Category: FBI

  • MIL-OSI Security: Final Two Defendants Plead Guilty to Roles in Charleston Methamphetamine Trafficking Organization

    Source: Office of United States Attorneys

    CHARLESTON, W.Va. – Today, Kirt Ray King, 48, of Charleston, pleaded guilty to conspiracy to distribute 500 grams or more of a mixture and substance containing methamphetamine and Anthony Michael Mowery, 48, of Parkersburg, pleaded guilty to conspiracy to distribute 50 grams or more of a mixture and substance containing methamphetamine. King and Mowery admitted to their roles in a Drug Trafficking Organization (DTO) that distributed methamphetamine in the Charleston area.

    According to court documents and statements made in court, from in or about January 2024 to in or about May 2024, King and Mowery conspired with others to distribute methamphetamine in Charleston and within the Southern District of West Virginia.

    King and Mowery are scheduled to be sentenced on April 21, 2025. King faces a mandatory minimum of 10 years and up to life in prison, at least five years and up to a lifetime of supervised release, and a $10,000,000 fine. Mowery faces a mandatory minimum of five years and up to 40 in prison, at least four years of supervised release, and a $5,000,000 fine.

    King and Mowery are among four defendants indicted in the case. Co-defendant Michael Dale Cain, 49, of Parkersburg, pleaded guilty on November 6, 2024, and co-defendant John Wayne Harkless, 46, of Charleston, pleaded guilty on November 20, 2024, each to conspiracy to distribute methamphetamine. Cain and Harkless await sentencing.

    United States Attorney Will Thompson made the announcement and commended the investigative work of the Federal Bureau of Investigation (FBI).

    United States District Judge Joseph R. Goodwin presided over the hearings. Assistant United States Attorney Jeremy B. Wolfe is prosecuting the case.

    The investigation was part of the Department of Justice’s Organized Crime Drug Enforcement Task Force (OCDETF). The program was established in 1982 to conduct comprehensive, multilevel attacks on major drug trafficking and money laundering organizations and is the keystone of the Department of Justice’s drug reduction strategy. OCDETF combines the resources and expertise of its member federal agencies in cooperation with state and local law enforcement. The principal mission of the OCDETF program is to identify, disrupt and dismantle the most serious drug trafficking organizations, transnational criminal organizations and money laundering organizations that present a significant threat to the public safety, economic, or national security of the United States.

    A copy of this press release is located on the website of the U.S. Attorney’s Office for the Southern District of West Virginia. Related court documents and information can be found on PACER by searching for Case No. 2:24-cr-95.

    ###

     

    MIL Security OSI

  • MIL-OSI Security: Lancaster County Brothers Plead Guilty to Vape Shop Armed Robbery

    Source: Office of United States Attorneys

    COLUMBIA, S.C. —Marterrious Tyresse Hannah, 22, and Jaimon Tywan Hannah, 22, both of Lancaster County, have pleaded guilty to their involvement in an armed robbery of a local vape shop. Marterrious pleaded guilty to conspiracy to commit an armed robbery, armed robbery, and possession of a firearm during an armed robbery. Jaimon pleaded guilty to the armed robbery of the vape shop.

    Evidence obtained in the investigation revealed that on July 31, 2023, Marterious Hannah and Jaimon Hannah, brothers, arranged to visit a local vape shop to purchase a handgun from the store clerk, an individual they knew. At the time of sale, Jaimon brandished a handgun and proceeded to rob the clerk. While the Hannah brothers were inside the premise, two other men entered through the open front door and assisted with committing the armed robbery. The robbers stole a safe that contained money, cash from the store clerk, and vape products from the store. At least two defendants were armed as seen on surveillance video. The defendants also stole the firearm they had come to purchase from the store clerk. The firearm was later used and recovered in North Carolina during the commission of a violent crime. 

    Both defendants face a maximum penalty of 20 years in federal prison and face a fine of up to $250,000, restitution, and five years of supervision to follow the term of imprisonment. United States District Judge Mary Geiger Lewis accepted the guilty pleas and will sentence the defendants after receiving and reviewing a sentencing report prepared by the U.S. Probation Office.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.

    This case was investigated by the FBI Columbia Field Office, U.S. Department of Homeland Security, Homeland Security Investigations, and the Lancaster County Sheriff’s Office. Assistant U.S. Attorney William K. Witherspoon is prosecuting the case.

    ###

    MIL Security OSI

  • MIL-OSI Security: Waterbury Drug Trafficker Sentenced to More Than 18 Years in Federal Prison

    Source: Office of United States Attorneys

    Marc H. Silverman, Acting United States Attorney for the District of Connecticut, announced that GAWAYNE FISHER, also known as “Fruit” and “Tank,” 49, of Waterbury, was sentenced today by U.S. District Judge Victor A. Bolden in New Haven to 217 months of imprisonment, followed by five years of supervised release, for heading a large-scale drug trafficking ring while on federal supervised release.

    According to court documents and statements made in court, in August 2009, Fisher was sentenced in New Haven federal court to 10 years of imprisonment and eight years of supervised release for cocaine trafficking offenses.  He was released from prison in February 2015.

    In 2022, the DEA New Haven Task Force, the DEA Tactical Diversion Squad, the Waterbury Police Department, and other law enforcement agencies determined that Fisher was trafficking narcotics while on federal supervised release.  The investigation, which included court-authorized wiretaps on multiple phones, physical surveillance, and controlled purchases of narcotics, revealed that Fisher and others were selling large quantities of heroin, fentanyl, and cocaine, as well as counterfeit oxycodone and alprazolam (Xanax) pills.

    Fisher and three of his associates were arrested on April 13, 2023.  On that date, a search of a West Main Street apartment in Waterbury that Fisher used as a stash location revealed approximately 16 kilograms of cocaine, three kilograms of fentanyl, 125,000 individual glassine bags containing fentanyl, and $7,574 in cash.  A search of Fisher’s residence on Beverly Avenue in Waterbury, and his vehicle, revealed approximately $175,110 in cash.  In addition, a search of a residence on Yale Street in Waterbury that Fisher’s co-conspirator used as a stash location revealed drug-processing equipment, approximately three kilograms of loose fentanyl, and approximately 75,000 individual bags containing fentanyl.

    Fisher has been detained since his arrest.  On January 11, 2024, he pleaded guilty to one count of conspiracy to distribute and to possess with intent to distribute 400 grams or more of fentanyl and five kilograms or more of cocaine, and one count of money laundering.

    Judge Bolden sentenced Fisher to 180 months of imprisonment for the narcotics trafficking and money laundering offenses, and a consecutive 37 months of imprisonment for violating the conditions of his supervised release.

    This investigation was conducted by the DEA New Haven Task Force, the DEA Tactical Diversion Squad, and the Waterbury Police Department, with the assistance of the Federal Bureau of Investigation, U.S. Marshals Service, Connecticut State Police, Internal Revenue Service – Criminal Investigation Division, and the New Haven, Naugatuck, Ansonia, West Haven, Meriden, East Haven, Branford, Shelton, and Bristol Police Departments.

    This case is being prosecuted by Assistant U.S. Attorney Natasha M. Freismuth through the Organized Crime Drug Enforcement Task Forces (OCDETF) Program.  OCDETF identifies, disrupts, and dismantles drug traffickers, money launderers, gangs, and transnational criminal organizations through a prosecutor-led and intelligence-driven approach that leverages the strengths of federal, state, and local law enforcement agencies.  Additional information about the OCDETF Program can be found at https://www.justice.gov/OCDETF.

    MIL Security OSI

  • MIL-OSI USA: Durbin Requests Materials Related To FBI Nominee Kash Patel’s Involvement In Hostage Recovery Mission After Allegations Of Endangering American Citizens

    US Senate News:

    Source: United States Senator for Illinois Dick Durbin
    January 27, 2025
    This is the second known instance of Mr. Patel breaking hostage recovery protocol to inappropriately insert himself in a sensitive or high-profile recovery mission
    WASHINGTON – U.S. Senate Democratic Whip Dick Durbin (D-IL), Ranking Member of the Senate Judiciary Committee, sent a letter to the Federal Bureau of Investigation (FBI), the Department of Defense (DOD), the State Department, and the Department of Treasury requesting they produce all relevant materials related to alleged misconduct by Kash Patel, President Trump’s nominee to be Director of the FBI, related to the rescue of two Americans held captive by Iranian-backed militants in Yemen. Allegedly, Mr. Patel publicly commented without authorization and prior to the confirmed safe retrieval of the two hostages. If true, Mr. Patel appears to have inappropriately involved himself in a sensitive operation with no regard to the safety of the hostages or the success of the mission.
    Durbin wrote, “I have recently received highly credible information revealing that while serving in the first Trump Administration’s National Security Council, Kash Patel broke protocol regarding hostage rescues by publicly commenting without authorization on the then in-progress retrieval of two Americans held captive by Iranian-backed militants in Yemen in October 2020.”
    On October 14, 2020, the Wall Street Journal first published comments from Mr. Patel regarding the hostage swap at 10:55 a.m., several hours before the hostages were confirmed to be in the custody of the United States. In the wake of multiple failed hostage recovery missions, the Hostage Recovery Fusion Cell was created in 2015 as a multi-agency group housed in the FBI tasked with coordinating the recovery of Americans held hostage abroad and improving communications with impacted families and the public. The Fusion Cell’s specific protocols are in place to help protect the privacy of impacted families and ensure the timing for public acknowledgement of a hostage rescue effort does not endanger these sensitive life-or-death missions.
    The letter continued, “The information my office received alleges that Mr. Patel inserted himself inappropriately in a hostage recovery mission and violated these protocols. Mr. Patel, prior to his interview with the Wall Street Journal and contrary to his public assertions, allegedly had no role in the planning, negotiations, or execution of this hostage recovery. The source also alleges the interagency communications were clear that there would be no public comment until after the recovery was complete, and the families were notified.”
    “Mr. Patel’s nomination to be Director of the Federal Bureau of Investigation (FBI) is currently pending before the Senate Judiciary Committee. Among the many qualities and qualifications the Senate must consider when reviewing presidential appointments is whether the nominee has the requisite character and fitness to be entrusted with the authority of their position. This is the second known instance of Mr. Patel breaking hostage recovery protocol to inappropriately insert himself in a sensitive or high-profile recovery mission. An official who puts missions and the lives of Americans in jeopardy for public notoriety and personal gain is unfit to lead the country’s primary federal law enforcement and investigation agency. This Committee has a constitutional obligation to perform oversight over the FBI and to provide advice and consent on the nominations of officers to lead the Bureau,” the letter wrote.
    In the letter, Durbin requests the Hostage Recovery Fusion Cell protocols for public acknowledgement of successful hostage rescue missions, communications between the Hostage Recovery Fusion Cell and Mr. Patel, and all of the cables regarding the rescue mission during the relevant four days in order to validate this new allegation. Durbin requests all relevant information no later than January 30, the date of Mr. Patel’s confirmation hearing.
    In October 2020, Mr. Patel was accused of breaking protocol and incorrectly providing foreign airspace approval during the rescue of Philip Walton in northern Nigeria.
    Full text of the letter is available here and below.
    January 27, 2025
    Dear Acting Director Driscoll, Secretary Hegseth, Secretary Rubio, and Acting Secretary Lebryk:
    I have recently received highly credible information revealing that while serving in the first Trump Administration’s National Security Council, Kash Patel broke protocol regarding hostage rescues by publicly commenting without authorization on the then in-progress retrieval of two Americans held captive by Iranian-backed militants in Yemen in October 2020.
    On October 14, 2020, the Wall Street Journal first published comments from Mr. Patel regarding the hostage swap at 10:55 a.m., several hours before the hostages were in confirmed custody of the United States. In the wake of multiple failed hostage recovery missions, the Hostage Recovery Fusion Cell was created in 2015 as a multi-agency group housed in the FBI tasked with coordinating the recovery of Americans held hostage abroad and improving communications with impacted families and the public. The specific protocols are in place to help protect the privacy of the impacted families and ensure the timing for public acknowledgement of a hostage rescue effort does not endanger these sensitive life-or-death missions. The information my office received alleges that Mr. Patel inserted himself inappropriately in a hostage recovery mission and violated these protocols. Mr. Patel, prior to his interview with the Wall Street Journal and contrary to his public assertions, allegedly had no role in the planning, negotiations, or execution of this hostage recovery. The source also alleges the interagency communications were clear that there would be no public comment until after the recovery was complete, and the families were notified.
    Mr. Patel’s nomination to be Director of the Federal Bureau of Investigation (FBI) is currently pending before the Senate Judiciary Committee. Among the many qualities and qualifications the Senate must consider when reviewing presidential appointments is whether the nominee has the requisite character and fitness to be entrusted with the authority of their position. This is the second known instance of Mr. Patel breaking hostage recovery protocol to inappropriately insert himself in a sensitive or high-profile recovery mission. An official who puts missions and the lives of Americans in jeopardy for public notoriety and personal gain is unfit to lead the country’s primary federal law enforcement and investigation agency. This Committee has a constitutional obligation to perform oversight over the FBI and to provide advice and consent on the nominations of officers to lead the Bureau. To those ends, please provide the following information:
    The Hostage Recovery Fusion Cell protocols for the public acknowledgement of hostage rescue missions, including any ad hoc protocols established specifically for the rescue of Ms. Sandra Loli and Mr. Mikael Gidada;
    All records between February 1, 2020 through October 15, 2020 reflecting or relating to communications between and among Mr. Patel and the Hostage Recovery Fusion Cell concerning the rescue of Ms. Sandra Loli and Mr. Mikael Gidada;
    All interagency cables and memos from October 11, 2020 through October 15, 2020 concerning the rescue of Ms. Sandra Loli and Mr. Mikael Gidada; and
    All records reflecting or relating to authorization permitting Mr. Patel to disclose any details concerning the rescue of Ms. Sandra Loli and Mr. Mikael Gidada prior to receiving confirmation of their retrieval and/or notification to the families.
    Please provide these materials as soon as possible, and no later than January 30, 2025. I appreciate your prompt attention to this important request.
    Sincerely,
    -30-

    MIL OSI USA News

  • MIL-OSI Security: Sapulpa Couple Sentenced for Their Role in Abusing Three-Week-Old Baby

    Source: Office of United States Attorneys

    TULSA, Okla. – Today, U.S. District Judge Sara E. Hill sentenced Jeannie Rene Romero, 25, for Child Abuse and Child Neglect in Indian Country. Judge Hill ordered Jeannie to serve 60 months, followed by five years of supervised release.

