Employment Discrimination | U.S. Equal Employment Opportunity Commission (https://www.eeoc.gov/how-file-charge-employment-discrimination). Learn more about addressing anti-Semitism at work here: What To Do If You Face Antisemitism at Work.

    President Trump’s Executive Order can be found here: Additional Measures to Combat Anti-Semitism – The White House.

    MIL Security OSI –

    March 6, 2025
  • MIL-OSI USA: Grassley, McConnell Introduce Legislation to Enhance Accountability at Federal Prisons

    US Senate News:

    Source: United States Senator for Iowa Chuck Grassley
    WASHINGTON – Senate Judiciary Committee Chairman Chuck Grassley (R-Iowa) and Sen. Mitch McConnell (R-Ky.) reintroduced the Federal Prisons Accountability Act. The legislation would bring greater accountability to federal prisons by requiring the Director of the Bureau of Prisons (BOP) to be confirmed by the Senate. Currently, the BOP Director is not subject to Senate confirmation, despite having significant authority over taxpayer dollars and federal personnel.
    “The Director of the Bureau of Prisons oversees a massive budget and thousands of employees, including many Iowans. It’s a significant responsibility that requires serious oversight to protect inmates and employees from mismanagement or abuse. Requiring the BOP Director to face Senate confirmation would bring much needed transparency and accountability to the federal prison system,” Grassley said.
    “The Senate plays a vital role in staffing the federal government, evaluating the qualifications of more than a thousand presidential nominees to ensure transparency and accountability. The Director of the Bureau of Prisons oversees thousands of employees and a multi-billion-dollar budget, and should be subject to Senate review and confirmation as well. Our bill would extend the Senate’s advice and consent role to the Bureau of Prisons Director and expand supervision over this federal agency. The thousands of Americans – and hundreds of Kentuckians – employed by the Bureau of Prisons deserve Senate oversight and an added layer of protection from harm,” McConnell said.
    Background:
    The Federal Prisons Accountability Act of 2025 would require the President to appoint the BOP Director with the advice and consent of the Senate. The legislation would also limit a BOP Director’s tenure to a single, 10-year term.
    Unlike most Department of Justice (DOJ) administrators and directors, the BOP Director is appointed by the Attorney General – not the President – without Senate consideration. The BOP Director supervises the federal prison employees who serve in over 120 facilities across the country. This legislation would subject the Director to the same congressional scrutiny as other top law enforcement agency chiefs within the DOJ, such as the Federal Bureau of Investigation Director, the Bureau of Alcohol, Tobacco Firearms and Explosives Director and the Drug Enforcement Administration Administrator.
    -30-

    MIL OSI USA News –

    March 6, 2025
  • MIL-OSI Security: United States Attorney Durham Launches the Eastern District of New York’s Transnational Criminal Organizations Strike Force

    Source: United States Department of Justice (Human Trafficking)

    Strike Force Focuses on Dismantling Cartels and Transnational Criminal Organizations

    U.S. Attorney for the Eastern District of New York John J. Durham announced today the creation and launch of the Eastern District of New York’s Transnational Criminal Organizations (TCOs) Strike Force. Capitalizing on the Office’s preeminence in this area, the Strike Force will focus on investigating, prosecuting and dismantling cartels and TCOs, and their senior leadership by bringing charges that include terrorism, racketeering and operating a continuing criminal enterprise.

    “I am establishing this Strike Force with immense pride in what this Office has already accomplished, as well as the knowledge that there is much more work to be done in the fight against TCOs,” stated United States Attorney Durham.  “Because of my Office’s significant experience and expertise in this area, we have a responsibility to our community and our country to dismantle these ruthless organizations from the top down in order to stop the violence, flow of drugs, and dangers they unleash in our District and across the nation.”

    For more than two decades, the U.S. Attorney’s Office for the Eastern District of New York has been a nationwide leader in prosecuting many of the most significant TCOs in the country and the world, including innovative indictments of the highest-ranking international leaders of the La Mara Salvatrucha (MS-13), Sinaloa Cartel, Guadalajara Cartel, Juarez Cartel, H-2 Drug Cartel, Clan de Golfo and others.  In addition, this Office has investigated and prosecuted numerous other TCOs that have a significant operating presence in our district, including the Trinitarios, 18th Street and, more recently, Tren de Aragua (TdA). Notably, United States Attorney Durham has been at the forefront of these prosecutions, leading and serving on the Attorney General’s Transnational Organized Crime Task Force Subcommittee for MS-13 and directing Joint Task Force Vulcan, while other AUSAs in the Office have served on the subcommittees for Sinaloa, Jalisco New Generation (CJNG) Cartel, Hezbollah and Clan de Golfo.

    Consistent with the Attorney General’s memorandum titled “TOTAL ELIMINATION OF CARTELS AND TRANSNATIONAL CRIMINAL ORGANIZATIONS” issued on February 5, 2025, which provided further guidance regarding President Trump’s January 20, 2025 Executive Order regarding TCOs such as TdA and MS-13, the Strike Force’s mission is as follows:

    • Investigating, prosecuting and dismantling cartels and TCOs, with a particular focus on their senior leadership and management, including without limitation: Mexican drug cartels such as the Sinaloa, H-2, Juarez, CJNG and Clan de Golfo cartels, and TCOs that have a significant operating presence in the District, such as MS-13, the Trinitarios, the 18th Street gang and TdA.   

    • Disrupting the criminal activities of TCOs, particularly those operating in the United States and/or that impact United States victims at home or abroad, including TCOs engaged in criminal activity involving terrorism; racketeering; drug trafficking, particularly with respect to fentanyl and fentanyl precursors; violent crime; human trafficking and smuggling; corruption of foreign officials; money laundering; immigration crimes; and fraud and cybercrime schemes.

    • Identifying the sources and methods of illicit funds related to TCO financing and profits, and seizing and forfeiting bank accounts, digital assets, real property and other assets that are criminally derived, commingled with criminal proceeds, or otherwise involved in money laundering by or in support of TCOs.

    • Coordinating the investigative efforts of the Office’s federal law enforcement partners in the Eastern District and beyond, including the Federal Bureau of Investigation, Drug Enforcement Administration, Homeland Security Investigations, Bureau of Alcohol, Tobacco, Firearms and Explosives, United States Postal Inspection Service, Internal Revenue Service, as well as High Intensity Drug Trafficking Areas Program (HIDTA), state and local police departments and district attorneys’ offices.

    • Strengthening the Office’s partnerships and coordination with other Department of Justice components, including the National Security Division, Criminal Division, Joint Task Force Vulcan, Joint Task Force 10-7, Joint Task Force Alpha, OCDETF, MLARS, NDDS, OIA and other United States Attorney’s Offices. 

    The Chief of the International Narcotics and Money Laundering Section Francisco J. Navarro has been selected to serve as Director of the EDNY TCO Strike Force, and Assistant U.S. Attorneys Megan E. Farrell and Gabriel Park have been selected as Deputy Directors.  In addition, the Strike Force will have at least one representative from each section of the Office’s Criminal Division to capitalize on existing experience, coordinate strategic focus and maximize resources to make an even more significant impact combatting TCOs. The Strike Force will also include OCDETF-designated AUSAs, Project Safe Neighborhood (PSN) coordinators, as well as a designated representative from the Civil Division to ensure the Strike Force leverages civil remedies as appropriate.  The Strike Force will also coordinate closely with the Office’s Immigration Enforcement Working Group.

