MADISON, WIS. – Timothy M. O’Shea, United States Attorney for the Western District of Wisconsin, announced that Angel Flores, 31, Portage, Wisconsin, was sentenced today by Chief U.S. District Judge James D. Peterson to 12 years in federal prison for attempting to possess more than 500 grams of cocaine for distribution. Flores pleaded guilty to this charge on December 18, 2024. Juan Ojeda, 31, West Allis, Wisconsin, was sentenced yesterday by Judge Peterson to one year in federal prison for possessing cocaine intended for distribution. Ojeda pleaded guilty to this charge on December 16, 2024.
In late 2022, agents with the U.S. Drug Enforcement Administration and the Federal Bureau of Investigation began investigating a large cocaine and methamphetamine trafficking organization operating in the Western District of Wisconsin. During the investigation, agents intercepted communications between Flores and his California supplier of cocaine and methamphetamine. Investigators determined that Flores was obtaining multiple kilograms of cocaine and large amounts of methamphetamine and selling it throughout the Western District of Wisconsin, including Madison, Portage, and La Crosse.
In January 2023, co-defendant Juan Ojeda travelled to Chicago at the direction of Flores to meet with a courier sent by the California supplier. Ojeda received 12 kilograms of cocaine in that meeting and transported it back to Wisconsin. In February 2023, intercepted phone communications resulted in the interception of a load of cocaine as it travelled through Arizona on its way to Illinois, where Flores arranged to receive three kilograms from the shipment.
In sentencing Flores, Judge Peterson expressed concern about the large quantity and geographic scope of the trafficking organization led by Flores, observing that he brought multiple kilograms of cocaine into Wisconsin on a continuing basis over a long period of time, with distribution spanning nearly two-thirds of the state. Judge Peterson indicated that the 12-year sentence for Flores’s leadership role in “some of the highest level of dealing in this district” was intended to convey that drug trafficking in this volume will not be tolerated.
In sentencing Ojeda, Judge Peterson imposed a one-year sentence after observing that Ojeda had a limited role in the trafficking organization, no significant criminal history, and withdrawn from participation in the organization before police intervened.
In March 2025, Judge Peterson sentenced four other defendants for their roles in aiding Flores’s drug trafficking organization. Judge Peterson sentenced Braulio Martinez-Salazar to 3 years; Luis Angel Rios to 9 years; David Junius to 7 years; and Justin Purdy to 8 years.
The charges in this case were the result of an investigation conducted by the U.S. Drug Enforcement Administration, FBI, Wisconsin Department of Justice Division of Criminal Investigation, Dane County Narcotics Task Force, and Madison Police Department. Assistant U.S. Attorneys Robert Anderson and William M. Levins prosecuted this case.
The investigation was conducted and funded by the Organized Crime Drug Enforcement Task Force (OCDETF), a multi-agency task force that coordinates long-term narcotics trafficking investigations.
TULSA, Okla. – A Tulsa man was sentenced today for Receipt and Distribution of Child Pornography and Possession of Child Pornography in Indian Country, announced U.S. Attorney Clint Johnson.
U.S. District Judge John D. Russell sentenced Joseph Gunther Sampson, 31, to 121 months followed by 15 years of supervised release. He will remain in custody pending transfer to the U.S. Bureau of Prisons. Upon release, Sampson will be required to register as a sex offender. Restitution will be heard at a later date.
In a separate child pornography investigation, the FBI discovered messages between another individual and Sampson discussing minor children for sexual purposes. When the FBI interviewed Sampson in August 2024, he allowed law enforcement to search his phone. Even though he stated his phone was new, the FBI discovered multiple images that contained Child Sexual Abuse Material (CSAM). When confronted about the CSAM, Sampson admitted to having viewed child pornography for the past five years. He further admitted to receiving and sharing CSAM through an application on his phone.
When the FBI searched Sampson’s home, they found three more electronic devices. The forensic analysis revealed that between December 2023 and August 2024, Sampson possessed 100s of images and videos containing CSAM. Multiple videos depict minors under the age of 12.
The National Center for Missing & Exploited Children’s (NCMEC) CyberTipline is the nation’s centralized reporting system for the online exploitation of children. Since its inception in 1998, the NCMEC’s CyberTipline has received more than 195 million reports. The Child Victim Identification Program began in 2002 and has reviewed more than 425 million CSAM images or videos and helped identify more than 30,000 victims.
NCMEC assisted in this case by analyzing the images found by investigators to identify known and unknown child sexual assault victims. The FBI investigated the case, and Assistant U.S. Attorney Stephanie Ihler prosecuted the case.
This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit Justice.gov/PSC.
PORTLAND, Maine: An Ecuadorian national pleaded guilty today in U.S. District Court in Portland to illegally entering the U.S. after a prior removal.
According to court records, on February 4, 2025, agents from U.S. Immigration and Customs Enforcement (ICE) Enforcement and Removal Operations (ERO) and the FBI conducted surveillance at a South Portland residence. After observing William Ariel Tamay Guaman, 23, get into a van, agents followed Tamay Guaman and conducted a traffic stop. An ERO agent familiar with Tamay Guaman approached the driver and asked for their name. Tamay Guaman provided a false name and was directed to step out of the vehicle. After briefly fleeing on foot and resisting arrest, he was taken into custody. He was positively ID’d by fingerprints.
Tamay Guaman, who entered the country in or before 2019, was charged in the Cumberland County Unified Criminal Docket in March 2023 with two counts of reckless conduct involving a minor for offenses that occurred between 2020 and 2021. He was convicted and sentenced to 364 days of imprisonment on one count, to be followed by an additional, fully suspended 364 days and probation. In a separate proceeding, an immigration judge ordered Tamay Guaman to be removed from the United States, and he was deported in September 2023.
Tamay Guaman faces a maximum prison term of two years and a fine up to $250,000. He will be sentenced after the completion of a presentence investigative report by the U.S. Probation Office. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.
ICE-ERO investigated the case with assistance from the FBI.
Operation Take Back America: This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations (TCOs), and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces (OCDETF) and Project Safe Neighborhoods (PSN).
ABINGDON, Va. – The former Vice Chairman of the Smyth County School Board pled guilty today to using at least six minor, male victims to produce child pornography.
Todd Stewart Williams, 54, of Chilhowie, Virginia, pled guilty today to four counts of persuading, inducing, enticing, and coercing and attempting to persuade, induce, entice, and coerce one or more minors to engage in any sexually explicit conduct for the purpose of producing any visual depiction of such conduct, in interstate commerce.
“The Internet has expanded the manner in which young people can be targeted by those looking to exploit them,” Acting United States Attorney Zachary T. Lee said today. “Importantly, this case demonstrates that even those who are entrusted by our communities to oversee the welfare of our children may harbor intentions to exploit them, and for that reason we must be ever vigilant and responsive when our young people report abuse. I am thankful to the FBI both in Virginia and elsewhere for their diligence in bringing this case to justice.”
“There is no place in our communities for someone who manipulates and abuses children, especially by someone in a position of influence. In addition to committing numerous reprehensible acts against minors, Williams betrayed the trust of parents in Smyth County where he was elected to oversee the education and well-being of students,” said Stanley Meador, Special Agent in Charge of the FBI’s Richmond Division. “The FBI Richmond team stands with parents and educators to protect our children and ensure justice is served for all who seek to harm them.”
According to court documents, Williams’s criminal activity came to the attention of law enforcement in September 2022 when a 15-year-old teenager living in Oklahoma reported to the FBI that Williams, using the Snapchat username “todd_w3411” requested nude images and videos of him.
During an interview with law enforcement, the teen told investigators he met Williams in a Snapchat group intended for gay teenage males. Soon after they began chatting, Williams reached out to the teen and offered to make in-app purchases in an online video game in exchange for nude pictures of the teen.
The FBI’s investigation uncovered multiple instances of Williams’s exploitation of multiple minors. In one instance, Williams used Snapchat to communicate with a then 12-year-old minor and offered to purchase items for an online game before eventually offering to buy nude pictures and videos from the boy.
Between August 2022 and January 2024, Williams sent the young victim nearly $1,000 in exchange for nude images and videos.
In January 2023, Williams met another teen on Snapchat and paid the teen to take pictures and videos of him sexually abusing his younger stepbrother, who was 10-years-old at the time. As directed by Williams, the teen would approach his stepbrother in his bedroom at night and force his stepbrother to watch pornography and engage in sexual acts.
Because the teen reached his $600 monthly limit on Cash App transactions, Williams mailed him a debit card hidden inside a pair of shoes to ensure he was able to purchase his videos.
In a six-month period, Williams paid over $3,500 for nude images and videos of the teen and his stepbrother.
In yet another interaction with a young teenage boy on Snapchat, Williams paid over $3,000 in exchange for nude images and videos of him and his teenage boyfriend.
In all, Williams spent more than $10,000 buying nude images from at least six underage male victims.
At sentencing, Williams faces a mandatory minimum sentence of up to fifteen years in prison and up to thirty years.
The Federal Bureau of Investigation is investigating the case.
Assistant U.S. Attorney Whit Pierce is prosecuting the case.
The case is brought as part of Project Safe Childhood. In 2006, the Department of Justice created Project Safe Childhood, a nationwide initiative designed to protect children from exploitation and abuse. Led by the U.S. Attorneys’ Offices and the DOJ’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who exploit children, as well as identity and rescue victims. For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov/.
ST. LOUIS – U.S. District Judge Catherine D. Perry on Thursday sentenced a registered sex offender who sold child pornography online to 17 years in prison.
Patrick Mayberry, now 46, of High Ridge, told investigators that he’d received over $2,000 by selling child pornography that he’d obtained on the dark web. Mayberry had multiple videos containing child sexual abuse material in his MEGA cloud-storage account.
The investigation began with a CyberTipline report to the National Center for Missing and Exploited Children (NCMEC) that Mayberry had uploaded child sexual abuse material to his Google account.
Mayberry pleaded guilty in U.S. District Court in St. Louis in November to one count of possession of child pornography as a prior offender.
Mayberry is a registered sex offender and was on probation at the time of the offense. He was convicted of one count of failure to register as a sex offender in 2021 in Jefferson County Circuit Court in Missouri. In 2008, he was convicted of one count of attempting to procure child pornography for seeking nude photographs of a nine-year-old. In 2003, he was convicted of second-degree rape of a victim under age 16 in Oklahoma.
The St. Louis County Police Department and the FBI investigated the case. Assistant U.S. Attorney Jillian Anderson prosecuted the case.
This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and the Department of Justice Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.
Admits Lying to Receive Sick Leave Pay While Concurrently Working for Another Employer During the Pandemic
WASHINGTON — Matthew Hong, 28, of Middlesex, New Jersey, pleaded guilty today in U.S. District Court to making false statements in connection with sick leave compensation that he received from his federal government employer when he was not sick but instead working remotely for a private company during the COVID-19 pandemic.
The plea was announced by U.S. Attorney Edward R. Martin, Jr., Supervisory Official Matthew Galeotti of the Justice Department’s Criminal Division, FBI Special Agent in Charge Sean Ryan of the FBI Washington Field Office, Criminal and Cyber Division, and Special Agent in Charge Troy W. Springer of the National Capital Region, U.S. Department of Labor – Office of Inspector General (DOL-OIG).
Hong pleaded guilty to one count of false statements and faces a maximum penalty of five years in prison. Sentencing is scheduled for July 17. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.
According to court documents, Hong was an economist at the Bureau of Labor Statistics (BLS) within the U.S. Department of Labor from April 2020 until July 2023. At BLS, Hong worked on the Current Employment Statistics program within the National Estimates Branch that produced, among other things, the monthly estimates of nonfarm employment numbers. In that role Hong had access to certain Principal Federal Economic Indicators (PFEI), such as the employment and unemployment numbers, several days prior to their public disclosure. This information was subject to strict security procedures and safeguards due to the PFEI’s sensitivity and ability to affect financial markets if prematurely disclosed.
