Category: Federal Bureau of Investigation

  • MIL-OSI Security: Porcupine Man Sentenced to Eight Years in Federal Prison for Involuntary Manslaughter and False Statement

    Source: Office of United States Attorneys

    RAPID CITY – United States Attorney Alison J. Ramsdell announced today that U.S. District Judge Karen E. Schreier has sentenced a Porcupine, South Dakota, man convicted of Involuntary Manslaughter and two counts of False Statement. The sentencing took place on April 25, 2025.

    Clayton Fire Thunder, age 40, was sentenced to a total of eight years in federal prison, followed by three years of supervised release. He was also ordered to pay $300 in special assessments to the Federal Crime Victims Fund.

    A federal grand jury indicted Fire Thunder in May 2024. He was found guilty following a federal jury trial in Rapid City, South Dakota, in January of 2025.

    On the early morning of September 15, 2022, a male drove his partially clothed girlfriend to Indian Health Services (IHS) hospital on the Pine Ridge Reservation and dropped her off at the Emergency Department. The male did not provide his identity nor the female’s identity. The male told medical personnel that a firearm went off while they were engaged in intimate relations and that she had been shot accidentally.

    Law enforcement identified and located the male at his residence several hours later. The male was cleaning the crime scene and sent text messages to the female’s relative’s claiming the shooting was an accident. A search of the residence was conducted. Law enforcement was unable to locate the handgun that the male claimed was used in the shooting. The male was arrested and eventually charged with second degree murder, possession of a firearm by a prohibited person and conspiracy to distribute methamphetamine. A digital surveillance system that recorded traffic to the male’s house was seized by law enforcement.

    After reviewing the footage, law enforcement identified a vehicle that appeared at the male’s residence shortly after midnight and just before the female was brought to IHS. After several months, law enforcement was able to identify the driver of the vehicle as Marino Waters and the passenger as Clayton Fire Thunder. The investigation revealed that Waters drove Fire Thunder to the male’s residence just east of Pine Ridge two times on the morning of September 15, 2022. Fire Thunder intended on selling a firearm to the male in exchange for cash and/or methamphetamine. The male did not answer the door when Fire Thunder knocked, and unexpectedly, Fire Thunder discharged one round from the firearm into the residence. The round ended up penetrating the siding, backboard, and drywall of the residence and struck and killed the male’s girlfriend, a 27-year-old female.

    When Fire Thunder was interviewed by the FBI in March of 2023, he gave a false statement and said that he did not have a firearm when the shooting occurred. Fire Thunder admitted to being at the residence and told law enforcement that he was inquiring with the male homeowner about a junked car at 4:00 o’clock in the morning. Fire Thunder was reinterviewed again in October 2023. Fire Thunder continued to deny that he possessed a firearm during the shooting death of the female and this time said that he was inquiring about a flatbed at 4:00 o’clock.

    Seventeen witnesses and over 200 exhibits were introduced at Fire Thunder trial establishing that Fire Thunder possessed and discharged a firearm on the morning of September 15, 2022, that resulted in the death of a 27-year-old female. The jury found Fire Thunder guilty of involuntary manslaughter and two counts of false statement.

    This matter was prosecuted by the U.S. Attorney’s Office because the Major Crimes Act, a federal statute, mandates that certain violent crimes alleged to have occurred in Indian country be prosecuted in Federal court as opposed to State court.

    This case was investigated by the Oglala Sioux Tribe Department of Public Safety and the FBI. Assistant U.S. Attorney Megan Poppen prosecuted the case.

    Fire Thunder was immediately remanded to the custody of the U.S. Marshals Service.

    MIL Security OSI

  • MIL-OSI Security: Florida Man Pleads Guilty to Tax Evasion and Bankruptcy Fraud

    Source: Office of United States Attorneys

    Paul Archer evaded approximately $1MM in federal taxes by concealing and transferring assets in his Chapter 7 bankruptcy case

    BANGOR, Maine: A Florida man pleaded guilty today in U.S. District Court in Bangor to attempting to evade federal taxes and engaging in fraudulent transfers and concealment in a bankruptcy proceeding. 

    According to court records, Paul Archer, 46, formerly of Hampden and Orrington, operated a profitable online marketing business for software installation on computers, earning several million dollars from 2013 through 2015. After an IRS audit in 2016 assessed a federal tax debt totaling approximately $1 million for those years, Archer concealed and transferred assets through two LLCs he controlled and began using third-party bank accounts to evade paying the tax debt.   

    From April 2018 through November 2019, Archer transferred and concealed assets and income by using a series of bank accounts held in the names of Max Tune Up, LLC; Stealth Kit, LLC; his father; and his spouse. Using a bank account held by Stealth Kit, LLC, for instance, Archer received income via direct deposits, initiated and received over $2 million in wire payments, and used cryptocurrency trading platforms and online payment systems to transfer funds. Archer transferred an investment account held in his own name to an account held in the name of Stealth Kit, LLC, then engaged in trading activity, stock ownership, and dividend/interest distributions. Archer further owned and transacted in Bitcoin using two different cryptocurrency exchanges, purchasing and later trading cryptocurrency valued at several hundred thousand dollars.

    In March 2019, Archer filed a Chapter 7 bankruptcy proceeding. In his Chapter 7 petition and schedules, Archer falsely claimed less than $50,000 in assets; a single checking account; no other assets or property interests; no recent asset transfers; and no connections to any businesses or memberships in any LLCs. Archer repeated these falsehoods under oath during meetings of creditors convened by a Chapter 7 Trustee, as well as in statements made to the U.S. Bankruptcy Court for the District of Maine.

    Archer faces up to five years imprisonment and a fine up to $250,000 on each of the two charges to which he pleaded guilty. Any sentence will be followed by up to three years of supervised release. He will be sentenced after the completion of a presentence investigation report by the U.S. Probation Office. A federal district court judge will determine a sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    IRS Criminal Investigation and the FBI investigated the case.

    ###

    MIL Security OSI

  • MIL-OSI Security: Miami Man Pleads Guilty to Fraud and Money Laundering in Scheme to Illegally Obtain Multiple HELOCs Using a Single Property

    Source: Office of United States Attorneys

    MIAMI – A Miami man pleaded guilty to charges stemming from a scheme in which he fraudulently obtained multiple home equity lines of credit (HELOCs) from various lenders by repeatedly using the same property as collateral.

    In June and July 2023, Alfred Lenoris Davis, 51, of Miami, Florida, engaged in a multi-lender fraud scheme by submitting false and misleading information to financial institutions in connection with HELOC applications. Davis submitted fraudulent tax returns and falsely represented that his property was free of other liens, even though he had already obtained and/or applied for other HELOCs secured by the same property. By concealing these overlapping obligations, Davis induced multiple lenders to extend approximately $1,257,500 in lines of credit under false pretenses. Davis used the fraudulently obtained loan proceeds for personal expenses and other purposes. Davis was charged with three counts of wire fraud and two counts of money laundering. Davis pleaded guilty on May 5.

    A sentencing hearing is scheduled on July 24 in Miami. Davis faces up to 20 years in prison for each count of wire fraud and up to 10 years in prison for each count of money laundering.

    U.S. Attorney Hayden P. O’Byrne for the Southern District of Florida and acting Special Agent in Charge Brett Skiles of the FBI, Miami Field Office, made the announcement.

    FBI Miami investigated the case. Assistant U.S. Attorney Jonathan Bailyn is prosecuting the case. Assistant U.S. Attorney Sarah Klco is handling asset forfeiture.

    Related court documents and information may be found on the website of the District Court for the Southern District of Florida at www.flsd.uscourts.gov or at http://pacer.flsd.uscourts.gov, under case number 24-cr-20456.

    ###

    MIL Security OSI

  • MIL-OSI Security: California Man Sentenced to 12 Years’ Imprisonment in Connection with $17M Medicare Fraud Schemes

    Source: United States Department of Justice Criminal Division

    A California man was sentenced yesterday to 12 years in prison and three years of supervised release for his role in a years-long scheme to defraud Medicare of more than $17 million through sham hospice companies and his home health care company.

    According to court documents, Petros Fichidzhyan, 44, of Granada Hills, schemed with others to bill Medicare for hospice services that were not medically necessary and never provided. Fichidzhyan and his co-schemers controlled hospice entities and used foreign nationals’ personal identifying information (PII) to conceal the scheme, using the PII to, among other things, open bank accounts, submit information to Medicare, and sign property leases. The defendant and his co-schemers also misappropriated the names and PII of several doctors, two of whom were deceased, to fraudulently bill Medicare for purported hospice services. Medicare paid the sham hospices nearly $16 million, of which Fichidzhyan received nearly $7 million, with more than $5.3 million laundered through a dozen shell and third-party bank accounts. Fichidzhyan also obtained more than $1 million in false claims paid to his home health care agency, which fraudulently used a doctor’s name and identifying information as having certified Medicare beneficiaries for home health care. When the doctor confronted Fichidzhyan about the fraud, Fichidzhyan attempted to cover up the scheme by paying the doctor $11,000.

    Fichidzhyan pleaded guilty to health care fraud, aggravated identity theft, and money laundering in February 2025. At sentencing, he was also ordered to pay $17,129,060 in restitution, and the court preliminarily ordered the forfeiture of a home bought with fraudulent proceeds. The government has seized $2,920,383 from bank accounts associated with the fraud. The sentence imposed today is the most recent step in the Justice Department’s ongoing effort to combat hospice fraud in the greater Los Angeles area.

    “For years, the defendant, working with others, ran multiple sham hospice and home health care schemes, fraudulently billing Medicare over $17 million,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “The defendant’s egregious scheme relied on layers of deception and sophisticated money laundering, and wasted millions in taxpayer money. With the help of our law enforcement partners, the Department of Justice is fully committed to stopping these criminal networks and protecting the public fisc.”

    “Health care fraud is not a victimless crime. Defrauding the Medicare program not only wastes valuable taxpayer dollars, it causes significant harm to enrollees,” said Acting Special Agent in Charge Omar Pérez Aybar at the U.S. Department of Health and Human Services, Office of Inspector General (HHS-OIG) Los Angeles Regional Office. “HHS-OIG, in collaboration with our law enforcement partners, will continue to investigate and hold accountable those who defraud federal health care programs.”

    “Mr. Fichidzhyan lined his pockets at the expense of the American taxpayer,” said Akil Davis, the Assistant Director in charge of the FBI’s Los Angeles Field Office. “The level of fraud and exploitation committed by the defendant is astounding and I’m proud of our investigators and prosecutors who were able to detect his schemes and hold him accountable.”

    The FBI and HHS-OIG are investigating the case.

    Trial Attorneys Eric C. Schmale and Sarah E. Edwards of the Criminal Division’s Fraud Section are prosecuting the case.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Force Program. Since March 2007, this program, currently comprised of nine strike forces operating in 27 federal districts, has charged more than 5,800 defendants who collectively have billed federal health care programs and private insurers more than $30 billion. In addition, the Centers for Medicare & Medicaid Services, working in conjunction with HHS-OIG, are taking steps to hold providers accountable for their involvement in health care fraud schemes. More information can be found at www.justice.gov/criminal-fraud/health-care-fraud-unit.

    MIL Security OSI

  • MIL-OSI Security: Boston Man Pleads Guilty to Managing Large-Scale Drug Trafficking Conspiracy

    Source: Office of United States Attorneys

    CONCORD –A Boston man has pleaded guilty in federal court in Concord in connection with a large-scale drug trafficking operation that was distributing fentanyl and cocaine in the Manchester-area, Acting U.S. Attorney Jay McCormack announces.

    Flemin Soto Baez, age 50, pleaded guilty to one count of conspiracy to distribute controlled substances, namely, fentanyl and cocaine. U.S. District Court Judge Samantha Elliott scheduled sentencing for August 13, 2025.  The defendant was originally charged with conspiracy on April 26, 2023, along with 20 other defendants, in the matter United States v. Juan Ramon Soto Baez, et al.  He is the 15th defendant in the conspiracy to plead guilty.

