Category: Intelligence

  • MIL-OSI Security: Former Bryant High School Teacher Pleads Guilty to Transportation of a Minor to Engage in Illegal Sexual Activity

    Source: US FBI

          LITTLE ROCK—Jonathan D. Ross, United States Attorney for the Eastern District of Arkansas, announced today that a former Bryant High School teacher has pleaded guilty to transporting a minor across state lines for the purpose of unlawful sexual activity. Heather Hare, 33, of Conway, entered this guilty plea earlier today before United States District Judge Lee P. Rudofsky.

          Judge Rudofsky will sentence Hare at a later date. Transportation of a minor to engage in unlawful sexual activity is punishable by not less than 10 years imprisonment and up to life imprisonment, and not less than five years of supervised release.

          The investigation into Hare revealed that Hare taught Family Consumer Science classes at Bryant High School and met the minor victim on his first day of his senior year. Hare began one-on-one counseling sessions with the minor victim, eventually giving him her personal phone number and primarily communicating with him through Instagram and Snapchat.

          Hare later told the minor victim that she had a dream of them having sex and gave him her home address in Conway. The minor victim and Hare had sex approximately 20 to 30 times throughout the 2021-2022 school term, including multiple times at her Conway residence, in her vehicle, and in her classroom and parking lots at Bryant High School.

          Between April 21 and April 24, 2022, Hare was the sponsor and chaperone for a field trip to Washington, D.C., as part of an extracurricular activity related to the Family Consumer Science courses Hare taught. During the field trip, which included four students, of which the minor victim was the only male student, Hare and the minor victim engaged in the unlawful sexual activity to which she pleaded guilty.

          “This former teacher took advantage of her position of trust and the vulnerability of a minor, using her role to entice and lure this minor into engaging in unlawful sexual activity,” Ross said. “Our office will continue to seek significant penalties against any educational professional who sexually abuse their students.”

          Hare was indicted on August 1, 2023, and charged with one count of interstate/foreign travel for prostitution/sexual activity by coercion and one count of transportation of a minor with intent to engage in criminal sexual activity. In exchange for her guilty plea, the remaining charge was dismissed.

          The case was investigated by the FBI, Bryant Police Department, and Saline County Sheriff’s Office and is being prosecuted by Assistant United States Attorney Kristin Bryant.

    # # #

    Additional information about the office of the

    United States Attorney for the Eastern District of Arkansas, is available online at

    https://www.justice.gov/edar

    X (formerly known as Twitter):

    @EDARNEWS 

    MIL Security OSI

  • MIL-OSI Security: Sextortion: A Growing Threat Targeting Minors

    Source: US FBI

    Offenders Deceive and Manipulate Victims to Create Sexually Explicit Material for Extortion Purposes

    LITTLE ROCK, AR—The FBI wants to warn parents, educators, caregivers, and children about the dangers of online activity that may lead to the solicitation and enticement of a minor to engage in sexual acts.

    Sextortion involves an offender coercing a minor to create and send sexually explicit images or video. An offender gets sexually explicit material from the child and then threatens to release that compromising material unless the victim produces more. These offenders are seeking sexual gratification.

    Financially motivated sextortion is a criminal act that involves an offender coercing a minor to create and send sexually explicit material. Offenders threaten to release that compromising material unless they receive payment, which is often requested in gift cards, mobile payment services, wire transfers, or cryptocurrency. These offenders are motivated by financial gain, not necessarily just sexual gratification.

    Victims are typically males between the ages of 14 to 17, but any child can become a victim. For financially motivated sextortion, offenders are usually located outside the United States and primarily in West African countries such as Nigeria and Ivory Coast, or Southeast Asian countries such as the Philippines.

    These crimes can lead victims to self-harm and have led to suicide. From October 2021 to March 2023, the FBI and Homeland Security Investigations received over 13,000 reports of online financial sextortion of minors. The sextortion involved at least 12,600 victims—primarily boys—and led to at least 20 suicides.

    In the six-month period from October 2022 to March 2023, the FBI observed at least a 20% increase in reporting of financially motivated sextortion incidents involving minor victims compared to the same time period the previous year.

    “The exploitation of children is a reprehensible crime and will not be tolerated by the FBI,” said Special Agent in Charge Alicia Corder of the FBI’s Little Rock Field Office. “Our office will continue to work with our federal, state, and local law enforcement partners to protect Arkansas children from sextortion and hold these predators accountable.”

    If you or someone you know believes that they are a victim of sextortion or financially motivated sextortion, immediately report the activity to law enforcement. You can report it to the FBI by calling 1-800-CALL-FBI or visiting tips.fbi.gov.

    For more information on sextortion and financial sextortion, visit the FBI’s resources on the threats at: https://www.fbi.gov/sextortion and https://www.fbi.gov/how-we-can-help-you/scams-and-safety/common-scams-and-crimes/sextortion/financially-motivated-sextortion.

    MIL Security OSI

  • MIL-OSI Security: Jury Finds Registered Sex Offender From Michigan Guilty of Interstate Travel to Engage in Illicit Sexual Activity With a Minor; Sexual Exploitation of a Minor; and Receipt of Child Pornography

    Source: US FBI

          LITTLE ROCK—A registered sex offender from Michigan has been convicted of committing multiple sex offenses in Arkansas at the conclusion of a three-day trial. On Wednesday, a federal jury found Jeremy Robert Ward, 33, of Marine City, Mich., guilty on all nine counts for which he was indicted: one count of interstate travel with the purpose of enticing a minor to engage in sexual activity with a minor, six counts of sexual exploitation of a minor, one count of receipt of child pornography, and one count of travel with the purpose to engage in illicit sexual activity with a minor.

          The jury returned their verdict after deliberating for approximately 90 minutes. United States District Judge Kristine G. Baker presided over the trial and will sentence Ward at a later date. One of Ward’s charges carries a mandatory minimum sentence of 25 years in prison.

          “This defendant, who is already a convicted sex offender, continued this abhorrent behavior by acting on his desire to have sex with a minor. He used social media to seek out the victim and took advantage of her innocence,” said Jonathan D. Ross, United States Attorney for the Eastern District of Arkansas. “This verdict the jury reached sends a clear message that Arkansas juries will not hesitate to convict sex offenders for this type of conduct. If you seek to have sex with children, you will be caught and prosecuted to the fullest extent under federal law.”

          Ward was previously convicted in 2013 in Michigan of three counts possession of child sexually abusive material and one count of accosting a child for an immoral purpose. He is a registered sex offender in Michigan.

          Ward met the 12-year-old minor victim online in September 2022 when he added her to his Snapchat account. He exchanged messages with the victim for approximately three weeks before traveling to Arkansas from his home in Michigan to meet her. On October 15, 2022, he met her face-to-face when he drove up to her in his pickup truck while she was riding her bike near her neighborhood in Bryant. During her encounter with Ward, the victim began surreptitiously recording a portion of her exchange with him. On the video, Ward told her, “I was hoping to take you home” and “I just wish she [her mom] would let you go, especially since I drove all the way down here.” Ward also told the minor victim that she must “think I’m gonna kidnap you or something,” to which she replied, “You probably are about to at this point.” He later asked if she knew of any “private spots,” in an attempt to find a more secluded place to be with her.

          Around the same time, using an application on her cell phone, her father noticed she was outside of the established boundary where she was permitted to be. Her parents went to her location, and her father found the minor victim laying in the grass with Ward, whose pants were around his ankles. Ward then fled into the woods.

          The minor victim testified at trial that while she was in the field with Ward, he attempted to commit sexual acts with her. Subsequent investigation revealed that the victim and Ward communicated through video messages, some of which Ward recorded on his phone. The recorded video messages were recovered from Ward’s phone and included video and still images of the nude minor victim in the shower.

          “Each year thousands of children are targeted and victimized by child predators. Mr. Ward’s heinous crimes highlight the prevalent threat Arkansas youth and families face,” said Special Agent in Charge Alicia D. Corder of FBI’s Little Rock Field Office. “This case is yet another example of FBI Little Rock’s commitment to working with our partners to target individuals who seek to exploit the most vulnerable members of our community.”

          The statutory penalty for sexual exploitation of a minor ranges from not less than 25 years to not more than 50 years. The statutory penalty for traveling with the purpose of engaging in sexual activity with a minor is not less than 10 years imprisonment and up to life imprisonment. The statutory penalty for receipt of child pornography is not less than 15 years and not more than 40 years imprisonment. The statutory penalty for of travel with the purpose to engage in illicit sexual activity with a minor is not more than 30 years imprisonment. All offenses of conviction include a potential penalty of not more than a $250,000 fine and not less than five years to life of supervised release.

