Category: FBI

  • MIL-OSI Security: Informational: Federal Court arraignments

    Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

    The U.S. Attorney’s Office announced that the following persons were arraigned or appeared this week before U.S. Magistrate judges on indictments handed down by the Grand Jury or on criminal complaints. The charging documents are merely accusations and defendants are presumed innocent until proven guilty beyond a reasonable doubt:

    Appearing in Missoula before U.S. Magistrate Judge Kathleen L. DeSoto and pleading not guilty on Oct. 11 was:

    Johntay Jujuan Taylor, 27, of Texas, on charges of conspiracy to commit bank fraud and wire fraud. If convicted of the most serious crime, Taylor faces a maximum of 30 years in prison, a $1 million fine and five years of supervised release. Taylor was detained pending further proceedings. The FBI; U.S. Secret Service; Chubbock, Pocatello and Kemmerer, Idaho, Police departments; Bannock County, Idaho, Sheriff’s Office; Idaho State Police; Missoula, Bozeman, Helena, Livingston and Laurel, Montana, Police departments; Yellowstone County, Montana, Sheriff’s Office; Teton County, Wyoming, Sheriff’s Office; and Evanston and Mountain View, Wyoming, Police departments conducted the investigation. PACER case reference. 23-13.

    Appearing Oct. 10 was:

    Keegan Allan Strelnik, 42, of Florence, on charges of prohibited person in possession of a firearm. If convicted of the most serious crime, Strelnik faces a maximum of 15 years in prison, a $250,000 fine and three years of supervised release. Strelnik was released pending further proceedings. The Bureau of Alcohol, Tobacco, Firearms and Explosives, U.S. Probation Office and Montana Department of Fish, Wildlife and Parks conducted the investigation. PACER case reference. 24-54.

    Nicole Lynn Shain, 39, of Bonners Ferry, Idaho, on charges of possession with intent to distribute methamphetamine and fentanyl. If convicted of the most serious crime, Shain faces a mandatory minimum of five years to 40 years in prison, a $5 million fine and at least four years of supervised release. Shain was detained pending further proceedings. Homeland Security Investigations and the Flathead Tribal Police Department conducted the investigation. PACER case reference. 24-50.

    The progress of cases may be monitored through the U.S. District Court Calendar and the PACER system. To establish a PACER account, which provides electronic access to review documents filed in a case, please visit http://www.pacer.gov/register.html. To access the District Court’s calendar, please visit https://ecf.mtd.uscourts.gov/cgi-bin/PublicCalendar.pl.

    XXX

    MIL Security OSI

  • MIL-OSI Security: Fresno Man Sentenced to 3 Years in Prison for Series of Vehicle Pipe-Bombings

    Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

    FRESNO, Calif. — Scott Eric Anderson, 46, of Fresno, was sentenced Wednesday to three years in prison for conspiracy to destroy property, malicious destruction by means of an explosive device and being a felon in possession of a firearm, U.S. Attorney Phillip A. Talbert announced.

    According to court documents, between November 2022 and February 2023, Anderson committed a series of pipe-bombings on unoccupied vehicles and property in Fresno. The bombings damaged vehicles belonging to two auto-related businesses on Clinton Avenue in Fresno. On Feb. 19, 2023, a bomb heavily damaged a vehicle used by a home health care business on Fallbrook Avenue in Fresno. Anderson sometimes recorded his crimes by video. Law enforcement also recovered a pistol in Anderson’s bedroom. Anderson was previously convicted of carrying a loaded and concealed weapon and is prohibited from possessing a firearm.

    This case was the product of an investigation by the Fresno Police Department, the Federal Bureau of Investigation, and the Bureau of Alcohol, Tobacco, Firearms and Explosives. Assistant U.S. Attorney Michael G. Tierney prosecuted the case.

    MIL Security OSI

  • MIL-OSI USA: Magellan Diagnostics Sentenced for Concealing Malfunction in Lead Testing Devices

    Source: US Food and Drug Administration

    Department of Justice
    U.S. Attorney’s Office
    District of Massachusetts 

    FOR IMMEDIATE RELEASE
    Thursday, October 10, 2024

    Company failed to notify FDA about serious malfunction in lead testing devices that resulted in inaccurately low blood level results in children and adults

    BOSTON –Magellan Diagnostics, Inc., a medical device company headquartered in Billerica, Mass., was sentenced yesterday in federal court in Boston for criminal charges related to the concealment of a device malfunction that produced inaccurately low lead test results for tens of thousands of children and other patients.

    Magellan has been ordered to pay a $21.8 million fine, $10.9 million in forfeiture and a minimum of $9.3 million to compensate patient victims. Magellan pleaded guilty to two counts of introducing a misbranded medical device into interstate commerce. Magellan was charged criminally on May 21, 2024

    “Keeping the people of Massachusetts safe takes a variety of forms. In the case of Magellan Diagnostics, it means protecting children who may have been exposed to dangerous levels of lead that can lead to serious health consequences. This company has admitted that it left lead blood level monitoring devices in pediatricians’ offices that it knew were providing inaccurately low readings, putting thousands of kids at risk of not having their elevated lead levels accurately diagnosed. In addition to holding the company accountable, this criminal sentence requires the company to undertake an extensive effort to identify and compensate victims.”

    “Medical device makers have an obligation to provide truthful information to protect patients. By deliberately concealing and consistently misleading consumers and the FDA about device malfunctions, Magellan acted with gross disregard for its responsibility to comply with FDA requirements and put patients at risk,” said Fernando McMillian, Special Agent in Charge, FDA Office of Criminal Investigations, New York Field Office. “We will continue to thoroughly investigate those whose actions undermine the integrity of the FDA regulatory process which exists to protect consumer health.”

    “It’s absolutely appalling that Magellan Diagnostics was more concerned about its bottom line than it was about coming clean to their customers and the FDA about a serious malfunction in its lead testing devices that we believe unnecessarily endangered the health of incredibly vulnerable victims,” said Jodi Cohen, Special Agent in Charge of the Federal Bureau of Investigation, Boston Division. “When you’re not feeling well, and you’re trying to find out why, the last thing you should have to worry about is whether the diagnostic test you’re relying on lives up to its manufacturer’s claims. The FBI is grateful to see that the victims affected by Magellan’s actions in this case are one step closer to being compensated.”

    “Magellan concealed a serious flaw in its lead testing devices while ignoring the well-being of patients and knowingly providing inaccurate results of lead levels in the blood,” said Roberto Coviello, Special Agent in Charge of the U.S. Department of Health and Human Services, Office of Inspector General. “This type of egregious conduct, which only sought to benefit the corporate bottom line, can erode the public’s trust in our nation’s health care system. Today’s sentencing should send a clear message that any company engaging in such dangerous activity will be held accountable.”

    Magellan’s LeadCare Ultra and LeadCare II devices detected lead levels and lead poisoning in the blood of children and adults using either venous (blood draws through the arm) or fingerstick samples. LeadCare II, which was predominantly used to test fingerstick samples, accounted for more than half of all blood lead tests conducted in the United States from 2013 through 2017. LeadCare Ultra was predominantly used to test venous samples.

    According to court documents, Magellan failed to timely notify the FDA about a serious malfunction that caused the company’s LeadCare devices to produce inaccurate blood lead level results when used to test venous blood samples. Magellan also changed the user instructions for the LeadCare devices without prior FDA notice or approval.

    Magellan first learned that a malfunction in its LeadCare Ultra device could cause inaccurate lead test results – specifically, lead test results that were falsely low – during the FDA clearance process in June 2013. Magellan, however, released LeadCare Ultra to the market in late 2013 without informing customers or the FDA of the malfunction. In August 2014, LeadCare Ultra customers independently discovered the malfunction and complained about inaccurate results. FDA regulations required the company to file a medical device report about the malfunction within 30 days, but Magellan did not do so.

    In November 2014, Magellan sent a letter to its LeadCare Ultra customers advising them of the malfunction and recommending that they wait 24 hours before running their tests. This contradicted the instructions for use approved by the FDA. Magellan did not, however, report the malfunction to the FDA or advise the FDA of its change to the instructions until April 2015, nearly 21 months after Magellan discovered the malfunction and almost 8 months after customers discovered the malfunction on their own. In August 2015, Magellan changed the label instructions for the LeadCare Ultra device to require users to wait 24 hours before using the device to test blood samples, rather than testing the samples immediately. FDA regulations required the company to provide advance notice of the label change and file necessary reports of device correction, but Magellan did neither.  

    Magellan’s testing in 2013 also indicated that the same malfunction affected the LeadCare II device when it was used to test venous samples. Magellan, however, did not notify the FDA about the LeadCare II malfunction until November 2016.

    The FDA ultimately found that the LeadCare devices could not accurately test venous samples, leading to a recall of all LeadCare devices using venous samples and a warning to the public not to use LeadCare Ultra, LeadCare II or LeadCare Plus for testing venous blood samples because of the malfunction and a recommendation that doctors retest certain patients.

    According to the Centers for Disease Control and Prevention, there is no safe level of lead in the blood. Lead exposure may cause irreversible lifelong physical and mental health problems. Young children and pregnant women are most vulnerable to lead exposure, especially those from low-income households and those who live in housing built before 1978 because those homes are more likely to contain lead-based paint and have fixtures containing lead.

    As part of the criminal resolution, Magellan has agreed to compensate patients who were demonstrably harmed for the economic damages they suffered as a result of the malfunction in Magellan’s blood lead testing devices. If you or a family member believe you received an inaccurate blood lead test result from a LeadCare device between 2013–2017, please complete the questionnaire located on the FBI’s website at www.fbi.gov/MagellanCaseInquiry. Information about the status of the case is located on the U.S. Attorney’s Office website: https://www.justice.gov/usao-ma/victim-and-witness-assistance-program/magellan-diagnostics-inc.

    Acting U.S. Attorney Levy; FDA SAC McMillan; FBI SAC Cohen; and HHS-OIG SAC Coviello made the announcement today. Assistant U.S. Attorneys James Herbert, Kelly Lawrence and Leslie Wright of the Health Care Fraud Unit prosecuted the case.

    MIL OSI USA News

  • MIL-OSI Security: Eighteen Individuals and Entities Charged in International Operation Targeting Widespread Fraud and Manipulation in the Cryptocurrency Markets

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    First-ever criminal charges against financial services firms for market manipulation and “wash trading” in the cryptocurrency industry

    BOSTON – Eighteen individuals and entities have been charged for widespread fraud and manipulation in the cryptocurrency markets. Charges were unsealed in Boston against the leaders of four cryptocurrency companies, four cryptocurrency financial services firms (known as “market makers”) and employees at those firms.

    Four defendants have pleaded guilty, another defendant has agreed to plead guilty, and authorities apprehended three other defendants in Texas, the United Kingdom and Portugal this week. More than $25 million in cryptocurrency has been seized and multiple trading bots responsible for millions of dollars’ worth of wash trades for approximately 60 different cryptocurrencies have been deactivated.

    According to the charging documents, the defendants who created cryptocurrency companies made false statements about their cryptocurrencies (“tokens”) and executed sham trades in those tokens (“wash trades”) to create the appearance of trading activity that would make the tokens look like good investments. These deceptive tactics allegedly attracted new investors and purchasers, which resulted in an increase in the tokens’ trading prices. The defendants are then alleged to have sold their tokens at the artificially inflated prices, a fraud commonly known as a “pump and dump.” The largest of these cryptocurrency companies, Saitama, at one point had a multi-billion-dollar market value.

    The cryptocurrency companies also allegedly hired financial services firms ( “market makers”) to wash trade their tokens in exchange for payment. As one market maker defendant, who has agreed to plead guilty, described the practice to a prospective client: the “objective on the secondary markets” is to find “other buyers from the community, people you don’t know about or don’t care about” because “we have to make [the other buyers] lose money in order to make profit.”

    Three market makers—ZM Quant, CLS Global and MyTrade—along with their employees are charged with allegedly wash trading and/or conspiring to wash trade on behalf of NexFundAI, a cryptocurrency company and token created at the direction of law enforcement as part of the government’s investigation. A fourth market maker, Gotbit, its CEO, and two of its directors are also charged for perpetrating a similar scheme.

    Specifics regarding the defendants and conduct are detailed in Attachment A below.

    “This investigation, the first of its kind, identified numerous fraudsters in the cryptocurrency industry. Wash trading has long been outlawed in the financial markets, and cryptocurrency is no exception. These are cases where an innovative technology – cryptocurrency – met a century old scheme – the pump and dump. The message today is, if you make false statements to trick investors, that’s fraud. Period. Our Office will aggressively pursue fraud, including in the cryptocurrency industry,” said Acting United States Attorney Joshua Levy. “These charges are also a stark reminder of how vigilant online investors must be and that doing your homework before diving into the digital frontier is critical. People considering making investments in the cryptocurrency industry should understand how these scams work so that they can protect themselves.”

    “What the FBI uncovered in this case is essentially a new twist to old-school financial crime. ‘Operation Token Mirrors’ targeted nefarious token developers, promoters, and market makers in the crypto space. What we uncovered has resulted in charges against the leadership of four cryptocurrency companies, and four crypto ‘market makers’ and their employees who are accused of spearheading a sophisticated trading scheme that allegedly bilked honest investors out of millions of dollars,” said Jodi Cohen, Special Agent in Charge of the Federal Bureau of Investigation, Boston Division. “The FBI took the unprecedented step of creating its very own cryptocurrency token and company to identify, disrupt, and bring these alleged fraudsters to justice.”

    If you bought or sold any of the tokens referenced below, please fill out this form.

    The Securities & Exchange Commission has filed civil complaints alleging violations of the securities laws in relation to the conduct at Gotbit, CLS, ZM Quant, Saitama and Robo Inu. Valuable assistance was provided by the Federal Bureau of Investigation’s Legal Attachés (Madrid and London), Portugal’s Policia Judiciaria European Network of Fugitive Active Search Team (ENFAST), the United Kingdom’s National Crime Agency’s National Extradition Unit, the Internal Revenue Service Criminal Investigation, Boston Field Office and the Criminal Division’s Computer Crime and Intellectual Property Section, National Cryptocurrency Enforcement Team.

