Category: Intelligence Agencies

  • MIL-OSI Security: Sonoma Real Estate Developer Arrested On Charges Of Defrauding Hundreds Of Investors

    Source: Office of United States Attorneys

    Former President of LeFever Mattson Allegedly Used Victims’ Money to Fund Personal Expenses and Pay Existing Investors

    SAN FRANCISCO – Kenneth W. Mattson, 63, of Sonoma, was arrested today pursuant to an indictment returned by a federal grand jury charging him with wire fraud, money laundering, and obstruction of justice.  

    According to the nine-count indictment filed May 13, 2025, and unsealed today, Mattson was the President of LeFever Mattson, a corporation based in Citrus Heights, Calif., that controlled several limited partnerships that owned and managed commercial and residential properties.  For more than a decade, Mattson allegedly solicited and obtained millions of dollars in investments from hundreds of investors—many of whom were nearing or in retirement—in what he represented were legitimate and safe interests of limited partnerships that owned real estate.  Those representations were false: although many of the partnerships were real entities, Mattson’s victims, referred to in the indictment as “off-books investors,” never had interests in those partnerships.

    “This indictment alleges that Kenneth Mattson defrauded hundreds of victims, many of whom entrusted him with retirement savings they could not afford to lose.  He allegedly raised tens of millions of dollars by falsely claiming that investors would have legitimate stakes in real estate projects.  Instead of delivering the investment returns he promised, Mr. Mattson is charged with cheating these investors out of their hard-earned money and, in many cases, out of their life savings,” said Acting United States Attorney Patrick D. Robbins.  “Mr. Mattson will now be held to account on charges of perpetrating a scheme that he kept afloat only by using new investors’ money to pay obligations to earlier investors—a classic Ponzi scheme.”

    “As alleged, Mattson orchestrated a fraudulent real estate investment scheme over several years, stealing millions of dollars from hundreds of victims, many of them retirees or nearing retirement.  This case underscores the serious impact financial fraud can have on a community, particularly on those least able to recover,” said FBI Special Agent in Charge Sanjay Virmani.  “The investigation in this case is ongoing.  We encourage anyone who believes they may be a victim to come forward.  The FBI and our partners remain steadfast in our commitment to uncovering the truth and seeking justice for those affected.”

    “The allegations against Mr. Mattson describe a long-standing scheme with hundreds of victims duped out of millions of dollars,” said IRS Criminal Investigation (IRS-CI) Oakland Field Office Special Agent in Charge Linda Nguyen. “Simply put, white-collar crime is not victimless, and our special agents and professional staff are the experts at tracing money trails and building cases that lead to justice while simultaneously deterring future criminal activity.”

    “Postal inspectors will not allow the mail to be used to defraud people. The American people trust us to end fraud schemes and bring fraud perpetrators to justice—we are proud to work with our federal law enforcement partners in investigations like this one,” said U.S. Postal Inspection Service (USPIS), San Francisco Division Inspector in Charge Stephen M. Sherwood.

    The indictment describes that, from at least 2009 and continuing through 2024, Mattson solicited investments from off-books investors into Divi Divi Tree, LP (Divi Divi), a LeFever Mattson-controlled partnership that owned an apartment complex in Riverside County, Calif.  The vast majority of these investors used their retirement funds to invest in Divi Divi.  Mattson never told the LeFever Mattson company about these investors, and the investors were not listed as partners in the company’s official books and records.  Contrary to Mattson’s representations to these victims, these “off-books” investors never became true owners in the partnership.  Although some investors received distribution payments from their “off-books” investments, that money did not come from the rents of the partnership’s underlying property, as Mattson promised; instead, it came from loans, Mattson’s comingling of other assets, and from new investors, in the manner of a Ponzi scheme.

    Mattson’s scheme reached beyond Divi Divi to other LeFever Mattson limited partnerships, including Heacock Park Apartments, LP, an entity that was formed to purchase another apartment complex.  Among other conduct, the indictment describes Mattson’s concealment from the “off-books” investors of the 2021 sale of the Heacock Park Apartments, the asset underlying Heacock Park, which resulted in net proceeds of over $8 million.  Notwithstanding Mattson’s prior representations to “off-books” investors that they would be notified upon sale and be entitled to share in profits proportionate to their ownership stake, Mattson concealed the sale from existing “off-books” investors and omitted that the primary asset of the entity had, in fact, been sold when recruiting new investors for Heacock Park.

    The indictment also alleges that Mattson engaged in similar fraudulent conduct through another real estate holding entity over which he exercised sole business control, KS Mattson Partners, LP.

    Between 2019 and 2024, Mattson obtained at least $28 million from investors for “off-books” investments in Divi Divi and Heacock Park alone.

    The indictment further alleges that Mattson learned of an investigation into his conduct by the U.S. Securities and Exchange Commission (SEC) in April 2024.  After the SEC instructed Mattson to preserve and retain relevant evidence and served him with a subpoena for documents, Mattson deleted thousands of files that were relevant to the SEC’s investigation.  

    The indictment charges Mattson with seven counts of wire fraud in violation of 18 U.S.C. § 1343, one count of engaging in monetary transactions in property derived from specified unlawful activity (money laundering) in violation of 18 U.S.C. § 1957, and one count of destruction of records in a federal investigation (obstruction of justice) in violation of 18 U.S.C. § 1519.

    Mattson is scheduled to make his initial federal court appearance at 10:30 a.m. on May 23, 2025, before U.S. Magistrate Judge Alex G. Tse in San Francisco.

    An indictment merely alleges that crimes have been committed, and all defendants are presumed innocent until proven guilty beyond a reasonable doubt.  If convicted, Mattson faces a maximum sentence of 20 years in prison as to each count of wire fraud and the obstruction of justice count and 10 years in prison as to the money laundering count.  Any sentence following conviction would be imposed by the court after consideration of the U.S. Sentencing Guidelines and the federal statute governing the imposition of a sentence, 18 U.S.C. § 3553.  

    Individuals who believe that they are “off-books” investors with Mattson are urged to fill out the following form: https://forms.fbi.gov/victims/lfminvestors and send copies of any relevant documents to LFMInvestors@fbi.gov.

    The SEC today filed a civil enforcement action against Mattson and KS Mattson Partners LP in the Northern District of California.  

    Assistant U.S. Attorneys Christoffer Lee and Nikhil Bhagat are prosecuting the case with the assistance of Mimi Lam.  The prosecution is the result of an investigation by the FBI, IRS-CI, and USPIS.  The U.S. Attorney’s Office thanks the San Francisco Regional Office of the SEC for its assistance in the investigation.

    Mattson Indictment
     

    MIL Security OSI

  • MIL-OSI Security: Las Vegas Man Sentenced To Three Years In Prison For Extorting, Stalking, Threatening Text Messages And Money Laundering

    Source: Office of United States Attorneys

    LAS VEGAS – A Las Vegas man who pleaded guilty to extortion, money laundering, stalking, and sending threatening text messages to injure and kill two people and their families, including children, was sentenced today by United States District Judge Richard F. Boulware II to 36 months in prison followed by three years of supervised release, a fine of $75,000, and $200,000 in restitution.

    According to court documents, on April 29, 2024, Idriss Qibaa threatened force and extorted $200,000 from a victim. As part of the extortion scheme, on March 7 and 8, 2024, he obtained $63,500 worth of cryptocurrency. Then, in June and July 2024, he engaged in online direct messages, texts, and postings, to cause substantial emotion distress to his victims. On July 19, 2024, Qibaa sent text messages containing threats to injure and kill a victim and members of the victim’s family. Later, on July 24, he sent text messages containing threats to injure and kill another victim.

    In February 2025, Qibaa pleaded guilty to one count of extortion, two counts of money laundering, one count of stalking, and two counts of interstate communications containing a threat to injure.

    United States Attorney Sigal Chattah for the District of Nevada and Special Agent in Charge Spencer L. Evans for the FBI Las Vegas Division made the announcement.

    The FBI and the Beverly Hills Police Department investigated the case; and the United States Attorney’s Office for the District of Nevada prosecuted the case.

    ###

     

     

    MIL Security OSI

  • MIL-OSI Security: Former Exec at O.C. Company and Illegal Alien Arrested on Federal Complaint Alleging He Embezzled $7 Million from His Employer

    Source: Office of United States Attorneys

    SANTA ANA, California – A former executive at a Newport Beach company that specializes in the purchase of classic cars – who also happens to be an illegal alien from Mexico – was arrested today on a federal complaint alleging he embezzled approximately $7 million from his employer.

    Alexander G. Ramos, 62, of Newport Beach, is charged with wire fraud, a felony that carries a statutory maximum sentence of 20 years in federal prison.

    A federal magistrate judge ordered Ramos jailed without bond and scheduled an arraignment for June 30.

    According to an affidavit filed with the complaint, Ramos was employed at the victim company since 2017 until his termination in September 2024 in the company’s Risk Management Department. Through his positions, he knew his employer’s loans and held relationships with title agents or other partners nationwide. He also oversaw requests by the company’s Title and Risk Department to its Accounting Department for payment to title agents, sometimes submitting the requests himself.

    Ramos allegedly caused checks to be issued from the victim company to certain parties, including a Las Vegas DMV services business. The checks were supposed to cover expenses for tax, titling, and licensing associated with car purchases.