    In October 2022, Jeannie was taking care of her three-week-old baby. While changing the baby’s diaper, Jeannie admittedly used unreasonable force, breaking the baby’s femur in half. She failed to seek medical attention for more than 48 hours. Doctors noted that the baby had additional injuries consistent with abuse.

    In June, Judge Hill sentenced Jeannie’s husband, Jacob Alejandro Romero, 24, for Child Neglect in Indian County. Jacob was at work when the abuse occurred. However, the infant’s injury was noticeable, and he failed to seek help. Judge Hill ordered Jacob to serve 24 months imprisonment, followed by five years of supervised release.

    The baby and its sibling were removed from the home and placed in the care of the family members. Jeannie and the baby are citizens of the Muscogee (Creek) Nation.  

    Jeannie will remain in custody pending transfer to the U.S. Bureau of Prisons. Jacob was previously released on bond and taken into custody following his sentencing in June. 

    The FBI and Sapulpa Police Department investigated the case. Assistant U.S. Attorney Stephanie N. Ihler prosecuted the case.

    MIL Security OSI

  • MIL-OSI Security: Louisville Man Sentenced to Over 20 Years in Federal Prison for Carjacking Resulting in Death

    Source: Office of United States Attorneys

    Louisville, KY – Today, a Louisville man was sentenced to 20 years and 5 months in federal prison for a carjacking which resulted in the death of teenage motorist.

    U.S. Attorney Michael A. Bennett of the Western District of Kentucky, Special Agent in Charge Michael E. Stansbury of the FBI Louisville Field Office, Chief Paul Humphrey of the Louisville Metro Police Department, and Shelby County Sheriff Mark Moore made the announcement.

    According to court documents, Michael Dewitt, 31, was sentenced to 20 years and 5 months in federal prison, followed by 5 years of supervised release, for carjacking resulting in death. Dewitt committed a carjacking at gunpoint on March 1, 2021, and stole a 2011 Ford F350 from its owner in Simpsonville, Kentucky. During the immediate flight from the carjacking, and while still in possession of the stolen truck, Dewitt collided with a vehicle on Dixie Highway in Louisville, causing the death of a minor victim. Dewitt had controlled substances in his system at the time.

    There is no parole in the federal system.

    This case was investigated by the FBI Louisville Field Office, the Louisville Metro Police Department, and the Shelby County Sheriff’s Office.

    Assistant U.S. Attorneys Robert Bonar and Mac Shannon prosecuted this case.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.

    ###

    MIL Security OSI

  • MIL-OSI Security: Shenandoah Man Pleads Guilty to Wire Fraud

    Source: Office of United States Attorneys

    CHARLOTTESVILLE, Va. – A Shenandoah, Virginia man pled guilty today to wire fraud for stealing over $200,000 from his former employer.

    Vernon Fisher, 66, pled guilty today to two counts of wire fraud. At sentencing, Fisher faces up to 20 years in prison.

    According to court documents,  from approximately 2017 and continuing through 2021, Fisher was employed by ‘Victim Company,’ a plastics company located in Elkton, Virginia. Fisher served as an accountant and controller and his responsibilities included filing taxes, running payroll, managing cash, bank deposits, and paying company bills on behalf of Victim Company.

    Fisher admitted to engaging in a multi-year scheme to steal from and defraud Victim Company by linking his personal bank accounts to the Victim Company bank accounts. Through a series of over 300 financial transactions, Fisher funneled over $200,000 of company money to his own accounts and used it for personal expenses at Neiman Marcus, Kay Jewelers, Macy’s, Nordstrom, and other high-end retailers.

    Acting U.S. Attorney Zachary T. Lee and Stanley M. Meador, Special Agent in Charge of the FBI’s Richmond Division made the announcement.

    The FBI is investigating the case.

    Assistant U.S. Attorney Sally J. Sullivan is prosecuting the case. 

    MIL Security OSI

  • MIL-OSI Security: ‘LA Dank DMV’ Crew Leader Sentenced for Sophisticated High-Grade Marijuana Distribution Conspiracy

    Source: Office of United States Attorneys

    The Crew Was Armed with Machine Guns and Mass Marketed on 3 Dedicated Websites and Social Media Platforms

                WASHINGTON –Abubakr Banire, 27, of Washington D.C, was sentenced today to 111 months in prison for leading the “LA Dank DMV Crew,” a sophisticated drug trafficking conspiracy that was responsible for bringing hundreds of pounds of high-grade marijuana from California to the metropolitan area, announced U.S. Attorney Edward R. Martin Jr. and FBI Special Agent in Charge Sean Ryan of the Washington Field Office’s Criminal and Cyber Division.

                Banire, aka “Swave,” pleaded guilty on September 29, 2023, to conspiracy to distribute marijuana; unlawful possession of a machine gun; unlawful possession of a firearm by a felon; and possession of a firearm in furtherance of a drug trafficking offense.

                In addition to the 111-month prison term, U.S. District Court Judge Colleen Kollar-Kotelly ordered Banire to serve three years of supervised release. As part of Banire’s guilty plea, he admitted to operating as a leader of the drug distribution conspiracy.

               As part of their distribution scheme, members of the crew relied heavily on mass marketing through three dedicated LA Dank websites, as well as social media platforms like Instagram where individual crew members would advertise the LA Dank brand and LA Dank branded marijuana for sale. Crew members also used rental properties to set up stash houses or points of sale that were used to conduct drug distribution operations for a short period of time before moving on to different locations. 

               The crew is known, and was found to possess numerous firearms, including semi-automatic and fully automatic machine guns, and devices used to convert semi-automatic firearms into fully automatic machine guns. Certain members of the crew also plead guilty to the possession of firearms in furtherance of their drug trafficking operations. In total, approximately 122 pounds of marijuana, 19 firearms, and 10 machine gun conversion devices were recovered.  Three of these nineteen firearms were discovered to be operational machine guns that had been modified with machinegun conversion devices. Seven of these machine gun conversion devices were found in an “LA Dank” branded bag. Two of these firearms were privately made AR-pistol style machine guns, sometimes referred to as “ghost guns.”

               Ledgers and receipts show that the crew trafficked well over 100 kilograms of marijuana into the DMV area for distribution.

               This case was investigated by the FBI’s Washington Field Office, in partnership with the Metropolitan Police Department, Prince George’s County Police Department, and Anne Arundel County Police Department.

     

    LA DANK DMV

     

    Defendant

     

    Sentence

    Abubakr Banire, aka “Swave,” of Los Angeles, CA Pleaded guilty September 29, 2023, to conspiracy to distribute marijuana; unlawful possession of a machine gun; unlawful possession of a firearm by a felon; and possession of a firearm in furtherance of a drug trafficking offense. Sentenced Jan. 27, 2025, to 111 months in federal prison.
    Christopher Akinduro aka “Oshay,” of Upper Marlboro, MD Pleaded guilty October 3, 2023, to conspiracy to distribute 100 kilos or more of marijuana. Sentenced Jan. 17. 2024, to 74 months in federal prison.
    Issac Akinduro, aka “Black,” of Washington D.C. Pleaded guilty October 11, 2023, to conspiracy to distribute 100 kilos or more of marijuana. Sentenced March 14, 2024, to 41 months in federal prison.
    Kavon Duncan, aka “Babyk,” of Upper Marlboro, MD Pleaded guilty October 3, 2023, to conspiracy to distribute 100 kilos or more of marijuana and possession with intent to distribute marijuana. Sentenced Jan 26, 2024, to 71 months in federal prison.
    Avery Bost, aka “Avenue” and “Left,” of Brandywine, MD Pleaded guilty October 27, 2023, to possession with intent to distribute marijuana. Sentenced May 22, 2024, to 37 months in federal prison.
    Joe Blyther, aka “Hawk,” of Bowie, MD Pleaded guilty November 8, 2023, to conspiracy to distribute marijuana; possession of a firearm in furtherance of a drug trafficking offense; possession of a machine gun; and possession of a firearm and ammunition by a felon. Sentenced May 22, 2024, to 120 months in federal prison.
    Randall Lance, aka “Mike Lambo,” of Washington D.C. Pleaded guilty May 23, 2023, to conspiracy to distribute more than 100 kilograms of marijuana. Sentenced Oct. 10, 2023, to 63 months in federal prison.
    Omar Butler, aka “O,” of Washington D.C. Pleaded guilty Nov. 3, 2023, to conspiracy to distribute marijuana. Sentenced March 4, 2024, to 18 months in federal prison.

                This case was prosecuted by Assistant United States Attorneys Justin F. Song and Meredith E. Mayer-Dempsey of the Federal Major Crimes Section and Thomas Strong of the Violence Reduction and Trafficking Offenses Section of the U.S. Attorney’s Office for the District of Columbia.

    22cr83

    MIL Security OSI

  • MIL-OSI Security: Nigerian Man Extradited to the U.S. After Being Indicted for Sextortion Scheme that Caused Death of S.C. Teen

    Source: Office of United States Attorneys

    COLUMBIA, S.C. — Hassanbunhussein Abolore Lawal (luh-wall), 24, of Osun State, Nigeria, has been extradited to the United States from Nigeria to face prosecution in a partially unsealed indictment for the sextortion of a South Carolina minor, which led to the victim’s death.

    This investigation was launched after Gavin Guffey, a 17-year-old from Rock Hill, died by suicide in July 2022 after being victimized by Lawal’s scheme. Lawal allegedly posed as a young woman on social media and coerced the teen into sending compromising photos. He then extorted and sent harassing messages to the teen threatening to leak the photos and ruin his reputation unless the teen sent him money. Lawal later did the same to members of his family.

    The five-count federal indictment charges Lawal with child exploitation resulting in death, the production and distribution of child sexual abuse material, coercion and enticement of a minor, cyberstalking resulting in death, interstate threats with intent to extort, and aiding/abetting. In addition to victimizing the teen in every count, the indictment alleges Lawal targeted the minor victim’s family in the stalking and extortion charges.

    Lawal faces up to life in prison, and mandatory minimum prison sentences on multiple counts. The child exploitation resulting in death count carries a mandatory 30-year sentence. He also faces mandatory restitution, where the court may order Lawal to pay for losses incurred by the family as a result of his scheme.

    The indictment was returned by a federal Grand Jury in South Carolina in October 2023. On Jan. 24, following extradition proceedings in Nigeria, agents with the FBI Columbia Field Office took custody of Lawal in Lagos, Nigeria and executed the removal with assistance from Nigerian law enforcement.

    “We will not allow predators who target our children to hide behind a keyboard or across the ocean. Today we honor Gavin’s life and continue our fight against sextortion by holding this defendant accountable,” said U.S. Attorney Adair Ford Boroughs for the District of Columbia. “This investigation and extradition are the result of tremendous law enforcement coordination both in the United State and Nigeria. We’re grateful to the many agencies who helped make this day possible.”

    “This indictment represents the culmination of countless hours of dedicated work done by our investigators both here and abroad,” said Steve Jensen, Special Agent in Charge of the FBI Columbia Field Office. “The defendant’s alleged actions are reprehensible resulting in the tragic loss of a young man’s life. We remain steadfast in our commitment to holding criminals accountable, especially those who target our children and endanger their lives, no matter where they are.”

    U.S. Attorney Boroughs and SAC Jensen thanked the U.S. Department of Justice’s Office of International Affairs (OIA), and U.S State Department for their help in facilitating the arrest and extradition of Lawal.

    Nigerian law enforcement provided critical assistance in the identification, investigation, arrest, and extradition of Lawal. U.S. Attorney Boroughs and SAC Jensen extend their appreciation and thanks to the Economic and Financial Crimes Commission (EFCC), the Nigerian Attorney General’s Office – Ministry of Justice, and all other involved Nigerian authorities for their important partnership in this case.

    This case is part of Project Safe Childhood, a nationwide initiative designed to protect children from online exploitation and abuse. The U.S. Attorney’s Office, county prosecutor’s offices, the Internet Crimes Against Children task force (ICAC), federal, state, tribal, and local law enforcement are working closely together to locate, apprehend, and prosecute individuals who exploit children. The partners in Project Safe Childhood work to educate local communities about the dangers of online child exploitation, and to teach children how to protect themselves. For more information about Project Safe Childhood, please visit the following website: www.projectsafechildhood.gov. Individuals with information or concerns about possible child exploitation should contact local law enforcement officials.

    If someone you know is being victimized by sextortion, please report to local law enforcement and to the FBI. Learn more about sextortion and find resources for parents, caregivers, and teachers.

    The case was investigated by the FBI Columbia Field Office, the FBI’s Violent Crimes Against Children Section and International Operations Division, the South Carolina Law Enforcement Division, and the York County Sheriff’s Office. 

    Assistant U.S. Attorneys Elliott B. Daniels, Lothrop Morris, and Michael Shedd are prosecuting the case. 

    All charges in the indictment are merely accusations and that defendants are presumed innocent unless and until proven guilty beyond a reasonable doubt in a court of law.

    ###

    MIL Security OSI

  • MIL-OSI USA: Attorney General Bonta Announces Five Arrests During Operation “To Catch a Predator” in Madera County

    Source: US State of California

    Monday, January 27, 2025

    Contact: (916) 210-6000, agpressoffice@doj.ca.gov

    FRESNO – California Attorney General Rob Bonta, together with the Madera County Sheriff’s Office and California Highway Patrol, today announced the results of operation “To Catch a Predator” which targeted sexual predators who use the internet to seek out potential underage victims. Over the course of the three-day operation, five suspects were arrested and charged with contacting and meeting with minors for sexual purposes. The California Department of Justice’s Fresno Human Trafficking Sexual Predator Apprehension (HT-SPAT), the Madera County Sheriff’s Office, and the California Highway Patrol (CHP) joined forces in a three-day multi-jurisdictional operation, which was completed on January 18, 2025.
     