    Acting United States Attorney Joshua S. Levy and Jodi Cohen, Special Agent in Charge of the Federal Bureau of Investigation, Boston Division made the announcement. Assistant U.S. Attorneys Christopher J. Markham and David M. Holcomb of the Securities, Financial & Cyber Fraud Unit are prosecuting the cases.  

    The details contained in the charging documents are allegations. The defendants are presumed to be innocent unless and until proven guilty beyond a reasonable doubt in the court of law.  

    ###

    ATTACHMENT A

    The following individuals and entities have been charged in U.S. District Court in Boston, Mass.:

    Aleksei Andriunin, Fedor Kedrov, Qawi Jalili, Gotbit Consulting LLC (Gotbit) According to court documents, Gotbit was a well-known “market maker” in the cryptocurrency industry. Aleksei Andriunin, 26, of Russia and Portugal, was Gotbit’s Chief Executive Officer and Founder. Andriunin was arrested on Oct. 8, 2024 in Portugal and awaits extradition. Fedor Kedrov, of Russia, was Gotbit’s Director of Market Making. Qawi Jalili, of Russia was Gotbit’s Director of Sales. Gotbit, Kedrov and Jalili are each charged with wire fraud and conspiracy to commit market manipulation and wire fraud. Andriunin is also charged in a separate criminal complaint with wire fraud, conspiracy to commit market manipulation and wire fraud and conspiracy to commit money laundering.

    It is alleged that between 2018 and 2024, Gotbit provided market manipulation and wash trading services to several cryptocurrency companies, including companies located in the United States. Gotbit allegedly made wash trades worth millions of dollars on behalf of clients and received tens of millions of dollars in proceeds for these illicit services. In a 2019 interview published online, Andriunin allegedly described how he developed a code to wash trade and artificially inflate cryptocurrency trading volume. Andriunin allegedly kept track of Gotbit’s market manipulation, including with spreadsheets that compared “Created Volume” from wash trades with naturally occurring “Market Volume.” Gotbit’s employees, including Jalili and Kedrov, allegedly described these wash trading tactics to prospective clients and how to avoid detection. Jalili and Kedrov also allegedly provided these services to multiple cryptocurrencies, including the Saitama and Robo Inu cryptocurrencies.

    Riqui Liu, Baijun Ou, ZM Quant Investment LTD (ZM Quant) ZM Quant was a “market maker” in the cryptocurrency industry that allegedly advertised illicit market manipulation services to clients. Riqui Liu, 26, of the United Kingdom and Hong Kong, was an employee of ZM Quant. Baijun Ou, 32, of Hong Kong, was also an employee of ZM Quant. ZM Quant, Liu and Ou are each charged in a superseding indictment with wire fraud and conspiracy to commit market manipulation and wire fraud.

    According to court documents, ZM Quant allegedly advertised a “trading bot” that could “create volume.” ZM Quant employees allegedly discussed these illicit services with clients through Telegram messages and during video teleconferences. For example, as alleged in the charging documents, during a video teleconference in March 2024, Liu and Ou described how ZM Quant would trade “maybe ten times per minute or twenty times a minute” to “increase the trading volume” and “pump the price.” Liu and Ou also described how ZM Quant allegedly used multiple trading wallets to avoid having the trading look “fake.” It is further alleged that ZM Quant provided market manipulation services for multiple cryptocurrency companies, including Saitama and NexFundAI.

    Andrey Zhorzhes, CLS Global FZC, LLC (CLS) CLS was a “market maker” in the cryptocurrency industry that allegedly advertised illicit market manipulation services to its clients. Andrey Zhorzhes, of the United Arab Emirates, was an employee of CLS. Both CLS and Zhorzhes are charged in an indictment with wire fraud and conspiracy to commit market manipulation and wire fraud.

    It is alleged that Zhorzhes described to a prospective client how CLS’s algorithm generated trading volume on multiple cryptocurrency exchanges, as follows: 

    • “We have an algorithm that . . . basically does self-trades, buying and selling.”
    • “The idea of volume generation is . . . so the token looks organic and looks live and people get interested in trading it.”
    • “It’s very hard to track. . ..We’ve been doing that for many clients.”
    • “I know that it’s wash trading and I know people might not be happy about it.”

    Zhorzhes and other CLS traders allegedly provided these market manipulation services for NexFundAI.

    Liu Zhou, MyTrade MM – MyTrade MM was another “market maker” in the cryptocurrency industry that advertised illicit market manipulation services to its clients, including “pump and dump” consulting services and “wash trades” facilitated by “bots.” Liu Zhou, 39, of China and Canada, was the founder of MyTrade MM. Zhou is charged and has agreed to plead guilty to conspiracy to commit market manipulation and wire fraud.

    MyTrade MM’s clients had access to a dashboard on MyTrade MM’s website through which clients specified the desired amount of daily wash trades on identified cryptocurrency exchanges. MyTrade MM’s dashboard described the service as “Volume Support” and allowed for millions in wash trades per day for each client cryptocurrency, for example:

    In conversations with purported promoters of NexFundAI, Zhou allegedly described MyTrade MM as superior to “CLS” and “Gotbit” because those market makers “keep clients in the dark” and “control the pump and dump,” which means “they can do inside trading easily.” Zhou allegedly also described the various purposes for wash trading, including showing “continuous trading activity every hour”; generating large enough trading volumes for cryptocurrency exchanges to waive listing fees; and executing “pump and dumps.” According to court documents, Zhou further described that the “objective on the secondary markets” was to find “other buyers from the community, people you don’t know about or don’t care about” because “we have to make [the other buyers] lose money in order to make profit.”

    Manpreet Kohli, Haroon Mohsini, Nam Tran, Max Hernandez, Russell Armand, Vy Pham, Saitama LLC (Saitama) – Saitama was a cryptocurrency company, originally incorporated in Massachusetts in August 2021.

    Manpreet Kohli, 43, of the United Kingdom, was the CEO of Saitama. Kohli was arrested in the United Kingdom on Oct. 7, 2024 and is awaiting extradition. Haroon Mohsini, 37, of Texas, also worked at Saitama. Mohsini was arrested on Oct. 7, 2024 in the Southern District of Texas. Nam Tran, 32, of Vietnam, worked at Saitama and is currently in Vietnam. Kohli, Mohsini and Tran are each charged in a superseding indictment with wire fraud, market manipulation, and conspiracy to commit wire fraud, commit market manipulation and conduct an unlicensed money transmitting business. Max Hernandez, 36, of Massachusetts, and Russell Armand, 42, of Texas, also worked at Saitama and are charged separately and have both pleaded guilty to market manipulation and conspiracy to commit wire fraud and to operate an unlicensed money transmitting business. Vy Pham, 32, of California, is also charged for conduct at a different cryptocurrency company but, as part of that guilty plea, admitted to certain conduct involving Saitama.

    Saitama allegedly purported to create a series of products that could be used with its token and, at its peak, boasted a market value of $7.5 billion. Saitama’s leadership allegedly made a variety of false public statements, including that Saitama’s business plan had been reviewed by regulators, that its leadership was not selling the Saitama tokens they owned and that the Saitama token was coded in a way that prevented market manipulation. According to charging documents, in reality Saitama’s leadership was actively manipulating the market for the Saitama token and secretly selling their Saitama tokens for tens of millions in profits.

    Saitama’s market manipulation campaign allegedly began in or about July 2021, when leadership coordinated a series of small purchases spread across multiple cryptocurrency wallets. These trades were coordinated on Telegram, where Armand allegedly explained that the goal was to “create an illusion of massive buys and new holders” to “incite ppl [people] to buy 
    more…W[e] want list of small buys to look like it’s mor[e] buyers. That’s the idea.” Saitama’s leadership allegedly confirmed their purchases to one another, discussed how they were successfully getting others to purchase the Saitama cryptocurrency and exchanged “pump it” memes and GIFs:

    Thereafter, the Saitama leadership allegedly paid several market makers to wash trade the Saitama cryptocurrency on cryptocurrency exchanges, including BitMart, LBank and XT.com. The market makers that Saitama paid allegedly included ZM Quant and Gotbit.

    Robo Inu Finance (Robo Inu) – Robo Inu was a cryptocurrency company and token that Vy Pham created after she left Saitama in 2021. Pham has been charged and agreed to plead guilty to conspiracy to commit market manipulation, to commit wire fraud and to operate an unlicensed money transmitting business. Pham founded and promoted Robo Inu from the United States. Like Saitama, Robo Inu allegedly purported to create a series of products that could be used with its cryptocurrency. Beginning in or about 2022, Robo Inu allegedly paid Gotbit to artificially inflate the trading volume of the Robo Inu token through wash trades on cryptocurrency exchanges such as Bitmart.

    Michael Thompson, VZZN – VZZN was a cryptocurrency company and token that Armand created after he left Saitama in 2023. Michael Thompson, 50, of Virginia, also worked at VZZN. As with Armand, Thompson is charged and pleaded guilty to conspiracy to commit market manipulation. VZZN allegedly purported to be a video streaming service that could be used with the VZZN token. While promoting that service, Armand and Thompson allegedly also made misleading public statements about VZZN and artificially inflated the trading volume of the VZZN token through wash trades.

    Bradley Beatty, Lillian Finance LLC (Lillian Finance) – Lillian Finance was a cryptocurrency company and token founded by Bradley Beatty, 48, of Florida. Beatty is charged in an indictment with wire fraud. Lillian Finance allegedly purported to use blockchain technology in the healthcare industry and to use a portion of proceeds generated from token sales for charitable purposes. Beatty allegedly made a series of false statements about Lillian Finance to attract investors, for example, that he was a defense contractor and that he had addressed Congress on the topic of cryptocurrency. Thereafter, it is alleged that Beatty generated hundreds of thousands of dollars in proceeds from retail sales of the Lillian Finance token and misappropriated a portion of Lillian Finance’s profits that were supposed to be used for charity.

    The charge of market manipulation provides for a sentence of up to 20 years in prison, up to three years of supervised release, a fine of up to $5 million or twice the gross gain or loss from the offense and forfeiture. The charge of wire fraud provides for a sentence of up to 20 years in prison, up to three years of supervised release, a fine of up to $250,000 or twice the gross gain or loss from the offense, restitution and forfeiture. The charge of conspiracy to commit wire fraud, market manipulation and/or to conduct an unlicensed money transmitting business provides for a sentence of up to five years in prison, up to three years of supervised release, a fine of up to $250,000 to twice the gross gain or loss from the offense, restitution and forfeiture. The charge of conspiracy to commit money laundering provides for a sentence of up to 20 years in prison, three years of supervised release, a fine of $500,000, or twice the value of the criminally derived property, whichever is greater, and forfeiture. Sentences are imposed by a federal district court judge based upon the U.S. Sentencing Guidelines and statutes which govern the determination of a sentence in a criminal case.

    ###

    MIL Security OSI

  • MIL-OSI Security: Boston Man Charged in Elder Fraud Conspiracy That Defrauded Elderly Victim of Over $400,000

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    BOSTON – A South Boston man has been arrested and charged in connection with a scheme that defrauded a 75-year-old man from Berkshire County, Mass., of approximately $420,000.

    Urvishkumar Vipulkumar Patel, 21, was charged with conspiracy to commit wire fraud. Patel was arrested on Oct. 7, 2024 and subsequently released by the Court on conditions including GPS monitoring and orders that he remain in Massachusetts.

    According to the charging documents, in or around June 2024, the victim received a pop-up message on his computer claiming that his computer was frozen. The message contained a phone number, which the victim believed to be associated with Microsoft, and directed the victim to call for assistance. The victim then called the phone number listed in the pop-up and allegedly spoke with an individual before being transferred to another individual who called himself, “Sam Wilson.”

    It is alleged that Wilson claimed to be a federal agent with the U.S. Treasury Department and purported to confirm the victim’s name and address. When the victim stated that was not the correct address, Wilson provided additional addresses until the victim identified his correct address. Wilson then allegedly told the victim that the victim’s name and address were listed as being involved in a money laundering scheme and that the “Treasury” showed a number of houses had been purchased in the United States and Russia in the victim’s name. Wilson allegedly told the victim that he was going to help him get out of this trouble and would speak to a judge but that, in the meantime, the victim needed to safeguard his money from being further implicated in the supposed money laundering scheme. Specifically, Wilson allegedly told the victim he should withdraw cash from his bank and send it to the Treasury Department, where it would be kept in a lock box until the victim was cleared of the scheme. Wilson also allegedly cautioned that the bank would not let the victim withdraw all of his money at once – directing the victim to make the withdrawals in smaller amounts and send it to Wilson at the “Treasury” in installments.

    On approximately five separate occasions over the course of three months, the victim withdrew and provided approximately $420,000 in cash to several individuals he believed to be associated with “Sam Wilson.” On each occasion, Wilson asked the victim how much he could withdraw from his bank account, directed the victim to place the cash in a taped box with the victim’s own name and address written on it. Wilson also allegedly told the victim a specific date and time at which he would send a courier for the cash. On each occasion, the courier would pull alongside the curb in front of the victim’s house, lower one of the passenger side windows and provide a prearranged “PIN” passcode to the victim. The victim would then place the box of cash into the courier’s vehicle who would then drive away.  

    The victim’s sister reported this activity to law enforcement on Oct. 1, 2024. According to the charging documents, on Oct. 7, 2024, Patel served as the courier waiting outside of the victim’s home and was approached by an undercover officer posing as the victim. It is alleged that, after receiving the prearranged “PIN” passcode from Patel, the undercover officer placed the box into Patel’s vehicle and Patel quickly drove away. He was immediately apprehended.

    At the time of his arrest, Patel was allegedly driving a rental car and was actively engaged in a WhatsApp call on his cell phone. Patel allegedly told law enforcement that he had been collecting packages for weeks at the direction of another individual in exchange for payment. Patel also allegedly told law enforcement that he would deliver each package to a prearranged location before receiving his payment.

    The investigation remains ongoing. Members of the public who believe they are victims of a cybercrime – including elder fraud scams, cryptocurrency scams, romance scams, investment scams, and business email compromise fraud scams – should contact USAMA.CyberTip@usdoj.gov. To report elder fraud, please visit the FBI’s IC3 Elder Fraud Complaint Center or contact the dedicated National Elder Fraud Hotline at 833–FRAUD–11 or 833–372–8311 Monday – Friday, 10a.m.- 6p.m. EST.