    However, Ramos purposely caused his employer to send too much money to the outside entities. He then directed those entities on how to dispose of the extra money, including by sending the funds to bank accounts that he controlled.

    A law enforcement review of financial records revealed that approximately $7 million in checks and wires were deposited into Ramos-controlled bank accounts from the outside entities in the car industry. The origin of some of the funds deposited into Ramos’s bank accounts showed the checks and wires were made out to the victim company and were intended as refunds to that company’s clients who had overpaid for vehicle registration fees.

    Instead of being returned directly to the Ramos’s employer, Ramos allegedly moved the funds to other accounts he controlled for his personal use, including buying a home in Irvine. The illegal transfers date back to at least January 2020, according to the complaint.

    Ramos is an illegal alien from Mexico who was removed from the United States in 2017 but later returned.

    A complaint contains allegations that a defendant has committed a crime. Every defendant is presumed to be innocent until and unless proven guilty beyond a reasonable doubt in court.

    The FBI and the Federal Deposit Insurance Corporation Office of Inspector General are investigating this matter.

    Assistant United States Attorney Kevin Fu of the Orange County Office is prosecuting this case.

    MIL Security OSI

  • MIL-OSI Security: Cayuga County Man Sentenced to 12 Years for Possessing Child Pornography

    Source: Office of United States Attorneys

    SYRACUSE, NEW YORK – Andrew Wilbur, age 25, was sentenced today to 12 years’ incarceration for possessing child pornography. United States Attorney John A. Sarcone III and Craig L. Tremaroli, Special Agent in Charge of the Albany Field Office of the Federal Bureau of Investigation (FBI), made the announcement.

    As a part of his prior guilty plea, Wilbur, who previously served a state sentence for a 2019 child pornography conviction in Cayuga County Court, admitted that between January and May of 2024 he possessed child pornography images and videos depicting children as young as 4 years old being sexually abused.  Wilbur admitted that he maintained these files in both an online social communication platform, and on his cellular telephone.    

    In addition to the 12-year sentence, Wilbur was ordered to serve 15 years of supervised release following his term of incarceration, and to forfeit the cellular telephone he used to commit the offense. In addition, Wilbur will be required to continue to register as a sex offender.

    United States Attorney John A. Sarcone III stated, “This arrest continues to demonstrate my office’s close cooperation with our state and local partners to prosecute offenders to the fullest extent of the law, especially those who repeatedly victimize children.”

    FBI Special Agent in Charge Tremaroli said, “This sentence sends a clear message that our office will use every resource available to bring individuals who repeatedly victimize innocent children to justice. We remain committed to working with our law enforcement partners to protect our communities from these dangerous predators.”

    The FBI’s Child Exploitation and Human Trafficking Task Force investigated this case, which was initiated by the New York State Police, and the Cayuga County District Attorney’s Office. Assistant U.S. Attorney Lisa Fletcher, Project Safe Childhood Coordinator for the Northern District of New York, prosecuted the case. 

    Project Safe Childhood is a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse. Led by the U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit https://www.justice.gov/psc.

    MIL Security OSI

  • MIL-OSI Security: San Diego Man Admits Guilt in Sending Hate-Filled Email with Death Threat

    Source: US FBI

    NEWS RELEASE SUMMARY – March 11, 2025

    SAN DIEGO – George Joseph Wellinger II pleaded guilty in federal court today, admitting he intentionally targeted a member of the LGBTQ community and threatened her with violence via email. 

    According to his plea agreement, the defendant admitted that he intentionally selected this victim as the object of his threat based on the victim’s actual or perceived sexual orientation, and because of the defendant’s animus toward members of the LGBTQ community.

    According to court documents, the victim was targeted after being interviewed for a KTLA news report about a hate-inspired murder in Lake Arrowhead in August 2023.

    According to the plea agreement, the threatening email called the victim “another alphabet clown that wants to take a dirt nap, too,” and included a link to the KTLA news report which featured the victim and others discussing the murder of a Lake Arrowhead business owner who had been gunned down for hanging a Pride flag in her business.

    The email continued: “We know what you look like and know where are you are….only a matter of time….Love it….get ur ghey on sister….scissor it up….we coming for ur rainbow azz. Click Click!!!

    On August 18, 2023, Laura Ann Carleton, a known ally to the LGBTQ+ community, was murdered for hanging a pride flag outside her store. Carleton was shot by Travis Ikeguchi, who fled the scene and was later shot and killed by law enforcement. On August 30, 2023, KTLA, a local Los Angeles news station, wrote an article about Carleton’s death.

    Wellinger pleaded guilty to Interstate Threatening Communication with a special finding that he targeted his victim because of her sexual orientation.

    Wellinger is scheduled to be sentenced on June 9, 2025, at 10 a.m. before U.S. District Judge Linda Lopez.

    If you or anyone you know believes you have been the victim of a hate crime, please contact the FBI at www.tips.fbi.gov. Assistant U.S. Attorneys Jacqueline M. Jimenez and Alicia Williams are prosecuting this case.

    DEFENDANT                                               Case Number: 24-CR-1591                                      

    George Joseph Wellinger II                            Age: 49                                   San Diego, CA

    CHARGE

    Transmitting a Threatening Communication – Title 18 U.S.C., § 875(c)

    Maximum penalty: Five years in prison

    INVESTIGATING AGENCY

    Federal Bureau of Investigation

    For more information and resources about the department’s work to combat hate crimes, visit https://www.justice.gov/hatecrimes.

    MIL Security OSI

  • MIL-OSI Security: Rachel A. Byrd Named Special Agent in Charge of the Mobile Field Office

    Source: US FBI

    The Federal Bureau of Investigation has named Rachel A. Byrd as the special agent in charge of the Mobile Field Office. Ms. Byrd most recently served as the section chief of Investigation and Operations in the Weapons of Mass Destruction Directorate (WMDD).

    Ms. Byrd entered on duty as a special agent with the FBI in 2004. Her first assignment was to the Honolulu Field Office, working criminal matters related to violent crimes, drugs and gangs. In 2010, Ms. Byrd was promoted to supervisory special agent in the Laboratory Division, Evidence Response Team. While in the Laboratory Division, Ms. Byrd served as the program manager of the training program in support of over 1200 field ERT personnel. In addition, Ms. Byrd provided support for policy development and multiple field operational matters.

    In 2014, Ms. Byrd became the supervisory senior resident agent in the Jackson Field Office in Mississippi. She oversaw various resident agencies and criminal matters including gangs, drugs, violent crime, and health care fraud.

    In 2017, Ms. Byrd was promoted to assistant special agent in charge of the Criminal Branch in the Mobile Field Office and later covered the National Security Branch as well. Ms. Byrd was promoted to section chief of Investigation and Operations for the WMDD in 2019.

    Prior to the FBI, Ms. Byrd was a special agent with the North Carolina State Bureau of Investigation and a Medicolegal Death Investigator/Autopsy Supervisor with the North Carolina Medical Examiner’s Office in Greenville, NC. Ms. Byrd earned a bachelor’s degree in biology from Fayetteville State University and a master’s degree in forensic toxicology from the University of Florida.

    MIL Security OSI

  • MIL-OSI Security: Shohini Sinha Named Assistant Director of the Victim Services Division

    Source: US FBI

    The Federal Bureau of Investigation has named Shohini Sinha as the assistant director of the Victim Services Division. Ms. Sinha most recently served as the special agent in charge of the Salt Lake City Field Office.

    Ms. Sinha joined the FBI as a special agent in 2001. She was first assigned to the Milwaukee Field Office, where she worked in counterterrorism investigations. She also served temporary assignments at the Guantanamo Bay Naval Base, the FBI Legal Attaché Office in London, and the Baghdad Operations Center.

    Ms. Sinha was promoted in 2009 to supervisory special agent and transferred to the Counterterrorism Division in Washington, D.C. She served as program manager of Canada-based extraterritorial investigations and facilitated liaison efforts with Washington-based Canadian liaison officers.

    In 2012, Ms. Sinha was promoted to assistant legal attaché in Ottawa, Canada, working counterterrorism matters in collaboration with the Royal Canadian Mounted Police and the Canadian Security Intelligence Service. In 2015, she was promoted to field supervisor in the Detroit Field Office, where she led squads responsible for investigating international terrorism matters.

    In early 2020, Ms. Sinha transferred to the Cyber Intrusion squad, which worked both national security and criminal cyber intrusion matters. Later in 2020, she was promoted to assistant special agent in charge for national security matters, and later criminal matters, in the Portland Field Office.

    Ms. Sinha was selected to serve as the executive special assistant to the director in 2021. She has been serving as the special agent in charge of the Salt Lake City Field Office since July of 2023.

    Prior to her employment with the FBI, Ms. Sinha worked as a therapist and later as an administrator for a private, not-for-profit clinic. She earned a bachelor’s degree in psychology and a master’s degree in mental health counseling from Purdue University in Indiana.

    MIL Security OSI

  • MIL-OSI Security: Marshall Yates Named Assistant Director of the Office of Congressional Affairs

    Source: US FBI

    Director Kash Patel has named Marshall Yates as the assistant director of the Office of Congressional Affairs. Mr. Yates most recently served as counsel for Congressman Thomas Massie (KY-04).

    Prior to his appointment with the FBI, Mr. Yates worked in various roles as a lawyer on Capitol Hill. Mr. Yates moved to Washington, D.C., in 2015 to serve as legislative counsel to Congressman Mo Brooks (AL-05). In 2020, he was promoted to chief of staff for Congressman Brooks.