    Francisco J. Navarro

    AUSA Navarro joined the Department in 2013 and the Office in 2018 after serving as an AUSA in the District of New Jersey.  He has been in charge of INML since April 2023.  He received his B.A. from Boston University and his J.D. from Georgetown University Law Center.

    AUSA Navarro has prosecuted several significant narcotics, national security and material support cases.  He has also prosecuted significant white collar cases involving sanctions evasion, money laundering and the Bank Secrecy Act.  For example,  AUSA Navarro is part of the team prosecuting Rafael Caro Quintero for leading a continuing criminal enterprise, including his role in the kidnapping, torture and murder of DEA Special Agent Enrique “Kiki” Camarena.  He is also leading the team prosecuting Ismael Zambada Garcia (aka “El Mayo”) for his founding and two-decade leadership of the Sinaloa Cartel—a continuing criminal enterprise—and one of the most violent and powerful drug cartels in the world.  In United States v. Usuga David, et al., he led the team that obtained a 45-year prison sentence against Dairo Usuga David (aka “Otoniel”) who was the supreme leader of the Clan del Golfo and was considered the most dangerous narco-terrorist in Colombia since Pablo Escobar.  AUSA Navarro also led the team that obtained the first indictments in the nation against Chinese chemical manufacturing companies and employees for importing fentanyl precursors into the United States and working with Mexican cartels to manufacture and distribute fentanyl in the United States.  In addition, AUSA Navarro is also leading the prosecution of Mohammad Bazzi, a Specially Designated Global Terrorist and financier for Hizballah, a foreign terrorist organization on sanctions evasion and money laundering charges.  AUSA Navarro has been involved in multiple prosecutions of individuals and institutions for failing to follow United States laws regarding maintaining effective anti-money laundering programs, the prohibition on the provision of material support to designated Foreign Terrorist Organizations, or other financial regulations.

    Megan E. Farrell

    AUSA Farrell joined the Office in 2018, and currently serves in the Office’s Long Island Criminal Section.  She is one of the Office’s Human Trafficking Coordinators and previously served as an Acting Deputy Chief in the Office’s General Crimes Section.  She received her B.A. from Boston College and her J.D. from St. John’s University.

    AUSA Farrell has prosecuted significant organized crime, gang and sex trafficking cases during her time in the Office.  In United States v. Canales-Rivera et al. and United States v. Arevalo-Chavez et al., she is part of the team prosecuting the highest-ranking members of MS-13’s international command and control structure, including the body known as the Ranfla Nacional, with charges that include conspiracy to provide and conceal material support to terrorists, conspiracy to commit acts of terrorism transcending national boundaries, conspiracy to finance terrorism and narco-terrorism conspiracy.  In United States v. Alexi Saenz et al., AUSA Farrell was part of a team that secured the convictions of two MS-13 defendants to racketeering and other charges in connection with eight murders.  In United States v. Blanco et al., she was a member of the team that secured the convictions of three high-ranking MS-13 gang members to racketeering charges in connection with nine murders.  In United States v. Escobar, AUSA Farrell was part of the team that secured a sentence of 50 years after the defendant was convicted on April 8, 2022, following a four-week trial, of racketeering, including predicate acts of murder, conspiracy to murder rival gang members, and obstruction of justice and murder in aid-of racketeering, in relation to the deaths of four young men who were hacked to death with machetes and other sharp objects by  more than a dozen MS-13 members and associates after Escobar lured them to a local park in 2017.  In United States v. Lampley-Reid, AUSA Farrell was part of the team leading to a Bloods gang member being sentenced to 23 years in prison for sex trafficking of minors.  Additionally, AUSA Farrell is part of the team charging former CEO of Abercrombie & Fitch and two other individuals with sex trafficking and interstate prostitution.

    Gabriel Park

    AUSA Park joined the Office in 2022 after serving in the United States Air Force Judge Advocate General’s Corps.  He received his B.A. from Wake Forest University and his J.D. from Brooklyn Law School and clerked for the Honorable Dora L. Irizarry.  He currently serves in the Office’s Organized Crime and Gangs Section.

    AUSA Park has prosecuted significant violent organized crime and gang cases.  In United States v. Yu, he was part of the prosecution team that convicted two defendants who were subsequently sentenced to life imprisonment in a murder-for-hire scheme of a perceived business rival, and in the related case United States v. Abreu, AUSA Park was on the prosecution team that convicted a third defendant for his role in the murder-for-hire scheme.  In United States v. Thompson, AUSA Park was on the prosecution team that convicted a Long Island man who was later sentenced to 30 years in prison for drug trafficking, distribution of fentanyl that resulted in a death and illegal possession of firearms.    

    MIL Security OSI –

    March 6, 2025
  • MIL-OSI USA: Justice Department Charges 12 Chinese Contract Hackers and Law Enforcement Officers in Global Computer Intrusion Campaigns

    Source: US State of California

    Chinese Law Enforcement and Intelligence Services Leveraged China’s Reckless and Indiscriminate Hacker-for-Hire Ecosystem, Including the ‘APT 27’ Group, to Suppress Free Speech and Dissent Globally and to Steal Data from Numerous Organizations Worldwide,

    Note: View the indictments in U.S. v. Wu Haibo et al., U.S. v. Yin Kecheng, U.S. v. Zhou Shuai et al. here.

    The Justice Department, FBI, Naval Criminal Investigative Service, and Departments of State and the Treasury announced today their coordinated efforts to disrupt and deter the malicious cyber activities of 12 Chinese nationals, including two officers of the People’s Republic of China’s (PRC) Ministry of Public Security (MPS), employees of an ostensibly private PRC company, Anxun Information Technology Co. Ltd. (安洵信息技术有限公司) also known as “i-Soon,” and members of Advanced Persistent Threat 27 (APT27).

    These malicious cyber actors, acting as freelancers or as employees of i-Soon, conducted computer intrusions at the direction of the PRC’s MPS and Ministry of State Security (MSS) and on their own initiative. The MPS and MSS paid handsomely for stolen data. Victims include U.S.-based critics and dissidents of the PRC, a large religious organization in the United States, the foreign ministries of multiple governments in Asia, and U.S. federal and state government agencies, including the U.S. Department of the Treasury (Treasury) in late 2024.

    “The Department of Justice will relentlessly pursue those who threaten our cybersecurity by stealing from our government and our people,” said Sue J. Bai, head of the Justice Department’s National Security Division. “Today, we are exposing the Chinese government agents directing and fostering indiscriminate and reckless attacks against computers and networks worldwide, as well as the enabling companies and individual hackers that they have unleashed. We will continue to fight to dismantle this ecosystem of cyber mercenaries and protect our national security.”