    The charge of conspiracy to commit wire fraud provides for a sentence of up to 20 years in prison, up to three years of supervised release and a fine of up to $250,000. Sentences are imposed by a federal district court judge based upon the U.S. Sentencing Guidelines and statutes which govern the determination of a sentence in a criminal case.

    Acting United States Attorney Joshua S. Levy and Jodi Cohen, Special Agent in Charge of the Federal Bureau of Investigation, Boston Division made the announcement. Valuable assistance was provided by the North Adams Police Department and the Hampden County Sheriff’s Office. Assistant U.S. Attorney Kaitlin Brown of the Worcester Branch Office is prosecuting the case.

    The details contained in the charging documents are allegations. The defendant is presumed innocent unless and until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: FBI Philadelphia Emphasizes Strong Passwords for Cybersecurity Awareness Month

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)

    This Cybersecurity Awareness Month, the FBI Philadelphia Field Office reminds the public of the importance of using strong passwords or passphrases to protect their systems and accounts.

    These days, with how our lives are intertwined in the cyberspace, from staying connected to family and friends, to working and banking, strong online security has never been more critical.

    We use passwords for everything from protecting our devices to accounts.

    Many use simple passwords from “Password” or “1234” in an attempt to make them easier to remember. Simple passwords, even those that might include special characters, are easier to crack.

    Utilizing strong passwords and passphrases is vital in protecting against data breaches. A personal data breach occurs when personal data is leaked or spilled from a secure location to an untrusted environment. It can also happen when someone’s sensitive, protected, or confidential data is copied, transmitted, viewed, stolen, or used by an unauthorized person.

    In 2023, Pennsylvania residents reported over 1,900 complaints of personal data breaches to the FBI’s Internet Crime Complaint Center (IC3), totaling about $44.8 million in reported losses.

    In 2023, New Jersey residents reported over 1,300 complaints of personal data breaches to the IC3, totaling about $18 million in reported losses.

    Below are some password best practices:

    • Use strong and complex passwords or passphrases instead of simple passwords
    • Strong passwords should be long, random, unique

    Example password: aiH!ple$dAli&hp Example passphrase: City Statue Photograph Boxer Pretzel

    • Do NOT reuse passwords across multiple accounts
    • Be careful of using personally identifiable information when building a password to include birthdays, pet names, etc.
    • Use a password manager
    • Set up multi-factor authentication for your accounts

    For additional information on how you can protect yourself, your device, and your information, visit On the Internet: Be Cautious When Connected FBI

    For more strong password tips, visit: Use Strong Passwords | CISA

    To report a personal data breach or other Internet-enabled crime to the FBI, visit ic3.gov.

    FBI Philadelphia can be reached at (215) 418-4000.

    MIL Security OSI

  • MIL-OSI Security: Registered Sex Offender Arrested on Federal Charges Alleging He Targets & Exploits Local High School Students

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)

    COLUMBUS, Ohio – Law enforcement agents arrested a Columbus man this morning on federal charges alleging he sexually exploited high school girls and coerced them into engaging in commercial sex acts.

    Terrance P. Cummings, 29, has a criminal history of unlawful sexual conduct with minors dating back to 2016. In this case, Cummings’s federal child exploitation charge carries a mandatory minimum of 25 years and up to 50 years in prison and the coercion and enticement charge pending against him is punishable by at least 10 years and up to life in prison.

    The FBI asks anyone with information related to the criminal allegations against Cummings to text 740-428-0739.

    According to an affidavit filed in support of the criminal complaint, in July 2024, the Central Ohio Human Trafficking Task Force received information about a 16-year-old victim allegedly receiving gifts and illicit substances from Cummings in exchange for sex acts.

    The court documents allege Cummings had sex with numerous minor victims in exchange for drugs in addition to requesting nude images of them. On some occasions, Cummings would allegedly provide the drug to the minor victims before engaging in sex acts with them. It is alleged that Cummings sold or provided fentanyl, marijuana, Xanax, cocaine, acid and ecstasy. 

    While executing a search warrant at Cummings’s apartment in August, agents discovered a variety of narcotics, along with two iPhones submerged in the water tank on the back of the bathroom toilet, which Cummings had allegedly attempted to destroy after learning about the warrant.

    Cummings’s electronics and other accounts contained more than 18,000 sexual images and videos including child pornography. The investigation revealed that Cummings requested sexually explicit content in exchange for money, gifts and drugs.

    Cummings is charged with sexually exploiting a minor, distributing, receiving or possessing child pornography, coercion and enticement of a minor, and obstruction of justice. His case was unsealed today, and he appeared in federal court at 1:15pm.

    Kenneth L. Parker, United States Attorney for the Southern District of Ohio; Elena Iatarola, Special Agent in Charge, Federal Bureau of Investigation (FBI), Cincinnati Division; and Ohio Attorney General Dave Yost announced the charges. Assistant United States Attorneys Emily Czerniejewski and Jennifer Rausch are representing the United States in this case.

    The Central Ohio Human Trafficking Task Force was formed under Ohio Attorney General Dave Yost’s Ohio Organized Crime Investigations Commission, and includes resources from the Columbus Division of Police, Homeland Security Investigations, Delaware County Sheriff’s Office, Powell Police Department, Bureau of Criminal Investigations, The Ohio State University Police Department, Marysville Division of Police, Salvation Army, Southeast Healthcare, the Franklin County Prosecutor’s Office and the Delaware County Prosecutor’s Office.

    A criminal complaint merely contains allegations, and defendants are presumed innocent unless proven guilty in a court of law.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Former Arkansas Sheriff’s Deputies Sentenced for Federal Civil Rights Violations for Violently Assaulting Subdued Man

    Source: United States Attorneys General

    Two former Crawford County, Arkansas, sheriff’s deputies were sentenced for using unlawful force on a man they arrested. Levi White, 34, was sentenced yesterday to 63 months in prison, and Zackary King, 28, was sentenced today to 12 months in prison.

    Each defendant pleaded guilty to one count of deprivation of rights under color of law for a retaliatory assault on R.W., a 26-year-old man. On Aug. 21, 2022, White, King and a third officer approached R.W. in a gas station parking lot during their investigation into a person threatening a store attendant. R.W. lunged at White and tackled him, then all three officers quickly subdued R.W. and pinned him to the ground. After R.W. was pinned to the ground and no longer fighting the officers, White punched R.W. at least nine times in the head, then lifted R.W.’s head and slammed it into the pavement. King kicked R.W. in the back and struck R.W. once in the midsection with his fist. Following the announcement of a federal investigation into the assault, White obstructed the investigation by wiping all data from his county-issued cell phone and selectively deleting text messages about the incident from his personal phone. White asked King if King was also going to wipe his cell phone, but King declined to do so.

    “Punching a man in the head, slamming their head repeatedly on the concrete pavement, kicking them in the back and striking them in the midsection — this kind of gratuitous and unjustified violence at the hands of law enforcement runs contrary to the oath that officers take in our country to protect and serve,” said Assistant Attorney General Kristen Clarke of the Justice Department’s Civil Rights Division. “The defendants swore an oath to uphold the law, then violated that oath and abused their power as law enforcement officers by assaulting a person in their custody. At the time of the assaults, three officers had already subdued the victim, and further force was unnecessary and unlawful. White added fuel to the fire by taking steps to obstruct the investigation into the violent assault. The Justice Department will continue to vigorously prosecute officers who abuse their authority and violate the rights of people in their custody.”

    “Levi White and Zackary King’s sentencings prove that no law enforcement officer is above the law,” said Special Agent in Charge Alicia D. Corder of the FBI Little Rock Field Office. “FBI Little Rock, alongside our trusted partners at Arkansas State Police, will continue to investigate potential abuses of power and civil rights violations throughout our state. We encourage anyone who has information about abusive or corrupt law enforcement to contact the FBI’s ArkTrust Task Force immediately.”

    The FBI Little Rock Field Office and Arkansas State Police investigated the case.

    Assistant U.S. Attorneys Dustin Roberts and Devon Still for the Western District of Arkansas and Special Litigation Counsel Michael J. Songer and Trial Attorneys Lia Rettammel and Anna Gotfryd of the Justice Department’s Civil Rights Division prosecuted this case.

    MIL Security OSI

  • MIL-OSI USA: Grassley Investigation into FBI Sexual Misconduct Reveals ‘Fox is Guarding the Hen House’

    US Senate News:

    Source: United States Senator for Iowa Chuck Grassley
    WASHINGTON – Sen. Chuck Grassley (R-Iowa) is shining new light on the prevalence of sexual misconduct at the FBI, amid continued agency stonewalling and empty assurances from Director Christopher Wray that he would “follow up” on Grassley’s inquiries. Despite FBI’s lack of cooperation, Grassley’s ongoing oversight reveals the FBI is still not protecting its own employees from sexual harassment and is treating child sex abuse cases as a non-priority.
    Grassley today sent a pointed letter to the FBI and Justice Department (DOJ). In it, he urged the FBI to own up to its failures and provide the data he’s requested for years. The information Grassley recently received via protected whistleblower disclosures suggests his oversight dating back to October 2022 is as timely as ever.
    Sexual Misconduct Persists among FBI Employees:
    Latest records show the assistant director who requested a review of disciplinary patterns at the FBI – which found hundreds of senior officials voluntarily retired or resigned to evade accountability for sexual misconduct allegations – left the FBI while he, himself, was under investigation.
    “Apparently, one of the reasons DOJ and its component agencies can’t straighten out their problems of workplace harassment is that the fox is guarding the hen house,” Grassley wrote. “The supreme irony of [then-Executive Assistant Director of the Human Resources Branch, Jeffrey] Sallet requesting the [Office of Disciplinary Appeals] review of senior officials retiring or resigning to avoid disciplinary action is that ‘Sallet left the FBI and federal service while this investigation was ongoing.’”
    FBI Moves Agents off Child Sex Abuse Cases, onto January 6 Cases:
    Per protected whistleblower disclosures, the FBI has reassigned personnel from high-volume child exploitation cases to January 6 cases. Grassley notes FBI’s failure to dedicate adequate resources to child sex abuse cases is a decades-old problem politicization at the bureau is exacerbating. One reassigned whistleblower said they sat “essentially idle for eight to nine months” on January 6 cases while child sex abuse cases piled up. An Assistant Special Agent in Charge reportedly told that whistleblower, “Child sexual abuse material investigations were no longer an FBI priority […].”
    “One thing is certain,” Grassley wrote, “The FBI will not be able to remedy its many failings in this area if it treats sexual abuse against children as a non-priority.”
    Background:
    DOJ Office of the Inspector General (OIG) and Congress have long pushed FBI to address sexual harassment across the bureau. In 2021, DOJ OIG issued the FBI two recommendations on its demonstrated failures to hold employees responsible for wrongdoing after they separate from the agency, particularly when they do so while under investigation. As of today, approximately three years later, the FBI has not closed either of those recommendations.
    -30-

    MIL OSI USA News

  • MIL-OSI USA: Scott, Grassley, Colleagues Push DOJ to Investigate Requirements for Hamas-Linked Campus Orgs to Register as Foreign Agents

    US Senate News:

    Source: United States Senator for South Carolina Tim Scott

    WASHINGTON – U.S. Senator Tim Scott (R-S.C.), member of the Senate Foreign Relations Committee, joined Senator Chuck Grassley (R-Iowa) in penning a letter to the Justice Department (DOJ) and FBI regarding Foreign Agents Registration Act (FARA) enforcement, raising concerns Hamas-linked entities are escaping FARA scrutiny as they seek to shape U.S. public opinion and policy outcomes through partnerships with campus organizations. Joining Senators Scott and Grassley on the effort are Senators Joni Ernst (R-Iowa) and Ted Cruz (R-Texas).

    The senators’ inquiry specifically hones in on the National Students for Justice in Palestine (NSJP) – which received backing from an organization whose associated entities the U.S. government has implicated for financing Hamas – and the hundreds of Students for Justice in Palestine (SJP) chapters NSJP claims to support across the U.S.

    “It is incumbent upon all of us crack down on hidden foreign influence. […] The introduction of hostile foreign adversaries into domestic political discussion is especially of issue when it is fueling an alarming rise in antisemitism and anti-Israel sentiment. The public reporting appears to indicate that NSJP and related chapters may fit into the FARA definition of ‘publicity agent,’ at minimum, and its conduct, among other activity, may constitute a public relations effort designed to impact U.S. public opinion in favor of a foreign principal, which would meet FARA’s definition of political activities,” wrote the senators.

    The senators continued, “Taken as a whole, these actions require further investigation from DOJ and the FBI to fully determine whether NSJP and SJP chapters should register as foreign agents under FARA and the extent of Hamas and Iran’s potential involvement.”

    Scott, Grassley, and their colleagues cite numerous examples that signal NSJP and SJP chapters may have an obligation to register as agents under FARA. Several follow.

    1. Federal court filings from state Attorneys General assert NSJP’s material support to Hamas.
    2. Dozens of SJP chapters echoed NSJP’s social media messages lauding Hamas’ brutal October 7, 2023, attack on Israel; some “[praised] the creativity” of Hamas’ surprise attacks on Israeli civilians.
    3. NSJP urged SJP chapters in the U.S. to publicly facilitate and join “armed struggles, general strikes and popular demonstrations.”
    4. NSJP launched a campaign against U.S. college administrators, pushing for divestments in Israel-connected assets.
    5. NSJP held a summer 2024 program for SJP participants to “deepen our understanding of our current political moment […] with the aim entrenching the frameworks necessary to sustain and grow the Student Intifada.”
    6. NSJP has stated it “aim[s] to develop a student movement that is connected, disciplined, and equipped” with tools toward fulfilling its mission.

    Considering this evidence and more, the senators are asking DOJ and FBI pointed questions about the steps they have taken to assess NSJP and SJP’s potential requirement to register as foreign agents.

    Background:

    Congress passed FARA in 1938 to identify Nazi propaganda and other foreign efforts to sway U.S. policy and public opinion. The content-neutral law was designed not to prohibit activity, but rather, to ensure certain individuals who act as agents of a foreign government or enterprise register with DOJ.