Beginning in June 2022, and while still employed at BLS and working remotely due to the COVID-19 pandemic, Hong began full-time employment at a global financial institution headquartered in New York City, as a senior associate in a group that analyzed and developed macroeconomic scenarios used in the company’s forecasting. As part of his job at the financial institution, Hong developed economic narratives and forecasts that involved multiple macroeconomic variables.
On at least 55 different occasions between June 2022 and July 2023, Hong made entries in BLS’s time and attendance system that falsely represented that he was sick on a given workday and sought sick leave compensation from BLS when, in fact, he was not sick but instead was working for the private financial institution. Based on these false statements, Hong received over $13,300 in sick leave compensation from BLS.
The case is being investigated by the FBI Washington Field Office and DOL-OIG. It is being prosecuted by Special Assistant U.S. Attorney Rami Sibay for the District of Columbia and Trial Attorney Matthew F. Sullivan of the Criminal Division’s Fraud Section. Assistant U.S. Attorneys Kathryn Rakoczy and Maria Vento provided substantial assistance with the investigation and prosecution.
PARLIAMENT QUESTION: THIRD GENERATION METEOROLOGICAL SATELLITE
Posted On: 03 APR 2025 6:40PM by PIB Delhi
The Ministry of Earth Sciences (MoES) has allocated Rs. 480/- crore and billed for the launch of the Indian National Satellite (INSAT-3DS).
Currently, INSAT-3DS, along with INSAT-3DR, are in use for operational weather services, and some of the important applications of its products are:
Round-the-clock monitoring of severe weather conditions with rapid scan capability. Satellite images are generated every 5 minutes for the area of interest (where the severe weather is prevailing).
A satellite visualization tool known as Real-time Analysis of Products and Information Dissemination (RAPID) to visualize and analyze satellite images and derived products as per the user’s choice (https://rapid.imd.gov.in/r2v/).
Numerous satellite-derived products and imageries are generated at each 30-minute gap, which is very useful in real-time monitoring the cyclone activity and determination of cyclone track and intensity.
During pre-monsoon season thunderstorms and lightning season of March to May, various products like Outgoing Longwave Radiation, Quantitative Precipitation Estimate, Sea Surface Temperature, Insolation, winds, winds derived products, etc. and Temperature, Humidity profiles/Thermodynamic indices etc.) are used for monitoring the movement of convective weather systems.
Satellite-derived products are also helpful in monitoring the onset, active, and withdrawal phases of southwest and northeast monsoons. It is also used to monitor and analyse the origin, movement, and possible impact of Western disturbance moving across North India.
Data Collection and Dissemination: The satellite’s data relay transponder facilitates efficient collection and distribution of meteorological, hydrological, and oceanographic data from various ground stations, supporting The India Meteorological Department (IMD).
Search and Rescue Operations: The satellite has a dedicated search and rescue payload that assists in locating and saving lives during maritime and aviation emergencies. These advancements in INSAT-3DS have strengthened India’s capacity to monitor and predict weather patterns, enabling better preparedness for extreme weather events and contributing to improving agricultural and water management decisions.
Meteorological data and products from both the INSATs are also useful in various sectors in real-time:
Monitoring severe weather phenomena like intense rainfall episodes, heatwave conditions, cold wave day and night fog, etc.) are easily monitored over the Indian region/neighbouring countries by day and night (24-hour) coverage of satellite data.
Special sector images are generated for pilgrimage (Like Amarnathji yatra, Kumbh Mela, Kedarnath Jee yatra, etc.)
The accumulated snow-bound area images during winter time are generated for specially monitoring the fresh and old snow and its coverage.
Agriculture sector services. Satellite provides better guidance for agro meteorology with the help of many satellite-derived products (like Insolation, Land Surface Temperature, Evapotranspiration, etc.).
Renewable energy sector: Satellite-based Winds, clouds, Outgoing longwave radiation, etc., provide an important input to this sector for managing the resources efficiently.
Research and development activities. New algorithms and approaches (like AI/ML, deep learning, etc.) are also under development to further streamline the process.
Therefore, with the support of INSAT-3DS (which provides advanced imaging and sounding capabilities), weather monitoring service capabilities are enhanced. It offered detailed observations of land and ocean surfaces, real-time data on cloud cover, moisture content, temperature profiles, and other atmospheric parameter which are crucial for weather monitoring.
The INSAT-3D has reached its end of life and has been replaced by the INSAT-3DS, whereas INSAT-3DR is operational in sensing and transmitting meteorological data.
This information was given by Dr. Jitendra Singh, Union Minister of State (Independent Charge) for Science and Technology, Earth Sciences, MoS PMO, Department of Personnel, Public Grievances and Pensions, Department of Space and Department of Atomic Energy, in a written reply in the Rajya Sabha today.
The India Meteorological Department (IMD) has adopted a new strategy for issuing monthly and seasonal operational forecasts for the southwest monsoon rainfall over the country based on both the statistical forecasting system and the newly developed Multi-Model Ensemble (MME) based forecasting system. The MME approach uses the coupled global climate models (CGCMs) from different global climate prediction and research centers, including IMD’s Monsoon Mission Climate Forecasting System (MMCFS) model. The MMCFS and MME forecasts are updated every month. This was to satisfy the demands from different users and Government authorities for the forecasts of the spatial distribution of monthly and seasonal rainfall along with the regionally averaged rainfall forecasts for better regional planning of activities.
Since introducing the Statistical Ensemble Forecasting System (SEFS) in 2007 and implementing the MME approach in 2021 for seasonal forecasting, IMD operational forecast for the monsoon rainfall has shown noticeable improvement. For example, the average absolute forecast error in the forecasting of all India’s seasonal rainfall has reduced by about 21% during the recent 18 years (2007-2024) compared to the same number of previous years (1989-2006), which indicates a highly successful forecast in recent years compared to previous years. The anomaly correlation between the observed and forecast ISMR during 2007-2023 was 0.55 compared to -0.21 during 1989-2006. It may be noted that IMD was able to correctly forecast the twin deficient monsoon years of 2014-2015, as well as the below-normal rainfall in 2023 and above-normal rainfall in 2024. These clearly indicate improvement made in the operational forecast system in the recent 18 years period compared to the earlier 18 years period. For 2025, the MME approach will continue to be used as this method introduced in 2021 has shown good skill in forecasting both the area-averaged rainfall at various geographical regions and spatial distribution of rainfall across the country at monthly as well as seasonal scales.
To strengthen weather and climate services for the agriculture sector, the MoES has launched the Mission Mausam, which is envisaged to be a multi-faceted and transformative initiative to boost India’s weather and climate-related science, research, and services. The Mission is launched to make Bharat a weather-ready and climate-smart nation with the aim that no weather will go undetected and early warning for all. It will help monsoon-dependent agricultural regions, citizens, and last-mile users to tackle extreme weather events and the impacts of climate change in a better way.
Further, the Mission’s focus includes improving the observations by augmenting various observational networks throughout the country to provide highly accurate and timely weather and climate information across temporal and spatial scales, capacity building, and awareness generation. Apart from physics-based numerical models, the Ministry is developing new methods based on artificial intelligence (AI) and machine learning (ML) technologies for weather, climate, and ocean forecasting systems. And the formulation of collaborative research projects with academic institutions to share knowledge and develop innovative solutions for weather forecasting and climate modeling capabilities. Local user communities such as farmers/agricultural authorities, aviation authorities, power generation & distribution agencies, industries, health agencies, etc., are constantly involved/engaged, and periodic familiarization is imparted through user meet/stakeholder meet awareness programs, etc. The feedback is taken from the communities for the improvement of all-weather & climate services. Extensive use of local languages in forecast dissemination and regularly organizing workshops and awareness programs for community outreach is being undertaken.
By strengthening the observational network will also help to observe the changes in long-term weather patterns compared to past years to assess the changes in the climate and take measures towards climate resilience.
The India Meteorological Department (IMD) has been using satellite technology extensively for weather monitoring and forecasting. This started with the use of photographs from Television Infrared Observation Satellites (TIROS-1) launched by the United States of America (USA) in April 1960. These photographs provided new information on cloud systems, including spiral formations associated with large storms, immediately proving their value to operational meteorologists. Over the years, IMD has embraced new developments in satellites and their applications, boosted through global coordination and support, such as geostationary satellites in 1974 and polar-orbiting satellites. With the advent of Indian National Satellites (INSAT) developed by the Space Research Organisation (ISRO) satellites in 1982, IMD has augmented satellite applications utilizing image and data products in collaboration with the ISRO. Currently, IMD is utilizing available international satellites, including European Organisation for the Exploitation of Meteorological Satellites (EUMETSAT) and INSAT-3DR/3DS, as well as polar-orbiting satellites, including Oceansat-3 and Metop-B/C. The utilization of satellite data and products has improved nowcasting and severe weather along with timely detection of large-scale systems like monsoon circulation, cyclones, western disturbances, thunderstorms, etc. Above 90% of the data in the numerical models run by the Ministry of Earth Sciences (MoES) is satellite-based. The assimilation of satellite data in the models has improved the accuracy in short to medium range forecasting by about 20% to 30%. Algorithms/tools developed by IMD/ISRO and other international institutes, such as EUMETSAT, like nowcast tools, RAPID, Dvorak technique, etc., have improved decision-making and forecasting. These data and products are proven to be useful for disaster preparedness. However, there are still gaps in detecting small-scale weather events, such as cloudbursts, thunderstorms, localized heavy rainfall, squalls, hail storms, etc., due to a lack of high-resolution data, products, and satellite-based tools. Considering this, IMD and ISRO are working together for the development of the INSAT-4 series with better sensors and resolution.
This information was given by Dr. Jitendra Singh, Union Minister of State (Independent Charge) for Science and Technology, Earth Sciences, MoS PMO, Department of Personnel, Public Grievances and Pensions, Department of Space and Department of Atomic Energy, in a written reply in the Rajya Sabha today.
Remote sensing data and space technology are widely employed for societal development activities/ programmes. The space technology is utilized in many of the government programmes targeting rural and remote areas of the country. The details of major programmes utilizing space based inputs are as given below:
Geospatial technology for supporting MGNREGA Programme (Geo- MGNREGA): The creation of assets and activities under the MGNREGA programme, are being monitored through Satellite data, Geoportal and mobile applications. More than 6.24 crore assets/ activities have been geo-tagged on the Geo-MGNREGA geoportal. Subsequently, Yuktdhara geospatial planning portal is also developed, for decision support towards planning and implementation of new assets or activities. Phase-II of Geo-MGNREGA project monitored changes over three years due to implementation of natural resource management activities in 23 Gram Panchayats (one Gram Panchayat for each state) of MGNREGA.
Integrated Watershed Management Programme: ISRO/ DOS has implemented Geospatial solution for monitoring of about 86,000 micro-watersheds under the Integrated Watershed Management Programme (PMKSY-WDC 1.0). Under this, more than 18 lakh watershed development interventions are geotagged. Under PMKSY-WDC 2.0, around 1150 projects are assessed through Bhuvan tools employing high resolution satellite data (Cartosat 2S & 3).
Space based Information Support for Decentralized Planning (SIS-DP): Under two phases of this project, very large scale (1:10,000) country level thematic database on Land Use / Land Cover, Drainage, Settlements, Rail & Road and slope is generated using remote sensing data. Visualisation and analytical tools are deployed on ‘Bhuvan Panchayat’ geoportal (https://bhuvanpanchayat.nrsc.gov.in) to facilitate developmental planning at Panchayat / Village level.
Rural Road Infrastructure Mapping: The high-resolution satellite data on Bhuvan was used for mapping rural roads under Pradhan Mantri Gram SadakYojana (PMGSY). Database of rural roads is prepared for entire country and PMGSY dashboard is deployed on Bhuvan Web Portal for monitoring the progress by MoRD and State Govt. Officials.
Under Pradhan MantriAwasYojana – Housing for All (PMAY-HFA) and Gramin project, a geospatial platform on the Bhuvan portal is developed to streamline the implementation of the (PMAY-HFA) initiative. It helps in managing the construction of homes for 78.64 Lakhs beneficiaries, to monitor progress through five distinct stages of construction and releasing funds based on project advancement.