          The investigation was conducted by the FBI, and the case was prosecuted by Assistant United States Attorneys Kristin Bryant and Amanda Fields.

    # # #

    Additional information about the office of the

    United States Attorney for the Eastern District of Arkansas, is available online at

    https://www.justice.gov/edar

    X (formerly known as Twitter):

    @EDARNEWS 

    MIL Security OSI

  • MIL-OSI Security: Yellville Man Sentenced to 30 Years in Federal Prison for Online Sexual Enticement of a Minor

    Source: US FBI

    FayettevilleIsaac James Melder, age 42, of Yellville was sentenced on February 13, 2024, to 360 months in prison without the possibility of parole after being found guilty of communicating with a minor through the internet to entice the minor to engage in illegal sexual activity.  The Honorable Judge Timothy L. Brooks presided over the sentencing hearing in the U.S. District Court in Fayetteville.

    According to court documents, in May of 2022, a fourteen-year-old female was reported missing after failing to get on the afternoon school bus.  An extensive search involving multiple law enforcement agencies began, during which officers discovered that Melder and the victim had communicated via the internet using an Xbox.  The messages revealed the two had planned to run away and live in a cave in the Marion County wilderness. The investigation further revealed that Melder had groomed both the victim and her family by providing groceries, money, alcohol, and marijuana and referred to the victim as his wife.

    On June 22, 2022, an informant led law enforcement to the cave where Melder and the victim had lived since their May disappearance.  Melder was immediately taken into state custody.

    Melder was indicted by a Grand Jury in the Western District in April of 2023 and entered a plea of guilty in July 2023.

    U.S. Attorney David Clay Fowlkes of the Western District of Arkansas made the announcement.

    Mountain Home Police Department, Baxter County Sheriff’s Office, Marion County Sheriff’s Office, Arkansas State Police, Flippin Police Department, Arkansas Department of Correction, the U.S. Marshal’s Service, Federal Bureau of Investigation, Harrison Police Department, Arkansas Game and Fish Commission, Arkansas State Parks, the 14th Judicial District Drug Task Force, investigated or assisted in the search in the case.

    Assistant U.S. Attorney Devon Still prosecuted the case for the United States.

    This case was prosecuted as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    Related court documents may be found on the Public Access to Electronic Records website @ www.pacer.gov

    MIL Security OSI

  • MIL-OSI Security: Lancaster, Texas, Man Found Guilty of Being a Felon in Possession of a Firearm

    Source: US FBI

          LITTLE ROCK—After a two-day trial, a Texas man has been convicted of being a felon in possession of a firearm. On Tuesday, a federal jury found Kaeron Washington, 33, Lancaster, Texas, guilty of being a felon in possession of a firearm, the sole count in the Indictment. Washington has previous convictions for aggravated robbery and drug possession.

          After deliberating less than two hours, the jury returned a verdict of guilty. United States District Judge Lee P. Rudofsky presided over the trial and will sentence Washington at a later date. The defendant faces a maximum sentence of ten years’ imprisonment.

          On February 18, 2022, physical surveillance was conducted at 7212 Geyer Springs Road, Little Rock, Arkansas. Law enforcement observed a group of individuals parked in front of a closed business on Geyer Springs at approximately 9:00 p.m. The occupants of the vehicle were observed smoking and passing items back and forth between vehicles for approximately 30 minutes. As investigators approached the vehicle, they activated their emergency lights and could smell an overwhelming odor of marijuana coming from the vehicles.

          Contact was made with Kaeron Washington, the driver of a white Mercedes. As investigators approached the vehicle, Washington was observed opening the driver’s door of the vehicle and throwing an item towards the rear of the vehicle. A bag of suspected marijuana was later located in the area. The passenger in Washington’s vehicle advised law enforcement officials that he had a gun at his feet. After the passenger was taken out of Washington’s vehicle, law enforcement seized the gun that was observed on the floorboard. An officer observed a small bag of suspected marijuana in the seat when the passenger exited the vehicle. During a further search of Washington’s vehicle, officers located a Glock pistol in the center console next to the driver’s seat.

          The investigation was conducted by the Federal Bureau of Investigation, Little Rock Police Department, and the GET Rock Task Force.

    # # #

    Additional information about the office of the

    United States Attorney for the Eastern District of Arkansas, is available online at

    https://www.justice.gov/edar

    X (formerly known as Twitter):

    @USAO_EDAR 

    MIL Security OSI

  • MIL-OSI Security: Little Rock Man Sentenced to More Than 12 Years in Prison After Fleeing Police, Illegal Possession of Fentanyl

    Source: US FBI

          LITTLE ROCK—Andre Pride will spend the next 151 months in federal prison for possession with intent to distribute fentanyl. Jonathan D. Ross, United States Attorney for the Eastern District of Arkansas, announced the sentence, which was handed down today by Chief United States District Judge Kristine G. Baker.

          Chief Judge Baker sentenced Pride to 151 months imprisonment and three years’ supervised release to follow his prison sentence. Pride faced a maximum sentence of not more than 20 years imprisonment. There is no parole in the federal system.

          On July 19, 2022, Pride, 36, of Little Rock, was indicted by a federal grand jury on two counts of possession with intent to distribute fentanyl. On May 5, 2023, Pride pleaded guilty to one count of possession with intent to distribute fentanyl.

          On June 13, 2019, Pride was driving a Can-Am motorcycle and while law enforcement officers were attempting to make contact with him, Pride rammed their vehicle and fled. While fleeing, Pride observed two marked law enforcement vehicles and quickly turned around. After turning around, Pride rammed another law enforcement vehicle and fled on foot. While fleeing, Pride removed a baggie of fentanyl from his pocket tore open the bag and attempted to spread the fentanyl in the yard of an unknown residence. Following the arrest of Pride, law enforcement officers retrieved 30 grams of fentanyl from the yard.

          The investigation was conducted by the Federal Bureau of Investigation.

    # # #

    Additional information about the office of the

    United States Attorney for the Eastern District of Arkansas, is available online at

    https://www.justice.gov/edar

    X (formerly known as Twitter):

    @USAO_EDAR 

    MIL Security OSI

  • MIL-OSI Security: Drug Trafficking Results in Over a Dozen People Arrested on Federal Charges

    Source: US FBI

    Several Defendants Face Federal Drug, Gun, and Money Laundering Charges In Large Scale Drug Operation

          JONESBORO—Fifteen people were arrested Tuesday morning as part of a sweeping law enforcement operation that targeted associates of a drug organization responsible for the distribution of methamphetamine in the Northeast Arkansas area. Law enforcement officers previously arrested one person on Monday and served arrest warrants on an additional three people already in custody.

          The investigation began in August 2022 to combat a significant drug distribution organization operating in the Northeast Arkansas area. Numerous indictments, which were returned by a Grand Jury on April 2, 2024, and unsealed today, named several defendants who are charged with various drug, money laundering, and firearm offenses. Law enforcement officers arrested 15 individuals and served an arrest warrant Tuesday on two defendants already in federal custody and one in state custody.

          Prior to today’s arrests, the investigation had resulted in the seizure of 45 pounds of methamphetamine, 10 pounds of marijuana, one pound of cocaine, six firearms, various ammunition, and $125,000 in drug proceeds. During arrest operations on Tuesday, agents recovered additional methamphetamine, three firearms (one of which was defaced), ammunition, and approximately an additional $28,000 in suspected drug proceeds.

          “So many lives and communities have been destroyed by drugs and with today’s arrests, fifteen drug dealers have been taken off the streets,” said Jonathan D. Ross, United States Attorney for the Eastern District of Arkansas. “Where drugs are present, so are firearms and violence. Working with our federal, state, and local partners to keep our citizens safe from the violence that too often accompanies drug trafficking, will help to create safer communities for citizens in the Eastern District of Arkansas.”

          “Today’s arrests demonstrate how the FBI has zero tolerance for criminals who pollute our communities with dangerous narcotics,” Special Agent in Charge Alicia D. Corder, Special Agent in Charge, Federal Bureau of Investigations, Little Rock Field Office. “This was a collaborative effort between the FBI, Jonesboro Police Department, Craighead County Sheriff’s Office, Arkansas State Police, and several others. We will continue to work together to keep Arkansans safe and bring dangerous criminals to justice.”

          The investigation was conducted by the Federal Bureau of Investigation with assistance from the Drug Enforcement Administration, 2nd Judicial District Drug Task Force, Jonesboro Police Department, Craighead County Sheriff’s Office, Crittenden County Sheriff’s Office, Arkansas State Police, Greene County Sheriff’s Office, Poinsett County Sheriff’s Office, and the Clay County Sheriff’s Office.