    Read the full letter here.

    MIL OSI USA News

  • MIL-OSI USA: Reed Teams Up with AARP & RI State Police for Elder Fraud Prevention Summit

    US Senate News:

    Source: United States Senator for Rhode Island Jack Reed
    EAST PROVIDENCE, RI – Older adults are a growing population in Rhode Island, and a growing target for criminals seeking to scam them out of their hard-earned savings.
    In an effort to protect older Americans from financial exploitation and the proliferation of evolving scams, U.S. Senator Jack Reed today teamed up with AARP Rhode Island and the Rhode Island State Police’s Financial Crimes Unit for an Elder Fraud Prevention Summit at the East Providence Senior Center.  The presentation and Q&A session focused on a range of fraud and scams that criminals are using to target older adults and included tips for detection, prevention, and advice on how to report and recover if you or a loved one is victimized.
    According to the Federal Bureau of Investigation (FBI), elder fraud complaints rose by 14 percent in 2023, and losses grew by 11 percent. The report found that elder fraud resulted in losses of over $3.4 billion in 2023, including $7.4 million lost by Rhode Islanders over age sixty due to scams.
    Senator Reed says public education and outreach is needed to lower that number, which is likely underreported because many victims are too embarrassed to notify the authorities or don’t know where to turn.  He credited AARP, the Rhode Island State Police, and local TV stations and the news media for helping to raise awareness and enable older Americans protect themselves, recognize telltale signs of scams, reduce victimization, and combat the financial exploitation.
    “Two of the most important things people can do to protect themselves against fraud is to stay informed and have open lines of communication with trusted sources.  And if you do get scammed, report it to the authorities right away so they can help you.  Criminals targeting older Americans try to scare victims and create a false sense of urgency.  Know the signs, stay informed, and never be embarrassed if you ever get caught up in a scam.  The criminals are master manipulators and with Artificial Intelligence and new technology, anyone can get scammed.  Brilliant people of all ages and from all walks of life have been victimized.  The one thing most victims have in common is: They didn’t tell anyone else what was happening.  Don’t let it happen to you.  Be forewarned and help stop these crimes by reporting them.  Local, state, and federal law enforcement are working together to go after the bad guys and bring them to justice,” said Senator Reed.
    To help older Rhode Islanders stay informed about evolving scams and equip them with tools to stop the latest fraud techniques, AARP offers a free Fraud Watch Network’s Watchdog Alert, a twice monthly notification that lets users know about the latest trending scams and how to spot and avoid them. It’s also easy to share with friends and family.
    AARP Rhode Island’s State Director Catherine Taylor stated: “There’s a false narrative that older people are gullible or forgetful. That’s not true. If you are the victim of a scam, it’s not your fault. The fact is many of these scams are being perpetrated by usually offshore criminals who are well organized, well resourced, and highly skilled. And they have a playbook with three common elements: make unexpected contact, yield high emotion, and create a sense of urgency. AARP Rhode Island has a host of resources, information and support that equip older Rhode Islanders to fight back against the crime of fraud.”
    Nationwide, the FBI reports that tech support scams were the most widely reported type of scam last year.  The top five varieties of scams include: personal data breaches, confidence and romance scams, non-payment or non-delivery scams, and investment scams. Investment scams were the costliest type of elder fraud.
    The Rhode Island State Police offers an Identity Theft, Fraud & Scams resource page with detailed tips on detecting and preventing a range of financial crimes. 
    “Romance scams, investment scams, pop-up scams on computers, and others are all things we’ve seen in Rhode Island. Although they may differ in tactics, the goal is the same: to take your money,” said Lieutenant Richard Ptaszek, head of Rhode Island State Police Financial Crimes Unit. “To help prevent scams, you must take your time, think about the request being made, trust your judgement and follow up with a trusted source.”
    If fraud occurs, please help the authorities track and prosecute it by reporting it to both the local police and using the Federal Trade Commission’s online reporting portal: https://reportfraud.ftc.gov  Last year, Rhode Islanders reported 11,906 fraud complaints to the FTC.
    To reach the Rhode Island State Police’s Financial Crimes Unit directly, call: (401) 764-5179.
    The U.S. Department of Justice also has a toll-free National Elder Fraud Hotline available to help at: 1-833 FRAUD-11 (1-833-372-8311).  The hotline is staffed during business hours by caseworkers trained in elder abuse and offers translation services for non-English speakers.
    The presentation focused on combatting several types of schemes that the FBI says are among the most prevalent today, including:
    Tech support scam: Criminals pose as technology support representatives and offer to fix non-existent computer issues. The scammers gain remote access to victims’ devices and sensitive information.
    Grandparent scam: A type of confidence scam where criminals pose as a relative—usually a child or grandchild—claiming to be in immediate financial need.
    Government impersonation scam: Criminals pose as government employees and threaten to arrest or prosecute victims unless they agree to provide funds or other payments.
    Sweepstakes/charity/lottery scam: Criminals claim to work for legitimate charitable organizations to gain victims’ trust. Or they claim their targets have won a foreign lottery or sweepstake, which they can collect for a “fee.”
    Home repair scam: Criminals appear in person and charge homeowners in advance for home improvement services that they never provide.
    Romance scam: Criminals pose as interested romantic partners on social media or dating websites to capitalize on their elderly victims’ desire to find companions.
    TV/radio scam: Criminals target potential victims using illegitimate advertisements about legitimate services, such as reverse mortgages or credit repair.
    Family/caregiver scam: Relatives or acquaintances of the elderly victims take advantage of them or otherwise get their money.
    In many of these scams, the criminal impersonates someone else and tricks the victim over the phone or email, claiming there’s an issue with their bank account and they must make a crypto investment in order to resolve the problem. The scammer instructs the target to convert cash to cryptocurrency and upload it to an unsecured account that the scammer can access. 
    No legitimate entity will contact you over the phone and urge you to pay with crypto currency, gift cards, or precious metals.  Any time someone does this, hang up or cut off contact and report the incident.
    For more information, visit Senator Reed’s scam prevention page: https://www.reed.senate.gov/seniorscams

    MIL OSI USA News

  • MIL-OSI USA: Ernst, Grassley Call for Hamas-Linked Campus Orgs to Register as Foreign Agents

    US Senate News:

    Source: United States Senator Joni Ernst (R-IA)
    WASHINGTON – U.S. Senator Joni Ernst (R-Iowa) joined U.S. Senator Chuck Grassley (R-Iowa) in raising concerns that Hamas-linked entities on college campuses may be noncompliant with the Foreign Agents Registration Act (FARA) as they seek to shape U.S. public opinion and policy outcomes. 
    In the face of this national security threat, they are calling on the Department of Justice (DOJ) and Federal Bureau of Investigation (FBI) to look into the role of National Students for Justice in Palestine (NSJP) – which received backing from an organization whose associated entities the U.S. government has implicated for financing Hamas – and the hundreds of Students for Justice in Palestine (SJP) chapters NSJP claims to support across the U.S. 
    “It is incumbent upon all of us [to] crack down on hidden foreign influence. […] The introduction of hostile foreign adversaries into domestic political discussion is especially of issue when it is fueling an alarming rise in antisemitism and anti-Israel sentiment. The public reporting appears to indicate that NSJP and related chapters may fit into the FARA definition of ‘publicity agent,’ at minimum, and its conduct, among other activity, may constitute a public relations effort designed to impact U.S. public opinion in favor of a foreign principal, which would meet FARA’s definition of political activities,” the senators wrote.
    “Taken as a whole, these actions require further investigation from DOJ and FBI to fully determine whether NSJP and SJP chapters should register as foreign agents under FARA and the extent of Hamas and Iran’s potential involvement,” the senators continued.
    In the letter, the senators cite numerous examples that signal NSJP and SJP chapters may have an obligation to register as foreign agents under FARA.
    Additionally, the lawmakers are demanding answers to what actions DOJ has taken to assess whether NSJP and SJP chapters should register under FARA, if DOJ has assessed whether NSJP has committed violations under FARA-related statutes, and if any SJP chapter ever requested an opinion in relation to work done on behalf of a foreign entities.
    Read the full letter here.
    Background:
    Ernst led her colleagues in demanding the Department of Education uphold its legal obligations to ensure Jewish and Israeli students are not subjected to discrimination. She also sponsored the Stop Antisemitism on College Campuses Act to cut federal funding for any college or university that allows antisemitic events to occur on their campus.
    As cases of antisemitism on campuses started to increase, Ernst introduced the Students’ Bill of Rights to protect the First Amendment rights of students and stem discrimination at its source.
    She also joined her colleagues in calling on the Biden administration for its plan to restore order and protect Jewish students and demanded an investigation into organizations behind antisemitic protests.
    Ernst requested the Internal Revenue Service (IRS) examine if any of the 501(c)(3) organizations backing violent antisemitic protests were in violation of their tax exempt status and reiterated her call to action when they blew off her request.

    MIL OSI USA News

  • MIL-OSI Security: Resident of New Hampshire Sentenced for Involvement in Online Scheme to Defraud the Elderly

    Source: Federal Bureau of Investigation (FBI) State Crime News

    ALEXANDRIA, La. – United States Attorney Brandon B. Brown announced that Raj Vinodchandra Patel, 34, of New Hampshire, has been sentenced by United States District Judge Dee D. Drell to 51 months in prison for his role in an online scheme to defraud the elderly.  On June 20, 2024, Patel pleaded guilty to one count indictment charging him with conspiracy to commit wire fraud.  

    Sometime in September 2023, an elderly resident in Alexandria, Louisiana, saw a “pop-up” message on their computer screen which directed them to call a computer “helpline.” This alleged computer helpline was merely a contact number being operated by one of Patel’s co-conspirators from India. When the victim called this supposed helpline, they were told that criminal activity had been seen on their computer and then transferred them to an alleged special agent working for the Federal Trade Commission in Washington, D.C. who would assist them further. However, the victim was not actually communicating with a federal agent but in truth and in fact, it was another of Patel’s co-conspirators operating from India. This fake federal agent falsely claimed that the victim’s Social Security number had been compromised, and that their monetary assets were at risk and that the only way to fix it would be for the victim to liquidate their bank account, buy gold bullion, and then transfer that gold bullion to another federal agent who would maintain the gold for supposed safe keeping until the “federal investigation” was completed. When in truth and in fact, there was no federal investigation, but this was an online scam to steal money and property from the victim. 

    Patel worked as a courier in this wire fraud scheme. On October 7, 2023, he flew from Boston to New Orleans, rented a car, and drove to the victim’s residence to retrieve the gold bullion. The victim had been instructed by Patel’s co-conspirator in India to place the gold bullion into the backseat of Patel’s rental car. Unbeknownst to Patel, however, the victim had contacted the Federal Bureau of Investigation (“FBI”) about the fraud scheme. The FBI set up a sting operation and video recorded Patel retrieving the package from the victim and driving away.

    Troopers with the Louisiana State Police stopped Patel and he was placed under arrest. Following his arrest, Patel admitted to his part in this scheme and that he had flown to other places across the United States for gold pickups from other elderly victims. Patel further admitted that as he was being stopped by law enforcement officers, he deleted the “WhatsApp Business” application from his cell phone in order to conceal his communications with co-conspirators. The intended loss amount attributed to this fraud scheme was approximately $514,000.

    “There is a keen federal interest to protect the elderly and prosecute those who take advantage of their vulnerability by using them to commit financial crimes,” said United States Attorney Brandon B. Brown. “This is a transnational crime, spanning from India to central Louisiana, that was investigated because the victim trusted his/her instincts and immediately contacted law enforcement. The Department of Justice is ready, willing, and able to seek justice for the elderly, who are the backbone of our country.”

    “Victims in Louisiana lost nearly $12 million dollars to schemes just like this one last year and those are the people we know about,” said Special Agent in Charge Lyonel Myrthil of FBI New Orleans. “The victim in this case did exactly as we ask the public to do. Trust your instincts. Take a break and call law enforcement. These actors are getting bolder and potential victims are putting their lives at risk with these encounters. We ask the public to report any suspicious activity like this to IC3.gov or by calling 1-800-CALL-FBI.”

    The case was investigated by the Federal Bureau of Investigation and Louisiana State Police and prosecuted by Assistant United States Attorney Mike Shannon.

    To report elder fraud, contact the dedicated National Elder Fraud Hotline at 1-833-FRAUD-11 or 1-833-372-8311 and visit the FBI’s IC3 Elder Fraud Complaint Center at IC3.gov.  To learn more about the Department of Justice’s elder justice efforts please visit the Elder Justice Initiative page.

    # # #

     

    MIL Security OSI

  • MIL-OSI Security: Formerly Married Couple Sentenced for Multimillion Dollar Fraud Schemes

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    Orlando, FL – United States District Judge Paul G. Byron has sentenced Nikesh Ajay Patel (40, formerly of Windermere), and his ex-wife, Trisha Patel, (41, Orlando), for their roles in a financial scheme defrauding the U.S. Department of Agriculture (USDA) and others. On October 8, 2024, Nikesh Patel was sentenced to 27 years in federal prison, which must run consecutive to a 25-year term he is already serving from the Northern District of Illinois. Trisha Patel was sentenced on September 18, 2024, to 51 months in federal prison. Both are required to pay restitution to the USDA and four other financial institutions.

    According to court documents, Nikesh Patel was charged in 2014 by the U.S. Attorney’s Office in the Northern District of Illinois for a $179 million fraud scheme. He was arrested and released on bond. For the next several years, Nikesh Patel claimed that he was cooperating with authorities and using his business skills to recover funds to repay the victims. In fact, Nikesh Patel had devised a new scheme against the USDA that netted him over $19 million. Nikesh Patel was planning to flee to Ecuador on a private jet and avoid sentencing in the Chicago case. Instead, FBI agents arrested Nikesh Patel at the Kissimmee airport on January 6, 2018, and arrested him for attempting to abscond. Nikesh Patel was subsequently returned to Chicago, where he was sentenced to 25 years in federal prison on June 6, 2018.