Under the Disaster Management Support Programme (DMSP) of ISRO/ DoS, ISRO enables the use of space-based inputs for disaster management activities by the respective nodal Ministries/ Departments. Space based inputs are being used in the hazard; vulnerability; risk (HVR) assessment, disaster monitoring, damage assessment, and development of early warning systems for major disasters such as flood, cyclones, landslide, earthquakes and forest fire. Data from Indian Earth Observation satellites such as Resourcesat-2 & 2A, Cartosat-2 Series, Cartosat-3, EOS-04 (RISAT-1A), EOS-06 (Oceansat-3) and INSAT-3DR & 3DS are being used for disaster management support, in addition to the data from various global satellite missions.
During 2024, major floods were monitored using satellite data and about 300 flood inundation maps were provided to various State and Central disaster management agencies. As part of the National Hydrology Project (NHP), ISRO developed spatial flood early warning system for Godavari and Tapi Rivers. Flood alerts were disseminated through Bhuvan-NHP and NDEM Geoportals, and also to AP State Disaster Management Authority, with 2- day lead time and 85% accuracy. Very High Resolution data from India’s RISAT satellite was used for assessing the extent of the Wayanad (Kerala) landslide in July 2024. In the year 2024, tropical cyclones Remal, Asna, Dana and Fengal were monitored with INSAT-3DR, INSAT-3DS and Oceansat-3 data. Active forest fires were detected using satellite data daily 6 to 8 times during the Indian forest fire season in 2024 and the activity is ongoing for the fire season in 2025.
This information was given by Dr. Jitendra Singh, Union Minister of State (Independent Charge) for Science and Technology, Earth Sciences, MoS PMO, Department of Personnel, Public Grievances and Pensions, Department of Space and Department of Atomic Energy, in a written reply in the Rajya Sabha today.
News In Brief – Source: US Computer Emergency Readiness Team
WASHINGTON, DC – Today, the Cybersecurity and Infrastructure Security Agency (CISA) joined the National Security Agency (NSA) and other government and international partners to release a joint Cybersecurity Advisory (CSA) that warns organizations, internet service providers (ISPs), and cybersecurity service providers about fast flux enabled malicious activities that consistently evade detection. The CSA also provides recommended actions to defend against fast flux.
An ongoing threat, fast flux networks create resilient adversary infrastructure used to evade tracking and blocking. Such infrastructure can be used for cyberattacks such as phishing, command and control of botnets, and data exfiltration. This advisory provides several techniques that should be implemented for a multi-layered security approach including DNS and internet protocol (IP) blocking and sinkholing; enhanced monitoring and logging; phishing awareness and training for users; and reputational filtering.
”Threat actors leveraging fast flux techniques remain a threat to government and critical infrastructure organizations. Fast flux makes individual computers in a botnet harder to find and block. A useful solution is to find and block the behavior of fast flux itself,” said CISA Deputy Executive Assistant Director for Cybersecurity Matt Hartman. “CISA is pleased to join with our government and international partners to provide this important guidance on mitigating and blocking malicious fast flux activity. We encourage organizations to implement the advisory recommendations to reduce risk and strengthen resilience.”
The authoring agencies encourage ISPs, cybersecurity service providers and Protective Domain Name System (PDNS) providers to help mitigate this threat by taking proactive steps to develop accurate and reliable fast flux detection analytics and block fast flux activities for their customers.
Additional co-sealers for this joint CSA are Federal Bureau of Investigation (FBI), Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), Canadian Centre for Cyber Security (CCCS), and New Zealand National Cyber Security Centre (NCSC-NZ).
For more information about ongoing security threats, visit CISA Cybersecurity Alerts & Advisories.
###
About CISA
As the nation’s cyber defense agency and national coordinator for critical infrastructure security, the Cybersecurity and Infrastructure Security Agency leads the national effort to understand, manage, and reduce risk to the digital and physical infrastructure Americans rely on every hour of every day.
Visit CISA.gov for more information and follow us onX, Facebook, LinkedIn, Instagram.
News In Brief – Source: US Computer Emergency Readiness Team
Executive summary
Many networks have a gap in their defenses for detecting and blocking a malicious technique known as “fast flux.” This technique poses a significant threat to national security, enabling malicious cyber actors to consistently evade detection. Malicious cyber actors, including cybercriminals and nation-state actors, use fast flux to obfuscate the locations of malicious servers by rapidly changing Domain Name System (DNS) records. Additionally, they can create resilient, highly available command and control (C2) infrastructure, concealing their subsequent malicious operations. This resilient and fast changing infrastructure makes tracking and blocking malicious activities that use fast flux more difficult.
The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), Canadian Centre for Cyber Security (CCCS), and New Zealand National Cyber Security Centre (NCSC-NZ) are releasing this joint cybersecurity advisory (CSA) to warn organizations, Internet service providers (ISPs), and cybersecurity service providers of the ongoing threat of fast flux enabled malicious activities as a defensive gap in many networks. This advisory is meant to encourage service providers, especially Protective DNS (PDNS) providers, to help mitigate this threat by taking proactive steps to develop accurate, reliable, and timely fast flux detection analytics and blocking capabilities for their customers. This CSA also provides guidance on detecting and mitigating elements of malicious fast flux by adopting a multi-layered approach that combines DNS analysis, network monitoring, and threat intelligence.
The authoring agencies recommend all stakeholders—government and providers—collaborate to develop and implement scalable solutions to close this ongoing gap in network defenses against malicious fast flux activity.
Download the PDF version of this report: Fast Flux: A National Security Threat (PDF, 841 KB).
Technical details
When malicious cyber actors compromise devices and networks, the malware they use needs to “call home” to send status updates and receive further instructions. To decrease the risk of detection by network defenders, malicious cyber actors use dynamic resolution techniques, such as fast flux, so their communications are less likely to be detected as malicious and blocked.
Fast flux refers to a domain-based technique that is characterized by rapidly changing the DNS records (e.g., IP addresses) associated with a single domain [T1568.001].
Single and double flux
Malicious cyber actors use two common variants of fast flux to perform operations:
1. Single flux: A single domain name is linked to numerous IP addresses, which are frequently rotated in DNS responses. This setup ensures that if one IP address is blocked or taken down, the domain remains accessible through the other IP addresses. See Figure 1 as an example to illustrate this technique.
Figure 1: Single flux technique.
Note: This behavior can also be used for legitimate purposes for performance reasons in dynamic hosting environments, such as in content delivery networks and load balancers.
2. Double flux: In addition to rapidly changing the IP addresses as in single flux, the DNS name servers responsible for resolving the domain also change frequently. This provides an additional layer of redundancy and anonymity for malicious domains. Double flux techniques have been observed using both Name Server (NS) and Canonical Name (CNAME) DNS records. See Figure 2 as an example to illustrate this technique.
Figure 2: Double flux technique.
Both techniques leverage a large number of compromised hosts, usually as a botnet from across the Internet that acts as proxies or relay points, making it difficult for network defenders to identify the malicious traffic and block or perform legal enforcement takedowns of the malicious infrastructure. Numerous malicious cyber actors have been reported using the fast flux technique to hide C2 channels and remain operational. Examples include:
Bulletproof hosting (BPH) services offer Internet hosting that disregards or evades law enforcement requests and abuse notices. These providers host malicious content and activities while providing anonymity for malicious cyber actors. Some BPH companies also provide fast flux services, which help malicious cyber actors maintain connectivity and improve the reliability of their malicious infrastructure. [1]
Fast flux has been used in Hive and Nefilim ransomware attacks. [3], [4]
Gamaredon uses fast flux to limit the effectiveness of IP blocking. [5], [6], [7]
The key advantages of fast flux networks for malicious cyber actors include:
Increased resilience. As a fast flux network rapidly rotates through botnet devices, it is difficult for law enforcement or abuse notifications to process the changes quickly and disrupt their services.
Render IP blocking ineffective. The rapid turnover of IP addresses renders IP blocking irrelevant since each IP address is no longer in use by the time it is blocked. This allows criminals to maintain resilient operations.
Anonymity. Investigators face challenges in tracing malicious content back to the source through fast flux networks. This is because malicious cyber actors’ C2 botnets are constantly changing the associated IP addresses throughout the investigation.
Additional malicious uses
Fast flux is not only used for maintaining C2 communications, it also can play a significant role in phishing campaigns to make social engineering websites harder to block or take down. Phishing is often the first step in a larger and more complex cyber compromise. Phishing is typically used to trick victims into revealing sensitive information (such as login passwords, credit card numbers, and personal data), but can also be used to distribute malware or exploit system vulnerabilities. Similarly, fast flux is used for maintaining high availability for cybercriminal forums and marketplaces, making them resilient against law enforcement takedown efforts.
Some BPH providers promote fast flux as a service differentiator that increases the effectiveness of their clients’ malicious activities. For example, one BPH provider posted on a dark web forum that it protects clients from being added to Spamhaus blocklists by easily enabling the fast flux capability through the service management panel (See Figure 3). A customer just needs to add a “dummy server interface,” which redirects incoming queries to the host server automatically. By doing so, only the dummy server interfaces are reported for abuse and added to the Spamhaus blocklist, while the servers of the BPH customers remain “clean” and unblocked.
Figure 3: Example dark web fast flux advertisement.
The BPH provider further explained that numerous malicious activities beyond C2, including botnet managers, fake shops, credential stealers, viruses, spam mailers, and others, could use fast flux to avoid identification and blocking.
As another example, a BPH provider that offers fast flux as a service advertised that it automatically updates name servers to prevent the blocking of customer domains. Additionally, this provider further promoted its use of separate pools of IP addresses for each customer, offering globally dispersed domain registrations for increased reliability.
Detection techniques
The authoring agencies recommend that ISPs and cybersecurity service providers, especially PDNS providers, implement a multi-layered approach, in coordination with customers, using the following techniques to aid in detecting fast flux activity [CISA CPG 3.A]. However, quickly detecting malicious fast flux activity and differentiating it from legitimate activity remains an ongoing challenge to developing accurate, reliable, and timely fast flux detection analytics.
1. Leverage threat intelligence feeds and reputation services to identify known fast flux domains and associated IP addresses, such as in boundary firewalls, DNS resolvers, and/or SIEM solutions.
2. Implement anomaly detection systems for DNS query logs to identify domains exhibiting high entropy or IP diversity in DNS responses and frequent IP address rotations. Fast flux domains will frequently cycle though tens or hundreds of IP addresses per day.
3. Analyze the time-to-live (TTL) values in DNS records. Fast flux domains often have unusually low TTL values. A typical fast flux domain may change its IP address every 3 to 5 minutes.
4. Review DNS resolution for inconsistent geolocation. Malicious domains associated with fast flux typically generate high volumes of traffic with inconsistent IP-geolocation information.
5. Use flow data to identify large-scale communications with numerous different IP addresses over short periods.
6. Develop fast flux detection algorithms to identify anomalous traffic patterns that deviate from usual network DNS behavior.
7. Monitor for signs of phishing activities, such as suspicious emails, websites, or links, and correlate these with fast flux activity. Fast flux may be used to rapidly spread phishing campaigns and to keep phishing websites online despite blocking attempts.
8. Implement customer transparency and share information about detected fast flux activity, ensuring to alert customers promptly after confirmed presence of malicious activity.
Mitigations
All organizations
To defend against fast flux, government and critical infrastructure organizations should coordinate with their Internet service providers, cybersecurity service providers, and/or their Protective DNS services to implement the following mitigations utilizing accurate, reliable, and timely fast flux detection analytics.
Note: Some legitimate activity, such as common content delivery network (CDN) behaviors, may look like malicious fast flux activity. Protective DNS services, service providers, and network defenders should make reasonable efforts, such as allowlisting expected CDN services, to avoid blocking or impeding legitimate content.
1. DNS and IP blocking and sinkholing of malicious fast flux domains and IP addresses
Block access to domains identified as using fast flux through non-routable DNS responses or firewall rules.
Consider sinkholing the malicious domains, redirecting traffic from those domains to a controlled server to capture and analyze the traffic, helping to identify compromised hosts within the network.
Block IP addresses known to be associated with malicious fast flux networks.