          The charges in today’s unsealed indictments include conspiracy to distribute and possess with intent to distribute methamphetamine; distribution and possession with intent to distribute methamphetamine; conspiracy to money launder, money laundering, possession of a firearm in furtherance of a drug trafficking crime; and felon in possession of a firearm and ammunition.

          The minimum penalty for the drug charges is not less than 10 years’ imprisonment and a $10,000,000 fine. The minimum penalty for possessing a firearm in furtherance of a drug-trafficking crime is not less than five years in prison and up to life imprisonment and a $250,000 fine.

          This investigation is part of an Organized Crime Drug Enforcement Task Forces (OCDETF) investigation. OCDETF identifies, disrupts, and dismantles the highest-level drug traffickers, money launderers, gangs, and transnational criminal organizations that threaten the United States by using a prosecutor-led, intelligence-driven, multi-agency approach that leverages the strengths of federal, state, and local law enforcement agencies against criminal networks.

          The defendants arrested today will appear before U.S. Magistrate Judge Benecia B. Moore on April 18, 2024, for plea and arraignment. Defendants who were already in custody will have arraignments scheduled later. Trial dates will be announced at plea and arraignment. The case is being prosecuted by Assistant United States Attorney Erin O’Leary. The defendants charged and in custody include:

    Cesar Cortez-Rocha, 51, Misson, Texas

    Amado Barranco, Jr. aka “Myo”, 55, McAllen, Texas

    Bobby Franklin Barber, 60, Jonesboro

    Misty Dawn Barber, 38, Jonesboro

    Jamie Lynn Patterson, 40, Jonesboro

    *Amie Dawn Eggers, 39, Jonesboro (already in federal custody on other charges)

    Carey Wayne Peden, 46, Little Rock

    Vance Allen Brown, 56, Hot Springs

    *Sir Edward Lee Qualls aka “Buddy”, 35, Earle (already in federal custody on related charges)

    Reginald Bogan aka “Smooth”, 37, Jonesboro

    **Melissa Bradley, 33, Jonesboro (already in custody on state charges)

    Jerry Crump, 55, Jonesboro

    Sandi Stanfill, 59, Paragould

    Delisha Pugh, 25, Earle

    Jennifer Jones, 37, Brookland

    William Jones, 28, Harrisburg

    Marcus McIntyre, 42, Memphis, Tennessee

    Harthoner Goforth, 38, Paragould

    Shauna Rutledge, 37, Hughes

    * already in federal custody

    ** in state custody

          An indictment contains only allegations. Defendants are presumed innocent unless and until proven guilty.

    # # #

    This news release, as well as additional information about the office of the

    United States Attorney for the Eastern District of Arkansas, is available online at

    https://www.justice.gov/edar

    X (formerly known as Twitter):

    @USAO_EDAR 

    MIL Security OSI

  • MIL-OSI Security: Grand Jury Charges Cincinnati Man with Crimes Related to $6.5 Million Fraud Scheme

    Source: US FBI

    CINCINNATI – A local man was indicted on charges alleging he defrauded victims out of more than $6.5 million through an online laundry and dry-cleaning pickup and delivery business.

    Benjamin Cantey, 41, of Cincinnati, was charged in a six-count indictment that was unsealed yesterday.

    According to the indictment, in 2019, Cantey started Carbon IQ Inc., doing business as Rumby, as a Delaware corporation that he operated out of Cincinnati. Rumby was a venture-backed startup that purported to provide an e-commerce platform for pickup and delivery of laundry and dry cleaning. Cantey sought to raise investment money as the founder and CEO of the company.

    It is alleged that from 2020 through 2022, Cantey defrauded investors and potential investors of money and property. Cantey allegedly lied about his business experience and prior business success to recruit investors. He also allegedly communicated false information that overstated Rumby’s revenue, profits, bank balance, growth and potential growth. He allegedly sent false presentation decks to victims.

    For example, Cantey claimed that Rumby ended May 2022 with a $1.5 million bank balance when in reality the account had a negative balance of approximately -$53,000.

    The defendant allegedly spent $850,000 in investor money to help purchase a 5,000-square-feet, $1.7 million home on Garden Place in Cincinnati.

    Cantey is charged with four counts of wire fraud and two counts of engaging in monetary transactions in property derived from specified unlawful activity.

    Kenneth L. Parker, United States Attorney for the Southern District of Ohio; and Elena Iatarola, Special Agent in Charge, Federal Bureau of Investigation (FBI), Cincinnati Division; announced the charges. Assistant United States Attorney Matthew C. Singer is representing the United States in this case.

    An indictment merely contains allegations, and defendants are presumed innocent unless proven guilty in a court of law.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Two Former Arkansas Sheriff’s Deputies Plead Guilty to Federal Civil Rights Violations for Violently Assaulting a Man They Arrested

    Source: US FBI

    Two former Crawford County, Arkansas, sheriff’s deputies, Levi White, 34, and Zackary King, 28, pleaded guilty to federal civil rights offenses for using unlawful force on a man they arrested.

    “The defendants swore an oath to uphold the law, then violated that oath and abused their power by assaulting a person who was pinned to the ground and not resisting,” said Assistant Attorney General Kristen Clarke of the Justice Department’s Civil Rights Division. “These defendants will now face the serious consequences that result from their unlawful actions. The Justice Department will continue to protect the right of every person in this country to be free of excessive force by law enforcement officers.”  

    “The videos from this incident are a shocking display of the violent deprivation of civil rights committed by these officers,” said U.S. Attorney Clay Fowlkes for the Western District of Arkansas. “No person in police custody should ever feel threatened or should ever experience violence at the hands of those who are sworn to protect the public. We will continue to vigorously pursue justice in cases involving the violation of civil rights in the Western District of Arkansas.”

    “The violent and abusive actions of these two men, who were sworn to serve and protect our community, are unacceptable,” said Assistant Director Michael D. Nordwall of the FBI’s Criminal Investigative Division. “Law enforcement officers hold positions with significant authority and influence, and their credibility in the eyes of the American people depends on their ability to maintain integrity. These guilty pleas serve as a reminder that the FBI will continue to hold accountable those who take advantage of their positions and will always fight to protect the civil rights of all Americans.”

    “Disgraceful actions, like those of the two Crawford County sheriff’s deputies, negatively impact all members of Arkansas law enforcement,” said Special Agent in Charge Alicia D. Corder of the FBI Little Rock Field Office. “A gun and a badge do not give someone the right to ignore the Constitution. The FBI’s ArkTrust Task Force will continue to work to restore the public’s trust in law enforcement by investigating officers who violate the civil rights of citizens in our community.”

    According to court documents, White, King and a third officer approached a man identified as R.W. in a gas station parking lot on Aug. 21, 2022, during their investigation into a person threatening a store attendant. R.W. lunged at White and tackled him, then all three officers quickly subdued R.W. and pinned him to the ground. After R.W. was pinned to the ground and no longer fighting the officers, King kicked R.W. in the back and struck R.W. once in the midsection with his fist. At approximately the same time, White punched R.W. at least nine times in the head, then lifted R.W.’s head and slammed it into the pavement. The third officer did not strike R.W. R.W. suffered head injuries from the assault.

    Sentencing hearings will be scheduled at a later date. White faces a maximum penalty of 10 years in prison, three years of supervised release and a fine of up to $250,000. King faces a maximum penalty of one year in prison, one year of supervised release and a fine of up to $100,000. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    The FBI Little Rock Field Office and ARKTrust Task Force investigated the case.

    Special Litigation Counsel Michael J. Songer and Trial Attorneys Lia Rettammel and Anna Gotfryd of the Civil Rights Division and Assistant U.S. Attorneys Dustin Roberts and Devon Still for the Western District of Arkansas are prosecuting the case.

    MIL Security OSI

  • MIL-OSI Security: FBI Little Rock Honors Dr. Mehmet Ulupinar with National Award

    Source: US FBI

    On Friday, April 19, 2024, FBI Director Christopher Wray presented Dr. Mehmet Ulupinar with the FBI Director’s Community Leadership Award (DCLA) for his service to the citizens of Little Rock through his work as president of the board for the Arkansas Culture and Dialog Center (ACDC). ACDC is a nonprofit organization that aims to promote the understanding of diverse cultures through its unique services it offers to the community.

    The FBI established the DCLA in 1990 to publicly acknowledge the achievements of those working to make a difference in their communities through the promotion of education and the prevention of crime and violence. Each year, one person or organization from each of the FBI’s 56 field offices is chosen to receive this prestigious award.