    Thereafter, on December 18, 2019, a federal grand jury in Orlando returned a 13-count indictment against Nikesh Patel for stealing $19 million while he was on federal pretrial release in the Chicago case. On February 28, 2023, Patel pleaded guilty as charged to all counts in that indictment: one count of conspiracy to commit wire fraud, three counts of wire fraud, one count of conspiracy to commit money laundering, and eight counts of money laundering.

    In the 2019 case, Nikesh Patel fabricated fraudulent loan documents and used a fictitious identity to perpetrate his conspiracy and scheme. He then applied to the USDA to guarantee the fake loans as part of their Business and Industry Guaranteed Loan Program. Once the USDA agreed to guarantee the loans, Nikesh Patel sold the guaranteed portion to the Federal Agricultural Mortgage Corporation (Farmer Mac) and received $19,342,392. The FBI was able to recover $11,321,931 and Nikesh Patel was ordered to pay the remaining portion as restitution to Farmer Mac.

    While Nikesh Patel was in federal custody for the 2019 case, he recruited Trisha Patel (his wife at the time) to perpetrate a third financial scheme. Between January 2021 and December 2023, Nikesh and Trisha Patel devised a more sophisticated scheme utilizing a commercial pump manufacturer in Houston, Texas. At the direction of Nikesh Patel, Trisha pretended to be a senior representative of the company and falsely claimed to USDA that they wanted to expand their business in rural Puerto Rico. The Patels then created a fake lender to pretend that it was loaning $8,540,000 to the business for the expansion. USDA guaranteed 80% of the fake loan, and the Patels then sold that guarantee to financial institutions and received $7,446,880. The FBI was able to recover $74,545 in currency and a 2022 BMW model X7. The defendants were ordered to pay the remaining portion to USDA and four other financial institutions as restitution.

    For the third scheme, Trisha Patel and Nikesh Patel each pleaded guilty to an Information charging one count of conspiracy to commit wire fraud on May 21, 2024, and May 22, 2024, respectively.

    These cases were investigated by the Federal Bureau of Investigation and the United States Department of Agriculture – Office of Inspector General. They were prosecuted by Assistant United States Attorney Michael P. Felicetta and United States Attorney Roger B. Handberg.

    MIL Security OSI

  • MIL-OSI Security: Alexandria Man Sentenced for Conspiring to Distribute Methamphetamine

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    ALEXANDRIA, La.Tyrone Donnell Porter, 51, of Alexandria, has been sentenced for conspiracy to distribute and possess with intent to distribute methamphetamine, announced United States Attorney Brandon B. Brown. United States District Judge Dee D. Drell sentenced Porter to 360 months (30 years) in prison, followed by 5 years of supervised release. 

    Porter was found guilty of the charge by a jury in Alexandria after a trial in December 2023. Evidence introduced at trial revealed that agents with the Federal Bureau of Investigation began an investigation into the drug trafficking activities of Porter and others during 2021. Law enforcement agents obtained a search warrant for a hotel room which was rented under Porter’s name in Alexandria and where Porter was staying. On September 30, 2021, agents executed the search warrant and found Porter inside the hotel room, along with two other individuals. Inside the room, agents found two bags containing a glass pipe with methamphetamine residue, 2 boxes and 18 loose rounds of ammunition, as well as a Sig Sauer 9mm handgun in a holster loaded with 11 rounds in the magazine.

    In addition, agents found a large black plastic bag with a can which had a vacuum sealed bag containing 492 grams of suspected methamphetamine. Agents were later able to obtain video footage of Porter carrying the black plastic bag which had the can of methamphetamine into the hotel just minutes before law enforcement arrived to execute the search warrant. 

    The case was investigated by the Federal Bureau of Investigation and Rapides Parish Sheriff’s Office and prosecuted by Assistant United States Attorneys John W. Nickel and Casey N. Richmond.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Holly Man Sentenced to 85 Years for Sexually Exploiting Children

    Source: Federal Bureau of Investigation (FBI) State Crime News

    DETROIT –A Holly man was sentenced yesterday to 85 years in federal prison for sexually exploiting children, United States Attorney Dawn N. Ison announced today.

    Ison was joined in the announcement by Cheyvoryea Gibson, Special Agent in Charge of the Federal Bureau of Investigation, Detroit.

    In addition to the 85-year sentence, United States District Court Kay F. Behm sentenced Jeremy McCallum, 48, to 15 years of supervised release upon his release from prison.

    According to court documents, on January 31, 2020, law enforcement searched McCallum’s home for child sexually abusive material. The search resulted in the recovery of hard copies and digital files depicting years-long, horrific sexual abuse of three minor children by McCallum. McCallum abused one minor female for the better part of a decade, documenting his abuse of her on VHS tape, on his cell phone, and in Polaroid pictures. He abused another minor female when she was an infant, recording his sexual abuse of her on VHS tape and on his cell phone. Finally, on a VHS tape, an FBI agent located an instance of sexual abuse that McCallum committed against a minor male.

    Following years of litigation, McCallum pleaded guilty, on June 18, 2024, to all the charges in the indictment, including ten counts of the sexual exploitation of a child and one count of possession of child pornography.

    “This defendant committed monstrous crimes. This prosecution and sentence should send a strong message to child predators: you will suffer severe consequences if you harm our children,” said U.S. Attorney Ison.

    “The despicable acts of sexual exploitation, especially against children, are amongst the most horrific crimes investigated by our office,” said Cheyvoryea Gibson, Special Agent in Charge of the FBI in Michigan. “The sentencing of Jeremy McCallum is a direct result of the collaborative efforts between the Michigan State Police and the FBI, Oakland County Resident Agency. This sentencing sends a clear and stern warning to those who believe they can prey on our most vulnerable population and evade justice. The successful prosecution by the United States Attorney’s Office of Eastern Michigan is a crucial step in the healing process for those victimized by Mr. McCallum’s deplorable and heinous actions.”

    This case was investigated by the FBI and the Michigan State Police.  The case was prosecuted by Assistant U.S. Attorneys Christopher Rawsthorne and Tara Hindelang.

    MIL Security OSI

  • MIL-OSI Security: St. Michael Man Pleads Guilty to Child Abuse in Death of One-Year-Old

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    Fargo – United States Attorney Mac Schneider announced that Collin Ray Delorme, also known as Collin Ray Delorme Sr., age 29, from St. Michael, North Dakota, appeared in federal court on October 9, 2024, in Fargo and pleaded guilty before District Court Judge Peter Welte to three counts of Child Abuse in Indian country.

    As noted in court documents, on February 18, 2023, Delorme’s co-defendant Kenzie Rose Baker called 911 from a home in St. Michael on the Spirit Lake Reservation and reported a one-year-old child was not breathing. The child was transported to CHI St. Alexius in Devils Lake, North Dakota and was pronounced dead.

    An autopsy concluded the cause of death was “battered child” due to multiple, repeated injuries of various ages, evident upon external and internal examination. The child’s internal injuries were untreated, given rise to infection and sepsis.

    Baker admitted she observed swelling present for two weeks but failed to seek medical care. After the child’s death, Delorme claimed an external injury to the child’s back, which was above a spinal fracture, occurred when he misjudged a step and his boot slipped and a flashlight hit the child.

    Two of the charges that Delorme pleaded guilty to are related to his abuse and the resulting death of the one-year-old child.  The third charge is the result of Delorme’s abuse of a second child, who was three years old, by hitting the child on the arms and throwing him on the bed.

    Delorme is scheduled for sentencing on February 18, 2025, and faces a maximum sentence of forty years in prison.

    On August 16, 2024, Baker pled guilty to charges of Accessory after the Fact; Child Abuse in Indian country; Child Neglect in Indian country. Baker is scheduled to be sentenced on January 22, 2025.

    Baker and Delorme are detained pending sentencing.

    “Today’s guilty plea is a step towards accountability for the heartrending death of a young child,” Schneider said. “The way this toddler was treated was horrific and shameful. Whether it is at multi-disciplinary team meetings throughout the District of North Dakota or by holding child abusers accountable in federal court, our career prosecutors and partners in law enforcement are committed to protecting kids and preventing tragic cases like this one.”

    This case was investigated by the Federal Bureau of Investigation and prosecuted by Assistant United States Attorneys Lori H. Conroy and SheraLynn Ternes.

    Previous Press release for co-defendant Kenzie Rose Baker can be seen HERE:

    ######

    MIL Security OSI

  • MIL-OSI Security: Two Russian Nationals Charged for Their Participation in an Illicit Procurement Network That Exported to Russia Sensitive U.S.-Sourced Microelectronics with Military Applications in Violation of U.S. Export Controls

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)

    Damian Williams, the United States Attorney for the Southern District of New York, James E. Dennehy, the Assistant Director in Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), and Jonathan Carson, the Special Agent in Charge of the Office of Export Enforcement of the New York Field Office of the Bureau of Industry and Security of the U.S. Department of Commerce, announced today that ZHANNA SOLDATENKOVA and RUSLAN ALMETOV, both Russian nationals, were indicted along with ARTHUR PETROV, a dual Russian and German national, for export control violations, smuggling, wire fraud, and money laundering in connection with their alleged participation in a scheme to procure U.S.-sourced microelectronics subject to U.S. export controls on behalf of a Russia-based supplier of critical electronics components for manufacturers supplying weaponry and other equipment to the Russian military.  PETROV, previously charged in a criminal Complaint, was arrested on August 26, 2023, in the Republic of Cyprus at the request of the U.S. and was extradited from the Republic of Cyprus earlier this year.  He arrived in the Southern District of New York on August 8, 2024, and was ordered detained.  SOLDATENKOVA and ALMETOV are at large.  The case is assigned to U.S. District Judge Alvin K. Hellerstein.

    The indictment can be read here.

    U.S. Attorney Damian Williams said: “Zhanna Soldatenkova and Ruslan Almetov are now charged, alongside previously charged Arthur Petrov, for conspiring to smuggle microelectronics with military applications from U.S. distributors to a Russian company that supplies manufacturers for the Russian military.  This Office is committed to exposing the full breadth of such illicit procurement networks and protecting our national security.”

    Assistant Director in Charge James E. Dennehy said: “Zhanna Soldatenkova and Ruslan Almetova, along with Arthur Petrov, allegedly conspired to evade export laws as members of an illegal international procurement network to help aid the Russian defense industry.  As alleged, by deliberately concealing the true nature of their business, they not only violated the law but ultimately put the national security of our country at risk.  The FBI, in concert with our partners, is determined to protect the United States and will hold accountable anyone attempting to harm our nation.”

    Special Agent in Charge Jonathan Carson said: “As this action demonstrates, we will work with our domestic and international law enforcement partners to charge alleged violators wherever they may be worldwide. Illegal global procurement networks that prop up the Russian war machine will not be tolerated. That’s why we and our law enforcement partners are working nonstop to ensure that those operating such networks face American justice.”

    According to the allegations contained in the Indictment returned in Manhattan federal court:[1]

    PETROV is a dual Russian-German national who previously resided in Russia and Cyprus and worked for LLC Electrocom VPK (“Electrocom”), a Russia-based supplier of critical electronics components for manufacturers supplying weaponry and other equipment to the Russian military.  SOLDATENKOVA is a Russian national who has resided in Russia and worked for Electrocom.  ALMETOV is also a Russian national who has resided in Russia and was the co-founder and served as General Director of Electrocom.

    PETROV, SOLDATENKOVA, and ALMETOV operated an illicit procurement network in Russia and elsewhere overseas.  More specifically, they fraudulently procured from U.S. distributors large quantities of microelectronics subject to U.S. export controls on behalf of Electrocom.  To carry out the scheme, PETROV, SOLDATENKOVA, and ALMETOV used shell companies and other deceptive means to conceal that the electronics components were destined for Russia.  The technology that the defendants procured in contravention of export controls had significant military applications and included various types of electronics components of the sort that have been recovered in Russian military hardware on the battlefield in Ukraine, such as Russian guided missiles, drones, and electronic warfare and communications devices.

    To perpetrate the scheme, PETROV first acquired the controlled microelectronics from U.S.-based electronics exporters using a Cyprus-based shell company, Astrafteros Technokosmos LTD (“Astrafteros”), which he operated.  PETROV procured these sensitive electronics components by falsely representing to the U.S. exporters that Astrafteros was purchasing the items for fire security systems, among other commercial uses, and that the ultimate end-users and destinations of the electronics are companies in Cyprus or other third countries — when in fact the components were destined for Electrocom in Russia, which supplies manufacturers for the Russian military.  The microelectronics that PETROV procured as part of the conspiracy included, among other things, microcontrollers and integrated circuits on the Commerce Control List maintained by the Commerce Department and which could not lawfully be exported or reexported to Russia without a license from the Commerce Department.  Invoices provided to PETROV by the U.S. distributors expressly noted that these microcontrollers and integrated circuits were subject to U.S. export controls.

    To evade these controls, PETROV, SOLDATENKOVA, and ALMETOV worked together to transship the controlled items procured by PETROV using pass-through entities operated by SOLDATENKOVA and ALMETOV in third countries.  SOLDATENKOVA and ALMETOV then caused the items to be shipped, sometimes through yet another country, to the ultimate destination: Electrocom in Saint Petersburg, Russia.  At all times, PETROV, SOLDATENKOVA, and ALMETOV concealed from the U.S. distributors that they were procuring the controlled electronics components on behalf of Electrocom and that the items were destined for Russia.  During the course of the conspiracy, PETROV, SOLDATENKOVA, and ALMETOV procured from U.S. distributors and shipped to Russia more than $225,000 worth of controlled electronics components with military applications.

    *                *                *

    A table containing the charges and maximum penalties for PETROV, 35, of Russia and Cyprus, SOLDATENKOVA, 36, of Russia, and ALMETOV, 43, of Russia, is set forth below.  The maximum penalties are prescribed by Congress and are provided here for informational purposes only, as any sentencing of the defendants will be determined by a judge.