    “The exploitation of children will not be tolerated in California,” said Attorney General Rob Bonta. “The National Center of Missing and Exploited Children and the FBI estimate there are 500,000 online predators active each day. One child exploited is one too many. I would like to thank the efforts of our partners who helped conduct this operation. When we work together, we get results.” 
     
    “We are grateful for our ongoing partnership with the CA DOJ Human Trafficking Team in Fresno and CA Highway Patrol, and our shared commitment to protecting one of our most vulnerable populations, said Madera County Sheriff Tyson Pogue. “May this operation and subsequent arrests be a reminder to all that we will not tolerate predators in Madera County.”
     
    “The safety and well-being of our children is our top priority,” said CHP Commissioner Sean Duryee. “This operation demonstrates our unwavering commitment to protecting California’s most vulnerable residents and holding those who prey on them accountable. We will continue to work tirelessly with our partners to ensure that no child is ever subjected to such harm.”
     
    Agents and officers identified subjects looking to exploit minors for the purpose of committing sexual acts.  During the operation, undercover agents and detectives posed as minors on various social media platforms and websites commonly used by child sex predators. After being identified, the suspects were located and arrested. All suspects were booked into the Madera County Jail and were charged with Penal Code Section 288.3 – contacting a minor for sexual purposes and Penal Code Section 288.4 – meeting with a minor for sexual purposes. The Madera County District Attorney’s Office will be prosecuting the cases.
     
    The CA DOJ Victims’ Services Unit (VSU) works in conjunction with victim service providers and all across the state to provide victim-centered, trauma-informed, and culturally-sensitive support services to all crime victims, including underserved, at-risk, underrepresented, and vulnerable populations. More information about VSU is available at oag.ca.gov/victimservices or by calling (877) 433-9069 or emailing VSU atVictimServices@doj.ca.gov. 

    If you or someone you know is being forced to engage in any activity and cannot leave, you can call the National Human Trafficking Hotline at 1-888-373-7888 to access help and services. If you or someone else is in immediate danger, call 9-1-1. Additional information and resources to support survivors of human trafficking is available here.
     

    # # #

    MIL OSI USA News

  • MIL-OSI Security: Richmond Heights Hotel Manager Sentenced to 39 Months in Prison for Financial Fraud

    Source: Office of United States Attorneys

    ST. LOUIS – U.S. District Judge Henry E. Autrey on Thursday sentenced the former assistant general manager of a Richmond Heights, Missouri hotel to 39 months in prison for committing multiple frauds and ordered her to repay $226,882.

    From March to October of 2023, Angelique Patterson, 40, manipulated the hotel’s reservation system to alter the records of customers who had paid using cash or credit cards. Patterson retroactively changed those reservations to falsely show that the customers had used the hotel’s loyalty rewards system “points” for their stay. She then added her own credit or debit card information into the system and had the customers’ payments “refunded” to her.

    On Oct. 4, 2023, although not on duty, Patterson tried to use the hotel’s desk computer and a coworker’s credentials to fraudulently refund herself an additional $61,998.

    Patterson also used hotel customers’ credit card information from August through September of 2021 to make fake charges via the entertainment company she owned, Angel Entertains LLC. She obtained or tried to obtain $109,000 that way.

    Patterson pleaded guilty in U.S. District Court in St. Louis in September to five counts of wire fraud.

    The FBI investigated the case. Assistant U.S. Attorneys Gwen Carroll and Cort VanOstran prosecuted the case. 

    MIL Security OSI

  • MIL-OSI Security: Ahoskie Gang Member “Woo” Sentenced to 8 Years in Prison After Conviction for Firearm and Drug Trafficking Offenses

    Source: Office of United States Attorneys

    RALEIGH, N.C. – An Ahoskie gang member was sentenced to 100 months in prison and five years of supervised release, after authorities found drugs and a firearm in his home.  On September 30, 2024, Rodney Lamont Evans, a.k.a. “Woo,” pled guilty to the charges.

    “This case is a testament to the hard work and dedication of our local, state, and federal partners,” said Hertford County Sheriff Dexter Hayes. “Their relentless efforts to investigate, prosecute, and bring to justice those who threaten the safety of our citizens reflect our shared commitment to a safer community.”

    According to court documents and other information presented in court, authorities in Ahoskie received information on August 8, 2022, that Evans, 47, a member of the Bloods gang, was distributing narcotics out of his home on McGlohon Street. On that date, law enforcement executed a search warrant at Evans’s residence.  Upon their arrival, Evans fled through a window and attempted to hide on the roof but was soon found.  Inside Evans’s home, authorities discovered nearly 360 grams of cocaine, over 5 grams of crack, over 1,700 grams of marijuana, a firearm, ammunition, multiple digital scales, and drug packaging materials.  The investigation also revealed that Evans had previously participated in the sale of homemade machinegun conversion devices, or “switches,” with a fellow member of the Bloods.

    Evans was previously convicted of indecent liberties with a child and multiple charges of possession with intent to sell cocaine in North Carolina. 

    Michael F. Easley, Jr., U.S. Attorney for the Eastern District of North Carolina, made the announcement after sentencing by U.S. District Judge Terrence W. Boyle.  The Federal Bureau of Investigation (FBI); the Bureau of Alcohol, Tobacco, and Firearms (ATF); the Down East Drug and Violent Crime Task Force; and the Hertford County Sheriff’s Office investigated the case, and Assistant U.S. Attorney’s Lori Warlick and Sarah Nokes prosecuted the case.

    Related court documents and information can be found on the website of the U.S. District Court for the Eastern District of North Carolina or on PACER by searching for Case No. 2:23-CR-23-BO-RN.

    MIL Security OSI

  • MIL-OSI Security: Suburban Chicago Businessman Sentenced to Three Years in Prison for Bank Fraud

    Source: Office of United States Attorneys

    CHICAGO — A suburban Chicago businessman has been sentenced to three years in federal prison for fraudulently obtaining millions of dollars in mortgage and vehicle loans and using stolen identities to secure credit from financial institutions.

    YALE SCHIFF fraudulently obtained mortgage loans, vehicle loans, lines of credit, and credit cards by making false statements to financial institutions regarding his employment, income, and encumbrances on the collateral he pledged for the loans.  After obtaining the loans, Schiff filed false documents with the Cook County Recorder of Deeds, causing the fraudulent release of the liens.  Schiff then pocketed the loan proceeds, causing losses to the lenders. Schiff used the same mortgaged properties for multiple loans, each time fraudulently removing the lien and keeping the proceeds.

    Schiff used various false and stolen identities to carry out his fraud scheme.  Schiff bought vehicles under the false identities and fraudulently removed liens on the cars before selling them for a profit.  He also opened bank accounts and lines of credit using the false identities and other aliases, funding the accounts with advances from other fraudulently obtained lines of credit and credit cards.  In one instance, Schiff used a credit card issued in the name of an elderly woman whom he knew was in a memory care facility at the time, and in another instance he used a credit card issued in the name of a friend who had passed away.

    Schiff, 50, of Riverwoods, Ill., pleaded guilty in 2023 to a federal bank fraud charge. In addition to the prison sentence, U.S. District Judge Mary M. Rowland on Jan. 16, 2025, ordered Schiff to pay $2,955,954 in restitution.

    The sentence was announced by Morris Pasqual, Acting United States Attorney for the Northern District of Illinois, Douglas S. DePodesta, Special Agent-in-Charge of the Chicago Field Office of the FBI, and Ruth Mendonça, Inspector-in-Charge of the Chicago Division of the U.S. Postal Inspection Service.

    “Defendant, over the course of at least 13 years, engaged in a calculated, sustained, prolonged, multi-faceted scheme to defraud multiple financial institutions, individual buyers of property, and individuals whose identity he used,” Assistant U.S. Attorney Sheri H. Mecklenburg argued in the government’s sentencing memorandum.  “Defendant’s conduct was prolonged, willful, and widespread.”

    Schiff’s brother, JASON SCHIFF, of Lincolnwood, Ill., and a business associate, DAVID IZSAK, of Chicago, were also charged as part of the federal investigation. Jason Schiff pleaded guilty to causing a false report and statement to be made to the U.S. Department of Housing and Urban Development.  Jason Schiff was sentenced to three years of probation and ordered to pay $306,610 in restitution. A jury convicted Izsak on ten counts of financial institution fraud.  Izsak is awaiting sentencing.

    MIL Security OSI

  • MIL-OSI Security: Cedar Rapids Man Sentenced to over 24 Years in Federal Prison for Attempted Sex Trafficking of a Child and Destruction of Evidence

    Source: Office of United States Attorneys

    A man who attempted to solicit a minor to engage in prostitution was sentenced on January 24, 2025, to 292 months in federal prison.

    Joshua Johnson, age 50, of Cedar Rapids, Iowa, received the sentence after an August 7, 2024, jury verdict finding him guilty of attempted sex trafficking of a child and destruction of evidence.  The evidence at trial showed that, in December 2023, Johnson responded to an ad on a website for prostitution.  He exchanged text messages with a person who stated that she was 13 years old; she actually was an undercover law enforcement officer.  Johnson sent messages describing sex acts he could perform with the minor, and he traveled to Hiawatha, Iowa, to meet with her.  After meeting with officers, Johnson wiped his cell phone.

    Johnson was sentenced in Cedar Rapids by United States District Court Chief Judge C.J. Williams.  Johnson was sentenced to 292 months’ imprisonment.  He must also serve a five-year term of supervised release after the prison term.  There is no parole in the federal system.   

    This case was prosecuted by Assistant United States Attorney Mark Tremmel and was investigated by the Federal Bureau of Investigation, Homeland Security Investigations, the Iowa Division of Criminal Investigation, and the Hiawatha Police Department.

    This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse.  Led by the United States Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue victims.  For more information about Project Safe Childhood, please visit www.usdoj.gov/psc.  For more information about Internet safety education, please visit www.usdoj.gov/psc and click on the tab “resources.”

    Court file information is available at https://ecf.iand.uscourts.gov/cgi-bin/login.pl.  The case file number is CR 24-38.

    Follow us on X @USAO_NDIA.

    MIL Security OSI

  • MIL-OSI Security: Kidnapper of Alexandria, Virginia, Couple Sentenced to 108 Months in Federal Prison

    Source: Federal Bureau of Investigation (FBI) State Crime News

               WASHINGTON – Robbie Terrell Clark, 27, of Washington D.C., was sentenced today in U.S. District Court to 108 months in federal prison for his role in the September 2022 kidnapping and robbery of a pair of victims in Alexandria, Virginia. 

               The sentence was announced by U.S. Attorney Edward R. Martin Jr. for the District of Columbia and FBI Special Agent in Charge Sean Ryan of the Washington Field Office Criminal and Cyber Division. 

               Clark pleaded guilty on May 21, 2024, before U.S. District Court Judge Amy Berman Jackson, to one count of conspiracy to commit kidnapping. In addition to the 108-month prison-term, Judge Berman Jackson ordered Clark to serve four years of supervised release. 

               According to court documents, Clark and his co-conspirators stalked their intended victims before kidnapping and robbing them at gunpoint inside their Alexandria, Virginia apartment building. On September 2, 2022, the co-conspirators planted a GPS tracking device on one of the victim’s Mercedes, which they used to monitor the victims’ locations.  

               On September 3, 2022, the victims attended a family gathering in Maryland. Seizing the opportunity to catch their victims unaware, Clark and his co-conspirators traveled from Washington, D.C. to Virginia in a stolen white Kia and to the victim’s home, where they laid in wait, armed with guns and carrying zip ties. Clark and his co-conspirators were wearing dark clothing, masks, and latex gloves.

               When the victims returned home later that night, Clark and his co-conspirators ambushed them in their parking garage at gunpoint, stealing two Audemars Piguet watches worth $120,000, another $63,500 worth of jewelry, other clothing, and the keys to a victim’s Mercedes.

               After robbing them, and pistol-whipping them with their guns, Clark and the co-conspirators led the victim couple to one of the victim’s apartments. Inside, the co-conspirators continued to hold the victims at gunpoint and ransacked the residence, demanding money. The co-conspirators were unable to locate any money before a security alarm was triggered and the co-conspirators fled, leaving behind several plastic zip ties. 

               Clark and his co-conspirators fled the apartment building shortly before 2 a.m. on September 4, 2022, in the stolen white Kia and the victims’ Mercedes and returned to the District. Law enforcement found the stolen Mercedes hours later in Maryland with the GPS tracking device still attached. Following a lengthy investigation, Clark was identified as a participant and arrested on August 16, 2023, in Washington, D.C. He has been held since.

               At the time of the incident, Clark had a felony conviction in Maryland for possessing a handgun in a vehicle. 

               Clark’s co-conspirator, Tyree McCombs, pleaded guilty on August 14, 2024, to conspiracy to interfere with interstate commerce by robbery in connection with this offense as well as to a separate kidnapping committed two months later. McCombs is awaiting sentencing.

               This case was investigated by FBI Washington Field Office’s Violent Crimes Task Force. The Fairfax County Police Department assisted with the investigation. The matter is being prosecuted by Assistant U.S. Attorney Charles Jones for the District of Columbia.

    22cr377

    MIL Security OSI

  • MIL-OSI Security: Kansas City Man Pleads Guilty to Conspiracy to Traffic Machine Guns

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    KANSAS CITY, Mo. – A Kansas City, Kansas, man has been sentenced in federal court for his role in a conspiracy to distribute fentanyl.

    Alonso Alfredo Nunez, also known as “Bullet,” 20, was sentenced by U.S. District Judge Greg Kays on Thursday, Jan. 23, to 15 years in federal prison without parole.

    On April 10, 2024, Nunez pleaded guilty to participating in a conspiracy to distribute fentanyl. Nunez admitted that he and co-defendant Jaloany Garcia-Medina, also known as “J. Lo,” 22, of Kansas City, Kan., working together, sold fentanyl on multiple occasions to a confidential informant working for the Jackson County Drug Task Force.