    “Our success as both a law enforcement and an intelligence agency hinges on our ability to foster and maintain genuine partnerships with people in all communities,” said FBI Director Christopher Wray. “People like this year’s Leadership Award recipients not only identify what others need, but they are willing to roll up their sleeves and provide services. They are building bridges and relationships while putting in the work to have hard conversations and find common purpose. They do it out of kindness and compassion with a sincere belief that justice—in its many forms—requires all of us to do the right thing in the right way.”

    Dr. Ulupinar tirelessly works to foster relationships between diverse communities and law enforcement in Arkansas by providing easily accessible educational, social, and cultural services at ACDC. Dr. Ulupinar assists the FBI in pushing key safety concerns to minority youth and adults throughout Central Arkansas through trainings and networking events with the goal of creating a more safe and connected community.

    “I am extremely humbled to be one of the 2023 FBI DCLA recipients,” said Mehmet Ulupinar. “As an immigrant to this country, I am fascinated by the words of the Pledge of Allegiance, specifically where we recite “with liberty and justice for all.” What a powerful commitment that is! It prompts me to think about what I can do for my neighbors, for my community, and for other human beings to preserve and exercise liberty and justice for all. The answer I found to this question is to get involved, serve, and be a part of the solution.”

    “Dr. Ulupinar is a treasured asset to our community,” said FBI Little Rock Special Agent in Charge Alicia D. Corder. “His passion for fostering prosperous relationships between law enforcement and minority groups in Arkansas is deeply appreciated by myself and many others. FBI Little Rock is proud to partner with community leaders like Dr. Ulupinar.”

    Director Wray hosted the 2023 DCLA winners in a special ceremony at FBI Headquarters on April 19, emphasizing the importance of community partnerships in keeping our shared communities safe. These partnerships—as exemplified by the breadth of the work by the DCLA recipients—have led to a host of crime prevention programs that protect the most vulnerable in our communities, educate families and businesses about cyber threats, and work to reduce violent crime in our neighborhoods.

    FBI Little Rock congratulates Dr. Mehmet Ulupinar and thanks him for working diligently to better our community.

    MIL Security OSI

  • MIL-OSI Security: Grand Jury Indicts Local Doctor on False Statements, Writings Charges Related to 1989 Rape

    Source: US FBI

    Court documents detail 2 additional alleged victims; law enforcement continues to seek information in Ohio, Colorado & Kansas

    DAYTON, Ohio – A federal grand jury returned a six-count indictment today against a Sycamore Township man whose DNA implicated him in a 1989 rape.

    Frederick Louis Tanzer, 66, is charged with four counts of making false statements to an agency or officer of the United States and two counts of making or using a false document or writing. Each count is punishable by up to five years in prison. These federal crimes are prosecutable even if an underlying offense has passed the statute of limitations.

    Tanzer has been in custody since his arrest on Dec. 11 and will remain in custody pending trial.

    According to court documents, Tanzer’s DNA was confirmed by a forensic laboratory as a match to the DNA the rapist had left at the 1989 crime scene, where the victim was violently raped over the course of five and a half hours in her condominium on Creighton Place in Cincinnati after arriving home from work.

    It is alleged that Tanzer made several materially false statements to federal investigators when approached about the rape last week, including denying having seen or interacted with the victim on the date she was raped.

    Tanzer is a medical doctor who has lived and practiced medicine in Ohio, Kansas and Colorado.

    According to a recent filing relating to detention, during a search warrant executed on Dec. 11 at Tanzer’s home, investigators located restraints, a gag, a black hat and zip ties together in Tanzer’s dresser.

    The same filing also detailed that two additional victims have been identified who were repeatedly drugged and raped by Tanzer, including as recently as two and a half years ago in Kansas. The document includes information about Tanzer drugging the women in order to have sex with them without their consent and about Tanzer using a burner phone to engage with sex workers when he traveled for work for weeks or months at a time.

    Federal law enforcement officials ask the public to consider the circumstances of the rapes, and the locations where Tanzer has lived, and to contact the FBI with any similar information at 1-800-CALL-FBI.

    Kenneth L. Parker, United States Attorney for the Southern District of Ohio; Elena Iatarola, Special Agent in Charge, Federal Bureau of Investigation, Cincinnati Division; and Cincinnati Police Chief Teresa A. Theetge announced the arrest. The IRS-Criminal Investigation Cincinnati Field Office assisted in the investigation. Assistant United States Attorneys Kelly K. Rossi and Julie D. Garcia are representing the United States in this case.

    An indictment merely contains allegations, and defendants are presumed innocent unless proven guilty in a court of law.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Woman Pleads Guilty to Transporting Stolen Human Body Parts Out of the State of Arkansas

    Source: US FBI

          LITTLE ROCK— Jonathan D. Ross, United States Attorney for the Eastern District of Arkansas, announced today that a former employee of a mortuary services provider has pleaded guilty to transporting stolen body parts across state lines and conspiracy to commit mail fraud. Candace Chapman Scott, 37, of Little Rock, entered this guilty plea today before United States District Judge Brian S. Miller.

          Judge Miller will sentence Scott at a later date. Transporting stolen property across state lines is punishable by not more than 10 years’ imprisonment, not less than three years’ supervised release, and a fine of not more than $250,000. The maximum penalty faced by Scott for mail fraud is not more than 20 years’ imprisonment, not less than three years’ supervised release, and a fine of not more than $250,000.

          The investigation revealed that Scott, while an employee at a mortuary services provider between October 2021 through approximately July 15, 2022, stole human body parts and fetal remains. Scott would then sell the stolen human body parts and fetal remains, arranging for them to be transported across a state line to the purchaser.

          Scott was indicted on April 5, 2023, and charged with six counts of wire fraud, four counts of mail fraud, and two counts of interstate transportation of stolen property.   In exchange for her guilty plea, the remaining charges were dismissed.

          The case was investigated by the Federal Bureau of Investigation.

          If you have information relating to this case or think you may have been impacted by this case, you may contact the U.S. Attorney’s Office by email at USAARE-SubmitInfo@usdoj.gov.

    # # #

    Additional information about the office of the

    United States Attorney for the Eastern District of Arkansas, is available online at

    https://www.justice.gov/edar

    X (formerly known as Twitter):

    @USAO_EDAR 

    MIL Security OSI

  • MIL-OSI Security: Columbus Man Sentenced to Seven Years in Prison for Robbing Postal Carrier at Gunpoint

    Source: US FBI

    COLUMBUS, Ohio – Anthony J. “A.J.” Williams, 20, of Columbus, was sentenced in U.S. District Court today to 84 months and one day in prison for crimes related to armed robberies of United States postal carriers. 

    “Today’s sentencing shows our continued commitment to holding accountable individuals who break the law in relation to mail theft,” said U.S. Attorney Kenneth L. Parker. “Our investigations and prosecutions will be vigorous, and the end results will be significant. Williams’s seven-year prison sentence is just one example of that.”

    According to court documents, on Nov. 9, 2022, Williams committed an armed robbery of a USPS letter carrier who was delivering mail on Michigan Ave. in Columbus. The postal carrier was delivering mail to an apartment complex’s “cluster box” at the time.

    After borrowing a Glock19 from one co-conspirator and being driven by another co-conspirator, Williams approached the mail carrier and brandished the handgun directly at the victim. Williams demanded the victim’s postal keys and then yanked the postal keys off of the carrier’s belt.

    Williams sent photos of the stolen key to another co-conspirator who was orchestrating the robbery.

    The defendant also worked with that same co-conspirator to plan a postal robbery for Christmas Eve 2022 and repeatedly “fished” for stolen mail with stolen postal keys.

    Williams was indicted by a federal grand jury and arrested in January 2024. He pleaded guilty in July 2024 to brandishing a firearm during a crime of violence, committing aggravated robbery of United States property and conspiring to commit an offense against the United States.

    Kenneth L. Parker, United States Attorney for the Southern District of Ohio; Elena Iatarola, Special Agent in Charge, Federal Bureau of Investigation (FBI), Cincinnati Division; and Lesley Allison, Inspector in Charge, U.S. Postal Inspection Service (USPIS), Pittsburgh Division; announced the sentence imposed today by U.S. District Judge Algenon L. Marbley. Assistant United States Attorney Noah R. Litton is representing the United States in this case.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Columbus Man Sentenced to More Than Four Years in Prison for Cyberstalking, Sextorting Young Gay Men He Targeted on Dating Apps

    Source: US FBI

    COLUMBUS, Ohio – Omoruyi O. Uwadiae, 29, of Columbus, was sentenced in federal court here today to 51 months in prison for harassing, cyberstalking, extorting and stealing the identities of victims in multiple states including Ohio, Colorado and Washington.