    In 2023, Mr. Yates was hired by Congressman Thomas Massie to serve as his associate counsel on the House Rules Committee and as a counsel to him as the Chair of the House Judiciary’s Subcommittee on Antitrust, Regulatory Reform, and the Administrative State. 

    Mr. Yates graduated from Auburn University in 2011 and Samford University’s Cumberland School of Law in 2015. Mr. Yates was a member of Hillsdale College’s James Madison Fellowship Class of 2022-2023.

    MIL Security OSI

  • MIL-OSI Security: Arkansas Man Arrested, Charged with Enticing a Minor in West Seneca

    Source: US FBI

    BUFFALO, N.Y.- U.S. Attorney Michael DiGiacomo announced today that Brayden Storey, 21, of West Fork, Arkansas, was arrested and charged by criminal complaint with enticement of a minor, which carries a mandatory minimum penalty of 10 years in prison and a maximum of life.

    Assistant U.S. Attorney Maeve E. Huggins, who is handling the case, stated that according to the complaint, on  June 13, 2024, the West Seneca Police Department received a report from a minor victim of an incident involving an individual that she met online. The victim said that Storey first contacted her on Instagram in September 2022, when she was 13 years-old and he was 19 years-old. He also communicated with the minor victim through the social media platform Discord and text message. Between September 2022, and September 2023, they talked about video games and anime shows. At times, Storey made sexual comments, but in October 2023, the sexual communications that Storey sent to the minor victim significantly increased. Storey sent the minor victim a nude image of himself and repeatedly asked her to send him sexually explicit images. Between October 2023, and March 2024, Storey and the minor victim exchanged sexually explicit images.

    In March 2024, the minor victim blocked Storey on all social media applications. As a result, he created another Instagram account to contact her. In April 2024, Storey called the minor victim approximately 50 times in a two-day span, but she did not answer the calls and blocked Storey’s phone number so that he could not contact her. In May 2024, Storey sent the minor victim a four-page letter in the mail at her residence, writing about his suicidal ideations and his desire to be in a relationship with her, regardless of their age difference. Along with the letter, Storey provided a lock of his hair. a search of the minor victim’s phone recovered nude images of Storey and child pornography.

    Storey made an initial appearance in the Western District of Arkansas and was detained. He will be returned to the Western District of New York at a later date.

    The complaint is the result of an investigation by the West Seneca Police Department, under the direction of Chief Brian Cosgrove, and the Federal Bureau of Investigation, under the direction of Special Agent-in-Charge Matthew Miraglia. Additional assistance was provided by the Little Rock Office of the FBI, the Washington County Sheriff’s Office, the Benton County Sheriff’s Office, the Arkansas State Police, and Assistant U.S. Attorney Devon Still, with the U.S. Attorney’s Office in the Western District of Arkansas.

    The fact that a defendant has been charged with a crime is merely an accusation and the defendant is presumed innocent until and unless proven guilty.

    # # # #

    MIL Security OSI

  • MIL-OSI Security: Two Eastern European Organized Crime Leaders Convicted of Murder for Hire Targeting U.S.-Based Journalist on Behalf of Iranian Government

    Source: US FBI

    Iranian Government Hired Polad Omarov and Rafat Amirov to Kill Masih Alinejad in Exchange for $500,000

    A federal jury returned guilty verdicts yesterday on all five counts in the superseding indictment against Rafat Amirov, also known as Farkhaddin Mirzoev, Pᴎᴍ, and Rome, 46, of Iran; and Polad Omarov, also known as Araz Aliyev, Polad Qaqa, and Haci Qaqa, 40, of Georgia. The defendants were convicted of murder-for-hire and attempted murder in aid of racketeering charges, in a trial before U.S. District Judge Colleen McMahon. Amirov and Omarov are scheduled to be sentenced on Sept. 17.

    “The Iranian regime’s brazen plot to silence and murder Americans will not be tolerated,” said Sue J. Bai, head of the Justice Department’s National Security Division. “This verdict underscores the Department’s commitment to finding and holding accountable those who threaten our citizens and our freedoms. With the great work of our prosecutors and law enforcement partners, we are now one step closer to justice.”

    “For years, the Government of Iran has attempted to silence an outspoken Iranian journalist, author, activist and critic of their regime through any means necessary, including harassment, violence, intimidation, and even attempted murder,” said Acting U.S. Attorney Matthew Podolsky for the Southern District of New York. “Chillingly, the plot to murder this Iranian dissident culminated over 6,000 miles from Iran, on U.S. soil, right here in New York, when a hitman with an AK-47 camped outside her home to kill her. I commend the career prosecutors of this office, and our law enforcement partners at the FBI’s Counterintelligence Division for their tireless work in bringing these defendants to justice. This verdict should send a clear message around the world: if you target U.S. citizens, we will find you, no matter where you are, and bring you to justice.”

    “The defendants participated in a brazen plot to kill an Iranian American dissident in New York who criticized the regime in Iran,” said Acting Assistant Director Roman Rozhavsky of the FBI’s Counterintelligence Division. “Thanks to the good work of the FBI and our partners their plan failed. This verdict demonstrates the FBI will not tolerate Iran’s attempts to threaten, silence, or harm American citizens.”

    According to court documents, Amirov and Omarov were high-ranking members of an Eastern European organized crime group (the Organization) who worked with other members of the Organization to attempt to kill Masih Alinejad on instructions from high-ranking members of the Islamic Revolutionary Guard Corps (IRGC). Alinejad has previously been the target of plots by the Government of Iran to intimidate, harass, and kidnap her for her work as a journalist, author, and human rights activist who has publicized the Government of Iran’s human rights abuses around the world. As recently as 2020 and 2021, Iranian intelligence officials and assets plotted to kidnap Alinejad from within the U.S. for rendition to Iran in an effort to silence her criticism of the Iranian regime.

    After these brazen efforts to kidnap Alinejad from the U.S. failed, the IRGC turned to Amirov and Omarov to locate, surveil, and murder her. Beginning in approximately July 2022, Amirov sent targeting information—which he had received directly from IRGC officials in Iran—about Alinejad to Omarov. In turn, Omarov communicated this information to Khalid Mehdiyev, another member of the Organization who had been residing in Yonkers, New York, so that Mehdiyev could surveil Alinejad and murder her. In turn, Mehdiyev sent photographs and videos of Alinejad’s residence to Omarov, who shared these materials with Amirov and the IRGC officials who orchestrated the plot in Iran. Amirov and Omarov then arranged for a $30,000 cash payment to Mehdiyev, who used a portion of this payment to buy an AK-47 style assault rifle, two magazines, and at least 66 rounds of ammunition; as Mehdiyev boasted in electronic communications, a “war machine” he could use to kill Alinejad.

    In late July 2022, Mehdiyev repeatedly traveled to Alinejad’s neighborhood to surveil her. Mehdiyev sent reports of his surveillance to Omarov, who passed them to Amirov. On July 24, 2022, Mehdiyev reported to Omarov from Alinejad’s residence that he was “at the crime scene.” On July 27, 2022, Omarov told Amirov that Mehdiyev was ready to kill Alinejad, writing “this matter will be over today. I told them to make a birthday present for me. I pressured them, they will sleep there this night.”  On July 28, 2022, Mehdiyev sent Omarov a video taken from inside the car that Mehdiyev was driving with the assault rifle and a message reading “we are ready.” Amirov sent an image of the interior of Alinejad’s home to Omarov to be forwarded to Mehdiyev, writing “this is the house where she stays.”  As Omarov continued to update Amirov about Mehdiyev’s readiness, Amirov cautioned Omarov “let him keep the car clean.”  When Mehdiyev subsequently drove from where he was surveilling the residence, he was stopped after a traffic violation and, during a subsequent search of the vehicle, police officers found the assault rifle, 66 rounds of ammunition, approximately $1,100 in cash, and a black ski mask.

    After Mehdiyev was arrested and placed into custody, Omarov contacted Mehdiyev’s mother and threatened to kill her and her other son if she did not locate Mehdiyev.

    Amirov and Omarov were convicted on five counts: murder-for-hire, which carries a maximum penalty of 10 years in prison (Count One); conspiracy to commit murder-for-hire, which carries a maximum penalty of 10 years in prison (Count Two); conspiracy to commit money laundering, which carries a maximum penalty of 20 years in prison (Count Three); attempted murder in aid of racketeering, which carries a maximum penalty of 10 years in prison (Count Four); and possession and use of a firearm in connection with the attempted murder, which carries a maximum penalty of life in prison and a mandatory minimum penalty of five years in prison (Count Five).

    The FBI New York Field Office Counterintelligence-Cyber Division and the New York FBI Iran Threat Task Force are investigating the case, with assistance from the New York City Police Department (NYPD) and the NYPD Intelligence Bureau. The Department of Justice’s Office of International Affairs provided valuable assistance. The Justice Department thanked the authorities in the Czech Republic for their assistance.

    Assistant U.S. Attorneys Michael D. Lockard, Jacob H. Gutwillig, and Matthew J.C. Hellman for the Southern District of New York are prosecuting the case with assistance from paralegal specialist Owen Foley and Trial Attorneys Christopher Rigali and Leslie Esbrook of the National Security Division’s Counterintelligence and Export Control Section.