    Nunez and Garcia-Medina sold approximately 1,000 fentanyl pills to a confidential informant on each of six separate occasions during the six months of the conspiracy from July 25 to Dec. 18, 2022. A different FBI confidential source reported that Nunez was supplied 200 to 500 fentanyl-laced pills weekly from July 2022 through December 2022.

    Garcia-Medina has pleaded guilty to her role in the drug-trafficking conspiracy and awaits sentencing.

    This case is being prosecuted by Assistant U.S. Attorney Trey Alford. It was investigated by the Jackson County Drug Task Force and the FBI.

    MIL Security OSI

  • MIL-OSI Security: Morrisville, Vermont Man Sentenced to 18 Months of Incarceration in Firearm Possession Case

    Source: Office of United States Attorneys

    Burlington, Vermont – The United States Attorney’s Office for the District of Vermont stated that on January 23, 2025, Jordan Phelps, 36, of Morrisville, Vermont was sentenced by Chief United States District Judge Christina Reiss to 18 months’ imprisonment to be followed by a three-year term of supervised release. Phelps previously pleaded guilty to being an unlawful user of controlled substances, specifically cocaine base, in possession of a firearm.

    According to court records, on March 11, 2024, Jordan Phelps called the Morristown Police Department on four occasions and threatened to go to the home of a sworn member of law enforcement. The threatening phone calls were recorded, and law enforcement investigated Phelps. The investigation demonstrated that Phelps sought to go to the officer’s home in response to what Phelps considered was unlawful surveillance of his activities. On March 13, 2024, law enforcement executed a state search warrant at Phelps’ residence that led to the seizure of a loaded Marlin Model 336 .30-30 Caliber Rifle from Phelps’ bedroom. Further investigation into Phelps revealed that he was an unlawful user of controlled substances.

    Acting United States Attorney Michael P. Drescher commended the collaborative investigatory efforts of the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), the Federal Bureau of Investigation (FBI), the Morristown Police Department, the Stowe Police Department, the Lamoille County Sheriff’s Department, and the Vermont State Police.

    The case was prosecuted by Assistant U.S. Attorney Zachary Stendig. Phelps was represented by Chandler Matson, Esq.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results. For more information about Project Safe Neighborhoods, please visit Justice.gov/PSN

    MIL Security OSI

  • MIL-OSI Security: Newark Man Charged With Firearm And Narcotics Offenses

    Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

    NEWARK, N.J. – A Newark man has been charged with firearm and narcotics offenses, Acting U.S. Attorney Vikas Khanna announced.

    Khalif Irving, 25, of Newark, New Jersey, was charged in a three-count complaint with possession of a firearm and ammunition by a convicted felon, possession with intent to distribute fentanyl, and possession of a firearm in furtherance of a drug trafficking crime.  He had an initial appearance before U.S. Magistrate Judge Michael A. Hammer in Newark federal court on January 24, 2025, and was ordered detained.

    According to documents filed in this case and statements made in court:

    Irving, a/k/a “Kah Kah,” has been advertising narcotics for sale on social media and posting photos depicting firearms.  On January 23, 2025, Irving stowed a loaded firearm in a utility box affixed to the side of a building at the Janice Kromer Village apartments.  Minutes later, law enforcement recovered the firearm, arrested Irving, and recovered suspected narcotics from Irving’s person.

    The offense of possession of a firearm and ammunition by a convicted felon charged in Count One of the Complaint carries a maximum penalty of 15 years’ imprisonment and a maximum fine of $250,000.  The offense of possession with intent to distribute narcotics charged in Count Two of the Complaint carries a maximum penalty of 20 year’ imprisonment and a maximum fine of $1 million.  The offense of possession of a firearm in furtherance of a drug trafficking crime charged in Count Thee of the Complaint carries a mandatory minimum penalty of 5 years’ imprisonment and a maximum of life imprisonment, which must run consecutively to any other term of imprisonment and a maximum fine of $250,000.   

    Acting U.S. Attorney Khanna credited special agents and task force officers of the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), under the direction of Special Agent in Charge L.C. Cheeks Jr., the Newark Police Department, under the direction of Public Safety Director Emanuel Miranda, and the North Bergen Police Department, under the direction of Chief Robert Farley with the investigation leading to today’s charges.

    The investigation was conducted as part of the Newark Violent Crime Initiative (VCI). The Newark VCI was formed in August 2017 by the U.S. Attorney’s Office for the District of New Jersey, the Essex County Prosecutor’s Office, and the City of Newark’s Department of Public Safety for the sole purpose of combatting violent crime in and around Newark. As part of this partnership, federal, state, county, and city agencies collaborate and pool resources to prosecute violent offenders who endanger the safety of the community. The VCI is composed of the U.S. Attorney’s Office, the FBI, the ATF, the DEA, the DHS/HSI, the USMS, the Newark Department of Public Safety, the Essex County Prosecutor’s Office, the Essex County Sheriff’s Office, New Jersey State Parole, Union County Jail, New Jersey State Police Regional Operations and Intelligence Center/Real Time Crime Center, New Jersey Department of Corrections, the East Orange Police Department, and the Irvington Police Department.

    The government is represented by Assistant U.S. Attorney Alison Thompson of the Organized Crime and Gangs Unit in Newark.

    The charges and allegations contained in the complaint are merely accusations, and the defendant is presumed innocent unless and until proven guilty.

                                                     ###

    Defense counsel: Michael Thomas, Assistant Federal Public Defender

    MIL Security OSI

  • MIL-OSI Security: Director Wray Visits FBI Offices in Cheyenne and Denver

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    Earlier this week, FBI Director Christopher Wray visited the Denver Field Office and met with FBI employees and partners from across Colorado and Wyoming.

    His trip to Wyoming included a productive discussion with law enforcement in the state about the importance of collaboration to fulfilling our shared mission, noting that “partnerships are more important now than they’ve ever been.” While in Wyoming, Director Wray also visited F.E. Warren AFB, where he met with military partners to discuss the many ways the FBI is working with the Department of Defense to protect against threats posed by hostile foreign nations.

    In Denver, Director Wray sat down with partners from across law enforcement, the private sector, and academia in Colorado and Wyoming, thanking them for their partnership and emphasizing the need to continue working together to stay ahead of cyber, counterintelligence, and counterterrorism threats. The group also discussed the importance of continued collaboration to defend against threats to our critical infrastructure, and emerging challenges such as criminal use of artificial intelligence and cryptocurrency. While in Colorado, Director Wray also met with officials from the Bureau of Prisons at one of their facilities.

    Director Wray pledged the FBI’s intent to try to continue to support law enforcement partners in Colorado and Wyoming through training, investigative services, and support, despite the increasingly limited budget environment. “There’s a force multiplier effect that comes from constant engagement and collaboration,” Director Wray said, “and you can count on us to keep focusing on how to be the best partner.”

    FBI Denver serves all of Colorado and Wyoming. The office has nine resident agencies covering the two states. This trip marks Director Wray’s third visit to the Denver Field Office and his first visit to Wyoming as FBI Director.

    MIL Security OSI

  • MIL-OSI Security: Dearborn, Michigan Man, Who Used Fake Refund Scheme to Defraud Retailers of More Than $4 Million, Sentenced to Three Years in Prison

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)

    Lead defendant obtained more than $1.7 million in fraud proceeds on goods he falsely claimed he returned or never received

    Seattle – A 27-year-old Dearborn, Michigan, man was sentenced today in U.S. District Court in Seattle to three years in prison and three years of supervised release for a fraud scheme damaging retailers across the country, announced First Assistant U.S. Attorney Teal L. Miller. Sajed Al-Maarej operated “Simple Refunds” through the messaging service Telegram, where coconspirators were encouraged to purchase items from retailers Al-Maarej claimed he could defraud. Al-Maarej and his staff of “professional refunders” impersonated the purchaser and lied to the retailer about the status of the item to secure a refund for the purchaser, while permitting the purchaser to keep the ordered item. The scheme caused more than $4 million in losses for retailers and induced young adults nationwide to join a criminal scheme. At sentencing U.S. District Judge Robert S. Lasnik noted that the fraud “was a difficult and expensive proposition” for the victim companies. “We need to send a message that this behavior is criminal,” Judge Lasnik said.

    “This defendant enticed many young and naïve online contacts to his illegal refunding scheme – some perhaps believed Al-Maarej’s spiel that this conduct was not illegal. They were badly misled,” said First Assistant U.S. Attorney Teal L. Miller. “This fraudulent refund scheme hurts retailers and ultimately raises prices for all of us. Al-Maarej got his expensive toys by convincing others to become complicit in his crimes.”

    According to records in the case, between September 2020 and December 2022, Al-Maarej represented to prospective purchasers that they could buy high value goods and keep them, while falsely claiming to the merchant company that a refund was due. Purchasers provided Al-Maarej information about their purchase (order number, name, address, value) and for a cut of the refund, Al-Maarej and his coconspirators would seek a refund by making false representations. For example, Simple Refunds would claim the item had not been delivered; was irretrievably damaged; or would have the purchaser mail a box of garbage or junk back to the company – once the package was scanned at the shipping point the refund was often issued before the box arrived back and the fraud was discovered. Al-Maarej recruited “insiders” at UPS and the US Postal Service who would input false scans into the order tracking history to make it appear items had been lost in shipping, stolen from the mail, or returned to the company.

    The end goal was for the purchaser to keep the product and get their money back. The purchaser then paid Al-Maarej 15-25% of the purchase price as his fee.

    Al-Maarej engaged in fraudulent refunding activity as well, on his own purchases. That conduct lasted until at least August 2023. In one instance, Al-Maarej obtained a refund for bulky tools, but he returned to the retailer an envelope filled with plastic toy frogs. One retailer identified more than $500,000 in items shipped to Al-Maarej’s home for which Al-Maarej obtained fraudulent refunds. In total, Al-Maarej made (and retailers lost) more than $1.4 million to his personal refunding activities. 

    The Simple Refunds channel on Telegram amassed a following of more than 1,000 subscribers. Al-Maarej used a second channel to post information on successful refunds. Al Maarej represented to some of those he recruited that the scheme was not illegal. He targeted young men in their teens and twenties and embroiled them in criminal conduct.

    The indictment details how two Snohomish County residents ordered thousands of dollars of merchandise and conspired with Al-Maarej to get the payments refunded. Al-Maarej or others at his direction, impersonated the buyers, claimed the items had been “delivered not received” and got the purchase price refunded. The customers kept the items.

    In May 2022, Al-Maarej deepened his fraud by offering a “mentorship” program where he would teach others to create their own refunding scams – he charged $6,000 for admission to the program. He boasted that students would “learn from the best in the game, from everything fraud related, to legit businesses and cleaning your money.”

    Last summer, Al-Maarej pleaded guilty to wire fraud and mail fraud. As part of his sentence Al-Maarej was ordered to pay $4,353,819.

    The case is being investigated by the FBI and the United States Postal Inspection Service (USPIS). Amazon, Costco, and Microsoft assisted in the investigation. The case is being prosecuted by Assistant United States Attorney Lauren Watts Staniar.

    MIL Security OSI

  • MIL-OSI Security: United States Charges Dual Russian and Israeli National as Developer of LockBit Ransomware Group

    Source: United States Attorneys General

    Defendant Rostislav Panev in Custody Pending Extradition from Israel to the United States

    Note: A copy of the superseding criminal complaint can be found here.

    A superseding criminal complaint filed in the District of New Jersey was unsealed today charging a dual Russian and Israeli national for being a developer of the LockBit ransomware group.

    In August, Rostislav Panev, 51, a dual Russian and Israeli national, was arrested in Israel pursuant to a U.S. provisional arrest request with a view towards extradition to the United States. Panev is currently in custody in Israel pending extradition on the charges in the superseding complaint.

    “The Justice Department’s work going after the world’s most dangerous ransomware schemes includes not only dismantling networks, but also finding and bringing to justice the individuals responsible for building and running them,” said Attorney General Merrick B. Garland. “Three of the individuals who we allege are responsible for LockBit’s cyberattacks against thousands of victims are now in custody, and we will continue to work alongside our partners to hold accountable all those who lead and enable ransomware attacks.”

    “The arrest of Mr. Panev reflects the Department’s commitment to using all its tools to combat the ransomware threat,” said Deputy Attorney General Lisa Monaco. “We started this year with a coordinated international disruption of LockBit — the most damaging ransomware group in the world. Fast forward to today and three LockBit actors are in custody thanks to the diligence of our investigators and our strong partnerships around the world. This case is a model for ransomware investigations in the years to come.”

    “The arrest of alleged developer Ratislav Panev is part of the FBI’s ongoing efforts to disrupt and dismantle the LockBit ransomware group, one of the most prolific ransomware variants across the globe,” said FBI Director Christopher Wray. “The LockBit group has targeted both public and private sector victims around the world, including schools, hospitals, and critical infrastructure, as well as small businesses and multi-national corporations.  No matter how hidden or advanced the threat, the FBI remains committed to working with our interagency partners to safeguard the cyber ecosystem and hold accountable those who are responsible for these criminal activities.” 

    “The criminal complaint alleges that Rotislav Panev developed malware and maintained the infrastructure for LockBit, which was once the world’s most destructive ransomware group and attacked thousands of victims, causing billions of dollars in damage,” said Principal Deputy Assistant Attorney General Nicole M. Argentieri, head of the Justice Department’s Criminal Division. “Along with our domestic and international law enforcement partner actions to dismantle LockBit’s infrastructure, the Criminal Division has disrupted LockBit’s operations by charging seven of its key members (including affiliates, developers, and its administrator) and arresting three of these defendants — including Panev. We are especially grateful for our partnerships with authorities in Europol, the United Kingdom, France, and Israel, which show that, when likeminded countries work together, cybercriminals will find it harder to escape justice.”

    “As alleged by the complaint, Rostislav Panev for years built and maintained the digital weapons that enabled his LockBit coconspirators to wreak havoc and cause billions of dollars in damage around the world,” said U.S. Attorney Philip R. Sellinger for the District of New Jersey. “But just like the six other LockBit members previously identified and charged by this office and our FBI and Criminal Division partners, Panev could not remain anonymous and avoid justice indefinitely. He must now answer for his crimes. Today’s announcement represents another blow struck by the United States and our international partners against the LockBit organization, and our efforts will continue relentlessly until the group is fully dismantled and its members brought to justice.”