    “The FBI is committed to protecting Americans from foreign cyber-attacks,” said Assistant Director Bryan Vorndran of the FBI’s Cyber Division. “Today’s announcements reveal that the Chinese Ministry of Public Security has been paying hackers-for-hire to inflict digital harm on Americans who criticize the Chinese Communist Party (CCP). To those victims who bravely came forward with evidence of intrusions, we thank you for standing tall and defending our democracy. And to those who choose to aid the CCP in its unlawful cyber activities, these charges should demonstrate that we will use all available tools to identify you, indict you, and expose your malicious activity for all the world to see.”

    According to court documents, the MPS and MSS employed an extensive network of private companies and contractors in China to hack and steal information in a manner that obscured the PRC government’s involvement. In some cases, the MPS and MSS paid private hackers in China to exploit specific victims. In many other cases, the hackers targeted victims speculatively. Operating from their safe haven and motivated by profit, this network of private companies and contractors in China cast a wide net to identify vulnerable computers, exploit those computers, and then identify information that it could sell directly or indirectly to the PRC government. The result of this largely indiscriminate approach was more worldwide computer intrusion victims, more systems worldwide left vulnerable to future exploitation by third parties, and more stolen information, often of no interest to the PRC government and, therefore, sold to other third-parties. Additional information regarding the indictments and the PRC’s hacker-for-hire ecosystem is available in Public Service Announcements published by the FBI today.

    U.S. v. Wu Haibo et al., Southern District of New York

    Today, a federal court in Manhattan unsealed an indictment charging eight i-Soon employees and two MPS officers for their involvement, from at least in or around 2016 through in or around 2023, in the numerous and widespread hacking of email accounts, cell phones, servers, and websites. The Department also announced today the court-authorized seizure of the primary internet domain used by i-Soon to advertise its business.

    “State-sponsored hacking is an acute threat to our community and national security,” said Acting U.S. Attorney Matthew Podolsky for the Southern District of New York. “For years, these 10 defendants — two of whom we allege are PRC officials — used sophisticated hacking techniques to target religious organizations, journalists, and government agencies, all to gather sensitive information for the use of the PRC. These charges will help stop these state-sponsored hackers and protect our national security. The career prosecutors of this office and our law enforcement partners will continue to uncover alleged state-sponsored hacking schemes, disrupt them, and bring those responsible to justice.”

    The defendants remain at large and wanted by the FBI. Concurrent with today’s announcement,  the U.S. Department of State’s Rewards for Justice (RFJ) program, administered by the Diplomatic Security Service, announced a reward of up to $10 million for information leading to the identification or location of any person who, while acting at the direction or under the control of a foreign government, engages in certain malicious cyber activities against U.S. critical infrastructure in violation of the Computer Fraud and Abuse Act. The reward is offered for the following individuals who are alleged to have worked in various capacities to direct or carry out i-Soon’s malicious cyber activity:

    • Wu Haibo (吴海波), Chief Executive Officer
    • Chen Cheng (陈诚), Chief Operating Officer
    • Wang Zhe (王哲), Sales Director
    • Liang Guodong (梁国栋), Technical Staff
    • Ma Li (马丽), Technical Staff
    • Wang Yan (王堰), Technical Staff
    • Xu Liang (徐梁), Technical Staff
    • Zhou Weiwei (周伟伟), Technical Staff
    • Wang Liyu (王立宇), MPS Officer
    • Sheng Jing (盛晶), MPS Officer

    i-Soon and its employees, to include the defendants, generated tens of millions of dollars in revenue as a key player in the PRC’s hacker-for-hire ecosystem. In some instances, i-Soon conducted computer intrusions at the request of the MSS or MPS, including cyber-enabled transnational repression at the direction of the MPS officer defendants. In other instances, i-Soon conducted computer intrusions on its own initiative and then sold, or attempted to sell, the stolen data to at least 43 different bureaus of the MSS or MPS in at least 31 separate provinces and municipalities in China. i-Soon charged the MSS and MPS between approximately $10,000 and $75,000 for each email inbox it successfully exploited. i-Soon also trained MPS employees how to hack independently of i-Soon and offered a variety of hacking methods for sale to its customers.

    The defendants’ U.S.-located targets included a large religious organization that previously sent missionaries to China and was openly critical of the PRC government and an organization focused on promoting human rights and religious freedom in China. In addition, the defendants targeted multiple news organizations in the United States, including those that have opposed the CCP or delivered uncensored news to audiences in Asia, including China and the New York State Assembly, one of whose representatives had communicated with members of a religious organization banned in China.

    The defendants’ foreign-located targets included a religious leader and his office, and a Hong Kong newspaper that i-Soon considered as being opposed to the PRC government. The defendants also targeted the foreign ministries of Taiwan, India, South Korea, and Indonesia.

    Assistant U.S. Attorneys Ryan B. Finkel, Steven J. Kochevar, and Kevin Mead for the Southern District of New York and Trial Attorney Gregory J. Nicosia Jr. of the National Security Division’s National Security Cyber Section are prosecuting the case.

    U.S. v. Yin Kecheng and U.S. v. Zhou Shuai et al., District of Columbia

    Today, a federal court unsealed two indictments charging APT27 actors Yin Kecheng (尹可成) and Zhou Shuai (周帅) also known as “Coldface” for their involvement in the multi-year, for-profit computer intrusion campaigns dating back, in the case of Yin, to 2013. The Department also announced today court-authorized seizures of internet domains and computer server accounts used by Yin and Zhou to facilitate their hacking activity.

    The defendants remain at large. View the FBI’s Wanted posters for Shuai and Kecheng here.

    Concurrent with today’s announcement, the Department of States State’s Bureau of International Narcotics and Law Enforcement Affairs is announcing two reward offers under the Transnational Organized Crime Rewards Program (TOCRP) of up to $2 million each for information leading to the arrests and convictions, in any country, of malicious cyber actors Yin Kecheng and Zhou Shuai, both Chinese nationals residing in China.

    “These indictments and actions show this office’s long-standing commitment to vigorously investigate and hold accountable Chinese hackers and data brokers who endanger U.S. national security and other victims across the globe,” said Interim U.S. Attorney Edward R. Martin Jr. for the District of Columbia. “The defendants in these cases have been hacking for the Chinese government for years, and these indictments lay out the strong evidence showing their criminal wrongdoing. We again demand that the Chinese government to put a stop to these brazen cyber criminals who are targeting victims across the globe and then monetizing the data they have stolen by selling it across China.”

    The APT27 group to which Yin and Zhou belong is also known to private sector security researchers as “Threat Group 3390,” “Bronze Union,” “Emissary Panda,” “Lucky Mouse,” “Iron Tiger,” “UTA0178,” “UNC 5221,” and “Silk Typhoon.” As alleged in court documents, between August 2013 and December 2024, Yin, Zhou, and their co-conspirators exploited vulnerabilities in victim networks, conducted reconnaissance once inside those networks, and installed malware, such as PlugX malware, that provided persistent access. The defendants and their co-conspirators then identified and stole data from the compromised networks by exfiltrating it to servers under their control. Next, they brokered stolen data for sale and provided it to various customers, only some of whom had connections to the PRC government and military. For example, Zhou sold data stolen by Yin through i-Soon, whose primary customers, as noted above, were PRC government agencies, including the MSS and the MPS.