    MIL Security OSI

  • MIL-OSI Security: FBI Helps Return Missing Musket to Museum of the American Revolution

    Source: US FBI

    Now, investigators had to determine what these items were and where they had been stolen from.  

    Some of these answers came from Scott Corbett, AUSA Newton said. “He had a very good memory and could tell us where Michael had stolen some of the firearms,” she noted. 

    The investigative team also traveled to Cody, Wyoming, to attend a national museum curator’s meeting to see if any experts could help identify these mystery items. 

    “It turns out Michael stole these items from museums from Massachusetts to as far south as Mississippi,” Newton said. “A lot of them were stolen from Pennsylvania. We believe he was responsible for two of the thefts at Valley Forge. He was also responsible for a theft at the U.S. Army War College Museum in Carlisle, Pennsylvania. So, we were able to identify some of these firearms.” 

    Based on the evidence at hand, AUSA Newton explained, “We couldn’t charge him with the thefts, but what we could charge him with was possession of stolen property that had been transported interstate because he’s in Delaware.”  

    Michael Corbett was indicted and pleaded guilty. As part of his plea, he agreed to help recover some of the items that the investigators were initially looking for when they searched his Delaware residence.  

    “Leads in the Corbett case took the FBI Art Crime Team as far west as San Francisco,” Archer added. 

    Coincidentally, during the investigation, a concerned collector called Dr. Stephenson because he believed he might’ve accidentally purchased a stolen rifle. 

    The collector initially purchased the gun from a man named Thomas Gavin, believing it to be a copy of a famous rifle built by Moravian gunsmith John Christian Oerter. But the more he researched, the more he suspected he had the genuine article. The collector turned the rifle over to the authorities. 

    Thomas Gavin turned out to be “a significant museum thief” in his own right, having robbed items from the Valley Forge Park, the Philadelphia Museum of Art, the Academy of Natural Sciences of Drexel University, and additional museums in the greater Philadelphia area. “But he too cooperated and told us what he had stolen,” AUSA Newton said. 

    “We had to then stop, solve that case in order to figure out who stole what from where, in order to then pick the Corbett case back up and bring it home,” Archer recalled of the Gavin section of the overall investigation. “So, it was staggeringly complex across space and time and material.” 

    But just like in Corbett’s case, investigators are still searching for items that Gavin stole, including a rifle that was once owned by naturalist John James Audubon. 

    Even though the investigators’ work is ongoing, the impact of the partnership and the recovery of the artifacts cannot be overstated. 

    “With the 250th anniversary of the American Revolution coming up,” said James Taub, an associate curator at the museum, “the teamwork and partnership between local police and the FBI have given us in Philadelphia and the historical community at large a really strong opportunity to reach people in ways that we haven’t before, through objects that people of my generation haven’t seen and that previous generations might not have seen since before the 200th anniversary of the American Revolution.” 

    Dr. Stephenson echoed that sentiment, noting that “for us, as educator- and preservation-oriented institutions, these objects are irreplaceable.” 

    Stephenson says the museum’s work isn’t done. “It may be that the person who stole an object say 50 years ago may have passed away long ago. In many cases, families may have things that they don’t realize where they came from, how they came into that collection, or things that were sold and passed around.”  

    For this reason, he said, the museum is reexamining how it describes the missing objects, to highlight any valuable details that might spark someone’s memory. The museum is also spreading the word about the stolen items to antique enthusiasts and collectors. 

    “The fact is, the vast majority of people want to do the right thing,” he said. 

    But the FBI stands ready to investigate anyone who knowingly holds onto looted artifacts. 

    “Ultimately,” said Special Agent Archer, “people who know that they are in possession of these stolen items and do the wrong thing, we certainly are prepared to investigate.” 

    MIL Security OSI

  • MIL-OSI Security: FBI Marks 100 Years of Fingerprints and Criminal History Records

    Source: US FBI

    Director Wray joined past and present CJIS leaders, lawmakers, FBI staff, and dozens of retired fingerprint examiners at the July 10 event, which celebrated 100 years since the Bureau established its Identification Division on July 1, 1924. The new division consolidated 810,000 fingerprint files from the United States Penitentiary in Leavenworth, Kansas, and the National Bureau of Criminal Identification, which had been the keeper of crime data for the International Association of Chiefs of Police since 1896.

    Wray described the history of fingerprint technology in investigations spanning a century.

    “I’m proud that we’ve maintained that focus on growing our capabilities, because there’s simply no other way to remain as effective as a law enforcement and intelligence agency when the threats are as dynamic and evolving as they are today,” Wray said. He also highlighted the introduction of new biometric modalities—like facial recognition, palm prints, and iris scans—as innovations that will help the FBI and its partners better carry out their missions into the future. NGI’s National Iris Service, for example, allows users like police and prison staff to enroll iris images without physical contact, linking a subject’s irises to their respective fingerprint records. “You want to talk about the textbook illustration of innovation,” Wray said. 

    To help mark the occasion, artifacts spanning the fingerprint repository’s century-long history were on display for visitors. Items included vintage fingerprint cards, magnifiers, and the colored pencils that fingerprint examiners have used for generations. And a gallery of images illustrated the progression of fingerprint technology—from taking impressions with ink rollers and paper cards to the digital mobile devices that many agencies use today.

    MIL Security OSI

  • MIL-OSI Security: Albuquerque Man Sentenced for Threatening and Stalking a Raleigh Woman He Met Online

    Source: US FBI

    NEW BERN, N.C. – An Albuquerque, New Mexico, man was sentenced Thursday to more than five years in prison (65 months) for defrauding Verizon Wireless, committing aggravated identity theft, and threatening and stalking a victim in Raleigh.  Robert Michael Glauner, 60, pleaded guilty to the charges on January 13, 2025.

    According to court documents and other information presented in court, Glauner briefly met and communicated online with a Raleigh woman in September 2023.  When she rejected further attempts at communication, Glauner began stalking her. In order to find additional ways to reach her, Glauner drafted fake search warrants for her phone records and submitted them to Verizon Wireless.  In the search warrant, he claimed to be member of law enforcement and included a North Carolina Superior Court Judge’s name as authorizing the search. Verizon accepted the search warrants and provided Glauner with the requested information.  Glauner then called or texted the victim’s family, friends, and workplace in order to force her to speak to him.  When that ultimately failed, Glauner drove from Albuquerque to Raleigh, sending the victim threating messages along the way. Members of the Raleigh Police Department intercepted Glauner when he arrived in Raleigh and arrested him on November 6, 2023.  At the time of his arrest, Glauner was in possession of a knife, rope, and illegal narcotics.

    “Glauner’s exploitation of technology and posing as the police to harass and intimidate the victim in this case is incredibly serious behavior,” Acting U.S. Attorney Daniel P. Bubar said today.  “This case also demonstrates law enforcement’s commitment to vigorously pursue cyberstalking allegations, and I want to thank our partners at FBI and the Raleigh Police Department for their work, which brought Glauner to justice.”

    “Online dating is scary enough without someone refusing to take no for an answer.  Mr. Glauner took that to the extreme, pretending to be a law enforcement officer multiple times to track down the victim.  When someone’s response to rejection is so extreme it escalates to stalking, the FBI will step in to stop the offender and hold them accountable every time,” said Robert M. DeWitt, the FBI Special Agent in Charge in North Carolina. 

    Glauner pleaded guilty to three counts of fraud in connection with obtaining confidential phone records; three counts of aggravated identity theft; transmitting a threat; and stalking.

    Daniel P. Bubar, Acting U.S. Attorney for the Eastern District of North Carolina, made the announcement after sentencing by U.S. District Judge Louise W. Flanagan.  The Federal Bureau of Investigation (FBI) and the Raleigh Police Department investigated the case, and Assistant U.S. Attorney Lori Warlick prosecuted the case.

    Related court documents and information can be found on the website of the U.S. District Court for the Eastern District of North Carolina or on PACER by searching for Case No. 5:24-CR-25-FL.

    ###

    MIL Security OSI

  • MIL-OSI Security: Hogan’s Alley Adds New Venues Reflecting Focus on Active Shooter Training

    Source: US FBI

    “We get multiple entities using the venues at the same time, and it creates opportunities to have more realistic training without stepping on each other,” said Fisher of the Tactical Training Unit.

    Still, a casual observer driving through Hogan’s Alley (not open to the public) might not notice anything unusual, even as training is underway. All the buildings are specially designed for training, with a warren of hidden passages and corridors for instructors, observers, and would-be criminals to navigate. Walls, which can be easily moved, are made of material that can withstand live-fire exercises with simulated bullets. Even the upholstery for the movie theater seats was designed to withstand repeated tactical assaults.

    “From the outside, you don’t realize the versatility that the space gives us,” said Assistant Director Maguire. “The addition of real-world-based tactical venues provides our agents yet another opportunity for learning the skills necessary to protect the community.”

    The term Hogan’s Alley dates back to a 19th century comic strip set in a crime-ridden New York tenement called Hogan’s Alley. In the 1950s, the FBI developed a Hogan’s Alley range that was essentially a 120-foot-long façade where targets would pop up and agents had to quickly determine whether to shoot or not. While less sophisticated than today’s techniques, the premise was largely the same: to put trainees in high-stress situations to prepare them for what may come.