    According to the superseding complaint, documents filed in this and related cases, and statements made in court, Panev acted as a developer of the LockBit ransomware group from its inception in or around 2019 through at least February 2024. During that time, Panev and his LockBit coconspirators grew LockBit into what was, at times, the most active and destructive ransomware group in the world. The LockBit group attacked more than 2,500 victims in at least 120 countries around the world, including 1,800 in the United States. Their victims ranged from individuals and small businesses to multinational corporations, including hospitals, schools, nonprofit organizations, critical infrastructure, and government and law-enforcement agencies. LockBit’s members extracted at least $500 million in ransom payments from their victims and caused billions of dollars in other losses, including lost revenue and costs from incident response and recovery.

    LockBit’s members comprised “developers,” like Panev, who designed the LockBit malware code and maintained the infrastructure on which LockBit operated. LockBit’s other members, called “affiliates,” carried out LockBit attacks and extorted ransom payments from LockBit victims. LockBit’s developers and affiliates would then split ransom payments extorted from victims.

    As alleged in the superseding complaint, at the time of Panev’s arrest in Israel in August, law enforcement discovered on Panev’s computer administrator credentials for an online repository that was hosted on the dark web and stored source code for multiple versions of the LockBit builder, which allowed LockBit’s affiliates to generate custom builds of the LockBit ransomware malware for particular victims. On that repository, law enforcement also discovered source code for LockBit’s StealBit tool, which helped LockBit affiliates exfiltrate data stolen through LockBit attacks. Law enforcement also discovered access credentials for the LockBit control panel, an online dashboard maintained by LockBit developers for LockBit’s affiliates and hosted by those developers on the dark web.

    The superseding complaint also alleges that Panev exchanged direct messages through a cybercriminal forum with LockBit’s primary administrator, who, in an indictment unsealed in the District of New Jersey in May, the United States alleged to be Dimitry Yuryevich Khoroshev (Дмитрий Юрьевич Хорошев), also known as LockBitSupp, LockBit, and putinkrab. In those messages, Panev and the LockBit primary administrator discussed work that needed to be done on the LockBit builder and control panel.

    Court documents further indicate that, between June 2022 and February 2024, the primary LockBit administrator made a series of transfers of cryptocurrency, laundered through one or more illicit cryptocurrency mixing services, of approximately $10,000 per month to a cryptocurrency wallet owned by Panev. Those transfers amounted to over $230,000 during that period.

    In interviews with Israeli authorities following his arrest in August, Panev admitted to having performed coding, development, and consulting work for the LockBit group and to having received regular payments in cryptocurrency for that work, consistent with the transfers identified by U.S. authorities. Among the work that Panev admitted to having completed for the LockBit group was the development of code to disable antivirus software; to deploy malware to multiple computers connected to a victim network; and to print the LockBit ransom note to all printers connected to a victim network. Panev also admitted to having written and maintained LockBit malware code and to having provided technical guidance to the LockBit group.

    The LockBit Investigation

    The superseding complaint against, and apprehension of, Panev follows a disruption of LockBit ransomware in February by the United Kingdom (U.K.)’s National Crime Agency (NCA)’s Cyber Division, which worked in cooperation with the Justice Department, FBI, and other international law enforcement partners. As previously announced by the Department, authorities disrupted LockBit by seizing numerous public-facing websites used by LockBit to connect to the organization’s infrastructure and by seizing control of servers used by LockBit administrators, thereby disrupting the ability of LockBit actors to attack and encrypt networks and extort victims by threatening to publish stolen data. That disruption succeeded in greatly diminishing LockBit’s reputation and its ability to attack further victims, as alleged by documents filed in this case.

    The superseding complaint against Panev also follows charges brought in the District of New Jersey against other LockBit members, including its alleged primary creator, developer, and administrator, Dmitry Yuryevich Khoroshev. An indictment against Khoroshev unsealed in May alleges that Khoroshev began developing LockBit as early as September 2019, continued acting as the group’s administrator through 2024, a role in which Khoroshev recruited new affiliate members, spoke for the group publicly under the alias “LockBitSupp,” and developed and maintained the infrastructure used by affiliates to deploy LockBit attacks. Khoroshev is currently the subject of a reward of up to $10 million through the U.S. Department of State’s Transnational Organized Crime (TOC) Rewards Program, with information accepted through the FBI tip website at www.tips.fbi.gov/.

    A total of seven LockBit members have now been charged in the District of New Jersey. Beyond Panev and Khoroshev, other previously charged LockBit defendants include:

    • In July, two LockBit affiliate members, Mikhail Vasiliev, also known as Ghostrider, Free, Digitalocean90, Digitalocean99, Digitalwaters99, and Newwave110, and Ruslan Astamirov, also known as BETTERPAY, offtitan, and Eastfarmer, pleaded guilty in the District of New Jersey for their participation in the LockBit ransomware group and admitted deploying multiple LockBit attacks against U.S. and foreign victims. Vasiliev and Astamirov are presently in custody awaiting sentencing.
    • In February, in parallel with the disruption operation described above, an indictment was unsealed in the District of New Jersey charging Russian nationals Artur Sungatov and Ivan Kondratyev, also known as Bassterlord, with deploying LockBit against numerous victims throughout the United States, including businesses nationwide in the manufacturing and other industries, as well as victims around the world in the semiconductor and other industries. Sungatov and Kondratyev remain at large.
    • In May 2023, two indictments were unsealed in Washington, D.C., and the District of New Jersey charging Mikhail Matveev, also known as Wazawaka, m1x, Boriselcin, and Uhodiransomwar, with using different ransomware variants, including LockBit, to attack numerous victims throughout the United States, including the Washington, D.C., Metropolitan Police Department. Matveev remains at large and is currently the subject of a reward of up to $10 million through the U.S. Department of State’s TOC Rewards Program, with information accepted through the FBI tip website at www.tips.fbi.gov/.

    The U.S. Department of State’s TOC Rewards Program is offering rewards of:

    Information is accepted through the FBI tip website at tips.fbi.gov.

    Khoroshev, Matveev, Sungatov, and Kondratyev have also been designated for sanctions by the Department of the Treasury’s Office of Foreign Assets Control for their roles in launching cyberattacks.

    Victim Assistance

    LockBit victims are encouraged to contact the FBI and submit information at www.ic3.gov/. As announced by the Department in February, law enforcement, through its disruption efforts, has developed decryption capabilities that may enable hundreds of victims around the world to restore systems encrypted using the LockBit ransomware variant. Submitting information at the IC3 site will enable law enforcement to determine whether affected systems can be successfully decrypted.

    LockBit victims are also encouraged to visit www.justice.gov/usao-nj/lockbit for case updates and information regarding their rights under U.S. law, including the right to submit victim impact statements and request restitution, in the criminal litigation against Panev, Astamirov, and Vasiliev.

    The FBI Newark Field Office, under the supervision of Acting Special Agent in Charge Nelson I. Delgado, is investigating the LockBit ransomware variant. Israel’s Office of the State Attorney, Department of International Affairs, and Israel National Police; France’s Gendarmerie Nationale Cyberspace Command, Paris Prosecution Office — Cyber Division, and judicial authorities at the Tribunal Judiciare of Paris; Europol; Eurojust; the U.K.’s NCA; Germany’s Landeskriminalamt Schleswig-Holstein, Bundeskriminalamt, and the Central Cybercrime Department North Rhine-Westphalia; Switzerland’s Federal Office of Justice, Public Prosecutor’s Office of the Canton of Zurich, and Zurich Cantonal Police; Spain’s Policia Nacional and Guardia Civil; Japan’s National Police Agency; Australian Federal Police; Sweden’s Polismyndighetens; Canada’s Royal Canadian Mounted Police; Politie Dienst Regionale Recherche Oost-Brabant of the Netherlands; and Finland’s National Bureau of Investigation have provided significant assistance and coordination in these matters and in the LockBit investigation generally.

    Trial Attorneys Debra Ireland and Jorge Gonzalez of the Criminal Division’s Computer Crime and Intellectual Property Section (CCIPS) and Assistant U.S. Attorneys Andrew M. Trombly, David E. Malagold, and Vinay Limbachia for the District of New Jersey are prosecuting the charges against Panev and the other previously charged LockBit defendants in the District of New Jersey.

    The Justice Department’s Cybercrime Liaison Prosecutor to Eurojust, Office of International Affairs, and National Security Division also provided significant assistance.

    Additional details on protecting networks against LockBit ransomware are available at StopRansomware.gov. These include Cybersecurity and Infrastructure Security Agency Advisories AA23-325A, AA23-165A, and AA23-075A. 

    A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: Lawson Sex Offender Sentenced to 17 Years for Child Pornography

    Source: Office of United States Attorneys

    KANSAS CITY, Mo. – A Lawson, Mo., man who is a registered sex offender has been sentenced in federal court for distributing child pornography over the internet.

    Lance M. Berry, 37, was sentenced by U.S. District Judge Howard F. Sachs on Thursday, Dec. 19, to 17 years in federal prison without parole. The court also sentenced Berry to 10 years of supervised release following incarceration and ordered him to pay $33,000 in restitution to his victims.

    On Aug. 7, 2024, Berry pleaded guilty to one count of distributing child pornography over the internet.

    Berry has a prior Ray County, Mo., conviction for the deviate sexual assault of a child under the age of 13, which requires him to register as a sex offender.

    Berry admitted that he utilized a peer-to-peer file-sharing program on June 1, 2022, to make images and videos of child pornography available to other users over the internet. On that day, an undercover officer with the Missouri State Highway Patrol was able to directly connect to Berry’s cell phone and download 14 videos of child pornography.

    According to court documents, Berry’s cell phone contained 944 unique images of child pornography, including 19 images of sadistic or masochistic violence against a minor, and 168 images featuring infants or toddlers. There were an additional 40 videos of child pornography, which also included depictions of sadistic or masochistic violence and/or infants and toddlers.

    This case was prosecuted by Assistant U.S. Attorney Kenneth W. Borgnino. It was investigated by the Missouri State Highway Patrol and the FBI.

    Project Safe Childhood

    This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue victims. For more information about Project Safe Childhood, please visit www.usdoj.gov/psc . For more information about Internet safety education, please visit www.usdoj.gov/psc and click on the tab “resources.”

    MIL Security OSI

  • MIL-OSI Security: U.S. Charges Dual Russian And Israeli National As Developer Of Lockbit Ransomware Group

    Source: Office of United States Attorneys

    Defendant Rostislav Panev in Custody Pending Extradition from Israel to the United States

    NEWARK, N.J. – A superseding criminal complaint filed in the District of New Jersey was unsealed today charging a dual Russian and Israeli national for being a developer of the LockBit ransomware group, U.S. Attorney Philip R. Sellinger announced.

    In August, Rostislav Panev, 51, a dual Russian and Israeli national, was arrested in Israel pursuant to a U.S. provisional arrest request with a view towards extradition to the United States. Panev is currently in custody in Israel pending extradition on the charges lodged in the superseding complaint.

    “As alleged by the complaint, Rostislav Panev for years built and maintained the digital weapons that enabled his LockBit coconspirators to wreak havoc and cause billions of dollars in damage around the world. But just like the six other LockBit members previously identified and charged by this office and our FBI and Criminal Division partners, Panev could not remain anonymous and avoid justice indefinitely. He must now answer for his crimes. Today’s announcement represents another blow struck by the United States and our international partners against the LockBit organization, and our efforts will continue relentlessly until the group is fully dismantled and its members brought to justice.”

    U.S. Attorney Philip R. Sellinger

    “The Justice Department’s work going after the world’s most dangerous ransomware schemes includes not only dismantling networks, but also finding and bringing to justice the individuals responsible for building and running them,” said Attorney General Merrick B. Garland. “Three of the individuals who we allege are responsible for LockBit’s cyberattacks against thousands of victims are now in custody, and we will continue to work alongside our partners to hold accountable all those who lead and enable ransomware attacks.”

    “The arrest of Mr. Panev reflects the Department’s commitment to using all its tools to combat the ransomware threat,” said Deputy Attorney General Lisa Monaco. “We started this year with a coordinated international disruption of LockBit — the most damaging ransomware group in the world. Fast forward to today and three LockBit actors are in custody thanks to the diligence of our investigators and our strong partnerships around the world. This case is a model for ransomware investigations in the years to come.”

    “The arrest of alleged developer Rostislav Panev is part of the FBI’s ongoing efforts to disrupt and dismantle the LockBit ransomware group, one of the most prolific ransomware variants across the globe,” said FBI Director Christopher Wray. “The LockBit group has targeted both public and private sector victims around the world, including schools, hospitals, and critical infrastructure, as well as small businesses and multi-national corporations. No matter how hidden or advanced the threat, the FBI remains committed to working with our interagency partners to safeguard the cyber ecosystem and hold accountable those who are responsible for these criminal activities.”

    “The criminal complaint alleges that Rotislav Panev developed malware and maintained the infrastructure for LockBit, which was once the world’s most destructive ransomware group and attacked thousands of victims, causing billions of dollars in damage,” said Principal Deputy Assistant Attorney General Nicole M. Argentieri, head of the Justice Department’s Criminal Division. “Along with our domestic and international law enforcement partner actions to dismantle LockBit’s infrastructure, the Criminal Division has disrupted LockBit’s operations by charging seven of its key members (including affiliates, developers, and its administrator) and arresting three of these defendants — including Panev. We are especially grateful for our partnerships with authorities in Europol, the United Kingdom, France, and Israel, which show that, when likeminded countries work together, cybercriminals will find it harder to escape justice.”

    “For five years, Panev helped to grow LockBit into a ransomware machine of deception and extortion,” said Acting Special Agent in Charge Nelson I. Delgado of the FBI Newark Field Office.  “His reach was far and wide but FBI Newark and our international law enforcement partners were able to disrupt his reign. Panev’s arrest marks a victory against these conspirators, and is a step towards upholding justice and neutralizing these criminals.”