    The defendants’ motivations were financial and, because they were profit-driven, they targeted broadly, rendering victim systems vulnerable well beyond their pilfering of data and other information that they could sell. Between them, Yin and Zhou sought to profit from the hacking of numerous U.S.-based technology companies, think tanks, law firms, defense contractors, local governments, health care systems, and universities, leaving behind them a wake of millions of dollars in damages.

    The documents related to the seizure warrants, also unsealed today, further allege that Yin and Zhou continued to engage in hacking activity, including Yin’s involvement in the recently announced hack of Treasury between approximately September and December 2024. Virtual private servers used to conduct the Treasury intrusion belonged to, and were controlled by, an account that Yin and his co-conspirators established. Yin and his co-conspirators used that same account and other linked accounts they controlled to lease servers used for additional malicious cyber activity. The seizure warrant unsealed today allowed the FBI to seize the virtual private servers and other infrastructure used by the defendants to perpetrate these crimes.

    On Jan. 17, Treasury’s Office of Foreign Assets Control (OFAC) announced sanctions against Yin for his role in hacking that agency between September and December 2024. Concurrent with today’s indictments, OFAC also announced sanctions on Zhou and Shanghai Heiying Information Technology Company Ltd., a company operated by Zhou for purposes of his hacking activity.

    Private sector partners are also taking voluntary actions to raise awareness and strengthen defenses against the PRC’s malicious cyber activity. Today, Microsoft published research that highlights its unique, updated insights into Silk Typhoon tactics, techniques, and procedures specifically its targeting of the IT supply chain.

    Assistant U.S. Attorneys Jack F. Korba and Tejpal S. Chawla for the District of Columbia and Trial Attorney Tanner Kroeger of the National Security Division’s National Security Cyber Section are prosecuting the case.

    ***

    The above disruptive actions targeting PRC malicious cyber activities were the result of investigations conducted by FBI New York and Washington Field Offices, FBI Cyber Division, the Naval Criminal Investigative Service. The U.S. Attorney’s Offices for the Southern District of New York and District of Columbia and the National Security Division’s National Security Cyber Section are prosecuting the case.

    The Department acknowledges the value of public-private partnerships in combating advanced cyber threats and recognizes Microsoft, Volexity, PwC, and Mandiant for their valuable assistance in these investigations.

    The details in the above-described indictments and warrants are merely allegations. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News –

    March 6, 2025
  • MIL-OSI Security: Chinese Nationals with Ties to the PRC Government and “APT27” Charged in a Computer Hacking Campaign for Profit, Targeting Numerous U.S. Companies, Institutions, and Municipalities

    Source: Office of United States Attorneys

    Department Seizes Virtual Private Server Account and Domains Tied to Malicious Activity to include the U.S. Department of Treasury Hack

                WASHINGTON – A federal judge in Washington, D.C., today, unsealed two separate indictments that allege Chinese nationals Yin Kecheng, 38, (尹 可成) a/k/a “YKC” (“YIN”) and Zhou Shuai, 45, (周帅) a/k/a “Coldface” (“ZHOU”) violated various federal statutes by participating in years-long, sophisticated computer hacking conspiracies that successfully targeted a wide variety of U.S.-based victims from 2011 to the present-day. According to the documents unsealed today, the defendants targeted a multitude of U.S. victim companies, municipalities, and organizations for profit, causing millions of dollars’ worth of damages. YIN and ZHOU, who have ties to the government of the People’s Republic of China (“PRC”), are alleged to have stolen and exfiltrated data from numerous U.S.-based technology companies, think tanks, defense contractors, government municipalities, and universities that they later brokered for sale. Arrest warrants have been issued for YIN and ZHOU, who both remain fugitives.

                The unsealing by the U.S. Attorney’s Office for the District of Columbia is part of the coordinated effort by Department of Justice (the “Department”), other U.S. Attorney’s Offices, the U.S. Department of Treasury (“Treasury”), and private sector partners that highlights the Chinese government’s unique role in intentionally promoting and protecting the wide-scale computer hacking activity by its citizens. According to court documents unsealed today, the PRC Ministry of Public Security (“MPS”) and Ministry of State Security (“MSS”) directed or financed Chinese hackers, such as the defendants, to conduct computer intrusions against high-value targets in the United States and elsewhere. Victims include U.S.-based critics and dissidents of the PRC, a large religious organization in the United States, the foreign ministries of multiple governments in Asia, and U.S. federal and state government agencies, including most recently in 2024.

                According to court documents, the MPS and MSS employed an extensive network of private companies and contractors in China to hack and steal information in a manner that obscured the PRC government’s direct involvement. By employing these hackers-for-hire, the PRC government further allowed these same hackers to profit by committing additional computer intrusions around the world with impunity, and then to sell stolen data through Chinese data brokers. The PRC government’s state-sponsorship and protection of these hackers resulted in the loss of sensitive, valuable and personal identification information that was a direct harm to U.S. entities and other foreign governments and victims.

                In conjunction with the unsealing, the Department announced the judicially authorized seizure of internet domains linked to YIN that he used in facilitating the conspiracy’s network intrusion activity. In addition, the Department announced the judicially authorized seizure of a Virtual Private Server (“VPS”) account linked to ZHOU that he used to facilitate network intrusion activity. In conjunction with these actions, the Treasury announced sanctions against ZHOU and his company Shanghai Heiying Information Technology company, Limited (“Shanghai Heiying”).  YIN was previously sanctioned for his role in the recent Treasury network compromise in January 2025.

    “These indictments and actions show this Office’s long-standing commitment to vigorously investigate and hold accountable Chinese hackers and data brokers who endanger U.S. national security and other victims across the globe,” said U.S. Attorney Edward R. Martin, Jr. “The defendants in these cases have been hacking for the Chinese government for years, and these indictments lay out the strong evidence showing their criminal wrongdoing. We, again, demand that the Chinese government put a stop to these brazen cyber criminals who are targeting victims across the globe and then monetizing the data they have stolen by selling it across China.”

                “The defendants allegedly waged a yearslong hacking campaign against U.S.-based organizations to steal their data and sell it to various customers, some of whom had connections to the Chinese government,” said FBI Acting Assistant Director in Charge Roman Rozhavsky of the FBI Washington Field Office. “Today’s indictment is the first step toward bringing these perpetrators to justice for endangering U.S. national security and causing significant financial losses for both U.S. and foreign companies. The FBI and our partners will continue to pursue these hostile cyber actors to the full extent of the law.”

                “The defendants’ years-long hacking conspiracy to steal data from Cleared Defense Contractors that support the U.S. military—among many other U.S.-based victims—and sell it to customers with ties to the Chinese government poses a significant threat to our national security,” said NCIS Cyber Operations Field Office Special Agent in Charge Josh Stanley. “NCIS remains committed to working with the FBI and our law enforcement partners around the world to expose malicious actors who seek to undermine the cybersecurity of the Department of the Navy.”

                “The Department of State appreciates the opportunity to collaborate with the Department of Treasury, FBI, and the U.S. Attorney’s Office for the District of Columbia in announcing today’s actions,” said Senior Bureau Official F. Cartwright Weiland of the Department of State’s Bureau of International Narcotics and Law Enforcement Affairs (INL). “With reward offers up to $2 million each for malicious cyber actors Zhou Shuai and Yin KeCheng under the Transnational Organized Crime Rewards Program, we ask the public to contact the FBI with tips to help bring these cybercriminals to justice.”

    Overview

                Today’s announcement reflects nearly a decade-long effort by the Department and the FBI.   The action targets actors that various security researchers have historically referred to as “APT27,” “Threat Group 3390,” “Bronze Union,” “Emissary Panda,” “Lucky Mouse,” and “Iron Tiger,” and more recently referred to as “UTA0178,” “UNC 5221,” and “Silk Typhoon.” 

                The Department obtained a 19-count indictment against YIN on May 2, 2018 (the “2018 Indictment”) from a grand jury sitting in the United States District Court for the District of Columbia. The 2018 Indictment, which alleges conduct between August 2013 and December 2015, charges wire fraud, aggravated identity theft, and violations of the Computer Fraud and Abuse Act (“CFAA”).

                Another federal grand jury in the District of Columbia indicted both YIN and ZHOU on March 28, 2023 (the “2023 Indictment”), with similar offenses.  Specifically, the 2023 Indictment, which alleges conduct between June 2018 and November 2020, charges conspiracy, wire fraud, various violations of the CFAA, aggravated identity theft, and money laundering. 

                On March 4, 2025, a federal magistrate judge sitting in the District of Columbia authorized FBI to seize a VPS account and multiple internet domains involved in the criminal activity.  According to the unsealed affidavits in support of those warrants, ZHOU utilized the VPS account to create additional accounts used to facilitate computer intrusion activity and to discuss the sale of access to compromised computer networks. Separately, YIN utilized his own servers and stood up the seized domains to exploit victim computer networks to include networks at Treasury.

    Computer Hacking Scheme

                As alleged in the documents unsealed today, at various points between August 2013 and December 2024, YIN, ZHOU, and their unindicted co-conspirators used sophisticated hacking tools and techniques in their efforts to overcome network defenses and avoid detection of numerous hardened targets in the United States and around the world. The defendants and their co-conspirators would routinely scan victim networks for vulnerabilities, exploit those vulnerabilities with sophisticated hacking techniques, and conduct reconnaissance once inside a victim’s network. The defendants and their co-conspirators and would install malware that would allow them to maintain persistent access and enable them to communicate with malicious external servers and other hacking infrastructure. The defendants and their co-conspirators would identify and steal data from the compromised networks by exfiltrating the data to servers under their control. The stolen data was then brokered for sale and provided to various customers, some of whom had connections to the PRC government and military.

    Targeting of U.S. Victims

                According to the 2018 Indictment, YIN targeted U.S.-based defense contractors, technology firms, and think tanks, among other victims. The 2018 Indictment alleges YIN openly discussed his preference for targeting American victims. For example, on one occasion in September 2013, YIN told an associate he wanted to “mess with the American military” and “break into a big target” so that he could earn enough money to buy a car. YIN used mapping software to identify network vulnerabilities for the purpose of gaining unlawful access to victim computer and installing malware. YIN used stolen network credentials to maintain persistent access to victim networks and utilized intermediary servers or “hop points” and malicious domains to remotely access and exfiltrate victim computer data.

                According to the 2023 Indictment, YIN, ZHOU, and others targeted U.S.-based companies like technology and defense contractors, law firms, communication service providers, local governments, health care systems, and think tanks. The 2023 Indictment charges YIN and ZHOU with scanning victim networks for access points and also exploiting zero-day vulnerabilities. Once inside the networks, YIN other conspirators would then install malware such as web shells to maintain persistent access. YIN and other conspirators would then use hop point servers to exfiltrate stolen data to servers under YIN’s control. ZHOU then brokered access to such stolen data to interested third parties for a financial profit. The indictment further alleged that YIN, ZHOU, and other conspirators laundered cryptocurrency payments for their operational infrastructure from locations outside of the United States through the U.S. financial system.

                The affidavit in support of the seizure warrant for the VPS account alleges that ZHOU used servers created by the account in order to establish a virtual private network (“VPN”) that would encrypt network traffic such that the true location and IP address of the actor or actors would be obfuscated. ZHOU also used the VPS accounts to create other accounts through which he communicated with buyers who were interested in obtaining access to computer networks compromised by YIN. ZHOU also used the accounts for victim reconnaissance purposes.

                The affidavit in support of the seizure of the domains alleges that funds used to purchase computer network infrastructure used in numerous victim network breaches ultimately connected to an account registered in YIN’s name, from China, using an email address and phone number belonging to YIN. Of particular note, a virtual private server account controlled by YIN was associated with the compromise at Treasury.

                This case is being investigated by the FBI’s Washington Field Office and the Naval Criminal Investigative Service (NCIS) who continue to investigate malicious cyber activity associated with these defendants and threat actors and continue to notify affected victims immediately once any networks intrusions are discovered. The FBI’s Cyber Division and Department of Defense’s Cyber Crimes Center provided valuable assistance to the investigation.  Private partners from Microsoft, Volexity, Palo Alto Networks Unit 42, and Mandiant also provided valuable assistance with this investigation. The case is being prosecuted by Assistant U.S. Attorneys Jack F. Korba, and Tejpal S. Chawla, and National Security Division’s National Security Cyber Section Trial Attorney Tanner Kroeger. Paralegal Specialist Michael Watts and former Assistant U.S. Attorneys Demian Ahn and Opher Shweiki for the United States Attorney’s Office in the District of Columbia provided assistance on this case.

                An indictment is merely an allegation and a defendant is presumed innocent unless and until proven guilty beyond a reasonable doubt in a court of law.  

    MIL Security OSI –

    March 6, 2025
  • MIL-OSI Security: Justice Department Charges 12 Chinese Contract Hackers and Law Enforcement Officers in Global Computer Intrusion Campaigns

    Source: United States Attorneys General

    Chinese Law Enforcement and Intelligence Services Leveraged China’s Reckless and Indiscriminate Hacker-for-Hire Ecosystem, Including the ‘APT 27’ Group, to Suppress Free Speech and Dissent Globally and to Steal Data from Numerous Organizations Worldwide,

    Note: View the indictments in U.S. v. Wu Haibo et al., U.S. v. Yin Kecheng, U.S. v. Zhou Shuai et al. here.

    The Justice Department, FBI, Naval Criminal Investigative Service, and Departments of State and the Treasury announced today their coordinated efforts to disrupt and deter the malicious cyber activities of 12 Chinese nationals, including two officers of the People’s Republic of China’s (PRC) Ministry of Public Security (MPS), employees of an ostensibly private PRC company, Anxun Information Technology Co. Ltd. (安洵信息技术有限公司) also known as “i-Soon,” and members of Advanced Persistent Threat 27 (APT27).

