Category: Federal Bureau of Investigation

  • MIL-OSI Security: Former CIA Analyst Pleads Guilty to Transmitting Top Secret National Defense Information

    Source: US FBI

    A former CIA analyst pleaded guilty today to retaining and transmitting Top Secret National Defense Information to people who were not entitled to receive it, information which was publicly posted on a social media platform in October 2024.

    According to court documents, Asif William Rahman, 34, of Vienna, was an employee of the CIA since 2016 and had a Top-Secret security clearance with access to Sensitive Compartmented Information (SCI).

    “Mr. Rahman betrayed the trust of the American people by unlawfully sharing classified national defense information he swore an oath to protect,” said Assistant Attorney General Matthew G. Olsen of the Justice Department’s National Security Division. “Today’s guilty plea demonstrates that the Justice Department will spare no effort to swiftly find and aggressively prosecute those who harm the United States by illegally disclosing our national security secrets.”

    “Asif Rahman is pleading guilty in federal court three months to the day that he disclosed top secret American documents in violation of his oath, his responsibility, and the law,” said U.S. Attorney Jessica D. Aber for the Eastern District of Virginia. “This District, in partnership with federal law enforcement and the intelligence community, exemplified dedication, skill, and speed to bring him to justice expeditiously. Mr. Rahman’s actions placed lives at risk, undermined U.S. foreign relations, and compromised our ability to collect vital intelligence in the future.”

    “With today’s plea, Asif Rahman acknowledges he betrayed the trust of his country by sharing classified information in spite of the risk to the United States and our allies,” said Executive Assistant Director Robert Wells of the FBI’s National Security Branch. “Government employees who are granted security clearances and given access to our nation’s classified information must promise to protect it. Rahman blatantly violated that pledge and took multiple steps to hide his actions. The FBI will use all our resources to investigate and hold accountable those who illegally transmit classified information and endanger the national security interests of our country.”

    “Today’s plea demonstrates the FBI’s resolve to deploy the necessary tools and authorities to identify, locate, and bring to justice a government clearance holder who violated the oath he took to support and defend the U.S. Constitution,” said Assistant Director David Sundberg of the FBI Washington Field Office. “This is a good reminder to all clearance holders that the FBI and our Intelligence Community partners will spare no resource to immediately find and hold accountable those who violate the law and disclose classified information without authorization, no matter where in the world they are located.”

    According to court documents, on Oct. 17, 2024, Rahman accessed and printed two Top Secret documents containing National Defense Information regarding a U.S. foreign ally and its planned actions against a foreign adversary. Rahman removed the documents, photographed them, and transmitted them to individuals he knew were not entitled to receive them. By Oct. 18, 2024, the documents appeared publicly on multiple social media platforms, complete with the classification markings.

    After Oct. 17, 2024, Rahman deleted and edited journal entries and written work product on his personal electronic devices to conceal his personal opinions on U.S. policy and drafted entries to construct a false narrative regarding his activity. Rahman also destroyed multiple electronic devices, including a personal mobile device and an internet router he used to transmit classified information and photographs of classified documents, and discarded the destroyed devices in public trash receptacles in an effort to thwart potential investigations into him and his unlawful conduct.

    Beginning in the spring of 2024 and continuing through November 2024, Rahman repeatedly accessed and printed classified National Defense Information, including documents classified up to the Top Secret level, to take them to his residence. There, Rahman reproduced the documents and, while doing so, altered them in an effort to conceal their source and his activity. Rahman then communicated Top Secret information that he learned in the course of his employment to multiple individuals he knew were not entitled to receive it.

    Rahman was indicted by a grand jury on Nov. 7, 2024, and was arrested by the FBI as he arrived to work on Nov. 12, 2024. He has remained in custody since his arrest.

    Rahman pleaded guilty to two counts of willful retention and transmission of classified information related to the national defense. He is scheduled to be sentenced on May 15, 2025. He faces a maximum penalty of 10 years in prison for both counts in the plea agreement. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    The FBI Washington Field Office is investigating the case.

    Assistant U.S. Attorney Troy A. Edwards Jr. for the Eastern District of Virginia and Trial Attorney Brett Reynolds of the National Security Division’s Counterintelligence and Export Control Section are prosecuting the case.

    MIL Security OSI

  • MIL-OSI Security: David K. Porter Named Special Agent in Charge of the Honolulu Field Office

    Source: US FBI

    Director Christopher Wray has named David K. Porter as the special agent in charge of the Honolulu Field Office. Mr. Porter most recently served as the chief of staff for the Deputy Director at FBI Headquarters in Washington, D.C.

    Mr. Porter began his career with the FBI as a special agent in 2006, initially assigned to the Pittsburgh Field Office Joint Terrorism Task Force. In 2010, Mr. Porter transferred to the Detroit Field Office, where he investigated counterterrorism matters. In addition to his work as a special agent in the Pittsburgh and Detroit Field Offices, Mr. Porter also served as an operator on the FBI Pittsburgh and Detroit SWAT Teams.

    In 2013, Mr. Porter was promoted to associate division counsel in the Detroit Field Office and later promoted to supervisory special agent of the Public Corruption and Civil Rights programs in 2015.

    Mr. Porter was selected as an assistant section chief to the Cyber Division at FBI Headquarters in 2019. He was detailed full-time to the Counterintelligence Division’s Foreign Influence Task Force, where he led investigative operations, intelligence production, and interagency policy engagement with the National Security Council.

    Mr. Porter returned to Detroit in May 2021 as the crisis response supervisory special agent. In July 2021, he was then selected as an assistant special agent in charge of the Detroit Field Office, with operational responsibility for the Western District of Michigan and oversight of six resident agencies spanning 49 counties.

    Immediately prior to joining the FBI, Mr. Porter served as counsel for the U.S. Senate Committee on Homeland Security and Governmental Affairs. He also has previous experience practicing law as a corporate litigation attorney, and he served as a high school history teacher. Mr. Porter earned bachelor’s degrees in American history and literature from Calvin University and a juris doctor degree from the University of Michigan Law School.

    MIL Security OSI

  • MIL-OSI Security: FBI Sacramento Celebrates 2024 Graduates of the FBI National Academy

    Source: US FBI

    Did you know that the Federal Bureau of Investigation (FBI) began providing standardized, professional training to law enforcement professionals in 1935? Since its founding, the FBI National Academy has trained 55,797 law enforcement professionals from across the globe. This training aims to enhance the administration of justice in police departments and agencies both domestically and abroad, raising law enforcement standards, knowledge, and cooperation worldwide.

    The FBI Sacramento Field Office referred 16 law enforcement professionals to this program in 2024. They represent law enforcement agencies based within the 34-county region the FBI Sacramento Field Office serves. FBI National Academy graduates in 2024 include:

    • Deputy Division Chief Luke Blehm
      California Alcoholic Beverage Control
    • Captain Andrew Beasley
      California Highway Patrol
    • Lieutenant Noah Hawkins
      California Highway Patrol
    • Captain Anthony Horner
      California Highway Patrol
    • Lieutenant Lou Wright
      Folsom Police Department
    • Captain Brandon Pursell, Jr.
      Fresno County Sheriff’s Office
    • Lieutenant Jerardo “Charlie” Chamalbide
      Fresno Police Department.
    • Chief Deputy Erik Levig
      Kern County Sheriff’s Office
    • Captain Ray Reyna
      Modesto Police Department
    • Chief Brandon Gillespie
      Modesto Police Department
    • Chief Investigator Mary Green
      Placer County District Attorney’s Office
    • Lieutenant Mark Lopez
      Sacramento County Sheriff’s Office
    • Captain Vance Chandler
      Sacramento Police Department
    • Chief Rudolfo Alcaraz
      Selma Police Department
    • Lieutenant Craig Collins
      Solano County Sheriff’s Office
    • Octavio Lopez
      Tracy Police Department.

    Following graduation, each officer may join the FBI National Academy Associates, Inc., a dynamic organization of more than 14,000 law enforcement professionals who continue improving the level of competency, cooperation, and integrity among the global law enforcement community.

    Courses during the rigorous, 10-week program include intelligence theory, terrorism and terrorist mindsets, management science, law, behavioral science, law enforcement communication, and forensic science. Students and their respective law enforcement agencies receive tuition, books, equipment, meals, lodging, or travel to and from the training facility at no cost.

    The FBI National Academy program was originally launched as the “FBI Police Training School” in response to the 1930 Wickersham Commission report recommending standardization and professionalization of law enforcement in the United States through centralized training. At the time, courses included scientific aids in crime detection, preparation of reports, and criminal investigation techniques as well as administration and organization. To learn more about the FBI National Academy, visit https://www.fbi.gov/services/training-academy/national-academy.

    MIL Security OSI

  • MIL-OSI Security: Man Sentenced to 40 Months for Participating in International Money Laundering Scheme Involving More Than $3 Million in Fraud Proceeds

    Source: US FBI

    NEWS RELEASE SUMMARY – September 9, 2024

    SAN DIEGO – Juan Pablo Prada Bernal of Colombia was sentenced in federal court today to 40 months in prison for participating in an international money laundering conspiracy involving more than $3 million in proceeds obtained through phone scams.

    At today’s hearing, U.S. District Court Judge Andrew G. Schopler also ordered Bernal to pay $327,040.72 in restitution to 27 victims of the offense.

    According to his plea agreement, between June 2018 and March 2020, Bernal was a member of an international conspiracy that laundered large amounts of money. The conspiracy involved two sides: Those responsible for contacting victims by phone and tricking them into sending thousands of dollars to U.S.-based bank accounts, and those responsible for laundering the proceeds through those bank accounts. The money launderers received and transferred the ill-gotten gains to their co-conspirators in Colombia and the United States, and in the process concealed the nature, source, location, ownership and control of the proceeds.

    The money launderers opened bank accounts at various financial institutions using false mailing addresses. Shortly after the accounts were opened, the phone scammers – many of whom lived in Colombia – made unsolicited phone calls to victims in the United States using spoofed phone numbers. This allowed callers to conceal their identity and make it appear as if the calls originated from locations in the United States, such as a police station where the victim lived or had lived in the past.

    During calls with victims, the scammers impersonated federal and local law enforcement officers and made the victims believe they were implicated in a crime. Using this as leverage, the conspirators coerced victims to make large wire transfers or other payments to purportedly resolve their criminal liability. The scammers instructed victims to wire funds to the various bank accounts opened by the money launderers. Once the money was deposited into the accounts, the money launderers quickly moved to withdraw the funds, purchase cashier’s checks to send to other conspirators, and drain the balance of the accounts before the funds could be frozen.

    According to the United States’ sentencing memorandum, Bernal opened bank accounts at 10 different financial institutions to carry out the money laundering scheme. In many instances, Bernal received the fraud proceeds shortly after he opened the bank accounts and drained the balance of the accounts in a matter of days. After banks stopped allowing Bernal to open new accounts, he began to receive and launder cashier’s checks sent from his co-conspirators that were purchased with fraud proceeds obtained from other victims. To carry out this new role, Bernal and his co-conspirators traveled to multiple Moneytree locations in the same day for the purpose of laundering large amounts of fraud proceeds over a short period of time.

    Over the course of approximately two years, Bernal received and laundered fraud proceeds more than 30 times from 27 different victims, including varying amounts of cashier’s checks from 14 of his co-conspirators, totaling an amount of $327,040.72.

    “These scammers are sophisticated and will prey on emotion and fear,” said U.S. Attorney Tara McGrath. “This defendant turned deceit into profit, so we turned his profit into a conviction.”

    “FBI Los Angeles works closely with our law enforcement partners to combat money laundering in our communities. Mr. Bernal’s sentence should serve as a deterrent to those who seek to prey on innocent victims” said Akil Davis, Assistant Director in Charge of the FBI Los Angeles Field Office. “The FBI reminds the public to be vigilant and never send money, gift cards, or share personal identifying information with a caller and to verify that the caller is a legitimate business or organization. The public is urged to report these calls to 1-800-CALL-FBI or tips.fbi.gov.”

    “The U.S. Border Patrol is an all-threats agency, and we will continue to work with our law enforcement partners to protect our citizens from any and all threats,” said Chief Patrol Agent Patricia McGurk-Daniel. “I couldn’t be prouder of the work done by these agents to secure a significant and successful prosecution.”

    This case is the result of ongoing efforts by the Organized Crime Drug Enforcement Task Force (OCDETF), a partnership that brings together the combined expertise and unique abilities of federal, state and local law enforcement agencies. The principal mission of the OCDETF program is to identify, disrupt, dismantle and prosecute high-level members of drug trafficking, weapons trafficking and money laundering organizations and enterprises.

    This case is being prosecuted by Assistant U.S. Attorney Patrick C. Swan.

    DEFENDANT                                   Case Number             23-cr-1483-AGS

    Juan Pablo Prada Bernal                     Age: 24                       Columbia

    SUMMARY OF CHARGES

    Money Laundering Conspiracy – Title 18, U.S.C., Section 1956(h)

    Maximum Penalties: Twenty years in prison and a $250,000 fine or twice the value of the property involved in the transaction

    INVESTIGATING AGENCIES

    U.S. Department of Homeland Security

    U.S. Customs and Border Protection

    U.S. Border Patrol

    Federal Bureau of Investigation

    Organized Crime Drug Enforcement Task Force

    U.S. Secret Service

    MIL Security OSI

  • MIL-OSI Security: FBI San Diego Seizes Cryptocurrency Recovery Websites

    Source: US FBI

    SAN DIEGO — Special Agents with the FBI San Diego Field Office have seized websites belonging to three cryptocurrency recovery services. The seizures come as the FBI continues to crack down on an emerging scam tactic aimed at further defrauding cryptocurrency scam victims.

    The web domains were from the following cryptocurrency recovery services: MyChargeBack, Payback LTD, and Claim Justice. These companies claim to provide cryptocurrency tracing and promise the ability to recover lost funds. Representatives of these companies often advertise strong success in recovering victim funds but have no track record in doing so. They often charge significant upfront fees and ask for a commission should funds be recovered. These companies use extensive social media advertising, including false reviews, to convince victims of the legitimacy of their services.

    Potential ways to identify this type of scheme:

    • Recovery scheme fraudsters charge an up-front fee and either cease communication with the victim after receiving an initial deposit or produce an incomplete or inaccurate tracing report. They may also request additional fees to recover funds.
    • Fraudsters may claim affiliation with law enforcement or legal services to appear legitimate.
    • Scammers may reference actual financial institutions and money exchanges to build credibility and further their schemes.