    According to the superseding complaint, documents filed in this and related cases, and statements made in court, Panev acted as a developer of the LockBit ransomware group from its inception in or around 2019 through at least February 2024. During that time, Panev and his LockBit coconspirators grew LockBit into what was, at times, the most active and destructive ransomware group in the world. The LockBit group attacked more than 2,500 victims in at least 120 countries around the world, including 1,800 in the United States. Their victims ranged from individuals and small businesses to multinational corporations, including hospitals, schools, nonprofit organizations, critical infrastructure, and government and law-enforcement agencies. LockBit’s members extracted at least $500 million in ransom payments from their victims and caused billions of dollars in other losses, including lost revenue and costs from incident response and recovery.

    LockBit’s members comprised “developers,” like Panev, who designed the LockBit malware code and maintained the infrastructure on which LockBit operated. LockBit’s other members, called “affiliates,” carried out LockBit attacks and extorted ransom payments from LockBit victims. LockBit’s developers and affiliates would then split ransom payments extorted from victims.

    As alleged in the superseding complaint, at the time of Panev’s arrest in Israel in August, law enforcement discovered on Panev’s computer administrator credentials for an online repository that was hosted on the dark web and stored source code for multiple versions of the LockBit builder, which allowed LockBit’s affiliates to generate custom builds of the LockBit ransomware malware for particular victims. On that repository, law enforcement also discovered source code for LockBit’s StealBit tool, which helped LockBit affiliates exfiltrate data stolen through LockBit attacks. Law enforcement also discovered access credentials for the LockBit control panel, an online dashboard maintained by LockBit developers for LockBit’s affiliates and hosted by those developers on the dark web.

    The superseding complaint also alleges that Panev exchanged direct messages through a cybercriminal forum with LockBit’s primary administrator, who, in an indictment unsealed in the District of New Jersey in May, the United States alleged to be Dimitry Yuryevich Khoroshev (Дмитрий Юрьевич Хорошев), also known as LockBitSupp, LockBit, and putinkrab. In those messages, Panev and the LockBit primary administrator discussed work that needed to be done on the LockBit builder and control panel.

    Court documents further indicate that, between June 2022 and February 2024, the primary LockBit administrator made a series of transfers of cryptocurrency, laundered through one or more illicit cryptocurrency mixing services, of approximately $10,000 per month to a cryptocurrency wallet owned by Panev. Those transfers amounted to over $230,000 during that period.

    In interviews with Israeli authorities following his arrest in August, Panev admitted to having performed coding, development, and consulting work for the LockBit group and to having received regular payments in cryptocurrency for that work, consistent with the transfers identified by U.S. authorities. Among the work that Panev admitted to having completed for the LockBit group was the development of code to disable antivirus software; to deploy malware to multiple computers connected to a victim network; and to print the LockBit ransom note to all printers connected to a victim network. Panev also admitted to having written and maintained LockBit malware code and to having provided technical guidance to the LockBit group.

    The LockBit Investigation

    The superseding complaint against, and apprehension of, Panev follows a disruption of LockBit ransomware in February by the U.K. National Crime Agency (NCA)’s Cyber Division, which worked in cooperation with the Justice Department, FBI, and other international law enforcement partners. As previously announced by the Department, authorities disrupted LockBit by seizing numerous public-facing websites used by LockBit to connect to the organization’s infrastructure and by seizing control of servers used by LockBit administrators, thereby disrupting the ability of LockBit actors to attack and encrypt networks and extort victims by threatening to publish stolen data. That disruption succeeded in greatly diminishing LockBit’s reputation and its ability to attack further victims, as alleged by documents filed in this case.

    The superseding complaint against Panev also follows charges brought in the District of New Jersey against other LockBit members, including its alleged primary creator, developer, and administrator, Dmitry Yuryevich Khoroshev. An indictment against Khoroshev unsealed in May alleges that Khoroshev began developing LockBit as early as September 2019, continued acting as the group’s administrator through 2024, a role in which Khoroshev recruited new affiliate members, spoke for the group publicly under the alias “LockBitSupp,” and developed and maintained the infrastructure used by affiliates to deploy LockBit attacks. Khoroshev is currently the subject of a reward of up to $10 million through the U.S. Department of State’s Transnational Organized Crime (TOC) Rewards Program, with information accepted through the FBI tip website at www.tips.fbi.gov/.

    A total of seven LockBit members have now been charged in the District of New Jersey. Beyond Panev and Khoroshev, other previously charged LockBit defendants include:

    • In July, two LockBit affiliate members, Mikhail Vasiliev, also known as Ghostrider, Free, Digitalocean90, Digitalocean99, Digitalwaters99, and Newwave110, and Ruslan Astamirov, also known as BETTERPAY, offtitan, and Eastfarmer, pleaded guilty in the District of New Jersey for their participation in the LockBit ransomware group and admitted deploying multiple LockBit attacks against U.S. and foreign victims. Vasiliev and Astamirov are presently in custody awaiting sentencing.
    • In February, in parallel with the disruption operation described above, an indictment was unsealed in the District of New Jersey charging Russian nationals Artur Sungatov and Ivan Kondratyev, also known as Bassterlord, with deploying LockBit against numerous victims throughout the United States, including businesses nationwide in the manufacturing and other industries, as well as victims around the world in the semiconductor and other industries. Sungatov and Kondratyev remain at large.
    • In May 2023, two indictments were unsealed in Washington, D.C., and the District of New Jersey charging Mikhail Matveev, also known as Wazawaka, m1x, Boriselcin, and Uhodiransomwar, with using different ransomware variants, including LockBit, to attack numerous victims throughout the United States, including the Washington, D.C., Metropolitan Police Department. Matveev remains at large and is currently the subject of a reward of up to $10 million through the U.S. Department of State’s TOC Rewards Program, with information accepted through the FBI tip website at www.tips.fbi.gov/.

    The U.S. Department of State’s Transnational Organized Crime (TOC) Rewards Program is offering rewards of:

    Information is accepted through the FBI tip website at tips.fbi.gov.

    Khoroshev, Matveev, Sungatov, and Kondratyev have also been designated for sanctions by the Department of the Treasury’s Office of Foreign Assets Control for their roles in launching cyberattacks.

    Victim Assistance

    LockBit victims are encouraged to contact the FBI and submit information at www.ic3.gov. As announced by the Department in February, law enforcement, through its disruption efforts, has developed decryption capabilities that may enable hundreds of victims around the world to restore systems encrypted using the LockBit ransomware variant. Submitting information at the IC3 site will enable law enforcement to determine whether affected systems can be successfully decrypted.

    LockBit victims are also encouraged to visit www.justice.gov/usao-nj/lockbit for case updates and information regarding their rights under U.S. law, including the right to submit victim impact statements and request restitution, in the criminal litigation against Panev, Astamirov, and Vasiliev.

    The FBI Newark Field Office, under the supervision of Acting Special Agent in Charge Nelson I. Delgado, is investigating the LockBit ransomware variant. Israel’s Office of the State Attorney, Department of International Affairs, and Israel National Police; France’s Gendarmerie Nationale Cyberspace Command, Paris Prosecution Office — Cyber Division, and judicial authorities at the Tribunal Judiciare of Paris; Europol; Eurojust; the United Kingdom’s National Crime Agency; Germany’s Landeskriminalamt Schleswig-Holstein, Bundeskriminalamt, and the Central Cybercrime Department North Rhine-Westphalia; Switzerland’s Federal Office of Justice, Public Prosecutor’s Office of the Canton of Zurich, and Zurich Cantonal Police; Spain’s Policia Nacional and Guardia Civil; Japan’s National Police Agency; Australian Federal Police; Sweden’s Polismyndighetens; Canada’s Royal Canadian Mounted Police; Politie Dienst Regionale Recherche Oost-Brabant of the Netherlands; and Finland’s National Bureau of Investigation have provided significant assistance and coordination in these matters and in the LockBit investigation generally.

    Assistant U.S. Attorneys Andrew M. Trombly, David E. Malagold, and Vinay Limbachia for the District of New Jersey and Trial Attorneys Debra Ireland and Jorge Gonzalez of the Criminal Division’s Computer Crime and Intellectual Property Section (CCIPS) are prosecuting the charges against Panev and the other previously charged LockBit defendants in the District of New Jersey.

    The Justice Department’s Cybercrime Liaison Prosecutor to Eurojust, Office of International Affairs, and National Security Division also provided significant assistance.

    Additional details on protecting networks against LockBit ransomware are available at StopRansomware.gov. These include Cybersecurity and Infrastructure Security Agency Advisories AA23-325A, AA23-165A, and AA23-075A. 

    The charges and allegations contained in the superseding complaint are merely accusations, and the defendant is presumed innocent unless and until proven guilty.

    Defense counsel: Frank Arleo, Esq.

    MIL Security OSI

  • MIL-OSI Security: United States Attorney Christopher R. Kavanaugh Steps Down

    Source: Office of United States Attorneys

    CHARLOTTESVILLE, Va. – Christopher R. Kavanaugh announced today that he will step down as the United States Attorney for the Western District of Virginia, resigning from the Department of Justice, effective Friday, December 20, 2024 at 11:59 p.m. after serving more than three years in office.

    “Four years ago, Chris Kavanaugh was one of the first people I brought in to join the Office of the Deputy Attorney General because of his experience within the Department and his leadership on national security issues,” said Deputy Attorney General Lisa Monaco. “Throughout his distinguished career – at Main Justice, as an Assistant U.S. Attorney in the District of Columbia and the Western District of Virginia, and as United States Attorney – Chris has served the Department and his fellow Virginians with integrity and tenacity. I am grateful for his service.”

    Mr. Kavanaugh was sworn in by Deputy Attorney General Monaco on October 7, 2021, after having been unanimously confirmed by the United States Senate.  Mr. Kavanaugh was later appointed to be a member of the Attorney General’s Advisory Committee, a group that advises the Attorney General and Deputy Attorney General on emerging policy issues facing the Department and the United States Attorney community.  Mr. Kavanaugh also chaired the AGAC’s National Security Subcommittee, which supported the Department’s enhanced focus on investigations and prosecutions of malign foreign influence and nation state threats.   

    “Chris Kavanaugh has been an incredible partner for ATF and a national leader in the fight against violent crime.  He has worked side-by-side with law enforcement to bring impactful cases, prosecute dangerous criminals, and lead in the innovative use of Crime Gun Intelligence to make Virginia, and this Nation, safer,” said Steven M. Dettelbach, Director of the Bureau of Alcohol, Tobacco, Firearms and Explosives.

    During his tenure, Mr. Kavanaugh led the U.S. Attorney’s Office through a transitional period, expanding its footprint, hiring a record number of federal prosecutors and staff, and spearheading ground-breaking criminal and affirmative civil enforcements.

    “Every day, the public servants of United States Attorney’s Office for the Western District of Virginia work to make the District – and our Nation – a safer and better place for us all,” United States Attorney Kavanaugh said today.  “It has been the honor of my life to lead this team of selfless individuals who are so dedicated to fairness, the rule of law, and doing what is right.  I know that WDVA will continue to make an outsized impact as citizens of the Justice Department, and I look forward to its future.

    I thank President Biden for nominating me, Senators Mark Warner and Tim Kaine for their recommendation, and Attorney General Garland and Deputy Attorney General Monaco for leading the Department and supporting the United States Attorney community during my tenure.  It has been an honor to serve the American people.”

    Under Mr. Kavanaugh’s leadership, the Western District of Virginia has achieved notable successes in numerous complex criminal and civil cases. For example:

    United States v. McKinsey & Company

    For the first time ever, a management consulting firm was held criminally responsible for advice resulting in the commission of a crime by a client, Purdue Pharma, the makers of OxyContin. McKinsey & Company agreed to pay $650 million to resolve criminal and civil investigations into the firm’s consulting work, including a 2013 engagement with Purdue Pharma which McKinsey advised on steps to ‘turbocharge’ sales of OxyContin.  A former senior partner at McKinsey & Company also agreed to plead guilty to one felony count of obstruction of justice for deleting Purdue related documents in an attempt to obstruct future investigations.

    United States v. Envigo

    In 2024, the Western District of Virginia obtained criminal convictions of Envigo, a biotechnology company dedicated to breeding animals for medical research with locations throughout North America.  WDVA’s investigation revealed that Envigo was mistreating animals in violation of the Animal Welfare Act and polluting waterways in violation of the Clean Water Act.  After a federal search warrant was executed, the Justice Department secured the surrender of over 4,000 beagles from an Envigo facility in Cumberland, Virginia. Envigo pled guilty to violating the Animal Welfare Act and the Clean Water Act, agreeing to pay more than $35 million in criminal penalties and fines – a record for any prosecution under the Animal Welfare Act.

    The Killing of Big Stone Gap Police Officer Michael Chandler

    Tragedy struck the small town of Big Stone Gap, Virginia in the early morning hours of November 13, 2021, when Big Stone Gap Police Officer Michael Chandler was murdered while responding to a disturbance call.  The United States Attorney’s Office for WDVA brought federal charges against not only the person who shot and killed Chandler, Michael Donivan White, but also 18 other defendants who were a part of a methamphetamine trafficking conspiracy.  Over the last few years, every single defendant has been convicted. White is scheduled to be sentenced in February 2025 and faces between 40- and 100-years’ incarceration.

    The Bribery Trial of Sheriff Scott Jenkins

    This week, a federal jury in the Charlottesville Division of WDVA returned guilty verdicts on all counts against former Culpeper County Sheriff Scott Jenkins.  Jenkins had accepted numerous cash bribes and bribes in the form of campaign contributions from at least eight different people – one of whom he believed to be a felon – in exchange for appointing them as Auxiliary Deputy Sheriffs.  A jury found Jenkins guilty of bribery, honest services fraud, and conspiracy after a trial and he will be sentenced in March 2025.