2. Reputational filtering of fast flux enabled malicious activity
Block traffic to and from domains or IP addresses with poor reputations, especially ones identified as participating in malicious fast flux activity.
3. Enhanced monitoring and logging
Increase logging and monitoring of DNS traffic and network communications to identify new or ongoing fast flux activities.
Implement automated alerting mechanisms to respond swiftly to detected fast flux patterns.
Refer to ASD’s ACSC joint publication, Best practices for event logging and threat detection, for further logging recommendations.
4. Collaborative defense and information sharing
Share detected fast flux indicators (e.g., domains, IP addresses) with trusted partners and threat intelligence communities to enhance collective defense efforts. Examples of indicator sharing initiatives include CISA’s Automated Indicator Sharing or sector-based Information Sharing and Analysis Centers (ISACs) and ASD’s Cyber Threat Intelligence Sharing Platform (CTIS) in Australia.
Participate in public and private information-sharing programs to stay informed about emerging fast flux tactics, techniques, and procedures (TTPs). Regular collaboration is particularly important because most malicious activity by these domains occurs within just a few days of their initial use; therefore, early discovery and information sharing by the cybersecurity community is crucial to minimizing such malicious activity. [8]
5. Phishing awareness and training
Implement employee awareness and training programs to help personnel identify and respond appropriately to phishing attempts.
Develop policies and procedures to manage and contain phishing incidents, particularly those facilitated by fast flux networks.
For more information on mitigating phishing, see joint Phishing Guidance: Stopping the Attack Cycle at Phase One.
Network defenders
The authoring agencies encourage organizations to use cybersecurity and PDNS services that detect and block fast flux. By leveraging providers that detect fast flux and implement capabilities for DNS and IP blocking, sinkholing, reputational filtering, enhanced monitoring, logging, and collaborative defense of malicious fast flux domains and IP addresses, organizations can mitigate many risks associated with fast flux and maintain a more secure environment.
However, some PDNS providers may not detect and block malicious fast flux activities. Organizations should not assume that their PDNS providers block malicious fast flux activity automatically and should contact their PDNS providers to validate coverage of this specific cyber threat.
For more information on PDNS services, see the 2021 joint cybersecurity information sheet from NSA and CISA about Selecting a Protective DNS Service. [9] In addition, NSA offers no-cost cybersecurity services to Defense Industrial Base (DIB) companies, including a PDNS service. For more information, see NSA’s DIB Cybersecurity Services and factsheet. CISA also offers a Protective DNS service for federal civilian executive branch (FCEB) agencies. See CISA’s Protective Domain Name System Resolver page and factsheet for more information.
Conclusion
Fast flux represents a persistent threat to network security, leveraging rapidly changing infrastructure to obfuscate malicious activity. By implementing robust detection and mitigation strategies, organizations can significantly reduce their risk of compromise by fast flux-enabled threats.
The authoring agencies strongly recommend organizations engage their cybersecurity providers on developing a multi-layered approach to detect and mitigate malicious fast flux operations. Utilizing services that detect and block fast flux enabled malicious cyber activity can significantly bolster an organization’s cyber defenses.
Works cited
[1] Intel471. Bulletproof Hosting: A Critical Cybercriminal Service. 2024. https://intel471.com/blog/bulletproof-hosting-a-critical-cybercriminal-service
[2] Australian Signals Directorate’s Australian Cyber Security Centre. “Bulletproof” hosting providers: Cracks in the armour of cybercriminal infrastructure. 2025. https://www.cyber.gov.au/about-us/view-all-content/publications/bulletproof-hosting-providers
[3] Logpoint. A Comprehensive guide to Detect Ransomware. 2023. https://www.logpoint.com/wp-content/uploads/2023/04/logpoint-a-comprehensive-guide-to-detect-ransomware.pdf
[4] Trendmicro. Modern Ransomware’s Double Extortion Tactic’s and How to Protect Enterprises Against Them. 2021. https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/modern-ransomwares-double-extortion-tactics-and-how-to-protect-enterprises-against-them
[5] Unit 42. Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine. 2022. https://unit42.paloaltonetworks.com/trident-ursa/
[6] Recorded Future. BlueAlpha Abuses Cloudflare Tunneling Service for GammaDrop Staging Infrastructure. 2024. https://www.recordedfuture.com/research/bluealpha-abuses-cloudflare-tunneling-service
[7] Silent Push. ‘From Russia with a 71’: Uncovering Gamaredon’s fast flux infrastructure. New apex domains and ASN/IP diversity patterns discovered. 2023. https://www.silentpush.com/blog/from-russia-with-a-71/
[8] DNS Filter. Security Categories You Should be Blocking (But Probably Aren’t). 2023. https://www.dnsfilter.com/blog/security-categories-you-should-be-blocking-but-probably-arent
[9] National Security Agency. Selecting a Protective DNS Service. 2021. https://media.defense.gov/2025/Mar/24/2003675043/-1/-1/0/CSI-SELECTING-A-PROTECTIVE-DNS-SERVICE-V1.3.PDF
Disclaimer of endorsement
The information and opinions contained in this document are provided “as is” and without any warranties or guarantees. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.
Purpose
This document was developed in furtherance of the authoring cybersecurity agencies’ missions, including their responsibilities to identify and disseminate threats, and develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.
Contact
National Security Agency (NSA):
Cybersecurity and Infrastructure Security Agency (CISA):
All organizations should report incidents and anomalous activity to CISA via the agency’s Incident Reporting System, its 24/7 Operations Center at report@cisa.gov, or by calling 1-844-Say-CISA (1-844-729-2472). When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment user for the activity; the name of the submitting company or organization; and a designated point of contact.
Federal Bureau of Investigation (FBI):
To report suspicious or criminal activity related to information found in this advisory, contact your local FBI field office or the FBI’s Internet Crime Complaint Center (IC3). When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact.
Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC):
For inquiries, visit ASD’s website at www.cyber.gov.au or call the Australian Cyber Security Hotline at 1300 CYBER1 (1300 292 371).
Canadian Centre for Cyber Security (CCCS):
New Zealand National Cyber Security Centre (NCSC-NZ):
News In Brief – Source: US Computer Emergency Readiness Team
Today, CISA—in partnership with the National Security Agency (NSA), Federal Bureau of Investigation (FBI), Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), Canadian Centre for Cyber Security (CCCS), and New Zealand’s National Cyber Security Centre (NCSC-NZ)—released joint Cybersecurity Advisory Fast Flux: A National Security Threat (PDF, 841 KB). This advisory warns organizations, internet service providers (ISPs), and cybersecurity service providers of the ongoing threat of fast flux enabled malicious activities and provides guidance on detection and mitigations to safeguard critical infrastructure and national security.
“Fast flux” is a technique used to obfuscate the locations of malicious servers through rapidly changing Domain Name System (DNS) records associated with a single domain name. This threat exploits a gap commonly found in network defenses, making the tracking and blocking of malicious fast flux activities difficult.
The authoring agencies strongly recommend adopting a multi-layered approach to detection and mitigation to reduce risk of compromise by fast flux-enabled threats. Service providers, especially Protective DNS providers (PDNS), should track, share information about, and block fast flux as part of their provided cybersecurity services. Government and critical infrastructure organizations should close this ongoing gap in network defenses by using cybersecurity and PDNS services that block malicious fast flux activity.
For more information on PDNS services, see Selecting a Protective DNS Service.
Source: United States House of Representatives – Congresswoman Sydney Kamlager California (37th District)
WASHINGTON, DC– Today, Rep. Sydney Kamlager-Dove, Ranking Member of the House Foreign Affairs Subcommittee on South and Central Asia, delivered opening remarks at the inaugural Subcommittee on South and Central Asia hearing, which ignored pressing bipartisan national security issues to instead repeat Republicans’ false claims of right-wing censorship.
Watch the full video here.
Below are Ranking Member Kamlager-Dove’s remarks, as prepared for delivery, at today’s subcommittee hearing:
Thank you, Mr. Chair, and thank you to our witnesses for being here for our first South and Central Asia Subcommittee hearing. I look forward to working with the Chair in a bipartisan way on the critical issues we are charged with overseeing.
Unfortunately, we’re not having a hearing about any of those. Instead, this Subcommittee is wasting taxpayer time and resources on the fifth such hearing Republicans have held across multiple committees on the so-called “censorship-industrial complex.”
The majority is relitigating a made-up conspiracy theory about a part of the State Department that no longer exists to distract from the dumpster fire foreign policy this Administration is pursuing—and elevating a serial sexual harasser as their star witness in the process.
Mr. Chair, I request unanimous consent to enter into the record two articles about the Republican witness Matt Taibbi: A Chicago Reader article titled, “Twenty years ago, in Moscow, Matt Taibbi was a misogynist a–hole—and possibly worse,” and a Washington Post article titled, “The two expat bros who terrorized women correspondents in Moscow.”
This hearing could not be more out of touch with the concerns of everyday Americans.
People’s retirement savings are being decimated as Trump’s arbitrary tariffs tank the stock market.
They are staring down the barrel of cuts to their Social Security and Medicare because the Republican majority wants to give a tax break to billionaires like Elon Musk who have deep financial ties to our adversaries.
Meanwhile, Trump is siding with Putin against American national security interests and risking the lives of American troops in a Signal group chat.
I’ve been to the State Department, and I do have concerns about censorship—censorship of the employees who are terrified to say the wrong thing or have the wrong word in their job title and be terminated by an Administration that publicly relishes punishing people for their speech.
If we want to talk about censorship, we should begin with Trump’s unprecedented assault on the First Amendment and rule of law.
Here a few examples that should send shivers down all our spines:
Trump banned the Associated Press from the Oval Office and Air Force One because they kept using the name “Gulf of Mexico”, something that none of us would have hesitated to do until a few months ago.
Trump signed executive orders targeting law firms for representing clients that opposed or investigated him—upending the fundamental principle that lawyers should not fear to represent their clients.
And most terrifying, Trump ordered ICE agents to arrest and detain Mahmoud Khalil, a green card holder, and snatch off the street a Tufts University student and visa holder, Rumeysa Ozturk, for protesting and writing an op-ed—for exercising their right to free speech.
As you can see, Trump is brazenly weaponizing the government to intimidate and silence any part of American society that disagrees with him.
Countering disinformation from hostile foreign powers should not be a partisan issue. Yet this Administration has crippled our capacity to respond to these threats while aiding, abetting—even amplifying—our adversaries’ influence operations.
The PRC has invested billions in pumping out propaganda, weaponizing the world’s largest known online disinformation operation to silence critics, discredit lawmakers, and harass U.S. companies who are at odds with China’s interests.
Russia maintains a sophisticated and sprawling disinformation apparatus to manipulate American public sentiment to Putin’s advantage–even paying conservative influencers to create and amplify pro-Kremlin content.
How has Trump confronted these threats?
He shut down independent media broadcasters like USAGM and Radio Free Asia, a move that was actually celebrated in Chinese state media.
He dismantled the FBI’s Foreign Influence Task Force, which his own Administration first created in 2017 to uncover foreign disinformation and propaganda targeting Americans.
He even appointed a white nationalist named Darren Beattie, who has parroted Kremlin and CCP talking points and denied the PRC’s ongoing Uyghur genocide, to the State Department’s top public diplomacy job.
Mr. Chair, I request unanimous consent to enter into the record my letter urging Secretary Rubio to fire Darren Beattie for his dangerous anti-American, pro-CCP, white nationalist ideology.
Countering foreign propaganda has become politicized not because of censorship concerns, but because of conspiracy theories, in some cases spread by the majority witnesses at this very hearing. And now the most egregious disinformation spreader is sitting in the White House.
We should be exploring real bipartisan solutions to this pressing national security issue on behalf of the American people, not perpetuating culture war divisions.
Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)
PHOENIX, Ariz. – The Justice Department today announced that it will boost FBI assets across the country over the next six months to address unresolved violent crimes in Indian Country through Operation Not Forgotten.