    For several months in 2019, Uwadiae committed crimes targeting gay and bisexual men.

    According to court documents, Uwadiae obtained sexually explicit photographs and videos from potential victims and then used the content to threaten them. Uwadiae threatened to distribute the explicit material widely on the internet and specifically to victims’ friends, family members, employers and others.

    The defendant demanded money from some victims. From others, he demanded they meet him, have sex with him, or make damaging admissions such as admissions that they were racist. On multiple occasions, Uwadiae carried through with his threats. He sent sexually explicit photographs and videos to the victims’ friends, family members (including at least one victim’s mother, at least one victim’s brother, and at least one victim’s sister), employers and acquaintances, and also posted sexually explicit photographs and videos widely on the internet.

    Multiple victims had not publicly disclosed their sexual orientation, which Uwadiae’s actions disclosed, contrary to their wishes. The defendant also used victims’ identifications to create false accounts on social media and post the victims’ personal information and explicit images online.

    Uwadiae targeted young gay men on Grindr and other online sites. He would obtain their sexually explicit photographs and videos consensually and then use them to extort. In some cases, he posted their nude images on Male General and other websites without their consent and then demanded money or other things of value to take down the images. Male General is a blog marketed to gay men containing, among other things, boards where users can post images and text.

    For example, one victim was a student at The Ohio State University who communicated with Uwadiae on Grindr. Uwadiae ultimately demanded that the victim either pay him $200 or have sex with him. When the victim did not comply, Uwadiae created false social media accounts using true photos of the victim, stating, “this guy is gay, see pics for evidence.” The victim had not disclosed his sexual orientation to his family and had told Uwadiae he was concerned that his family would react negatively if they learned he was bisexual.

    Another victim was a minor at the time of Uwadiae’s crimes. When he and Uwadiae first communicated, he told Uwadiae that he was 18 years old, when in fact he was 17.  After Uwadiae began distributing explicit images of the victim, members of the victim’s family told Uwadiae that he was 17, and Uwadiae ultimately acknowledged that fact.  Even after Uwadiae knew the victim was a minor, he continued to distribute sexually explicit images of the victim, sending them to the victim’s mother and others, and also creating a publicly viewable Facebook page with the explicit images.

    Uwadiae was charged in the Southern District of Ohio in April by a bill of information and pleaded guilty in May to 22 total counts, including cyberstalking, making interstate communications with the intent to extort and seven count of unlawfully using a means of identification.

    Kenneth L. Parker, United States Attorney for the Southern District of Ohio, announced the sentence imposed today by U.S. District Judge Michael H. Watson. Assistant United States Attorney Peter K. Glenn-Applegate and Senior Litigation Counsel Heather A. Hill are representing the United States in this case, which was investigated by the FBI.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Law Enforcement Seeks Information Related to 1989 Rape

    Source: US FBI

    DAYTON, Ohio – A Sycamore Township man was arrested by federal agents today and charged with making false statements related to a 1989 rape. Officials ask anyone with information regarding this or any other similar rape to contact the FBI at 1-800-CALL-FBI.

    It is alleged that Frederick Louis Tanzer, 66, knowingly made a false statement to FBI agents. His home on Kenwood Road and vehicles were searched today, and Tanzer appeared in federal court in Dayton following his arrest.

    According to an affidavit filed in support of the criminal complaint, Tanzer was recently identified as the prime suspect in the cold-case rape. In recent months, agents collected DNA evidence from a Starbucks cup that Tanzer discarded at a local BMV. The DNA extracted from Tanzer’s coffee cup was confirmed by a forensic laboratory as a match to the DNA the rapist had left at the 1989 crime scene.

    It is alleged that Tanzer made several materially false statements to federal investigators when approached today, including denying having seen or interacted with the victim on the date she was raped.

    Tanzer is a medical doctor who has lived and practiced medicine in Ohio, Kansas and Colorado.

    The affidavit details that on Aug. 1, 1989, the victim was violently raped in her condominium on Creighton Place in Cincinnati after arriving home from work.

    Federal law enforcement officials ask the public to consider these circumstances of the rape and to contact the FBI with any similar information:

    • When the victim arrived home, she noticed an odor that smelled to her like brewed tea or burnt marijuana.
    • The rapist was dressed from head to toe in black Lycra, including black gloves and a face mask. He had a black gym bag with him.
    • The assailant held a knife to the victim’s throat.
    • The rapist used white surgical tape from the gym bag to wrap around the victim’s eyes and head. He used stockings and panty hose from the victim’s dresser to bind her hands and feet to the headboard and footboard of her bed.
    • The rapist cut or tore the victim’s clothing and used Vaseline.
    • The rapist assaulted the victim vaginally, orally and anally. In between bouts of sexual conduct, the assailant used a cloth to wipe the victim’s mouth and genital areas.
    • The rapist said nothing during the entire encounter. He occasionally took breaks from sexually assaulting the victim while the victim remained tied to her bed.
    • The rapist listened to and erased answering machine messages. He looked through papers in the victim’s living room and rummaged through her purse. He unplugged and/or disconnected telephones.
    • On the handset of the telephone in the bedroom, the rapist taped a piece of newspaper that had been cut from the paper on the couch in the victim’s living room and wrote, “No police or I’ll be back Mis [sic] [name of victim’s employer]”
    • The victim described the rapist as white, with dark brown hair, approximately six feet tall with a thin or athletic build.
    • The assault took place over the course of more than five and a half hours.

    Kenneth L. Parker, United States Attorney for the Southern District of Ohio; Elena Iatarola, Special Agent in Charge, Federal Bureau of Investigation, Cincinnati Division; and Cincinnati Police Chief Teresa A. Theetge announced the arrest. The IRS-Criminal Investigation Cincinnati Field Office assisted in the investigation. Assistant United States Attorneys Kelly K. Rossi and Julie D. Garcia are representing the United States in this case.

    A criminal complaint merely contains allegations, and defendants are presumed innocent unless proven guilty in a court of law.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Eugene Man Pleads Guilty to Three Federal Hate Crimes for Defacing Synagogue

    Source: US FBI

    EUGENE, Ore.—A Eugene man pleaded guilty to three federal hate crimes today for intentionally defacing a Eugene synagogue on multiple occasions.

    Adam Edward Braun, 34, pleaded guilty to two counts of intentionally defacing a synagogue and one count of attempting to deface religious property because it was a place of religious worship for Jewish people.

    According to court documents, between September 2023 and January 2024, Braun intentionally defaced Temple Beth Israel, a Jewish synagogue in Eugene, by repeatedly targeting the synagogue with graffiti, some of which used antisemitic symbols and phrases. Braun’s pattern of behavior culminated in the early morning hours of January 14, 2024, when he traveled to Temple Beth Israel with a hammer and prepared to swing at the glass doors of the synagogue. Braun stopped when he saw he was being recorded by a surveillance camera, and then moved to a different area of the property and used spray paint to write “White Power” in large letters on the building’s exterior.

    On January 31, 2024, officers from the Eugene Police Department, with assistance from the FBI, executed a state search warrant on Braun’s Eugene residence. Investigators located multiple pieces of evidence connecting Braun to the attacks on Temple Beth Israel, along with several items and writings belonging to Braun that were consistent with antisemitic beliefs and biases.

    Braun was initially charged by criminal complaint on March 4, 2024. Later, on May 9, 2024, Braun was charged by criminal information with five counts of defacing and attempting to deface religious property because it was a place of religious worship for Jewish people.

    Braun faces a maximum sentence of one year in prison, a $100,000 fine, and one year of supervised release for each count. He will be sentenced on February 18, 2025, before U.S. District Court Judge Michael J. McShane.

    As part of the plea agreement, Braun has agreed to pay restitution in full to the victim.

    This case was investigated by the FBI with assistance from the Eugene Police Department. Gavin W. Bruce, Assistant U.S. Attorney for the District of Oregon, and Cameron A. Bell, Trial Attorney for the Civil Rights Division Criminal Section, are prosecuting the case.

    MIL Security OSI

  • MIL-OSI Security: Coos Bay Man Sentenced to 25 Years in Federal Prison for Sexually Exploiting a Minor

    Source: US FBI

    EUGENE, Ore.—A Coos Bay, Oregon man was sentenced to federal prison Wednesday for taking sexually explicit images of a minor.

    Willard Verdell Cowan, 61, was sentenced to 300 months in federal prison followed by a lifetime term of supervised release.