    District Transformation

    In addition to the case work victories, under Mr. Kavanaugh’s leadership, the U.S Attorney’s Office itself has transformed. Offices in Abingdon and Charlottesville have expanded, and the Office was awarded a nearly 20% increase in Assistant United States Attorneys, expanding the level of federal prosecutors to their highest levels in history.  In a challenging budget climate, Mr. Kavanaugh has also made strides to modernize the Office’s capabilities to process voluminous amounts of documents for its more sophisticated prosecutions.

    “On behalf of FBI Richmond, I sincerely thank Chris Kavanaugh for his service as U.S. Attorney. His unwavering commitment to justice and his exceptional partnership have been instrumental in advancing our shared mission of keeping Virginia safe. Chris’ leadership and collaboration have made a profound impact, and we deeply appreciate his dedication to ensuring the rule of law prevails,” said Stanley M. Meador, Special Agent in Charge of the FBI Richmond Division.

    “U.S. Attorney Kavanaugh’s leadership and vision have been instrumental in our initiatives to safeguard the health and safety of the citizens of Western Virginia. His determination in developing effective judicial strategies have contributed to the dismantling of many drug-trafficking networks and significantly mitigating this threat to our communities. We extend our best wishes to him in his future endeavors,” said Jarod Forget, Special Agent in Charge of the Drug Enforcement Administration’s Washington Division.

    Prior to his time as United States Attorney, Mr. Kavanaugh was an Assistant United States Attorney for 14 years, having served in United States Attorney’s Offices for both the Western District of Virginia and the District of Columbia.  During his career, Mr. Kavanaugh directed numerous multi-agency investigations and prosecutions, with a focus on national security, white-collar crime, civil rights, and violent crimes involving racketeering and homicides. In WDVA, he served as the District’s chief national security prosecutor and Senior Litigation Counsel.  Among other matters, he led the Department’s investigations and prosecutions into the Unite the Right riots of August 2017 in Charlottesville, Virginia. Just prior to his confirmation, Mr. Kavanaugh was Senior Counsel to Deputy Attorney General Lisa O. Monaco at the U.S. Department of Justice in Washington, D.C.

    MIL Security OSI

  • MIL-OSI Security: Captain in the Islamic Revolutionary Guard Corps (IRGC) Charged with Murder and Terrorism Offenses

    Source: United States Attorneys General 6

    Defendant Allegedly Orchestrated the Nov. 7, 2022, Murder of Stephen Troell, a U.S. Citizen Living in Iraq, in Retaliation for the January 2020 Death of Qasem Soleimani

    Note: View the unsealed complaint here.

    A complaint was unsealed today charging Mohammad Reza Nouri, 36, of Iran, also known as Muhammad Rida Husayn, Ali Asghar Nuri, and Abu Abbas, an Iranian national and officer in the IRGC, in connection with Nouri’s alleged role in orchestrating the Nov. 7, 2022, murder of American Stephen Troell in Baghdad, Iraq. Nouri was arrested in Iraq in March 2023.

    “The Department of Justice will not tolerate terrorists and authoritarian regimes targeting and murdering Americans anywhere in the world,” said Attorney General Merrick B. Garland. “We allege that Mohammad Reza Nouri, an officer in the Islamic Revolutionary Guard Corps, orchestrated the murder of Stephen Troell, an American citizen living in Iraq, carrying out the Iranian Regime’s efforts to take vengeance for the death of Qasim Soleimani. Stephen should still be alive today, and the Justice Department will work relentlessly to ensure accountability for his murder.”

    “The Islamic Revolutionary Guard Corps remains determined to target U.S. citizens, and orchestrated a cold-blooded plot to brutally murder Stephen Troell, a Tennessee native working at an English language institute in Iraq,” said FBI Director Christopher Wray. “According to the allegations, Mohammad Reza Nouri, an IRGC captain, played a key role in planning the attack in which Troell was ambushed as he drove home from work with his wife. Today’s announcement makes clear that the FBI and our partners will not tolerate the IRGC’s ruthless attacks on Americans, here in the United States or overseas, and will hold accountable any who seek to harm our citizens.”

    “As alleged, Mohammad Reza Nouri, a Captain in Iran’s Islamic Revolutionary Guard Corps, orchestrated the murder of American Steven Troell in Iraq,” said Acting U.S. Attorney Edward Kim for the Southern District of New York. “Nouri is alleged to have gathered intelligence on Troell’s daily routine and whereabouts, procured weapons and vehicles, and provided safe harbor to the operatives who carried out the sinister plot to brutally attack Troell in front of his wife. As alleged, the Iranian regime is actively targeting U.S. citizens, such as Troell, living in countries around the world for kidnapping and execution both to repress and silence dissidents critical of the regime and to take vengeance for the death of Qasem Soleimani. This office will not stand by when an American is attacked and murdered in cold blood, and we will continue working with our law enforcement partners to bring Nouri to justice.”

    “As alleged in the complaint, Nouri facilitated Troell’s murder. He gathered information and coordinated with a co-conspirator to procure supplies that operatives relied on during their attack on Troell,” said Assistant Director in Charge David Sundberg of the FBI Washington Field Office. “The FBI will continue to work with our law enforcement partners to bring IRGC operatives, including Nouri’s co-conspirator, to justice for harming Americans.”

    According to court documents, the Government of the Islamic Republic of Iran (Iran) is actively targeting nationals of the United States and its allies living in countries around the world for kidnapping and/or execution both to repress and silence dissidents critical of the Iranian regime and to take vengeance for the January 2020 death of then-Commander of the IRGC-Qods Force (IRGC-QF), Qasem Soleimani, who was killed by a U.S. drone strike in Baghdad. The IRGC is an Iranian military and counterintelligence agency under the authority of Iran’s Supreme Leader, comprised of components including an external operations force, the IRGC-QF, and has been designated as a foreign terrorist organization by the U.S. Secretary of State since April 15, 2019. The IRGC has publicly stated its desire to avenge the death of Soleimani, and, among its activities, the IRGC plots and conducts attack operations outside Iran targeting U.S. citizens residing in the United States and abroad. In November 2022, the Iranian regime struck in Iraq: a group of operatives working on behalf of the IRGC brutally murdered Stephen Troell, a 45-year-old American living in Baghdad, where he worked at an English language institute, as Troell was driving home with his wife after work.

    Nouri is an IRGC Captain who works for the IRGC in Iraq and is involved in the IRGC’s external attack plotting against U.S. citizens and others. Nouri played a key role in the IRGC’s targeting and ultimate murder of Troell, whom Nouri appears to have believed was working as an American or Israeli intelligence officer. Nouri, on behalf of the IRGC, collected critical, highly personal information about Troell to facilitate stalking, attacking, and ultimately killing Troell. Nouri, with the assistance of co-conspirators, developed a source with access to details of Troell’s life and daily routine. With this information, Nouri created intelligence documents for his IRGC associates and a group of operatives recruited to execute the attack, which included Troell’s date of birth, coordinates of his residence, occupation, work schedule, telephone number, wife’s name, and children’s names, among other information. In the weeks leading up to the murder, Nouri coordinated with one of his co-conspirators (CC-1) in the plot targeting Troell to procure some of the means for attacking Troell, including firearms as well as a vehicle for use in the lethal attack on Troell. On the evening of Nov. 7, 2022, the group of recruited operatives carried out the attack. Troell was driving home from work with his wife when heavily armed gunmen in two cars forced the Troells to stop shortly before they reached their residence, blocked any possible escape route, approached Troell on the driver’s side, and, using an assault weapon, shot and killed Troell as his wife witnessed the attack in the passenger seat.   

    On the day of the murder, Nouri coordinated with CC-1 shortly before and immediately after the attack. Nouri and CC-1 spoke repeatedly in the hours leading up to the attack. Less than a half hour after the attack, Nouri sent CC-1 encrypted messages inquiring about the wellbeing of the operatives tasked with carrying out the hit on Troell, asking, “The guys are fine?” and “They are doing well?” to which CC-1 responded, “One is injured.”  As the night went on, CC-1 continued to update Nouri, noting that “two so far” of the operatives on the hit squad — whom Nouri referred to as “our guys” — had gathered safely since the murder, that “the rest are on the way,” and that the injury sustained by one of their confederates was “slight.”  In the course of these encrypted messages, Nouri and CC-1 celebrated the events of the day and their success. That night, after the murder, Nouri left Iraq for Iran. Shortly before departing Baghdad, Nouri visited a religious site associated with mourning for Soleimani’s death.

    Following the murder, approximately nine of the operatives on the hit squad also left Iraq and entered Iran, where they joined Nouri. In Iran, Nouri arranged housing for the operatives, providing them safe harbor in the aftermath of the murder. Nouri and another IRGC official addressed the operatives during their stay in Iran, offered their blessings to the hit squad, and told them that Troell was purportedly a spy on behalf of America and Israel, that Troell threatened Islam by attracting Iraqi youths to the Jewish religion and spreading it in Iraq, and that Troell therefore deserved to be murdered.

    In March 2023, Iraqi authorities arrested Nouri, and he was subsequently convicted by an Iraqi court for his role in Troell’s murder. Nouri remains in custody in Iraq.

    Nouri has been charged with conspiring to provide material support to a foreign terrorist organization resulting in death, and faces a maximum penalty of life in prison; providing material support to a foreign terrorist organization resulting in death, and faces a maximum penalty of life in prison; conspiring to provide material support for acts of terrorism resulting in death, and faces a maximum penalty of life in prison; providing material support for acts of terrorism resulting in death, and faces a maximum penalty of life in prison; conspiring to take hostages, and faces a maximum penalty of life in prison; conspiring to murder U.S. nationals outside the United States, and faces a maximum penalty of life in prison; murdering a U.S. national outside the United States, and faces a maximum penalty of death or life in prison; and  causing death through the use of a firearm, and faces a maximum penalty of death or life in prison. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    The FBI Washington Field Office’s Counterterrorism Division is investigating the case. The Justice Department’s Office of International Affairs; Justice Department’s Attaché in Iraq; FBI Legal Attaché office in Iraq; Iraqi authorities; and U.S. Attorney’s Office for the District of Columbia provided valuable assistance.

    Assistant U.S. Attorneys Jacob H. Gutwillig, Matthew J.C. Hellman, and Kyle A. Wirshba for the Southern District of New York and Trial Attorneys Joshua Champagne and Timothy J. Reardon III of the National Security Division’s Counterterrorism Section are prosecuting the case.

    A complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI USA: Captain in the Islamic Revolutionary Guard Corps (IRGC) Charged with Murder and Terrorism Offenses

    Source: US State of California

    Defendant Allegedly Orchestrated the Nov. 7, 2022, Murder of Stephen Troell, a U.S. Citizen Living in Iraq, in Retaliation for the January 2020 Death of Qasem Soleimani

    Note: View the unsealed complaint here.

    A complaint was unsealed today charging Mohammad Reza Nouri, 36, of Iran, also known as Muhammad Rida Husayn, Ali Asghar Nuri, and Abu Abbas, an Iranian national and officer in the IRGC, in connection with Nouri’s alleged role in orchestrating the Nov. 7, 2022, murder of American Stephen Troell in Baghdad, Iraq. Nouri was arrested in Iraq in March 2023.

    “The Department of Justice will not tolerate terrorists and authoritarian regimes targeting and murdering Americans anywhere in the world,” said Attorney General Merrick B. Garland. “We allege that Mohammad Reza Nouri, an officer in the Islamic Revolutionary Guard Corps, orchestrated the murder of Stephen Troell, an American citizen living in Iraq, carrying out the Iranian Regime’s efforts to take vengeance for the death of Qasim Soleimani. Stephen should still be alive today, and the Justice Department will work relentlessly to ensure accountability for his murder.”

    “The Islamic Revolutionary Guard Corps remains determined to target U.S. citizens, and orchestrated a cold-blooded plot to brutally murder Stephen Troell, a Tennessee native working at an English language institute in Iraq,” said FBI Director Christopher Wray. “According to the allegations, Mohammad Reza Nouri, an IRGC captain, played a key role in planning the attack in which Troell was ambushed as he drove home from work with his wife. Today’s announcement makes clear that the FBI and our partners will not tolerate the IRGC’s ruthless attacks on Americans, here in the United States or overseas, and will hold accountable any who seek to harm our citizens.”

    “As alleged, Mohammad Reza Nouri, a Captain in Iran’s Islamic Revolutionary Guard Corps, orchestrated the murder of American Steven Troell in Iraq,” said Acting U.S. Attorney Edward Kim for the Southern District of New York. “Nouri is alleged to have gathered intelligence on Troell’s daily routine and whereabouts, procured weapons and vehicles, and provided safe harbor to the operatives who carried out the sinister plot to brutally attack Troell in front of his wife. As alleged, the Iranian regime is actively targeting U.S. citizens, such as Troell, living in countries around the world for kidnapping and execution both to repress and silence dissidents critical of the regime and to take vengeance for the death of Qasem Soleimani. This office will not stand by when an American is attacked and murdered in cold blood, and we will continue working with our law enforcement partners to bring Nouri to justice.”

    “As alleged in the complaint, Nouri facilitated Troell’s murder. He gathered information and coordinated with a co-conspirator to procure supplies that operatives relied on during their attack on Troell,” said Assistant Director in Charge David Sundberg of the FBI Washington Field Office. “The FBI will continue to work with our law enforcement partners to bring IRGC operatives, including Nouri’s co-conspirator, to justice for harming Americans.”

    According to court documents, the Government of the Islamic Republic of Iran (Iran) is actively targeting nationals of the United States and its allies living in countries around the world for kidnapping and/or execution both to repress and silence dissidents critical of the Iranian regime and to take vengeance for the January 2020 death of then-Commander of the IRGC-Qods Force (IRGC-QF), Qasem Soleimani, who was killed by a U.S. drone strike in Baghdad. The IRGC is an Iranian military and counterintelligence agency under the authority of Iran’s Supreme Leader, comprised of components including an external operations force, the IRGC-QF, and has been designated as a foreign terrorist organization by the U.S. Secretary of State since April 15, 2019. The IRGC has publicly stated its desire to avenge the death of Soleimani, and, among its activities, the IRGC plots and conducts attack operations outside Iran targeting U.S. citizens residing in the United States and abroad. In November 2022, the Iranian regime struck in Iraq: a group of operatives working on behalf of the IRGC brutally murdered Stephen Troell, a 45-year-old American living in Baghdad, where he worked at an English language institute, as Troell was driving home with his wife after work.