    “The more realistic and lifelike we can make these training venues, the better prepared our students are when they encounter the real world,” Fisher said. “We have to introduce information-rich, lifelike environments very early. Everything builds on everything else. And in the environment that we’re working in and with the consequences of the job, we have to give people complexity pretty quick.”

    MIL Security OSI

  • MIL-OSI Security: Operation Clean House: New Orleans

    Source: US FBI

    Operation Clean House was implemented in two phases. 
     
    Phase One focused on a proactive strategy. Law enforcement teams were deployed in every district of New Orleans, engaging in real-time, intelligence-driven actions. Uniformed and unmarked units from multiple agencies received live analytical support as they moved into targeted areas. 

    Phase One resulted in 74 arrests; multiple dangerous drugs seized, including fentanyl, heroin, crack cocaine, and oxycodone; and 46 firearms and ammunition taken into evidence, including AK-47s, AR-15s, Glock switches, and multiple types of handguns.

    “Each weapon and each bullet confiscated is potentially one less person potentially injured or killed,” said Myrthil. 

    Phase Two focused on fugitive apprehension. During the planning phase, partner agencies submitted more than 400 outstanding arrest warrants for FBI intelligence analysts to review and determine whether to include as part of Operation Clean House. Analysts vetted warrants for consideration, checking to see which ones were still active, whether the subject was already incarcerated, or, in some cases, whether the subject was deceased. The analysts narrowed the list of warrants to 76 of the most violent offenses, including attempted murder, assault by drive-by shooting, and aggravated battery or aggravated assault. The warrants were then divided among multi-agency teams to make arrests. 

    Phase Two resulted in 77 arrests, including 100% execution of all warrants, and the seizure of 11 firearms and additional ammunition. 

    “We saw significant results immediately, including the arrest of a 31-year-old man from Pennsylvania on gun and drug charges who was also wanted in Vermont for first-degree murder,” said Myrthil. “At the time we arrested him, this suspected killer had two guns in his possession, including one with an extended magazine.”

    The operation led to one suspect being taken into custody within minutes of a shooting near a New Orleans neighborhood where agents, officers, and troopers were already working. In another incident, state troopers and Homeland Security Investigation agents provided life-saving support to a subject who had shot himself in the leg while fleeing from law enforcement. 
     
    Ultimately, Operation Clean House’s successful results came down to the integration between intelligence and operational components, which ensured a smooth flow of validated information, and partnerships between law enforcement and local communities. 

    “The research and analysis conducted by the intelligence analysts were crucial to this operation and contributed to the likelihood of safe apprehensions,” said Myrthil. “The tremendous partnerships the FBI enjoys with external federal, state, and local law enforcement agencies were key to success. We are proud to also recognize the support of the New Orleans community and its active interest in combatting violent crime.”

    Myrthil emphasized that though Operation Clean House has ended, the FBI and law enforcement will continue to fight violent crime in New Orleans and across Louisiana. 

    “We will work tirelessly with our partners to keep Louisiana safe. We are here, we are listening, and we care.”

    MIL Security OSI

  • MIL-OSI Security: Couple Sentenced to Prison for $2 Million Bank Loan and Pandemic Relief Fraud Schemes

    Source: US FBI

    CHARLOTTE, N.C. – Antoine Johnson, 49, and Kimberly Maddox, 44, formerly of Huntersville, N.C., currently residing in Georgia, were sentenced today for fraudulently obtaining approximately $2 million in bank loans and COVID-19 pandemic relief funds, announced Russ Ferguson, U.S. Attorney for the Western District of North Carolina. Johnson was ordered to serve 51 months in prison followed by three years of supervised release. Maddox was sentenced to 12 months in prison, with six months of home confinement, followed by three years of supervised release. The couple was also ordered to pay restitution in $3,037,868.10.

    Robert M. DeWitt, Special Agent in Charge of the Federal Bureau of Investigation (FBI), Charlotte Division, joins U.S. Attorney Ferguson in making today’s announcement.

    According to court documents and today’s court hearings, the defendants owned and operated Pick Up and Go Moving International, Inc. and affiliated businesses (collectively, PUGMI). Johnson was the president of PUGMI and Maddox the vice president. Court documents show that, between 2018 and 2023, the defendants fraudulently applied for and obtained multiple lines of credit, bank loans, Paycheck Protection Program (PPP) loans and Economic Injury Disaster Loan (EIDL) program loans on behalf of their businesses. Johnson and Maddox applied for loans totaling more than $3.4 million. To secure the loans, the defendants lied on more than 35 loan applications about PUGMI’s income, gross revenues, expenses, and number of employees, and submitted fabricated supporting documents that included fraudulent tax returns and fictitious financial statements. Court documents show that at the time the couple engaged in the fraudulent loan schemes, Johnson was on federal supervised release after he was convicted and sentenced to prison for mortgage fraud.

    Johnson and Maddox previously pleaded guilty to conspiracy to commit bank fraud and wire fraud and making a false statement to a financial institution. They will be ordered to report to the Federal Bureau of Prisons upon designation of a federal facility.

    The FBI handled the investigation.

    Assistant U.S. Attorneys Caryn Finley and Graham Billings of the U.S. Attorney’s Office in Charlotte prosecuted the case.

    Anyone with information about allegations of attempted fraud involving COVID-19 can report it by calling the Department of Justice’s National Center for Disaster Fraud (NCDF) Hotline at 866‑720‑5721 or via the NCDF Web Complaint Form at www.justice.gov/disaster-fraud/ncdf-disaster-complaint-form.

    MIL Security OSI

  • MIL-OSI Security: Meet the Cyber Action Team

    Source: US FBI

    Across the globe, malicious cyber activity threatens public safety and national and economic security. Criminals target organizations such as schools, hospitals, power and utility companies, and other critical infrastructure entities that serve communities.

    As the lead federal agency for investigating cyberattacks and intrusions, the FBI developed a specialty group—the Cyber Action Team, or CAT—that can deploy across the globe within hours to respond to major cyber threats and attacks against these critical services.

    Composed of about 65 members, CAT is an investigative rapid response fly team that leverages special agents, computer scientists, intelligence analysts, and information technology specialists from across FBI field offices and Headquarters.

    “We respond onsite to victims who may include national government entities, private companies, or even sometimes foreign partner networks that have been compromised by an adversary,” said Scott Ledford, head of the Cyber Action Team and the Advanced Digital Forensics Team. “Our job is to help conduct the investigation—we collect digital evidence and locate, identify, and reverse engineer malware. We also help the victim understand when they were compromised and how, writing a timeline and a narrative of that intrusion with the ultimate goal of identifying who is responsible, attributing that attack.”

    CAT was established in 2005 in response to an increase in the number and complexity of computer intrusion investigations in FBI field offices. At the time, not all field offices had personnel with the cyber expertise necessary to properly respond to and investigate sophisticated computer intrusions.

    “There was this transition that was taking place between what investigations the FBI was responsible for and the types of crimes that we were starting to see,” explained Ledford. “Cyber was such a growing threat at the time, and so it became necessary that some field offices would reach out and say, ‘Hey, do you know of any cyber experts who can help me work through an investigation?”

    As the team formalized its processes and expanded, in 2016, the Presidential Policy Directive 41, “United States Cyber Incident Coordination” was signed, setting forth principles for the federal government’s response to cyber incidents involving government or private sector entities. The FBI was appointed the lead federal agency for cyber threat response activities.

    “From an investigative standpoint, the FBI is unique. We’re one of the few agencies in the U.S. government that has both law enforcement and counterintelligence authorities,” said Ledford. “And those authorities, and the American people’s trust in us, help us to deliver a unique blend of national security and criminal investigative skills, expertise, and resources to implement that blended response and help facilitate an investigation, regardless of whether it leads us overseas or to a courtroom here in the U.S.”

    The bulk of CAT’s cases usually involve the FBI identifying an organization with a particular intrusion that’s either so complex or large-scale that the local field office requests additional assistance.

    In one case, CAT deployed to a health care company that a separate intrusion investigation had identified as compromised. CAT’s response helped lead to the identification of several compromised systems and accounts on their network. While working alongside the company, CAT disrupted the threat—and prevented further exploitation across their network.

    CAT also receives requests from FBI legal attachés, the State Department, the National Security Council, and the White House to assist other countries when they face cyberattacks.

    “It could be a country that doesn’t have the resources or the expertise that the U.S. government has, and they’ve reached out and asked for help,” said Ledford. “There can be a NATO or a non-NATO ally country that says, ‘We’ve been hit hard by this adversary, and we don’t have the localized personnel, we don’t have the resources, we don’t have the expertise to respond to this. Can you help us with it?”

    In another case, CAT deployed overseas to provide incident response support to a NATO ally that had been targeted by a destructive cyberattack. CAT responded and worked together with U.S. partners to determine the initial intrusion vector, identify other networks that were impacted, collect and analyze digital evidence, and ultimately attribute the intrusion to a foreign government. The NATO ally severed diplomatic ties with the foreign government, closed the foreign government’s in-country embassy, and evicted them from the country.

    “We have some talented people, and they work hard every single day,” said Ledford. “It’s an honor to sit alongside them.”

    Key Tactic: Strong Communication Skills

    In addition to excellent technical skills, CAT members are closely vetted for strong communication skills. Ledford explained that part of the CAT applicant selection process entails a multi-day live technical exercise that’s designed and curated by CAT:

    “We design a network environment. We may mimic an industry, for example, an electric utility. And then we compromise that environment, and we litter it with artifacts, digital evidence, and malware. Then we task applicants to investigate this cyber incident and present their findings.

    At the end of the five days, applicants present their findings, and we identify who has the technical capability and expertise to find digital evidence of a crime hidden within this mountain of data that we’ve thrown at them.

    If the applicant passes that phase of that selection exercise, we invite them to participate in a panel presentation. Our CAT members will play the roles of the victims we’re trying to help and their own resource teams, for example, a company CEO, a U.S. attorney, a third-party legal counsel, or IT administrator.

    You’re essentially giving us the narrative of the cyber intrusion. You’re telling us a story about what happened. While some of the panel questions will be very technical in nature, some will be more basic questions—the applicant will need to be able to explain to a CEO, for example, who might not have technical expertise, what the problem was and how to fix it. We’re looking to see whether you can take something that’s exceptionally technically complex and explain it in such a way that everyone in the room understands it.

    We’re also looking for interpersonal ability. For example, in the case of a company CEO, at that moment during a cyberattack, they may be going through one of the most stressful times of their company’s existence—there may be data leaked that can make or break that company’s future and their profits, as well as their ability to employ people and their ability to deliver services to their customers. You need the communications skills to interact with them during a difficult time and gain trust.”

    MIL Security OSI

  • MIL-OSI Security: Students Get Inside Look at Life as an FBI Agent

    Source: US FBI

    The course is a lively mix of presentations and practical exercises. FBI personnel—including linguists, technical experts, forensic accountants, intelligence analysts, special agents, and bomb technicians—answered questions about their jobs and how they arrived at the FBI.

    In a mock scenario on the first day, a special agent explained how investigators assemble the building blocks of a case by looking at the available facts and evidence and then asking the right questions. Then students separated into “squads” and practiced.

    On day two, students learned best practices for dusting for fingerprints, sketching crime scenes, and interviewing subjects—all while dutifully documenting everything. For many, the rigors of tracking every photo, statement, and piece of evidence was illuminating.

    “It was really eye-opening,” said Ryan, an FAIT participant. “It’s been very jarring to see, like, just how methodical that process is for any kind of crime scene like this.”

    Photo Gallery

    Select image to view gallery

    “There’s a lot more that goes into examining a crime scene than people realize,” added Hannah, another FAIT participant. “There were multiple different things we needed to include, like the case number, the item number, description, location, time.”

    The Cleveland Division borrowed the idea for Future Agents in Training from the FBI’s Washington Field Office in 2015, seeing it as a way to connect with students in the communities it serves. FBI field offices rely on outreach efforts like FAIT, Citizens Academies, Junior Special Agents, college Honors Internships, and Teen and Youth Academies to help strengthen relationships with communities.

    MIL Security OSI

  • MIL-OSI Security: Ensuring Safety at Sea

    Source: US FBI

    In addition to reporting the incident to a cruise ship security officer as soon as possible, you can also report the incident to the FBI directly. Knowing your rights can help you speak up if something happens.

    For investigators, a big challenge is delayed reporting.

    Pagliarini stressed the importance of immediate reporting by victims and witnesses, especially considering the complexities of investigating crimes at sea.

    Delays often occur because victims feel ashamed or uncertain and may only report the incident after discussing it with others once they return home, said Pagliarini.

    “We get that a lot, or somebody has something stolen, and they don’t know until they got home and then report it,” said Pagliarini. “This delay complicates investigations, especially when victims are far from the location of the incident.”

    Parker and Pagliarini suggest passengers avoid taking valuable jewelry—as it’s easy to lose or have stolen—be responsible when drinking, and go directly through the cruise line company when booking excursions.

    They also explained that it is important to familiarize yourself with the guest services locations on the ship. And if you see an incident, do your best to be a helpful witness.

    Behind every cruise ship crime incident is a human story of victims seeking justice and families grappling with loss. The FBI’s Victim Services Division offers support to those affected by crimes at sea.

    “It’s very common if we have a juvenile involved, we make our best efforts to notify Victim Services ahead of time, and often they’ll accompany myself or whoever’s going out initially on the investigation,” said Pagliarini. From counseling referrals to support navigating the criminal justice process, their efforts extend to both victims and their families.

    Additionally, the FBI conducts specialized training for industry partners, enhancing their ability to assist law enforcement with securing and documenting a crime scene at sea.

    “We try to hold trainings with the cruise industry personnel, kind of a best practice as far as evidence preservation,” said Parker.

    The collaborative approach to security at sea, along with passengers understanding how to mitigate risk, is vital to ensuring the FBI can work with partners at every level to investigate crimes on the high seas and keep Americans safe.

    MIL Security OSI

  • MIL-OSI Security: Highlighting Safety Measures to Protect Nation’s Food Infrastructure

    Source: US FBI

    “Wherever in the country you may live—from California to Nebraska to Georgia to points in between—the cyber risk and the national security risk for farms and ranches and our food processing facilities is growing exponentially,” said Gene Kowel, special agent in charge of the FBI’s Omaha Field Office, which partnered with the Nebraska Farm Bureau to host the August 12 symposium. “The threats are evolving. They’re becoming more complex and more severe.”

    Examples shared during the daylong event included ransomware attacks that cripple operations, network hacks that take control of systems, and the theft of seeds worth millions of dollars in intellectual property and research.

    Kowel said the FBI is monitoring four major threats to the nation’s agriculture sector, which—like water, power, and transportation—is considered part of the nation’s critical infrastructure. The threats include ransomware attacks, malicious software (malware) from foreign adversaries, theft of data and intellectual property, and bioterrorism.

    Foreign actors—most notably the People’s Republic of China—are actively seeking ways to disrupt the United States’ agriculture industry, Kowel said. He urged farmers, cattle ranchers, and others to add cyber hygiene to their long list of chores. Cyber hygiene includes basic steps like using multi-factor authentication to access networks and backing up critical data.

    “We all know that in agriculture today, almost all of our data is stored in the cloud,” Kowel said. “Almost all of our complex machinery is connected to the internet, connected to the cloud, so protecting that control and protecting that data is critical.”

    MIL Security OSI

  • MIL-OSI Security: 2023 Cryptocurrency Fraud Report Released

    Source: US FBI

    Losses related to cryptocurrency fraud totaled over $5.6 billion in 2023, a 45% increase in losses since 2022, according to a report from FBI’s Internet Crime Complaint Center (IC3) published on September 9, 2024. The number of complaints from the public regarding cryptocurrency fraud continues to steadily increase, reaching 69,000 in 2023.

    Cryptocurrency is a type of digital currency that you can use to buy goods or services or to invest. Examples of cryptocurrencies include bitcoin, ether, or tether.

    As the use of cryptocurrency in the global financial system continues to grow, criminals are increasingly using cryptocurrency due to its decentralized nature, the speed of irreversible transactions, and the ability to transfer value around the world. Using cryptocurrency also makes it harder for victims to recover stolen funds. Once an individual sends a payment, the recipient owns the cryptocurrency. Recipients often quickly transfer that digital currency into an account overseas for cashout purposes.

    Criminals can exploit cryptocurrencies in many types of criminal schemes. In 2023, most cryptocurrency complaints involved investment scams. These losses totaled $3.9 billion and accounted for almost 71% of all losses related to cryptocurrency in 2023. Other examples of scams associated with cryptocurrency include tech support, confidence and romance, and government impersonation scams.   

    Cryptocurrency investment fraud is the most common type of cryptocurrency scam. In this type of fraud, criminals use various means of manipulation to convince victims to deposit increasing amounts of money into financial “investments” using cryptocurrency. In truth, these investments are fake; criminal actors who are usually located overseas control—and ultimately steal—all victim money. As a result, victims typically lose everything they invested.

    Losses from cryptocurrency-related investment fraud schemes reported to the IC3 rose from $2.57 billion in 2022 to $3.96 billion in 2023‚a 53% increase. Many individuals have accumulated massive debt to cover losses from these fraudulent investments.

    Individuals aged 30-39 and 40-49 filed the most complaints related to cryptocurrency investment fraud (approximately 5,200 reports in each age group). But complainants over the age of 60 reported the highest losses (over $1.24 billion).

    Learn more about the process behind cryptocurrency investment fraud. 

    The FBI, along with the Department of Justice, law enforcement, regulatory agencies, and financial institution partners, is dedicated to identifying the perpetrators of these schemes and bringing them to justice.

    The FBI’s IC3 is the central intake hub for individuals in the U.S. or abroad to report fraud and cybercrime. The IC3 analyzes complaints and aggregates them to identify trends and help develop strategies to combat these schemes and protect scam victims from loss. IC3 also shares the complaints it receives with FBI field offices, other law enforcement agencies, and regulatory entities for further investigation or action, as appropriate.

    In February 2022, the FBI formed the Virtual Assets Unit (VAU), a specialized team dedicated to investigating cryptocurrency-related crimes. The VAU centralizes the FBI’s cryptocurrency expertise into one nerve center, providing technological equipment, blockchain analysis, virtual asset seizure training, and other sophisticated training for FBI personnel. 

    If you believe you or someone you know may be a victim of cryptocurrency fraud, immediately submit a report to the IC3 via ic3.gov or contact your local FBI field office and provide as much transaction information as possible. We encourage you to submit a complaint through ic3.gov, even if a financial loss did not occur.