    According to court documents, beginning in early 2021, Cowan offered to talk with a minor who often suffered from panic attacks. Instead, he preyed on the victim’s vulnerability by providing alcohol and marijuana before sexually assaulting the victim. Cowan continued to sexually abuse the victim, at times recording the abuse and soliciting sexually explicit images from the minor, until he was arrested in March 2023.

    On February 16, 2023, a federal grand jury in Eugene returned a two-count indictment charging Cowan with sexually exploiting a child and distributing child pornography.

    On August 21, 2024, Cowan pleaded guilty to sexually exploiting a child.

    This case was investigated by the FBI and Coos County Sheriff’s Office. It was prosecuted by Jeffrey S. Sweet, Assistant U.S. Attorney for the District of Oregon, in coordination with the Coos County District Attorney’s Office.

    Anyone who has information about the physical or online exploitation of children are encouraged to call the FBI at 1-800-CALL-FBI (1-800-225-5324) or submit a tip online at tips.fbi.gov.

    The FBI CETF conducts sexual exploitation investigations, many of them undercover, in coordination with federal, state and local law enforcement agencies. CETF is committed to locating and arresting those who prey on children as well as recovering and assisting victims of sex trafficking and child exploitation.

    Federal law defines child pornography as any visual depiction of sexually explicit conduct involving a minor. It is important to remember child sexual abuse material depicts actual crimes being committed against children. Not only do these images and videos document the victims’ exploitation and abuse, but when shared across the internet, re-victimize and re-traumatize the child victims each time their abuse is viewed. To learn more, please visit the National Center for Missing & Exploited Children at www.missingkids.org.

    This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Justice Department to combat the growing epidemic of child sexual exploitation and abuse. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    MIL Security OSI

  • MIL-OSI Security: Arizona Man Pleads Guilty to Child Exploitation Offenses in Connection with Catfishing Scheme That Targeted Young Boys

    Source: US FBI

    PHILADELPHIA – United States Attorney David Metcalf announced that Donald Michael, aka “Baseball Fun,” 47, of Queen Creek, Arizona, entered a plea of guilty before United States District Court Judge Mark A. Kearney yesterday to multiple child pornography offenses.

    Michael was charged by indictment in July of last year with one count of conspiracy to manufacture child pornography, one count of conspiracy to receive and distribute child pornography, one count of distribution and attempted distribution of child pornography, and two counts of receipt of child pornography. He pleaded guilty to all the charges against him.

    The defendant, who served as a baseball coach of minor boys for more than 20 years, engaged in an online child exploitation catfishing scheme for more than 18 months with co-conspirators Andrew Wolf, a former teacher at Springside Chestnut Hill Academy (SCH), and Kray Strange, of Carthage, New York, both of whom were previously convicted and sentenced.

    Michael conspired with Wolf and Strange to target minor boys who were Wolf’s current and former students at SCH and to coerce and induce them to produce sexually explicit images and send them to the defendant and his co-conspirators over the internet. They did so by creating multiple fake online profiles where they pretended to be teenaged girls, engaging each of their victims in sexually explicit and graphic chats, and distributing child pornography to the minor boys, in an effort to get them to reciprocate with their own images.

    When the boys refused to continue to engage, Michael and his co-conspirators used blackmail and extortion to manipulate them into continuing to produce images. After Wolf and Strange were arrested and incarcerated, this defendant continued his catfishing scheme by targeting and victimizing minor boys who were Little League World Series players.

    The defendant is scheduled to be sentenced on August 14 and faces a mandatory minimum term of 15 years’ imprisonment and five years of supervised release, and a maximum possible term of 110 years’ imprisonment and lifetime supervised release. He will also be required to register as a child sex offender under both state and federal law. 

    “Donald Michael and his co-conspirators strategized at length about how to ‘bait’ young boys into taking and sending explicit images of themselves,” said U.S. Attorney Metcalf. “They reveled in the anonymity that the internet provided them to target and catfish their young victims. Unmasking these predators is a priority for my office and the FBI, as we work to protect children everywhere from sexual exploitation.”

    “The sexual exploitation of children remains one of the most devious crimes the men and women of the FBI investigate,” said Wayne A. Jacobs, Special Agent in Charge of FBI Philadelphia. “This serves as a reminder how seriously the FBI and our partners take the online victimization of minors. We will continue to work tirelessly to protect children from abuse and exploitation, and that ensure that those who harm them will be held accountable.”

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by United States Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend, and prosecute individuals who exploit children via the internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit projectsafechildhood.gov.

    The case was investigated by the FBI and is being prosecuted by Assistant United States Attorneys Kelly Harrell and Michelle Rotella.

    MIL Security OSI

  • MIL-OSI Security: Former CIA Analyst Pleads Guilty to Transmitting Top Secret National Defense Information

    Source: US FBI

    A former CIA analyst pleaded guilty today to retaining and transmitting Top Secret National Defense Information to people who were not entitled to receive it, information which was publicly posted on a social media platform in October 2024.

    According to court documents, Asif William Rahman, 34, of Vienna, was an employee of the CIA since 2016 and had a Top-Secret security clearance with access to Sensitive Compartmented Information (SCI).

    “Mr. Rahman betrayed the trust of the American people by unlawfully sharing classified national defense information he swore an oath to protect,” said Assistant Attorney General Matthew G. Olsen of the Justice Department’s National Security Division. “Today’s guilty plea demonstrates that the Justice Department will spare no effort to swiftly find and aggressively prosecute those who harm the United States by illegally disclosing our national security secrets.”

    “Asif Rahman is pleading guilty in federal court three months to the day that he disclosed top secret American documents in violation of his oath, his responsibility, and the law,” said U.S. Attorney Jessica D. Aber for the Eastern District of Virginia. “This District, in partnership with federal law enforcement and the intelligence community, exemplified dedication, skill, and speed to bring him to justice expeditiously. Mr. Rahman’s actions placed lives at risk, undermined U.S. foreign relations, and compromised our ability to collect vital intelligence in the future.”

    “With today’s plea, Asif Rahman acknowledges he betrayed the trust of his country by sharing classified information in spite of the risk to the United States and our allies,” said Executive Assistant Director Robert Wells of the FBI’s National Security Branch. “Government employees who are granted security clearances and given access to our nation’s classified information must promise to protect it. Rahman blatantly violated that pledge and took multiple steps to hide his actions. The FBI will use all our resources to investigate and hold accountable those who illegally transmit classified information and endanger the national security interests of our country.”

    “Today’s plea demonstrates the FBI’s resolve to deploy the necessary tools and authorities to identify, locate, and bring to justice a government clearance holder who violated the oath he took to support and defend the U.S. Constitution,” said Assistant Director David Sundberg of the FBI Washington Field Office. “This is a good reminder to all clearance holders that the FBI and our Intelligence Community partners will spare no resource to immediately find and hold accountable those who violate the law and disclose classified information without authorization, no matter where in the world they are located.”

    According to court documents, on Oct. 17, 2024, Rahman accessed and printed two Top Secret documents containing National Defense Information regarding a U.S. foreign ally and its planned actions against a foreign adversary. Rahman removed the documents, photographed them, and transmitted them to individuals he knew were not entitled to receive them. By Oct. 18, 2024, the documents appeared publicly on multiple social media platforms, complete with the classification markings.

    After Oct. 17, 2024, Rahman deleted and edited journal entries and written work product on his personal electronic devices to conceal his personal opinions on U.S. policy and drafted entries to construct a false narrative regarding his activity. Rahman also destroyed multiple electronic devices, including a personal mobile device and an internet router he used to transmit classified information and photographs of classified documents, and discarded the destroyed devices in public trash receptacles in an effort to thwart potential investigations into him and his unlawful conduct.

    Beginning in the spring of 2024 and continuing through November 2024, Rahman repeatedly accessed and printed classified National Defense Information, including documents classified up to the Top Secret level, to take them to his residence. There, Rahman reproduced the documents and, while doing so, altered them in an effort to conceal their source and his activity. Rahman then communicated Top Secret information that he learned in the course of his employment to multiple individuals he knew were not entitled to receive it.

    Rahman was indicted by a grand jury on Nov. 7, 2024, and was arrested by the FBI as he arrived to work on Nov. 12, 2024. He has remained in custody since his arrest.

    Rahman pleaded guilty to two counts of willful retention and transmission of classified information related to the national defense. He is scheduled to be sentenced on May 15, 2025. He faces a maximum penalty of 10 years in prison for both counts in the plea agreement. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    The FBI Washington Field Office is investigating the case.

    Assistant U.S. Attorney Troy A. Edwards Jr. for the Eastern District of Virginia and Trial Attorney Brett Reynolds of the National Security Division’s Counterintelligence and Export Control Section are prosecuting the case.