    These malicious cyber actors, acting as freelancers or as employees of i-Soon, conducted computer intrusions at the direction of the PRC’s MPS and Ministry of State Security (MSS) and on their own initiative. The MPS and MSS paid handsomely for stolen data. Victims include U.S.-based critics and dissidents of the PRC, a large religious organization in the United States, the foreign ministries of multiple governments in Asia, and U.S. federal and state government agencies, including the U.S. Department of the Treasury (Treasury) in late 2024.

    “The Department of Justice will relentlessly pursue those who threaten our cybersecurity by stealing from our government and our people,” said Sue J. Bai, head of the Justice Department’s National Security Division. “Today, we are exposing the Chinese government agents directing and fostering indiscriminate and reckless attacks against computers and networks worldwide, as well as the enabling companies and individual hackers that they have unleashed. We will continue to fight to dismantle this ecosystem of cyber mercenaries and protect our national security.”

    “The FBI is committed to protecting Americans from foreign cyber-attacks,” said Assistant Director Bryan Vorndran of the FBI’s Cyber Division. “Today’s announcements reveal that the Chinese Ministry of Public Security has been paying hackers-for-hire to inflict digital harm on Americans who criticize the Chinese Communist Party (CCP). To those victims who bravely came forward with evidence of intrusions, we thank you for standing tall and defending our democracy. And to those who choose to aid the CCP in its unlawful cyber activities, these charges should demonstrate that we will use all available tools to identify you, indict you, and expose your malicious activity for all the world to see.”

    According to court documents, the MPS and MSS employed an extensive network of private companies and contractors in China to hack and steal information in a manner that obscured the PRC government’s involvement. In some cases, the MPS and MSS paid private hackers in China to exploit specific victims. In many other cases, the hackers targeted victims speculatively. Operating from their safe haven and motivated by profit, this network of private companies and contractors in China cast a wide net to identify vulnerable computers, exploit those computers, and then identify information that it could sell directly or indirectly to the PRC government. The result of this largely indiscriminate approach was more worldwide computer intrusion victims, more systems worldwide left vulnerable to future exploitation by third parties, and more stolen information, often of no interest to the PRC government and, therefore, sold to other third-parties. Additional information regarding the indictments and the PRC’s hacker-for-hire ecosystem is available in Public Service Announcements published by the FBI today.

    U.S. v. Wu Haibo et al., Southern District of New York

    Today, a federal court in Manhattan unsealed an indictment charging eight i-Soon employees and two MPS officers for their involvement, from at least in or around 2016 through in or around 2023, in the numerous and widespread hacking of email accounts, cell phones, servers, and websites. The Department also announced today the court-authorized seizure of the primary internet domain used by i-Soon to advertise its business.

    “State-sponsored hacking is an acute threat to our community and national security,” said Acting U.S. Attorney Matthew Podolsky for the Southern District of New York. “For years, these 10 defendants — two of whom we allege are PRC officials — used sophisticated hacking techniques to target religious organizations, journalists, and government agencies, all to gather sensitive information for the use of the PRC. These charges will help stop these state-sponsored hackers and protect our national security. The career prosecutors of this office and our law enforcement partners will continue to uncover alleged state-sponsored hacking schemes, disrupt them, and bring those responsible to justice.”

    The defendants remain at large and wanted by the FBI. Concurrent with today’s announcement,  the U.S. Department of State’s Rewards for Justice (RFJ) program, administered by the Diplomatic Security Service, announced a reward of up to $10 million for information leading to the identification or location of any person who, while acting at the direction or under the control of a foreign government, engages in certain malicious cyber activities against U.S. critical infrastructure in violation of the Computer Fraud and Abuse Act. The reward is offered for the following individuals who are alleged to have worked in various capacities to direct or carry out i-Soon’s malicious cyber activity:

    • Wu Haibo (吴海波), Chief Executive Officer
    • Chen Cheng (陈诚), Chief Operating Officer
    • Wang Zhe (王哲), Sales Director
    • Liang Guodong (梁国栋), Technical Staff
    • Ma Li (马丽), Technical Staff
    • Wang Yan (王堰), Technical Staff
    • Xu Liang (徐梁), Technical Staff
    • Zhou Weiwei (周伟伟), Technical Staff
    • Wang Liyu (王立宇), MPS Officer
    • Sheng Jing (盛晶), MPS Officer

    i-Soon and its employees, to include the defendants, generated tens of millions of dollars in revenue as a key player in the PRC’s hacker-for-hire ecosystem. In some instances, i-Soon conducted computer intrusions at the request of the MSS or MPS, including cyber-enabled transnational repression at the direction of the MPS officer defendants. In other instances, i-Soon conducted computer intrusions on its own initiative and then sold, or attempted to sell, the stolen data to at least 43 different bureaus of the MSS or MPS in at least 31 separate provinces and municipalities in China. i-Soon charged the MSS and MPS between approximately $10,000 and $75,000 for each email inbox it successfully exploited. i-Soon also trained MPS employees how to hack independently of i-Soon and offered a variety of hacking methods for sale to its customers.

    The defendants’ U.S.-located targets included a large religious organization that previously sent missionaries to China and was openly critical of the PRC government and an organization focused on promoting human rights and religious freedom in China. In addition, the defendants targeted multiple news organizations in the United States, including those that have opposed the CCP or delivered uncensored news to audiences in Asia, including China and the New York State Assembly, one of whose representatives had communicated with members of a religious organization banned in China.

    The defendants’ foreign-located targets included a religious leader and his office, and a Hong Kong newspaper that i-Soon considered as being opposed to the PRC government. The defendants also targeted the foreign ministries of Taiwan, India, South Korea, and Indonesia.

    Assistant U.S. Attorneys Ryan B. Finkel, Steven J. Kochevar, and Kevin Mead for the Southern District of New York and Trial Attorney Gregory J. Nicosia Jr. of the National Security Division’s National Security Cyber Section are prosecuting the case.

    U.S. v. Yin Kecheng and U.S. v. Zhou Shuai et al., District of Columbia

    Today, a federal court unsealed two indictments charging APT27 actors Yin Kecheng (尹可成) and Zhou Shuai (周帅) also known as “Coldface” for their involvement in the multi-year, for-profit computer intrusion campaigns dating back, in the case of Yin, to 2013. The Department also announced today court-authorized seizures of internet domains and computer server accounts used by Yin and Zhou to facilitate their hacking activity.

    The defendants remain at large. View the FBI’s Wanted posters for Shuai and Kecheng here.

    Concurrent with today’s announcement, the Department of States State’s Bureau of International Narcotics and Law Enforcement Affairs is announcing two reward offers under the Transnational Organized Crime Rewards Program (TOCRP) of up to $2 million each for information leading to the arrests and convictions, in any country, of malicious cyber actors Yin Kecheng and Zhou Shuai, both Chinese nationals residing in China.

    “These indictments and actions show this office’s long-standing commitment to vigorously investigate and hold accountable Chinese hackers and data brokers who endanger U.S. national security and other victims across the globe,” said Interim U.S. Attorney Edward R. Martin Jr. for the District of Columbia. “The defendants in these cases have been hacking for the Chinese government for years, and these indictments lay out the strong evidence showing their criminal wrongdoing. We again demand that the Chinese government to put a stop to these brazen cyber criminals who are targeting victims across the globe and then monetizing the data they have stolen by selling it across China.”