    When submitting a report to ic3.gov, include as much as you can of the following information: 

    • Financial transaction details, including: 
      • Cryptocurrency wallet addresses 
      • The amounts and types of cryptocurrencies involved 
      • Date and time of the transactions, and transaction IDs (hash)
    • Information about how you met the scammer(s)
    • What platforms you used to communicate with the scammer(s)
    • Any website address(es) involved in the scheme
    • Any phone numbers or other identifiers you might have about the scammer(s)

    You can refer to IC3’s public service announcement, “FBI Guidance for Cryptocurrency Scam Victims,” for more information about what to report.

    Individuals aged 60 or older can also contact the National Elder Fraud Hotline (833-372-8311) to assist with filing an IC3 complaint. 

    MIL Security OSI

  • MIL-OSI Security: FBI Director Announces Chinese Botnet Disruption, Exposes Flax Typhoon Hacker Group’s True Identity at Aspen Cyber Summit

    Source: US FBI

    The FBI and our partners disrupted a Chinese botnet and freed thousands of impacted devices from its clutches, Director Christopher Wray announced September 18. 

    The botnet, which was operated by a Chinese government-sponsored hacker group known as Flax Typhoon, targeted internet-connected devices such as storage devices, cameras, and video recorders to compromise victims’ systems and steal their confidential data, Director Wray said during a keynote at the 2024 Aspen Cyber Summit in Washington, D.C.

    “Ultimately, as part of this operation, we were able to identify thousands of infected devices, and, then, with court authorization, issued commands to remove the malware from them, prying them from China’s grip,” Wray said.  

    Approximately half of the devices under the botnet’s control were based in the United States, he noted. The hacker group’s targets included organizations in the public and private sectors, as well as academia and the media, he added. Wray also revealed the hacker group’s true identity to be an information security company known as the Integrity Technology Group. “But their chairman has publicly admitted that for years his company has collected intelligence and performed reconnaissance for Chinese government security agencies,” Wray added. 

    Wray called the cyber disruption a success but cautioned that the effort was “just one round in a much longer fight.” 

    “The Chinese government is going to continue to target your organizations and our critical infrastructure—either by their own hand or concealed through their proxies,” Wray said. “And we’ll continue to work with our partners to identify their malicious activity, disrupt their hacking campaigns, and bring them to light.” 

    Saving victims time and money 

    During his remarks, Wray also underscored the Bureau’s dedication to working with victims of cyber intrusions, whether they’re individuals or organizations. According to Wray, reporting ransomware attacks to the FBI can potentially help us: 

    • Recover ransomed data 
    • Negotiate-down ransoms demanded by cybercriminals—or spare victims from having to pay ransoms at all 
    • Help impacted organizations resume their normal operations in a speedy manner 

    “I’m extremely proud to report that, in just the past two years, the FBI has handed out nearly 1,000 decryptors, and we’ve saved victims around the world something like $800 million in ransom payments,” Wray said. 

    Decryptors—also known as decryption keys—function like passwords to unlock data that ransomware criminals hold captive. But, Wray explained, some of those keys require information about the victim to work.  

    So it’s paramount that organizations contact the FBI if they fall victim to ransomware attacks. Otherwise, he cautioned, the Bureau “might not be able to make that match—and we might not be able to save you that ransom payment.” 

    Wray also discussed how information sharing between the Bureau and our public and private sector partners can help the FBI combat ongoing cyberattacks and lessen the impact of future cyber incidents.  

    As an example, he pointed to a recent interagency effort to alert the private sector that a pro-Russian hacktivist group was targeting “operational technology networks.”  

    “They had set their sights across our critical infrastructure—from dams and wastewater systems to the energy, food, and agriculture sectors,” Wray explained.  

    But, he said, the FBI’s joint advisory about the cyber threat allowed private sector organizations to fix the vulnerability these bad actors were using to infiltrate networks, thereby protecting the companies and the American public, alike. 

    “So, if there’s only one thing you take away from my time here today, I hope it’s this: The FBI needs and wants to work with you,” Wray said. “Let us save you money, save you time, and save you from future attacks so that you can keep your organization’s focus where it should be: on your operations, and—together—we can help keep our nation safe.” 

    West Palm Beach investigation updates 

    During his remarks, Wray also addressed the Bureau’s investigation into the September 15 assassination attempt on former President Donald Trump.  

    “For the second time in just over two months, we’ve witnessed what appears to be an attempt to attack our democracy and our democratic process,” he said. “I’m relieved that former President Trump is safe, and I want the American people to know the men and women of the FBI are working tirelessly to get to the bottom of what happened.” 

    Wray acknowledged that the ongoing nature of the investigation limited how much the Bureau could say about the matter. 

    “What I can say is that we have dedicated the full force of the FBI to this investigation, and that runs the gamut from criminal to national security resources, from tactical support to Evidence Response Teams, from forensic scientists to operational technology personnel,” he said.“Together, we’re working around the clock to investigate this.” 

    MIL Security OSI

  • MIL-OSI Security: McAlester Resident Sentenced to 11 Years for Maiming in Indian Country

    Source: US FBI

    MUSKOGEE, OKLAHOMA – The United States Attorney’s Office for the Eastern District of Oklahoma announced Cody Ray McFadden, age 36, of McAlester, Oklahoma, was sentenced to 132 months in prison for one count of Maiming in Indian Country.

    The charge arose from an investigation by the Pittsburg County Sheriff’s Office, the Oklahoma Highway Patrol, and the Federal Bureau of Investigation.

    On December 16, 2024, McFadden pleaded guilty to the charge.  According to investigators, on July 16, 2022, McFadden invited a visitor to his residence. Once inside, McFadden beat the victim, forced the victim into a cage, and padlocked the door.  During the next 36 hours, McFadden proceeded to assault and torture the victim, threatening to kill the victim with a cross bow and intentionally striking at the victim with an axe.  The victim, who sustained a head laceration, burns, bruises, and a broken arm, managed to break free, escape through a window, and run to a neighbor’s home.  Law enforcement responding to the neighbor’s emergency call took McFadden into custody after a brief standoff.  The crime occurred in Pittsburg County, within the boundaries of the Choctaw Nation Reservation, in the Eastern District of Oklahoma.

    “This defendant demonstrated a complete lack of humanity, subjecting the victim to an extended period of violence resulting in unimaginable physical and mental trauma,” said FBI Oklahoma City Special Agent in Charge Doug Goodwater.  “The FBI and our law enforcement partners are committed to rooting out violent offenders through aggressive investigations and prosecutions.”

    “This is the stuff of nightmares, but unfortunately, it was sickeningly real,” said United States Attorney Christopher J. Wilson.  “I commend the bravery of this survivor, the quick work of law enforcement in securing an end to this horrifying ordeal, and the steadfastness of investigators and prosecutors who ensured that McFadden spends the next decade in prison answering for his ruthless crimes.”

    The Honorable Ronald A. White, Chief U.S. District Judge in the United States District Court for the Eastern District of Oklahoma, presided over the hearing.  McFadden will remain in the custody of the U.S. Marshals Service pending transportation to a designated United States Bureau of Prisons facility to serve a non-paroleable sentence of incarceration.

    Assistant U.S. Attorney Joshua Satter represented the United States.

    MIL Security OSI

  • MIL-OSI Security: Okmulgee Resident Sentenced to Over 20 Years for Voluntary Manslaughter

    Source: US FBI

    MUSKOGEE, OKLAHOMA – The United States Attorney’s Office for the Eastern District of Oklahoma announced that Brett Wayne Pigeon, age 45, of Okmulgee, Oklahoma, was sentenced to 126 months in prison for one count of Voluntary Manslaughter in Indian Country, and 120 months in prison for one count of Using, Carrying, Brandishing and Discharging a Firearm in Relation to a Crime of Violence.  The terms will be served consecutively.

    The charges arose from an investigation by the Bureau of Alcohol, Tobacco, Firearms and Explosives, the Federal Bureau of Investigation, the Okmulgee Police Department, and the Muscogee (Creek) Nation Lighthorse Police Department.

    On January 6, 2025, Pigeon pleaded guilty to the charges.  According to investigators, on November 27, 2023, law enforcement responding to reports of shots fired discovered the victim deceased from apparent gunshots to the back, head, and hip.  Pigeon was identified as a suspect, and later admitted shooting the victim with a 12-gauge shotgun.    The crimes occurred in Okmulgee County, within the boundaries of the Muscogee (Creek) Nation Reservation, in the Eastern District of Oklahoma.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone.  On May 26, 2021, the department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.

    The Honorable Ronald A. White, Chief U.S. District Judge in the United States District Court for the Eastern District of Oklahoma, presided over the hearing.  Pigeon will remain in the custody of the U.S. Marshals Service pending transportation to a designated United States Bureau of Prisons facility to serve a non-paroleable sentence of incarceration.

    Assistant U.S. Attorneys Patrick M. Flanigan and Rachel Geizura represented the United States.

    MIL Security OSI

  • MIL-OSI Security: Adair County Resident Pleads Guilty to Federal Firearm Crime

    Source: US FBI

    MUSKOGEE, OKLAHOMA – The United States Attorney’s Office for the Eastern District of Oklahoma announced that Jimmy Darrell Porter Jr., age 40, of Westville, Oklahoma, entered a guilty plea to one count of Use, Carry, Brandish and Discharge of a Firearm During and in Relation to a Crime of Violence, punishable by a minimum of 10 years in prison and a fine up to $250,000.00.

    The Indictment alleged that on August 4, 2024, Porter knowingly used, carried, brandished, and discharged a firearm during and in relation to a crime of violence.

    The charge arose from an investigation by the Federal Bureau of Investigation, the Cherokee Nation Marshal Service, and the Westville Police Department.

    The Honorable D. Edward Snow, U.S. Magistrate Judge in the United States District Court for the Eastern District of Oklahoma, accepted the plea and ordered the completion of a presentence investigation report.

    A U.S. District Court Judge will determine the sentence to be imposed after considering the U.S. Sentencing Guidelines and other statutory factors.

    Porter will remain in the custody of the United States Marshals Service pending sentencing.

    Assistant U.S. Attorney Jonathan E. Soverly represented the United States.

    MIL Security OSI

  • MIL-OSI Security: Ecuadorian National Sentenced to 30 Years in Prison for Production of Child Pornography

    Source: US FBI

    HARRISBURG – The United States Attorney’s Office for the Middle District of Pennsylvania announced that on April 23, 2025, Alvaro Andres Valarezo Sandoval, age 35, an Ecuadorian National residing in Miami, Florida, was sentenced by Senior United States District Judge Malachy E. Mannion to 30 years’ imprisonment on two counts of production of child pornography.

    According to Acting United States Attorney John C. Gurganus, Sandoval sexually exploited six Central Pennsylvania minors by deceiving and threatening them into creating and sending him explicit photos and videos between 2013 and 2019.  As part of the scheme, Valarezo Sandoval would often build a rapport with the minor victims by showing affection and then entice and encourage them to send images or videos of themselves that were sexually provocative and/or sexually explicit. If a minor attempted to cease the relationship, Valarezo Sandoval would extort them by threatening to post their explicit images online unless they complied with his demands to continue providing him with sexually explicit content.

    There were at least six victims in central Pennsylvania and at least 30 others worldwide. One victim gave an impassioned statement to the court explaining the devastating impact this crime had on her and her family.

    The case was investigated by the Federal Bureau of Investigation and Pennsylvania State Police. Assistant United States Attorney Michael Scalera prosecuted the case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue victims. For more information about Project Safe Childhood, please visit www.usdoj.gov/psc.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Farmington Resident Charged with Sexual Exploitation of a Minor as Part of DOJ/FBI Operation Restore Justice

    Source: US FBI

    PITTSBURGH, Pa. – A resident of Farmington, Pennsylvania, has been indicted by a federal grand jury in Pittsburgh on charges of violating federal laws regarding the sexual exploitation of a minor, Acting United States Attorney Troy Rivetti announced today.

    The two-count Indictment named Nathan Fike, 40, as the sole defendant.

    According to the Indictment presented to the Court, on or about October 4, 2023, Fike distributed material depicting the sexual exploitation of a minor. The government further alleges that, on or about February 9, 2024, Fike knowingly possessed material depicting the sexual exploitation of a minor. The Indictment occurred in connection with Operation Restore Justice, a coordinated, nationwide enforcement effort to identify, track, and arrest child sex predators that, as announced today by the Department of Justice and the Federal Bureau of Investigation, resulted in the rescue of 115 children and the arrests of 205 child sexual abuse offenders over a five-day period. The coordinated effort was executed by all 55 FBI field offices, the Child Exploitation and Obscenity Section (CEOS) in the Department’s Criminal Division, and United States Attorneys’ Offices around the country (read the Operation Restore Justice news release here).

    The law provides for a maximum total sentence of not less than five years and up to 40 years in prison, a fine of up to $250,000, or both. Under the federal Sentencing Guidelines, the actual sentence imposed would be based upon the seriousness of the offenses and the prior criminal history, if any, of the defendant.

    Assistant United States Attorney DeMarr W. Moulton is prosecuting this case on behalf of the government.

    The Federal Bureau of Investigation conducted the investigation leading to the Indictment.

    This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorneys’ Offices and the Criminal Division’s CEOS, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    An indictment is an accusation. A defendant is presumed innocent unless and until proven guilty.

    MIL Security OSI

  • MIL-OSI Security: Former Police Commissioner and Former Director of the Virgin Islands Office of Management and Budget Charged in Bribery Scheme

    Source: US FBI

    An indictment was unsealed today charging Ray Martinez, the former police commissioner of the Virgin Islands Police Department (VIPD), and Jenifer O’Neal, the former director of the Virgin Islands Office of Management and Budget, with participating in a bribery and money laundering conspiracy. Both defendants made their initial court appearances today in St. Thomas, U.S. Virgin Islands.

    According to court documents, Martinez, 56, and O’Neal, 53, both of St. Thomas, accepted bribes from a then-government contractor, David Whitaker. The indictment alleges that the scheme began in at least November 2022 and continued until June 2024, with O’Neal joining the scheme no later than January 2024. The defendants also allegedly conspired to launder proceeds from the bribery scheme through a monetary transaction to pay rent on O’Neal’s coffee shop. In exchange for the bribes paid by the government contractor, Martinez and O’Neal, among other official acts, allegedly agreed to approve fraudulently inflated invoices and assist with obtaining payment for those invoices by the Virgin Islands to Whitaker. Martinez also agreed to assist Whitaker in obtaining a $1.48 million contract to provide services to the VIPD in October 2023. Additionally, after the investigation was originally made public, Martinez allegedly obstructed the investigation by encouraging Whitaker to destroy evidence associated with Martinez’s criminal activity and produced falsified documents in response to a subpoena.

    Martinez and O’Neal are each charged with five counts of honest services wire fraud, which each carry a maximum penalty of 20 years in prison; one count of federal program bribery, which carries a maximum penalty of 10 years in prison; and one count of money laundering conspiracy, which carries a maximum penalty of 20 years in prison. Martinez is also charged with two counts of obstruction of justice, which each carry a maximum penalty of 20 years in prison. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    Principal Deputy Assistant Attorney General Brent S. Wible, head of the Justice Department’s Criminal Division; U.S. Attorney Delia Smith for the District of the Virgin Islands; and Special Agent in Charge Joseph Gonzalez of the FBI San Juan Field Office made the announcement.

    The FBI San Juan Field Office, St. Thomas Resident Agency is investigating the case.

    Trial Attorneys Alexandre Dempsey and Steve Loew of the Criminal Division’s Public Integrity Section and Assistant U.S. Attorney Michael Conley for the District of the Virgin Islands are prosecuting the case.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: Man Indicted and Arrested for Firearms Violations

    Source: US FBI

    SAN JUAN, Puerto Rico – On December 12, 2024, a federal grand jury in the District of Puerto Rico returned an indictment charging Ángel Javier Avilés-Monzón, a.k.a. “Chimi/Yovngchimi” with two counts for firearms violations. FBI special agents arrested Avilés-Monzón today at the Luis Muñoz Marín International Airport.

    According to court documents, on or about June 4, 2023, and on or about August 25, 2024, Ángel Javier Avilés-Monzón knowingly possessed a machinegun, that is, a pistol of unknown make and model, modified to fire automatically more than one shot without manually reloading by a single function of the trigger.

    If convicted, the defendant faces a maximum penalty of 10 years in prison for each count. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    U.S. Attorney W. Stephen Muldrow of the District of Puerto Rico, and Joseph González, Special Agent in Charge of the Federal Bureau of Investigation San Juan Field Office made the announcement.

    Assistant U.S. Attorney (AUSA) Alberto López-Rocafort, Chief of the Gang Section, and AUSA Joseph Russell are prosecuting the case.

    An indictment is merely an allegation and all defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: New York Man Sentenced to 15 Years in Prison for Role in Kidnapping

    Source: US FBI

    NEWARK, N.J. – A Queens, New York man was sentenced to 15 years in prison for his role in a Paterson, New Jersey, kidnapping, U.S. Attorney Alina Habba announced.

    Reginald Law, 39, previously pleaded guilty before U.S. District Judge Evelyn Padin in Newark federal court to an indictment charging him with kidnapping and Hobbs Act robbery. 

    According to documents filed in this case and statements made in court:

    On October 8, 2020, Law and his conspirator, Maurice Cottman, entered a retail store in Paterson, where they accosted the victim, who was working in the store. Law and Cottman physically removed the victim from the store, then transported him in the back of a U-Haul truck from Paterson to New York.  Law admitted that during the kidnapping, he and Cottman called the victim’s family and demanded ransom for his return.  Law and Cottman also forced the victim to give them his debit card and pin number, which they used to withdraw money from his bank accounts.

    In addition to the prison term, Judge Padin sentenced Law to five years of supervised release.

    Cottman previously pleaded guilty before Senior U.S. District Judge Stanley R. Chesler to an Information charging him with one count of kidnapping. On March 29, 2022, Judge Chesler sentenced Cottman to 15 years in prison with five years of supervised release.

    U.S. Attorney Habba credited special agents of the FBI, under the direction of Acting Special Agent in Charge Terence G. Reilly in Newark, with the investigation leading to today’s sentence.  He also thanked the FBI New York Field Office and the Paterson Police Department for their assistance.

    The government is represented by Assistant U.S. Attorney Shontae D. Gray of the Economic Crimes Unit.

                                                               ###

    Defense counsel: Christopher L. Patella Esq., Bayonne, New Jersey

    MIL Security OSI