    MIL Security OSI

  • MIL-OSI Security: David K. Porter Named Special Agent in Charge of the Honolulu Field Office

    Source: US FBI

    Director Christopher Wray has named David K. Porter as the special agent in charge of the Honolulu Field Office. Mr. Porter most recently served as the chief of staff for the Deputy Director at FBI Headquarters in Washington, D.C.

    Mr. Porter began his career with the FBI as a special agent in 2006, initially assigned to the Pittsburgh Field Office Joint Terrorism Task Force. In 2010, Mr. Porter transferred to the Detroit Field Office, where he investigated counterterrorism matters. In addition to his work as a special agent in the Pittsburgh and Detroit Field Offices, Mr. Porter also served as an operator on the FBI Pittsburgh and Detroit SWAT Teams.

    In 2013, Mr. Porter was promoted to associate division counsel in the Detroit Field Office and later promoted to supervisory special agent of the Public Corruption and Civil Rights programs in 2015.

    Mr. Porter was selected as an assistant section chief to the Cyber Division at FBI Headquarters in 2019. He was detailed full-time to the Counterintelligence Division’s Foreign Influence Task Force, where he led investigative operations, intelligence production, and interagency policy engagement with the National Security Council.

    Mr. Porter returned to Detroit in May 2021 as the crisis response supervisory special agent. In July 2021, he was then selected as an assistant special agent in charge of the Detroit Field Office, with operational responsibility for the Western District of Michigan and oversight of six resident agencies spanning 49 counties.

    Immediately prior to joining the FBI, Mr. Porter served as counsel for the U.S. Senate Committee on Homeland Security and Governmental Affairs. He also has previous experience practicing law as a corporate litigation attorney, and he served as a high school history teacher. Mr. Porter earned bachelor’s degrees in American history and literature from Calvin University and a juris doctor degree from the University of Michigan Law School.

    MIL Security OSI

  • MIL-OSI Security: FBI Sacramento Celebrates 2024 Graduates of the FBI National Academy

    Source: US FBI

    Did you know that the Federal Bureau of Investigation (FBI) began providing standardized, professional training to law enforcement professionals in 1935? Since its founding, the FBI National Academy has trained 55,797 law enforcement professionals from across the globe. This training aims to enhance the administration of justice in police departments and agencies both domestically and abroad, raising law enforcement standards, knowledge, and cooperation worldwide.

    The FBI Sacramento Field Office referred 16 law enforcement professionals to this program in 2024. They represent law enforcement agencies based within the 34-county region the FBI Sacramento Field Office serves. FBI National Academy graduates in 2024 include:

    • Deputy Division Chief Luke Blehm
      California Alcoholic Beverage Control
    • Captain Andrew Beasley
      California Highway Patrol
    • Lieutenant Noah Hawkins
      California Highway Patrol
    • Captain Anthony Horner
      California Highway Patrol
    • Lieutenant Lou Wright
      Folsom Police Department
    • Captain Brandon Pursell, Jr.
      Fresno County Sheriff’s Office
    • Lieutenant Jerardo “Charlie” Chamalbide
      Fresno Police Department.
    • Chief Deputy Erik Levig
      Kern County Sheriff’s Office
    • Captain Ray Reyna
      Modesto Police Department
    • Chief Brandon Gillespie
      Modesto Police Department
    • Chief Investigator Mary Green
      Placer County District Attorney’s Office
    • Lieutenant Mark Lopez
      Sacramento County Sheriff’s Office
    • Captain Vance Chandler
      Sacramento Police Department
    • Chief Rudolfo Alcaraz
      Selma Police Department
    • Lieutenant Craig Collins
      Solano County Sheriff’s Office
    • Octavio Lopez
      Tracy Police Department.

    Following graduation, each officer may join the FBI National Academy Associates, Inc., a dynamic organization of more than 14,000 law enforcement professionals who continue improving the level of competency, cooperation, and integrity among the global law enforcement community.

    Courses during the rigorous, 10-week program include intelligence theory, terrorism and terrorist mindsets, management science, law, behavioral science, law enforcement communication, and forensic science. Students and their respective law enforcement agencies receive tuition, books, equipment, meals, lodging, or travel to and from the training facility at no cost.

    The FBI National Academy program was originally launched as the “FBI Police Training School” in response to the 1930 Wickersham Commission report recommending standardization and professionalization of law enforcement in the United States through centralized training. At the time, courses included scientific aids in crime detection, preparation of reports, and criminal investigation techniques as well as administration and organization. To learn more about the FBI National Academy, visit https://www.fbi.gov/services/training-academy/national-academy.

    MIL Security OSI

  • MIL-OSI Security: Man Sentenced to 40 Months for Participating in International Money Laundering Scheme Involving More Than $3 Million in Fraud Proceeds

    Source: US FBI

    NEWS RELEASE SUMMARY – September 9, 2024

    SAN DIEGO – Juan Pablo Prada Bernal of Colombia was sentenced in federal court today to 40 months in prison for participating in an international money laundering conspiracy involving more than $3 million in proceeds obtained through phone scams.

    At today’s hearing, U.S. District Court Judge Andrew G. Schopler also ordered Bernal to pay $327,040.72 in restitution to 27 victims of the offense.

    According to his plea agreement, between June 2018 and March 2020, Bernal was a member of an international conspiracy that laundered large amounts of money. The conspiracy involved two sides: Those responsible for contacting victims by phone and tricking them into sending thousands of dollars to U.S.-based bank accounts, and those responsible for laundering the proceeds through those bank accounts. The money launderers received and transferred the ill-gotten gains to their co-conspirators in Colombia and the United States, and in the process concealed the nature, source, location, ownership and control of the proceeds.

    The money launderers opened bank accounts at various financial institutions using false mailing addresses. Shortly after the accounts were opened, the phone scammers – many of whom lived in Colombia – made unsolicited phone calls to victims in the United States using spoofed phone numbers. This allowed callers to conceal their identity and make it appear as if the calls originated from locations in the United States, such as a police station where the victim lived or had lived in the past.

    During calls with victims, the scammers impersonated federal and local law enforcement officers and made the victims believe they were implicated in a crime. Using this as leverage, the conspirators coerced victims to make large wire transfers or other payments to purportedly resolve their criminal liability. The scammers instructed victims to wire funds to the various bank accounts opened by the money launderers. Once the money was deposited into the accounts, the money launderers quickly moved to withdraw the funds, purchase cashier’s checks to send to other conspirators, and drain the balance of the accounts before the funds could be frozen.

    According to the United States’ sentencing memorandum, Bernal opened bank accounts at 10 different financial institutions to carry out the money laundering scheme. In many instances, Bernal received the fraud proceeds shortly after he opened the bank accounts and drained the balance of the accounts in a matter of days. After banks stopped allowing Bernal to open new accounts, he began to receive and launder cashier’s checks sent from his co-conspirators that were purchased with fraud proceeds obtained from other victims. To carry out this new role, Bernal and his co-conspirators traveled to multiple Moneytree locations in the same day for the purpose of laundering large amounts of fraud proceeds over a short period of time.

    Over the course of approximately two years, Bernal received and laundered fraud proceeds more than 30 times from 27 different victims, including varying amounts of cashier’s checks from 14 of his co-conspirators, totaling an amount of $327,040.72.

    “These scammers are sophisticated and will prey on emotion and fear,” said U.S. Attorney Tara McGrath. “This defendant turned deceit into profit, so we turned his profit into a conviction.”

    “FBI Los Angeles works closely with our law enforcement partners to combat money laundering in our communities. Mr. Bernal’s sentence should serve as a deterrent to those who seek to prey on innocent victims” said Akil Davis, Assistant Director in Charge of the FBI Los Angeles Field Office. “The FBI reminds the public to be vigilant and never send money, gift cards, or share personal identifying information with a caller and to verify that the caller is a legitimate business or organization. The public is urged to report these calls to 1-800-CALL-FBI or tips.fbi.gov.”

    “The U.S. Border Patrol is an all-threats agency, and we will continue to work with our law enforcement partners to protect our citizens from any and all threats,” said Chief Patrol Agent Patricia McGurk-Daniel. “I couldn’t be prouder of the work done by these agents to secure a significant and successful prosecution.”

    This case is the result of ongoing efforts by the Organized Crime Drug Enforcement Task Force (OCDETF), a partnership that brings together the combined expertise and unique abilities of federal, state and local law enforcement agencies. The principal mission of the OCDETF program is to identify, disrupt, dismantle and prosecute high-level members of drug trafficking, weapons trafficking and money laundering organizations and enterprises.