    Charge

    Defendants

    Maximum Penalties

    Count One:  Conspiracy to defraud the United States (18 U.S.C. § 371) PETROV, SOLDATENKOVA, and ALMETOV 5 years’ imprisonment
    Count Two:  Conspiracy to violate the Export Control Reform Act (“ECRA”) (50 U.S.C. §§ 4819(a)(1), 4819(a)(2)(A)-G), and 4819(b); 15 C.F.R. §§ 736.2(b)(1), 746.8(a)(1), and 764.2) PETROV, SOLDATENKOVA, and ALMETOV 20 years’ imprisonment
    Count Three:  Violation of ECRA (50 U.S.C. §§ 4819(a)(1), 4819(a)(2)(A)-G), and 4819(b); 15 C.F.R. §§ 736.2(b)(1), 746.8(a)(1), and 764.2) PETROV and SOLDATENKOVA 20 years’ imprisonment
    Count Four:  Violation of ECRA (50 U.S.C. §§ 4819(a)(1), 4819(a)(2)(A)-G), and 4819(b); 15 C.F.R. §§ 736.2(b)(1), 746.8(a)(1), and 764.2) PETROV and SOLDATENKOVA 20 years’ imprisonment
    Count Five:  Violation of ECRA (50 U.S.C. §§ 4819(a)(1), 4819(a)(2)(A)-G), and 4819(b); 15 C.F.R. §§ 736.2(b)(1), 746.8(a)(1), and 764.2) PETROV, SOLDATENKOVA, and ALMETOV 20 years’ imprisonment
    Count Six:  Conspiracy to smuggle goods from the United States (18 U.S.C. § 371) PETROV, SOLDATENKOVA, and ALMETOV 5 years’ imprisonment
    Count Seven:  Smuggling goods from the United States (18 U.S.C. §§ 554(a) and 2) PETROV and SOLDATENKOVA 10 years’ imprisonment
    Count Eight:  Smuggling goods from the United States (18 U.S.C. §§ 554(a) and 2) PETROV and SOLDATENKOVA 10 years’ imprisonment
    Count Nine:  Smuggling goods from the United States (18 U.S.C. §§ 554(a) and 2) PETROV, SOLDATENKOVA, and ALMETOV 10 years’ imprisonment
    Count Ten:  Conspiracy to commit wire fraud (18 U.S.C. § 1349) PETROV, SOLDATENKOVA, and ALMETOV 20 years’ imprisonment
    Count Eleven:  Conspiracy to commit money laundering (18 U.S.C. §§ 1956(h), 1956(f)) PETROV, SOLDATENKOVA, and ALMETOV 20 years’ imprisonment

    Mr. Williams praised the outstanding investigative work of the FBI and its New York Field Office, Counterintelligence Division and the New York Field Office of the Bureau of Industry and Security of the Department of Commerce.  Mr. Williams also thanked the FBI’s Legal Attaché offices in Poland, Germany, and Athens, Greece; the Department of Justice’s National Security Division, Counterintelligence and Export Control Section; the Department of Justice’s Office of International Affairs; the Republic of Cyprus Ministry of Justice and Public Order; and the Law Office of the Republic for their assistance.  The Republic of Cyprus National Police also provided critical assistance in effecting the defendant’s arrest and detention at the request of the U.S.

    This prosecution is coordinated through the Justice Department’s Task Force KleptoCapture and the Justice and Commerce Departments’ Disruptive Technology Strike Force.  Task Force KleptoCapture is an interagency law enforcement task force dedicated to enforcing the sweeping sanctions, export restrictions, and economic countermeasures that the U.S. has imposed, along with its allies and partners, in response to Russia’s unprovoked military invasion of Ukraine.  The Disruptive Technology Strike Force is an interagency law enforcement strike force co-led by the Departments of Justice and Commerce designed to target illicit actors, protect supply chains, and prevent critical technology from being acquired by authoritarian regimes and hostile nation states.

    This case is being handled by the Office’s National Security and International Narcotics Unit.  Assistant U.S. Attorney Kevin Sullivan is in charge of the prosecution, with assistance from Trial Attorney Maria Fedor of the Counterintelligence and Export Control Section.

    The charges in the Indictment are merely accusations, and the defendants are presumed innocent unless and until proven guilty.


    [1] As the introductory phrase signifies, the entirety of the text of the Indictment and the description of the Indictment set forth herein constitute only allegations, and every fact described should be treated as an allegation.

    MIL Security OSI

  • MIL-OSI Security: Former High-Ranking FDNY Official Pleads Guilty to Bribery Conspiracy

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)

    Brian Cordasco pleaded guilty to conspiring to solicit and receive bribes in his role as a chief of the New York City Fire Department Bureau of Fire Prevention.

    MIL Security OSI

  • MIL-OSI Security: California Man Pleads Guilty to Assaulting Law Enforcement with a Weapon and Other Charges During January 6 Capitol Breach

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

              WASHINGTON – A California man pleaded guilty on Oct. 9, 2024, to assaulting law enforcement with a weapon and other charges related to his conduct during the Jan. 6, 2021, breach of the U.S. Capitol. His actions and the actions of others disrupted a joint session of the U.S. Congress convened to ascertain and count the electoral votes related to the 2020 presidential election.

              Jerry Daniel Braun, 70, of South El Monte, California, pleaded guilty to six felonies, including one count of civil disorder; two counts of assaulting, resisting, or impeding certain officers, including one count involving the use of a deadly or dangerous weapon; one count of entering and remaining in a restricted building or grounds with a deadly or dangerous weapon; one count of disorderly and disruptive conduct in a restricted building or grounds with a deadly or dangerous weapon; and one count of engaging in physical violence in a restricted building or grounds with a deadly or dangerous weapon.

              In addition to the felonies, Braun also pleaded guilty to a misdemeanor charge of disorderly conduct in a Capitol Building or Grounds and one count of committing an act of physical violence in a Capitol Building or Grounds. U.S. District Judge Timothy J. Kelly will sentence Braun on Jan. 27, 2025.

              According to the government’s evidence, Braun traveled from California to Washington, D.C., and attended the “Stop the Steal” near the Ellipse. Braun then made his way toward the Capitol building and arrived in the area near the Garfield Circle around 12:53 p.m. He then entered the restricted area and advanced with a crowd of rioters toward a police line on the West Plaza. Braun then made his way to the front of the crowd of rioters, lowered his head, and pushed with the crowd against the police line.

              At approximately 1:11 p.m., several rioters began to attack the line of police officers and dragged one officer into the mob. There, with the officer and rioters at his feet, Braun twice raised and swung a cane down at the individuals on the ground. Shortly after this incident, Braun approached a line of officers, pointed at them, and shouted, “F— you, traitor!” and “F— traitor. Traitor!” He then yelled, “We pay your f— pay!”

              At about 1:13 p.m., law enforcement reinforcements arrived to expel rioters from the restricted area of the Capitol. In an attempt to control the crowd, authorities established a line of bike rack barricades to push the crowd back. Some in the crowd, including Braun, attempted to wrestle a section of the barricades away from police. Braun then used his cane to strike the bike rack barrier multiple times.

              Later, at about 1:27 p.m., Braun picked up an eight-foot-long wooden 2×4 beam from the West Plaza and began to use the beam to point and thrust at police. On one occasion, Braun turned the beam vertically and used it to thrust into the line of police officers. Braun then used the beam to jab a person holding a camera wearing a helmet labeled “PRESS”. Braun then approached this person and struck them on the head with his left hand before again jabbing them with the beam.  Braun remained inside the restricted perimeter until at least 4:00 p.m.

              The FBI arrested Braun on April 12, 2022, in California.

              The U.S. Attorney’s Office for the District of Columbia and the Department of Justice National Security Division’s Counterterrorism Section prosecuted this case. The U.S. Attorney’s Office for the Central District of California provided valuable assistance.

              This case was investigated by the FBI’s Los Angeles and Washington Field Offices. Valuable assistance was provided by the U.S. Capitol Police and the Metropolitan Police Department.

              In the 45 months since Jan. 6, 2021, more than 1,532 individuals have been charged in nearly all 50 states for crimes related to the breach of the U.S. Capitol, including more than 571 individuals charged with assaulting or impeding law enforcement, a felony. The investigation remains ongoing.

              Anyone with tips can call 1-800-CALL-FBI (800-225-5324) or visit tips.fbi.gov.

    MIL Security OSI

  • MIL-OSI Security: Massachusetts Man Convicted of Felony and Misdemeanor Charges for Actions During January 6 Capitol Breach

    Source: Federal Bureau of Investigation (FBI) State Crime News

              WASHINGTON – A Massachusetts man was convicted of felony and misdemeanor offenses related to his conduct during the Jan. 6, 2021, breach of the U.S. Capitol. His actions and the actions of others disrupted a joint session of the U.S. Congress convened to ascertain and count the electoral votes related to the 2020 presidential election.

              Michael St. Pierre, 46, of Swansea, Massachusetts, was found guilty on Oct. 9, 2024, of one felony and three misdemeanor offenses in U.S. District Court for the District of Columbia following a bench trial before U.S. District Court Judge Jia M. Cobb.

              Specifically, St. Pierre was convicted of felony offense of civil disorder and three misdemeanor offenses, including destruction of government property, disorderly conduct on Capitol grounds, and committing an act of physical violence on the Capitol grounds.

              Judge Cobb will sentence St. Pierre on March 14, 2025.

              According to court documents, in the days leading to Jan. 6, 2021, St. Pierre posted on social media regarding his actions and intent for Jan. 6, 2021, in Washington, D.C. In one such post, St. Pierre wrote that he was “off to Washington, DC until Jan 7th to help save our Constitution . . . and hopefully help stop the certification of a crooked, dementia patient who is so deep in China’s pockets it’s insane!!”

              On Jan. 6, 2021, St. Pierre arrived at the Capitol grounds in Washington, D.C., wearing a body armor vest and carrying a megaphone. St. Pierre approached the west side of the Capitol grounds and recorded a video on his phone, which was later posted to his Facebook page. In the video, St. Pierre pointed the camera at the Capitol building and said, “That’s where the meeting ground is. Hopefully they bust through, and I’ll join them, to rush the Capitol and go grab Nancy Pelosi by the hair and f—ing twirl her around.”

              St. Pierre traveled across the west front and climbed on top of a wall of the exterior façade of the West Plaza next to the Northwest stairs. While there, he yelled through his megaphone as the packed crowd filled the steps next to him and the Plaza below. St. Pierre then made his way to the Upper West Terrace and eventually arrived at the North Doors on the northern exterior wall of the Capitol building.

              Here, while the Metropolitan and Capitol Police Officers were outside the North Doors attempting to prevent the crowd from entering the Capitol building, St. Pierre waved the crowd forward towards the Capitol and the outnumbered officers and then pushed on the backs of other rioters who were directly battling with police. While St. Pierre pushed, rioters in front of him sprayed bear spray and used flag poles as clubs and spears against the police officers. Eventually, the crowd charged the officers, and the officers retreated inside of the Capitol building. St. Pierre joined the crowd chasing the officers and cheered on the attack through his megaphone.

              While rioters continued to battle police outside the North Doors, St. Pierre attempted to incite the crowd through his megaphone, saying, “Come on everybody, let’s go everybody, we got to get everybody tight. We got to get tight! Let’s go guys! We are going to storm this bitch!”  At one point, while police attempted to deploy fire extinguisher smoke to clear the area of rioters, St. Pierre threw a metal flagpole top at one of the glass windows in the door while officers were directly behind the doors.

              The FBI arrested St. Pierre on July 27, 2023, in Fall River, Massachusetts.

              The U.S. Attorney’s Office for the District of Columbia and the Department of Justice National Security Division’s Counterterrorism Section prosecuted this case. The U.S. Attorney’s Office for the District of Massachusetts provided valuable assistance.

              The FBI’s Boston and Washington Field Offices investigated this case. The United States Capitol Police and the Metropolitan Police Department provided valuable assistance.

              In the 45 months since Jan. 6, 2021, more than 1,532 individuals have been charged in nearly all 50 states for crimes related to the breach of the U.S. Capitol, including more than 571 individuals charged with assaulting or impeding law enforcement, a felony. The investigation remains ongoing.

              Anyone with tips can call 1-800-CALL-FBI (800-225-5324) or visit tips.fbi.gov.

    MIL Security OSI

  • MIL-OSI Security: California Man Arrested for Assaulting Law Enforcement and Other Charges During January 6 Capitol Breach

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

                WASHINGTON — A California man has been arrested for allegedly assaulting law enforcement and other charges related to his alleged conduct during the Jan. 6, 2021, breach of the U.S. Capitol. His alleged actions and the actions of others disrupted a joint session of the U.S. Congress convened to ascertain and count the electoral votes related to the 2020 presidential election.

                Michael Fagundes, 49, of Costa Mesa, California, is charged in an indictment filed in the District of Columbia with three felony offenses, including two counts of assaulting, resisting, or impeding certain officers and one count of obstruction of law enforcement during a civil disorder.

                In addition to the felonies, Fagundes is charged with misdemeanor offenses of entering and remaining in a restricted building or grounds, disorderly and disruptive conduct in a restricted building or grounds, engaging in physical violence in a restricted building or grounds, disorderly conduct in a Capitol building, act of physical violence in the Capitol grounds or buildings, and parading demonstrating or picketing in a Capitol building.

                The FBI arrested Fagundes on Oct. 8, 2024, in Costa Mesa, and he made his initial appearance in the Central District of California. 

                According to court documents, Fagundes attempted to attend the former President’s “Stop the Steal” rally on Jan. 6, 2021, in Washington, D.C., but was refused entry. He then made his way toward the U.S. Capitol building and eventually arrived at the Lower West Terrace Tunnel, the site of some of the most violent attacks against law enforcement on that day.

                It is alleged that Fagundes reached the Tunnel entrance at about 2:42 p.m. and donned a gas mask. He then made his way inside the Tunnel and shortly exited before returning and approaching a group of rioters who were attempting to take control of a police riot shield. It is alleged that Fagundes himself took possession of the riot shield from the group and emerged from the Tunnel proudly displaying it over his head. He then tossed the shield onto the ground before making his way back into the Tunnel and toward the police line. Shortly thereafter, the rioters inside the Tunnel began a heave-ho movement against the police line but were quickly forced out of the Tunnel by police.

                As the rioters were forced out, at approximately 3:18 p.m., a Metropolitan Police Department (MPD) officer was forcibly dragged from the police line at the entrance to the Tunnel and into the crowd of rioters. As the rioters attacked the officer, Fagundes shouted and moved in their direction. The crowd then surrounded the officer, and Fagundes allegedly reached toward the officer a few times before grabbing ahold of the officer’s chest and neck and dragging the officer further into the crowd.