    Tips to avoid becoming a victim:

    • Be wary of advertisements for cryptocurrency recovery services. Research the advertised company and beware if the company uses vague language, has a minimal online presence, and makes promises regarding an ability to recover funds.
    • If an unknown individual contacts you and claims to be able to recover stolen cryptocurrency, do not release any financial or personal identifying information, and do not send money.
    • Law enforcement does not charge victims a fee for investigating crimes. If someone claims an affiliation with the FBI, contact the FBI San Diego Field Office at 858-320-1800 to confirm.

    Individuals who believe they may have been a victim of this type of scheme should file a report with the FBI’s Internet Crime Complaint Center at ic3.gov.

    MIL Security OSI

  • MIL-OSI Security: Court-Authorized Operation Disrupts Worldwide Botnet Used by People’s Republic of China State-Sponsored Hackers

    Source: US FBI

    Note: View the affidavit here.

    The Justice Department today announced a court-authorized law enforcement operation that disrupted a botnet consisting of more than 200,000 consumer devices in the United States and worldwide. As described in court documents unsealed in the Western District of Pennsylvania, the botnet devices were infected by People’s Republic of China (PRC) state-sponsored hackers working for Integrity Technology Group, a company based in Beijing, and known to the private sector as “Flax Typhoon.”

    The botnet malware infected numerous types of consumer devices, including small-office/home-office (SOHO) routers, internet protocol (IP) cameras, digital video recorders (DVRs), and network-attached storage (NAS) devices. The malware connected these thousands of infected devices into a botnet, controlled by Integrity Technology Group, which was used to conduct malicious cyber activity disguised as routine internet traffic from the infected consumer devices. The court-authorized operation took control of the hackers’ computer infrastructure and, among other steps, sent disabling commands through that infrastructure to the malware on the infected devices. During the course of the operation, there was an attempt to interfere with the FBI’s remediation efforts through a distributed denial-of-service (DDoS) attack targeting the operational infrastructure that the FBI was utilizing to effectuate the court’s orders. That attack was ultimately unsuccessful in preventing the FBI’s disruption of the botnet.

    “The Justice Department is zeroing in on the Chinese government backed hacking groups that target the devices of innocent Americans and pose a serious threat to our national security,” said Attorney General Merrick B. Garland. “As we did earlier this year, the Justice Department has again destroyed a botnet used by PRC-backed hackers to infiltrate consumer devices here in the United States and around the world. We will continue to aggressively counter the threat that China’s state- sponsored hacking groups pose to the American people.”

    “Our takedown of this state-sponsored botnet reflects the Department’s all-tools approach to disrupting cyber criminals. This network, managed by a PRC government contractor, hijacked hundreds of thousands of private routers, cameras, and other consumer devices to create a malicious system for the PRC to exploit,” said Deputy Attorney General Lisa Monaco. “Today should serve as a warning to cybercriminals preying on Americans – if you continue to come for us, we will come for you.”

    “This dynamic operation demonstrates, once again, the Justice Department’s resolve in countering the threats posed by PRC state-sponsored hackers,” said Assistant Attorney General Matthew G. Olsen of the National Security Division. “For the second time this year, we have disrupted a botnet used by PRC proxies to conceal their efforts to hack into networks in the U.S. and around the world to steal information and hold our infrastructure at risk. Our message to these hackers is clear: if you build it, we will bust it.”

    “The disruption of this worldwide botnet is part of the FBI’s commitment to using technical operations to help protect victims, expose publicly the scope of these criminal hacking campaigns, and to use the adversary’s tools against them to remove malicious infrastructure from the virtual battlefield,” said FBI Deputy Director Paul Abbate. “The FBI’s unique legal authorities allowed it to lead an international operation with partners that collectively disconnected this botnet from its China-based hackers at Integrity Technology Group.”

    “The targeted hacking of hundreds of thousands of innocent victims in the United States and around the world shows the breadth and aggressiveness of PRC state-sponsored hackers,” said U.S. Attorney Eric G. Olshan for the Western District of Pennsylvania. “This court-authorized operation disrupted a sophisticated botnet designed to steal sensitive information and launch disruptive cyber attacks. We will continue to work with our partners inside and outside government, using every tool at our disposal, to defend and maintain global cybersecurity.”

    “The FBI’s investigation revealed that a publicly-traded, China-based company is openly selling its customers the ability to hack into and control thousands of consumer devices worldwide. This operation sends a clear message to the PRC that the United States will not tolerate this shameless criminal conduct,” said Special Agent in Charge Stacey Moy of the FBI San Diego Field Office.

    According to the court documents, the botnet was developed and controlled by Integrity Technology Group, a publicly-traded company headquartered in Beijing. The company built an online application allowing its customers to log in and control specified infected victim devices, including with a menu of malicious cyber commands using a tool called “vulnerability-arsenal.” The online application was prominently labelled “KRLab,” one of the main public brands used by Integrity Technology Group.

    The FBI assesses that Integrity Technology Group, in addition to developing and controlling the botnet, is responsible for computer intrusion activities attributed to China-based hackers known by the private sector as “Flax Typhoon.” Microsoft Threat Intelligence described Flax Typhoon as nation-state actors based out of China, active since 2021, who have targeted government agencies and education, critical manufacturing, and information technology organizations in Taiwan, and elsewhere. The FBI’s investigation has corroborated Microsoft’s conclusions, finding that Flax Typhoon has successfully attacked multiple U.S. and foreign corporations, universities, government agencies, telecommunications providers, and media organizations.

    A cybersecurity advisory describing Integrity Technology Group tactics, techniques and procedures was also published today by the FBI, the National Security Agency, U.S. Cyber Command’s Cyber National Mission Force, and partner agencies in Australia, Canada, New Zealand and the United Kingdom. 

    The government’s malware disabling commands, which interacted with the malware’s native functionality, were extensively tested prior to the operation. As expected, the operation did not affect the legitimate functions of, or collect content information from, the infected devices. The FBI is providing notice to U.S. owners of devices that were affected by this court-authorized operation. The FBI is contacting those victims through their internet service provider, who will provide notice to their customers.

    The FBI’s San Diego Field Office and Cyber Division, the U.S. Attorney’s Office for the Western District of Pennsylvania, and the National Security Cyber Section of the Justice Department’s National Security Division led the domestic disruption effort. Assistance was also provided by the Criminal Division’s Computer Crime and Intellectual Property Section. These efforts would not have been successful without the collaboration of partners, including French authorities, and Lumen Technologies’ threat intelligence group, Black Lotus Labs, which first identified and described this botnet, which it named Raptor Train, in July 2023.

    If you believe you have a compromised computer or device, please visit the FBI’s Internet Crime Complaint Center (IC3) or report online to CISA. You may also contact your local FBI field office directly.

    The FBI continues to investigate Integrity Technology Group’s and Flax Typhoon’s computer intrusion activities.

    MIL Security OSI

  • MIL-OSI Security: North Dakota Man Sentenced to 25 Years in Federal Prison for Distribution of a Controlled Substance Resulting in Death

    Source: Office of United States Attorneys

    PIERRE – United States Attorney Alison J. Ramsdell announced today that U.S. District Judge Charles B. Kornmann has sentenced a Mandan, North Dakota, man convicted of Distribution of a Controlled Substance Resulting in Death. The sentencing took place on May 19, 2025.

    Carlin Mellette, age 29, was sentenced to 25 years in federal prison, followed by five years of supervised release, and ordered to forfeit the firearm, pay a $1,000 fine, and pay a $100 special assessment to the Federal Crime Victims Fund.

    Mellette was indicted by a federal grand jury in August 2023. He pleaded guilty on September 30, 2024.

    This conviction stemmed from events that occurred during the early morning hours of February 26, 2023, when the victim and friends were socializing with a co-defendant and others at a residence in Aberdeen, South Dakota. Mellette arrived at the residence and provided the co-defendant with three pills containing fentanyl. The co-defendant took the pills inside the residence where the pills were then ingested by the co-defendant and the victim, who ingested only half of a pill, resulting in the fentanyl overdose death of the victim. Later that day, Walworth County Sheriff’s deputies attempted to conduct an unrelated traffic stop of Mellette’s vehicle for speeding in an area west of Aberdeen. Mellette led law enforcement on a 26-mile pursuit with speeds in excess of 100 mph. Mellette was apprehended after getting his vehicle stuck in a snowbank. A search of his vehicle revealed 99 grams of methamphetamine, additional fentanyl pills, drug ledgers, scales, other drug paraphernalia, and a Ruger .45 caliber pistol.

    This case was investigated by the FBI Northern Plains Safe Trails Drug Enforcement Task Force, the Aberdeen Police Department, the Walworth County Sheriff’s Office, the Campbell County Sheriff’s Office, the Corson County Sheriff’s Office, the Potter County Sheriff’s Office, and the Gettysburg Police Department. Assistant U.S. Attorney Meghan Dilges prosecuted the case.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.

    Mellette was immediately remanded to the custody of the U.S. Marshals Service. 

    MIL Security OSI

  • MIL-OSI Security: Former Harvard Morgue Manager Pleads Guilty To Trafficking Stolen Human Remains

    Source: Office of United States Attorneys

    SCRANTON – The United States Attorney’s Office for the Middle District of Pennsylvania announced that Cedric Lodge, age 57, of Goffstown, New Hampshire, pled guilty yesterday before Chief United States District Judge Matthew W. Brann to interstate transport of stolen human remains. 

    According to Acting United States Attorney John Gurganus, Lodge admitted that, from 2018 through at least March 2020, he participated in the sale and interstate transport of human remains stolen from Harvard Medical School morgue, located in Boston, Massachusetts.  Lodge, who was then employed as the manager of the Harvard Medical School Morgue, removed human remains, including organs, brains, skin, hands, faces, dissected heads, and other parts, from donated cadavers after they had been used for research and teaching purposes but before they could be disposed of according to the anatomical gift donation agreement between the donor and the school. Lodge took the remains without the knowledge or permission of his employer, the donor, or the donor’s family, and transport the remains to his home in New Hampshire.  After he and his wife Denise Lodge sold the remains, they would ship the remains to the buyers in other states or the buyer would take possession directly and transport the remains themselves.  Remains stolen and sold by Lodge were transported from the morgue in Boston to locations in Salem, Massachusetts, New Hampshire, and Pennsylvania.

    Lodge admitted to having sold remains to Joshua Taylor and Andrew Ensanian, among others.  Many of the remains purchased from Lodge were resold for a profit, including to Jeremy Pauley, who previously entered a guilty plea to conspiracy and interstate transportation of stolen human remains.

    Several other defendants have previously entered guilty pleas in related cases, including Lodge’s wife, Denise Lodge, Joshua Taylor, Andrew Ensanian, Matthew Lampi, and Angelo Pereyra.  Lampi was sentenced to 15 months in prison and Pereyra was sentenced to 18 months.  Denise Lodge and Joshua Taylor are still awaiting sentencing.  Additionally, Candace Chapman-Scott, who stole remains from an Arkansas crematorium where she was employed and sold them to Pauley in Pennsylvania, entered a plea of guilty in Arkansas federal court and was sentenced to 15 years in prison.

    The case was investigated by the Federal Bureau of Investigation, the United States Postal Inspection Service, and the East Pennsboro Township Police Department. Assistant U.S. Attorney Alisan Martin is prosecuting the case. 

    The maximum penalty under federal law for this offense is 10 years of imprisonment, a term of supervised release following imprisonment, and a fine. A sentence following a finding of guilt is imposed by the Judge after consideration of the applicable federal sentencing statutes and the Federal Sentencing Guidelines.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Watertown Man Found Guilty of Aggravated Sexual Abuse and Sexual Abuse of a Minor within the Lake Traverse Reservation

    Source: Office of United States Attorneys

    ABERDEEN – United States Attorney Alison J. Ramsdell announced that a jury has convicted Gokoh Frank Brown, age 29, from Watertown, South Dakota, of one count of Aggravated Sexual Abuse by Force and one count of Sexual Abuse of a Minor following a two-day jury trial in federal district court in Aberdeen, South Dakota. The verdict was returned on May 21, 2025.

    The charges carry a maximum penalty of life in federal prison and/or a $250,000 fine, and up to a lifetime term of supervised release.

    Brown was indicted by a federal grand jury in August 2024. 

    From January 2023 to August 2023, Brown sexually assaulted a 12–13-year-old girl while living in Red Iron Housing on the Lake Traverse Reservation. Brown was 26-27 years old at the time.

    This case was investigated by the FBI, Sisseton-Wahpeton Oyate Law Enforcement, and the DCI. Assistant U.S. Attorney Elizabeth Ebert-Webb prosecuted the case.

    A presentence investigation was ordered, and a sentencing date has been set for August 18, 2025. The defendant was remanded to the custody of the U.S. Marshals Service. 

    MIL Security OSI

  • MIL-OSI Security: Brooklyn Center Woman Pleads Guilty for Her Role in a Black-Market Travel Agent Fraud Scheme

    Source: Office of United States Attorneys

    MINNEAPOLIS – Reginae Calhoun of Brooklyn Center, Minnesota has pleaded guilty to access device fraud and aggravated identify theft, announced Acting U.S. Attorney Lisa D. Kirkpatrick.

    According to court documents, from at least April 2024 to June 2024, Reginae Calhoun, 23, operated as a black-market travel agent.  She  purchased credit card information—including name, address, card numbers, expiration date, and CV2 code—of approximately 216 different victims on the dark web, which she used to book hotel rooms and rental cars for others.  Calhoun’s customers paid her a fraction of the actual booking costs through peer-to-peer payment applications or in cash.

    According to court documents, on June 2, 2024, Calhoun attempted to purchase airline tickets by using several different credit cards until the purchase was successful.  Due to the several attempts, the airline reported suspected credit card fraud to the airport police.  Airport police confirmed with the credit card owners that Calhoun was not authorized to use their cards.

    “The ingenuity of Minnesota’s fraudsters seems to know no bounds,” said Acting U.S. Attorney Lisa D. Kirkpatrick.  “Calhoun stole hundreds of victim identities and used them to conduct a black-market travel agent fraud scheme—stealing from others to enrich herself. She will now be held accountable in federal court.”     

    “Criminals who turn to the dark web to buy and sell stolen information are part of a growing threat to our digital security,” said Special Agent in Charge Alvin M. Winston Sr. of FBI Minneapolis. “This defendant built a business by exploiting the stolen identities and financial information of over 200 of innocent victims. The anonymity of the internet does not protect offenders from detection. The FBI and our partners will continue to find and expose these schemes and hold offenders accountable.”

    Calhoun pleaded guilty on May 19, 2025, in U.S. District Court before Judge John R. Tunheim to one count of access device fraud and one count of aggravated identity theft.

    This case is the result of an investigation conducted by the FBI and the MSP Airport Police Department.

    Assistant U.S. Attorney Matthew C. Murphy prosecuted the case.