    According to the plea agreement and statements made in court, the defendant was the leader of a Massachusetts-based drug trafficking organization that distributed large quantities of fentanyl and cocaine in New Hampshire, particularly Manchester, between September 2019 and April 2023.  The organization was run like a business, operating “dispatch” telephone lines where customers could call in to order drugs. The defendant operated the dispatch line and coordinated purchases. He sent runners to meet customers to conduct hand-to-hand exchanges of drugs for money, usually in the runner’s vehicle.  On 14 separate occasions between July 14, 2022 and March 2, 2023, the defendant sent a runner to deliver crack cocaine to drug customers in Manchester.

    The charging statute provides a sentence of no greater than 20 years in prison, at least three (3) years of supervised release, and a maximum fine of $1,000,000. Sentences are imposed by a federal district court judge based upon the U.S. Sentencing Guidelines and statutes which govern the determination of a sentence in a criminal case.

    The Federal Bureau of Investigation and the Drug Enforcement Administration led the investigation. Valuable assistance was provided by the Manchester Police Department. Assistant U.S. Attorney Aaron Gingrande is prosecuting the case. 

    This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations (TCOs), and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces (OCDETFs) and Project Safe Neighborhood (PSN).  Additional information about the OCDETF Program can be found at https://www.justice.gov/OCDETF.

    ###

    MIL Security OSI

  • MIL-OSI Security: Portland Sex Offender Sentenced to 24 Years in Federal Prison for Enticing a Minor Online and Receiving Child Pornography

    Source: Office of United States Attorneys

    PORTLAND, Ore.—A Portland man was sentenced to federal prison Monday for using multiple social media applications to entice a young child to send him sexually explicit images of herself.

    Shawn Alan Smith, 44, was sentenced to 288 months in federal prison and a life term of supervised release. Smith was also ordered to pay restitution to his victim.

    According to court documents, between July 11 and September 15, 2020, Smith used multiple fake online social media personas, including several on KIK messenger and TikTok, to communicate with a nine-year-old child. While posing as a minor himself, Smith instructed the child victim to take sexually explicit photos of herself and send them to him, which she did. Smith also engaged in a video chat with the child while pretending to be the father of one of his fake online personas. At the time of the offense, Smith was a registered sex offender following prior state criminal convictions for child pornography offenses in Oregon and Maryland.

    On March 9, 2022, federal agents executed a search warrant at Smith’s Portland apartment. While the agents were attempting to gain entry to the apartment through a door he had barricaded, Smith threw his phone and computer out his bathroom window. Smith was arrested and charged by federal criminal complaint with production and attempted production of child pornography.

    On January 21, 2025, Smith pleaded guilty to a two-count superseding information charging him with online enticement of a minor and receipt of child pornography.

    This case was investigated by the FBI and Homeland Security Investigations (HSI). It was prosecuted by Mira Chernick, Assistant U.S. Attorney for the District of Oregon.

    Federal law defines child pornography as any visual depiction of sexually explicit conduct involving a minor. It is important to remember child sexual abuse material depicts actual crimes being committed against children. Not only do these images and videos document the victims’ exploitation and abuse, but when shared across the internet, re-victimize and re-traumatize the child victims each time their abuse is viewed. To learn more, please visit the National Center for Missing & Exploited Children at www.missingkids.org.

    This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Justice Department to combat the growing epidemic of child sexual exploitation and abuse. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    MIL Security OSI

  • MIL-OSI Security: Fairport man who used Roblox to attempt to communicate with minors for sex arrested

    Source: Office of United States Attorneys

    ROCHESTER, N.Y. – U.S. Attorney Michael DiGiacomo announced today that Tony Rodriguez, 40, of Fairport, NY, was arrested and charged by criminal complaint with enticement and possession of child pornography, which carry a minimum penalty of 10 years in prison and a maximum of life.

    Assistant U.S. Attorney Melissa M. Marangola, who is handling the case, stated that according to the complaint, on March 12, 2025, the leader of an online community group, which exposes child predators, reached out to the Fairport Police Department regarding a message from the Facebook account “Tony Rodrigo,” later identified as the defendant. According to the community member, Rodriguez was told that the person he was communicating with was an 11-year-old girl named Emiry. The complaint states that the conversation began as causal small talk, but quickly turned sexual, initiated by Rodriguez. Rodriguez sent lewd pictures and offered to meet Emiry to have sex. On March 12, 2025, Rodriguez arrived at a pre-determined location, the Fairport Library, to meet Emiry. Instead, the community member arrived and confronted Rodriguez about his explicit online conversations with an alleged 11-year-old. The confrontation prompted the police to be called by a concerned citizen. The community member told police that Rodriguez admitted to meeting Emiry for sex and acknowledged communicating online with other minors between 13 to 16 years old in a similar manner. Prior to police arriving, Rodriguez left the scene.

    On April 15, 2025, the Monroe County Sheriff’s Office responded to a residence located in the Town of Perinton for a report that a male named “Tony Rodrigo” was at the location to meet a 13-year-old for a sexual encounter. The report was filed by individual who oversees another online volunteer group on Facebook which exposes child predators. This individual poses as a 13-year-old girl. According to the individual, “Tony Rodrigo” reached out on Facebook to who he believed was a 13-year-old-girl. Rodriguez stated he wanted to meet up “”to have sex” with the minor. On April 15, 2025, Rodriguez showed up at the predetermined location and was confronted by the individual. Sheriff’s deputies located Rodriguez and detained him.

    Rodriguez utilized Roblox, an online gaming platform, to connect with the alleged 11- and 13-year-old girls on Facebook.

    A search of two cellular telephones seized from Rodriguez recovered approximately six images of child pornography.

    In addition to Facebook, an Instagram account associated with Rodriguez was located, on which he appeared to be communication with a 13-year-old minor. Rodriguez was also active on the social media platform Reddit, specifically a subreddit community associated with teens.

    Rodriguez made an initial appearance before U.S. Magistrate Judge Mark W. Pedersen and was detained.

    The complaint is a result of an investigation by the Federal Bureau of Investigation, under the direction of Special Agent-in-Charge Matthew Miraglia, the Monroe County Sheriff’s Office, under the direction of Sheriff Todd Baxter, and the Fairport Police Department, under the direction of Chief Matthew Barnes.   

    The fact that a defendant has been charged with a crime is merely an accusation and the defendant is presumed innocent until and unless proven guilty.     

    # # # #

    MIL Security OSI

  • MIL-OSI USA: Durbin Urges AG Bondi, FBI Director Patel To Investigate Threats Against Federal Judges As They Continue To Receive Anonymous Deliveries As An Intimidation Tactic

    US Senate News:

    Source: United States Senator for Illinois Dick Durbin
    May 06, 2025
    WASHINGTON – U.S. Senate Democratic Whip Dick Durbin (D-IL), Ranking Member of the Senate Judiciary Committee, sent a letter today to U.S. Attorney General (AG) Pam Bondi and FBI Director Kash Patel urging them to investigate the ongoing and increasing threats against federal judges. Recently, federal judges and their family members have received anonymous deliveries to their homes intended to show that those seeking to intimidate the targeted judge know the judge’s address or their family members’ addresses. The targeted individuals reportedly include Supreme Court justices, judges handling legal cases involving the Trump Administration, and the children of judges. Some of these deliveries were made using the name of Judge Esther Salas’s son, Daniel Anderl, who was murdered at the family’s home by a former litigant who posed as a deliveryman.
    Durbin wrote, “These incidents threaten not only judges and their families, but also judicial independence and the rule of law. It is imperative that the Justice Department (DOJ) and the Federal Bureau of Investigation (FBI) investigate these anonymous or pseudonymous deliveries and that those responsible be held accountable to the full extent of the law.”
    Durbin continued, “Accordingly, I request that you immediately investigate these deliveries. In the event you have already initiated investigations, I request an update on those efforts. I also ask that you provide information on any steps that DOJ or the FBI have taken to protect the judges and their families who have received anonymous or pseudonymous deliveries and to prevent further anonymous or pseudonymous deliveries and other threats.”
    In the letter, Durbin also highlighted the essential role that the U.S. Marshals Service (USMS) plays in protecting the federal judiciary and urged Bondi and Patel to ensure that the size of the USMS workforce is not reduced. USMS Acting Director Mark P. Pittella reportedly sent a letter on April 15 to more than 5,000 USMS employees offering them the opportunity to resign.
    Durbin wrote, “In the midst of increasing threats of violence against judges, it is inappropriate and unacceptable to reduce the size of the agency tasked with protecting the federal judiciary and the judicial process. Accordingly, I ask you to commit to fully supporting USMS and to maintaining or increasing its current number of employees.”
    To better understand these threats and how DOJ and the FBI are responding, Durbin asked Bondi and Patel to answer several outstanding questions and provide a briefing to the Committee by May 20.
    Full text of the letter can be found here and below.
    May 6, 2025
    Dear Attorney General Bondi and Director Patel:
    I write regarding a disturbing development related to the ongoing and increasing threats to the federal judiciary. In recent months, federal judges and their relatives have received anonymous deliveries to their homes. These deliveries are threats intended to show that those seeking to intimidate the targeted judge know the judge’s address or their family members’ addresses. The targeted individuals reportedly include Supreme Court justices, judges handling legal cases involving the Administration, and the children of judges. Some of these deliveries were made using the name of Judge Esther Salas’s son, Daniel Anderl, who was murdered at the family’s home by a former litigant who posed as a deliveryman.
    These incidents threaten not only judges and their families, but also judicial independence and the rule of law. It is imperative that the Justice Department (DOJ) and the Federal Bureau of Investigation (FBI) investigate these anonymous or pseudonymous deliveries and that those responsible be held accountable to the full extent of the law.
    Accordingly, I request that you immediately investigate these deliveries. In the event you have already initiated investigations, I request an update on those efforts. I also ask that you provide information on any steps that DOJ or the FBI have taken to protect the judges and their families who have received anonymous or pseudonymous deliveries and to prevent further anonymous or pseudonymous deliveries and other threats.
    Additionally, I want to highlight the essential role that the U.S. Marshals Service (USMS) plays in protecting the federal judiciary and urge you to ensure that the size of the USMS workforce is not reduced. USMS Acting Director Mark P. Pittella reportedly sent a letter on April 15 to more than 5,000 USMS employees offering them the opportunity to resign. In the midst of increasing threats of violence against judges, it is inappropriate and unacceptable to reduce the size of the agency tasked with protecting the federal judiciary and the judicial process. Accordingly, I ask you to commit to fully supporting USMS and to maintaining or increasing its current number of employees.
    Finally, pursuant to this Committee’s constitutional obligation to perform oversight over DOJ and the FBI, please respond to the following questions and provide a briefing to committee staff no later than May 20, 2025:
    How many anonymous or pseudonymous deliveries, pizza or otherwise, have been made to federal judges or their families since January 20, 2025?
    Including deliveries sent to members of their families, how many federal judges have received an anonymous or pseudonymous delivery? Please provide what level of the judiciary each affected judge serves in, along with their relevant circuit or district.
    Has an investigation been initiated for each of these deliveries? If not, why not?
    How many suspects has DOJ or the FBI identified in connection with these anonymous or pseudonymous deliveries?
    Is there any reason to suspect coordination among these suspects beyond employing similar tactics?
    Is there any indication that the addresses of the affected federal judges or their families are being found due to data broker violations of the Daniel Anderl Judicial Security and Privacy Act or similar statutory protections?
    Have delays in processing requests from affected federal judges to remove their personal information from being publicly posted online allowed any of these suspects to find the addresses of federal judges or their families?
    How many prosecutions has DOJ initiated in response to these anonymous or pseudonymous deliveries?
    What steps has DOJ or the FBI taken to taken to protect judges and their families from anonymous or pseudonymous deliveries and other threats?
    What steps has DOJ or the FBI taken to taken to prevent anonymous or pseudonymous deliveries and other threats?
    What involvement, if any, did DOJ or FBI officials have in the April 15 letter from USMS Acting Director Pittella to USMS employees in which USMS employees were offered the opportunity to resign? Please provide a copy of the April 15 letter.
    Considering the current threat environment with respect to federal judges, do you support the reduction of the size of the USMS workforce?
    Does DOJ or the FBI need any additional resources to investigate and respond to threats against judges and their family members?
    Please provide an unclassified, non-law enforcement sensitive response to all of these questions to the greatest extent possible, with any classified or law-enforcement sensitive material under separate cover.
    I look forward to your prompt attention to these important requests.
    Sincerely,
    -30-

    MIL OSI USA News

  • MIL-OSI Economics: State of ransomware in 2025

    Source: Securelist – Kaspersky

    Headline: State of ransomware in 2025

    With the International Anti-Ransomware Day just around the corner on May 12, Kaspersky explores the ever-changing ransomware threat landscape and its implications for cybersecurity. According to Kaspersky Security Network data, the number of ransomware detections decreased by 18% from 2023 to 2024 – from 5,715,892 to 4,668,229. At the same time, the share of users affected by ransomware attacks increased by 0.02 p.p. to 0.44%. This smaller percentage compared to other cyberthreats is explained by the fact that attackers often don’t distribute this type of malware on a mass scale, but prioritize high-value targets, which reduces the overall number of incidents.

    That said, if we look at incidents at organizations requiring immediate incident response services that were mitigated by Kaspersky’s Global Emergency Response Team (GERT), we’ll see that 41.6% of them were related to ransomware in 2024, compared to 33.3% in 2023. Targeted ransomware is likely to remain the primary threat to organizations around the world for the foreseeable future.

    Below are some of the global trends that Kaspersky observed with ransomware in 2024.

    Ransomware-as-a-Service (RaaS) dominance

    The RaaS model remains the predominant framework for ransomware attacks, fueling their proliferation by lowering the technical barrier for cybercriminals. In 2024, RaaS platforms like RansomHub thrived by offering malware, technical support and affiliate programs that split the ransom (e.g., 90/10 for affiliates/core group). This model enables less-skilled actors to execute sophisticated attacks, contributing to the emergence of multiple new ransomware groups in 2024 alone. While traditional ransomware still exists, the scalability and profitability of RaaS make it the primary engine, with platforms evolving to include services such as initial access brokering and data exfiltration, ensuring its dominance into 2025.

    Some groups continue to go cross-platform, while Windows remains the primary target

    Many ransomware attacks still target Windows-based systems, reflecting the operating system’s widespread use in enterprise environments. The architecture of Windows, combined with vulnerabilities in software such as Remote Desktop Protocol (RDP) and unpatched systems, makes it a prime target for ransomware executables. In recent years, however, some attackers have diversified, with groups like RansomHub and Akira developing variants for Linux and VMware systems, particularly in cloud and virtualized environments. While Windows remains the epicenter, the growing focus on cross-platform ransomware signals a shift toward exploiting diverse infrastructures, especially as organizations adopt hybrid and cloud setups. This is not a new trend, and we expect it to persist in the coming years.

    Overall ransomware payments down, average ransom payment up

    According to Chainalysis, ransomware payments dropped significantly in 2024 to approximately $813.55 million, down 35% from a record $1.25 billion in 2023. On the other hand, Sophos reports that the average ransom payment surged from $1,542,333 in 2023 to $3,960,917 in 2024, reflecting a trend of targeting larger organizations with higher demands. This report also highlights that more organizations paid ransoms to get their data back, although other reports indicate that fewer organizations paid ransoms than in 2023. For example, according to Coveware, a company that specializes in fighting ransomware, the payment rate hit a record low of 25% in Q4 2024, down from 29% in Q4 2023, driven by law enforcement crackdowns, improved cybersecurity and regulatory pressures discouraging payments.

    While encryption remains a core component of many ransomware attacks, the primary goal for some groups has shifted or expanded beyond locking data

    In 2024, cybercriminals increasingly prioritized data exfiltration alongside, or sometimes instead of, encryption, focusing on stealing sensitive information to maximize leverage and profits or even extending threats to third parties such as customers, partners, suppliers, etc. Encryption is still widely used, but the rise of double and triple extortion tactics shows a strategic pivot. RansomHub and most modern ransomware groups often combine encryption with data theft, threatening to leak or sell stolen data if a ransom is not paid, making exfiltration a critical tactic.

    Dismantled or disrupted ransomware actors in 2024

    Several major ransomware groups faced significant disruptions in 2024, though the ecosystem’s resilience limited the long-term impact. LockBit, responsible for 27.78% of attacks in 2023, was hit hard by Operation Cronos in February 2024, with law enforcement seizing its infrastructure, arresting members and unmasking its leader, Dmitry Khoroshev. However, despite these efforts, LockBit relaunched its operations and remained active throughout 2024.

    ALPHV/BlackCat, another prolific group, was dismantled after an FBI operation in December 2023, though affiliates migrated to other groups such as RansomHub. The Radar/Dispossessor operation was disrupted by the FBI in August 2024, and German authorities seized 47 cryptocurrency exchanges linked to ransomware laundering. Despite these takedowns, groups like RansomHub and Play quickly filled the void, underscoring the challenge of eradicating ransomware networks. However, according to the latest research, the RansomHub group presumably paused their operations as of April 1, 2025.

    Some groups disappear, others pick up their work

    When ransomware groups disband or disappear, their tools, tactics and infrastructure often remain accessible in the cybercriminal ecosystem, allowing other groups to adopt and enhance them. For example, groups like BlackMatter or REvil, after facing pressure from law enforcement, saw their code and methods reused by successors like BlackCat, which in turn was followed by Cicada3301. Disappearing groups may also sell their source code, exploit kits or affiliate models on dark web forums, enabling emerging or existing gangs to repurpose these resources. In addition, malicious tools are sometimes leaked to the internet, as was the case with LockBit 3.0. As a result, many smaller groups or individuals unrelated to the ransomware developers, including hacktivists and low-skilled cybercriminals, get hold of these tools and use them for their own purposes. This cycle of knowledge transfer accelerates the evolution of ransomware as new actors build on proven strategies, adapt to countermeasures, and exploit vulnerabilities faster than defenders can respond. In telemetry, these new groups using old toolkits can be identified as old groups (e.g., LockBit).

    Ransomware groups increasingly developing their own custom toolkits

    This is done to increase the effectiveness of their attacks and avoid detection. These toolkits often include exploitation tools, lateral movement tools, password attack tools, etc. that are tailored to specific targets or industries. By creating proprietary tools, these groups reduce their reliance on widely available, detectable exploits and maintain control over their operations. This in-house development also facilitates frequent updates to counter defenses and exploit new vulnerabilities, making their attacks more resilient and harder for cybersecurity measures to mitigate.

    General vs. targeted ransomware share

    Targeted ransomware attacks, aimed at specific organizations for maximum disruption and payout, focus on high-value targets such as hospitals, financial institutions and government agencies, leveraging reconnaissance and zero-day exploits for precision. General ransomware, which spreads indiscriminately via phishing or external devices, often affects smaller businesses or individuals with weaker defenses. The focus on targeted attacks reflects cybercriminals’ preference for larger ransoms, though general ransomware persists due to its low-effort, high-volume potential.

    According to Kaspersky research, RansomHub was the most active group executing targeted attacks in 2024, followed by Play.

    Each group’s share of victims according to its data leak site (DLS) as a percentage of all reported victims of all groups during the period under review (download)

    AI tools used in ransomware development (FunkSec)

    FunkSec emerged as a ransomware group in late 2024 and quickly gained notoriety, claiming multiple victims in December alone and outpacing established groups like Cl0p and RansomHub. Operating on a Ransomware-as-a-Service (RaaS) model, FunkSec employs a double extortion tactic that combines data encryption with exfiltration. The group targets sectors such as government, technology, finance and education in countries including India, Spain and Mongolia.

    FunkSec is notable for its heavy reliance on AI-assisted tools, particularly in malware development. Its ransomware features AI-generated code with comments that are perfect from a language perspective, suggesting the use of large language models (LLMs) to streamline development and evade detection. Unlike typical ransomware groups that demand millions, FunkSec’s ransoms are unusually low, adopting a high-volume, low-cost approach.

    Bring Your Own Vulnerable Driver attacks continue

    Bring Your Own Vulnerable Driver (BYOVD) is an increasingly prevalent technique used in ransomware attacks to bypass security defenses and gain kernel-level access on Windows systems.

    With BYOVD, attackers deploy a legitimate but vulnerable driver – often digitally signed by a trusted vendor or Microsoft – on a target system. These drivers, which operate at the kernel level (ring 0) with high privileges, contain exploitable flaws that allow attackers to disable security tools, escalate privileges or execute malicious code undetected. By leveraging signed drivers, attackers can evade Windows’ default security checks.

    Although BYOVD is an advanced technique, there is a range of open-source tools like EDRSandblast and Backstab that lower the technical barriers and simplify such attacks. According to the Living Off The Land Drivers (LOLDrivers) project, hundreds of exploitable drivers are known, highlighting the scale of the problem. Attackers continue to find new vulnerable drivers, and tools like KDMapper allow mapping of unsigned drivers into memory via BYOVD, complicating defenses.

    Share of users whose computers were attacked by crypto-ransomware, by region. Data from Kaspersky Security Network (download)

    In the Middle East and Asia-Pacific regions, ransomware affected a higher share of users due to rapid digital transformation, expanding attack surfaces and varying levels of cybersecurity maturity. Enterprises in APAC were heavily targeted, driven by attacks on infrastructure and operational technology, especially in countries with growing economies and new data privacy laws.

    Ransomware is less prevalent in Africa due to lower levels of digitization and economic constraints, which reduce the number of high-value targets. However, as countries like South Africa and Nigeria expand their digital economies, ransomware attacks are on the rise, particularly in the manufacturing, financial and government sectors. Limited cybersecurity awareness and resources leave many organizations vulnerable, though the smaller attack surface means the region remains behind global hotspots.

    Latin America also experiences ransomware attacks, particularly in countries like Brazil, Argentina, Chile and Mexico. Manufacturing, agriculture, and retail, as well as critical sectors such as government and energy are targeted, but economic constraints and smaller ransoms deter some attackers. The region’s growing digital adoption is increasing exposure. For example, NightSpire ransomware compromised Chilean company EmoTrans, a logistics company serving key industries in Chile such as mining, agriculture and international trade. The group first appeared in March 2025, and attacked government institutions, manufacturers and other companies in various parts of the world. Like many other groups, NightSpire uses the double extortion strategy and has its own data leak site (DLS).

    The Commonwealth of Independent States (CIS) sees a smaller share of users encountering ransomware attacks. However, hacktivist groups like Head Mare, Twelve and others active in the region often use ransomware such as LockBit 3.0 to inflict damage on target organizations. Manufacturing, government, and retail are the most targeted sectors, with varying levels of cybersecurity maturity across the region affecting security.

    Europe is confronted with ransomware, but benefits from robust cybersecurity frameworks and regulations that deter some attackers. Sectors such as manufacturing, agriculture, and education are targeted, but mature incident response and awareness limit the scale of attacks. The region’s diversified economies and strong defenses make it less of a focal point for ransomware groups than regions with rapid, less secure digital growth.

    For example, RansomHub claimed responsibility for a 2024 attack on Kawasaki’s European offices, disrupting operations across multiple countries. The breach compromised customer and operational data, affecting supply chains for Kawasaki’s motorcycle and industrial products in Europe. The regional impact was significant in countries such as Germany and the Netherlands, where Kawasaki has a strong market presence, highlighting vulnerabilities in Europe’s manufacturing sector.

    Change in the share of users whose computers were attacked by crypto-ransomware, by region, 2024 compared to 2023. Data from Kaspersky Security Network (download)

    Emerging threats and future outlook

    Looking ahead to 2025, ransomware is expected to evolve by exploiting unconventional vulnerabilities, as demonstrated by the Akira gang’s use of a webcam to bypass endpoint detection and response systems and infiltrate internal networks. Attackers are likely to increasingly target overlooked entry points like IoT devices, smart appliances or misconfigured hardware in the workplace, capitalizing on the expanding attack surface created by interconnected systems. As organizations strengthen traditional defenses, cybercriminals will refine their tactics, focusing on stealthy reconnaissance and lateral movement within networks to deploy ransomware with greater precision, making it harder for defenders to detect and respond in time.

    Ransomware groups are also likely to escalate their extortion strategies, moving beyond double extortion to more aggressive approaches such as threatening to leak sensitive data to regulators, competitors or the public. The Ransomware-as-a-Service model will continue to thrive, allowing less-skilled actors to launch sophisticated attacks by purchasing access to pre-built tools and exploit kits. Geopolitical tensions may further drive hacktivism and state-sponsored ransomware campaigns targeting critical assets, such as energy grids or healthcare systems, as part of hybrid warfare. Smaller organizations with limited cybersecurity budgets will face heightened risks as attackers exploit their weaker defenses. To adapt, businesses must adopt zero-trust security models, secure IoT ecosystems and prioritize employee training to mitigate phishing and social engineering threats.

    The proliferation of large language models (LLMs) tailored for cybercrime will further amplify ransomware’s reach and impact. LLMs marketed on the dark web lower the technical barrier to creating malicious code, phishing campaigns and social engineering attacks, allowing even less-skilled actors to craft highly convincing lures or automate ransomware deployment. As more innovative concepts such as RPA (Robotic Process Automation) and LowCode, which provide an intuitive, visual, AI-assisted drag-and-drop interface for rapid software development, are quickly adopted by software developers, we can expect ransomware developers to use them to automate their attacks as well as new code development, making the ransomware threat even more prevalent.

    Recommendations

    To effectively counter ransomware in 2025, organizations and individuals must adopt a multi-layered defense strategy that addresses the evolving tactics of groups like FunkSec, RansomHub and others that leverage AI, Bring Your Own Vulnerable Driver (BYOVD) and double extortion.

    Prioritize proactive prevention through patching and vulnerability management. Many ransomware attacks exploit unpatched systems, so organizations should implement automated patch management tools to ensure timely updates for operating systems, software and drivers. For Windows environments, enabling Microsoft’s Vulnerable Driver Blocklist is critical to thwarting BYOVD attacks. Regularly scan for vulnerabilities and prioritize high-severity flaws, especially in widely used software like Microsoft Exchange or VMware ESXi, which were increasingly targeted by ransomware in 2024.

    Strengthen endpoint and network security with advanced detection and segmentation. Deploy robust endpoint detection and response solutions such as Kaspersky NEXT EDR to monitor for suspicious activity like driver loading or process termination. Network segmentation is equally important – limit lateral movement by isolating critical systems and using firewalls to restrict traffic. Implement a zero-trust architecture that requires continuous authentication for access.

    Invest in backups, training and incident response planning. Maintain offline or immutable backups that are tested regularly to ensure rapid recovery without paying a ransom. Backups should cover critical data and systems and be stored in air-gapped environments to resist encryption or deletion. User education is essential to combat phishing, which remains one of the top attack vectors. Conduct simulated phishing exercises and train employees to recognize AI-crafted emails used by FunkSec and others for stealth. Kaspersky GERT can help develop and test an incident response plan to minimize potential downtime and costs.

    The recommendation to not pay a ransom remains robust, especially given the risk of unavailable keys due to dismantled infrastructure, affiliate chaos or malicious intent, as seen in the 2024 disruptions. By investing in backups, incident response and preventive measures like patching and training, organizations can avoid funding criminals and mitigate the impact. Kaspersky also offers free decryptors for certain ransomware families. If you get hit by ransomware, check to see if there is a decryptor available for the ransomware family used in your case. Note that even if one isn’t available right now, it may be added later.

    MIL OSI Economics

  • MIL-OSI USA: California Man Sentenced to 12 Years’ Imprisonment in Connection with $17M Medicare Fraud Schemes

    Source: US State of North Dakota

    A California man was sentenced yesterday to 12 years in prison and three years of supervised release for his role in a years-long scheme to defraud Medicare of more than $17 million through sham hospice companies and his home health care company.

    According to court documents, Petros Fichidzhyan, 44, of Granada Hills, schemed with others to bill Medicare for hospice services that were not medically necessary and never provided. Fichidzhyan and his co-schemers controlled hospice entities and used foreign nationals’ personal identifying information (PII) to conceal the scheme, using the PII to, among other things, open bank accounts, submit information to Medicare, and sign property leases. The defendant and his co-schemers also misappropriated the names and PII of several doctors, two of whom were deceased, to fraudulently bill Medicare for purported hospice services. Medicare paid the sham hospices nearly $16 million, of which Fichidzhyan received nearly $7 million, with more than $5.3 million laundered through a dozen shell and third-party bank accounts. Fichidzhyan also obtained more than $1 million in false claims paid to his home health care agency, which fraudulently used a doctor’s name and identifying information as having certified Medicare beneficiaries for home health care. When the doctor confronted Fichidzhyan about the fraud, Fichidzhyan attempted to cover up the scheme by paying the doctor $11,000.

    Fichidzhyan pleaded guilty to health care fraud, aggravated identity theft, and money laundering in February 2025. At sentencing, he was also ordered to pay $17,129,060 in restitution, and the court preliminarily ordered the forfeiture of a home bought with fraudulent proceeds. The government has seized $2,920,383 from bank accounts associated with the fraud. The sentence imposed today is the most recent step in the Justice Department’s ongoing effort to combat hospice fraud in the greater Los Angeles area.

    “For years, the defendant, working with others, ran multiple sham hospice and home health care schemes, fraudulently billing Medicare over $17 million,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “The defendant’s egregious scheme relied on layers of deception and sophisticated money laundering, and wasted millions in taxpayer money. With the help of our law enforcement partners, the Department of Justice is fully committed to stopping these criminal networks and protecting the public fisc.”

    “Health care fraud is not a victimless crime. Defrauding the Medicare program not only wastes valuable taxpayer dollars, it causes significant harm to enrollees,” said Acting Special Agent in Charge Omar Pérez Aybar at the U.S. Department of Health and Human Services, Office of Inspector General (HHS-OIG) Los Angeles Regional Office. “HHS-OIG, in collaboration with our law enforcement partners, will continue to investigate and hold accountable those who defraud federal health care programs.”

    “Mr. Fichidzhyan lined his pockets at the expense of the American taxpayer,” said Akil Davis, the Assistant Director in charge of the FBI’s Los Angeles Field Office. “The level of fraud and exploitation committed by the defendant is astounding and I’m proud of our investigators and prosecutors who were able to detect his schemes and hold him accountable.”

    The FBI and HHS-OIG are investigating the case.

    Trial Attorneys Eric C. Schmale and Sarah E. Edwards of the Criminal Division’s Fraud Section are prosecuting the case.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Force Program. Since March 2007, this program, currently comprised of nine strike forces operating in 27 federal districts, has charged more than 5,800 defendants who collectively have billed federal health care programs and private insurers more than $30 billion. In addition, the Centers for Medicare & Medicaid Services, working in conjunction with HHS-OIG, are taking steps to hold providers accountable for their involvement in health care fraud schemes. More information can be found at www.justice.gov/criminal-fraud/health-care-fraud-unit.

    MIL OSI USA News

  • MIL-OSI USA: Largest Fentanyl Bust in DEA History: Authorities Seize Over 400 Kilograms of Fentanyl in Record-Shattering Operation

    Source: US State of North Dakota

    Federal authorities have arrested 16 individuals and seized record-breaking quantities of fentanyl, cash, firearms, and vehicles across multiple states, dismantling one of the largest and most dangerous drug trafficking organizations in U.S. history.

    “This historic drug seizure, led by the DEA, is a significant blow against the Sinaloa Cartel that removes poison from our streets and protects American citizens from the scourge of fentanyl,” said Attorney General Pamela Bondi. “This Department of Justice will continue working with our law enforcement partners to dismantle every cartel network operating illegally in the United States.”

    As part of this operation, law enforcement executed coordinated search warrants across five states, resulting in the following seizures:

    Albuquerque, NM:

    • Approximately $610,000 in U.S. currency
    • 49 firearms, some with switches, and some ghost guns
    • 396 kilograms of fentanyl pills
    • 11.5 kilograms of fentanyl powder
    • 1.5 kilograms of cocaine
    • 3.5 kilograms of heroin
    • 7 pounds of methamphetamine
    • A Ford Raptor and GMC Denali Two vehicles valued at approximately $140,000
    Guns seized in Albuquerque, New Mexico

    Salem, OR:

    • More than $2.8 million in U.S. currency
    • Jewelry valued at approximately $50,000
    • A Mercedes AMG and Ford F-150 Shelby valued at approximately $150,000
    Cash seized in Salem, Oregon

    Layton, UT:

    • Approximately $780,000 in U.S. currency
    • A Dodge TRX Mammoth valued at approximately $150,000

    Phoenix, AZ:

    • Approximately $390,000 in U.S. currency
    • 72 pounds of methamphetamine
    • 13 kilograms of fentanyl pills
    • 2.4 pounds of heroin
    • 5 kilograms of cocaine.

    Las Vegas, NV:

    • Illegal alien apprehended and removed
    • More than $93,000 in U.S. currency
    • 2.7 kilograms of cocaine
    • 1 pound of methamphetamine

    “Our communities are safer today because of the tireless dedication and coordination among federal, state, tribal, and local law enforcement,” said U.S. Attorney Ryan Ellison for the District of New Mexico. “By dismantling one of the largest and most dangerous fentanyl trafficking organizations in U.S. history, we have removed millions of lethal doses from our streets and sent a clear message: those who profit from poisoning our citizens will be held accountable. The fight continues, but this operation marks a decisive step in protecting families across the western United States.”

    “Behind the three million fentanyl pills we seized are destructive criminal acts thwarted and American lives saved. This wasn’t just a bust—it was a battlefield victory against a terrorist-backed network pumping death into our cities,” said DEA Acting Administrator Robert Murphy. “This case represents DEA’s largest single seizure of fentanyl pills to date. I commend the men and women of DEA for their extraordinary work, day in and day out, and I remind the cartels that DEA is relentlessly in pursuit and will not stop until we destroy your networks.”

    Heriberto Salazar Amaya, 36, is the leader of the drug trafficking organization. He, along with Cesar Acuna-Moreno, 27, Bruce Sedillo, 26, Vincent Montoya, 35, Francisco Garcia, 27, David Anesi, 42, George Navarette-Ramirez, 25, Alex Anthony Martinez, Jose Luis Marquez, Nicholas Tanner, Brian Sanchez, Kaitlyn Young, Alan Singer, and David Altamirano Lopez are charged with conspiracy to distribute fentanyl.

    Seven defendants face additional charges of distributing fentanyl: Cesar Acuna-Moreno, Brian Sanchez, Kaitlyn Young, Alan Singer, Bruce Sedillo, Francisco Garcia, and Nicholas Tanner.

    Jose Luis Marquez and Bruce Sedillo are each charged with possession with intent to distribute fentanyl.

    Bruce Sedillo is also charged with possession of a firearm in furtherance of a drug trafficking crime.

    Heriberto Salazar Amaya faces three additional immigration-related charges: illegal reentry after deportation, hiring an unauthorized alien, and conspiracy to harbor unauthorized aliens.

    During the operation, three additional individuals were arrested and charged by criminal complaint:

    • Phillip Lovato, 39: On April 29, agents seized approximately 110,000 fentanyl pills from Lovato’s stash house in Santa Fe, New Mexico. Lovato is charged with possession with intent to distribute 400 grams and more of fentanyl and conspiracy to commit drug trafficking.
    Cash and Drugs seized in Santa Fe, New Mexico
    • Roberta Herrera, 31; On April 28, agents seized approximately 365,000 pills fentanyl pills, 1,543.5 grams of heroin, 569.9 grams of cocaine, and 24 firearms from Herrera’s apartment. Agents also encountered a minor child at the location. Herrera is charged with possession with intent to distribute 400 grams and more of fentanyl, possession with intent to distribute 1 kilogram or more of heroin, possession with intent to distribute 500 grams and more of a mixture and substance containing a detectable amount of cocaine, conspiracy to commit drug trafficking, and using and carrying a firearm during and in relation to a drug trafficking crime.
    • Misael Lopez Rubio, 25; on April 28, agents seized approximately 165.5 kilograms of fentanyl pills from a storage unit rented by Lopez Rubio. He is charged with possession with intent to distribute 400 grams and more of fentanyl and conspiracy to commit drug trafficking.
    Drugs seized in Albuquerque, NM

    U.S. Attorney Ryan Ellison for the District of New Mexico and Special Agent in Charge Omar Arellano of the Drug Enforcement Administration’s El Paso Division, made the announcement today.

    The DEA’s El Paso Division investigated this case with assistance from the IRS Criminal Investigation. The following law enforcement agencies participated in the law enforcement operation: Albuquerque Police Department, Bernalillo County Sheriff’s Office, Lea County Drug Task Force, United States Marshals Service, Federal Bureau of Investigation, Bernalillo County District Attorney’s Office, Isleta Police Department, Laguna Pueblo Police Department, Pojoaque Police Department and Sandoval County Sheriff’s Department.

    Assistant U.S. Attorneys Matthew McGinley, Blake Nichols and Raquel Ruiz-Velez for the District of New Mexico are prosecuting the case with assistance from the U.S. Attorney’s Office for the District of Oregon, U.S. Attorney’s Office for the District of Arizona, and U.S. Attorney’s Office for the District of Utah.

    This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations (TCOs), and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces (OCDETF) and Project Safe Neighborhoods (PSN).

    View the Indictment

    View the Motion to Detain

    View Lovato’s Criminal Complaint

    View Herrera’s Criminal Complaint

    View Lopez Rubio’s Criminal Complaint

    An indictment or criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI USA: Scalise Statement on 2017 Congressional Baseball Shooting Report

    Source: United States House of Representatives – Congressman Steve Scalise (1st District of Louisiana)

    WASHINGTON, D.C. — Today, House Majority Leader Steve Scalise (R-La.) issued a statement after the House Permanent Select Committee on Intelligence released their report on the FBI’s Conclusions on the 2017 Congressional Baseball Shooting. This follows FBI Director Kash Patel providing a review of the FBI case file to the Committee, after years of previous FBI leadership dodging transparency and accountability. “This report definitively shows the FBI completely mishandled the investigation into the Congressional baseball shooting of 2017 – ignoring crucial and obvious facts in order to sell a false narrative that the shooting was not politically motivated. I want to thank FBI Director Kash Patel, Chairman Rick Crawford, and the staff of the House Permanent Select Committee on Intelligence for finally getting to the truth of the matter: this was a deliberate and planned act of domestic terrorism toward Republican Members of Congress.“I encourage Director Patel to adopt the recommendations of the Committee to ensure the intelligence community is rid of bias and to identify who was responsible for the misleading and incorrect conclusions and why, and ensure the FBI gets back to its mission of following the facts, wherever they may lead.” Click here to view the report. 

    MIL OSI USA News

  • MIL-OSI Security: Bradenton Man Sentenced To 10 Years In Federal Prison For Receiving And Possessing Child Sexual Abuse Material

    Source: Office of United States Attorneys

    Tampa, Florida – U.S. District Judge James S. Moody has sentenced Christopher Clark (53, Bradenton) to 10 years in federal prison for receiving and possessing child sexual abuse material. Clark entered a guilty plea on January 22, 2025.

    According to court documents, the FBI executed a search warrant at Clark’s home in September 2024. During the search, the FBI seized approximately 45 electronic devices. A review of several of those devices showed that Clark had received and possessed thousands of photos and videos of child sexual abuse material.

    This case was investigated by the Federal Bureau of Investigation, with assistance from the Manatee County Sheriff’s Office, the Bradenton Police Department, and the Sarasota Police Department. It was prosecuted by Assistant United States Attorney Ross Roberts.

    This case was brought as part of Project Safe Childhood, a nationwide initiative launched in 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    MIL Security OSI

  • MIL-OSI Security: Registered Sex Offender Sentenced to 12 Years in Federal Prison for Using Instagram to Prey on Minors

    Source: Office of United States Attorneys

    EVANSVILLE— William Virgil Russell, II, 33, of Evansville, has been sentenced to 12 years in federal prison followed by a lifetime of supervised release after pleading guilty to possession of sexually explicit material involving minors.   

    According to court documents, on April 3, 2023, social media application, Instagram, reported that an account owned by William V. Russell had accessed at least one video suspected of containing child sexual abuse material. The video depicted an adult male attempting to rape a prepubescent minor female.

    Working with Instagram to review the account, law enforcement investigators found additional child sexual abuse material, as well as posts by Russell soliciting underage videos that stated, “Looking for freaks with young kids or siblings that need $$” and “Looking for under l2 to buy from hit me up.”

    On September 26, 2023, investigators searched Russell’s home in Evansville and recovered his cellphone. Further investigation uncovered 21 sexually explicit images involving minors, as well as numerous chat session transcripts in which Russell describes himself as a pedophile, says he prefers toddlers, and asks women to provide him with nude and sexually explicit images of their children. Russell often offered to pay for the images.

    At the time of the offenses described above, Russell was a registered sex offender based on a felony conviction for Possession of Child Sexual Abuse Material in Warrick County, Indiana. Following his release, Russell must continue to remain registered as a sex offender wherever he lives, works, or goes to school.

    “Every parent should know that social media apps like Instagram are not safe spaces for young children and are often hunting grounds for predators who seek gratification from their exploitation,” said John E. Childress, Acting United States Attorney for the Southern District of Indiana. “I commend the investigators with FBI, Evansville PD, and the efforts of our AUSA for working together to ensure more vulnerable individuals are not victimized.”

    The FBI and Evansville Police Department investigated this case. The sentence was imposed by U.S. District Judge Richard L. Young

    Acting U.S. Attorney Childress thanked Assistant U.S. Attorney Todd S. Shellenbarger, who prosecuted this case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by U.S. Attorneys’ Offices and the Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend and prosecute individuals who exploit children via the internet, as well as to identify and rescue victims.

    If you are a victim of child sexual exploitation, please contact your local police department. Resources for victims of child exploitation can be found on our website at https://www.justice.gov/usao-sdin/project-safe-childhood

    ###

    MIL Security OSI

  • MIL-OSI Security: Minnesota State Trooper Charged with Production of Child Pornography

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    ST. PAUL – Minnesota State Trooper Jeremy Francis Plonski was charged by criminal complaint today in U.S. District Court with one count of production of child pornography, announced Acting U.S. Attorney Lisa D. Kirkpatrick.  Plonski has been arrested on a federal warrant and remains in custody pending a detention hearing.  Plonski faces a mandatory minimum of fifteen years in prison if convicted.  

    “The U.S. Attorney’s Office has zero tolerance for public officials who violate federal laws—particularly those laws that protect vulnerable children from sexual abuse,” said Acting U.S. Attorney Lisa D. Kirkpatrick. “Plonski took an oath to protect and serve our community. While donning his uniform, Plonski committed one of the most vile and predatory offenses imaginable. This is abhorrent—to Minnesota as a whole and to our law enforcement community in particular. I am proud of the swift and decisive action of law enforcement, who responded immediately and worked cooperatively to take Plonski into custody.”  

    “The conduct alleged in this case is horrifying and a gross betrayal of public trust,” said Special Agent in Charge Alvin M. Winston Sr. of FBI Minneapolis. “Law enforcement officers are sworn to protect the most vulnerable among us — not exploit them. When someone in a position of authority commits such an egregious and despicable crime, the damage extends beyond the victim — it shakes the very foundation of our communities’ trust. The FBI and our partners will not hesitate to investigate and bring to justice anyone who preys on children, no matter their badge or title.”

    “The Bureau of Criminal Apprehension is committed to working with our federal, state and local partners to identify and hold accountable those who sexually abuse children,” BCA Superintendent Drew Evans said. “We will pursue anyone who wishes to harm children in our communities.”

    The U.S. Attorney’s Office thanks the FBI for their investigation and hard work, as well as the Minnesota Bureau of Criminal Apprehension and the Shakopee Police Department.  The U.S. Attorney’s Office also thanks the Minnesota State Patrol for their work and assistance in safely apprehending the defendant.  

    Assistant U.S. Attorney Daniel W. Bobier is prosecuting the case.

    A complaint is merely an allegation, and the defendant is presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: Federal Jury Finds Minneapolis Felon Guilty of Illegal Firearms and Machinegun Possession

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    ST. PAUL, Minn. – A federal jury convicted Clenest Demon Wells, Jr. of illegal possession of a firearm as a felon and unlawful possession of a machinegun, announced Acting U.S. Attorney Lisa D. Kirkpatrick.

    According to court documents and evidence presented at trial, Clenest Demon Wells, 28, was repeatedly caught illegally carrying firearms. Because Wells has multiple prior felony convictions, he is prohibited from possessing firearms or ammunition.

    On April 6, 2020, law enforcement officers responded to reports in Minneapolis of a passenger wearing a black vest and greyish winter hat on a Metro Transit bus threatening another passenger with a firearm. Law enforcement officers located and boarded the Metro Transit bus at the intersection of Penn and Lowry Avenue North, identified a passenger who closely fit the description, and conducted a pat-down search. The passenger was later identified as Wells, who was found in possession of a black HiPoint 9-millimeter semi-automatic pistol.

    On May 23, 2022, Minneapolis Police Department officers on patrol observed a Pontiac G6 speeding through a residential area and conducted a traffic stop. Wells was the driver and sole occupant of the vehicle. Officers smelled and observed marijuana in the car, initiated a search, and found Wells in possession of a black Springfield Model XD9 9-millimeter semi-automatic pistol.

    On July 30, 2023, law enforcement responded to calls reporting a fight and an individual with a gun in a parking lot at Hennepin Avenue and 5th Street in downtown Minneapolis. Upon arrival, bystanders reported that one of the involved individuals—later identified as Wells—had a gun. As officers approached, Wells turned to walk away, ignoring orders to stop. Wells was subsequently found to be in possession of a Glock model 17 9-millimeter handgun equipped with an auto-sear, commonly called a “switch,” which enabled the Glock pistol to operate as a fully automatic machinegun. Test firing conducted by the Federal Bureau of Investigation showed that the Glock pistol equipped with a switch possessed by Wells could fire ten rounds in less than one second.  

    “Today’s conviction holds Wells accountable for the fear and violence he has inflicted on the community for far too long,” said Acting U.S. Attorney Lisa D. Kirkpatrick. “The U.S. Attorney’s Office remains steadfast in its commitment to prevent violent crime.”

    “Possession of a firearm modified to function as a machine gun in a public space could have had tragic consequences,” said Special Agent in Charge Alvin M. Winston Sr. of the FBI Minneapolis. “Protecting our communities from violence is a top priority, and we are committed to working with our partners to stop those who put innocent lives at risk.”

    After a three-day trial before Judge Donovan W. Frank in U.S. District Court, Wells was convicted on three counts of illegal possession of firearms as a felon and one count of unlawful possession of a machinegun. A sentencing hearing will take place at a later date.

    This case is the result of an investigation by the FBI, the Minneapolis Police Department, the Metro Transit Police Department, the Minnesota Bureau of Criminal Apprehension, and the Bureau of Alcohol, Tobacco, Firearms, and Explosives.

    Assistant U.S. Attorneys David Green and Syngen Kanassatega tried the case.
     

    Federal Jury Finds Minneapolis Felon Guilty of Illegal Firearms and Machinegun Possession

    MIL Security OSI

  • MIL-OSI Security: SDTX Continues Efforts to Protect the Border with 259 More Charged in Immigration-Related Crimes

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)

    HOUSTON – A total of 256 cases have been filed from April 25-May 1 in matters aimed at securing the southern border, announced U.S. Attorney Nicholas J. Ganjei. 

    As part of the cases, 83 face allegations of illegally reentering the country. The majority have prior felony convictions for narcotics, firearms, sexual or violent offenses, prior immigration crimes and more. A total of 160 people face charges of illegally entering the country, while 13 cases allege various instances of human smuggling with the remainder involving other immigration-related crimes.  

    Those charged by criminal complaint include three Mexican nationals found in the McAllen area who are alleged to be here illegally. The charges allege Luciano Ojeda had been sentenced to two years for robbery before his removal, while Sergio Salazar-Gonzalez and Maria Del Carmen Gutierrez-Perez have convictions for driving while intoxicated (3rd offense) and injury to child/elderly/disabled persons with intent of causing bodily injury, respectively, before they were removed from the United States.

    In addition to the new cases filed, two adult Guatemalan citizens were indicted for making false statements about their age in their juvenile immigration cases. Tadeo Pedro Torres and Marvin Ixcoy-Ajqui claimed they were unaccompanied minors after they entered the United States illegally. As a result, they were allegedly transferred to juvenile shelters contracted to provide care for children in the United States for whom there is no parent or legal guardian with the ability to provide custody. However, the charges allege they were adults and had provided a false date of birth and age.

    A Houston federal jury also convicted a conspirator involved in transporting aliens shot en route. Mailon Almendares-Martinez recruited conspirators who picked up the aliens near the border. On the way to Houston, individuals believed to be a part of a rival alien smuggling organization had shot at them, resulting in gunshot wounds to the arm and leg. After the shooting, Almendares-Martinez told the co-conspirators to return to Houston and not seek medical attention for the two wounded aliens. He now faces up to 10 years in federal prison.

    “This case demonstrates—like so many cases before it—that human smuggling is an inhumane, dangerous, and sometimes fatal business,” said Ganjei. “Those that smuggle human beings for profit deserve prosecution, and those that would willingly place themselves in a situation to be smuggled need to think twice. Stay home, stay safe.”

    In Corpus Christi, Louis Dante Anthony received a 30-month sentence for smuggling three dozen illegal aliens in an 8 by 4.25-foot false compartment. The illegal aliens had no access to air, could not be heard from the outside and were unable to get themselves out of the compartment. All were from the countries of Ecuador, Colombia, Guatemala, El Salvador, Honduras and Mexico.

    In Laredo federal court, an illegal alien pleaded guilty to assault of an officer, admitting he struck the agent’s body and face repeatedly while attempting to flee. A Border Patrol (BP) agent had transported Marco Cupil-Hernandez to a local hospital for emergency care after he had waded across the Rio Grande River. Once cleared, the agent attempted to assist him into the vehicle. Cupil-Hernandez then forcefully pushed him away and attempted to flee, resulting in a struggle on the concrete during which Cupil-Hernandez elbowed the agent’s face. He faces up to 20 years in federal prison.

    Also announced this week was the sentencing of two felons in McAllen for illegally reentering the United States. Porfirio Martinez-Santos, Mexico, was ordered to serve 42 months, while Juan Esteban Zelaya-Hernandez, Honduras, received 21 months. The investigation revealed Zelaya-Hernandez had been ordered removed in August 2024 after serving a federal prison sentence for possession of a firearm by a felon and illegal reentry. Martinez-Santos was removed in 2023 and had previously served a 37-month sentence for illegal reentry.

    Another Mexican citizen with a felony criminal history was sentenced for illegally reentering the United States after eight previous removals. Julio Cesar Corona-Corona will now serve 37 months in federal prison. In handing down the sentence, the court noted that despite prior court warnings not to do so, Corona-Corona was determined to unlawfully reenter the United States, as evidenced by his repeated encounters with immigration authorities. He was first removed from the United States in January 2014 and returned illegally eight times between 2014 and April 2020. In fact, authorities had removed him six times alone between 2017-2018.

    In Brownsville, a 42-year-old man from Aldamas, Tamaulipas, Mexico, was also sentenced for illegal reentry into the United States. Alfredo Balderas-Rivera was first removed in 2016 with a subsequent removal in 2018 and 2023. However, authorities found Balderas-Rivera in Cameron County March 30, 2024. He had been in custody for allegedly committing fraud and assault and bodily injury. He received a 50-month sentence in Brownsville federal court.

    These cases were referred or supported by federal law enforcement partners, including Immigration and Customs Enforcement (ICE) – Homeland Security Investigations, ICE – Enforcement and Removal Operations, BP, Drug Enforcement Administration, FBI, U.S. Marshals Service and Bureau of Alcohol, Tobacco, Firearms and Explosives with additional assistance from state and local law enforcement partners.

    The cases are part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces and Project Safe Neighborhood.

    Under current leadership, public safety and a secure border are the top priorities for the Southern District of Texas (SDTX). Enhanced enforcement both at the border and in the interior of the district have yielded aliens engaged in unlawful activity or with serious criminal history, including human trafficking, sexual assault and violence against children. 

    The SDTX remains one of the busiest in the nation. It represents 43 counties and more than nine million people covering 44,000 square miles. Assistant U.S. Attorneys from all seven divisions including Houston, Galveston, Victoria, Corpus Christi, Brownsville, McAllen and Laredo work directly with our law enforcement partners on the federal, state and local levels to prosecute the suspected offenders of these and other federal crimes. 

    An indictment or criminal complaint is a formal accusation of criminal conduct, not evidence. A defendant is presumed innocent unless convicted through due process of law.

    MIL Security OSI

  • MIL-OSI Security: Chester Man Sentenced for Tax Evasion, False Statements, and Illegal Gun Possession in Multimillion-Dollar Business Scheme

    Source: Federal Bureau of Investigation (FBI) State Crime News

    COLUMBIA, S.C. — Lawrencium Germaine Martin, a/k/a Germaine Martin, 47, of Chester, has been sentenced to 57 months in federal prison after pleading guilty to federal tax evasion, being a felon in possession of a firearm, and making false statements to federal investigators.

    According to evidence presented in court, from 2019 through 2021, Martin operated a business known as Lancaster Tactical Supply (LTS) through the website LTacticalSupply.com. Martin presented LTS as if it were a legitimate business that sold firearm accessories and parts, including 80% build kits, firearm slides, imitation suppressors, optics, and body armor. He also modified and customized firearms.  Build kits are products that include the component parts of an operable firearm with some parts disassembled. When the parts are combined, the product is converted into a fully functioning firearm, often without a manufacturer or serial number, making the firearm more difficult to trace.  

    At least 380 customers from 43 states complained that they were defrauded by LTS, generally reporting that LTS took their money and failed to ship the products they purchased. Martin generated substantial revenue through LTS, including more than $2 million in 2020 alone.  Although Martin personally operated LTS and deposited its proceeds into his personal bank accounts, Martin failed to pay state or federal income tax any year from 2015 through 2022. 

    Martin also evaded federal income tax by using the identity of a former employee without authorization to set LTS payment systems up in a way that caused the IRS to identify the former employee as the person who owed income tax for the business, rather than Martin.

    When agents searched Martin’s residence and business in Chester, pursuant to a federal search warrant, he was found in possession of numerous firearms – including a 5.56 x 45 mm “80%” rifle; a 9 x 19 mm “80%” pistol, with a stabilizer brace and muzzle attachment; a 9mm pistol; and another 9mm pistol loaded with 16 rounds. Only one of the firearms had a serial number. Martin had 15 prior criminal convictions at the time, many of which are felonies, which made firearm possession illegal for Martin under federal law.

    As for false statements, when agents searched his house and business, Martin told FBI agents that he had never heard of LTS, that he had never received money from LTS, and that he did not know how his name became associated with the businesses, all of which Martin knew were untrue.

    United States District Judge Joseph F. Anderson, Jr. sentenced Martin to 57 months in federal prison, the high end of the advisory guidelines, with 3 years supervision by U.S. Probation to follow. Martin was also ordered to pay $215,374.00 in restitution to the IRS.

    The case was investigated by the FBI Columbia field office, U.S. Postal Inspection Service, and IRS Criminal Investigation, with critical assistance from the Chester County Sheriff’s Department and the Rock Hill Police Department. Assistant U.S. Attorney Elliott B. Daniels is prosecuting the case.

    ###

    MIL Security OSI

  • MIL-OSI Security: One Federal Inmate and Two Georgia Residents Sentenced for Conspiring to Smuggle Methamphetamine into South Carolina Federal Prison

    Source: Federal Bureau of Investigation (FBI) State Crime News

    FLORENCE, S.C. — Jerrell Antonio Roberts, 36, a current federal inmate, Antoinette Tyeisha Ricks, 36, and Tyree O’Bryant Russell, 23, both of Savannah, Georgia, were sentenced to multi-year terms in federal prison after pleading guilty in connection with a scheme to smuggle methamphetamine into federal prison.  Russell was sentenced to two years and Ricks was sentenced to more than three years after each pleaded guilty to attempting to provide methamphetamine to a federal prisoner.  Roberts was sentenced to more than nine years after pleading guilty to attempting to possess methamphetamine as a federal prisoner.  

    Evidence presented to the court showed that in November of 2022, Roberts was incarcerated at a federal prison in South Carolina in connection with federal charges out of Georgia.  In the early morning hours of Nov. 6, 2022, an unmanned drone crashed in the yard at the prison facility.  The drone was equipped with a skyhook, which would enable it to carry something. Near where the drone crashed, law enforcement recovered a package wrapped in electronics chargers.  The package contained approximately 38 grams of pure methamphetamine. Additional investigation revealed that Roberts was working with Ricks and Russell to obtain methamphetamine for distribution in the federal prison.

    “Crime doesn’t stop when defendants enter the prison gates,” said U.S. Attorney Bryan P. Stirling for the District of South Carolina. “Contraband smuggling schemes like this are not only illegal but dangerous, and the sentences handed down today reflect the seriousness of these crimes.”

    United States District Judge Joseph Dawson, III sentenced Russell to 24 months imprisonment. Judge Dawson sentenced Ricks to 39 months of imprisonment.  Judge Dawson sentenced Roberts to 110 months of imprisonment; Roberts’s 110-month term of imprisonment will run consecutive to the term of imprisonment he was serving on the federal charges out of Georgia at the time he engaged in the attempt to smuggle methamphetamine into the federal prison in South Carolina.  All three defendants’ sentences will be followed by a three-year term of court-ordered supervision.  There is no parole in the federal system.

    This case was investigated by the Federal Bureau of Prisons and the Federal Bureau of Investigation. Assistant U.S. Attorney Katherine Flynn is prosecuting the case.

    ###

    MIL Security OSI

  • MIL-OSI Security: Gang Member Sentenced for Obstructing Justice

    Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

    JAMES GRAHAM, also known as “Little Cuz,” 25, formerly of New Haven, was sentenced today by U.S. District Judge Kari A. Dooley in Bridgeport to 57 months of imprisonment, followed by three years of supervised release, for an offense stemming from his participation in the 960 gang, a violent Waterbury street gang.

    Today’s announcement was made by Marc H. Silverman, Acting United States Attorney for the District of Connecticut; Maureen T. Platt, State’s Attorney for the Waterbury Judicial District; Anish Shukla, Acting Special Agent in Charge of the New Haven Division of the Federal Bureau of Investigation; James Ferguson, Special Agent in Charge, ATF Boston Field Division; and Waterbury Police Chief Fernando C. Spagnolo.

    According to court documents and statements made in court, in an effort to address drug trafficking and related violence in Waterbury, the FBI, ATF, and Waterbury Police have been investigating multiple Waterbury-based groups, including the 960 gang.  On September 14, 2021, a federal grand jury in Hartford returned a 36-count indictment charging Graham and 15 other 960 gang members with various offenses, including racketeering, narcotics trafficking, firearm possession, murder, attempted murder and assault, and obstruction of justice offenses.

    On November 22, 2017, 960 members Zaekwon McDaniel, Tahjay Love, and Malik Bayon shot at Clarence Lewis and Antonio Santos who were in a car at a restaurant in Waterbury.  Lewis sped from the scene at a high-rate of speed and crashed into a house at the intersection of Wolcott Street and Dallas Avenue in Waterbury.  Lewis, 22, and Santos, 20, were pronounced dead at the scene.  On October 19, 2019, Graham and Love, who were incarcerated in state custody, assaulted another inmate who they believed had reported to law enforcement Love’s role in the shooting.

    On February 14, 2024, a jury found Graham guilty of obstruction of justice, and Love, McDaniel, Bayon guilty of offenses related to their participation in 960 and the deaths of Lewis and Santos.

    Graham is currently serving a 52-year state sentence for murder, robbery, and firearm offenses related to his role in the murder of an 18-year-old victim in Hamden on November 13, 2017.  Judge Dooley ordered Graham’s federal sentence to run concurrently with his state sentence.

    Love, McDaniel, and Bayon await sentencing.

    This investigation has been conducted by the FBI’s Northern Connecticut Gang Task Force, Waterbury Police Department, ATF, and U.S. Marshals Service, with the assistance of the Southington Police Department, Watertown Police Department, New Milford Police Department, Connecticut State Police, Connecticut Department of Correction, Connecticut Forensic Science Laboratory, and the DEA Laboratory.  The case is being prosecuted by Assistant U.S. Attorneys Geoffrey M. Stone, John T. Pierpont, Jr. and Natasha M. Freismuth, and Supervisory Assistant State’s Attorney Don E. Therkildesen, Jr. and Deputy Assistant State’s Attorney Alexandra Arroyo, who were cross-designated as Special Assistant U.S. Attorneys in this matter.

    This prosecution is a part of the Justice’s Department’s Project Safe Neighborhoods (PSN) and Organized Crime Drug Enforcement Task Forces (OCDETF) programs.

    PSN is a program bringing together all levels of law enforcement and the communities they serve to reduce gun violence and other violent crime, and to make our neighborhoods safer for everyone.  For more information about Project Safe Neighborhoods, please visit www.justice.gov/psn.

    OCDETF identifies, disrupts, and dismantles drug traffickers, money launderers, gangs, and transnational criminal organizations through a prosecutor-led and intelligence-driven approach that leverages the strengths of federal, state, and local law enforcement agencies.  Additional information about the OCDETF Program can be found at https://www.justice.gov/OCDETF.

    ###

    MIL Security OSI

  • MIL-OSI Security: Career Criminal Sentenced to 17 Years After Federal Adoption from Second Judicial District Attorney’s Office

    Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

    ALBUQUERQUE – An Albuquerque man with nine prior felony convictions was sentenced to 204 months in federal prison after robbing a local Whataburger at gunpoint and firing a shot inside the restaurant to effectuate the robbery.

    There is no parole in the federal system.

    According to court records, on June 10, 2023, Jonas Brandon Sanchez, 40, entered the Whataburger in the South Valley, brandished a 9mm “ghost gun” equipped with a high-capacity magazine, and stole approximately $60. During the robbery, Sanchez fired a round into a wall when an employee walked away, endangering everyone present. The incident was captured on multiple high-resolution surveillance cameras.

    Sanchez firing gun inside restaurant
    Sanchez removing cash from drawer
    Sanchez pointing gun at employee

    On July 7, 2023, law enforcement executed a search warrant at Sanchez’s residence, recovering the firearm used in the robbery and the clothing he wore during the crime. Ballistics analysis from the ATF’s National Integrated Ballistic Information Network (NIBIN) matched the shell casing found at the scene to Sanchez’s pistol. At the time of the offense, Sanchez was a nine-time convicted felon.

    Upon his release from prison, Sanchez will be subject to five years of supervised release.

    U.S. Attorney Ryan Ellison and Bernalillo County District Attorney Sam Bregman made the announcement today.

    The Bernalillo County Sheriff’s Office and Federal Bureau of Investigation’s Albuquerque Field Office investigated this case with assistance from the Albuquerque Police Department and Bureau of Alcohol, Tobacco, Firearms, and Explosives. Special Assistant U.S. Attorney Peter Haynes is prosecuting this case as part of an agreement with the Second Judicial District Attorney’s Office.

    Through the agreement, Assistant District Attorneys are designated Special Assistant United States Attorneys (SAUSAs) in the United States Attorney’s Office. The SAUSA from the Second Judicial District Attorney’s Office screens felony criminal complaints filed in Bernalillo County for federal criminal offenses, prioritizing federal charges against those who drive violence in the Albuquerque metropolitan area. Since 2020, the United States Attorney’s Office has reviewed almost 3,000 cases and has charged more than 300 criminal cases pursuant to this program.

    The United States Attorney’s Office has similar agreements with the New Mexico Department of Justice and the First Judicial District Attorney’s Office and plans to expand the program throughout the state. 

    MIL Security OSI

  • MIL-OSI Security: Illegal Alien Caught Attempting to Export Stolen Vehicles for Cartel

    Source: Federal Bureau of Investigation FBI Crime News (b)

    McALLEN, Texas – A 19-year-old Mexican national has been arrested for his alleged role in attempting to export a stolen vehicle, announced U.S. Attorney Nicholas J. Ganjei.

    Angel David Salas-Herrera is set to make his initial appearance before U.S. Magistrate Judge Nadia S. Medrano at 10 a.m. 

    The criminal complaint alleges that on May 2, law enforcement observed a Jeep Gladiator in Cameron County that had been reported stolen from Edinburg. They attempted to conduct a traffic stop, but the driver refused to yield, and a chase ensued, according to the charges. It ended as the vehicle allegedly collided near a residence in Brownsville. 

    Salas-Herrera was the passenger, according to the allegations. During a search of the Gladiator, law enforcement allegedly found multiple key fobs and a device utilized to program them. 

    The charges allege the Gladiator was intended to be exported to Mexico for the Gulf Cartel. Law enforcement was also able to recover two additional stolen vehicles that were allegedly intended for the same purpose.  

    Salas-Herrera is charged with export of stolen motor vehicles. If convicted, he faces up to 10 years in federal prison. He could also be ordered to pay up to a $250,000 fine.  

    This case is part of Organized Crime Drug Enforcement Task Forces (OCDETF) Operation Cocina de Caldo. The FBI, Immigration and Customs Enforcement-Homeland Security Investigations are conducting the investigation with the assistance of Customs and Border Protection, Border Patrol, Texas Department of Public Safety, sheriff’s offices in Hidalgo and Cameron Counties and police departments in McAllen, Mission, Pharr, Brownsville, Edinburg and Rancho Viejo. Assistant U.S. Attorneys Roberto Lopez Jr. and Sarina DiPiazza are prosecuting the case.

    The OCDETF operation is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s OCDETF and Project Safe Neighborhoods.

    A criminal complaint is a formal accusation of criminal conduct, not evidence. A defendant is presumed innocent unless convicted through due process of law.law.

    MIL Security OSI

  • MIL-OSI Security: Marathon County Woman Sentenced to Two ½ Years for Conspiring to Traffic Methamphetamine

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)

    MADISON, WIS. – Timothy M. O’Shea, United States Attorney for the Western District of Wisconsin, announced that Jessica L. Colby, 29, Stratford, Wisconsin, was sentenced today by U.S. District Judge William M. Conley to 30 months in federal prison for conspiring to distribute methamphetamine. This prison term will be followed by 3 years of supervised release. Colby pleaded guilty to this charge on January 31, 2025.

    In early 2024, investigators with the Central Wisconsin Narcotics Task Force began investigating a group of individuals who were distributing large quantities of methamphetamine and cocaine in the Marathon County area. Colby was identified as a facilitator for the group.

    Following a series of controlled purchases of methamphetamine involving other co-defendants in March and April 2024, task force officers executed a search warrant a residence that Colby shared with co-defendant Joshua Lake. Officers found approximately 2 kilograms of methamphetamine, 1 kilogram of cocaine, 2 rifles, over $24,000 in cash, drug ledgers, and other drug trafficking paraphernalia during the search.

    Further investigation revealed that between January 22, 2024, and April 15, 2024, Colby assisted in the distribution of approximately 23 kilograms of methamphetamine and 6 kilograms of cocaine. Colby assisted by picking up and delivering bulk shipments of drugs – at times on her own, as well as making payments to the cartel-connected sources of supply. In addition, Colby admitted to having her own drug customers.

    At sentencing, Judge Conley weighed the severity of Colby’s conduct, including the large quantities of drugs involved and her active role in the conspiracy, against her lack of a prior criminal record and her extraordinary conduct while on pretrial release.

    Three others were charged in connection with this drug trafficking conspiracy. Mercadys Perkins was convicted of conspiracy to distribute 50 grams or more of methamphetamine and sentenced to 6 years in federal prison on April 17, 2025. Dustin Brunker was convicted of conspiracy to distribute 50 grams or more of methamphetamine and sentenced to 7 years in federal prison on April 24, 2025. Joshua Lake has pleaded guilty and is scheduled to be sentenced on June 4, 2025.

    The charge against Colby was the result of an investigation conducted by the Federal Bureau of Investigation’s Central Wisconsin Narcotics Task Force comprised of investigators from the FBI, Wisconsin State Patrol, Wisconsin Department of Criminal Investigation, Lincoln County Sheriff’s Office, Marathon County Sheriff’s Office, Portage County Sheriff’s Office, Mountain Bay Police Department, Wausau Police Department and Wisconsin National Guard Counter Drug Program. The ATF Madison Crime Gun Task Force also assisted with the case. The ATF Madison Crime Gun Task Force consists of federal agents from ATF and Task Force Officers from state and local agencies throughout the Western District of Wisconsin. The Marathon County District Attorney’s Office also assisted with the investigation. Assistant U.S. Attorney Steven P. Anderson prosecuted this case.

    MIL Security OSI

  • MIL-OSI USA: Read More (Statement by U.S. Rep. Greg Steube on the House Intel Report on the 2017 Congressional Baseball Shooting)

    Source: United States House of Representatives – Congressman Greg Steube (FL-17)

    May 06, 2025 | Press ReleasesWASHINGTON — U.S. Representative Greg Steube (R-Fla.) today released the following statement on the House Permanent Select Committee on Intelligence report on the 2017 congressional baseball shooting:“As we approach the eight-year anniversary of the congressional baseball shooting, the House Permanent Select Committee on Intelligence has brought to light the FBI’s corruption and mismanagement of their investigation of the attack. This report spells out in detail a concerted campaign by the FBI to dismiss, downplay, and distort James T. Hodgkinson’s act of domestic terrorism on Republican lawmakers. At a time when trust in our institutions is at an all-time low, this report provides the public with the full account of what happened on June 14, 2017, at Eugene Simpson Stadium Park. While the Deep State tried to twist the realities of a tragedy to fit their own agenda, the House Intel Committee let the facts and evidence guide their investigation. As the report makes clear, Hodgkinson was a ‘radical, left-wing political extremist, seeking to affect the conduct of government by assassinating Republican congressmen.’I call on FBI Director Kash Patel to swiftly implement the committee’s recommendations in the report to hold accountable those officials who peddled falsehoods to the American people. Never again should the Bureau sacrifice its pursuit of justice on the altar of ulterior political agendas. And never should the American people be forced to question the motivations and honesty of those entrusted with the power of the law.”
    Read the report here.

    MIL OSI USA News

  • MIL-OSI Video: FBI’s CJIS Division Meets the Mission 24/7

    Source: Federal Bureau of Investigation (FBI) (video statements)

    When agents and officers fight violent crime, getting up to date information is vital. The FBI’s Criminal Justice Information Services Division meets that mission 24/7. Their work saves lives.
    —————————————————
    Subscribe to Inside the FBI wherever you get your podcasts:
    Spotify: https://open.spotify.com/show/4H2d3cg…
    Apple Podcasts: https://podcasts.apple.com/us/podcast…
    Google Podcasts: https://podcasts.google.com/feed/aHR0…
    More ways to follow us: https://inside-the-fbi.transistor.fm/…

    Follow us on social media:
    X: https://twitter.com/fbi
    Facebook: https://facebook.com/FBI
    Instagram: https://instagram.com/fbi
    YouTube: youtube.com/user/fbi

    https://www.youtube.com/watch?v=lf9pHwR_vDc

    MIL OSI Video

  • MIL-OSI Security: Utah County Man Sentenced to Prison for Affinity Fraud Scheme that Scammed Over $5M from Alpha Influence Investors

    Source: Office of United States Attorneys

    SALT LAKE CITY, Utah – Kole Glen Brimhall, 27, of Orem, Utah, was sentenced today to 12 months’ and one day imprisonment after he defrauded approximately 135 investors through the sale of a fraudulent investment offered through Alpha Influence, LLC, a registered Utah company. Brimhall was also sentenced to three years’ supervised release, and ordered to pay a forfeiture money judgement in the amount of $1,097,709.82 and $5,003,400 in restitution to the victims.  

    The sentence, imposed by U.S. District Court Judge David Sam, comes after Brimhall pleaded guilty on November 18, 2024, to fraud in the offer and sale of securities. See prior press release: Utah Sales Agent Admits to Defrauding Clients of More than $4.9M.

    According to court documents and statements made at the defendant’s change of plea and sentencing hearings, from March 2020 to June 2022, Brimhall sold fraudulent investment security contracts for Alpha Influence. As part of the scheme, Brimhall and others aggressively promoted, primarily through social media, that purchasing the Alpha Influence investment would generate life-changing passive income for investors in a very short amount of time exclusively through the efforts of the “Alpha Influence Team.”

    As team lead within the Alpha Influence sales structure, Brimhall was responsible for the sale of approximately 135 Alpha investments to individual investors and received $1,097,709.82 in verified commissions for those fraudulent sales.

    “Brimhall’s participation in defrauding investors not only left investors in financial devastation, but with a loss of trust that can have a lifelong impact in their personal and professional life,” said Acting U.S. Attorney Felice John Viti of the U.S. Attorney’s Office for the District of Utah. “It is our hope that by prosecuting these crimes, we will deter others from participating in affinity fraud schemes in our communities.”

    “This $20 million fraud, driven by bold displays and false promises shared on social media, caused significant harm to over 500 Utahns,” says Executive Director of the Utah Department of Commerce, Margaret Busse. “Today’s sentence sends a clear message: such predatory actions will not be tolerated, and we stand firmly committed to protecting Utah investors. Fraudulent activities like this erode public trust in legitimate investments and undermine the very foundations of our financial system. I’m proud of the hard work and collaboration between our Utah Division of Securities, the U.S. Attorney General’s Office, and the FBI that went into bringing these individuals to justice.”

    “Many of the victims in this case are members of the working class who have the least margin for loss. Yet the defendant shamelessly used their hard-earned money on fancy cars and extravagant vacations,” said Special Agent in Charge Mehtab Syed of the Salt Lake City FBI. “While fraud schemes are not violent in nature, they can be financially and emotionally devastating. The FBI is dedicated to holding accountable those who profit through deception.”

    The case was investigated jointly by the Utah Division of Securities and the FBI Salt Lake City Field Office.

    Assistant United States Attorneys Mark E. Woolf, Jennifer E. Gully, and Brian Williams of the U.S. Attorney’s Office for the District of Utah prosecuted the case.

    MIL Security OSI

  • MIL-OSI USA: Sens. Johnson, Grassley Request Biden White House and NARA Records on Politically-Motivated Investigations into President Trump

    US Senate News:

    Source: United States Senator for Wisconsin Ron Johnson
    WASHINGTON – Senate Permanent Subcommittee on Investigations Chairman Ron Johnson (R-Wis.) and Senate Judiciary Committee Chairman Chuck Grassley (R-Iowa) are calling on the National Archives and Records Administration (NARA) to release all government records demonstrating the Biden administration’s role in advancing investigations into then-presidential candidate Donald Trump. The senators are also opening an inquiry into NARA and its Inspector General’s role in those investigations.  
    The chairmen requested:
    All records between or among Department of Justice (DOJ), FBI and Biden White House officials referring or relating to President Trump’s election interference case, that began as the Arctic Frost investigation and ultimately became part of Jack Smith’s elector case. 
    All records between or among DOJ, FBI and Biden White House officials referring or relating to the investigation into President Trump’s alleged mishandling of classified information.
    All NARA records, including the NARA Office of Inspector General, referring, or relating to the Arctic Frost and the classified document investigation. 
    Read their full letter to NARA here. 
    Previous Arctic Frost oversight:
    April 9, 2025: Sens. Johnson, Grassley Release Additional Arctic Frost Records Detailing Sweeping Anti-Trump Investigation
    March 14, 2025: Sens. Johnson, Grassley Release Records Showing FBI Obtained Trump, Pence Cell Phones, Conducted Sweeping Interviews to Advance Anti-Trump Arctic Frost Investigation
    February 25, 2025: Sens. Johnson, Grassley Call for Investigation into Potential Criminal Leaks, Violations of FBI Information Sharing Policies
    January 30, 2025: Sens. Johnson, Grassley Make Public Whistleblower Records Revealing DOJ and FBI Plot to Pin Trump in Jack Smith Elector Case  

    MIL OSI USA News

  • MIL-OSI Security: St. Louis Chop Shop Operator Pleads Guilty

    Source: Office of United States Attorneys

    ST. LOUIS – A man on Monday admitted running a “chop shop” that aided car thieves connected to a local gang.

    Jorge Alberto Luviano-Martinez, 41, pleaded guilty in U.S. District Court in St. Louis to one count of operating a chop shop. As part of his plea, he admitted running a chop shop in the 2900 block of Cass Avenue in St. Louis. Members of a local gang, “Big 5,” discussed obtaining electronic keys for stolen vehicles from Luviano-Martinez and switching vehicle identification numbers (VINs) on stolen vehicles. Investigators conducted a court-approved search of the shop on June 10, 2024, finding eight stolen vehicles. One vehicle had its VIN replaced with a new VIN and another vehicle had a VIN removed.

    Before the search warrant was served, investigators saw Luviano-Martinez leaving the property in a stolen Jeep. He refused to stop for police, instead leading officers on a chase that lasted about 15 minutes. After driving down a dead end street, Luviano-Martinez jumped out of the Jeep and over a fence, but was arrested.

    “Our investigation shut down two chop shops, disrupting a scheme in which gang members were able to easily profit from vehicle thefts,” said Acting Special Agent in Charge Chris Crocker of the FBI St. Louis Division. “The impact should help stem the flow of rising vehicle thefts across the region.”

    Luviano-Martinez, also known as “Charlie Cruz,” is scheduled to be sentenced in August. The charge carries a penalty of up to 15 years in prison, a fine of $250,000 or both prison and a fine. 

    The FBI, the St. Louis Metropolitan Police Department, the St. Louis County Police Department, and Immigration and Customs Enforcement’s Homeland Security Investigations the case. Assistant U.S. Attorney Ryan Finlen is prosecuting the case.

    The investigation was conducted by the St. Louis Gateway Strike Force, which is part of the Organized Crime Drug Enforcement Task Force and includes members of federal, state and local law enforcement agencies. OCDETF identifies, disrupts, and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach. The OCDETF strike forces are permanent, multi-agency, prosecutor-led teams that conduct intelligence-driven, multi-jurisdictional operations against priority targets and their affiliate illicit financial networks. Additional information about the OCDETF Program can be found at https://www.justice.gov/OCDETF.

    MIL Security OSI

  • MIL-OSI Security: District Felon Sentenced for Distributing ‘Boot,’ Illegal Possession of a Pistol

    Source: Office of United States Attorneys

    WASHINGTON – John Parker, 23, of the District of Columbia, was sentenced today to 27-months in prison in connection with distributing the designer synthetic stimulant called “boot” near a school and for being a previously convicted felon in possession of a firearm.

    The sentence was announced by U.S. Attorney Edward R. Martin Jr., Special Agent in Charge Sean Ryan of the FBI Washington Field Office Criminal and Cyber Division, Chief Jessica M. E. Taylor of the United States Park Police, and Chief Pamela Smith of the Metropolitan Police Department.

    Parker pleaded guilty on March 5, 2025, to one count of unlawful possession with intent to distribute N, N-Dimethylpentylone near schools and to one count of possession of a firearm and ammunition by a felon. In addition to the 27-month prison term, U.S. District Court Judge Jia M. Cobb ordered Parker to serve 72 months of supervised release.

    According to court documents, on Aug. 24, 2023, about 8:30 p.m., USPP officers saw an unidentified male approach Parker near 7th and H Streets, about 400 feet from a school, and hand Parker an unknown amount of cash. Parker then handed the male an unknown quantity of white powder. Officers followed Parker into a nearby drug store, stopped him, and arrested him. 

    During a search, officers recovered a loaded Ruger LCP semi-automatic pistol that Parker had tucked in his pants. Parker previously was convicted in D.C. Superior Court of carrying a pistol without a license.

    In addition, police recovered a clear-knotted plastic bag which contained a white rock-like substance weighing 54.6 grams. a plastic bag that contained 75 clear capsules filled with a white rock-like substance, six purple capsules each containing a white rock-like substance, and $211 in cash. The rock-like substance was sent to a Drug Enforcement Administration (DEA) lab for analysis. The bag containing the 54.6 grams of a white rock-like substance tested positive for N, N-Dimethylpentylone, a Schedule I controlled substance.

    This case was investigated by U.S. Park Police and the Metropolitan Police Department with assistance from the FBI. It is being prosecuted by Assistant U.S. Attorney Emory Cole.

    23cr307

    ##

    MIL Security OSI

  • MIL-OSI USA: Grassley, Johnson Request Biden White House and NARA Records on Politically-Motivated Investigations into President Trump

    US Senate News:

    Source: United States Senator for Iowa Chuck Grassley
    WASHINGTON – Senate Judiciary Committee Chairman Chuck Grassley (R-Iowa) and Senate Permanent Subcommittee on Investigations Chairman Ron Johnson (R-Wis.) are calling on the National Archives and Records Administration (NARA) to release all government records demonstrating the Biden administration’s role in advancing investigations into then-presidential candidate Donald Trump. The senators are also opening an inquiry into NARA and its Inspector General’s role in those investigations. 
    The chairmen requested:

    All records between or among Department of Justice (DOJ), FBI and Biden White House officials referring or relating to President Trump’s election interference case, that began as the Arctic Frost investigation and ultimately became part of Jack Smith’s elector case.
    All records between or among DOJ, FBI and Biden White House officials referring or relating to the investigation into President Trump’s alleged mishandling of classified information.
    All NARA records, including the NARA Office of Inspector General, referring or relating to the Arctic Frost and the classified document investigations.

    Read their full letter to NARA HERE.
    Previous Arctic Frost oversight:
    -30-

    MIL OSI USA News