                Around 3:50 p.m., it is alleged that Fagundes placed his hand on the handle of an Oleoresin Capsicum (OC) dispenser held up by another rioter and appeared to try and manipulate the trigger or safety mechanism. Immediately after, another rioter took possession of the dispenser and sprayed it into the Tunnel towards the police line. Court documents say that rioters on the Lower West Terrace continued to assault police officers both inside and at the mouth of the Tunnel. Shortly after the OC spray was deployed, the crowd, including Fagundes, pushed their body weight back and forth into the police line in a “heave-ho” motion.

                By about 4:09 p.m., Fagundes picked up a police riot shield near the entrance to the Tunnel and used it to push against other rioters who were pushing against the police line. Approximately two minutes later, at around 4:11 p.m., Fagundes once again made his way towards the front of the mob and reached the police line. There, Fagundes allegedly picked up a police riot shield from the ground, raised his green backpack and the shield directly over his head, stepped toward the police line, and then rapidly dropped the backpack and the shield down in a striking motion in the direction of the officers. The shield and the backpack appeared to make contact with at least one officer.

                Sometime in the afternoon, Fagundes appeared to be on a video call with another individual while he was adjacent to the continued violence against police and immediately next to a broken window that led to the inside of the U.S. Capitol building. Fagundes then appeared to gesture toward the crowd, waving them toward the broken window, and he entered the Capitol. 

             The U.S. Attorney’s Office for the District of Columbia and the Department of Justice National Security Division’s Counterterrorism Section prosecuted this case. The U.S. Attorney’s Office for the Central District of California provided valuable assistance.

                This case is being investigated by the FBI’s Los Angeles and Washington Field Offices. Fagundes was identified on the FBI’s seeking information images as AFO (Assault on Federal Officer) #527. Valuable assistance was provided by the U.S. Capitol Police and the Metropolitan Police Department.

                In the 45 months since Jan. 6, 2021, more than 1,532 individuals have been charged in nearly all 50 states for crimes related to the breach of the U.S. Capitol, including more than 571 individuals charged with assaulting or impeding law enforcement, a felony. The investigation remains ongoing.

                Anyone with tips can call 1-800-CALL-FBI (800-225-5324) or visit tips.fbi.gov.

                An indictment is merely an allegation, and all defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: Two Los Angeles-Area Residents Arrested on Indictment Alleging Scheme to Fraudulently Obtain and Launder Medicare Proceeds

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    LOS ANGELES – A Los Angeles woman and a San Fernando Valley man were arrested today on a 24-count federal grand jury indictment alleging a scheme to defraud Medicare out of more than $54 million via hospice and diagnostic testing services that were never provided and then laundered their illicit proceeds, including by buying millions of dollars’ worth of gold bars and coins.

    Sophia Shaklian, 36, of the Larchmont area of Los Angeles, and Alex Alexsanian, 47, of Burbank, were arrested early this morning. They are scheduled to be arraigned this afternoon in United States District Court in downtown Los Angeles.

    Shaklian is charged with 16 counts of health care fraud and four counts of transactional money laundering. Alexsanian is charged with one count of conspiracy to launder monetary instruments and three counts of concealment money laundering.

    According to the indictment that a federal grand jury returned on October 2, Shaklian, often using aliases, managed and submitted claims for seven health care providers enrolled with Medicare and located in Los Angeles County. These businesses included a hospice company she owned – the Pasadena-based Chateau d’Lumina Hospice and Palliative Care – and several diagnostic testing companies: Saint Gorge Radiology in Sylmar; Hope Diagnostics in North Hollywood; Direct Imaging & Diagnostics and Lab One – both located in Hollywood; and Labtech and Lifescan Diagnostics in Claremont.

    From March 2019 to August 2024, these companies allegedly submitted more than $54 million in fraudulent claims to Medicare for services that were never provided and not needed. In total, they received more than $23 million for those claims. Shaklian allegedly laundered Medicare funds paid to Chateau by transferring them to accounts in the name of “Varsenic Babaian,” a synthetic or fake identity. 

    Alexsanian allegedly directed a foreign national to open Saint Gorge Radiology, and to acquire Medicare provider Console Hospice in Van Nuys, and then provide control of those companies and their bank accounts and the foreign national’s personal bank accounts to Alexsanian.

    Alexsanian conspired with the foreign national (who soon left the country) and others to have Saint Gorge Radiology and Console Hospice submit fraudulent claims to Medicare for services not provided and then laundered the Medicare reimbursements they received, as well as funds deposited into their accounts through the “Babaian” identity, and used them to, among other things, buy more than $6 million in gold bars and coins.

    An indictment contains allegations that a defendant has committed a crime.  Every defendant is presumed innocent until and unless proved guilty beyond a reasonable doubt.

    If convicted of all charges, Shaklian would face a statutory maximum sentence of 10 years in federal prison for each health care fraud count and up to 20 years in federal prison for each money laundering count. Alexsanian would face up to 20 years in federal prison for each count. 

    The United States Department of Health and Human Services Office of the Inspector General and the FBI are investigating this matter.

    Assistant United States Attorney Kristen A. Williams of the Major Frauds Section is prosecuting this case.

    MIL Security OSI

  • MIL-OSI Security: Ohio Man Pleads Guilty to Felony and Misdemeanor Charges for Actions During January 6 Capitol Breach

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)

                WASHINGTON – An Ohio man pleaded guilty on Oct. 8, 2024, to felony and misdemeanor charges related to his conduct during the Jan. 6, 2021, breach of the U.S. Capitol. His actions and the actions of others disrupted a joint session of the U.S. Congress convened to ascertain and count the electoral votes related to the 2020 presidential election.

                Dustin Martin, 30, of Grove City, Ohio, pleaded guilty to a felony charge of civil disorder and a misdemeanor charge of disorderly and disruptive conduct in a restricted building or grounds before U.S. District Judge Loren L. AliKhan. Judge AliKhan will sentence Martin on Feb. 7, 2025.

                According to court documents, on Jan. 6, 2021, Martin and a friend – Cody Lee Tippett – arrived in Washington, D.C., from Columbus, Ohio, and made their way to the Ellipse to attend the former president’s speech. After the speech, Martin and Tippett walked from the Ellipse to the U.S. Capitol, arriving on the west side of Capitol grounds by at least 1:30 p.m. Martin then approached the Lower West Terrace, where he observed a crowd of people standing across from a line of bike rack barricades and police officers behind them, some dressed in riot gear.

                At approximately l:36 p.m., several rioters in Martin’s vicinity began to push against one of the barricades. As officers fought to prevent rioters from breaking the police line, Martin walked forward and joined with the rioters, leaning forward, bracing himself against those in front of him, and using his body weight to help push the barricade against the police officers on the other side. Court documents say that the group, including Martin, pushed the barricade directly into the officers, forcing them several feet back and requiring a dozen officers to drive the crowd back. The tussle caused Martin to fall, after which he retreated into the crowd.

                Later, at about 1:50 p.m., rioters on the Lower West Terrace pushed a line of police officers up a set of stairs leading to the Upper West Terrace of the Capitol. Other rioters, including Martin and Tippett, followed that group of rioters up onto the stairs. However, another police line prevented the crowd from advancing further up the stairs. At approximately 2:10 p.m., the rioters again pushed past the police line on the steps and gained access to the Capitol building for the first time that day. Martin and Tippett followed.

                At approximately 2:15 p.m., Martin and Tippett entered the Capitol building via the Senate Wing Door. Inside, Martin and Tippett walked to the Crypt and Capitol Visitor’s Center before exiting the building at about 2:57 p.m. Martin and Tippett remained on the Upper West Terrace, the area immediately outside the building, for nearly an hour.

                That day, Martin posted pictures, videos, and written descriptions on Facebook illustrating his participation in the riot at the Capitol. In one post, he included a photo of himself and Tippett inside the Capitol and wrote, “Trump 2021!!!” In another post, he included a photo of himself outside the Capitol and a video of rioters on the Upper West Terrace of the Capitol, writing, “So now I can say I’ve been hit with rubber bullets, bear mace, pepper spray, teargas, and wrestle with Capital Police f— yeah ‘America B— I’ll do it all over again too!”

                The FBI arrested Martin on June 21, 2023, in Ohio.

                Cody Lee Tippet was previously sentenced to 30 days in prison for his role in the events of January 6th.

                The U.S. Attorney’s Office for the District of Columbia and the Department of Justice National Security Division’s Counterterrorism Section prosecuted this case. The U.S. Attorney’s Office for the Southern District of Ohio provided valuable assistance.

                This case was investigated by the FBI’s Cincinnati and Washington Field Offices. Valuable assistance was provided by the U.S. Capitol Police and the Metropolitan Police Department.

                In the 45 months since Jan. 6, 2021, more than 1,532 individuals have been charged in nearly all 50 states for crimes related to the breach of the U.S. Capitol, including more than 571 individuals charged with assaulting or impeding law enforcement, a felony. The investigation remains ongoing.

                Anyone with tips can call 1-800-CALL-FBI (800-225-5324) or visit tips.fbi.gov.

    MIL Security OSI

  • MIL-OSI Security: Six Defendants Sentenced to Prison for Trafficking Nearly 12 Kilograms of Methamphetamine in Adderall Lookalike Pills Via the Dark Web

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)

    CINCINNATI – Six Texans convicted as part of a large-scale dark web drug trafficking organization have been sentenced in federal court in Cincinnati.

    According to court documents, from July 2019 through December 2020, the co-conspirators distributed significant quantities of methamphetamine – pressed to look like legitimate Adderall pills – over the dark web. The defendants sold at least 11.98 kilograms total of methamphetamine in pills and laundered between $15,000 and $50,000 per month using cryptocurrency. The group shipped the drugs nationwide, including into the Southern District of Ohio, using the United States Postal Service.

    The defendants used the vendor name “Loverbois,” along with several other usernames, and averaged 20 orders per day.

    Those sentenced in this case include:

    Name Age City of Residence Sentence Imposed
    Hung Ahn Huy Phung 26 Houston, Texas 84 months in prison
    John G. Dang 24 Houston, Texas 75 months in prison
    Bernardo Guzman 31 Houston, Texas 72 months in prison
    Stephanie R. Pray 35 Houston, Texas Five years’ probation
    Kevin Tran 25 Houston, Texas 60 months in prison
    Chazton Harris 29 Houston, Texas 74 months in prison

    Court documents detail that Phung created and ran the Loverbois account(s) for much of the conspiracy period. He took orders online and obtained pills from Tran and Guzman. Phung also coordinated the receipt of cryptocurrency in exchange for the pills and laundered those proceeds.

    Guzman had a pill press and industrial mixer at his apartment in Houston, where Phung also lived for a period of time. Harris also lived in the Houston apartment, where he pressed his own pills for distribution. Pray aided Guzman by helping obtain, pack, and ship the pills.

    Dang packaged pills for shipment and delivery and helped move and launder cryptocurrency. Dang laundered approximately $15,000 per month.

    The Loverbois online drug trafficking organization sold and shipped pills to undercover law enforcement officers in the Southern District of Ohio in a series of transactions.

    A federal grand jury indicted the defendants in June 2021. The final defendant, Kevin Tran, was sentenced on Sept. 30.

    Kenneth L. Parker, United States Attorney for the Southern District of Ohio, Elena Iatarola, Special Agent in Charge, Federal Bureau of Investigation (FBI), Cincinnati Division; Orville O. Greene, Special Agent in Charge, Drug Enforcement Administration (DEA); Charles L. Grinstead, Special Agent in Charge, U.S. Food and Drug Administration – Office of Criminal Investigations (FDA-OCI), Kansas City Field Office; Lesley C. Allison, Inspector in Charge, United States Postal Inspection Service (USPIS); Mason Police Chief Levi Wells; Houston Police Chief J. Noe Diaz and the Joint Criminal Opioid and Darknet Enforcement (JCODE) team announced the sentences imposed by U.S. District Court Judge Jeffery P. Hopkins. Deputy Criminal Chief Frederic C. “Fritz” Shadley is representing the United States in this case.

    This prosecution is part of an Organized Crime Drug Enforcement Task Force (OCDETF) investigation. OCDETF identifies, disrupts, and dismantles the highest-level drug traffickers, money launderers, and gangs that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach that leverages the strengths of federal, state, and local law enforcement agencies against criminal networks.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Former Arvin High School Employee Sentenced for Explosives Conspiracy and Making False Statements to FBI

    Source: Federal Bureau of Investigation FBI Crime News (b)

    FRESNO, Calif. — Angelo Jackson Mendiver, 27, of Bakersfield, a former campus security supervisor at Arvin High School, was sentenced today to two years in prison for conspiring to engage in the manufacturing and dealing in explosive materials and for mailing explosive devices, as well as making false statements to FBI agents, U.S. Attorney Phillip A. Talbert announced.

    According to court documents, Mendiver used an Instagram account to sell explosives and explosive materials and worked closely with a male juvenile Bakersfield high school student to fulfill transactions and send explosives in the mail to residents of other states. In Instagram messages to the juvenile, Mendiver sent a photo of titanium salute, an explosive device, followed by two videos of homemade explosive devices that he had made and the statement that “homemade kills all consumer.” He also advised the juvenile to be “super careful bro that homemade shit is dangerous.” On June 1, 2023, a federal search warrant executed at Mendiver’s residence resulted in the seizure of 536 pounds of uncontained explosives and explosive materials, which presented an extreme safety hazard to the residents. Agents seized another 440 pounds of uncontained explosives and explosive materials from the juvenile’s residence. At both residences, agents also found items used to make explosives.

    Mendiver also falsely stated to FBI agents that he did not sell explosives and did not work with anyone in committing explosives offenses.

    The juvenile co-conspirator’s case is being handled by the Kern County District Attorney’s Office.

    This case was the product of an investigation by the FBI with assistance from the Bakersfield Police Department. Assistant U.S. Attorney Karen A. Escobar prosecuted the case.