    MIL Security OSI

  • MIL-OSI Security: Minneapolis Woman Sentenced to 51 Months in Prison for Role in Feeding Our Future $250 Million Fraud Scheme

    Source: Office of United States Attorneys

    MINNEAPOLIS – Sahra Nur of Minneapolis has been sentenced to 51 months in prison followed by 2 years of supervised release for her role in a $250 million fraud scheme that exploited a federally funded child nutrition program during the COVID-19 pandemic, announced Acting U.S. Attorney Lisa D. Kirkpatrick. Nur was also ordered to pay restitution in the amount of $5,000,240.

    According to court documents, from December 2020 through January 2022, Sahra Mohamed Nur, 63, knowingly and willfully conspired with others in a fraudulent scheme to obtain and misappropriate millions in federal child nutrition funds. As the owner and operator of S & S Catering Inc., Nur initially enrolled in the Federal Child Nutrition Program as a food distribution site under the sponsorship of Feeding Our Future. As the fraud scheme progressed, S & S Catering operated as a vendor for other food distribution sites affiliated with Feeding Our Future.

    Between September 2020 and April 2021, Nur claimed to have served over 1.2 million meals to children from S & S Catering alone. Between December 2020 and December 2021, sites who used S & S Catering as a vendor reported serving more than eight million meals through the food program. Based on their fraudulent claims, S & S Catering received more than $10 million in payment from these companies they purportedly served food to, and over $16 million in reimbursements from Feeding Our Future. Rather feed children during the pandemic, Nur misappropriated the funds for her own personal benefit, such as commercial real estate.

    Nur was one of eight defendants charged in a 23-count indictment in September 2022. On September 7, 2023, Nur pleaded guilty to one count of wire fraud and one count of money laundering. She was sentenced today in U.S. District Court by Judge Nancy E. Brasel.  In imposing sentence, Judge Brasel called the loss amount “staggering” and explained that “public trust in government programs has significant decreased” as a result of the defendant’s fraud.  Judge Brasel noted that it was “tragic” how the fraud scheme has damaged the reputation of Somali-American community.

    The case is the result of an investigation by the FBI, IRS – Criminal Investigations, and the U.S. Postal Inspection Service.

    Assistant U.S. Attorneys for the District of Minnesota Joseph H. Thompson, Harry M. Jacobs, Matthew S. Ebert, and Daniel W. Bobier prosecuted the case. Assistant U.S. Attorney Craig Baune is handling the seizure and forfeiture of assets.

    MIL Security OSI

  • MIL-OSI Security: Two Charged in $227M Medicare Fraud Scheme

    Source: United States Attorneys General 13

    WASHINGTON — An Illinois man and a foreign national were arrested yesterday on criminal charges related to their alleged submission of more than $227 million in fraudulent claims to Medicare.

    According to court documents, Syed Murtuza Kablazada, 34, of Arlington Heights, and Syed Mehdi Hussain, 32, of Carol Stream, owned and operated purported medical laboratories that submitted fraudulent claims to Medicare for the reimbursement of over-the-counter COVID-19 test kits allegedly provided to Medicare beneficiaries. The defendants allegedly installed foreign nationals to act as nominee owners at the laboratories to submit fraudulent claims to Medicare for the provision of over-the-counter COVID-19 test kits, with the understanding the nominee owners would flee the United States when they learned that their laboratory was under investigation.

    “As alleged, the defendants used straw owners at multiple laboratories to cause the submission of more than $200 million in fraudulent claims to Medicare for COVID-19 test kits,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “Health care fraud harms Americans by squandering taxpayer money and diverting limited resources from those who need them most. The Criminal Division will continue to aggressively prosecute these crimes to hold fraudsters accountable, protect victims, and recover financial losses.”

    “The overwhelming fraud uncovered in this investigation details a blatant disregard for America’s critical health care program, Medicare, and puts all patients at risk,” said Special Agent in Charge Douglas S. DePodesta of the FBI Chicago Field Office. “The FBI and our partners will not tolerate anyone who abuses the health care system for personal gain and will aggressively pursue justice on behalf of both patients and taxpayers.”

    As alleged in the indictment, the defendants rarely provided Covid-19 test kits to Medicare beneficiaries but instead submitted reimbursement claims on behalf of beneficiaries who had not requested COVID-19 test kits, including individuals who were deceased. Further, the defendants allegedly paid a marketing company to provide the names of hundreds of thousands of Medicare beneficiaries that the defendants used to submit fraudulent claims. In total, between September 2022 and June 2023, the defendants’ labs billed Medicare approximately $227 million in fraudulent claims, of which Medicare paid approximately $136 million in reimbursements.

    Kablazada and Hussain are both charged by indictment with four counts of health care fraud. If convicted, they face a maximum penalty of 10 years in prison on each of the four counts.

    The FBI Chicago Field Office and HHS-OIG are investigating the case.

    Trial Attorney Andres Q. Almendarez of the Criminal Division’s Fraud Section is prosecuting the case, with assistance from Assistant U.S. Attorney Jasmina Vajzovic for the Northern District of Illinois.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Force Program. Since March 2007, this program, currently comprised of 9 strike forces operating in 27 federal districts, has charged more than 5,800 defendants who collectively have billed federal health care programs and private insurers more than $30 billion. In addition, the Centers for Medicare & Medicaid Services, working in conjunction with the Office of the Inspector General for the Department of Health and Human Services, are taking steps to hold providers accountable for their involvement in health care fraud schemes. More information can be found at www.justice.gov/criminal-fraud/health-care-fraud-unit.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI USA: Two Charged in $227M Medicare Fraud Scheme

    Source: US State Government of Utah

    WASHINGTON — An Illinois man and a foreign national were arrested yesterday on criminal charges related to their alleged submission of more than $227 million in fraudulent claims to Medicare.

    According to court documents, Syed Murtuza Kablazada, 34, of Arlington Heights, and Syed Mehdi Hussain, 32, of Carol Stream, owned and operated purported medical laboratories that submitted fraudulent claims to Medicare for the reimbursement of over-the-counter COVID-19 test kits allegedly provided to Medicare beneficiaries. The defendants allegedly installed foreign nationals to act as nominee owners at the laboratories to submit fraudulent claims to Medicare for the provision of over-the-counter COVID-19 test kits, with the understanding the nominee owners would flee the United States when they learned that their laboratory was under investigation.

    “As alleged, the defendants used straw owners at multiple laboratories to cause the submission of more than $200 million in fraudulent claims to Medicare for COVID-19 test kits,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “Health care fraud harms Americans by squandering taxpayer money and diverting limited resources from those who need them most. The Criminal Division will continue to aggressively prosecute these crimes to hold fraudsters accountable, protect victims, and recover financial losses.”

    “The overwhelming fraud uncovered in this investigation details a blatant disregard for America’s critical health care program, Medicare, and puts all patients at risk,” said Special Agent in Charge Douglas S. DePodesta of the FBI Chicago Field Office. “The FBI and our partners will not tolerate anyone who abuses the health care system for personal gain and will aggressively pursue justice on behalf of both patients and taxpayers.”

    As alleged in the indictment, the defendants rarely provided Covid-19 test kits to Medicare beneficiaries but instead submitted reimbursement claims on behalf of beneficiaries who had not requested COVID-19 test kits, including individuals who were deceased. Further, the defendants allegedly paid a marketing company to provide the names of hundreds of thousands of Medicare beneficiaries that the defendants used to submit fraudulent claims. In total, between September 2022 and June 2023, the defendants’ labs billed Medicare approximately $227 million in fraudulent claims, of which Medicare paid approximately $136 million in reimbursements.

    Kablazada and Hussain are both charged by indictment with four counts of health care fraud. If convicted, they face a maximum penalty of 10 years in prison on each of the four counts.

    The FBI Chicago Field Office and HHS-OIG are investigating the case.

    Trial Attorney Andres Q. Almendarez of the Criminal Division’s Fraud Section is prosecuting the case, with assistance from Assistant U.S. Attorney Jasmina Vajzovic for the Northern District of Illinois.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Force Program. Since March 2007, this program, currently comprised of 9 strike forces operating in 27 federal districts, has charged more than 5,800 defendants who collectively have billed federal health care programs and private insurers more than $30 billion. In addition, the Centers for Medicare & Medicaid Services, working in conjunction with the Office of the Inspector General for the Department of Health and Human Services, are taking steps to hold providers accountable for their involvement in health care fraud schemes. More information can be found at www.justice.gov/criminal-fraud/health-care-fraud-unit.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI USA: Attorney General James Advances Legislation to Protect Small Businesses and Consumers

    Source: US State of New York

    EW YORK – New York Attorney General Letitia James today joined supporters to rally for the passage of the Fostering Affordability and Integrity through Reasonable Business Practices, or FAIR Business Practices Act, a program bill from the Office of the Attorney General (OAG) and sponsored in the state legislature by Senator Leroy Comrie and Assemblymember Micah Lasher. This legislation will strengthen New York’s consumer protection law, GBL §349, to protect New Yorkers from predatory lending, abusive debt collection, junk fees, artificial intelligence (AI)-based schemes, online phishing scams, hard-to-cancel subscriptions, data breaches, and other unfair, deceptive, and abusive practices. Forty-two other states and federal law already prohibit unfair practices, making New York’s current law both antiquated and inadequate.

    “As the federal government steps back from protecting consumers and small businesses, New York must step up to help working families and Main Street businesses,” said Attorney General James. “The FAIR Business Practices Act will protect small businesses from predatory lenders, homeowners from bad mortgage servicers, patients from abusive debt collection, and much more. This legislation will strengthen New York’s consumer protection laws to stop businesses from taking advantage of New Yorkers. I look forward to working with my partners in the state legislature to get this legislation passed.”

    The FAIR Business Practices Act would also help stop lenders, including auto lenders, mortgage servicers, and student loan servicers, from deceptively steering people into higher-cost loans. It would reduce unnecessary and hidden fees, stop unfair billing practices by health care companies, and prevent companies from taking advantage of New Yorkers with limited English proficiency. With the federal government rolling back protections for consumers and small businesses, the FAIR Business Practices Act authorizes OAG and victims to seek civil penalties and restitution against businesses that use unfair, deceptive, or abusive practices against vulnerable New Yorkers.

    “New Yorkers deserve to be treated fairly, and this legislation helps ensure that,” said Senator Leroy Comrie. “The FAIR Business Practices Act gives our state stronger tools to hold bad actors accountable and protect everyday people from deceptive and abusive practices. I’m proud to sponsor this bill alongside Attorney General James and Assemblymember Lasher as we work to strengthen consumer protections and support small businesses across our state.” 

    “New York has one of the weakest consumer protection laws in the country. Donald Trump and Elon Musk are taking a hatchet to federal consumer protections, leaving New Yorkers even more vulnerable to abuse. The time to act is now,” said Assemblymember Micah Lasher. “Making sure that the Attorney General has the tools she needs to look out for New Yorkers is one of the best ways we can stop the damage Trump is trying to do. We must pass this bill this session to protect consumers from the high costs of unfair business practices. It is an honor to stand together in this fight with Attorney General James and Senator Comrie. Let’s get this done.”

    “We applaud Attorney General James for developing the FAIR Business Practices Act and we thank Assemblymember Lasher for introducing this bill,” said Mario Cilento, President of the New York State AFL-CIO. “The NYS AFL-CIO strongly supports modernizing the state’s consumer protection laws, particularly because of rollbacks at the federal level, but also to address technological, legal, and other developments that have made our current laws less effective. This bill, which will improve the rights and protections of workers who have been victims of various fraudulent and unfair practices, including unreasonable terms and conditions for payday loans or payroll check-cashing schemes, is a crucial step towards a fairer and more just society.” 

    “The FAIR Business Practices Act will protect working families from abusive business practices that are making it hard for people to get a car, keep a roof over their heads, and put food on the table,” said Henry Garrido, Executive Director of American Federation of State, County and Municipal Employees, DC37. “Right now the federal government is stepping away from enforcing consumer protection laws that protect everyday people. I applaud Attorney General James, Senator Comrie, and Assemblymember Lasher for advancing this legislation to protect working families, small businesses, seniors, and much more. Let’s pass the FAIR Business Practices Act by the end of this session.”

    “AARP New York thanks Attorney General James, Senator Comrie, and Assemblymember Lasher for their leadership on this legislation,” said Kristen McManus, Senior Associate State Director for Advocacy for AARP New York. “Scammers are targeting older adults more than ever, with the FBI reporting that New Yorkers 60 and older lost more than $254 million to fraud in 2024, a more than $50 million increase from the previous year. Now is the time for the Governor and legislature to step up for all New Yorkers by establishing a consumer protection law that will foil scammers and discourage con artists from targeting some of the most vulnerable among us.” 

    “Where New York was once a leader in protecting small businesses from bad loans, our neighboring states have all since passed laws to stop unfair, abusive, and deceptive behavior,” said Lindsey Vigoda, New York Director of Small Business Majority. “We cannot continue to fall behind on these common-sense protections, which is why New York must pass the FAIR Business Practices Act. This legislation would shield Main Street from abusive fees that all too often place enormous strain on small businesses. With predatory lending products more prevalent today than ever, it’s time for New York to step up once again and defend our most precious asset — our small business community.” 

    “In response to the Trump administration’s gutting of federal consumer protection agencies and financial regulators, states must step up to stop big businesses from ripping off working families,” said Winston Berkman-Breen, Legal Director at the Student Borrower Protection Center. “This is especially true in New York, where abusive student loan servicers and private student loan companies take advantage of our weak consumer protections and prey on low-income households and vulnerable communities seeking to achieve financial stability through higher education. We applaud Attorney General James, Senator Comrie, and Assemblymember Lasher for meeting this moment by introducing the FAIR Business Practices Act. The bill will finally catch New York up with the rest of the country by providing commonsense and timely consumer protections for households and small businesses.”

    “The FAIR Business Practices Act strengthens New York’s core consumer protection law to ensure it is up to date and serves as an effective deterrent against wrongdoing,” said Chuck Bell, Advocacy Programs Director for Consumer Reports. “At a time when federal consumer protection initiatives are under attack, New York is stepping up to ensure consumers and small businesses will have the protections they need and deserve against financial ripoffs, fraud, and scams in the marketplace.” 

    “Every New Yorker should be able to work and invest in a prosperous future without fearing predatory lenders pulling the carpet out from under them,” said Diana Caba, Vice President for Community and Economic Development, Hispanic Federation. “It is deeply concerning how few protections consumers have in New York and how those protections are becoming even more limited because of the weakening of regulatory bodies at a national level. The FAIR Business Practices Act shows that New York is prioritizing the financial well-being of New Yorkers and catching state regulations up with the 42 other states who recognize why states must protect people’s financial future.” 