    The APT27 group to which Yin and Zhou belong is also known to private sector security researchers as “Threat Group 3390,” “Bronze Union,” “Emissary Panda,” “Lucky Mouse,” “Iron Tiger,” “UTA0178,” “UNC 5221,” and “Silk Typhoon.” As alleged in court documents, between August 2013 and December 2024, Yin, Zhou, and their co-conspirators exploited vulnerabilities in victim networks, conducted reconnaissance once inside those networks, and installed malware, such as PlugX malware, that provided persistent access. The defendants and their co-conspirators then identified and stole data from the compromised networks by exfiltrating it to servers under their control. Next, they brokered stolen data for sale and provided it to various customers, only some of whom had connections to the PRC government and military. For example, Zhou sold data stolen by Yin through i-Soon, whose primary customers, as noted above, were PRC government agencies, including the MSS and the MPS.

    The defendants’ motivations were financial and, because they were profit-driven, they targeted broadly, rendering victim systems vulnerable well beyond their pilfering of data and other information that they could sell. Between them, Yin and Zhou sought to profit from the hacking of numerous U.S.-based technology companies, think tanks, law firms, defense contractors, local governments, health care systems, and universities, leaving behind them a wake of millions of dollars in damages.

    The documents related to the seizure warrants, also unsealed today, further allege that Yin and Zhou continued to engage in hacking activity, including Yin’s involvement in the recently announced hack of Treasury between approximately September and December 2024. Virtual private servers used to conduct the Treasury intrusion belonged to, and were controlled by, an account that Yin and his co-conspirators established. Yin and his co-conspirators used that same account and other linked accounts they controlled to lease servers used for additional malicious cyber activity. The seizure warrant unsealed today allowed the FBI to seize the virtual private servers and other infrastructure used by the defendants to perpetrate these crimes.

    On Jan. 17, Treasury’s Office of Foreign Assets Control (OFAC) announced sanctions against Yin for his role in hacking that agency between September and December 2024. Concurrent with today’s indictments, OFAC also announced sanctions on Zhou and Shanghai Heiying Information Technology Company Ltd., a company operated by Zhou for purposes of his hacking activity.

    Private sector partners are also taking voluntary actions to raise awareness and strengthen defenses against the PRC’s malicious cyber activity. Today, Microsoft published research that highlights its unique, updated insights into Silk Typhoon tactics, techniques, and procedures specifically its targeting of the IT supply chain.

    Assistant U.S. Attorneys Jack F. Korba and Tejpal S. Chawla for the District of Columbia and Trial Attorney Tanner Kroeger of the National Security Division’s National Security Cyber Section are prosecuting the case.

    ***

    The above disruptive actions targeting PRC malicious cyber activities were the result of investigations conducted by FBI New York and Washington Field Offices, FBI Cyber Division, the Naval Criminal Investigative Service. The U.S. Attorney’s Offices for the Southern District of New York and District of Columbia and the National Security Division’s National Security Cyber Section are prosecuting the case.

    The Department acknowledges the value of public-private partnerships in combating advanced cyber threats and recognizes Microsoft, Volexity, PwC, and Mandiant for their valuable assistance in these investigations.

    The details in the above-described indictments and warrants are merely allegations. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI –

    March 6, 2025
  • MIL-OSI Security: Eielson Airman Sentenced to Five Years for Possessing Child Pornography

    Source: Federal Bureau of Investigation (FBI) State Crime News

    FAIRBANKS, Alaska – An Eielson Airman was sentenced today to five years in prison and will serve 15 years on supervised release for paying to receive child pornography.

    According to court documents, on Nov. 7, 2023, Kyle Cozens, 32, who was stationed on Eielson Air Force Base, was interviewed by the FBI in a related case from Illinois involving child sexual abuse material (CSAM). Cozens allowed agents to review messages on his phone and they observed CSAM images of a known victim. Agents obtained a search warrant for Cozens’ phone and discovered he was communicating with individuals on messaging apps and buying CSAM images from them. Agents discovered multiple CSAM images and videos on his phone, with some visuals depicting prepubescent females.

    On March 1, 2024, law enforcement searched Cozens’ residence and seized over 30 electronic devices. To date, law enforcement has identified over 80 videos and over 680 images depicting child sexual abuse on Cozens’ devices.

    On Nov. 15, 2024, Cozens pleaded guilty to one count of receipt of child pornography. In addition to prison time and supervised release, Cozens is required to register as a sex offender upon release from prison as part of his sentence.

    “The widespread dissemination of images of children forced to endure sexual abuse is a horrific crime that law enforcement fights every day. Mr. Cozens contributed to the revictimization of those children by paying for visuals of child sexual abuse,” said First Assistant U.S. Attorney Kathryn R. Vogel for the District of Alaska. “My office will continue to protect our most vulnerable by partnering with law enforcement to find and prosecute anyone who targets children for nefarious purposes.”

    “The defendant purchased and possessed large amounts of CSAM, directly contributing to online child exploitation and the re-victimization of young children,” said Special Agent in Charge Rebecca Day of the FBI Anchorage Field Office. “This sentencing underscores the FBI’s commitment to ensuring child predators are identified and held accountable for their crimes against children.”

    “Interagency partnerships, like the ones utilized in this case, are vital to fighting child exploitation,” said Special Agent Tyler Pierson, Air Force Office of Special Investigations Detachment 632.  “AFOSI is committed to these partnerships and our mission of protecting the Department of the Air Force from criminal behavior that threatens the mission, equipment and people of the Department.”

    The FBI Anchorage Field Office, Fairbanks Resident Agency, and U.S. Air Force Office of Special Investigations investigated the case, with assistance from the FBI Springfield Field Office.

    Assistant U.S. Attorney Carly Vosacek prosecuted the case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit https://www.justice.gov/psc.

    ###

    MIL Security OSI –

    March 6, 2025
  • MIL-OSI USA: 2025-33 WALGREENS AGREES TO NEARLY $98 MILLION SETTLEMENT TO RESOLVE ALLEGATIONS IT BILLED THE GOVERNMENT FOR UNCOLLECTED PRESCRIPTIONS

    Source: US State of Hawaii

    2025-33 WALGREENS AGREES TO NEARLY $98 MILLION SETTLEMENT TO RESOLVE ALLEGATIONS IT BILLED THE GOVERNMENT FOR UNCOLLECTED PRESCRIPTIONS

    Posted on Mar 4, 2025 in Latest Department News, Newsroom

     

    STATE OF HAWAIʻI

    KA MOKU ʻĀINA O HAWAIʻI

     

    DEPARTMENT OF THE ATTORNEY GENERAL

    KA ʻOIHANA O KA LOIO KUHINA

     

    JOSH GREEN, M.D.
    GOVERNOR

    KE KIAʻĀINA

     

    ANNE LOPEZ

    ATTORNEY GENERAL

    LOIO KUHINA

     

    WALGREENS AGREES TO PAY NEARLY $98 MILLION TO RESOLVE ALLEGATIONS IT BILLED THE GOVERNMENT FOR UNCOLLECTED PRESCRIPTIONS

     

    News Release 2025-33

     

    FOR IMMEDIATE RELEASE                                                       

    March 4, 2025

     

    HONOLULU – Attorney General Anne Lopez announced today that the state of Hawai‘i has joined the 49 other attorneys general in a settlement against Walgreens Boots Alliance, Inc. and Walgreen Co. (together, Walgreens). Under the terms of the agreement, Walgreens — which operates one of the largest retail pharmacy chains in the country from its headquarters in Deerfield, Illinois — will pay $97.8 million to resolve allegations that it unlawfully billed government health care programs for prescriptions that were never collected or otherwise received by patients.