The FBI will send a total of 60 personnel, rotating in temporary duty assignments over a six-month period to select FBI field offices across the United States, including Arizona. Operation Not Forgotten is the longest and most intense national deployment of FBI resources to address Indian Country crime to date. The detailed FBI personnel will support field offices in Albuquerque; Denver; Detroit; Jackson, Miss.; Minneapolis; Oklahoma City; Phoenix; Portland; Seattle; and Salt Lake City. FBI Phoenix will receive 11 agents on a rotating basis over the next six months, who will be spread across offices in Arizona.
FBI personnel will be assisted by the Bureau of Indian Affairs Missing and Murdered Unit, and will work in partnership with Tribal law enforcement agencies across the country.
“Protection of the public is one of the key responsibilities of the Department of Justice. Here in Arizona, the United States Attorney’s Office and the FBI have a special trust relationship with the 22 federally recognized tribes in our state,” said U.S. Attorney Timothy Courchaine. “Operation Not Forgotten reflects the continued commitment of the federal government to pursue justice for crime victims in all Native American communities.”
“Our FBI personnel and Safe Trails Task Forces work closely every single day with our law enforcement partners to investigate crimes of violence throughout the many tribal territories in Arizona,” said FBI Phoenix Special Agent in Charge Jose A. Perez. “We are responsible for investigating the most serious crimes in Indian Country and this initiative will provide much needed additional resources to help us better serve those same communities by assisting victims and bringing criminals to justice.”
“Crime rates in American Indian and Alaska Native communities are unacceptably high. By surging FBI resources and collaborating closely with US Attorneys and Tribal law enforcement to prosecute cases, the Department of Justice will help deliver the accountability that these communities deserve,” said Attorney General Pam Bondi.
“The FBI will manhunt violent criminals on all lands – and Operation Not Forgotten ensures a surge in resources to locate violent offenders on tribal lands and find those who have gone missing,” said FBI Director Kash Patel.
Indian Country faces persistent levels of crime and victimization. At the beginning of Fiscal Year 2025, FBI’s Indian Country program had approximately 4,300 open investigations, including over 900 death investigations, 1,000 child abuse investigations, and more than 500 domestic violence and adult sexual abuse investigations.
Operation Not Forgotten renews efforts begun during President Trump’s first term under E.O. 13898, Establishing the Task Force on Missing and Murdered American Indians and Alaska Natives. This is the third deployment under Operation Not Forgotten, which has provided investigative support to over 500 cases in the past two years. Combined, these operations resulted in the recovery of 10 child victims, 52 arrests, and 25 indictments or judicial complaints.
Operation Not Forgotten also expands upon the resources deployed in recent years to address cases of missing and murdered indigenous people. The effort will be supported by the Department’s MMIP Regional Outreach Program, which places attorneys and coordinators in U.S. Attorneys’ Offices across the United States to help prevent and respond to cases of missing or murdered indigenous people.
Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)
BEAUMONT, Texas – An Orange, Texas man has been sentenced to 20 years in federal prison for his role in a fatal fentanyl overdose in the Eastern District of Texas, announced Acting U.S. Attorney Abe McGlothin, Jr.
Lawrence Duguett Hardin, Jr., 39, pleaded guilty to possession with intent to distribute fentanyl and was sentenced to 240 months in federal prison by U.S. District Judge Marcia A. Crone on April 1, 2025.
According to information presented in court, on August 17, 2023, law enforcement officers responded to an overdose death in Humble, Texas. Autopsy results determined the victim died due to the toxic effects of fentanyl. An investigation determined Hardin to be responsible for supplying the fentanyl that led to the individual’s death. A search warrant was executed at Hardin’s residence in Orange and a substance containing fentanyl and weighing 365.2 grams was discovered.
The U.S. Drug Enforcement Administration (DEA) has issued a Public Safety Alert warning Americans of the alarming increase in the lethality and availability of fake prescription pills containing fentanyl and methamphetamine. The Public Safety Alert coincides with the launch of DEA’s One Pill Can Kill Public Awareness Campaign to educate the public of the dangers of counterfeit pills and urges all Americans to take only medications prescribed by a medical professional and dispensed by a licensed pharmacist. The campaign aims to raise public awareness of a significant nationwide surge in fake pills that are mass-produced by criminal drug networks in labs, deceptively marketed as legitimate prescription pills, and are killing unsuspecting Americans at an unprecedented rate. For more information, please visit https://www.dea.gov/onepill.
This case was investigated by the U.S. Drug Enforcement Administration; FBI; Orange Police Department; Houston Police Department; West Orange Police Department; Bridge City Police Department; Harris County Constable’s Office Precinct 4; Jefferson County Crime Laboratory; and Harris County Institute of Forensic Sciences. This case was prosecuted by Assistant U.S. Attorneys Jonathan Lee and Rachel Grove.
Source: Federal Bureau of Investigation (FBI) State Crime News
EAST ST. LOUIS, Ill. – A district judge sentenced a Centralia man to 125 months in federal prison for possessing three firearms as a convicted felon in three separate incidents with police.
Lamar R. Bennett, 33, pleaded guilty in July to three counts of felon in possession of a firearm.
“Three brushes with the law by one defiant felon—this sentence of more than a decade in federal prison sends a strong message that repeat offenders who defy the law can expect to face certain justice in the federal system,” said U.S. Attorney Steven D. Weinhoeft.
According to court documents, Bennett was convicted as a felon in possession of a firearm in Marion County Circuit Court in 2020, further barring him from legally possessing firearms.
Bennett was the driver of a vehicle in a single-car crash in Washington County on April 21, 2023. Following the accident, Bennett placed a Smith and Wesson 9-millimeter pistol behind a concrete barrier on the side of the highway. Law enforcement recovered the firearm.
On Oct. 14, 2023, emergency personnel and law enforcement responded to Bennett’s residence in Jefferson County. Officers observed a Glock 43X pistol in his sweatshirt and recovered the firearm.
On November 23, 2023, law enforcement tried to conduct a traffic stop on Bennett’s vehicle in Marion County, but he fled. Ultimately, Bennett was apprehended and law enforcement recovered one Ruger SR9C pistol from him.
“This investigation and sentencing are a direct result of FBI Springfield Field Office’s dedication to disrupting and dismantling violent threats in our territory,” said FBI Springfield Special Agent in Charge Christopher Johnson. “This sentencing is a direct warning to those who continue criminal activity in our area.”
Following imprisonment, Bennett will serve three years of supervised release.
The FBI Springfield Field Office, Centralia Police Department and Washington County Sheriff’s Office contributed to the investigation. Assistant U.S. Attorney Jennifer Hudson prosecuted the case.
Defendant Defrauded Hundreds of Victims in Three Countries and More than 30 States Who Invested More than $24.5 Million in Sham Loan Programs
Earlier today, at a federal courthouse in Brooklyn, Francius Marganda was sentenced by United States District Judge Dora L. Irizarry to 18 years’ imprisonment for running a $24.5 million Ponzi scheme that defrauded hundreds of predominantly Indonesian and Indo-American victim investors. Marganda, an Indonesian national, led the scheme until it unraveled in 2021 and he fled the United States. Marganda was extradited to the United States from Singapore in November 2023 and pleaded guilty to securities fraud in July 2024. As part of his sentence, Marganda was ordered to pay $8.5 million in restitution and $7.5 million in forfeiture.
John J. Durham, United States Attorney for the Eastern District of New York; Christopher G. Raia, Assistant Director in Charge, Federal Bureau of Investigation, New York Field Office (FBI); and Michael Alfonso, Acting Special Agent in Charge, U.S. Department of Homeland Security, Homeland Security Investigations, New York (HSI New York), announced the sentence.
“Marganda’s attempt to evade justice by fleeing halfway across the world to hide in fancy hotels was futile, as he found out today in a federal courtroom in Brooklyn,” stated United States Attorney Durham. “No matter how far defendants may flee, this Office and our law enforcement partners will work tirelessly to make sure they are brought to justice. It is my hope that this prosecution will bring some measure of relief to the victims of Marganda’s fraud, who trusted him with their life savings because of their shared nationality and were cruelly exploited by him.”
Mr. Durham expressed his appreciation to the Justice Department’s Office of International Affairs, particularly the DOJ Attachés based in Manila and Bangkok; law enforcement partners at the U.S. Embassy in Singapore, including the FBI’s Legal Attaché, the HSI Attaché, and the U.S. Department of State’s Diplomatic Security Service Overseas Criminal Investigations Office; and Singaporean authorities, particularly the Singapore Police Force and Attorney-General’s Chambers, for their assistance with Marganda’s arrest and extradition to the United States. Mr. Durham also thanked the Securities and Exchange Commission, Fort Worth Regional Office; the United States Attorney’s Office for the Southern District of New York; the Internal Revenue Service Criminal Investigation, New York; the Federal Trade Commission; the New York State Attorney General’s Office; the Commonwealth of Massachusetts Attorney General’s Office; the New York County District Attorney’s Office; the Queens County District Attorney’s Office; the New York City Police Department; the Westford Police Department, Westford, Massachusetts; the Richfield Police Department, Richfield, Minnesota; and the Lexington Police Department, Lexington, South Carolina, for their assistance in this matter.
Francius Marganda financially crippled hundreds of victims after collectively stealing millions of dollars to fund his personal lifestyle,” stated FBI Assistant Director in Charge Raia. “The defendant enticed prospective investors across the globe with empty promises of guaranteed returns from his illegitimate companies, and subsequently created an alias to flee the country when his web of lies unraveled. The FBI will continue to pursue any individual who exploits others through fraudulent means, regardless of where they may hide.”
HSI New York Acting Special Agent in Charge Alfonso stated: “Francius Marganda’s heartless scheme caused irreparable emotional, psychological, and in some cases even physical damage to many of his more than 200 victims. Marganda swindled the innocent, well-meaning public out of over $23 million, and then fled the country as his shameless conspiracy crumbled. Marganda left hardworking families without money they desperately needed for crucial, life-altering expenses — among them, cancer treatments, medical procedures, and college tuition — and with no opportunities to recoup their lost savings. While no amount of prison time can make up for the irreversible pain Marganda and his co-conspirators have caused, we are thankful to the special agents and officers from HSI’s El Dorado Task Force, together with the FBI and the Eastern District of New York, for securing whatever justice possible on behalf of his victims.”
From May 2019 to May 2021, while residing in New York after overstaying his visa, Marganda orchestrated a scheme to defraud investors by soliciting investments in two sham programs called Easy Transfer and Global Transfer, which Marganda and his co-conspirators falsely represented were short-term, high-interest loan programs in which investors would earn passive income. Marganda and his co-conspirators promised rates of return as high as 200% or more. On a near-daily basis, multiple investors were deceived into signing investment contracts.
Marganda and his co-conspirators misappropriated the invested funds for their own benefit, including by buying real estate and luxury goods, and paying off credit card bills. They also laundered proceeds into their bank accounts. As an example, more than $3.8 million in scheme proceeds was transferred into just one of Marganda’s personal accounts over the course of 11 months, and more than $264,000 in proceeds in the account was used to pay off his credit card bills.
The Ponzi scheme ultimately collapsed in May 2021, when Marganda and his co-conspirators stopped making payments to investors. Marganda fled the United States, obtained an Indonesian passport under a fake name, and used the scheme funds to pay for lavish stays in luxury hotels around the world, including in France, the Maldives, Nepal, and Thailand, until he was apprehended abroad and extradited to the Eastern District of New York.
To date, 237 victims, ranging in age from 24 to 84, have identified losses of more than $24.5 million because of the defendant’s scheme. The victims reside in the District of Columbia and at least 31 states, including New York, as well as in Indonesia and Malaysia. Many of the victims had limited means and had pooled their resources with relatives and friends to make investments in U.S. dollars and Indonesian rupiah.
Judge Irizarry considered statements prepared by dozens of victims in connection with the sentencing hearing held earlier today. Many reported that, as a result of the defendant’s conduct, they declared bankruptcy or lost nearly all of their savings. Because of the financial loss, one victim struggled to pay for a family member’s chemotherapy, while another struggled to pay for medical expenses associated with a family member’s Stage 4 lung cancer diagnosis. One victim lacked the funds to travel and pay respects after both of the victim’s parents died. Multiple victims suffered other serious losses and hardships.
The government’s case is being handled by the Office’s Public Integrity Section. Assistant United States Attorneys Victor Zapana and Laura Zuckerwise are in charge of the prosecution, with assistance from Paralegal Specialist Kavya Kannan.
The Defendant:
FRANCIUS MARGANDA Age: 42 Jakarta, Indonesia and formerly of Queens, New York
According to the indictment unsealed today, Nia Bradley, 50, of Mobile, Alabama; Randy Burden, 47, of Prichard, Alabama; Steve Jones, 61, of Mobile, Alabama; Larry Knight, 35, of Mobile, Alabama; Dejuan Lamar, 47, of Mobile, Alabama; Ayanna Payton, 47, of Eight Mile, Alabama; and Stephanie Hunn, 49, of Mobile, Alabama, were charged with various federal crimes listed below. Payton and Hunn previously pleaded guilty to all charges against them and are awaiting sentencing. Their proceedings were sealed in light of the ongoing investigation which led to charges recently filed against Bradley, Burden, Jones, Knight, and Lamar. Each of the defendants face potential sentences of decades in prison.
The Grand Jury returned an indictment alleging the following scheme: starting as early as 2018 through 2022, the defendants bilked the Prichard Water Board of at least approximately $2.4 million dollars through a false and fraudulent contractor scheme involving outside contractors and employees and board members of the Prichard Water Board. Approximately $960,000 of the money was illegally laundered, including through a business owned and operated by Bradley and Burden.
The Prichard Water Board provides water and sewer services to approximately 8,000 residential and 2,000 commercial clients and is funded by customer payments and also through a $55 million bond it secured in 2019. The indictment alleges that the criminal scheme involved the creation of a fictitious business by Hunn and the creation of false invoices to justify unlawful payments to Hunn, Jones, Knight, and Lamar. Bradley and Burden, who were employees of the Prichard Water Board, allegedly falsified payment authorizations and received kick-back payments and other benefits.
Payton and another uncharged co-conspirator served on the board of the Prichard Water Board where they are alleged to have falsified payment authorizations and received kick-back payments and other benefits for their roles. Several of the conspirators communicated through coded messages and destroyed evidence to attempt to avoid detection of the crimes, according to the indictment. Bradley, Payton, Hunn, and Jones committed tax fraud to avoid revealing the criminal scheme and to avoid paying taxes to the United States. Through its criminal cases, the United States is seeking money judgments in the amounts of approximately $2,459,279.39, $960,851.41, and $302,134.90, as well as the forfeiture of three real properties which were purchased using fraud proceeds and involved in the money laundering scheme.
Nia Bradley is charged with Conspiracy to Commit Mail, Bank, and Wire Fraud; Conspiracy to Defraud the United States (Taxes); Money Laundering Conspiracy; Wire Fraud; Bank Fraud; and related tax charges.
Randy Burden is charged with Conspiracy to Commit Mail, Bank, and Wire Fraud; Money Laundering Conspiracy; and Bank Fraud.
Steve Jones is charged with Conspiracy to Commit Mail, Bank, and Wire Fraud; Money Laundering Conspiracy; Bank Fraud; and filing false tax returns.
Larry Knight and Dejuan Lamar are charged with Conspiracy to Commit Mail, Bank, and Wire Fraud and Bank Fraud.
Ayanna Payton and Stephanie Hunn have pleaded guilty to Conspiracy to Commit Mail, Bank, and Wire Fraud; Conspiracy to Defraud the United States (Taxes); Wire Fraud; Bank Fraud; and False Tax Filings and both women are awaiting sentencing.
“The taxpayers of the Southern District of Alabama deserve to be able to rely on competent, honest public servants,” said United States Attorney Sean P. Costello. “This indictment is the result of careful, thorough, and meticulous investigation. Together with our partners in law enforcement, we will continue our efforts to protect the taxpayers and hold accountable thieves who seek to enrich themselves at the expense of our community.”
“Fraud and theft by government employees from the very people they are put in place to serve will not be tolerated,” said FBI Mobile Division Supervisory Special Agent Parker Still. “This investigation is another example of law enforcement cooperation between federal, state and local entities to ensure people have trust in their public works.”
“Corrupt public officials waste government resources and diminish the trust citizens place in their government to provide the essential services they expect,” said Special Agent in Charge Demetrius Hardeman, IRS Criminal Investigation, Atlanta Field Office. “IRS Criminal Investigation special agents will continue investigating and forwarding for prosecution those who disregard the public trust by misusing taxpayers’ funds to enrich themselves and their coconspirators.”
“The U.S. Postal Inspection Service remains steadfast in our commitment to protect the nation’s mail system from illegal use,” said Shameka Jackson, Acting Postal Inspector in Charge of the Houston Division. “With the collaborative investigative efforts of local, state and federal law enforcement agencies, we will continue to work together to bring to justice those who abuse the trust given to them by the American people.”
The Federal Bureau of Investigation, Internal Revenue Service – Criminal Investigation, and United States Postal Inspection Service, investigated the case with assistance from the Mobile County District Attorney’s Office and the Mobile County Sheriff’s Office.
Assistant U.S. Attorneys J. Bishop Ravenel and Kasee S. Heisterhagen are prosecuting the case on behalf of the United States.
An indictment or information is a formal accusation of criminal conduct, not evidence. A defendant is presumed innocent unless convicted through due process of law.
On Thursday (3 April 2025), NATO Deputy Secretary General Radmila Shekerinska attended an informal meeting of EU Defence Ministers in Warsaw, hosted by EU High Representative/Vice-President Kaja Kallas and Polish Minister of Defence Władysław Kosiniak-Kamysz, together with Ukrainian Defence Minister Rustem Umerov.
Ms Shekerinska stressed that securing lasting peace for Ukraine is essential for European security and for global stability. She called for strengthened support for Ukraine, now and for the long haul, noting that for peace to be lasting, Ukraine must remain strong.
The Deputy Secretary General welcomed recent announcements by NATO Allies of further aid to Ukraine, including air defence, armoured vehicles, drones, and munitions. NATO is also helping to strengthen Ukraine’s armed forces for the long-term, including through financial support, NATO’s Security Assistance and Training for Ukraine (NSATU), and the new NATO-Ukraine Joint Analysis Training and Education Centre in Poland.
Ms Shekerinska commended NATO-EU cooperation, both in Brussels and on the ground, where NSATU works closely with the EU’s Military Assistance Mission for Ukraine (EUMAM) to streamline international support for Ukraine. She welcomed the EU’s recent initiatives on defence and noted that NATO-EU discussions would continue with High Representative/Vice-President Kaja Kallas, at the upcoming meeting of NATO Foreign Ministers.
Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)
LOS ANGELES – A Long Beach man was sentenced today to 84 months in federal prison for his role in a smash-and-grab robbery of a Beverly Hills jewelry store in 2022 in which more than $2.6 million in merchandise was stolen – and the proceeds of which he later displayed on his Instagram account.
Ladell Tharpe, 39, was sentenced by United States District Judge George H. Wu, who also ordered him to pay $2,674,600 in restitution.
Tharpe pleaded guilty in September 2024 to one count of interference with commerce by robbery (Hobbs Act).
“Brazen criminal action that directly targets our small businesses in Los Angeles County will not be tolerated,” said Acting United States Attorney Joseph McNally. “The consequences for such action are severe and penalized accordingly, and I want to thank our law enforcement partners for their exceptional and dutiful work during this investigation.”
“Mr. Tharpe terrified his victims during this violent robbery carried out in broad daylight, then shamelessly boasted about it online,” said Akil Davis, the Assistant Director of the FBI’s Los Angeles Field Office. “The FBI will continue to work with our counterparts at local police departments to address violent crime and pursue justice at the federal level where appropriate.”
“The Beverly Hills Police Department is committed to protecting our community and ensuring justice,” said Beverly Hills Police Chief Mark G. Stainbrook. “We value our partnership with the FBI and the U.S. Attorney’s Office and appreciate the investigators who relentlessly pursued and prosecuted those responsible for this crime. As a reminder, crime will not be tolerated in Beverly Hills.”
In March 2022, Tharpe and his accomplices, Deshon Bell, 22, Jimmy Lee Vernon III, 33, both from Long Beach, as well as an unnamed minor drove three vehicles to a jewelry store in Beverly Hills and used sledgehammers and crow bars to break the glass surrounding the merchandise while employees and customers were present.
One of the vehicles driven to the jewelry store had been reported stolen four days prior to the robbery and was left in front of the victim store.
The thieves removed from the store’s display cases at least 19 bracelets, seven pairs of earrings, four necklaces, a pair of obelisks, eight rings, and 20 watches, all of which was valued at approximately $2,674,600. The robbers then returned to the car in which Bell was waiting and then fled the scene.
Two days after the heist, Tharpe posted images of large amounts of cash on his Instagram with the text “Robbery Gang.”
Tharpe has been in federal custody since March 2023.
Bell and Vernon each pleaded guilty to one count of Hobbs Act robbery. Judge Wu sentenced Bell to one year and one day in federal prison in February 2024, as well as ordering him to pay $2,674,000 in restitution.
Vernon, whose cellphone fell out of his sweatpants pocket during the conduct of the robbery and was recovered by investigators, was sentenced last month to 80 months in prison and was also ordered to repay $2,674,000 in restitution.
The FBI and the Beverly Hills Police Department investigated this matter.
Assistant United States Attorneys Kevin J. Butler of the Violent and Organized Crime Section and Kevin B. Reidy of the Major Frauds Section prosecuted the case.
Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)
ST. LOUIS – A former high school custodian on Wednesday admitted possessing child sexual abuse material.
Bernard Ray Mennemeier, 58, of O’Fallon, Missouri, pleaded guilty in U.S. District Court in St. Louis to one count of possession of child pornography. Mennemeier admitted possessing both child pornography and child erotica.
The investigation began on Jan. 2, 2024, after Mennemeier uploaded five videos containing child sexual abuse material to Dropbox. An FBI agent traced the Dropbox account to Mennemeier, and then conducted a court-approved search of the Dropbox account, and then Mennemeier’s home. In an interview at the O’Fallon Police Department, Mennemeier admitted messaging someone on Twitter who would sell him child sexual abuse material. Mennemeier said he purchased those materials “numerous” times, his plea agreement says.
Mennemeier is scheduled to be sentenced July 9. The charge carries a penalty of up to 20 years in prison.
“This crime came to light thanks to a CyberTip reported to our partners at the National Center for Missing and Exploited Children. Bernard Mennemeier thought he could anonymously obtain and possess child sexual abuse material,” said Special Agent in Charge Ashley Johnson of the FBI St. Louis Division. “When it comes to protecting children, the FBI is even more diligent in identifying, locating and arresting such perpetrators.”
The FBI investigated the case.
This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and the Department of Justice Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.
Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)
PHILADELPHIA – United States Attorney David Metcalf announced that MD Nurul Hasan, 48, MD Munsur Ali, 48, and MD Rafikul Islam, 52, all of Millbourne, Pennsylvania, pleaded guilty today to election fraud offenses, at separate hearings before United States District Judge Harvey Bartle III.
In February, the defendants were charged in a 33-count indictment with conspiracy to commit voter fraud, giving false information in registering to vote, and fraudulent voter registration, arising from their scheme, ultimately unsuccessful, to steal Millbourne Borough’s 2021 mayoral election for Hasan.
Hasan, the vice president of the Millbourne Borough Council, pleaded guilty to all 33 charges against him — one count of conspiracy, 16 counts of giving false information in registering to vote, and 16 counts of fraudulent voter registration.
Ali, a member of the Millbourne Borough Council, pleaded guilty to all 25 charges against him — one count of conspiracy, 12 counts of giving false information in registering to vote, and 12 counts of fraudulent voter registration.
Islam, a former member of the Millbourne Borough Council, pleaded guilty to all seven charges against him — one count of conspiracy, three counts of giving false information in registering to vote, and three counts of fraudulent voter registration.
As set forth in court filings, in 2021, Millbourne held elections for mayor, three seats on its borough council, and tax collector. Defendant Hasan entered the majority party’s primary election for mayor.
The primary election was held on May 20, 2021, and Hasan was defeated in the primary by a vote count of approximately 138 to 120. In the same primary, Ali was one of three majority party candidates for borough council to advance to the general election, while Islam lost his bid for reelection to the council.
After the primary, Hasan decided that he would run as a write-in candidate for mayor in the general election, which was scheduled for November 2, 2021. Ali and Islam agreed to support Hasan in his write-in campaign.
As detailed in court documents and admitted by the defendants, in or about 2021, defendants Hasan, Ali, and Islam conspired and agreed with one another, and other persons known and unknown to the U.S. Attorney, to steal the 2021 general election for Mayor of Millbourne for defendant Hasan through a multi-step process, which included:
(a) obtaining personal identification information of non-Millbourne residents, such as their names, addresses, and dates of birth;
(b) using the personal identifying information to access the Commonwealth of Pennsylvania’s online voter registration (PAOVR) website and change the voter registration addresses for those non-Millbourne residents to locations within Millbourne;
(c) using the PAOVR website to request that mail-in or absentee ballots for those non-Millbourne residents be sent to addresses accessible by one or more of the defendants;
(d) retrieving the ballots from the Millbourne mailboxes;
(e) impersonating the voters and fraudulently casting write-in votes for defendant Hasan to be mayor;
(f) enclosing the fraudulently completed ballots in envelopes and forging the voters’ signatures on the envelopes; and
(g) submitting the ballots in their envelopes to the Delaware County Board of Elections.
The defendants admitted that, to further this conspiracy, they contacted friends and acquaintances whom Hasan and Ali knew did not live in Millbourne, told these non-Millbourne residents that Hasan was running for mayor in Millbourne, asked if they could register the non-Millbourne residents to vote in Millbourne, and then cast mail-in ballots for Hasan to be mayor.
Hasan and Ali persuaded many of their non-Millbourne friends and acquaintances to provide them with personal identification information so that defendants Hasan and Ali could register them to vote in Millbourne. During many of these conversations, Hasan and Ali told their non-Millbourne friends and acquaintances that they would not get in trouble, as long as they did not vote in another election in November 2021.
Hasan and Ali also conspired and agreed to use personal identifying information for other non-Millbourne residents, which the two defendants had obtained from other sources, such as Hasan’s business, to register those nonresidents as Millbourne voters without the knowledge of those non-residents.
Hasan personally did almost all of the fraudulent voter registrations himself, using a computer at his place of business to access the PAOVR website and change the voting addresses for non-Millbourne residents to locations within Millbourne. Every time that Hasan accessed the PAOVR website to change a voter registration address, he provided an email address for the voter. Many times, Hasan provided one of four email addresses that he used and accessed.
To divert suspicion from himself, however, Hasan sometimes provided email addresses belonging to other people, who knowingly and willfully permitted Hasan to use their email addresses to cover up Hasan’s actions. One of those people was Islam, who allowed Hasan to use two of Islam’s email addresses when Hasan fraudulently changed the voter registration addresses for six individuals. Islam also permitted Hasan to use two of Islam’s email addresses when requesting mail-in ballots for five non-Millbourne residents.
In total, the defendants conspired to falsely register nearly three dozen non-Millbourne residents as Millbourne voters and cast ballots for those non-Millbourne residents in the 2021 general election for mayor of Millbourne Borough. Hasan went on to lose the election by a vote of approximately 165 to 138.
“Protecting the integrity of our elections is crucial to ensuring a fair result, as well as the public’s continued trust in the process,” said U.S. Attorney Metcalf. “That’s why these cases are a priority for my office and the FBI. Election fraud will not be tolerated in the Eastern District of Pennsylvania.”
“Trust in the electoral process is the cornerstone of our democracy. When public officials betray that trust through fraud, they don’t just break the law — they erode confidence in the very institutions that uphold our system,” said Wayne A. Jacobs, Special Agent in Charge of FBI Philadelphia. “The FBI is proud to stand with our partners in safeguarding the integrity of elections at every level of government.”
“This investigation exposed public officials who forgot that their role in a democracy is limited to accepting the voters’ choice. I applaud the hard work and partnership of the United States Attorney’s Office, the FBI and my Special Investigations Unit led by Deputy DA Doug Rhoads. This investigation serves as a reminder that my Office remains committed to election integrity, ensuring that everyone’s vote is counted equally,” said Delaware County District Attorney Jack Stollsteimer.
The defendants are scheduled to be sentenced on June 18 and face maximum possible sentences of five years in prison for each of the charges to which they have pleaded guilty.
The case was investigated by the FBI and the Delaware County District Attorney’s Office and is being prosecuted by Assistant United States Attorney Mark B. Dubnoff.
Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)
BILLINGS – A federal jury yesterday convicted an Ashland man of sexually abusing four women and distributing methamphetamine to two of them over a three-year period, U.S. Attorney Kurt Alme said.
After a two-day trial that began on March 31, the jury found the defendant, Stephen “Mutt” John Parker, 60, guilty of four counts of aggravated sexual abuse and two counts of distribution of methamphetamine. Parker faces a maximum term of imprisonment of life on each charge of sexual abuse, in addition to a fine of $250,000 and a term of supervised release of five years to life. For each meth charge, Parker faces zero to 20 years in prison, a fine of $1 million, and at least 3 years of supervised release.
U.S. District Judge Susan P. Watters presided. The Court will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors. Sentencing was set for July 31, 2025. Parker was detained pending further proceedings.
“Parker preyed on women on the Northern Cheyenne reservation by plying some of them with drugs and alcohol, seeking to capitalize on their addiction to perpetrate violent sexual assaults. We are pleased with the jury’s verdict, which will help ensure the safety of women on the Northern Cheyenne community. I would like to thank the attorneys and staff in our office for their hard work on this case as well as the FBI agents who conducted the investigation.” U.S. Attorney Alme said.
The government alleged at trial and in court documents that from 2018 to 2021, Parker sexually abused six women after providing them with alcohol and illegal drugs. During one instance in 2018, he gave a victim food and a place to stay. Parker also provided her with alcohol and methamphetamine. During a party at his house, Parker threatened the victim with a stick before sexually abusing her. On another occasion, Parker distributed meth to a different victim. After hitting her with an ax handle, Parker sexually assaulted her. In other instances, Parker physically assaulted the victims, including punching one victim in the face multiple times, prior to sexually abusing them.
The U.S. Attorney’s Office is prosecuting the case, which was investigated by the Federal Bureau of Investigation and the Northern Cheyenne Criminal Investigation Services.
This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results. For more information about Project Safe Neighborhoods, please visit https://www.justice.gov/psn.
Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)
Operation Not Forgotten Will Surge 60 FBI Personnel to 10 FBI Field Offices to Support Investigations of Indian Country Violent Crimes
BILLINGS — The Justice Department today announced that it will surge FBI assets across the country to address unresolved violent crimes in Indian Country, including crimes relating to missing and murdered indigenous persons.
The FBI will send 60 personnel, rotating in 90-day temporary duty assignments over a six-month period. This operation is the longest and most intense national deployment of FBI resources to address Indian Country crime to date. FBI personnel will support field offices in Albuquerque; Denver; Detroit; Jackson, Miss.; Minneapolis; Oklahoma City; Phoenix; Portland, Oreg.; Seattle; and Salt Lake City. The FBI will work in partnership with the Bureau of Indian Affairs and Tribal law enforcement agencies across jurisdictions.
FBI personnel will be assisted by the Bureau of Indian Affairs Missing and Murdered Unit, and they will use the latest forensic evidence processing tools to solve cases and hold perpetrators accountable. U.S. Attorney’s Offices will aggressively prosecute case referrals.
“Crime rates in American Indian and Alaska Native communities are unacceptably high. By surging FBI resources and collaborating closely with US Attorneys and Tribal law enforcement to prosecute cases, the Department of Justice will help deliver the accountability that these communities deserve,” said Attorney General Pam Bondi.
“The FBI will manhunt violent criminals on all lands – and Operation Not Forgotten ensures a surge in resources to locate violent offenders on tribal lands and find those who have gone missing,” said FBI Director Kash Patel.
“We are very pleased that the FBI is dispatching additional resources to the Salt Lake City Division, which covers Montana, to assist our ongoing efforts to find missing indigenous persons and hold violent offenders accountable. I want to thank the agents already working on these cases in Montana from both the FBI and the BIA’s Missing and Murdered Unit. Together with the Tribal Community Response Plans facilitated by DOJ for each Montana reservation community and DOJ’s MMIP Regional Outreach Program, this deployment will help address this critical problem. Missing and murdered indigenous people will not be forgotten.” said U.S. Attorney Kurt Alme.
Indian Country faces persistent levels of crime and victimization. At the beginning of Fiscal Year 2025, FBI’s Indian Country program had approximately 4,300 open investigations, including over 900 death investigations, 1,000 child abuse investigations, and more than 500 domestic violence and adult sexual abuse investigations.
Operation Not Forgotten renews efforts begun during President Trump’s first term under E.O. 13898, Establishing the Task Force on Missing and Murdered American Indians and Alaska Natives. This is the third deployment under Operation Not Forgotten, which has provided investigative support to over 500 cases in the past two years. Combined, these operations resulted in the recovery of 10 child victims, 52 arrests, and 25 indictments or judicial complaints.
Operation Not Forgotten also expands upon the resources deployed in recent years to address cases of missing and murdered indigenous people. The effort will be supported by the Department’s MMIP Regional Outreach Program, which places attorneys and coordinators in U.S. Attorneys’ Offices across the United States to help prevent and respond to cases of missing or murdered indigenous people.
A Colombian national and lieutenant for Clan del Golfo (CDG) pleaded guilty today to conspiring to distribute large quantities of cocaine destined for the United States.
According to court documents, Fabian Edilson Torres Caranton, also known as David and Cassius, 53, served as a coordinator, intermediary, and lieutenant for the Bloque Roberto Vargas Gutierrez of CDG — a Colombian paramilitary and multibillion-dollar Transnational Criminal Organization. CDG is one of Colombia’s largest and most powerful drug cartels with its membership in the thousands. CDG’s primary source of income is from cocaine trafficking, which it uses to fund its paramilitary activities.
According to court documents, in July 2018, Torres Caranton and an individual seeking to broker the purchase of cocaine on behalf of Mexican buyers, attended a meeting with another member of CDG at a ranch in or near Caucasia, Colombia. During the meeting, the other CDG member authorized the production of 500 kilograms of cocaine to be transported from Colombia into and through Central America for delivery to Mexican buyers for final delivery to the United States. Torres Caranton spent several days monitoring the cocaine production at a clandestine laboratory in Coralito, Colombia. Torres Caranton and his co-conspirators made two controlled deliveries of cocaine to an undercover officer: 191 kilograms on Sept. 16, 2018, in Valledupar, Colombia, and 172 kilograms on Oct. 16, 2018, in Cartagena, Colombia. Torres Caranton knew the purported Mexican buyers intended to distribute the cocaine in Houston, Texas.
Torres Caranton pleaded guilty to conspiracy to distribute cocaine for unlawful importation into the United States from Colombia. He is scheduled to be sentenced on Aug. 4 and faces a mandatory minimum penalty of 10 years in prison and a maximum penalty of life in prison. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.
Matthew R. Galeotti, Head of the Justice Department’s Criminal Division, and Acting Special Agent in Charge Brett Skiles of the Federal Bureau of Investigation (FBI) Miami Field Office made the announcement.
The FBI Miami Field Office investigated the case. The Justice Department’s Office of International Affairs and the Narcotic and Dangerous Drug Section’s Judicial Attaché Office in Bogota worked with law enforcement partners in Colombia to secure the arrest and December 2023 extradition of Torres Caranton.
Trial Attorney Douglas Meisel and Acting Deputy Chief Melanie Alsworth of the Criminal Division’s Narcotic and Dangerous Drug Section are prosecuting the case.
This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations (TCOs), and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces (OCDETFs) and Project Safe Neighborhoods (PSN).
Source: Federal Bureau of Investigation (FBI) State Crime News
COLUMBUS, Ohio – A local man and woman pleaded guilty in U.S. District Court here today to drug and money laundering crimes related to assisting two Chillicothe brothers traffic drugs from Mexico and Arizona.
Todd Michael Fulkerson, 42, of Columbus, admitted to conspiring to distribute and possess with the intent to distribute fentanyl and cocaine.
In February 2024, Fulkerson traveled to Arizona at the request of Caleb Barillaro, 30, who was acquiring kilogram quantities of the drugs to resell through street-level drug dealers in Chillicothe and the surrounding areas. The men drove separate vehicles to Arizona, and Fulkerson accompanied Caleb on the trip to provide security. Fulkerson was recruited for this role based on his military experience.
In Arizona, Caleb purchased two kilograms of fentanyl and five kilograms of cocaine for $94,000 in cash. Caleb put the drugs in a cooler and placed ice on top of the drugs to conceal them before putting the cooler in Fulkerson’s car.
Law enforcement surveilled the two vehicles traveling in tandem back towards Ohio from Arizona.
The two stopped at a gas station near the Indiana and Ohio border. Caleb discovered that the melting ice in the cooler had ruined some of the kilograms of drugs. He became upset and took the cooler to his car. Caleb feared he was being surveilled by law enforcement as he traveled from the gas station, and he discarded the drugs along the side of the road.
Fulkerson faces up to 20 years in prison for his role in transporting the drugs.
Lazae Lett, 24, of Chillicothe, admitted to laundering drug proceeds to Sinaloa, Mexico, to help Dillon Barillaro, 31, obtain more drugs through a source of supply there. She sent several approximately $2,000 money orders via Western Union money orders from Walmart and two Kroger locations in Chillicothe.
Dillon Barillaro provided the illicit money to Lett and instructed her on recipient names and payment amounts. Dillon Barillaro drove Lett to the Walmart and Kroger locations to conduct financial transactions in immediate succession.
Lett faces up to 20 years in prison.
The Barillaro brothers have each pleaded guilty to federal narcotics crimes punishable by at least 10 years and up to life in prison and await sentencing.
Congress sets minimum and maximum statutory sentences. Sentencing of the defendants will be determined by the Court based on the advisory sentencing guidelines and other statutory factors at future hearings.
Kelly A. Norris, Acting United States Attorney for the Southern District of Ohio; Andrew Lawton, Acting Special Agent in Charge, Drug Enforcement Administration (DEA) Detroit Field Office; Elena Iatarola, Special Agent in Charge, Federal Bureau of Investigation (FBI), Cincinnati Division; and Chillicothe Police Chief Ron Meyers announced the guilty pleas offered today before U.S. Magistrate Judge Norah McCann King. Assistant United States Attorneys Nicole Pakiz and Damoun Delaviz are representing the United States in the related cases.
These investigations were originally designated as part of Organized Crime Drug Enforcement Task Forces (OCDETFs). The cases are part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations (TCOs), and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces (OCDETFs) and Project Safe Neighborhood (PSN).
ALBUQUERQUE – A Zuni man pleaded guilty to federal charges stemming from a violent shooting incident involving the illegal use of a firearm.
According to court records, on the night of September 19, 2024, Devin Wade Wyaco shot John Doe (who was riding a bicycle) from the passenger side of his girlfriend’s vehicle, striking John Doe in the abdomen. Doe was transported to Zuni Hospital and later to the University of New Mexico Hospital for treatment. During an interview with investigators, John Doe identified the vehicle as belonging to Wyaco’s girlfriend. Doe survived the shooting.
Police identified Wyaco, 34, an enrolled member of the Zuni Pueblo, as the shooter through statements from his girlfriend, who admitted being present during the incident and confirmed Wyaco’s involvement. A federal search warrant executed at her residence corroborated her account. In his plea agreement, Wyaco confessed that he fired at John Doe after becoming angry when one of the bicyclists threw a rock at the car. He also admitted that as a previously convicted felon—having prior convictions for possession of cocaine with intent to distribute and aggravated fleeing from a law-enforcement officer—he knowingly possessed a firearm and ammunition in violation of federal law.
Handgun recovered from Wyaco’s girlfriend’s home.
Wyaco pled guilty to all three charges contained in the indictment, including assault with a dangerous weapon, using and carrying a firearm during and in relation to a crime of violence, and being a felon in possession of a firearm.
At sentencing, Wyaco faces no less than 10 years and up to life in prison followed by up to five years of supervised release. Additionally, Wyaco faces up to $250,000 in fines.
Acting U.S. Attorney Holland S. Kastrin and Raul Bujanda, Special Agent in Charge of the FBI Albuquerque Field Office, made the announcement today.
The Gallup Resident Agency of the FBI’s Albuquerque Field Office investigated this case with assistance from the Zuni Police Department. Assistant United States Attorney Zachary C. Jones is prosecuting the case.
GRAND RAPIDS, MICHIGAN — Acting U.S. Attorney for the Western District of Michigan Andrew Birge today announced that all five defendants charged with conspiring to launder proceeds for Nigerian sex extortionists have pleaded guilty.
Dinsimore Guyton Robinson, 29, of Huntsville, Alabama, pleaded guilty on January 22, 2025.
Kendall Ormond London, 32, of Lithonia, Georgia, pleaded guilty on March 26, 2025.
Brian Keith Coldmon, Jr., 30, of Peachtree Corners, Georgia, pleaded guilty on March 28, 2025.
Jarell Daivon Williams, 31, of McDonough, Georgia pleaded guilty on April 2, 2025.
Johnathan Demetrius Green, 32, of Stone Mountain, Georgia, pleaded guilty on April 2, 2025.
According to the Indictment, the conspirators used online payment systems to collect sextortion proceeds and send them to a Nigerian individual they referred to as “The Plug.” According to the Indictment, the sextortionists had boys and young men create nude images. After the sextortionists received those images, they allegedly had the victims send funds to the U.S.-based money launderers through online payment systems like Apple Pay, Cash App, and Zelle. The money launderers would keep about 20 percent of the money, convert the rest to bitcoin, and send the bitcoin to The Plug in Nigeria, who kept a portion and then sent the remainder to the sextortionists.
“These individuals helped and profited from this awful, heartbreaking scheme and so they now will face the consequences,” said Acting U.S. Attorney Birge. The conspiracy offense is punishable by up to 20 years in prison. The court will decide the sentences upon consultation with federal sentencing guidelines and the individual circumstances.
“These guilty pleas by the defendants serve as a strong reminder to anyone involved in sextortion or money laundering schemes,” said Cheyvoryea Gibson, Special Agent in Charge of the FBI’s Michigan Division. “I want to express my sincere gratitude to the dedicated members of our FBI Detroit Cyber Task Force, as well as teams from the Grand Rapids Resident Agency, Lansing Resident Agency, Marquette Resident Agency, FBI Birmingham (Huntsville Resident Agency), and FBI Atlanta for their tireless efforts. We also deeply appreciate our partners at the Economic and Financial Crimes Commission of Nigeria and the U.S. Attorney’s Office for the Western District of Michigan. The FBI remains committed to protecting the American public and will continue to prioritize dismantling criminal networks that exploit our most vulnerable citizens.”
Safety Tips and Resources for Victims, Teens, and Parents
The FBI provides the following tips on how people can protect themselves from sextortion schemes:
Be selective about what you share online. If your social media accounts are open to everyone, a predator may be able to figure out a lot of information about you.
Be wary of anyone you encounter for the first time online. Block or ignore messages from strangers.
Be aware that people can pretend to be anything or anyone online. Videos and photos are not proof that people are who they claim to be. Images can be altered or stolen. In some cases, predators have even taken over the social media accounts of their victims.
Be suspicious if you meet someone on one game or app and that person asks you to start talking on a different platform.
Be in the know. Any content you create online—whether it is a text message, photo, or video—can be made public. And nothing actually “disappears” online. Once you send something, you don’t have any control over where it goes next.
Be willing to ask for help. If you are getting messages or requests online that don’t seem right, block the sender, report the behavior to the site administrator, or go to an adult. If you have been victimized online, tell someone. Being a victim of sextortion is not your fault. You can get through this challenge, even if it seems scary and overwhelming. There are people who want to help.
If you have information about or believe you are a victim of sextortion, contact your local FBI field office, call 1-800-CALL-FBI, or report it online at http://tips.fbi.gov. This FBI PSA and National Center for Missing and Exploited Children PSA share survivor stories and resources for individuals to get help. More FBI sextortion resources are available here.
This case has been investigated by the Federal Bureau of Investigation and the Economic and Financial Crimes Commission of Nigeria. It is being prosecuted by Assistant U.S. Attorney Daniel Mekaru.
The charges in an indictment are merely accusations, and the remaining defendants are presumed innocent until and unless proven guilty in a court of law.
A Colombian national and lieutenant for Clan del Golfo (CDG) pleaded guilty today to conspiring to distribute large quantities of cocaine destined for the United States.
According to court documents, Fabian Edilson Torres Caranton, also known as David and Cassius, 53, served as a coordinator, intermediary, and lieutenant for the Bloque Roberto Vargas Gutierrez of CDG — a Colombian paramilitary and multibillion-dollar Transnational Criminal Organization. CDG is one of Colombia’s largest and most powerful drug cartels with its membership in the thousands. CDG’s primary source of income is from cocaine trafficking, which it uses to fund its paramilitary activities.
According to court documents, in July 2018, Torres Caranton and an individual seeking to broker the purchase of cocaine on behalf of Mexican buyers, attended a meeting with another member of CDG at a ranch in or near Caucasia, Colombia. During the meeting, the other CDG member authorized the production of 500 kilograms of cocaine to be transported from Colombia into and through Central America for delivery to Mexican buyers for final delivery to the United States. Torres Caranton spent several days monitoring the cocaine production at a clandestine laboratory in Coralito, Colombia. Torres Caranton and his co-conspirators made two controlled deliveries of cocaine to an undercover officer: 191 kilograms on Sept. 16, 2018, in Valledupar, Colombia, and 172 kilograms on Oct. 16, 2018, in Cartagena, Colombia. Torres Caranton knew the purported Mexican buyers intended to distribute the cocaine in Houston, Texas.
Torres Caranton pleaded guilty to conspiracy to distribute cocaine for unlawful importation into the United States from Colombia. He is scheduled to be sentenced on Aug. 4 and faces a mandatory minimum penalty of 10 years in prison and a maximum penalty of life in prison. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.
Matthew R. Galeotti, Head of the Justice Department’s Criminal Division, and Acting Special Agent in Charge Brett Skiles of the Federal Bureau of Investigation (FBI) Miami Field Office made the announcement.
The FBI Miami Field Office investigated the case. The Justice Department’s Office of International Affairs and the Narcotic and Dangerous Drug Section’s Judicial Attaché Office in Bogota worked with law enforcement partners in Colombia to secure the arrest and December 2023 extradition of Torres Caranton.
Trial Attorney Douglas Meisel and Acting Deputy Chief Melanie Alsworth of the Criminal Division’s Narcotic and Dangerous Drug Section are prosecuting the case.
This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations (TCOs), and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces (OCDETFs) and Project Safe Neighborhoods (PSN).
Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)
MARTINSBURG, WEST VIRGINIA – Charles Edward Scott, 31, of Damascus, Maryland, was sentenced to 156 months in prison for his leadership of a drug conspiracy that sold the drug “boot” in the Eastern Panhandle of West Virginia.
According to court documents and statements made in court, Scott, also known as “Whop Whop,” led a group of people selling Eutylone, also known as “boot,” in Berkeley and Jefferson Counties. Scott was storing large quantities of the drug and firearms in an apartment in Maryland, and with other known defendants, traveled to West Virginia to distribute. Scott has prior drug, firearms, and theft convictions.
Scott will serve three years of supervised release following his prison sentence.
The Federal Bureau of Investigation; the Bureau of Alcohol, Tobacco, Firearms and Explosives; the Eastern Panhandle Drug Task Force, a HIDTA-funded initiative; the Martinsburg Police Department; the Montgomery County, Maryland Police Department; the Virginia State Police, Montgomery County; and Maryland State Attorney’s Office investigated.
Assistant U.S. Attorney Lara Omps-Botteicher prosecuted the case on behalf of the government.