    “New York’s bedrock consumer protection law is intended to protect New Yorkers from new and evolving scams across all economic activity, but in practice it has fallen short, leaving gaps where scam victims have no recourse to get their money back, while making it profitable to continue abusing people,” said Ariana Lindermayer, Senior Staff Attorney of Mobilization for Justice. “The FAIR Business Practices Act would close these gaps and catch New York up with the 42 states that already ban unfair business practices. Honest businesses and everyday New Yorkers will welcome real protection from predatory businesses and competitors.” 

    “The FAIR Business Practices Act should be uncontroversial,” said Matthew Parham, Director of Litigation and Advocacy at the Western New York Law Center in Buffalo. “The unfair and abusive practices that it addresses are already illegal. It just does what most states have done for decades: lets individual consumers and state regulators enforce these rights, instead of relying on the federal government. This is vitally important now, when the federal government is completely abdicating its responsibility to protect consumers from scams and ripoffs.” 

    MIL OSI USA News

  • MIL-OSI Video: FBI Search Targets Darknet Drug Networks

    Source: Federal Bureau of Investigation (FBI) (video statements)

    An FBI-led search in Los Angeles in April was related to Operation RapTor, a global effort to disrupt fentanyl and opioid trafficking on the darknet. The operation–part of the U.S. Department of Justice’s Joint Criminal Opioid and Darknet Enforcement (JCODE)–included operations by law enforcement partners in Europe, South America, Asia, and the United States.

    More at: www.fbi.gov/news/stories/global-operation-targets-darknet-drug-trafficking
    —————————————————
    Subscribe to Inside the FBI wherever you get your podcasts:
    Spotify: https://open.spotify.com/show/4H2d3cg…
    Apple Podcasts: https://podcasts.apple.com/us/podcast…
    Google Podcasts: https://podcasts.google.com/feed/aHR0…
    More ways to follow us: https://inside-the-fbi.transistor.fm/…

    Follow us on social media:
    X: https://twitter.com/fbi
    Facebook: https://facebook.com/FBI
    Instagram: https://instagram.com/fbi
    YouTube: youtube.com/user/fbi

    https://www.youtube.com/watch?v=T10brrj8kPg

    MIL OSI Video

  • MIL-OSI Video: What Makes Darknet Marketplaces So Dangerous

    Source: Federal Bureau of Investigation (FBI) (video statements)

    An analyst in the FBI’s High-Tech Organized Crime Unit describes how the ease of using Darknet marketplaces is part of what makes them so dangerous. The unit manages the FBI’s Joint Criminal Opioid and Darknet Enforcement (JCODE) team, part of a global effort to disrupt fentanyl and opioid trafficking on the Darknet.

    —————————————————
    Subscribe to Inside the FBI wherever you get your podcasts:
    Spotify: https://open.spotify.com/show/4H2d3cg…
    Apple Podcasts: https://podcasts.apple.com/us/podcast…
    Google Podcasts: https://podcasts.google.com/feed/aHR0…
    More ways to follow us: https://inside-the-fbi.transistor.fm/…

    Follow us on social media:
    X: https://twitter.com/fbi
    Facebook: https://facebook.com/FBI
    Instagram: https://instagram.com/fbi
    YouTube: youtube.com/user/fbi

    https://www.youtube.com/watch?v=rpCpB4_YFow

    MIL OSI Video

  • MIL-OSI Video: Parents of Overdose Victim Describe Darknet Dangers

    Source: Federal Bureau of Investigation (FBI) (video statements)

    David and Penny Churchill shared their son Reed’s story hoping to prevent others from the dangers of purchasing drugs on the darknet or taking pills that are not prescribed from the pharmacy. 

    More at: www.fbi.gov/news/stories/global-operation-targets-darknet-drug-trafficking

    —————————————————
    Subscribe to Inside the FBI wherever you get your podcasts:
    Spotify: https://open.spotify.com/show/4H2d3cg…
    Apple Podcasts: https://podcasts.apple.com/us/podcast…
    Google Podcasts: https://podcasts.google.com/feed/aHR0…
    More ways to follow us: https://inside-the-fbi.transistor.fm/…

    Follow us on social media:
    X: https://twitter.com/fbi
    Facebook: https://facebook.com/FBI
    Instagram: https://instagram.com/fbi
    YouTube: youtube.com/user/fbi

    https://www.youtube.com/watch?v=N68jdFOJqNw

    MIL OSI Video

  • MIL-OSI USA: ICE, Europol, law enforcement partners, dismantle major illicit drug networks in global Darknet crackdown

    Source: US Immigration and Customs Enforcement

    WASHINGTON — U.S. Immigration and Customs Enforcement, in collaboration with Europol, the Joint Criminal Opioid and Darknet Enforcement Team, and various national and international partners, announced the results of Operation RapTOR May 22. This historic takedown, led by Europol, resulted in the highest number of seizures in JCODE’s history.

    The seizures, to which ICE Homeland Security Investigations significantly contributed, include more than $200 million in currency and digital assets, over two metric tons of drugs, comprised of 144 kilograms of fentanyl or fentanyl-laced narcotics, and over 180 firearms. In addition, the United States and international law enforcement partners made 270 arrests of dark web vendors, buyers, and administrators in Austria, Brazil, France, Germany, Netherlands, South Korea, Spain, Switzerland, United Kingdom, and the United States.

    Led by Europol’s European Cyber Crime Centre Operation RapTOR united the FBI-led JCODE team — comprised of ICE HSI and law enforcement partners from the United States, Europe, South America, and Asia — to disrupt fentanyl and opioid trafficking, as well as sale of other illicit goods and services on the Darknet. Building on the successes of prior years’ operations, Operation RapTOR furthered global efforts to dismantle darknet marketplaces, resulting in the seizure of darknet infrastructure from Nemesis, Tor2Door, Bohemia, and Kingdom Markets. These actions provided investigators across the globe with invaluable leads and evidence, strengthening the ongoing fight against cybercrime and illicit activities on the darknet.

    “This record-breaking operation sends a clear message to every trafficker hiding behind a screen — your anonymity ends where our global reach begins,” said ICE acting Director Todd Lyons. “Thanks to the unwavering efforts by ICE HSI, Europol and our international partners, we’re cracking the code of the so-called ‘safe spaces’ for cybercriminals — they are in our sights and we’re not backing down.”

    The Head of Europol’s European Cybercrime Centre, Edvardas Šileris, commented: “Operation RapTor shows that the dark web is not beyond the reach of law enforcement. Through close cooperation and intelligence sharing, officers across three continents identified and arrested suspects, sending a clear message to those who think they can hide in the shadows. Europol will continue working with our partners to make the internet safer for everyone.”

    In furtherance of Operation RapTOR and in their first action as a JCODE member agency, the Office of Foreign Assets Control (OFAC) additionally sanctioned Behrouz Parsarad, an Iranian national, for his role as the founder and operator of Nemesis Market following seizure of the market.

    “This historic international seizure of firearms, deadly drugs, and illegal funds will save lives,” said Attorney General Pam Bondi. “Criminals cannot hide behind computer screens or seek refuge on the dark web — this Justice Department will identify and eliminate threats to the American people regardless of where they originate.”

    “By cowardly hiding online, these traffickers have wreaked havoc across our country and directly fueled the fentanyl crisis and gun violence impacting our American communities and neighborhoods. But the ease and accessibility of their crimes ends today,” said FBI Director Kash Patel. “The FBI could not do this work without our partners both at home and abroad, and the staggering success of this year’s record-breaking amount of fentanyl, guns, and drugs seized prove that our efforts are working. Anyone looking to anonymously harm our citizens through illicit darknet trafficking: your days of recklessness are numbered.”

    “These predators who peddled poison on the dark web might have thought they are untouchable — hiding behind screens, pushing fentanyl, fueling overdoses, and cashing in on misery. However, Operation RapTor just proved them wrong,” said DEA acting Administrator Robert Murphy. “DEA and our global partners reached across borders, across platforms, and across currencies to rip their networks apart. Let this stand as a warning: no mask, no marketplace, and no digital wallet can hide you from facing justice.”

    “This unprecedented operation is a testament to the power of global partnership and the unwavering dedication of our team,” said Chief Guy Ficco of IRS Criminal Investigation (IRS-CI). “Working through the JCODE initiative, IRS Criminal Investigation and our international partners led the largest and most impactful takedown to date — seizing over $200 million in assets, removing deadly drugs and weapons from circulation, and holding more than 270 individuals accountable. This critical strike against dark web networks fueling the fentanyl crisis marks a proud moment in our ongoing effort to protect communities worldwide.”

    “Operation RapTor shows what’s possible when the U.S. Postal Inspection Service and our partners around the world stand united. No matter where criminals hide, we will find them, dismantle their operations, and bring them to justice. This operation was about protecting innocent people from predatory criminals who profit from violence, addiction, and fear. Our commitment is unwavering,” said Chief Postal Inspector Gary Barksdale, United States Postal Inspection Service.

    “The FDA is committed to continuing its work to disrupt and dismantle the illegal sales of drugs on the dark web, where such sales far too often have tragic consequences,” said Chad Menster, Deputy Director of the Food and Drug Administration’s Office of Criminal Investigations (FDA OCI). “We will continue to monitor, investigate and bring to justice those who misuse the internet in a quest for profits with reckless disregard for the risk to public health and safety.”  

    The impact of Operation RapTOR builds on years-long legacy of dark web enforcement and the tireless work of HSI and our U.S. and international law enforcement partners, as seen in the following cases:

    • “Incognito Market” Owner Pleads Guilty For Operating One Of The Largest Illegal Narcotics Marketplaces On The Internet
      • Incognito Market sold more than $100 million of narcotics — including hundreds of kilograms of cocaine and methamphetamine as well as heroin, cocaine, LSD, MDMA, oxycodone, methamphetamine, ketamine, and alprazolam, and misbranded prescription medication. Incognito Market was available globally to anyone with internet access and was designed to foster seamless narcotics transactions across the world. It incorporated many features of legitimate e-commerce sites such as branding, advertising, and customer service. While concealing their identities users were able to search thousands of listings for narcotics of their choice. Prescription medication was also listed that was advertised as being authentic but was not, as seen in November 2023, when an undercover federal agent purchased and received several tablets that purported to be oxycodone, but were in fact, fentanyl pills.
    • Central District of California | Two Southern California Men Who Supplied Fentanyl Sold to Darknet Customers in All 50 States Sentenced to Federal Prison | United States Department of Justice
      • Ruiz of Orange County was sentenced to over 17 years in federal prison, and Omar Navia of South Los Angeles was separately sentenced to 15 years in federal prison in January 2025 for supplying fentanyl-laced pills to a drug trafficking ring that sold these drugs to more than 1,000 customers nationwide via the Darknet Navia and Ruiz admitted that at least August 2021 to December 2022, they supplied fentanyl-laced pills to Michael Ta, 26, of Westminster, and Rajiv Srinivasan, 38, of Houston, who used the Darknet and encrypted messaging applications to sell more than 120,000 fentanyl-laced pills, 20 pounds of methamphetamine, and other drugs directly to more than 1,000 customers in all 50 states, causing several fatal overdoses in the process.
    • In February 2024, the Eastern District of Virginia issued a criminal complaint charging Joshua Vasquez, Joseph Vasquez, and Rafael Roman with conspiracy to distribute 500 grams or more of methamphetamine.
      • Joshua Vasquez, Joseph Vasquez, and Rafael Roman conspired to sell counterfeit Adderall containing methamphetamine on darknet markets such as Bohemia and Tor2Door. The defendants allegedly sold drugs on darknet marketplaces in exchange for cryptocurrency. Collectively, these prolific darknet vendors were responsible fulfilling over 13 thousand drug orders shipped throughout the United States, ranging in size from user quantities, e.g., 5 pills, to “reseller” quantities, e.g., 10 thousand pills. While executing search warrants in New Jersey and New York, Federal Law Enforcement officers seized more than $330 thousand, close to 80 thousand counterfeit Adderall pills, one firearm, and two industrial pill press machines. FBI, FDA, and USPIS investigated this matter with significant contributions from HSI and our law enforcement partners.
    • Van Nuys Man Sentenced to More Than 20 Years in Prison for Trafficking Fentanyl and Cocaine via Darknet Marketplaces and Possessing Guns
      • A San Fernando Valley man was sentenced to 20 plus years in federal prison for using darknet marketplaces to sell hundreds of thousands of dollars’ worth of fentanyl-laced pills and cocaine to buyers nationwide. He admitted in court documents to causing one fatal fentanyl overdose. From at least April 2021 to May 2023, McDonald and others conspired to sell fentanyl and cocaine via multiple darknet marketplaces. Specifically, McDonald purchased bulk quantities of fentanyl and cocaine and then directed the activities of other coconspirators to carry out hundreds of drug sales involving the distribution of large quantities of both fentanyl and cocaine, including hundreds of thousands of fentanyl-laced pills. The FBI and the DEA investigated this matter as part of JCODE.

    “Cybercriminals think the Darknet makes them untouchable — we just proved they’re dead wrong,” said ICE HSI acting Executive Associate Director Robert Hammer. “HSI is on the front lines of a digital battlefield, deploying cutting-edge tech, relentless enforcement, and global coordination to hunt down these predators. Cybercrime is a global threat, and that’s why we’re committed to working hand-in-hand with our partners at Europol and across the world to dismantle these networks together. If you profit from pain online, we’re looking for you — and you’ll soon learn that no corner of the internet is beyond our reach.”

    Operation RapTOR includes law enforcement actions taken by JCODE member agencies, to include ICE HSI; the DEA; FBI; FDA-OCI; IRS-CI; and USPIS; in addition to foreign partners listed below. Credible reporting from the referenced agencies, in addition to contributions from ATF; Army CID; CBP; Department of Treasury’s FinCEN and Office of Foreign Assets Control; and NCIS enabled domestic law enforcement actions in support of Operation RapTOR. Local, state, and other federal agencies also contributed to investigations through task force participation and regional partnerships. The investigations leading to Operation RapTOR were significantly aided by support and coordination from the Justice Department Criminal Division’s Narcotic and Dangerous Drug Section and Computer Crime and Intellectual Property Section, with additional support from the Organized Crime Drug Enforcement Task Forces; multi-agency Special Operations Division; Money Laundering and Asset Recovery Section’s Digital Currency Initiative, and Fraud Section; the Justice Department’s Office of International Affairs; Europol and its Dark Web team; and international partners.

    The international partners include Europol; Eurojust; Austria’s Criminal Intelligence Service with various Provincial Criminal Police Departments (Bundeskriminalamt und Landeskriminalämter); Brazil’s Civil Police of the State of Pará (Polícia Civil do Estado do Pará) and Civil Police of the State of São Paulo (Polícia Civil do Estado do São Paulo); France’s French Customs (Douane), National Gendarmerie (Gendarmerie Nationale); Germany‘s Federal Criminal Police Office (Bundeskriminalamt), Prosecutor’s Office in Cologne – Central Cybercrime Contact Point (Staatsanwaltschaft Köln, Zentral- und Ansprechstelle Cybercrime), Central Criminal Investigation in Oldenburg (Zentrale Kriminalinspektion Oldenburg) various police departments (Dienststellen der Länderpolizeien), German Customs Investigation (Zollfahndungsämter); The Netherlands’s National Police (Politie), Post Interventie Team; Spain’s National Police (Policía Nacional); South Korea’s Seoul Central District Prosecutors’ Office – Darknet Investigations Unit; Switzerland’s Zurich Cantonal Police (Kantonspolizei Zürich) and Public Prosecutor’s Office II of the Canton of Zurich (Staatsanwaltschaft II); and the United Kingdom’s National Crime Agency, National Police Chiefs’ Council.

    HSI is a worldwide law enforcement leader in Darknet and other cyber-related criminal investigations. The DHS Cyber Crimes Center (C3) combats cybercrime, online child sexual exploitation, and criminal exploitation of the internet with state-of-the-art forensic technology. The Center investigates large-scale cybercrime threats and provides expertise on cybercrime investigations to the field. It also uses global law enforcement networks, like Europol, to combat cybercrime threats.

    C3 delivers computer and cyber-based technical services in support of HSI cases — including investigations into underground online marketplaces selling illegal drugs, weapons and other contraband; enabling the trade of images of child exploitation materials; and facilitating the theft of intellectual property, trade secrets, and export-controlled technology and data.

    Individuals across the world can report suspicious criminal activity to the ICE Tip Line 24 hours a day, seven days a week at 866-DHS-2-ICE. Highly trained specialists take reports from both the public and law enforcement agencies on more than 400 laws enforced by ICE.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI USA: Law Enforcement Seize Record Amounts of Illegal Drugs, Firearms, and Drug Trafficking Proceeds in International Operation Against Darknet Trafficking of Fentanyl and Opioids; 270 Arrested Across Four Continents

    Source: US State Government of Utah

    WASHINGTON — Today, the Attorney General and the Department of Justice’s Joint Criminal Opioid and Darknet Enforcement (JCODE) team, and international law enforcement partners announced the results of Operation RapTor, including the arrests of 270 dark web vendors, buyers, and administrators in Austria, Brazil, France, Germany, the Netherlands, South Korea, Spain, Switzerland, the United Kingdom, and the United States. Operation RapTor resulted in the highest number of seizures of any JCODE operation, including more than $200 million in currency and digital assets, over two metric tons of drugs, 144 kilograms of fentanyl or fentanyl-laced narcotics, and over 180 firearms.

    Operation RapTor was a global, coordinated effort by law enforcement in the United States, Europe, South America, and Asia to disrupt fentanyl and opioid trafficking, as well as the sales of other illicit goods and services, on the darknet, or dark web. Operation RapTor builds on the successes of prior years’ operations and takedowns of marketplaces, which resulted in the seizure of darknet infrastructure from Nemesis, Tor2Door, Bohemia, and Kingdom Markets, providing investigators across the world with investigative leads and evidence. JCODE and Europol’s European Cybercrime Centre (EC3) continue to compile intelligence packages to identify entities of interest. These leads allow U.S. and international law enforcement agencies to identify darknet drug vendors and buyers, resulting in a series of coordinated, but separate, law enforcement investigations, reflected in the statistics announced today. In furtherance of Operation RapTor and in its first action as a JCODE member agency, the Office of Foreign Assets Control (OFAC) additionally sanctioned Iranian national Behrouz Parsarad for his role as the founder and operator of Nemesis Market following seizure of the market. Parsarad was also indicted by a federal grand jury on drug trafficking charges related to the illegal business he ran on the dark web.

    “This historic international seizure of firearms, deadly drugs, and illegal funds will save lives,” said Attorney General Pam Bondi. “Criminals cannot hide behind computer screens or seek refuge on the dark web – this Justice Department will identify and eliminate threats to the American people regardless of where they originate.”

    “By cowardly hiding online, these traffickers have wreaked havoc across our country and directly fueled the fentanyl crisis and gun violence impacting our American communities and neighborhoods. But the ease and accessibility of their crimes ends today,” said FBI Director Kash Patel. “The FBI could not do this work without our partners both at home and abroad, and the staggering success of this year’s record-breaking amount of fentanyl, guns, and drugs seized prove that our efforts are working. Anyone looking to anonymously harm our citizens through illicit darknet trafficking: your days of recklessness are numbered.”

    “These predators who peddled poison on the dark web might have thought they are untouchable — hiding behind screens, pushing fentanyl, fueling overdoses, and cashing in on misery. However, Operation RapTor just proved them wrong,” said DEA Acting Administrator Robert Murphy. “DEA and our global partners reached across borders, across platforms, and across currencies to rip their networks apart. Let this stand as a warning: no mask, no marketplace, and no digital wallet can hide you from facing justice.”

    “Operation RapTor shows that the dark web is not beyond the reach of law enforcement,” said Head of Europol’s European Cybercrime Centre, Edvardas Šileris. “Through close cooperation and intelligence sharing, officers across three continents identified and arrested suspects, sending a clear message to those who think they can hide in the shadows. Europol will continue working with our partners to make the internet safer for everyone.”

    “This unprecedented operation is a testament to the power of global partnership and the unwavering dedication of our team,” said Chief Guy Ficco of IRS Criminal Investigation (IRS-CI). “Working through the JCODE initiative, IRS Criminal Investigation and our international partners led the largest and most impactful takedown to date—seizing over $200 million in assets, removing deadly drugs and weapons from circulation, and holding more than 270 individuals accountable. This critical strike against dark web networks fueling the fentanyl crisis marks a proud moment in our ongoing effort to protect communities worldwide.”

    “This record-breaking operation sends a clear message to every trafficker hiding behind a screen—your anonymity ends where our global reach begins,” said Acting Director Todd Lyons of U.S. Immigration and Customs Enforcement (ICE). “Thanks to the unwavering efforts by ICE’s Homeland Security Investigations (HSI), Europol and our international partners, we’re cracking the code of the so-called ‘safe spaces’ for cybercriminals—they are in our sights and we’re not backing down.”

    “Operation RapTor shows what’s possible when the U.S. Postal Inspection Service and our partners around the world stand united,” said Chief Postal Inspector Gary Barksdale of the United States Postal Inspection Service. “No matter where criminals hide, we will find them, dismantle their operations, and bring them to justice. This operation was about protecting innocent people from predatory criminals who profit from violence, addiction, and fear. Our commitment is unwavering.”

    “The FDA is committed to continuing its work to disrupt and dismantle the illegal sales of drugs on the dark web, where such sales far too often have tragic consequences,” said Deputy Director Chad Menster of the Food and Drug Administration’s Office of Criminal Investigations (FDA OCI). “We will continue to monitor, investigate and bring to justice those who misuse the internet in a quest for profits with reckless disregard for the risk to public health and safety.”  

    The impact of Operation RapTor can be attributed to the tireless work of U.S. and international law enforcement partners. For example:

    On Dec. 16, 2024, Rui-Siang Lin pleaded guilty to charges brought by the U.S. Attorney’s Office for the Southern District of New York of narcotics conspiracy, money laundering, and conspiracy to sell adulterated and misbranded medication for owning and operating Incognito Market, one of the largest narcotics marketplaces on the internet.

    According to court documents and statements made in court, Incognito Market was an online narcotics bazaar that started on the dark web in October 2020. Until it shut down in March 2024, Incognito Market sold more than $100 million of narcotics—including hundreds of kilograms of cocaine and methamphetamine. Incognito Market was available globally to anyone with internet access using the Tor web browser on the “dark web” or “darknet.” Incognito Market was designed to facilitate seamless narcotics transactions, incorporating many features of legitimate e-commerce sites such as branding, advertising, and customer service. Upon visiting the site, users were met by a splash page and graphic interface, which is pictured below:

    Figure 1: Incognito Market homepage

    While concealing their identities with a unique username or “moniker,” users were able to search thousands of listings for narcotics of their choice. Incognito Market sold illegal narcotics including heroin, cocaine, LSD, MDMA, oxycodone, methamphetamine, ketamine, and alprazolam, as well as misbranded prescription medication. An example of listings on Incognito market is below:

    Figure 2: Listings for various drugs on the Incognito Market.

    Listings included offerings of prescription medication that was falsely advertised as being authentic. For example, in November 2023, while operating in an undercover capacity on Incognito Market, a law enforcement agent purchased and received several tablets purported to be oxycodone. Testing revealed that these tablets were not oxycodone and were, in fact, fentanyl pills.

    The FBI, HSI, DEA, FDA OCI, and the New York Police Department investigated the case.

    In a second example, in January 2025, the U.S. Attorney’s Office for the Central District of California secured a 17-year sentence for Adan Ruiz, of Orange County, and a 15-year sentence for Omar Navia, of Los Angeles, for supplying fentanyl-laced pills to a drug trafficking ring that sold these drugs to more than 1,000 customers nationwide via the darknet. In imposing the sentences, U.S. District Judge David O. Carter called this case “the most sophisticated fentanyl distribution ring that this court has seen.”

    Navia and Ruiz admitted in their plea agreements that, from at least August 2021 to December 2022, they supplied fentanyl-laced pills to Michael Ta, 26, of Westminster, and Rajiv Srinivasan, 38, of Houston, who used the darknet and encrypted messaging applications to sell more than 120,000 fentanyl-laced pills, 20 pounds of methamphetamine, and other drugs directly to more than 1,000 customers in all 50 states, causing several fatal overdoses.

    According to court documents and statements made in court, Srinivasan and Ta used the “redlightlabs” darknet account to advertise and sell counterfeit M30 oxycodone pills containing fentanyl and other illicit drugs. Srinivasan also used the encrypted messaging application Wickr to communicate with and sell drugs to customers. Srinivasan received virtual currency as payment for the drugs and then routed that virtual currency through cryptocurrency exchanges.

    The court record also shows that Ta communicated with Srinivasan about drug orders, obtained fentanyl-laced pills and methamphetamine from sources of supply, stored those drugs in his residence, and mailed out packages with drugs to customers who had ordered them from Srinivasan on the “redlightlabs” account.

    Ta and Srinivasan admitted in their plea agreements to causing the fentanyl overdose deaths of three victims. Both defendants further admitted to distributing fentanyl-laced pills to two additional victims, both of whom suffered fatal drug overdoses shortly after they received the pills from Ta and Srinivasan. Prosecutors wrote in a sentencing memorandum, “The five victims of defendants’ crimes ranged in age from 19 to 51. They lived across the country, from California to Florida, Colorado to Arkansas. Each of the five victims leaves behind a family that has been forever and fundamentally changed by defendants’ actions. [Ta and Srinivasan] also victimized countless others as part of an epidemic of addiction and despair plaguing our district and our country.”

    The FBI investigated this case, with substantial assistance from the U.S. Postal Inspection Service (USPIS), the DEA’s Fayetteville Resident Office, and the Northern Colorado Drug Task Force.

    In a third example, in February 2024, the U.S. Attorney’s Office for the Eastern District of Virginia charged Joshua Vasquez, Joseph Vasquez, and Rafael Roman by criminal complaint with conspiracy to distribute 500 grams or more of methamphetamine. Joshua Vasquez, Joseph Vasquez, and Roman conspired to sell counterfeit Adderall containing methamphetamine on darknet markets such as Bohemia and Tor2Door. The defendants allegedly sold drugs on darknet marketplaces in exchange for cryptocurrency under the monikers “NuveoDelux,” “Mrjohnson,” and “AllStateRx.”

    According to court documents and statements made in court, these three prolific darknet vendors were collectively responsible for fulfilling over 13,000 drug orders shipped throughout the United States, ranging in size from user quantities, e.g., 5 pills, to “reseller” quantities, e.g., 10,000 pills. Joshua and Joseph Vasquez collectively ran the NuveoDeluxe and AllStateRx accounts. A fourth co-conspirator, Gregory Castillo-Rosario, who was arrested in October 2024, ran the Mrjohnson account. Roman assisted his co-conspirators by pressing counterfeit Adderall pills, packaging them, and distributing drug orders into the mail using the U.S. Postal Service. The conspiracy also laundered funds associated with darknet drug proceeds.

    While executing search warrants in New Jersey and New York, federal law enforcement officers seized more than $330,000, close to 80,000 counterfeit Adderall pills, one firearm, and two industrial pill press machines. Additionally, two vehicles and several pieces of property were seized during the search warrants. An additional 30 kilograms of suspected counterfeit Adderall pills were seized on May 2, 2024, in New York. Photographs of some of the seized items are below: 

    Figure 3: Counterfeit Adderall pills laced with methamphetamine stored in 5-gallon buckets

    Figure 4: Bags ready to be shipped to customers nationwide.

    Figure 5: Illegal pill press machines used by drug traffickers to make counterfeit pharmaceutical pills.

    Figure 6: Trash bags full of counterfeit Adderall pills laced with methamphetamine.

    Joshua Vasquez pleaded guilty on April 24, 2024, and was sentenced on July 25, 2024, to 12 years in prison. Joseph Vasquez pleaded guilty on April 15, 2024, and was sentenced on Aug. 8, 2024, to 10 years in prison. Roman pleaded guilty on May 30, 2024, and was sentenced on Nov. 14, 2024, to 10 years in prison. They all pleaded guilty to conspiracy to create a counterfeit substance and distribute 500 grams or more of a mixture and substance containing methamphetamine.

    The FBI, FDA, and USPIS investigated this matter with significant contributions from DEA, HSI, the Ocean County Sheriff’s Office, the Howell Township Police Department, the Lakewood Township Police Department, the Orlando Police Department, the Orange County Sheriff’s Office, the Arlington County Police Department, and the New York Police Department.

    In a fourth example, a San Fernando Valley man, Brian McDonald, 23, was sentenced to more than 20 years in federal prison in the Central District of California for using darknet marketplaces to sell hundreds of thousands of dollars’ worth of fentanyl-laced pills and cocaine to buyers nationwide. He admitted in court documents to causing one fatal fentanyl overdose.

    From at least April 2021 until May 2023, McDonald and others conspired to sell fentanyl and cocaine via multiple darknet marketplaces. McDonald operated under the monikers “Malachai Johnson,” “SouthSideOxy,” and “JefeDeMichoacan.” McDonald created, monitored, and maintained the darknet vendor profiles, including by updating drug listings and shipment options, tracking drug orders, and offloading Monero cryptocurrency received as drug deal payments into cryptocurrency wallets that McDonald controlled.

    McDonald recruited and hired accomplices to help package and ship the narcotics they sold on the darknet. McDonald directed and helped these accomplices package and ship the narcotics. McDonald purchased bulk quantities of fentanyl and cocaine and then directed others to complete hundreds of drug sales involving large quantities of both fentanyl and cocaine.

    The FBI and DEA investigated this matter.

    Operation RapTor involves law enforcement actions taken by JCODE member agencies, including the DEA, FBI, FDA OCI, HSI, IRS-CI, and USPIS. Credible reporting from the referenced agencies, in addition to contributions from ATF, Army Criminal Investigation Division, Customs and Border Protection, the Treasury Department’s Financial Crimes Enforcement Network (FinCEN) and OFAC, and Naval Criminal Investigative Service, enabled domestic law enforcement actions in support of Operation RapTor. State, local, and other federal agencies also contributed to Operation RapTor investigations through task force participation and regional partnerships, as well as the multi-agency Special Operations Division.

    The investigations leading to Operation RapTor were significantly aided by support and coordination from the Criminal Division’s Narcotic and Dangerous Drug Section and Computer Crime and Intellectual Property Section, with valuable assistance from the Criminal Division’s Money Laundering and Asset Recovery Section, Fraud Section, and Office of International Affairs.

    Key international partners include Europol; Eurojust; Austria’s Criminal Intelligence Service with various Provincial Criminal Police Departments (Bundeskriminalamt und Landeskriminalämter); Brazil’s Civil Police of the State of Pará (Polícia Civil do Estado do Pará) and Civil Police of the State of São Paulo (Polícia Civil do Estado do São Paulo); France’s French Customs (Douane), National Gendarmerie (Gendarmerie Nationale); Germany’s Federal Criminal Police Office (Bundeskriminalamt), Prosecutor’s Office in Cologne – Central Cybercrime Contact Point (Staatsanwaltschaft Köln, Zentral- und Ansprechstelle Cybercrime), Central Criminal Investigation in Oldenburg (Zentrale Kriminalinspektion Oldenburg) various police departments (Dienststellen der Länderpolizeien), and German Customs Investigation (Zollfahndungsämter); the Netherlands’ Team High Tech Crime (National Investigations and Special Operations (NIS) and Post Interventie Team (PIT), National Intelligence, Expertise and Operational Support (NIEO);  Spain’s National Police (Policía Nacional); South Korea’s Seoul Central District Prosecutors’ Office – Darknet Investigations Unit; Switzerland’s Zurich Cantonal Police (Kantonspolizei Zürich) and Public Prosecutor’s Office II of the Canton of Zurich (Staatsanwaltschaft II); and the United Kingdom’s National Crime Agency (NCA), National Police Chiefs’ Council (NPCC).

    Federal investigations spanned the United States, and 26 United States Attorneys’ Offices are prosecuting cases, including the Central District of California, the Northern District of California, the Southern District of California, the District of Colorado, the District of Connecticut, the District of Columbia, the Middle District of Florida, the Southern District of Florida, the Middle District of Georgia, the District of Hawaii, the Northern District of Illinois, the Southern District of Indiana, the Eastern District of Kentucky, the District of Massachusetts, the Eastern District of Michigan, the Western District of Michigan, the Eastern District of Missouri, the District of New Jersey, the Southern District of New York, the District of North Dakota, the Northern District of Ohio, the Southern District of Ohio, the Northern District of Oklahoma, the Eastern District of Pennsylvania, the Eastern District of Virginia, and the Western District of Washington.

    The Justice Department established the FBI-led JCODE team to lead and coordinate government efforts to detect, disrupt, and dismantle major criminal enterprises reliant on the darknet for trafficking opioids and other illicit narcotics, along with identifying and dismantling their supply chains.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI Security: Texas Doctor Who Falsely Diagnosed Patients Sentenced to 10 Years’ Imprisonment in Connection with $118 Million in Fraudulent Health Care Claims

    Source: Federal Bureau of Investigation (FBI) State Crime News

    A Texas rheumatologist was sentenced to 10 years in prison and three years of supervised release for perpetrating a health care fraud scheme involving over $118 million in false claims and the payment of over $28 million by insurers as a result of him falsely diagnosing patients with chronic illnesses to bill for tests and treatments that the patients did not need. Jorge Zamora-Quezada M.D., 68, of Mission, also falsified patient records to support the false diagnoses after receiving a federal grand jury subpoena. Following a 25-day trial, Zamora-Quezada was convicted of one count of conspiracy to commit health care fraud, seven counts of health care fraud, and one count of conspiracy to obstruct justice. In addition to his prison term, Zamora-Quezada was ordered to forfeit $28,245,454, including 13 real estate properties, a jet, and a Maserati GranTurismo.

    According to the evidence presented at trial, Zamora-Quezada falsely diagnosed his patients with rheumatoid arthritis and administered toxic medications in order to defraud Medicare, Medicaid, TRICARE, and Blue Cross Blue Shield. The fraudulent diagnoses made the defendant’s patients believe that they had a life-long, incurable condition that required regular treatment at his offices. After falsely diagnosing his patients, Zamora-Quezada administered unnecessary treatments and ordered unnecessary testing on them, including a variety of injections, infusions, x-rays, MRIs, and other procedures—all with potentially harmful and even deadly side effects. To receive payment for these expensive services, Zamora-Quezada fabricated medical records and lied about the patients’ condition to insurers.

    “Dr. Zamora-Quezada funded his luxurious lifestyle for two decades by traumatizing his patients, abusing his employees, lying to insurers, and stealing taxpayer money,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “His depraved conduct represents a profound betrayal of trust toward vulnerable patients who depend on care and integrity from their doctors. Today’s sentence is not just a punishment—it’s a warning. Medical professionals who harm Americans for personal enrichment will be aggressively pursued and held accountable to protect our citizens and the public fisc.”

    “Through the false diagnoses and excessive false billing, Dr. Zamora-Quezada abused both patient trust and public resources,” said Special Agent in Charge Jason E. Meadows of the U.S. Department of Health and Human Services Office of Inspector General (HHS-OIG). “It is imperative to investigate and address this form of fraud — not only to protect vulnerable individuals from harm but to uphold the integrity of the federal health care system and safeguard the use of public funds.”

    “The FBI is dedicated to working with all of our partners to address health care fraud,” said Special Agent in Charge Aaron Tapp of the FBI’s San Antonio Field Office. “This case was not only a concern to us because of the financial loss — the physical and emotional harm suffered by the patients and their families was alarming and profound. We hope this significant sentence will help bring closure to the many victims in this case.”

    Evidence at trial established that Dr. Zamora-Quezada falsely diagnosed patients in order to defraud insurers and enrich himself. Other rheumatologists in the Rio Grande Valley testified at trial that they saw hundreds of patients previously diagnosed with rheumatoid arthritis by Zamora-Quezada who did not have the condition, prompting one physician to explain that for “most” it was “obvious that the patient did not have rheumatoid arthritis.” Zamora-Quezada’s false diagnoses and powerful medications caused debilitating side effects on his patients, including strokes, necrosis of the jawbone, hair loss, liver damage, and pain so severe that basic tasks of everyday life, such as bathing, cooking, and driving, became difficult. As one patient testified, “Constantly being in bed and being unable to get up from bed alone, and being pumped with medication, I didn’t feel like my life had any meaning.” One mother described how she felt that her child served as a “lab rat,” and others described abandoning plans for college or feeling like they were “living a life in the body of an elderly person.”

    Former employees detailed how Zamora-Quezada imposed strict quotas for procedures, leading to a climate of fear. Zamora-Quezada referred to himself as the “eminencia” — or eminence, threw a paperweight at an employee who failed to generate enough unnecessary procedures, hired employees he could manipulate because they were on J-1 visas and their immigration status could be jeopardized if they lost their jobs, and fired those who challenged him. Testimony also revealed Zamora-Quezada’s obstruction of insurer audits by fabricating missing patient files, including by taking ultrasounds of employees and using those images as documentation in the patient records. Testimony at trial established that Zamora-Quezada told employees to “aparecer” the missing records — “to make them appear.” Former employees also recounted being sent to a dilapidated barn to attempt to retrieve records. There, files were saturated with feces and urine, rodents, and termites that infested not only the records but also the structure.

    Zamora-Quezada’s patient file storage facility

    Zamora-Quezada used proceeds from his crimes to fund a lavish lifestyle, replete with real estate properties across the country and in Mexico, a jet, and a Maserati.

    One of Zamora-Quezada’s luxury properties

    Zamora-Quezada’s jet

    FBI, HHS-OIG, Texas HHS-OIG, and the Texas Medicaid Fraud Control Unit investigated the case, with assistance from the Defense Criminal Investigative Service.

    Principal Assistant Chief Jacob Foster and Assistant Chiefs Rebecca Yuan and Emily Gurskis of the Criminal Division’s Fraud Section and Assistant U.S. Attorney Laura Garcia for the Southern District of Texas prosecuted the case. Assistant U.S. Attorney Kristine Rollinson handled asset forfeiture. Fraud Section Assistant Chief Kevin Lowell initially handled the prosecution. The prosecution team thanks the Fraud Section’s Data Analytics Team, whose work initiated the investigation, Victim Witness Specialist Olga De La Rosa of the U.S. Attorney’s Office for the Southern District of Texas, and the Texas Department of Insurance.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Force Program. Since March 2007, this program, currently comprised of nine strike forces operating in 27 federal districts, has charged more than 5,800 defendants who collectively have billed federal health care programs and private insurers more than $30 billion. In addition, the Centers for Medicare & Medicaid Services, working in conjunction with HHS-OIG, are taking steps to hold providers accountable for their involvement in health care fraud schemes. More information can be found at www.justice.gov/criminal-fraud/health-care-fraud-unit.

    MIL Security OSI

  • MIL-OSI Security: Law Enforcement Seize Record Amounts of Illegal Drugs, Firearms, and Drug Trafficking Proceeds in International Operation Against Darknet Trafficking of Fentanyl and Opioids; 270 Arrested Across Four Continents

    Source: United States Attorneys General 13

    WASHINGTON — Today, the Attorney General and the Department of Justice’s Joint Criminal Opioid and Darknet Enforcement (JCODE) team, and international law enforcement partners announced the results of Operation RapTor, including the arrests of 270 dark web vendors, buyers, and administrators in Austria, Brazil, France, Germany, the Netherlands, South Korea, Spain, Switzerland, the United Kingdom, and the United States. Operation RapTor resulted in the highest number of seizures of any JCODE operation, including more than $200 million in currency and digital assets, over two metric tons of drugs, 144 kilograms of fentanyl or fentanyl-laced narcotics, and over 180 firearms.

    Operation RapTor was a global, coordinated effort by law enforcement in the United States, Europe, South America, and Asia to disrupt fentanyl and opioid trafficking, as well as the sales of other illicit goods and services, on the darknet, or dark web. Operation RapTor builds on the successes of prior years’ operations and takedowns of marketplaces, which resulted in the seizure of darknet infrastructure from Nemesis, Tor2Door, Bohemia, and Kingdom Markets, providing investigators across the world with investigative leads and evidence. JCODE and Europol’s European Cybercrime Centre (EC3) continue to compile intelligence packages to identify entities of interest. These leads allow U.S. and international law enforcement agencies to identify darknet drug vendors and buyers, resulting in a series of coordinated, but separate, law enforcement investigations, reflected in the statistics announced today. In furtherance of Operation RapTor and in its first action as a JCODE member agency, the Office of Foreign Assets Control (OFAC) additionally sanctioned Iranian national Behrouz Parsarad for his role as the founder and operator of Nemesis Market following seizure of the market. Parsarad was also indicted by a federal grand jury on drug trafficking charges related to the illegal business he ran on the dark web.

    “This historic international seizure of firearms, deadly drugs, and illegal funds will save lives,” said Attorney General Pam Bondi. “Criminals cannot hide behind computer screens or seek refuge on the dark web – this Justice Department will identify and eliminate threats to the American people regardless of where they originate.”

    “By cowardly hiding online, these traffickers have wreaked havoc across our country and directly fueled the fentanyl crisis and gun violence impacting our American communities and neighborhoods. But the ease and accessibility of their crimes ends today,” said FBI Director Kash Patel. “The FBI could not do this work without our partners both at home and abroad, and the staggering success of this year’s record-breaking amount of fentanyl, guns, and drugs seized prove that our efforts are working. Anyone looking to anonymously harm our citizens through illicit darknet trafficking: your days of recklessness are numbered.”

    “These predators who peddled poison on the dark web might have thought they are untouchable — hiding behind screens, pushing fentanyl, fueling overdoses, and cashing in on misery. However, Operation RapTor just proved them wrong,” said DEA Acting Administrator Robert Murphy. “DEA and our global partners reached across borders, across platforms, and across currencies to rip their networks apart. Let this stand as a warning: no mask, no marketplace, and no digital wallet can hide you from facing justice.”

    “Operation RapTor shows that the dark web is not beyond the reach of law enforcement,” said Head of Europol’s European Cybercrime Centre, Edvardas Šileris. “Through close cooperation and intelligence sharing, officers across three continents identified and arrested suspects, sending a clear message to those who think they can hide in the shadows. Europol will continue working with our partners to make the internet safer for everyone.”

    “This unprecedented operation is a testament to the power of global partnership and the unwavering dedication of our team,” said Chief Guy Ficco of IRS Criminal Investigation (IRS-CI). “Working through the JCODE initiative, IRS Criminal Investigation and our international partners led the largest and most impactful takedown to date—seizing over $200 million in assets, removing deadly drugs and weapons from circulation, and holding more than 270 individuals accountable. This critical strike against dark web networks fueling the fentanyl crisis marks a proud moment in our ongoing effort to protect communities worldwide.”

    “This record-breaking operation sends a clear message to every trafficker hiding behind a screen—your anonymity ends where our global reach begins,” said Acting Director Todd Lyons of U.S. Immigration and Customs Enforcement (ICE). “Thanks to the unwavering efforts by ICE’s Homeland Security Investigations (HSI), Europol and our international partners, we’re cracking the code of the so-called ‘safe spaces’ for cybercriminals—they are in our sights and we’re not backing down.”

    “Operation RapTor shows what’s possible when the U.S. Postal Inspection Service and our partners around the world stand united,” said Chief Postal Inspector Gary Barksdale of the United States Postal Inspection Service. “No matter where criminals hide, we will find them, dismantle their operations, and bring them to justice. This operation was about protecting innocent people from predatory criminals who profit from violence, addiction, and fear. Our commitment is unwavering.”

    “The FDA is committed to continuing its work to disrupt and dismantle the illegal sales of drugs on the dark web, where such sales far too often have tragic consequences,” said Deputy Director Chad Menster of the Food and Drug Administration’s Office of Criminal Investigations (FDA OCI). “We will continue to monitor, investigate and bring to justice those who misuse the internet in a quest for profits with reckless disregard for the risk to public health and safety.”  

    The impact of Operation RapTor can be attributed to the tireless work of U.S. and international law enforcement partners. For example:

    On Dec. 16, 2024, Rui-Siang Lin pleaded guilty to charges brought by the U.S. Attorney’s Office for the Southern District of New York of narcotics conspiracy, money laundering, and conspiracy to sell adulterated and misbranded medication for owning and operating Incognito Market, one of the largest narcotics marketplaces on the internet.

    According to court documents and statements made in court, Incognito Market was an online narcotics bazaar that started on the dark web in October 2020. Until it shut down in March 2024, Incognito Market sold more than $100 million of narcotics—including hundreds of kilograms of cocaine and methamphetamine. Incognito Market was available globally to anyone with internet access using the Tor web browser on the “dark web” or “darknet.” Incognito Market was designed to facilitate seamless narcotics transactions, incorporating many features of legitimate e-commerce sites such as branding, advertising, and customer service. Upon visiting the site, users were met by a splash page and graphic interface, which is pictured below:

    Figure 1: Incognito Market homepage

    While concealing their identities with a unique username or “moniker,” users were able to search thousands of listings for narcotics of their choice. Incognito Market sold illegal narcotics including heroin, cocaine, LSD, MDMA, oxycodone, methamphetamine, ketamine, and alprazolam, as well as misbranded prescription medication. An example of listings on Incognito market is below:

    Figure 2: Listings for various drugs on the Incognito Market.

    Listings included offerings of prescription medication that was falsely advertised as being authentic. For example, in November 2023, while operating in an undercover capacity on Incognito Market, a law enforcement agent purchased and received several tablets purported to be oxycodone. Testing revealed that these tablets were not oxycodone and were, in fact, fentanyl pills.

    The FBI, HSI, DEA, FDA OCI, and the New York Police Department investigated the case.

    In a second example, in January 2025, the U.S. Attorney’s Office for the Central District of California secured a 17-year sentence for Adan Ruiz, of Orange County, and a 15-year sentence for Omar Navia, of Los Angeles, for supplying fentanyl-laced pills to a drug trafficking ring that sold these drugs to more than 1,000 customers nationwide via the darknet. In imposing the sentences, U.S. District Judge David O. Carter called this case “the most sophisticated fentanyl distribution ring that this court has seen.”

    Navia and Ruiz admitted in their plea agreements that, from at least August 2021 to December 2022, they supplied fentanyl-laced pills to Michael Ta, 26, of Westminster, and Rajiv Srinivasan, 38, of Houston, who used the darknet and encrypted messaging applications to sell more than 120,000 fentanyl-laced pills, 20 pounds of methamphetamine, and other drugs directly to more than 1,000 customers in all 50 states, causing several fatal overdoses.

    According to court documents and statements made in court, Srinivasan and Ta used the “redlightlabs” darknet account to advertise and sell counterfeit M30 oxycodone pills containing fentanyl and other illicit drugs. Srinivasan also used the encrypted messaging application Wickr to communicate with and sell drugs to customers. Srinivasan received virtual currency as payment for the drugs and then routed that virtual currency through cryptocurrency exchanges.

    The court record also shows that Ta communicated with Srinivasan about drug orders, obtained fentanyl-laced pills and methamphetamine from sources of supply, stored those drugs in his residence, and mailed out packages with drugs to customers who had ordered them from Srinivasan on the “redlightlabs” account.

    Ta and Srinivasan admitted in their plea agreements to causing the fentanyl overdose deaths of three victims. Both defendants further admitted to distributing fentanyl-laced pills to two additional victims, both of whom suffered fatal drug overdoses shortly after they received the pills from Ta and Srinivasan. Prosecutors wrote in a sentencing memorandum, “The five victims of defendants’ crimes ranged in age from 19 to 51. They lived across the country, from California to Florida, Colorado to Arkansas. Each of the five victims leaves behind a family that has been forever and fundamentally changed by defendants’ actions. [Ta and Srinivasan] also victimized countless others as part of an epidemic of addiction and despair plaguing our district and our country.”

    The FBI investigated this case, with substantial assistance from the U.S. Postal Inspection Service (USPIS), the DEA’s Fayetteville Resident Office, and the Northern Colorado Drug Task Force.

    In a third example, in February 2024, the U.S. Attorney’s Office for the Eastern District of Virginia charged Joshua Vasquez, Joseph Vasquez, and Rafael Roman by criminal complaint with conspiracy to distribute 500 grams or more of methamphetamine. Joshua Vasquez, Joseph Vasquez, and Roman conspired to sell counterfeit Adderall containing methamphetamine on darknet markets such as Bohemia and Tor2Door. The defendants allegedly sold drugs on darknet marketplaces in exchange for cryptocurrency under the monikers “NuveoDelux,” “Mrjohnson,” and “AllStateRx.”

    According to court documents and statements made in court, these three prolific darknet vendors were collectively responsible for fulfilling over 13,000 drug orders shipped throughout the United States, ranging in size from user quantities, e.g., 5 pills, to “reseller” quantities, e.g., 10,000 pills. Joshua and Joseph Vasquez collectively ran the NuveoDeluxe and AllStateRx accounts. A fourth co-conspirator, Gregory Castillo-Rosario, who was arrested in October 2024, ran the Mrjohnson account. Roman assisted his co-conspirators by pressing counterfeit Adderall pills, packaging them, and distributing drug orders into the mail using the U.S. Postal Service. The conspiracy also laundered funds associated with darknet drug proceeds.

    While executing search warrants in New Jersey and New York, federal law enforcement officers seized more than $330,000, close to 80,000 counterfeit Adderall pills, one firearm, and two industrial pill press machines. Additionally, two vehicles and several pieces of property were seized during the search warrants. An additional 30 kilograms of suspected counterfeit Adderall pills were seized on May 2, 2024, in New York. Photographs of some of the seized items are below: 

    Figure 3: Counterfeit Adderall pills laced with methamphetamine stored in 5-gallon buckets

    Figure 4: Bags ready to be shipped to customers nationwide.

    Figure 5: Illegal pill press machines used by drug traffickers to make counterfeit pharmaceutical pills.

    Figure 6: Trash bags full of counterfeit Adderall pills laced with methamphetamine.

    Joshua Vasquez pleaded guilty on April 24, 2024, and was sentenced on July 25, 2024, to 12 years in prison. Joseph Vasquez pleaded guilty on April 15, 2024, and was sentenced on Aug. 8, 2024, to 10 years in prison. Roman pleaded guilty on May 30, 2024, and was sentenced on Nov. 14, 2024, to 10 years in prison. They all pleaded guilty to conspiracy to create a counterfeit substance and distribute 500 grams or more of a mixture and substance containing methamphetamine.

    The FBI, FDA, and USPIS investigated this matter with significant contributions from DEA, HSI, the Ocean County Sheriff’s Office, the Howell Township Police Department, the Lakewood Township Police Department, the Orlando Police Department, the Orange County Sheriff’s Office, the Arlington County Police Department, and the New York Police Department.

    In a fourth example, a San Fernando Valley man, Brian McDonald, 23, was sentenced to more than 20 years in federal prison in the Central District of California for using darknet marketplaces to sell hundreds of thousands of dollars’ worth of fentanyl-laced pills and cocaine to buyers nationwide. He admitted in court documents to causing one fatal fentanyl overdose.

    From at least April 2021 until May 2023, McDonald and others conspired to sell fentanyl and cocaine via multiple darknet marketplaces. McDonald operated under the monikers “Malachai Johnson,” “SouthSideOxy,” and “JefeDeMichoacan.” McDonald created, monitored, and maintained the darknet vendor profiles, including by updating drug listings and shipment options, tracking drug orders, and offloading Monero cryptocurrency received as drug deal payments into cryptocurrency wallets that McDonald controlled.

    McDonald recruited and hired accomplices to help package and ship the narcotics they sold on the darknet. McDonald directed and helped these accomplices package and ship the narcotics. McDonald purchased bulk quantities of fentanyl and cocaine and then directed others to complete hundreds of drug sales involving large quantities of both fentanyl and cocaine.

    The FBI and DEA investigated this matter.

    Operation RapTor involves law enforcement actions taken by JCODE member agencies, including the DEA, FBI, FDA OCI, HSI, IRS-CI, and USPIS. Credible reporting from the referenced agencies, in addition to contributions from ATF, Army Criminal Investigation Division, Customs and Border Protection, the Treasury Department’s Financial Crimes Enforcement Network (FinCEN) and OFAC, and Naval Criminal Investigative Service, enabled domestic law enforcement actions in support of Operation RapTor. State, local, and other federal agencies also contributed to Operation RapTor investigations through task force participation and regional partnerships, as well as the multi-agency Special Operations Division.

    The investigations leading to Operation RapTor were significantly aided by support and coordination from the Criminal Division’s Narcotic and Dangerous Drug Section and Computer Crime and Intellectual Property Section, with valuable assistance from the Criminal Division’s Money Laundering and Asset Recovery Section, Fraud Section, and Office of International Affairs.

    Key international partners include Europol; Eurojust; Austria’s Criminal Intelligence Service with various Provincial Criminal Police Departments (Bundeskriminalamt und Landeskriminalämter); Brazil’s Civil Police of the State of Pará (Polícia Civil do Estado do Pará) and Civil Police of the State of São Paulo (Polícia Civil do Estado do São Paulo); France’s French Customs (Douane), National Gendarmerie (Gendarmerie Nationale); Germany’s Federal Criminal Police Office (Bundeskriminalamt), Prosecutor’s Office in Cologne – Central Cybercrime Contact Point (Staatsanwaltschaft Köln, Zentral- und Ansprechstelle Cybercrime), Central Criminal Investigation in Oldenburg (Zentrale Kriminalinspektion Oldenburg) various police departments (Dienststellen der Länderpolizeien), and German Customs Investigation (Zollfahndungsämter); the Netherlands’ Team High Tech Crime (National Investigations and Special Operations (NIS) and Post Interventie Team (PIT), National Intelligence, Expertise and Operational Support (NIEO);  Spain’s National Police (Policía Nacional); South Korea’s Seoul Central District Prosecutors’ Office – Darknet Investigations Unit; Switzerland’s Zurich Cantonal Police (Kantonspolizei Zürich) and Public Prosecutor’s Office II of the Canton of Zurich (Staatsanwaltschaft II); and the United Kingdom’s National Crime Agency (NCA), National Police Chiefs’ Council (NPCC).

    Federal investigations spanned the United States, and 26 United States Attorneys’ Offices are prosecuting cases, including the Central District of California, the Northern District of California, the Southern District of California, the District of Colorado, the District of Connecticut, the District of Columbia, the Middle District of Florida, the Southern District of Florida, the Middle District of Georgia, the District of Hawaii, the Northern District of Illinois, the Southern District of Indiana, the Eastern District of Kentucky, the District of Massachusetts, the Eastern District of Michigan, the Western District of Michigan, the Eastern District of Missouri, the District of New Jersey, the Southern District of New York, the District of North Dakota, the Northern District of Ohio, the Southern District of Ohio, the Northern District of Oklahoma, the Eastern District of Pennsylvania, the Eastern District of Virginia, and the Western District of Washington.

    The Justice Department established the FBI-led JCODE team to lead and coordinate government efforts to detect, disrupt, and dismantle major criminal enterprises reliant on the darknet for trafficking opioids and other illicit narcotics, along with identifying and dismantling their supply chains.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI USA: Congressman Sherman Statement on Capital Jewish Museum Shooting

    Source: United States House of Representatives – Congressman Brad Sherman (D-CA)

    WASHINGTON, DC – Today, Congressman Brad Sherman issued the following statement after two members of the Israeli Embassy staff were gunned down outside an event at the Capital Jewish Museum in Washington D.C. in what the FBI believes may be a targeted attack:

    “Another brutal act of antisemitic terrorism. My deepest condolences to the loved ones of those who died in this brutal act. My sympathies are with all those who work at the Israeli embassy in Washington.”

    ###

    MIL OSI USA News

  • MIL-OSI Security: Food Stamp Fraud Nets Two Former Harrisburg Merchants Federal Prison Time

    Source: Office of United States Attorneys

    HARRISBURG – The United States Attorney’s Office for the Middle District of Pennsylvania announced that Mervat Gharib, 60, and Adam Rashwan, 63, both of Harrisburg, were each sentenced on May 21, 2025, by Senior United States District Judge Yvette Kane to 21 months’ imprisonment for defrauding the United States out of over $1 million dollars in benefits under what was formerly the federal food stamp program.

    According to Acting United States Attorney John C. Gurganus, on October 19, 2022, one-count Informations were returned charging both Gharib and Rashwan, formerly husband and wife, with unauthorized use of benefits from on or about January 2017 through in or about August 2020. In November 2022, both defendants pled guilty.

    The United States Department of Agriculture (“USDA”) administers the Supplemental Nutrition Assistance Program (“SNAP”), formerly known as the Federal Food Stamp Program. Retail food stores approved for participation in SNAP may sell food in exchange for SNAP benefits. These benefits may not be lawfully exchanged for cash. The investigation disclosed that Capital City Family Market was a small food retailer and/or convenience store located at 2000 North 6th Street, Harrisburg, Pennsylvania. Gharib was listed as the owner. Rashwan was married to Gharib at that time and employed at the store. Rashwan and Gharib engaged in a scheme to defraud SNAP. The scheme included food stamp trafficking, which occurs when a retailer allows customers to exchange SNAP benefits for cash, charging the customer a significant percentage of the amount of the unlawful transaction. Between November 2016 and July 2021, 24 undercover transactions occurred at Capital City Family Market during which SNAP benefits were exchanged for United States currency.

    Agents reviewed FNS records detailing the total amount paid to Capital City Family Market dating to January 2014. From January 2014 through June 2021, Capital City Family Market received approximately $1,806,761 in SNAP benefits. Data from FNS revealed in May 2021 alone, Capital City Family Market processed 408 individual SNAP transactions totaling $96,908.46 with an average transaction amount of $238.86. Gurganus said that the average transaction amount during the same time period for convenience stores in Pennsylvania was $11.58, and for small grocery stores was $23.16. The unusual number of large transactions at Capital City Family Market alerted the authorities to the possibility of fraud. The investigation revealed that from January 2011 through June 2021, Rashwan and Gharib, through the Capital City Family Market, illegally diverted approximately $1,091,822.05 in SNAP benefits. The business has since closed.

    Defendants were also ordered to pay restitution to the USDA’s SNAP program in the amount of $1,091,822.05.

    The case was investigated by the United States Department of Agriculture Office of Inspector General – Investigations and the Federal Bureau of Investigation.  Assistant United States Attorney William A. Behe prosecuted the case.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Canoncito Man Sentenced for Role in 2022 Fatal Assault

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)

    ALBUQUERQUE – A Canoncito man was sentenced to three years’ probation for his role in the violent 2022 assault that led to the death of John Doe.

    There is no parole in the federal system.

    According to court documents, on May 27, 2022, Landen Toledo, 21, an enrolled member of the Navajo Nation, along with Cole Ray Shorty, confronted John Doe at his residence to retrieve Shorty’s backpack. During the confrontation, John Doe exited his vehicle with a baseball bat. Toledo grabbed John Doe by the wrists, threw him to the ground, and kicked him in the stomach several times, causing him to drop the bat. Shorty then struck John Doe on the head with the bat. John Doe was left unconscious at the scene and later died from blunt head trauma.

    Shorty pled guilty to voluntary manslaughter and was sentenced to 72 months in prison.

    Toledo pleaded guilty to voluntary manslaughter.

    U.S. Attorney Ryan Ellison and Philip Russell, Acting Special Agent in Charge of the Federal Bureau of Investigation’s Albuquerque Field Office, made the announcement today.

    The FBI Albuquerque Field Office investigated this case with assistance from the Navajo Police Department and Navajo Department of Criminal Investigations. Assistant United States Attorney Brittany DuChaussee is prosecuting the case. 

    MIL Security OSI

  • MIL-OSI Security: Federal Indictment Charges Rockford Man with Arson

    Source: Federal Bureau of Investigation (FBI) State Crime News

    ROCKFORD — A Rockford man has been indicted by a federal grand jury for allegedly maliciously destroying – by means of fire and explosive materials – a building at 201 15th Ave. in Rockford.

    JAMES PURIFOY, 50, committed the arson on Jan. 22, 2023, according to an indictment returned today in U.S. District Court in Rockford.  Arraignment has not yet been scheduled.

    The indictment was announced by Andrew S. Boutros, United States Attorney for the Northern District of Illinois, Christopher Amon, Special Agent-in-Charge of the Chicago Field Division of the U.S. Bureau of Alcohol, Tobacco, Firearms, and Explosives, and Douglas S. DePodesta, Special Agent-in-Charge of the Chicago Field Office of the FBI.  The Rockford Fire Department and Rockford Police Department assisted in the investigation.  The government is represented by Assistant U.S. Attorney Jessica S. Maveus.

    The public is reminded that an indictment contains only charges and is not evidence of guilt.  The defendant is presumed innocent and entitled to a fair trial at which the government has the burden of proving guilt beyond a reasonable doubt.  The minimum sentence for the arson count is five years in federal prison, while the maximum sentence is 20 years.  If convicted, the Court must impose a reasonable sentence under federal sentencing statutes and the advisory U.S. Sentencing Guidelines.

    MIL Security OSI

  • MIL-OSI Security: Chicago Man Sentenced to 50 Years in Prison for Kidnapping, Carjacking, and Firearm Offenses

    Source: Federal Bureau of Investigation (FBI) State Crime News

    CHICAGO — A Chicago man has been sentenced to 50 years in federal prison for kidnapping three drivers and sexually assaulting two of them at gunpoint.

    ANDREW ANANIA, 29, kidnapped an Uber driver on March 8, 2021, in Darien, Ill.  Anania showed the driver a gun and forced her to drive to Chicago and park in alleys, where he sexually assaulted her before fleeing on foot.  On March 10, 2021, Anania and another man, WALTER MORAN, kidnapped a woman who was on her way to work in Cicero, Ill.  Anania pointed a gun at the driver and instructed her to drive to Chicago, where Moran exchanged gunfire with others on the street.  The pair eventually released the victim and took her car.  A jury earlier this year convicted Anania on kidnapping, carjacking, and firearm charges in connection with those incidents.

    Anania pleaded guilty prior to trial to another kidnapping and carjacking.  That incident occurred on Feb. 27, 2021, in Chicago, when Anania got in a vehicle with the driver, claimed he had a gun, and sexually assaulted her.  The woman escaped when the car stopped at an intersection.  Anania fled in the vehicle and crashed it a short time later.

    Anania committed all of the offenses while awaiting trial in a separate, unrelated federal firearm case not assigned to the sentencing judge in this matter.  Anania had been released on bond in that case after multiple court hearings at which the government repeatedly sought pre-trial detention.

    U.S. District Judge Edmond E. Chang imposed the 50-year prison sentence during a hearing on May 13, 2025, in federal court in Chicago.

    The sentence was announced by Andrew S. Boutros, United States Attorney for the Northern District of Illinois, and Douglas S. DePodesta, Special Agent-in-Charge of the Chicago Field Office of the FBI.  Substantial assistance was provided by the Cicero, Ill. Police Department, Darien, Ill. Police Department, Summit, Ill. Police Department, Stickney, Ill. Police Department, Chicago Police Department, and the U.S. Marshals Service.  The government was represented by Assistant U.S. Attorneys Cornelius Vandenberg, Megan Donohue, and Hayley Altabef.

    Moran, of Cicero, Ill., pleaded guilty last year to kidnapping and carjacking charges.  Judge Chang sentenced Moran in April to 15 years and eight months in federal prison.

    MIL Security OSI

  • MIL-OSI Security: Federal Judge Sentences Chicago Street Gang Member to 34 Years in Prison for Murdering a Man and Threatening a Witness

    Source: Federal Bureau of Investigation (FBI) State Crime News

    CHICAGO — A member of a violent Chicago street gang has been sentenced to 34 years in federal prison for murdering a man to maintain and increase his position in the gang.

    DIONTAE HARPER, 25, of Chicago, admitted in a plea agreement that he murdered Paul Harris on May 13, 2020.  Harper and another man fired multiple shots at Harris as he sat in a vehicle at a gas station in the 8600 block of South Halsted Street in Chicago’s Auburn Gresham neighborhood. Harper stated in the plea agreement that he committed the murder to maintain and increase his position in the Faceworld street gang, a criminal organization based on the South Side of Chicago whose members engaged in violent crimes and trafficked narcotics.

    While Harper was detained in law enforcement custody earlier this year, he made threatening statements directed toward a witness.

    Harper pleaded guilty in January to a federal charge of discharging a firearm during a crime of violence, causing Harris’s death.  U.S. District Judge Manish S. Shah imposed the 34-year prison sentence during a hearing on May 8, 2025, in federal court in Chicago.

    Harper’s sentence was announced by Andrew S. Boutros, United States Attorney for the Northern District of Illinois, Douglas S. DePodesta, Special Agent-in-Charge of the Chicago Field Office of the FBI, and Larry Snelling, Superintendent of the Chicago Police Department.  The government is represented by Assistant U.S. Attorneys Julia Schwartz, Sushma Raju, and Matthew Moyer.

    Two other individuals – the other shooter of Harris and the getaway driver – pleaded guilty to committing murder in aid of racketeering and are awaiting sentencing.

    MIL Security OSI

  • MIL-OSI Security: Twelve Years in Prison for Suburban Chicago Man Who Trafficked Fentanyl and Illegally Possessed Handgun

    Source: Federal Bureau of Investigation (FBI) State Crime News

    CHICAGO — A suburban Chicago man who trafficked fentanyl and cocaine and illegally possessed a loaded handgun has been sentenced to 12 years in federal prison.

    WILLIAM FILLYAW possessed the drugs and gun on Oct. 28, 2022, in the parking lot of his apartment complex in Gurnee, Ill.  Fillyaw carried a backpack that contained the cocaine packaged in quarter-ounce quantities, the fentanyl wrapped in three square bricks, and the handgun.  Fillyaw intended to sell the fentanyl and cocaine on the streets, and he acknowledged possessing the gun in connection with his drug trafficking activities. The firearm had no serial number and had been assembled from a gun kit, making it an untraceable “ghost gun.”

    Fillyaw, 47, pleaded guilty earlier this year to federal drug and firearm charges.  U.S. District Judge Matthew F. Kennelly imposed the 12-year prison sentence during a hearing on Friday in federal court in Chicago.

    The sentence was announced by Andrew S. Boutros, United States Attorney for the Northern District of Illinois, and Michael E. Hensle, Special Agent-in-Charge of the Milwaukee, Wis., Field Office of the FBI.  Valuable assistance was provided by the U.S. Drug Enforcement Administration, Milwaukee Police Department, Cudahy, Wis. Police Department, and Wisconsin State Patrol.

    “Narcotics distribution and firearm offenses are serious crimes that adversely impact the people who live and work in the Northern District of Illinois,” Assistant U.S. Attorney Kirsten Moran and Special Assistant U.S. Attorney Niranjan Emani argued in the government’s sentencing memorandum.  “The increased presence of ghost guns in Chicago, and the country in general, is troubling, as they are often used in crimes and are difficult to trace.”

    Holding illegal firearm possessors accountable through federal prosecution is a centerpiece of Project Safe Neighborhoods (PSN).  In the Northern District of Illinois, the U.S. Attorney’s Office and law enforcement partners have deployed the PSN program to attack a broad range of violent crime issues facing the district, particularly firearm offenses.

    MIL Security OSI

  • MIL-OSI Security: Five Romanians Admit Bank Fraud Involving ATM Skimming Devices

    Source: Federal Bureau of Investigation (FBI) State Crime News

    ST. LOUIS – Five Romanian nationals have admitted installing skimming devices on St. Louis area ATMs to harvest bank account information from customers and commit fraud.

    Mihai Vlaicu, 48, and Mihai Florin Marinescu, 37, pleaded guilty Wednesday in U.S. District Courtin St. Louis to one count of conspiracy to commit bank fraud.

    Laurentiu Miguel Ivan, 33, pleaded guilty to the same charge in March and Nelu Nae, 37, and Venera Isabelle Dumitru, 28, pleaded guilty to the charge in April. A sixth person indicted in the case, Ianus Nita, 53, has not yet been arrested.

    In their plea agreements, the five admit stealing bank account information via skimming devices and then using, or attempting to use, that information to withdraw money from ATMs.

    Around January of 2024, Vlaicu and Marinescu installed skimming devices on at least two bank ATMs, one in Clayton and one in Frontenac. They obtained the information of at least six victims, and then used cloned cards to try and withdraw cash.

    On five days in April, Dumitru and Ivan used account information from two other victims to withdraw cash from ATMs in St. Louis. Ivan obtained $1,421 and Dumitru obtained $1,070.50.

    On April 25, Dumitru and Ivan tried to withdraw cash from a St. Louis County ATM using an account number belonging to another victim. On April 30, Vlaicu tried to withdraw money from a St. Louis County ATM using the banking information of six victims.

    On May 2, Marinescu unsuccessfully tried to install a skimming device on an ATM in south St. Louis County. Nae retrieved the device the next day.

    On May 9, Marinescu installed a skimming device on an ATM in Wildwood. On May 11, Nita withdrew cash belonging to two victims from a St. Louis County ATM.

    On May 28, Marinescu and Nae installed a skimming device on an ATM in St. Louis, which was located and removed by law enforcement before Nita and Vlaicu could retrieve it.

    The conspirators were using an Airbnb in St. Louis County as a base for their criminal activity. Investigators found a laptop computer there containing hundreds of videos of customers entering their PINs when they used an ATM outfitted with a skimming device. They also found skimming devices, installation tools, a large amount of cash and numerous gift cards at the rented residence.

    Ivan is scheduled to be sentenced June 25, Dumitru on July 10, Nae on July 23 and Marinescu and Vlaicu on August 20. The charge carries a penalty of up to 30 years in prison, a $1 million fine or both prison and a fine.

    Ivan, Dumitru, Marinescu are not legally in the United States.

    The FBI, the St. Louis Metropolitan Police Department, the Webster Groves Police Department, the Clayton Police Department and the Frontenac Police Department investigated the case with assistance from the St. Louis County Police Department. Assistant U.S. Attorney Gwen Carroll is prosecuting the case.

    MIL Security OSI

  • MIL-OSI Security: Two Convicted in St. Louis of Laundering Drug Proceeds for Sinaloa Cartel

    Source: Federal Bureau of Investigation (FBI) State Crime News

    ST. LOUIS – Two men were convicted Wednesday of all charges related to their laundering of money in the St. Louis area for the Sinaloa drug cartel.

    Carl Von Garrett, 54, of St. Charles, Missouri and Tobiyyah Israel, 38, of Ohio, were each found guilty by a jury in U.S. District Court in St. Louis of one count of conspiracy to commit money laundering and one count of money laundering. Von Garrett was also found guilty of one additional count of money laundering. The trial began on May 12.

    Two others have already pleaded guilty and been sentenced in the case. Luis Miguel Hernandez, 38, of Phoenix, pleaded guilty to one count of conspiracy to commit money laundering and two counts of money laundering and Antonio Jones, 51, of Florissant, Missouri, pleaded guilty to two counts of money laundering. Hernandez was sentenced in January to 87 months in prison and Jones was sentenced to 37 months in prison.

    As part of his plea agreement, Hernandez admitted being driven by Von Garrett to a meeting with an undercover Drug Enforcement Administration task force officer in St. Louis on March 1, 2021, to deliver $100,095 in drug proceeds. Hernandez then arranged a series of meetings between Jones and the task force officer. On March 8, 2021, Jones handed over $100,000. Jones delivered $150,030 on March 17 and $100,000 on March 31. On April 8, Jones delivered $109,740 and $100,100 on May 18. On May 25, 2021, Jones delivered $100,100.

    During closing arguments Tuesday, Assistant U.S. Attorney Jim Delworth told jurors that Von Garrett was the “focal point” of the conspiracy and Israel was a courier, like Jones. On April 14, Israel picked up $221, 020 from Von Garrett. Von Garrett was stopped by investigators, who found six phones and a ledger that contained dates and amounts of money roughly corresponding to cash drops, Delworth said. Israel told investigators that he’d been promised $1,000 to pick up the cash, and that he’d done so once before.

    The money drops continued. On May 18, Jones delivered $110,100 and $100,100 one week later.

    Both men are scheduled to be sentenced on August 21.

    The Drug Enforcement Administration, IRS-Criminal Investigation, the FBI, the St. Louis County Police, the Bridgeton Police Department, the St. Louis Metropolitan Police Department, and the St. Charles County Police Department investigated the case. Assistant U.S. Attorneys Jim Delworth and Ricardo Dixon are prosecuting the case.

    This prosecution is part of an Organized Crime Drug Enforcement Task Force (OCDETF) operation. OCDETF identifies, disrupts, and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach. Additional information about the OCDETF Program can be found at https://www.justice.gov/OCDETF.

    MIL Security OSI