     

    The settlement agreement will resolve allegations set forth in two qui tam lawsuits: the Turck Civil Action (United States ex rel. Turck, et al. v. Walgreens Boots Alliance, Inc., et al., No. 4:19-cv-315 (E.D. Tex. filed Apr. 26, 2019)); and the Jacob Civil Action(United States, et al. ex rel. Jacob v. Walgreens Boots Alliance, Inc., No. 8:20-cv-858-T-60TGW (M.D. Fla. filed Apr. 23, 2020)). These lawsuits specifically allege that between 2009 and 2020, Walgreens unlawfully billed Medicare, Medicaid, and other government health care programs for prescriptions drugs that were never picked up by beneficiaries.  As a result of this unlawful conduct, Walgreens received tens of millions of dollars for uncollected prescriptions that it never actually provided to patients.

     

    After the suits were filed, Walgreens implemented enhancements to its billing systems designed to prevent any future unlawful billing for uncollected prescriptions. Under the terms of the settlement agreement, Walgreens received credit for self-disclosing certain claims, and for previously refunding $66.3 million in connection with the settled claims. The total recovery for all Medicaid programs under the settlement is $9.6 million. Of that amount, Hawai‘i will receive $3,524.83 in recoveries.

     

    A National Association of Medicaid Fraud Control Units (NAMFCU) Team investigated the allegations in conjunction with the U.S. Department of Justice and United States Attorneys’ Offices in Texas and Florida. The NAMFCU Team included representatives from the respective Office of the Attorney General for the states of Wisconsin, California, Texas, Maine, Oregon and Massachusetts.

     

    Landon M.M. Murata, the Director of the Medicaid Fraud Control Unit (Hawai‘i MFCU), under the Department of the Attorney General, and Judy Mohr Peterson, Ph.D., Med-QUEST Division Administrator at the Department of Human Services, entered into the settlement agreement on behalf of the state of Hawai‘i.

     

    “This is a significant win in the fight against healthcare fraud in our country. We appreciate all the hard work and dedication of our federal and state partners who made this settlement possible. It is important that remain vigilant to ensure that taxpayer dollars dedicated to supporting our critical healthcare programs like Medicaid, are not being squandered.” said Hawaiʻi MFCU Director Murata.

     

    The Hawai‘i MFCU is a specialized unit within the Department of the Attorney General that is charged with conducting criminal and civil investigations and prosecutions of (1) provider fraud against the Medicaid Program, (2) fraud in the administration of the Medicaid Program, and (3) abuse and neglect of Medicaid beneficiaries and residents of board and care facilities throughout the state of Hawai‘i.

     

    The Walgreens settlement agreement with Hawaiʻi can be found here.

     

    # # #

     

    Media contacts:

    Dave Day

    Special Assistant to the Attorney General

    Office: 808-586-1284                                                  

    Email: [email protected]        

    Web: http://ag.hawaii.gov

     

    Toni Schwartz
    Public Information Officer
    Hawai‘i Department of the Attorney General
    Office:
    808-586-1252
    Cell: 808-379-9249
    Email:
    [email protected] 

    Web: http://ag.hawaii.gov

    MIL OSI USA News –

    March 6, 2025
  • MIL-OSI Security: Illegal Alien Indicted for Conspiracy to Transport Other Aliens and Possession with Intent to Distribute Heroin

    Source: United States Department of Justice (Human Trafficking)

    PHOENIX, Ariz. – Last week, a grand jury returned an indictment against Edgar Guadalupe Jimenez-Aguilar, an illegal alien living in Phoenix, for Conspiracy to Transport Illegal Aliens and Possession with Intent to Distribute Heroin.

    After an investigation, agents from Homeland Security Investigations and United States Border Patrol identified Jimenez-Aguilar as a load driver who picked up aliens in desert areas in Pinal and Pima Counties and transported them to Phoenix. Jimenez-Aguilar also operated a stash house in Phoenix used to harbor the aliens and assumed a coordinator role by recruiting others to act as load drivers.

    From late 2024 through January 2025, agents interviewed other load drivers arrested for transporting aliens, who admitted Jimenez-Aguilar had recruited them. The agents also conducted surveillance on Jimenez-Aguilar and his stash house. On October 3, 2024, officers with the Tohono O’odham Police Department stopped a vehicle and determined four passengers, including two in the trunk of the vehicle, were aliens unlawfully present in the United States. 
     

    Officers learned that the driver had been recruited on social media, had participated in multiple prior smuggling ventures, and had been to Jimenez-Aguilar’s stash house to unload the aliens. On January 28, 2025, agents stopped a Jeep Grand Cherokee in Mesa and identified the driver as Jimenez-Aguilar via his Sonoran driver’s license. Inside the vehicle, agents located approximately 297 grams of black tar heroin.

    Possession with Intent to Distribute Heroin carries a minimum penalty of five years and up to 40 years in prison, as well as a fine of up to $5,000,000. Conspiracy to Transport Illegal Aliens carries a maximum penalty of 10 years in prison and a fine of up to $250,000.

    An indictment is simply a method by which a person is charged with criminal activity and raises no inference of guilt. An individual is presumed innocent until evidence is presented to a jury that establishes guilt beyond a reasonable doubt.

    The United States Border Patrol, Alien Smuggling Unit – Tucson Sector and Homeland Security Investigations – Casa Grande, Pinal and Pima County Sheriff Departments, Tohono O’odham Police Department, and Arizona Department of Public Safety conducted the investigation in this case. Assistant U.S. Attorney Vanessa Kubota, District of Arizona, Phoenix, is handling the prosecution.
     

    CASE NUMBER:           CR-25-00284-PHX-DJH
    RELEASE NUMBER:    2025-027_Jimenez-Aguilar

     

    # # #

    For more information on the U.S. Attorney’s Office, District of Arizona, visit http://www.justice.gov/usao/az/
    Follow the U.S. Attorney’s Office, District of Arizona, on X @USAO_AZ for the latest news.

     

    MIL Security OSI –

    March 6, 2025
←Previous Page
1 … 106 107 108 109 110 … 159
Next Page→
NewzIntel.com

NewzIntel.com

MIL Open Source Intelligence

  • Blog
  • About
  • FAQs
  • Authors
  • Events
  • Shop
  • Patterns
  • Themes

Twenty Twenty-Five

Designed with WordPress