    Nouri is an IRGC Captain who works for the IRGC in Iraq and is involved in the IRGC’s external attack plotting against U.S. citizens and others. Nouri played a key role in the IRGC’s targeting and ultimate murder of Troell, whom Nouri appears to have believed was working as an American or Israeli intelligence officer. Nouri, on behalf of the IRGC, collected critical, highly personal information about Troell to facilitate stalking, attacking, and ultimately killing Troell. Nouri, with the assistance of co-conspirators, developed a source with access to details of Troell’s life and daily routine. With this information, Nouri created intelligence documents for his IRGC associates and a group of operatives recruited to execute the attack, which included Troell’s date of birth, coordinates of his residence, occupation, work schedule, telephone number, wife’s name, and children’s names, among other information. In the weeks leading up to the murder, Nouri coordinated with one of his co-conspirators (CC-1) in the plot targeting Troell to procure some of the means for attacking Troell, including firearms as well as a vehicle for use in the lethal attack on Troell. On the evening of Nov. 7, 2022, the group of recruited operatives carried out the attack. Troell was driving home from work with his wife when heavily armed gunmen in two cars forced the Troells to stop shortly before they reached their residence, blocked any possible escape route, approached Troell on the driver’s side, and, using an assault weapon, shot and killed Troell as his wife witnessed the attack in the passenger seat.   

    On the day of the murder, Nouri coordinated with CC-1 shortly before and immediately after the attack. Nouri and CC-1 spoke repeatedly in the hours leading up to the attack. Less than a half hour after the attack, Nouri sent CC-1 encrypted messages inquiring about the wellbeing of the operatives tasked with carrying out the hit on Troell, asking, “The guys are fine?” and “They are doing well?” to which CC-1 responded, “One is injured.”  As the night went on, CC-1 continued to update Nouri, noting that “two so far” of the operatives on the hit squad — whom Nouri referred to as “our guys” — had gathered safely since the murder, that “the rest are on the way,” and that the injury sustained by one of their confederates was “slight.”  In the course of these encrypted messages, Nouri and CC-1 celebrated the events of the day and their success. That night, after the murder, Nouri left Iraq for Iran. Shortly before departing Baghdad, Nouri visited a religious site associated with mourning for Soleimani’s death.

    Following the murder, approximately nine of the operatives on the hit squad also left Iraq and entered Iran, where they joined Nouri. In Iran, Nouri arranged housing for the operatives, providing them safe harbor in the aftermath of the murder. Nouri and another IRGC official addressed the operatives during their stay in Iran, offered their blessings to the hit squad, and told them that Troell was purportedly a spy on behalf of America and Israel, that Troell threatened Islam by attracting Iraqi youths to the Jewish religion and spreading it in Iraq, and that Troell therefore deserved to be murdered.

    In March 2023, Iraqi authorities arrested Nouri, and he was subsequently convicted by an Iraqi court for his role in Troell’s murder. Nouri remains in custody in Iraq.

    Nouri has been charged with conspiring to provide material support to a foreign terrorist organization resulting in death, and faces a maximum penalty of life in prison; providing material support to a foreign terrorist organization resulting in death, and faces a maximum penalty of life in prison; conspiring to provide material support for acts of terrorism resulting in death, and faces a maximum penalty of life in prison; providing material support for acts of terrorism resulting in death, and faces a maximum penalty of life in prison; conspiring to take hostages, and faces a maximum penalty of life in prison; conspiring to murder U.S. nationals outside the United States, and faces a maximum penalty of life in prison; murdering a U.S. national outside the United States, and faces a maximum penalty of death or life in prison; and  causing death through the use of a firearm, and faces a maximum penalty of death or life in prison. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    The FBI Washington Field Office’s Counterterrorism Division is investigating the case. The Justice Department’s Office of International Affairs; Justice Department’s Attaché in Iraq; FBI Legal Attaché office in Iraq; Iraqi authorities; and U.S. Attorney’s Office for the District of Columbia provided valuable assistance.

    Assistant U.S. Attorneys Jacob H. Gutwillig, Matthew J.C. Hellman, and Kyle A. Wirshba for the Southern District of New York and Trial Attorneys Joshua Champagne and Timothy J. Reardon III of the National Security Division’s Counterterrorism Section are prosecuting the case.

    A complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI Security: Miami Duo Found Guilty of Kidnapping and Murder

    Source: Office of United States Attorneys

    MIAMI – On Dec. 17., James Edward Daniels, 59, and Frederick Eugene Rudolph, 69, of Miami, Fla., were found guilty of conspiracy to commit kidnapping resulting in death, multiple counts of kidnapping resulting in death, and kidnapping, at trial before U.S. District Court Judge Roy K. Altman. 

    On Dec. 5, 2020, Daniels, Rudolph, and other co-conspirators kidnapped three victims from a truck yard in Opa Locka, Fla. They bound and tortured the victims, duct-taped their eyes, and threw them into the back of a rented van after stealing the victims’ drugs. They drove around the city for hours before taking the victims to an abandoned house in Opa-Locka and attempting to execute them by shooting the three victims. Two of the victims died, while one miraculously survived.

    Daniels stole jewelry from one of the murdered victims, and all the defendants benefitted by receiving drugs, money, or both, in exchange for their participation in the conspiracy.

    A third defendant, Herbert Barr, 56, pled guilty to kidnapping on Nov. 26.

    U.S. Attorney Markenzy Lapointe for the Southern District of Florida, Special Agent in Charge Jeffrey B. Veltri of the FBI, Miami Field Office, Director Stephanie V. Daniels of the Miami-Dade Police Department, and Special Agent in Charge Deanne L. Reuter of the Drug Enforcement Administration (DEA), Miami Field Division, made the announcement.

    FBI Miami Division Homestead Resident Agency, Miami-Dade Police Department Homicide Bureau,  and DEA Homestead Office investigated the case. Assistant U.S. Attorneys Yara Dodin, Nardia Haye, and Katie Guthrie are prosecuting the case.

    Sentencing is scheduled for March 10, 2025, before Judge Altman. Daniels and Rudolph face up to life in prison, criminal fines of up to $250,000 as to each count, and up to a lifetime on supervised release.

    This investigation was carried out by members of the South Florida High Intensity Drug Trafficking Area (HIDTA) Task Force.  The South Florida HIDTA, established in 1990, is made up of federal, state, and local law enforcement agencies who, cooperatively, target the region’s drug-trafficking and money laundering organizations.  The South Florida HIDTA is funded by the Office of National Drug Control Policy, which sponsors a variety of initiatives focused the nation’s illicit drug trafficking threats. For more information regarding HIDTA visit https://www.dea.gov/operations/hidta.

    You may find a copy of this press release (and any updates) on the website of the United States Attorney’s Office for the Southern District of Florida at www.usdoj.gov/usao/fls.

    Related court documents and information may be found on the website of the District Court for the Southern District of Florida at www.flsd.uscourts.gov or at http://pacer.flsd.uscourts.gov, under case number 23-cr-20431.

    ###

    MIL Security OSI

  • MIL-OSI Security: Denver Man Sentenced for Operating Illegal Gambling Parlor

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    DENVER – The United States Attorney’s Office for the District of Colorado announces that Jonathan Arvay, 38, of Denver, was sentenced to one year and one day in prison after being found guilty by a federal jury on one count of conducting an illegal gambling business and one count of conspiracy to conduct an illegal gambling business.

    According to the facts established at trial, Arvay operated Player One Arcade in Denver, part of a network of gambling parlors extending from Greeley to Pueblo.  These parlors offered several electronic forms of gambling through games made to resemble arcade games, as well as virtual slot machines in which customers attempted to earn credits.  Upon completing their game of choice, customers would exchange any credits won for a purported cryptocurrency, Obsidian Digital Asset Coin (ODAC), whose only function was to be exchanged for cash at an ATM-like “cryptocurrency teller machine” next door to or within the gambling parlor.  Customers were required to pay a transaction fee to exchange the ODAC for U.S. currency.

    “This was a modern version of old-fashioned illegal gambling,” said Acting United States Attorney Matt Kirsch. “I am grateful for our local and federal partners who helped put this criminal in prison.”

    “This sentence reflects an appropriate resolution to a complicated case: When you launder money and commit fraud against the government, the FBI and our partners will track you down across jurisdictions,” said FBI Denver Special Agent in Charge Mark Michalek.

    “IRS-CI remains on the cutting edge of cybercrime investigations as financial crimes continue to become more sophisticated,” said Tom Demeo Acting Special Agent in Charge, IRS Criminal Investigation Denver Field Office. “We are committed to staying one step ahead of criminals and leveraging our partnerships with federal and local law enforcement agencies to protect the U.S. tax system.”

    United States District Judge Gordon P. Gallagher presided over the trial. The FBI Denver Field Division, the IRS Criminal Investigation Denver Field Office, and the Pueblo Police Department conducted the investigation. Assistant United States Attorneys Cyrus Y. Chung, Alison Connaughty, and Jena Neuscheler handled the prosecution.

    Case Number: 23-cr-00222-GPG

    MIL Security OSI

  • MIL-OSI Security: FBI and Cincinnati Police Announce $15,000 Reward in Death of Five-Year-Old Arty Stanford

    Source: Federal Bureau of Investigation FBI Crime News (b)

    The FBI and the Cincinnati Police Department today announced a reward of up to $15,000 for information leading to the arrest and conviction of the individual(s) responsible for the death of Artagist “Arty” Stanford III.

    “Arty’s family has suffered greatly since this shooting and anyone responsible for his death should be held accountable,” stated FBI Cincinnati Special Agent in Charge Elena Iatarola. “Someone in our community knows what happened that night and who was involved. We need anyone with information to do the right thing and contact law enforcement.”

    “Silence protects the wrong people,” said Cincinnati Police Chief Teresa Theetge. “Someone knows what happened. Someone holds the key to bringing closure to Arty’s family. Please speak up and help us bring justice for Arty.”

    On October 24, 2024, at approximately 5:48 a.m., the Cincinnati Emergency Communications Center received a report of a drive-by shooting at a house on Holland Drive. Initially, residents believed there were no injuries and the house only received damage from the gunfire. When police arrived, family members found five-year-old Artagist “Arty” Stanford III suffering from a gunshot wound to the head in an upstairs bedroom. There were at least seven bullet impact marks or bullet holes in the front of the house. One of the bullets passed through the front exterior wall into a second-floor bedroom and struck Arty in the head.

    Arty was taken to the hospital for treatment which included multiple surgeries. On October 26, 2024, Arty succumbed to his injuries and his death was ruled a homicide.

    Anyone with information regarding this incident is asked to call the FBI at 1-800-Call-FBI or Crime Stoppers at 513-352-3040.

    MIL Security OSI

  • MIL-OSI Security: Des Moines Individuals Charged in Joint State and Federal Investigation of Fentanyl Trafficking Organization

    Source: Office of United States Attorneys

    DES MOINES, Iowa – A federal grand jury in Des Moines returned a three-count indictment charging five Des Moines individuals with offenses related to fentanyl trafficking.

    The following individuals are charged in the Indictment:

    • Devonte Darnell Hassell, also known as “Domo”, “Dom”, and “Rose”, 28, is charged with conspiracy to distribute and distribution of fentanyl. He faces a mandatory minimum 10-year prison sentence and a maximum sentence of life in prison.
    • Ryan Redmond, also known as “Chiefy”, 31, is charged with conspiracy to distribute and distribution of fentanyl. He faces a mandatory minimum 5‑year prison sentence and a maximum sentence of 40 years in prison.
    • Kevin Stanley Harris, Jr., also known as “Rylo” and “Big Hands”, 42, is charged with conspiracy to distribute and distribution of fentanyl. He faces a mandatory minimum 10-year prison sentence and a maximum sentence of life in prison, as he is alleged to have a prior serious drug felony conviction.
    • Adonis Angel Devora, 43, is charged with conspiracy to distribute fentanyl. She faces a maximum sentence of 20 years in prison.
    • Ricky Jamall Ellis, 30, is charged with conspiracy to distribute fentanyl. He faces a maximum sentence of 30 years in prison.

    These individuals were all arrested on December 18, 2024: four in Des Moines, and one in Houston, Texas. The same day, thirteen federal search warrants were executed, which resulted in the seizure of approximately 610 grams of heroin/fentanyl mixture, approximately 135 grams of methamphetamine, approximately 260 grams of marijuana, as well as 19 firearms and more than $13,000 in U.S. currency.

    The charges stem from a months’ long investigation into fentanyl distribution within the Des Moines area.

    United States Attorney Richard D. Westphal of the Southern District of Iowa made the announcement. The Des Moines Police Department, the United States Postal Inspection Service, and FBI Des Moines Central Iowa Gang Task Force (CIGTF) are investigating the case, with assistance from the Iowa Department of Public Safety-Division of Narcotics Enforcement (DNE), Iowa Department of Public Safety-Division of Intelligence and Fusion Center, Iowa State Patrol, Iowa State Patrol SWAT, United States Marshals Service, Ames Police Department, West Des Moines Police Department, Mid-Iowa Narcotics Enforcement Task Force (MINE), Polk County Sheriff’s Office, Story County Sheriff’s Office, Mid-Iowa Drug Task Force (MIDTF), Central Iowa Drug Task Force (CIDTF), Suburban Emergency Response Team (SERT), Metro Special Tactics and Response (STAR), the Chicago, Illinois Police Department, and the Houston, Texas Police Department.

    This investigation is part of an Organized Crime Drug Enforcement Task Forces (OCDETF) investigation. OCDETF identifies, disrupts, and dismantles the highest-level drug traffickers, money launderers, gangs, and transnational criminal organizations that threaten the United States by using a prosecutor-led, intelligence-driven, multi-agency approach that leverages the strengths of federal, state, and local law enforcement agencies against criminal networks.

    An indictment is merely an allegation, and all defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI