Category: Federal Bureau of Investigation

  • MIL-OSI Security: Couple Sentenced to Prison for $2 Million Bank Loan and Pandemic Relief Fraud Schemes

    Source: US FBI

    CHARLOTTE, N.C. – Antoine Johnson, 49, and Kimberly Maddox, 44, formerly of Huntersville, N.C., currently residing in Georgia, were sentenced today for fraudulently obtaining approximately $2 million in bank loans and COVID-19 pandemic relief funds, announced Russ Ferguson, U.S. Attorney for the Western District of North Carolina. Johnson was ordered to serve 51 months in prison followed by three years of supervised release. Maddox was sentenced to 12 months in prison, with six months of home confinement, followed by three years of supervised release. The couple was also ordered to pay restitution in $3,037,868.10.

    Robert M. DeWitt, Special Agent in Charge of the Federal Bureau of Investigation (FBI), Charlotte Division, joins U.S. Attorney Ferguson in making today’s announcement.

    According to court documents and today’s court hearings, the defendants owned and operated Pick Up and Go Moving International, Inc. and affiliated businesses (collectively, PUGMI). Johnson was the president of PUGMI and Maddox the vice president. Court documents show that, between 2018 and 2023, the defendants fraudulently applied for and obtained multiple lines of credit, bank loans, Paycheck Protection Program (PPP) loans and Economic Injury Disaster Loan (EIDL) program loans on behalf of their businesses. Johnson and Maddox applied for loans totaling more than $3.4 million. To secure the loans, the defendants lied on more than 35 loan applications about PUGMI’s income, gross revenues, expenses, and number of employees, and submitted fabricated supporting documents that included fraudulent tax returns and fictitious financial statements. Court documents show that at the time the couple engaged in the fraudulent loan schemes, Johnson was on federal supervised release after he was convicted and sentenced to prison for mortgage fraud.

    Johnson and Maddox previously pleaded guilty to conspiracy to commit bank fraud and wire fraud and making a false statement to a financial institution. They will be ordered to report to the Federal Bureau of Prisons upon designation of a federal facility.

    The FBI handled the investigation.

    Assistant U.S. Attorneys Caryn Finley and Graham Billings of the U.S. Attorney’s Office in Charlotte prosecuted the case.

    Anyone with information about allegations of attempted fraud involving COVID-19 can report it by calling the Department of Justice’s National Center for Disaster Fraud (NCDF) Hotline at 866‑720‑5721 or via the NCDF Web Complaint Form at www.justice.gov/disaster-fraud/ncdf-disaster-complaint-form.

    MIL Security OSI

  • MIL-OSI Security: Meet the Cyber Action Team

    Source: US FBI

    Across the globe, malicious cyber activity threatens public safety and national and economic security. Criminals target organizations such as schools, hospitals, power and utility companies, and other critical infrastructure entities that serve communities.

    As the lead federal agency for investigating cyberattacks and intrusions, the FBI developed a specialty group—the Cyber Action Team, or CAT—that can deploy across the globe within hours to respond to major cyber threats and attacks against these critical services.

    Composed of about 65 members, CAT is an investigative rapid response fly team that leverages special agents, computer scientists, intelligence analysts, and information technology specialists from across FBI field offices and Headquarters.

    “We respond onsite to victims who may include national government entities, private companies, or even sometimes foreign partner networks that have been compromised by an adversary,” said Scott Ledford, head of the Cyber Action Team and the Advanced Digital Forensics Team. “Our job is to help conduct the investigation—we collect digital evidence and locate, identify, and reverse engineer malware. We also help the victim understand when they were compromised and how, writing a timeline and a narrative of that intrusion with the ultimate goal of identifying who is responsible, attributing that attack.”

    CAT was established in 2005 in response to an increase in the number and complexity of computer intrusion investigations in FBI field offices. At the time, not all field offices had personnel with the cyber expertise necessary to properly respond to and investigate sophisticated computer intrusions.

    “There was this transition that was taking place between what investigations the FBI was responsible for and the types of crimes that we were starting to see,” explained Ledford. “Cyber was such a growing threat at the time, and so it became necessary that some field offices would reach out and say, ‘Hey, do you know of any cyber experts who can help me work through an investigation?”

    As the team formalized its processes and expanded, in 2016, the Presidential Policy Directive 41, “United States Cyber Incident Coordination” was signed, setting forth principles for the federal government’s response to cyber incidents involving government or private sector entities. The FBI was appointed the lead federal agency for cyber threat response activities.

    “From an investigative standpoint, the FBI is unique. We’re one of the few agencies in the U.S. government that has both law enforcement and counterintelligence authorities,” said Ledford. “And those authorities, and the American people’s trust in us, help us to deliver a unique blend of national security and criminal investigative skills, expertise, and resources to implement that blended response and help facilitate an investigation, regardless of whether it leads us overseas or to a courtroom here in the U.S.”

    The bulk of CAT’s cases usually involve the FBI identifying an organization with a particular intrusion that’s either so complex or large-scale that the local field office requests additional assistance.

    In one case, CAT deployed to a health care company that a separate intrusion investigation had identified as compromised. CAT’s response helped lead to the identification of several compromised systems and accounts on their network. While working alongside the company, CAT disrupted the threat—and prevented further exploitation across their network.

    CAT also receives requests from FBI legal attachés, the State Department, the National Security Council, and the White House to assist other countries when they face cyberattacks.

    “It could be a country that doesn’t have the resources or the expertise that the U.S. government has, and they’ve reached out and asked for help,” said Ledford. “There can be a NATO or a non-NATO ally country that says, ‘We’ve been hit hard by this adversary, and we don’t have the localized personnel, we don’t have the resources, we don’t have the expertise to respond to this. Can you help us with it?”

    In another case, CAT deployed overseas to provide incident response support to a NATO ally that had been targeted by a destructive cyberattack. CAT responded and worked together with U.S. partners to determine the initial intrusion vector, identify other networks that were impacted, collect and analyze digital evidence, and ultimately attribute the intrusion to a foreign government. The NATO ally severed diplomatic ties with the foreign government, closed the foreign government’s in-country embassy, and evicted them from the country.

    “We have some talented people, and they work hard every single day,” said Ledford. “It’s an honor to sit alongside them.”

    Key Tactic: Strong Communication Skills

    In addition to excellent technical skills, CAT members are closely vetted for strong communication skills. Ledford explained that part of the CAT applicant selection process entails a multi-day live technical exercise that’s designed and curated by CAT:

    “We design a network environment. We may mimic an industry, for example, an electric utility. And then we compromise that environment, and we litter it with artifacts, digital evidence, and malware. Then we task applicants to investigate this cyber incident and present their findings.

    At the end of the five days, applicants present their findings, and we identify who has the technical capability and expertise to find digital evidence of a crime hidden within this mountain of data that we’ve thrown at them.

    If the applicant passes that phase of that selection exercise, we invite them to participate in a panel presentation. Our CAT members will play the roles of the victims we’re trying to help and their own resource teams, for example, a company CEO, a U.S. attorney, a third-party legal counsel, or IT administrator.

    You’re essentially giving us the narrative of the cyber intrusion. You’re telling us a story about what happened. While some of the panel questions will be very technical in nature, some will be more basic questions—the applicant will need to be able to explain to a CEO, for example, who might not have technical expertise, what the problem was and how to fix it. We’re looking to see whether you can take something that’s exceptionally technically complex and explain it in such a way that everyone in the room understands it.

    We’re also looking for interpersonal ability. For example, in the case of a company CEO, at that moment during a cyberattack, they may be going through one of the most stressful times of their company’s existence—there may be data leaked that can make or break that company’s future and their profits, as well as their ability to employ people and their ability to deliver services to their customers. You need the communications skills to interact with them during a difficult time and gain trust.”

    MIL Security OSI

  • MIL-OSI Security: Students Get Inside Look at Life as an FBI Agent

    Source: US FBI

    The course is a lively mix of presentations and practical exercises. FBI personnel—including linguists, technical experts, forensic accountants, intelligence analysts, special agents, and bomb technicians—answered questions about their jobs and how they arrived at the FBI.

    In a mock scenario on the first day, a special agent explained how investigators assemble the building blocks of a case by looking at the available facts and evidence and then asking the right questions. Then students separated into “squads” and practiced.

    On day two, students learned best practices for dusting for fingerprints, sketching crime scenes, and interviewing subjects—all while dutifully documenting everything. For many, the rigors of tracking every photo, statement, and piece of evidence was illuminating.

    “It was really eye-opening,” said Ryan, an FAIT participant. “It’s been very jarring to see, like, just how methodical that process is for any kind of crime scene like this.”

    Photo Gallery

    Select image to view gallery

    “There’s a lot more that goes into examining a crime scene than people realize,” added Hannah, another FAIT participant. “There were multiple different things we needed to include, like the case number, the item number, description, location, time.”

    The Cleveland Division borrowed the idea for Future Agents in Training from the FBI’s Washington Field Office in 2015, seeing it as a way to connect with students in the communities it serves. FBI field offices rely on outreach efforts like FAIT, Citizens Academies, Junior Special Agents, college Honors Internships, and Teen and Youth Academies to help strengthen relationships with communities.

    MIL Security OSI

  • MIL-OSI Security: Ensuring Safety at Sea

    Source: US FBI

    In addition to reporting the incident to a cruise ship security officer as soon as possible, you can also report the incident to the FBI directly. Knowing your rights can help you speak up if something happens.

    For investigators, a big challenge is delayed reporting.

    Pagliarini stressed the importance of immediate reporting by victims and witnesses, especially considering the complexities of investigating crimes at sea.

    Delays often occur because victims feel ashamed or uncertain and may only report the incident after discussing it with others once they return home, said Pagliarini.

    “We get that a lot, or somebody has something stolen, and they don’t know until they got home and then report it,” said Pagliarini. “This delay complicates investigations, especially when victims are far from the location of the incident.”

    Parker and Pagliarini suggest passengers avoid taking valuable jewelry—as it’s easy to lose or have stolen—be responsible when drinking, and go directly through the cruise line company when booking excursions.

    They also explained that it is important to familiarize yourself with the guest services locations on the ship. And if you see an incident, do your best to be a helpful witness.

    Behind every cruise ship crime incident is a human story of victims seeking justice and families grappling with loss. The FBI’s Victim Services Division offers support to those affected by crimes at sea.

    “It’s very common if we have a juvenile involved, we make our best efforts to notify Victim Services ahead of time, and often they’ll accompany myself or whoever’s going out initially on the investigation,” said Pagliarini. From counseling referrals to support navigating the criminal justice process, their efforts extend to both victims and their families.

    Additionally, the FBI conducts specialized training for industry partners, enhancing their ability to assist law enforcement with securing and documenting a crime scene at sea.

    “We try to hold trainings with the cruise industry personnel, kind of a best practice as far as evidence preservation,” said Parker.

    The collaborative approach to security at sea, along with passengers understanding how to mitigate risk, is vital to ensuring the FBI can work with partners at every level to investigate crimes on the high seas and keep Americans safe.

    MIL Security OSI

  • MIL-OSI Security: Highlighting Safety Measures to Protect Nation’s Food Infrastructure

    Source: US FBI

    “Wherever in the country you may live—from California to Nebraska to Georgia to points in between—the cyber risk and the national security risk for farms and ranches and our food processing facilities is growing exponentially,” said Gene Kowel, special agent in charge of the FBI’s Omaha Field Office, which partnered with the Nebraska Farm Bureau to host the August 12 symposium. “The threats are evolving. They’re becoming more complex and more severe.”

    Examples shared during the daylong event included ransomware attacks that cripple operations, network hacks that take control of systems, and the theft of seeds worth millions of dollars in intellectual property and research.

    Kowel said the FBI is monitoring four major threats to the nation’s agriculture sector, which—like water, power, and transportation—is considered part of the nation’s critical infrastructure. The threats include ransomware attacks, malicious software (malware) from foreign adversaries, theft of data and intellectual property, and bioterrorism.

    Foreign actors—most notably the People’s Republic of China—are actively seeking ways to disrupt the United States’ agriculture industry, Kowel said. He urged farmers, cattle ranchers, and others to add cyber hygiene to their long list of chores. Cyber hygiene includes basic steps like using multi-factor authentication to access networks and backing up critical data.

    “We all know that in agriculture today, almost all of our data is stored in the cloud,” Kowel said. “Almost all of our complex machinery is connected to the internet, connected to the cloud, so protecting that control and protecting that data is critical.”

    MIL Security OSI

  • MIL-OSI Security: 2023 Cryptocurrency Fraud Report Released

    Source: US FBI

    Losses related to cryptocurrency fraud totaled over $5.6 billion in 2023, a 45% increase in losses since 2022, according to a report from FBI’s Internet Crime Complaint Center (IC3) published on September 9, 2024. The number of complaints from the public regarding cryptocurrency fraud continues to steadily increase, reaching 69,000 in 2023.

    Cryptocurrency is a type of digital currency that you can use to buy goods or services or to invest. Examples of cryptocurrencies include bitcoin, ether, or tether.

    As the use of cryptocurrency in the global financial system continues to grow, criminals are increasingly using cryptocurrency due to its decentralized nature, the speed of irreversible transactions, and the ability to transfer value around the world. Using cryptocurrency also makes it harder for victims to recover stolen funds. Once an individual sends a payment, the recipient owns the cryptocurrency. Recipients often quickly transfer that digital currency into an account overseas for cashout purposes.

    Criminals can exploit cryptocurrencies in many types of criminal schemes. In 2023, most cryptocurrency complaints involved investment scams. These losses totaled $3.9 billion and accounted for almost 71% of all losses related to cryptocurrency in 2023. Other examples of scams associated with cryptocurrency include tech support, confidence and romance, and government impersonation scams.   

    Cryptocurrency investment fraud is the most common type of cryptocurrency scam. In this type of fraud, criminals use various means of manipulation to convince victims to deposit increasing amounts of money into financial “investments” using cryptocurrency. In truth, these investments are fake; criminal actors who are usually located overseas control—and ultimately steal—all victim money. As a result, victims typically lose everything they invested.

    Losses from cryptocurrency-related investment fraud schemes reported to the IC3 rose from $2.57 billion in 2022 to $3.96 billion in 2023‚a 53% increase. Many individuals have accumulated massive debt to cover losses from these fraudulent investments.

    Individuals aged 30-39 and 40-49 filed the most complaints related to cryptocurrency investment fraud (approximately 5,200 reports in each age group). But complainants over the age of 60 reported the highest losses (over $1.24 billion).

    Learn more about the process behind cryptocurrency investment fraud. 

    The FBI, along with the Department of Justice, law enforcement, regulatory agencies, and financial institution partners, is dedicated to identifying the perpetrators of these schemes and bringing them to justice.

    The FBI’s IC3 is the central intake hub for individuals in the U.S. or abroad to report fraud and cybercrime. The IC3 analyzes complaints and aggregates them to identify trends and help develop strategies to combat these schemes and protect scam victims from loss. IC3 also shares the complaints it receives with FBI field offices, other law enforcement agencies, and regulatory entities for further investigation or action, as appropriate.

    In February 2022, the FBI formed the Virtual Assets Unit (VAU), a specialized team dedicated to investigating cryptocurrency-related crimes. The VAU centralizes the FBI’s cryptocurrency expertise into one nerve center, providing technological equipment, blockchain analysis, virtual asset seizure training, and other sophisticated training for FBI personnel. 

    If you believe you or someone you know may be a victim of cryptocurrency fraud, immediately submit a report to the IC3 via ic3.gov or contact your local FBI field office and provide as much transaction information as possible. We encourage you to submit a complaint through ic3.gov, even if a financial loss did not occur.

    When submitting a report to ic3.gov, include as much as you can of the following information: 

    • Financial transaction details, including: 
      • Cryptocurrency wallet addresses 
      • The amounts and types of cryptocurrencies involved 
      • Date and time of the transactions, and transaction IDs (hash)
    • Information about how you met the scammer(s)
    • What platforms you used to communicate with the scammer(s)
    • Any website address(es) involved in the scheme
    • Any phone numbers or other identifiers you might have about the scammer(s)

    You can refer to IC3’s public service announcement, “FBI Guidance for Cryptocurrency Scam Victims,” for more information about what to report.

    Individuals aged 60 or older can also contact the National Elder Fraud Hotline (833-372-8311) to assist with filing an IC3 complaint. 

    MIL Security OSI

  • MIL-OSI Security: FBI Director Announces Chinese Botnet Disruption, Exposes Flax Typhoon Hacker Group’s True Identity at Aspen Cyber Summit

    Source: US FBI

    The FBI and our partners disrupted a Chinese botnet and freed thousands of impacted devices from its clutches, Director Christopher Wray announced September 18. 

    The botnet, which was operated by a Chinese government-sponsored hacker group known as Flax Typhoon, targeted internet-connected devices such as storage devices, cameras, and video recorders to compromise victims’ systems and steal their confidential data, Director Wray said during a keynote at the 2024 Aspen Cyber Summit in Washington, D.C.

    “Ultimately, as part of this operation, we were able to identify thousands of infected devices, and, then, with court authorization, issued commands to remove the malware from them, prying them from China’s grip,” Wray said.  

    Approximately half of the devices under the botnet’s control were based in the United States, he noted. The hacker group’s targets included organizations in the public and private sectors, as well as academia and the media, he added. Wray also revealed the hacker group’s true identity to be an information security company known as the Integrity Technology Group. “But their chairman has publicly admitted that for years his company has collected intelligence and performed reconnaissance for Chinese government security agencies,” Wray added. 

    Wray called the cyber disruption a success but cautioned that the effort was “just one round in a much longer fight.” 

    “The Chinese government is going to continue to target your organizations and our critical infrastructure—either by their own hand or concealed through their proxies,” Wray said. “And we’ll continue to work with our partners to identify their malicious activity, disrupt their hacking campaigns, and bring them to light.” 

    Saving victims time and money 

    During his remarks, Wray also underscored the Bureau’s dedication to working with victims of cyber intrusions, whether they’re individuals or organizations. According to Wray, reporting ransomware attacks to the FBI can potentially help us: 

    • Recover ransomed data 
    • Negotiate-down ransoms demanded by cybercriminals—or spare victims from having to pay ransoms at all 
    • Help impacted organizations resume their normal operations in a speedy manner 

    “I’m extremely proud to report that, in just the past two years, the FBI has handed out nearly 1,000 decryptors, and we’ve saved victims around the world something like $800 million in ransom payments,” Wray said. 

    Decryptors—also known as decryption keys—function like passwords to unlock data that ransomware criminals hold captive. But, Wray explained, some of those keys require information about the victim to work.  

    So it’s paramount that organizations contact the FBI if they fall victim to ransomware attacks. Otherwise, he cautioned, the Bureau “might not be able to make that match—and we might not be able to save you that ransom payment.” 

    Wray also discussed how information sharing between the Bureau and our public and private sector partners can help the FBI combat ongoing cyberattacks and lessen the impact of future cyber incidents.  

    As an example, he pointed to a recent interagency effort to alert the private sector that a pro-Russian hacktivist group was targeting “operational technology networks.”  

    “They had set their sights across our critical infrastructure—from dams and wastewater systems to the energy, food, and agriculture sectors,” Wray explained.  

    But, he said, the FBI’s joint advisory about the cyber threat allowed private sector organizations to fix the vulnerability these bad actors were using to infiltrate networks, thereby protecting the companies and the American public, alike. 

    “So, if there’s only one thing you take away from my time here today, I hope it’s this: The FBI needs and wants to work with you,” Wray said. “Let us save you money, save you time, and save you from future attacks so that you can keep your organization’s focus where it should be: on your operations, and—together—we can help keep our nation safe.” 

    West Palm Beach investigation updates 

    During his remarks, Wray also addressed the Bureau’s investigation into the September 15 assassination attempt on former President Donald Trump.  

    “For the second time in just over two months, we’ve witnessed what appears to be an attempt to attack our democracy and our democratic process,” he said. “I’m relieved that former President Trump is safe, and I want the American people to know the men and women of the FBI are working tirelessly to get to the bottom of what happened.” 

    Wray acknowledged that the ongoing nature of the investigation limited how much the Bureau could say about the matter. 

    “What I can say is that we have dedicated the full force of the FBI to this investigation, and that runs the gamut from criminal to national security resources, from tactical support to Evidence Response Teams, from forensic scientists to operational technology personnel,” he said.“Together, we’re working around the clock to investigate this.” 

    MIL Security OSI

  • MIL-OSI Security: McAlester Resident Sentenced to 11 Years for Maiming in Indian Country

    Source: US FBI

    MUSKOGEE, OKLAHOMA – The United States Attorney’s Office for the Eastern District of Oklahoma announced Cody Ray McFadden, age 36, of McAlester, Oklahoma, was sentenced to 132 months in prison for one count of Maiming in Indian Country.

    The charge arose from an investigation by the Pittsburg County Sheriff’s Office, the Oklahoma Highway Patrol, and the Federal Bureau of Investigation.

    On December 16, 2024, McFadden pleaded guilty to the charge.  According to investigators, on July 16, 2022, McFadden invited a visitor to his residence. Once inside, McFadden beat the victim, forced the victim into a cage, and padlocked the door.  During the next 36 hours, McFadden proceeded to assault and torture the victim, threatening to kill the victim with a cross bow and intentionally striking at the victim with an axe.  The victim, who sustained a head laceration, burns, bruises, and a broken arm, managed to break free, escape through a window, and run to a neighbor’s home.  Law enforcement responding to the neighbor’s emergency call took McFadden into custody after a brief standoff.  The crime occurred in Pittsburg County, within the boundaries of the Choctaw Nation Reservation, in the Eastern District of Oklahoma.

    “This defendant demonstrated a complete lack of humanity, subjecting the victim to an extended period of violence resulting in unimaginable physical and mental trauma,” said FBI Oklahoma City Special Agent in Charge Doug Goodwater.  “The FBI and our law enforcement partners are committed to rooting out violent offenders through aggressive investigations and prosecutions.”

    “This is the stuff of nightmares, but unfortunately, it was sickeningly real,” said United States Attorney Christopher J. Wilson.  “I commend the bravery of this survivor, the quick work of law enforcement in securing an end to this horrifying ordeal, and the steadfastness of investigators and prosecutors who ensured that McFadden spends the next decade in prison answering for his ruthless crimes.”

    The Honorable Ronald A. White, Chief U.S. District Judge in the United States District Court for the Eastern District of Oklahoma, presided over the hearing.  McFadden will remain in the custody of the U.S. Marshals Service pending transportation to a designated United States Bureau of Prisons facility to serve a non-paroleable sentence of incarceration.

    Assistant U.S. Attorney Joshua Satter represented the United States.

    MIL Security OSI

  • MIL-OSI Security: Okmulgee Resident Sentenced to Over 20 Years for Voluntary Manslaughter

    Source: US FBI

    MUSKOGEE, OKLAHOMA – The United States Attorney’s Office for the Eastern District of Oklahoma announced that Brett Wayne Pigeon, age 45, of Okmulgee, Oklahoma, was sentenced to 126 months in prison for one count of Voluntary Manslaughter in Indian Country, and 120 months in prison for one count of Using, Carrying, Brandishing and Discharging a Firearm in Relation to a Crime of Violence.  The terms will be served consecutively.

    The charges arose from an investigation by the Bureau of Alcohol, Tobacco, Firearms and Explosives, the Federal Bureau of Investigation, the Okmulgee Police Department, and the Muscogee (Creek) Nation Lighthorse Police Department.

    On January 6, 2025, Pigeon pleaded guilty to the charges.  According to investigators, on November 27, 2023, law enforcement responding to reports of shots fired discovered the victim deceased from apparent gunshots to the back, head, and hip.  Pigeon was identified as a suspect, and later admitted shooting the victim with a 12-gauge shotgun.    The crimes occurred in Okmulgee County, within the boundaries of the Muscogee (Creek) Nation Reservation, in the Eastern District of Oklahoma.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone.  On May 26, 2021, the department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.

    The Honorable Ronald A. White, Chief U.S. District Judge in the United States District Court for the Eastern District of Oklahoma, presided over the hearing.  Pigeon will remain in the custody of the U.S. Marshals Service pending transportation to a designated United States Bureau of Prisons facility to serve a non-paroleable sentence of incarceration.

    Assistant U.S. Attorneys Patrick M. Flanigan and Rachel Geizura represented the United States.

    MIL Security OSI

  • MIL-OSI Security: Adair County Resident Pleads Guilty to Federal Firearm Crime

    Source: US FBI

    MUSKOGEE, OKLAHOMA – The United States Attorney’s Office for the Eastern District of Oklahoma announced that Jimmy Darrell Porter Jr., age 40, of Westville, Oklahoma, entered a guilty plea to one count of Use, Carry, Brandish and Discharge of a Firearm During and in Relation to a Crime of Violence, punishable by a minimum of 10 years in prison and a fine up to $250,000.00.

    The Indictment alleged that on August 4, 2024, Porter knowingly used, carried, brandished, and discharged a firearm during and in relation to a crime of violence.

    The charge arose from an investigation by the Federal Bureau of Investigation, the Cherokee Nation Marshal Service, and the Westville Police Department.

    The Honorable D. Edward Snow, U.S. Magistrate Judge in the United States District Court for the Eastern District of Oklahoma, accepted the plea and ordered the completion of a presentence investigation report.

    A U.S. District Court Judge will determine the sentence to be imposed after considering the U.S. Sentencing Guidelines and other statutory factors.

    Porter will remain in the custody of the United States Marshals Service pending sentencing.

    Assistant U.S. Attorney Jonathan E. Soverly represented the United States.

    MIL Security OSI

  • MIL-OSI Security: Ecuadorian National Sentenced to 30 Years in Prison for Production of Child Pornography

    Source: US FBI

    HARRISBURG – The United States Attorney’s Office for the Middle District of Pennsylvania announced that on April 23, 2025, Alvaro Andres Valarezo Sandoval, age 35, an Ecuadorian National residing in Miami, Florida, was sentenced by Senior United States District Judge Malachy E. Mannion to 30 years’ imprisonment on two counts of production of child pornography.

    According to Acting United States Attorney John C. Gurganus, Sandoval sexually exploited six Central Pennsylvania minors by deceiving and threatening them into creating and sending him explicit photos and videos between 2013 and 2019.  As part of the scheme, Valarezo Sandoval would often build a rapport with the minor victims by showing affection and then entice and encourage them to send images or videos of themselves that were sexually provocative and/or sexually explicit. If a minor attempted to cease the relationship, Valarezo Sandoval would extort them by threatening to post their explicit images online unless they complied with his demands to continue providing him with sexually explicit content.

    There were at least six victims in central Pennsylvania and at least 30 others worldwide. One victim gave an impassioned statement to the court explaining the devastating impact this crime had on her and her family.

    The case was investigated by the Federal Bureau of Investigation and Pennsylvania State Police. Assistant United States Attorney Michael Scalera prosecuted the case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue victims. For more information about Project Safe Childhood, please visit www.usdoj.gov/psc.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Farmington Resident Charged with Sexual Exploitation of a Minor as Part of DOJ/FBI Operation Restore Justice

    Source: US FBI

    PITTSBURGH, Pa. – A resident of Farmington, Pennsylvania, has been indicted by a federal grand jury in Pittsburgh on charges of violating federal laws regarding the sexual exploitation of a minor, Acting United States Attorney Troy Rivetti announced today.

    The two-count Indictment named Nathan Fike, 40, as the sole defendant.

    According to the Indictment presented to the Court, on or about October 4, 2023, Fike distributed material depicting the sexual exploitation of a minor. The government further alleges that, on or about February 9, 2024, Fike knowingly possessed material depicting the sexual exploitation of a minor. The Indictment occurred in connection with Operation Restore Justice, a coordinated, nationwide enforcement effort to identify, track, and arrest child sex predators that, as announced today by the Department of Justice and the Federal Bureau of Investigation, resulted in the rescue of 115 children and the arrests of 205 child sexual abuse offenders over a five-day period. The coordinated effort was executed by all 55 FBI field offices, the Child Exploitation and Obscenity Section (CEOS) in the Department’s Criminal Division, and United States Attorneys’ Offices around the country (read the Operation Restore Justice news release here).

    The law provides for a maximum total sentence of not less than five years and up to 40 years in prison, a fine of up to $250,000, or both. Under the federal Sentencing Guidelines, the actual sentence imposed would be based upon the seriousness of the offenses and the prior criminal history, if any, of the defendant.

    Assistant United States Attorney DeMarr W. Moulton is prosecuting this case on behalf of the government.

    The Federal Bureau of Investigation conducted the investigation leading to the Indictment.

    This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorneys’ Offices and the Criminal Division’s CEOS, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    An indictment is an accusation. A defendant is presumed innocent unless and until proven guilty.

    MIL Security OSI

  • MIL-OSI Security: Former Police Commissioner and Former Director of the Virgin Islands Office of Management and Budget Charged in Bribery Scheme

    Source: US FBI

    An indictment was unsealed today charging Ray Martinez, the former police commissioner of the Virgin Islands Police Department (VIPD), and Jenifer O’Neal, the former director of the Virgin Islands Office of Management and Budget, with participating in a bribery and money laundering conspiracy. Both defendants made their initial court appearances today in St. Thomas, U.S. Virgin Islands.

    According to court documents, Martinez, 56, and O’Neal, 53, both of St. Thomas, accepted bribes from a then-government contractor, David Whitaker. The indictment alleges that the scheme began in at least November 2022 and continued until June 2024, with O’Neal joining the scheme no later than January 2024. The defendants also allegedly conspired to launder proceeds from the bribery scheme through a monetary transaction to pay rent on O’Neal’s coffee shop. In exchange for the bribes paid by the government contractor, Martinez and O’Neal, among other official acts, allegedly agreed to approve fraudulently inflated invoices and assist with obtaining payment for those invoices by the Virgin Islands to Whitaker. Martinez also agreed to assist Whitaker in obtaining a $1.48 million contract to provide services to the VIPD in October 2023. Additionally, after the investigation was originally made public, Martinez allegedly obstructed the investigation by encouraging Whitaker to destroy evidence associated with Martinez’s criminal activity and produced falsified documents in response to a subpoena.

    Martinez and O’Neal are each charged with five counts of honest services wire fraud, which each carry a maximum penalty of 20 years in prison; one count of federal program bribery, which carries a maximum penalty of 10 years in prison; and one count of money laundering conspiracy, which carries a maximum penalty of 20 years in prison. Martinez is also charged with two counts of obstruction of justice, which each carry a maximum penalty of 20 years in prison. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    Principal Deputy Assistant Attorney General Brent S. Wible, head of the Justice Department’s Criminal Division; U.S. Attorney Delia Smith for the District of the Virgin Islands; and Special Agent in Charge Joseph Gonzalez of the FBI San Juan Field Office made the announcement.

    The FBI San Juan Field Office, St. Thomas Resident Agency is investigating the case.

    Trial Attorneys Alexandre Dempsey and Steve Loew of the Criminal Division’s Public Integrity Section and Assistant U.S. Attorney Michael Conley for the District of the Virgin Islands are prosecuting the case.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: Man Indicted and Arrested for Firearms Violations

    Source: US FBI

    SAN JUAN, Puerto Rico – On December 12, 2024, a federal grand jury in the District of Puerto Rico returned an indictment charging Ángel Javier Avilés-Monzón, a.k.a. “Chimi/Yovngchimi” with two counts for firearms violations. FBI special agents arrested Avilés-Monzón today at the Luis Muñoz Marín International Airport.

    According to court documents, on or about June 4, 2023, and on or about August 25, 2024, Ángel Javier Avilés-Monzón knowingly possessed a machinegun, that is, a pistol of unknown make and model, modified to fire automatically more than one shot without manually reloading by a single function of the trigger.

    If convicted, the defendant faces a maximum penalty of 10 years in prison for each count. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    U.S. Attorney W. Stephen Muldrow of the District of Puerto Rico, and Joseph González, Special Agent in Charge of the Federal Bureau of Investigation San Juan Field Office made the announcement.

    Assistant U.S. Attorney (AUSA) Alberto López-Rocafort, Chief of the Gang Section, and AUSA Joseph Russell are prosecuting the case.

    An indictment is merely an allegation and all defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: New York Man Sentenced to 15 Years in Prison for Role in Kidnapping

    Source: US FBI

    NEWARK, N.J. – A Queens, New York man was sentenced to 15 years in prison for his role in a Paterson, New Jersey, kidnapping, U.S. Attorney Alina Habba announced.

    Reginald Law, 39, previously pleaded guilty before U.S. District Judge Evelyn Padin in Newark federal court to an indictment charging him with kidnapping and Hobbs Act robbery. 

    According to documents filed in this case and statements made in court:

    On October 8, 2020, Law and his conspirator, Maurice Cottman, entered a retail store in Paterson, where they accosted the victim, who was working in the store. Law and Cottman physically removed the victim from the store, then transported him in the back of a U-Haul truck from Paterson to New York.  Law admitted that during the kidnapping, he and Cottman called the victim’s family and demanded ransom for his return.  Law and Cottman also forced the victim to give them his debit card and pin number, which they used to withdraw money from his bank accounts.

    In addition to the prison term, Judge Padin sentenced Law to five years of supervised release.

    Cottman previously pleaded guilty before Senior U.S. District Judge Stanley R. Chesler to an Information charging him with one count of kidnapping. On March 29, 2022, Judge Chesler sentenced Cottman to 15 years in prison with five years of supervised release.

    U.S. Attorney Habba credited special agents of the FBI, under the direction of Acting Special Agent in Charge Terence G. Reilly in Newark, with the investigation leading to today’s sentence.  He also thanked the FBI New York Field Office and the Paterson Police Department for their assistance.

    The government is represented by Assistant U.S. Attorney Shontae D. Gray of the Economic Crimes Unit.

                                                               ###

    Defense counsel: Christopher L. Patella Esq., Bayonne, New Jersey

    MIL Security OSI

  • MIL-OSI Security: Disbarred Attorney Sentenced to 30 Months for Defrauding Victims in Ponzi-Like Wire Fraud Scheme

    Source: US FBI

    NEWARK, N.J. – A Somerset County, New Jersey, disbarred attorney was sentenced to 30 months in prison for a wire fraud scheme, U.S. Attorney Alina Habba announced.

    Lawrence Coven, 61, of Hillsborough, New Jersey, previously pleaded guilty before U.S. District Court Judge Robert Kirsch in Trenton federal court to an Information charging him with one count of wire fraud. Judge Kirsch imposed the sentence.

    According to documents filed in this case and statements made in court:

    Coven operated and controlled Sunrise Enterprises LLC, which purported to provide financial services to investors. In reality, Coven induced victim investors into sending him funds by falsely representing that he would invest their money through Sunrise in exchange for large profits by providing short-term loans to borrowers who could not obtain standard loans. He falsely guaranteed investors returns of between 10 to 15 percent on their investments and told investors that their investments were risk-free. But instead of investing the money as he promised, Coven diverted investor funds for personal expenses, including utilities, entertainment, real estate, credit card bills, and cash withdrawals. And when investors began asking questions, Coven provided them with false assurances that their money was safe and used money from existing investors to make payments to other investors in a Ponzi-like fashion.

    In addition to the prison term, Judge Kirsch sentenced Coven to three years of supervised release.

    U.S. Attorney Habba credited special agents of the FBI, under the direction of Acting Special Agent in Charge Terence G. Reilly in Newark, with the investigation leading to this sentence.

    The government is represented by Assistant U.S. Attorneys Fatime Meka Cano and Olta Bejleri of the Economic Crimes Unit in Newark.

                                                                           ###

    Defense counsel: Jeffrey Chiesa, Esq. 

    MIL Security OSI

  • MIL-OSI Security: Arizona Man Receives 22-Year Prison Sentence for Aggravated Sexual Abuse of Child

    Source: US FBI

    ALBUQUERQUE – An Arizona man was sentenced to 22 years in prison for the prolonged sexual abuse of a minor over nearly a decade in the Navajo Nation.

    There is no parole in the federal system.

    According to court documents, between May 16, 2009, and May 15, 2012, Cedric Martinez, 31, engaged in unlawful sexual contact with a minor victim, who was under the age of 12, at a residence in Upper Fruitland, New Mexico, within the Navajo Nation.

    Upon his release from prison, Martinez will be subject to fifteen years of supervised release and must register as a sex offender.

    U.S. Attorney Ryan Ellison and Raul Bujanda, Special Agent in Charge of the Federal Bureau of Investigation’s Albuquerque Field Office, made the announcement today.

    The Farmington Resident Agency of the Federal Bureau of Investigation’s Albuquerque Field Office investigated this case with assistance from the Navajo Police Department and Navajo Department of Criminal Investigations. Assistant United States Attorneys Brittany DuChaussee and Meg Tomlinson are prosecuting the case. 

    MIL Security OSI

  • MIL-OSI Security: FBI Director’s Workforce Message About the 18th Anniversary of Robert Levinson’s Abduction

    Source: US FBI

    FBI Director Kash Patel issued the following message to the Bureau workforce to commemorate the 18th anniversary of the abduction of retired FBI Special Agent Robert “Bob” Levinson from Kish Island in Iran in 2007:

    All,

    This Sunday marks 18 years since Robert “Bob” Levinson was abducted from Iran’s Kish Island. It’s also U.S. Hostage and Wrongful Detainee Day, a time for our entire nation to remember Bob and all Americans wrongfully captured and detained overseas.

    Over the years, the Bureau has worked to secure the recovery of many Americans held hostage abroad, but Bob’s case hits especially close to home. He spent nearly three decades in service to our nation, including 22 years as an FBI special agent. He was one of ours.

    While we’re still early in my time at the Bureau, I have long been familiar with the story of Bob’s disappearance and am honored to call the Levinson family my friends. On my first morning as Director, I visited the Hall of Honor at FBI Headquarters to pay tribute to our fallen heroes and to tour the exhibit dedicated to Bob’s extraordinary life and career.

    I’m also no stranger to the Bureau’s essential work with our partners to bring American hostages home, and I’m grateful to the countless employees across our organization who are working tirelessly to get the Levinson family the answers they need and deserve. I’m proud to have supported that mission during my own career, and yesterday I joined our partners at the State Department in a flag-raising ceremony marking our commitment to all U.S. hostages and wrongful detainees.

    Far too many questions remain about Bob’s kidnapping, detention, and probable death, but I’m encouraged by the progress our investigative team continues to make. Last month we released posters seeking information about two senior Iranian intelligence officers we suspect were involved in abducting Bob on behalf of the Iranian regime. The Bureau is offering up to $5 million for information leading to his recovery, location, and return. That’s in addition to a reward of up to $20 million offered by the State Department.

    Bob leaves behind a legacy of dedication, patriotism, and strength. We won’t stop until we’ve uncovered the truth about what happened to him and brought him home.

    Kash Patel

    MIL Security OSI

  • MIL-OSI Security: Canadian Man Sentenced to 25 Years for Destruction of Energy Facilities in North and South Dakota

    Source: US FBI

    Cameron Monte Smith, 50, a Canadian citizen, was sentenced today to 150 months in prison per count, to be served consecutively, for two counts of destroying an energy facility — one incident in the District of North Dakota and another in the District of South Dakota.Smith was also ordered to pay $2.1 million in restitution.

    According to court documents, on Sept. 11, 2024, Smith pleaded guilty to the two offenses where he admitted to damaging the Wheelock Substation, located near Ray, North Dakota, in an amount exceeding $100,000, in May 2023. The Wheelock substation is operated by Mountrail-Williams Electric Cooperative and Basin Electric Power Cooperative.

    Smith also admitted to damaging a transformer and pumpstation of the Keystone Pipeline located near Carpenter, South Dakota, in an amount exceeding $100,000, in July 2022. Smith damaged the Wheelock substation and the Keystone Pipeline equipment by firing multiple rounds from a high-power rifle into the equipment resulting in disruption of electric services to the North Dakota customers and resulting in disruption of the Keystone Pipeline in South Dakota.

    Sue Bai, head of the Justice Department’s National Security Division; Acting U.S. Attorney Jennifer Klemetsrud Puhl for the District of North Dakota; U.S. Attorney Alison Ramsdell for the District of South Dakota; and Assistant Director David J. Scott of the FBI’s Counterterrorism Division made the announcement.

    The FBI investigated the case with valuable assistance from the Bureau of Alcohol, Tobacco, Firearms and Explosives, the Williams County (North Dakota) Sheriff’s Office, the South Dakota Division of Criminal Investigation, the Clark County (South Dakota) Sheriff’s Department, and the Beadle County (South Dakota) Sheriff’s Department.

    Assistant U.S. Attorneys David D. Hagler and Jonathan J. O’Konek for the District of South Dakota, Assistant U.S. Attorney Jeremy Jehangiri for the District of North Dakota, and Trial Attorneys Jacob Warren and Justin Sher of the National Security Division’s Counterterrorism Section prosecuted the case.

    MIL Security OSI

  • MIL-OSI Security: Eight Individuals Plead Guilty to Wide-Ranging Scheme to Monopolize Transmigrante Forwarding Industry, Fix Prices, Extort Competitors, and Launder Money

    Source: US FBI

    The U.S. Department of Justice today announced that eight defendants have pleaded guilty for their conduct in a long-running and violent conspiracy to monopolize the transmigrante forwarding agency industry in the Los Indios, Texas, border region near Harlingen and Brownsville, Texas. The three remaining defendants to the superseding indictment remain at large as fugitives. Transmigrantes are individuals who transport used vehicles and other goods from the United States through Mexico for resale in Central America. Transmigrante forwarding agencies are U.S.-based businesses that provide services to transmigrante clients, including helping those clients complete the customs paperwork required to export vehicles into Mexico.

    “The Criminal Division is committed to holding violent criminal organizations accountable in whatever markets in which they operate,” said Matthew R. Galeotti, head of the Justice Department’s Criminal Division. “Transnational criminal organizations that use violence to dominate industries will be prosecuted to the fullest extent of the law.”

    “These guilty pleas bring to justice individuals who used violence and extortion to fix prices and monopolize the market for essential services that Americans rely on to earn a living,” said Director of Criminal Enforcement Emma Burnham of the Justice Department’s Antitrust Division. “The Antitrust Division will continue to use every tool at its disposal to protect the public by prosecuting violent criminals – including those who aim to corrupt America’s free markets.”

    “Price fixing harms both the public and the business community,” said U.S. Attorney Nicholas J. Ganjei for the Southern District of Texas. “Schemes like this artificially drive up prices, forcing consumers to pay more than they ordinarily would. At its core, such market collusion is nothing more than theft from consumers.”

    “These defendants tried to rule through fear, using threats, violence and intimidation to eliminate competition,” said Assistant Director Chad Yarbrough of the FBI Criminal Investigative Division. “Their guilty pleas send a clear message that price fixing and market allocation are serious crimes, and we will hold those accountable who put profits over the law and fair commerce.”

    “Today’s pleas reflect the relentlessness of the federal government’s pursuit of transnational criminal organizations that exploit international trade and the U.S. economy,” said Special Agent in Charge Craig Larrabee of Homeland Security Investigations (HSI) San Antonio. “This violent scheme was fueled by greed that undermined the safety and economic security of the border region; HSI has prioritized significant resources to protect the U.S. and our legitimate trade.”

    According to documents filed in the U.S. District Court in Houston, defendants Carlos Martinez also known as “Cuate,” Pedro Antonio Calvillo Hernandez, Roberto Garcia Villareal, Sandra Guerra Medina, and Mireya Miranda pleaded guilty to one count of conspiracy to fix prices and allocate the market for transmigrante forwarding agency services in violation of Section 1 of the Sherman Act, and one count of conspiracy to monopolize the same market in violation of Section 2 of the Sherman Act. The conspirators fixed the prices for transmigrante forwarding agency services and created a centralized entity known as the “Pool” to collect and divide revenues among the conspirators, limit competition from other agencies, and increase prices for their services. Market participants who were not part of the conspiracy had to join and pay into the Pool. Pool members enforced the rules of the Pool by monitoring whether forwarding agencies were charging the agreed-upon prices, including by posting prices publicly on social media, and monitoring whether agencies were paying into the Pool as required.

    Martinez, Calvillo, Villareal, and Carlos Yzaguirre pleaded guilty to one count of conspiracy to interfere with commerce by extortion. Martinez also pleaded guilty to one count of interference with commerce by extortion. The defendants conspired to force forwarding agencies to pay money to the Pool and to pay other extortion fees, including a “piso” for every transaction processed in the industry as well as a “fine” for operating in the market outside of Pool rules. The conspirators perpetrated acts of intimidation, coercion, and violence in furtherance of the antitrust and extortion conspiracies. Defendant Martinez was responsible for at least $9.5 million in extortion payments.

    Martinez and Jose de Jesus Tapia Fernandez also pleaded guilty to a money laundering conspiracy, through which they laundered extortion proceeds. Cash obtained from the extortion conspiracy was deposited into bank accounts controlled by Martinez and his family, and those deposits were made to conceal and disguise the nature, source, ownership, and control of the proceeds. Juan Hector Ramirez Avila pleaded guilty to one count of structuring a financial transaction to evade reporting requirements.

    Martinez agreed to forfeit four real properties and $375,000 in seized U.S. currency, to pay a fine, and to pay full restitution to extortion victims. Guerra, Miranda, Calvillo, and Villareal have also agreed to pay fines as part of their plea agreements.

    Rigoberto Brown and Miguel Hipolito Caballero Aupart, and Diego Ceballos-Soto were also charged in the superseding indictment and remain fugitives. Anyone with information about their whereabouts is asked to contact the Antitrust Division’s Complaint Center at 888-647-3258, or visit www.justice.gov/atr/report-violations.

    Conspiracies to allocate the market, fix prices, or monopolize in violation of the Sherman Act carry a maximum penalty of 10 years’ imprisonment and a maximum $1 million fine for an individual. Conspiracy to interfere with commerce by extortion in violation of the Hobbs Act carries a maximum penalty of 20 years’ imprisonment and a maximum $250,000 fine. Money laundering conspiracy carries a maximum penalty of 20 years’ imprisonment and a maximum $500,000 fine. Structuring a financial transaction to evade reporting requirements carries a maximum penalty of five years’ imprisonment and a $250,000 fine. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    The Justice Department’s Antitrust Division, the Criminal Division’s Violent Crime and Racketeering Section (VCRS), the U.S. Attorney’s Office for the Southern District of Texas, HSI, and the FBI are investigating the case.

    Trial Attorneys Brittany E. McClure, Anne Veldhuis, and Michael G. Lepage of the Antitrust Division, Trial Attorney Christina Taylor of VCRS, and Assistant U.S. Attorney Alexander L. Alum for the Southern District of Texas are prosecuting the case.

    Anyone with information in connection with this investigation should contact the Antitrust Division’s Complaint Center at 888-647-3258, or visit www.justice.gov/atr/report-violations.

    MIL Security OSI

  • MIL-OSI Security: The FBI Marks the 75th Anniversary of the FBI’s Ten Most Wanted Fugitives List

    Source: US FBI

    It started when a reporter asked the FBI about writing a story to highlight the “toughest guys” being sought by the Bureau at the time. The FBI provided the names and descriptions of ten fugitives to the reporter. The resulting feature became a major story that garnered national attention. Recognizing the potential of public involvement, then-FBI Director J. Edward Hoover formalized the list and named it what we know it as today. Since then, the FBI has continued to use the list to enlist public support in locating dangerous criminals. Through evolving media channels and digital platforms, the list remains a symbol of partnership between law enforcement and the public.

    As the nature of crime and FBI priorities have evolved over the years, the makeup of the Top Ten list has also changed. While the list began by featuring bank robbers and murder suspects fleeing state jurisdiction, it has evolved into a tool to search for major organized crime figures, cybercriminals, child predators, and white-collar criminals. The list also reflects the international scope of crime, which emphasizes the importance of strong global partnerships in the search for violent criminals who know no boundaries and pose a significant danger to all.

    Just as the list’s focus has broadened, so too have the methods by which the FBI communicates with the public. In the early years, newspapers and magazines initially brought broader participation to the program. Today, the FBI uses the internet, television, social media, and digital billboards while continuing to rely on the public’s assistance in locating wanted fugitives. Foreign media and broadcasting services are now also assisting with the pursuit of international criminals as the FBI continues to recognize the unique ability of the media to cast a wider net within communities both here and abroad.

    That reporter’s idea, so many years ago, to form a partnership among law enforcement, the media, and the citizens of the world continues to prove beneficial today. As the FBI’s Ten Most Wanted Fugitives program celebrates 75 years of success, the expectation is that it will continue to empower citizens across the country and around the world to safely and effectively assist law enforcement for years to come. 

    The FBI places a high priority on the fugitive investigations that are added to the list. In many cases, the Bureau offers rewards of up to $250,000 for information that leads directly to the arrest of a fugitive.

    More information about the Ten Most Wanted Fugitives list is available at fbi.gov/topten.

    All available graphics and video are available at dvidshub.net/units/FBI.

    MIL Security OSI

  • MIL-OSI Security: Reaching Out to Assist Victims of Crime

    Source: US FBI

    For instance, during a case that involved reaching out to an Amish community that did not use technology, VOSS worked with a local newspaper in Pennsylvania to translate seeking victim information into Pennsylvania Dutch, so it was accessible to the community.

    “Our biggest asset that we have is our liaison partners,” said Shannon.

    Once someone fills out a Seeking Victim information questionnaire, the VOSS team will compile the data and turn it over to the investigative case team and victim specialists.

    “We have victims carrying heavy trauma who need direct services immediately, so our victim specialists will step in as soon as possible,” said Shannon. “Even if victims may not need a service right away, the victim specialists are very good about making sure they know they have access to getting more help when they’re ready.”

    It’s never too late to fill out a Seeking Victim Information questionnaire—even if the crime happened years ago, there is no statute of limitations for reporting your experience. You can choose if you want to receive further notifications regarding a case or you can decide to report your experience and then cease communications. Any information you provide could be valuable information used to protect and help others who were also victimized and further prevent additional people from getting hurt. 

    MIL Security OSI

  • MIL-OSI Security: National Missing Children’s Day 2024

    Source: US FBI

    Every year on National Missing Children’s Day, May 25, we reaffirm our commitment to investigating these cases and finding children who have been reported kidnapped or missing, and we continue to encourage parents, caregivers, and others to make child safety a priority.

    Please take a look at the faces of the children at the bottom of this page—these are just some of the many children who have gone missing, leaving behind family and friends waiting for any news of their loved ones. If you have any information about these children that could help lead to their recovery, please consider contacting the FBI, local law enforcement, or submitting a tip online.

    Children continue to face dangerous threats from online predators, human traffickers, kidnappers, and other criminals who mean harm. 

    The FBI’s Child Abduction Rapid Deployment (CARD) teams are composed of experienced personnel with a proven track record in crimes against children investigations, especially cases where a child has been abducted by someone other than a family member. Team members provide on-the-ground investigative, technical, and resource assistance to state and local law enforcement. The teams work closely with representatives from the FBI’s Behavioral Analysis Unit (BAU), National Center for the Analysis of Violent Crime coordinators, and child exploitation task force members.

    The FBI’s Child Victim Services program within the Victim Services Division provides support to child victims, the families of child victims, and witnesses of federal crimes. The team is focused on ensuring that any interactions with child victims or witnesses are tailored to the child’s stage of development and minimize any additional trauma to the child. In addition, they connect children and families to other resources to support their health and well-being through difficult times.

    National Missing Children’s Day is also a reminder about preparedness should the unthinkable ever happen to your child. You can download the FBI’s Child ID app, which allows you to quickly share key information with authorities if your child is missing. The free app also includes tips on keeping children safe and guidance on what to do during the first crucial hours after a child goes missing. (The FBI does not collect or store the information or photos you enter into the app. The data resides on your mobile device unless you choose to send it to authorities in an emergency.)

    MIL Security OSI

  • MIL-OSI Security: Preventing Laser Strikes on Aircraft

    Source: US FBI

    Investigating Laser Strikes 

    The first federal laser law was enacted in 2012, when Congress passed it as part of the reauthorization of the Federal Aviation Administration.  

    Before 2012, the Bureau pursued laser pointer investigations under a law forbidding “destruction of an aircraft,” which Gates likened to “trying to smash a square peg into the round hole.” 

    The 2012 federal statute makes it illegal for people to “knowingly” point a laser pointer’s beam “at an aircraft”—whether private, commercial, or military—or its flight path. Most importantly, it attaches consequences to this action: A monetary fine of up to $250,000 and/or a federal prison sentence of up to five years. On top of that, the FAA’s website notes that it “can impose civil penalties of up to $11,000” each time someone aims a laser beam at an aircraft. 

    “That suddenly gave us real teeth in enforcement,” Gates said of the statute. “It made shining a laser pointer at an aircraft a five-year maximum penalty felony, which is a really big deal.” 

    And, as Gates recalls, it paid off: He opened his first investigation into a laser strike violation within two months of the law’s implementation, which eventually resulted in a conviction. 

    According to the FAA, the profile of individuals responsible for laser strikes differs between different locations of the country. But when it comes to FBI investigations into such incidents, Gates said, “we’re looking for that person who’s intentionally tracking an aircraft, who does it over and over.” 

    He said that red flags for FBI investigators include: 

    • A laser beam that follows an aircraft as it moves 
    • A laser beam that keeps coming at an aircraft, even after its position has changed 
    • Clusters of laser strikes reports from aircraft traversing the same stretch of airspace 

    The FBI commonly catches laser strike offenders in collaboration with federal and local law enforcement partners, Gates explained. 

    The universally accepted procedure is that an air traffic controller notifies local law enforcement dispatch, who will then notify law enforcement air units and ground patrols, if available, the FAA said. 

    From there, if a local police helicopter deploys to the scene and gets lased, they can use technology like infrared cameras to pinpoint the exact location the laser beam came from.

    Helicopter crews can then reach out to their agencies for on-the-ground backup or call the FBI for assistance. An October 2022 laser strike against an Austin Police Department helicopter led to the arrest and conviction of two Texas men, Ventresca noted.  

    Bureau partnerships with local, state, and federal partners—as well as with commercial airlines—are key to ensuring that members of the aviation and law enforcement communities know how to seek the Bureau’s help in addressing laser strikes. This is especially important in states and municipalities that lack laser-strike laws of their own, since local or state authorities can ask the FBI to investigate incidents in those areas as federal crimes. 

    Help Us Protect the Skies 

    We’ve all likely mistaken an airplane for a star or other celestial body at least once in our lives. But pointing out a possible star with a laser could endanger the aircrew if your suspicion is wrong. For this reason, it’s best to keep your laser pointers out of the sky. 

    If you spot someone aiming a laser at the sky in a suspicious manner, you can report it to the FBI by calling 1-800-CALL-FBI (1-800-225-5324) or visiting tips.fbi.gov. You can also report laser strikes to the FAA

    You should contact the FBI immediately if you see someone playing with lasers near—or otherwise posing a threat to—an airport. 

    Finally, if you’re thinking of gifting a laser pointer to someone—especially if they’re a minor—educate them on the very real dangers of misusing these devices. 

    “If we can prevent one 15-year-old from ending up with federal or state charges or even the large fine, that’s a win,” Ventresca said. “If we can prevent one catastrophe, prevent one pilot from being blinded, that makes it worth it.” 

    Resources: 

    MIL Security OSI

  • MIL-OSI Security: Supporting Victims in Missing Children Cases

    Source: US FBI

    Our Victim Services Division provides support to child victims and witnesses of federal crimes, as well as their families and loved ones, through investigative forensic interviews and coordination with victim specialists who ensure all parties receive the proper care when faced with devastating challenges. The team is trained to ensure that any interactions with child victims or witnesses are tailored to the child’s stage of development and to minimize any additional trauma to the child.

    A missing child is someone whose whereabouts became unknown when they were aged 17 or younger. Victim Services Division personnel often support these cases even as time progresses and the victim who went missing as a child may have grown into an adult. Regardless of how the child initially went missing, victim specialists work with families and loved ones, as well as victims who have been found. 

    “That family is missing their child during crisis. We would respond the same to that family,” explained Jennifer Piero, a victim specialist at the FBI Cleveland Field Office. “If the FBI were involved in the case or asked by a police department to become involved, we would immediately start providing the family with updates and any services we can provide, as well as crisis intervention.”

    Victim specialists work with the families throughout the investigation—no matter how long—and are often present during a victim’s recovery.

    When victim specialists are assigned a case, they immediately start working with FBI agents, task force officers, and local law enforcement to meet the missing child’s family. These first interactions are the foundations for building trust with the families. The victim specialist looks into the following: 

    • Who are the missing child’s relatives? 
    • Are there siblings, and, if so, are they juveniles? 
    • Which family members should be interviewed for background information?

    “Siblings may know different things than parents, so we have to look at setting up child interviews with our child and adolescent forensic interviewers, or CAFIs. The CAFIs gather information they might know, such as whether they might have witnessed anything the missing child had done or somebody they had talked to before disappearing,” said Piero. 

    “Then there are the assessments of the parents that the agents are working on to ensure that a parent is not potentially involved in the child’s disappearance,” continued Piero. “Once they’ve ruled out that possibility, we continue to work with the family. We coordinate communication with the agents to ensure the family is the first to receive updates about the case.”

    Victim specialists also assess whether initial crisis intervention and counseling services are needed and ensure those resources are provided. As the investigation develops, victim specialists will work with FBI public affairs and the National Center for Missing and Exploited Children (NCMEC) to alert the public about the missing child and ask for help finding them. 

    One of NCMEC’s vital roles includes creating age-progressed photos of the victim. These photos are shared on NCMEC’s website and FBI missing person posters and disseminated to law enforcement and media outlets.

    “We obtain photos of the victim’s family members—mom, the dad, any family members—to provide an image of what that child might look like at an older age,” said Piero. “Once NCMEC creates that image, we take it to the family and have them give us some critiques or say what they think might be different, because they know their child best.”

    And as victim specialists help agents and task force offers gather and share information related to the case, they are simultaneously developing plans for if and when a victim is found and reunited with their family to ensure the transition goes as smoothly as possible. Some items to consider include: 

    • What are the logistics for reuniting the victim with their family? 
    • What are the logistics to ensure the victim receives medical assistance?  
    • What is the plan to help mitigate interactions with the community and the press? 

    For instance, events like large celebratory gatherings and homecomings immediately after a successful recovery—though often well-intentioned—may be too overwhelming for the victim and their families at that time. Victim specialists will help manage these scenarios. In one case, victim specialists helped arrange the first reunification between the victim and their family at a location outside their town so they could have some privacy before facing the general public and media.

    “We want to mitigate any types of secondary trauma, making sure that people aren’t asking the victim questions that are not victim sensitive,” said Catherine Connell, unit chief of the Child Victim Services Unit. 

    MIL Security OSI

  • MIL-OSI Security: FBI Cyber Lead Urges Potential LockBit Victims to Contact Internet Crime Complaint Center

    Source: US FBI

    FBI Cyber Division Assistant Director Bryan Vorndran on June 5 highlighted the Bureau’s “ongoing disruption” of the LockBit ransomware group and its affiliates, and urged potential victims to contact the Bureau’s Internet Crime Complaint Center (IC3)

    The Bureau now has more than 7,000 LockBit decryption keys in its possession, Vorndran said in a keynote at the 2024 Boston Conference on Cyber Security. We can use these keys to help victims get their data back, he noted. Potential victims can contact IC3 by visiting our LockBit Victim Reporting Form at lockbitvictims.ic3.gov

    “We are reaching out to known LockBit victims and encouraging anyone who suspects they were a victim to visit our Internet Crime Complaint Center at ic3.gov,” he said.

    The LockBit ransomware variant has been utilized in over 2,400 cyberattacks around the world—more than 1,800 of which impacted victims in the U.S.—he said. These attacks have targeted various sectors and racked up “billions of dollars in damages,” Vorndran said.

    FBI Cyber Division Assistant Director Bryan Vorndran delivers a keynote address at the 2024 Boston Conference on Cyber Security on June 5, 2024.

    MIL Security OSI

  • MIL-OSI Security: Mexican Cartels Targeting Americans in Timeshare Fraud Scams, FBI Warns

    Source: US FBI

    Estas estafas les han costado a las víctimas más de $300 millones de dólares. Aprenda cómo protegerse.

    El FBI ha visto un aumento en las estafas dirigidas a propietarios de tiempo compartido. En este tipo de estafa, los delincuentes engañan a estos propietarios de tiempo parcial para que desembolsen cuantiosas sumas de dinero en efectivo, todo bajo falsas pretensiones relacionadas con sus propiedades de tiempo compartido.

    Su elección principal de víctima—estadounidenses mayores—técnicamente esto hace que el fraude de tiempo compartido sea una forma de fraude a personas mayores, o delito que tiene como objetivo hacer que los estadounidenses mayores sean despojados de su dinero o criptomoneda. El FBI investiga agresivamente tales delitos para salvaguardar de estafas a una población particularmente vulnerable, dijo el Agente Especial Adjunto a Cargo Paul Roberts, quien dirige la Subdivisión de Delitos Financieros Complejos en la Oficina de Nueva York.

    “Los estafadores de tiempo compartido tienen como objetivo dejar a las víctimas sin nada, lo cual deja en las victimas consecuencias devastadoras en su futuro financiero, relaciones, salud física y emocional”, señaló el mismo.

    Sin embargo, indicó él, el fraude de tiempo compartido también se encuentra en el radar del Buró debido a que sus ganancias ilícitas se utilizan cada vez más para financiar cárteles violentos en México. “A medida que los cárteles cimientan aún más su control en este espacio, es especialmente crítico que el FBI tome la iniciativa en abordar esta amenaza a personas mayores estadounidenses”, dijo Roberts. Él agregó que algunos estafadores participan en estos esquemas porque temen convertirse en las próximas víctimas de estos cárteles.

    Los cárteles han operado los fraudes de tiempo compartido más reportados que involucran propiedades en México, dijo Roberts. El Cártel de Jalisco Nueva Generación (CJNG), el Cártel del Golfo y el Cártel de Sinaloa han estado ejecutando esquemas de fraude de tiempo compartido, para ayudar a financiar sus actividades ilícitas, durante más de diez años. Hasta la fecha, basado en denuncias y rastreo financieros, el FBI cree que el CJNG ha sido el cártel que predominantemente participa en fraudes de tiempo compartido en México. Sin embargo, es probable que los centros de llamadas independientes en México también estén participando en este delito.

    El fraude de tiempo compartido es una operación atractiva para los cárteles ya que es más barato y representa menos desafíos logísticos, laborales y de supervisión que otras operaciones generadoras de ingresos como el tráfico de drogas y armas, explicó Roberts.

    “El fraude de tiempo compartido tiene costos generalmente bajos y reinversión mínima ya que sólo se necesita un alquiler de espacio reducido, configuración de telecomunicaciones y empleados de habla inglesa con acceso a bases de datos de complejos turísticos”, dijo Roberts. “Se percibe un menor riesgo de enjuiciamiento y de extradición por fraude de tiempo compartido, y en cambio sí es un flujo de efectivo fácil que va directamente al sistema bancario mexicano, ofuscando los fondos para facilitar las actividades de lavado de dinero”.

    Estos esquemas—impactan desproporcionadamente a los estadounidenses ricos y mayores que quieren recuperar parte del dinero que gastaron en sus tiempos compartidos—dejan huellas emocionales y financieras en sus víctimas”.

    Sin embargo, el FBI está utilizando una combinación de asociaciones estratégicas para detectar, investigar y prevenir estos esquemas.

    “Nos asociamos con una variedad de diferentes agencias para investigar estos casos, las cuales incluyen la Administración Federal Antidrogas de Estados Unidos (DEA, por sus siglas en inglés) y a la Oficina de Control de Activos Extranjeros del Departamento del Tesoro de Estados Unidos (OFAC, por sus siglas en inglés)”, dijo Roberts. “Asimismo coordinamos con agencias estatales y locales para asegurarnos también de recibir denuncias de víctimas presentadas ante estas instancias. Trabajamos cada vez más con socios del sector privado en la industria financiera para ayudar en la detección y prevención de estos fraudes”.

    ¿Cómo Funcionan Las Estafas de Fraude de Tiempo Compartido?

    Para llevar a cabo sus estafas, los estafadores realizan una amplia investigación sobre sus posibles víctimas. Los delincuentes crean documentos falsos y se hacen pasar por personas de instituciones confiables para embaucar a las víctimas con sus historias y asustarlas para lograr que cumplan.

    “A lo largo del proceso, los estafadores utilizan una combinación de tácticas de ventas de alta presión y estrategias de fraude cibernéticas, tales como las de imitar direcciones de correo electrónico de entidades legítimas y falsificar documentos oficiales, para convencer a las víctimas de que cada fase de la estafa es legítima”, explicó Roberts.

    Y, añadió Roberts, este no es un tipo de estafa de una sola vez. Los estafadores suelen utilizar una combinación de esquemas para re-victimizar a los propietarios de tiempo compartido durante un período de varios años.

    Estos tipos de estafas suelen desarrollarse en tres fases, explicó Roberts.

    En la fase uno, dijo, los estafadores hacen contacto con la víctima por primera vez por teléfono o por correo electrónico.

    “En estas comunicaciones iniciales con las víctimas, los estafadores a menudo se hacen pasar por  corredores terciarios de tiempo compartido o representantes de venta de la industria de tiempo compartido, bienes raíces o servicios financieros localizados en Estados Unidos o México”, dijo Roberts.

    Los estafadores luego instan a la víctima a tomar una de estas tres acciones:

    1. Salirse de su tiempo compartido
    2. Alquilar su propiedad de tiempo compartido
    3. Invertir en certificados de acciones para su tiempo compartido

    Los estafadores posteriormente presionan a las víctimas a que paguen por adelantado honorarios o impuestos para asegurar estos acuerdos, explicó Roberts.

    Y, advirtió Roberts, los estafadores hacen su tarea. Antes de empezar a estafar a las víctimas, estos se ponen en contacto con fuentes dentro de la industria del tiempo compartido para obtener información sobre las propiedades de tiempo compartido y sus dueños. También hacen hasta lo imposible para vender a sus objetivos [victimas] la autenticidad de sus esquemas por medio de contractos redactados, cartas de oferta y documentación de cuentas bancarias fraudulentos.

    “Los estafadores, asimismo, con el fin de reforzar su credibilidad, se apalancan de una vigorosa red de sitios web de empresas falsas, nombres de negocios y direcciones, registros con funcionarios gubernamentales y grupos comerciales”, dijo Roberts.

    Y, agregó, los estafadores son aparentemente angloparlantes fluidos quienes han memorizado respuestas a preguntas frecuentes sobre sus negocios falsos para así vender aún más la farsa de que sus argumentos de venta son legítimos.

    Los estafadores después exigen repetidos pagos adelantados hasta que la víctima se queda sin dinero o se entera de su esquema.

    En la fase dos de la estafa, los estafadores vuelven a acercarse a las víctimas después de haber pasado algún tiempo. En esta ocasión, los estafadores se hacen pasar por empleados de bufetes de abogados que quieren ayudar a las víctimas a recuperar el dinero que éstas les entregaron a los estafadores en la fase uno.

    “Los estafadores a menudo afirman que los estafadores iniciales han sido acusados de fraude o considerados jurídicamente responsables en una demanda en Estados Unidos o México, y que a las víctimas se les debe restituir en el acuerdo de reposición”, explicó Roberts. No obstante, para acceder a ese dinero de restitución, a las víctimas se les dice que deben pagar honorarios legales o judiciales a los bufetes de abogados. Los estafadores subsecuentemente defraudan a las víctimas con una serie de pagos anticipados relacionados con este acuerdo; nuevamente utilizando documentos falsos para reforzar su credibilidad”.

    La tercera fase de la estafa implica la suplantación del gobierno. Los estafadores se hacen pasar por funcionarios de la OFAC, de la Unidad de Inteligencia Financiera del gobierno de México o de otras entidades internacionales, tales como la INTERPOL.

    Luego toman una de dos vías:

    • Los suplantadores del gobierno afirman que están contactando a las víctimas porque tienen acceso a acuerdos penales y desean ayudarlas a recuperar el dinero perdido.
    • O bien, los suplantadores tratan de asustar a las víctimas para que proporcionen aún más dinero. Esto lo hacen informándoles a las víctimas de que sus pagos iniciales a los estafadores de tiempo compartido se consideraron sospechosos. Los estafadores luego les dicen a las víctimas que las autoridades determinaron que sus pagos a los estafadores de tiempo compartido estaban “vinculados al lavado de dinero o a operaciones terroristas”. Subsecuentemente, estos amenazan con citar a las víctimas a comparecer o con enviarlas a prisión si no pagan dinero adicional con el fin de asegurar de que sus pagos se liberen y se limpien sus nombres.

    Reconocer las Señales

    El fraude de tiempo compartido no se denuncia por dos razones principales: Las víctimas o no se dan cuenta de que están siendo estafadas, o no se dan cuenta de que hay ayuda disponible. Dicho esto, el FBI y la Comisión Federal de Comercio han visto recientemente un repunte en denuncias. En los últimos cinco años, dijo Roberts, más de 6,000 víctimas han reportado a las agencias más de 300 millones de dólares en pérdidas.

    El FBI espera que una mayor cobertura mediática del fraude de tiempo compartido eduque al público sobre la amenaza e inspire a más víctimas a presentar denuncias.

    “No hay nada vergonzoso en caer víctima de una estafa como esta”, dijo Roberts. “Lo peor que la gente puede hacer es sufrir en silencio por vergüenza o por miedo a la crítica”.

    Mientras tanto, usted puede protegerse de caer víctima de fraude de tiempo compartido sí reconoce las señales.

    • Primero, dijo éste, nadie le debería pedir que pague honorarios o impuestos por adelantado, ni le debería pedir que proporcione un formulario de poder notarial. Ninguna de éstas es práctica estándar de la industria. Cada uno es una señal de peligro.
    • Próximo, dijo él, si alguien que dice ser funcionario del gobierno se pone en contacto con usted, esa persona no debería:
    • Ponerse en contacto con usted sobre un acuerdo de restitución.
    • Amenazarlo con arresto o enjuiciamiento si no se paga el dinero.
    • Amenazarlo con citatorio a comparecer ante un tribunal fuera de los Estados Unidos.
    • Afirmar el estar trabajando con el FBI y/o la Oficina de Control de Activos Extranjeros del Departamento del Tesoro de Estados Unidos para expedirle un citatorio.
    • Por último, usted puede tomar algunas medidas proactivas para protegerse contra la estafa de fraude de tiempo compartido. No conteste llamadas telefónicas de números desconocidos.
    • Si alguien se comunica con usted sobre su tiempo compartido y solicita dinero por adelantado, deje de comunicarse con ellos y no pague.
    • Nunca firme, certifique ante notario, ni envíe ningún poder notarial o documentos legales por correo electrónico.

    Las Posibles Consecuencias del Fraude de Tiempo Compartido

    Las personas que ayudan a orquestar estafas de fraude de tiempo compartido pueden enfrentar la extradición a Estados Unidos y posible enjuiciamiento por una serie de cargos penales, los que incluye:

    • Fraude electrónico
    • Fraude bancario
    • Confabulación para cometer fraude electrónico
    • Confabulación para cometer fraude bancario
    • Blanqueo de dinero
    • Cargos por la Ley sobre organizaciones corruptas influidas por el crimen organizado (RICO)

    MIL Security OSI

  • MIL-OSI Security: Theodore Roosevelt’s Historic Pocket Watch Recovered

    Source: US FBI

    When a Florida auctioneer was asked to auction off a pocket watch from the late 1800s, his research led him to believe that he may be holding a piece of U.S. presidential history.

    The auctioneer realized that the watch may have belonged to Theodore “Teddy” Roosevelt, the 26th president of the United States. He contacted two historic sites closely associated with Roosevelt—Sagamore Hill National Historic Site and Theodore Roosevelt Inaugural National Historic Site—who confirmed the authenticity of the watch.

    Roosevelt’s watch had been in possession of Sagamore Hill National Historic Site since he died in 1919. They loaned the watch to the Theodore Roosevelt Inaugural National Historic Site in 1971 for a six-year term to be shown in an exhibition. The loan was extended, but, unfortunately, the watch was reported stolen from the site in Buffalo, New York, on July 21,1987, and wouldn’t be identified again until 2023 at the Florida auction house.

    Since Sagamore Hill National Historic Site and the Theodore Roosevelt Inaugural National Historic Site fall under the jurisdiction of the National Park Service (NPS), they reached out to NPS to recover the stolen artifact. NPS, the lead investigative agency, contacted the FBI Art Crime team for additional assistance. Both the NPS and FBI confirmed that this was the watch stolen almost 40 years earlier.

    “This watch was a fairly pedestrian Waltham 17 jewel watch with an inexpensive coin silver case. It’s a ‘Riverside’ grade and model ‘1888’ with a hunter-style case, meaning it has a lid on either side which fold and encase the dial and the movement,” said Special Agent Robert Giczy, a member of the FBI Art Crime Team who investigated the provenance of the watch in this case.

    MIL Security OSI

  • MIL-OSI Security: BAU Launches ‘Prevent Mass Violence’ Campaign

    Source: US FBI

    “Our goal is to get bystanders, who are the most important part of the prevention cycle, to be able to consistently identify concerning behaviors that are backed by research and experience,” said Taylor Cilke, a crime analyst in the unit of BAU that studies threats. BAU resides in the FBI’s Critical Incident Response Group and is part of the National Center for the Analysis of Violent Crime, which was established in 1984 to develop strategies to combat serial and violent crimes.

    “In order to prevent a threat, we have to identify it, and we have to assess it, and then we have to take steps to manage it,” Cilke said. “The hardest part is that identification piece. And that’s where the public and potential bystanders can really help us empower our communities and force-multiply our work. But if we never identify the threat, we can’t assess and manage it.”

    To that end, BAU this week launched a Prevent Mass Violence campaign that includes a new webpage and brochures containing tips and strategies to help potential bystanders understand what types of behaviors may be concerning and ways to respond.

    “The most important thing is to tell someone,” the webpage says. That may not necessarily mean law enforcement; it could be a school administrator, employee assistance peer, a boss, or someone else you trust.

    “We’ve seen time and again that there are noticeable, observable behaviors,” said Brad Hentschel, a supervisory special agent in BAU, pointing to nearly three decades of academic research, along with BAU’s findings from studying mass violence events. “Mass shooters don’t just snap. Recognizing and reporting the warning signs of someone thinking about and preparing for violence can be lifesaving.”

    MIL Security OSI

  • MIL-OSI Security: The Search for Ashley Summers

    Source: US FBI

    Police initially reported Ashley as a runaway, likely due to recent tensions with her family and because she frequently spent time at other relatives’ homes.

    But her family didn’t believe she had disappeared on her own accord.

    The FBI joined the investigation in 2008 when the National Center for Missing and Exploited Children (NCMEC) alerted the FBI Cleveland Field Office about Ashley’s case.

    At the time, there was another missing girl from the west side of Cleveland—Gina DeJesus, one of three women who were held hostage by Ariel Castro. Ashley and Gina were similar in age and from the same part of Cleveland. Initially, there was speculation that Ashley may have also been one of Castro’s victims. However, no evidence supported this, and Ashley’s case became an independent investigation.

    Throughout the investigation, law enforcement has interviewed family members, neighbors, and anyone who could have potentially offered information leading to Ashley’s whereabouts. Gene—Ashley’s boyfriend at the time—and his family cooperated with authorities, and there has been no evidence to suggest that foul play was involved on Gene’s part.

    “I can’t think of a single agent on our squad or analyst that hasn’t touched this investigation,” said McCaskill. “And this is including a lot of victim specialist support, analyst support, and support from agents and analysts on other squads, as well as the FBI Evidence Response Team and Child Abduction Rapid Deployment (CARD) team.”

    From the start of the investigation, FBI Victim Specialist Jennifer Piero has been the primary contact for Ashley’s family. In her role, Piero offers support and shares case updates. “Any time we have received tips and conducted searches or canvasses, we have notified Ashley’s family,” explained Piero. “If we have anticipated something in the investigation that would make the news, we’ve contacted Ashley’s family in advance to ensure they learned about it first.” 

    In 2018, a series of inquiries—as a result of the investigation into Ashley’s disappearance—led to the discovery that Ashley’s great uncle, Kevin Donathan, was actively abusing young children. Donathan was indicted on multiple counts, including rape, attempted rape, and five counts of gross sexual imposition. He pleaded guilty, and in 2020, he was sentenced to 35 years in prison, where he still resides.

    Ashley is described as 5’5″ tall and around 130 pounds when she was last seen. She has brown hair and blue eyes and has a tattoo on her upper-right arm with the name “Gene” in black ink over a red heart. She would now be 31 years old. 

    “Ashley is deeply missed and loved,” said Jennifer Summers, Ashley’s mother. “Her mysterious disappearance has left our family in pieces. We cling to the hope of her safe return. We appeal to anyone with information to come forward and contact the Cleveland FBI.”

    As far as leads go, McCaskill emphasized that “anything is on the table. We will go wherever the evidence leads us. We’re going to knock down every door, and we’re going to try and identify every different potential lead and follow it to its logical conclusion because I’m not going to rule anything out at this point in time. I’m just as willing to believe one theory over another based on the evidence and to follow that wherever it takes us.”

    “This is still very much an active investigation,” McCaskill continued. “We still hope to bring resolution to Ashley’s family. And I believe that the only way we’re going to be able to do that at this point is through tips—and the only way to generate those tips is by getting Ashley’s story out to the public. I am certain there are individuals out there who we haven’t spoken to yet. If someone believes they saw Ashley or knows where she may be, we welcome all tips.”

    If you have any information about Ashley Summers, please contact FBI Cleveland at (216) 522-1400.

    You can also contact your local FBI office or submit a tip online at tips.fbi.gov. Any tips may remain anonymous. 

    Crime Stoppers is offering reward money. You can submit tips to Crime Stoppers by calling (216) 25-CRIME.

    MIL Security OSI