    MIL Security OSI

  • MIL-OSI Security: Three Indicted in Conspiracy to Commit Bank Robberies in the Eastern District of California and the East Bay

    Source: Federal Bureau of Investigation FBI Crime News (b)

    SACRAMENTO, Calif. — On Sept. 26, 2024, a federal grand jury returned a five-count indictment against Dontae Jones Jr., 20, and Yasmin Millett, 21, both residing in Northern California with no fixed address, and JoMya Mauriyne Futch, 21, of Richmond, charging them with conspiracy to commit bank robbery and bank robbery, U.S. Attorney Phillip A. Talbert announced. Futch was additionally charged with one count of perjury.

    The indictment was unsealed today following the defendants’ arrests.

    According to court documents, between June 2023 and September 2024, Jones and Millett conspired to commit at least 10 bank robberies in Sacramento, Vallejo, Suisun City, Benicia, Concord, and Antioch. Jones and Millett worked together and with others, primarily women they recruited, such as Futch, to facilitate a patterned series of bank robberies. The participants drove to bank and credit union branches, entered the branches with threatening notes demanding money, presented the notes to branch employees, took cash, and exited the branches to a waiting getaway car. Generally, the notes would instruct the bank employees to provide money or “I will kill everyone in here.” On at least one occasion, a woman was held at gunpoint and forced to commit a robbery by Jones and Millett against her will. On another occasion, Jones and Millett used a minor in an attempted robbery. After a successful robbery, the members of the conspiracy distributed the stolen money amongst themselves.

    Jones and Millett actively sought and groomed recruits to act as the note passers. Millett advertised the conspiracy on Instagram in videos and photographs of herself and other participants holding large amounts of cash. Jones and Millett sometimes directed recruits to wear dark sunglasses during the robberies to conceal their identities and carry purses in order to carry the stolen money away from the banks and credit unions.

    Futch joined the conspiracy and conspired to commit at least two bank robberies. She is additionally charged with perjury. On Aug. 15, 2024, Futch appeared as a witness under oath before a grand jury and knowingly made false statements.

    This case is the product of an investigation by FBI field offices in San Francisco and Sacramento, with assistance from the Sacramento Police Department, Vacaville Police Department, Suisun City Police Department, Vallejo Police Department, Antioch Police Department, Alameda County Sheriff’s Office, Benicia Police Department, Concord Police Department, California Highway Patrol, Hayward Police Department, and Fremont Police Department. Assistant U.S. Attorney Whitnee Goins is prosecuting the case.

    If convicted of conspiracy to commit bank robbery, the defendants face a maximum statutory penalty of five years in prison and a fine up to $250,000. The bank robbery counts carry a maximum statutory penalty of 20 years in prison and a $250,000 fine. Futch faces a maximum penalty of five years in prison and a $250,000 fine if she is convicted of perjury. Any sentence, however, would be determined at the discretion of the court after consideration of any applicable statutory factors and the Federal Sentencing Guidelines, which take into account a number of variables. The charges are only allegations; the defendants are presumed innocent until and unless proven guilty beyond a reasonable doubt.

    MIL Security OSI

  • MIL-OSI Security: York County Judge Indicted for Fraud, Tampering with a Witness, and Obstruction of Justice

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)

    SCRANTON – The United States Attorney’s Office for the Middle District of Pennsylvania announced today that Steven Stambaugh, age 61, of York, Pennsylvania, was indicted by a federal grand jury in a 31-count indictment with wire and mail fraud, as well as witness tampering and obstruction of justice.

    According to United States Attorney Gerard M. Karam, the indictment charges Stambaugh with twenty-six counts of wire fraud, two counts of mail fraud, two counts of tampering with a witness, and one count of obstruction of justice.  It is alleged that from March 19, 2020 to on or about May 18, 2020, Stambaugh devised a scheme to defraud the Commonwealth of Pennsylvania to obtain money through materially false and fraudulent pretenses, representations, and promises.  The indictment charges that Stambaugh instructed his employees to file and collect unemployment compensation benefits with the Commonwealth of Pennsylvania during the COVID-19 pandemic, while at the same time directing and requiring his employees to continue working for Stambaugh Law, P.C.  In furtherance of the scheme to defraud, it is alleged that Stambaugh caused the use of interstate wire communications, as well as the delivery of mail matter via interstate mail deliveries.

    The indictment further alleges that beginning in April 2021 through November 2022, Stambaugh attempted to intimidate and corruptly persuade a government witness to offer false testimony before a federal grand jury and to lie to federal law enforcement officers, and also attempted to obstruct justice while serving as a judicial officer for the Pennsylvania Court of Common Pleas for York County.

    “An important part of the mission of the Office of Inspector General is to investigate allegations of fraud involving unemployment insurance programs. We will continue to work with the Pennsylvania Department of Labor and Industry and our law enforcement partners to investigate these types of allegations,” stated Syreeta Scott, Special Agent-in-Charge, Mid-Atlantic Region, U.S. Department of Labor, Office of Inspector General.

    “As alleged, the defendant orchestrated a scheme that defrauded the Commonwealth of unemployment benefits designed to provide relief amid the COVID-19 pandemic, and to further this fraud, sought to mislead federal investigators,” said Wayne A. Jacobs, special agent in charge of FBI Philadelphia. “The FBI will continue to work alongside partners to protect the integrity of these programs, investigate allegations of fraud, and bring those who engage in these schemes to justice.”

    The charges stem from a joint investigation involving the U.S. Department of Labor – Office of Inspector General (USDOL-OIG), and the Federal Bureau of Investigation (FBI) – Harrisburg. Assistant United States Attorneys Michelle Olshefski and Sean Camoni are prosecuting the case.

    The maximum penalty under federal law for mail/wire fraud and witness tampering is 20 years of imprisonment.  The maximum penalty for obstruction of justice is 10 years of imprisonment.  A term of supervised release follows any term of imprisonment and a fine.   A sentence following a finding of guilt is imposed by the Judge after consideration of the applicable federal sentencing statutes and the Federal Sentencing Guidelines.

    Indictments are only allegations.  All persons charged are presumed to be innocent unless and until found guilty in court.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Former City of Pittsburgh Building Inspector Sentenced for Accepting Bribes From Developer

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)

    PITTSBURGH, Pa. – A resident of Pittsburgh, Pennsylvania, has been sentenced in federal court to 18 months of probation, including 90 days of home confinement, a $1,375 forfeiture, and a $1,500 fine on his conviction for bribery, United States Attorney Eric G. Olshan announced today.

    Chief United States District Judge Mark R. Hornak imposed the sentence on Walter Eiseman, 59.

    According to information provided to the Court, Eiseman was a building inspector for the City of Pittsburgh, where he was responsible for performing inspections of properties that were the subject of applications for certificates of occupancy. In 2018, a developer was working on a project to redevelop a commercial building in downtown Pittsburgh as luxury apartments and hotel rooms. As part of the financing for the project, the developer sought a historical tax credit, which would only be granted after the developer obtained a temporary certificate of occupancy for one of the project’s floors by the end of December 2018. As part of his guilty plea, Eiseman admitted performing inspections on two floors of the project during the month of December, which resulted in a temporary certificate of occupancy being issued. In return for such official action, Eiseman accepted home appliances from the developer, which were delivered in early January 2019. Eiseman also admitted that he solicited a set of kitchen cabinets from the developer, which were ordered but ultimately not delivered to Eiseman’s residence.

    Assistant United States Attorney Jeffrey R. Bengel prosecuted this case on behalf of the government.

    U.S. Attorney Olshan commended the Federal Bureau of Investigation for the investigation that led to the successful prosecution of Eiseman.

    MIL Security OSI

  • MIL-OSI USA: Drug Maker Teva Pharmaceuticals Agrees to Pay $450M in False Claims Act Settlement to Resolve Kickback Allegations Relating to Copayments and Price Fixing

    Source: US State of Vermont

    Teva Pharmaceuticals USA Inc. (Teva USA) and Teva Neuroscience Inc. (collectively, Teva) have agreed to pay $450 million to resolve two matters that allege Teva violated the Anti-Kickback Statute (AKS) and the False Claims Act (FCA). Teva, headquartered in Parsippany, New Jersey, is the largest generic drug manufacturer in the United States. The settlement amount was based on Teva’s ability to pay.

    “Kickbacks designed to induce referrals or purchases of healthcare goods or services distort physician and patient decision-making, thwart competition and bypass controls put in place to protect federal health care programs,” said Principal Deputy Assistant Attorney General Brian M. Boynton, head of the Justice Department’s Civil Division. “The Justice Department is committed to pursuing those who engage in kickback violations, including drug manufacturers, to ensure that federal health care programs continue to serve the interests of taxpayers and program beneficiaries.”

    The settlement encompasses two alleged kickback schemes. First, Teva has agreed to resolve allegations in a complaint the United States filed in the District of Massachusetts in August 2020 that Teva violated and conspired to violate the AKS and FCA by paying Medicare patients’ cost sharing obligations (copays) for the multiple sclerosis drug Copaxone from 2006 through 2017, while steadily raising Copaxone’s price. In particular, the United States alleged that Teva coordinated and conspired with multiple third parties, including a specialty pharmacy and two allegedly independent copay assistance foundations, to ensure that purported donations to the foundations were used specifically to cover the copays of Medicare Copaxone patients, which Teva knew was prohibited by the AKS, and that Teva thereby caused the submission of false claims to Medicare.

    Second, Teva USA has agreed to resolve separate allegations that it conspired with other generic drug manufacturers to fix prices for pravastatin, a drug widely used to treat high cholesterol and triglyceride levels, as well as two other generic drugs, clotrimazole and tobramycin. Teva USA previously entered into a deferred prosecution agreement with the Justice Department’s Antitrust Division to resolve related criminal charges. Teva USA paid a criminal penalty of $225 million and admitted to conspiring with three other generic drug companies to fix prices on certain generic drugs. Under the civil settlement announced today, Teva agreed to resolve allegations that the benefits it received under its price fixing scheme constituted illegal kickbacks.

    Teva will pay collectively $450 million to resolve the two kickback schemes. This payment is in addition to the criminal penalty paid by Teva USA under its deferred prosecution agreement. 

    “Kickback arrangements by pharmaceutical companies escalate the costs for critical drugs used by our citizens and federal health care programs,” said U.S. Attorney Jacqueline Romero for the Eastern District of Pennsylvania. “My office is proud to work with the rest of the Department of Justice and our investigative partners to enforce federal laws prohibiting kickback arrangements. We will continue to take action to lower the drug costs for our country and its health care programs supporting senior citizens, our military service members and others.”

    “For far too long, Teva gamed the charitable foundation process by paying kickbacks through two foundations, and with the aid of a specialty pharmacy. Those kickbacks undermined the purpose of the Medicare co-pay system and violated the Anti-Kickback Statute,” said Acting U.S. Attorney Joshua S. Levy for the District of Massachusetts. “This office has taken the leading role in cracking down on these highly lucrative schemes that drive up the cost of essential drugs by bringing multiple enforcement actions that have returned more than $1 billion to the Medicare system. We will continue to pursue these actions to ensure that all pharmaceutical companies play by the rules and to protect the American taxpayers.

    “The Medicare program’s copay structure serves as a safeguard against the artificial inflation of drug prices. When a pharmaceutical company manipulates drug prices through collusion, or disguises kickbacks as charitable donations to subsidize copays for its own drugs, the integrity of the Medicare program is jeopardized,” said Assistant Inspector General for Investigations Adam Globerman of the Department of Health and Human Services Office of Inspector General (HHS-OIG). “This type of conduct is unacceptable, and HHS-OIG remains committed to thoroughly pursuing allegations of price fixing and kickbacks that put the Medicare program at risk.”

    “The Defense Criminal Investigative Service, the law enforcement arm of the Department of Defense Office of Inspector General, seeks to protect the integrity of TRICARE, the healthcare system for U.S. military members and their dependents,” said Special Agent in Charge Patrick J. Hegarty of DCIS Northeast Field Office. “When pharmaceutical corporations artificially inflate prices, they place an unnecessary financial burden on the TRICARE program. The settlement agreement announced today demonstrates our commitment to partner with investigative agencies and the Department of Justice, including the Civil Division and the U.S. Attorney’s Office for the Eastern District of Pennsylvania, to combat healthcare fraud.”

    Since 2017, the United States has collected over $1 billion, in addition to today’s settlement, from pharmaceutical companies that allegedly used third-party foundations as conduits to unlawfully pay patient copays. The department has also reached settlements with four foundations and a specialty pharmacy pertaining to those allegations. Today’s resolution with Teva is the largest of these settlements to date. The settlement of Teva’s price fixing conduct is the seventh pertaining to allegations of price fixing involving generic drugs, with total recoveries exceeding $500 million.

    The government’s pursuit of these matters illustrates the department’s emphasis on combating health care fraud. One of the most powerful tools in this effort is the False Claims Act. Tips and complaints from all sources about potential fraud, waste, abuse and mismanagement can be reported to HHS at 800‑HHS‑TIPS (800-447-8477).

    The resolution of the patient copay matter was the result of a coordinated effort between the Civil Division’s Commercial Litigation Branch, Fraud Section, and U.S. Attorney’s Office for the District of Massachusetts, with investigative support from HHS-OIG and the FBI.

    Attorneys Douglas Rosenthal and Nelson Wagner of the Civil Division’s Fraud Section and Assistant U.S. Attorneys Abraham R. George, Diane Seol and Evan Panich for the District of Massachusetts handled the matter.

    The civil resolution of the price fixing matter was the result of a coordinated effort between the Fraud Section and the U.S. Attorney’s Office for the Eastern District of Pennsylvania, with investigative support from HHS-OIG, the Defense Health Agency Program Integrity Office, DCIS and Office of Inspector General for the Department of Veterans Affairs.

    Senior Trial Counsel Jennifer L. Cihon and Senior Litigation Counsel Laurie A. Oberembt of the Civil Division and Assistant U.S. Attorneys Landon Y. Jones III, Rebecca S. Melley and Anthony D. Scicchitano for the Eastern District of Pennsylvania handled the matter. Fraud Section financial analyst Sheryl Paynter provided support for both matters.

    The civil action in Massachusetts is captioned United States v. Teva Pharmaceuticals USA, Inc. et al., No. 20-cv-11548 (DMA).  

    DMA Settlement

    EDPA Settlement

    MIL OSI USA News