    This case is being prosecuted by Assistant U.S. Attorney Patrick C. Swan.

    DEFENDANT                                   Case Number             23-cr-1483-AGS

    Juan Pablo Prada Bernal                     Age: 24                       Columbia

    SUMMARY OF CHARGES

    Money Laundering Conspiracy – Title 18, U.S.C., Section 1956(h)

    Maximum Penalties: Twenty years in prison and a $250,000 fine or twice the value of the property involved in the transaction

    INVESTIGATING AGENCIES

    U.S. Department of Homeland Security

    U.S. Customs and Border Protection

    U.S. Border Patrol

    Federal Bureau of Investigation

    Organized Crime Drug Enforcement Task Force

    U.S. Secret Service

    MIL Security OSI

  • MIL-OSI Security: FBI San Diego Seizes Cryptocurrency Recovery Websites

    Source: US FBI

    SAN DIEGO — Special Agents with the FBI San Diego Field Office have seized websites belonging to three cryptocurrency recovery services. The seizures come as the FBI continues to crack down on an emerging scam tactic aimed at further defrauding cryptocurrency scam victims.

    The web domains were from the following cryptocurrency recovery services: MyChargeBack, Payback LTD, and Claim Justice. These companies claim to provide cryptocurrency tracing and promise the ability to recover lost funds. Representatives of these companies often advertise strong success in recovering victim funds but have no track record in doing so. They often charge significant upfront fees and ask for a commission should funds be recovered. These companies use extensive social media advertising, including false reviews, to convince victims of the legitimacy of their services.

    Potential ways to identify this type of scheme:

    • Recovery scheme fraudsters charge an up-front fee and either cease communication with the victim after receiving an initial deposit or produce an incomplete or inaccurate tracing report. They may also request additional fees to recover funds.
    • Fraudsters may claim affiliation with law enforcement or legal services to appear legitimate.
    • Scammers may reference actual financial institutions and money exchanges to build credibility and further their schemes.

    Tips to avoid becoming a victim:

    • Be wary of advertisements for cryptocurrency recovery services. Research the advertised company and beware if the company uses vague language, has a minimal online presence, and makes promises regarding an ability to recover funds.
    • If an unknown individual contacts you and claims to be able to recover stolen cryptocurrency, do not release any financial or personal identifying information, and do not send money.
    • Law enforcement does not charge victims a fee for investigating crimes. If someone claims an affiliation with the FBI, contact the FBI San Diego Field Office at 858-320-1800 to confirm.

    Individuals who believe they may have been a victim of this type of scheme should file a report with the FBI’s Internet Crime Complaint Center at ic3.gov.

    MIL Security OSI

  • MIL-OSI Security: Court-Authorized Operation Disrupts Worldwide Botnet Used by People’s Republic of China State-Sponsored Hackers

    Source: US FBI

    Note: View the affidavit here.

    The Justice Department today announced a court-authorized law enforcement operation that disrupted a botnet consisting of more than 200,000 consumer devices in the United States and worldwide. As described in court documents unsealed in the Western District of Pennsylvania, the botnet devices were infected by People’s Republic of China (PRC) state-sponsored hackers working for Integrity Technology Group, a company based in Beijing, and known to the private sector as “Flax Typhoon.”

    The botnet malware infected numerous types of consumer devices, including small-office/home-office (SOHO) routers, internet protocol (IP) cameras, digital video recorders (DVRs), and network-attached storage (NAS) devices. The malware connected these thousands of infected devices into a botnet, controlled by Integrity Technology Group, which was used to conduct malicious cyber activity disguised as routine internet traffic from the infected consumer devices. The court-authorized operation took control of the hackers’ computer infrastructure and, among other steps, sent disabling commands through that infrastructure to the malware on the infected devices. During the course of the operation, there was an attempt to interfere with the FBI’s remediation efforts through a distributed denial-of-service (DDoS) attack targeting the operational infrastructure that the FBI was utilizing to effectuate the court’s orders. That attack was ultimately unsuccessful in preventing the FBI’s disruption of the botnet.

    “The Justice Department is zeroing in on the Chinese government backed hacking groups that target the devices of innocent Americans and pose a serious threat to our national security,” said Attorney General Merrick B. Garland. “As we did earlier this year, the Justice Department has again destroyed a botnet used by PRC-backed hackers to infiltrate consumer devices here in the United States and around the world. We will continue to aggressively counter the threat that China’s state- sponsored hacking groups pose to the American people.”

    “Our takedown of this state-sponsored botnet reflects the Department’s all-tools approach to disrupting cyber criminals. This network, managed by a PRC government contractor, hijacked hundreds of thousands of private routers, cameras, and other consumer devices to create a malicious system for the PRC to exploit,” said Deputy Attorney General Lisa Monaco. “Today should serve as a warning to cybercriminals preying on Americans – if you continue to come for us, we will come for you.”

    “This dynamic operation demonstrates, once again, the Justice Department’s resolve in countering the threats posed by PRC state-sponsored hackers,” said Assistant Attorney General Matthew G. Olsen of the National Security Division. “For the second time this year, we have disrupted a botnet used by PRC proxies to conceal their efforts to hack into networks in the U.S. and around the world to steal information and hold our infrastructure at risk. Our message to these hackers is clear: if you build it, we will bust it.”

    “The disruption of this worldwide botnet is part of the FBI’s commitment to using technical operations to help protect victims, expose publicly the scope of these criminal hacking campaigns, and to use the adversary’s tools against them to remove malicious infrastructure from the virtual battlefield,” said FBI Deputy Director Paul Abbate. “The FBI’s unique legal authorities allowed it to lead an international operation with partners that collectively disconnected this botnet from its China-based hackers at Integrity Technology Group.”

    “The targeted hacking of hundreds of thousands of innocent victims in the United States and around the world shows the breadth and aggressiveness of PRC state-sponsored hackers,” said U.S. Attorney Eric G. Olshan for the Western District of Pennsylvania. “This court-authorized operation disrupted a sophisticated botnet designed to steal sensitive information and launch disruptive cyber attacks. We will continue to work with our partners inside and outside government, using every tool at our disposal, to defend and maintain global cybersecurity.”

    “The FBI’s investigation revealed that a publicly-traded, China-based company is openly selling its customers the ability to hack into and control thousands of consumer devices worldwide. This operation sends a clear message to the PRC that the United States will not tolerate this shameless criminal conduct,” said Special Agent in Charge Stacey Moy of the FBI San Diego Field Office.

    According to the court documents, the botnet was developed and controlled by Integrity Technology Group, a publicly-traded company headquartered in Beijing. The company built an online application allowing its customers to log in and control specified infected victim devices, including with a menu of malicious cyber commands using a tool called “vulnerability-arsenal.” The online application was prominently labelled “KRLab,” one of the main public brands used by Integrity Technology Group.

    The FBI assesses that Integrity Technology Group, in addition to developing and controlling the botnet, is responsible for computer intrusion activities attributed to China-based hackers known by the private sector as “Flax Typhoon.” Microsoft Threat Intelligence described Flax Typhoon as nation-state actors based out of China, active since 2021, who have targeted government agencies and education, critical manufacturing, and information technology organizations in Taiwan, and elsewhere. The FBI’s investigation has corroborated Microsoft’s conclusions, finding that Flax Typhoon has successfully attacked multiple U.S. and foreign corporations, universities, government agencies, telecommunications providers, and media organizations.

    A cybersecurity advisory describing Integrity Technology Group tactics, techniques and procedures was also published today by the FBI, the National Security Agency, U.S. Cyber Command’s Cyber National Mission Force, and partner agencies in Australia, Canada, New Zealand and the United Kingdom. 

    The government’s malware disabling commands, which interacted with the malware’s native functionality, were extensively tested prior to the operation. As expected, the operation did not affect the legitimate functions of, or collect content information from, the infected devices. The FBI is providing notice to U.S. owners of devices that were affected by this court-authorized operation. The FBI is contacting those victims through their internet service provider, who will provide notice to their customers.

    The FBI’s San Diego Field Office and Cyber Division, the U.S. Attorney’s Office for the Western District of Pennsylvania, and the National Security Cyber Section of the Justice Department’s National Security Division led the domestic disruption effort. Assistance was also provided by the Criminal Division’s Computer Crime and Intellectual Property Section. These efforts would not have been successful without the collaboration of partners, including French authorities, and Lumen Technologies’ threat intelligence group, Black Lotus Labs, which first identified and described this botnet, which it named Raptor Train, in July 2023.

    If you believe you have a compromised computer or device, please visit the FBI’s Internet Crime Complaint Center (IC3) or report online to CISA. You may also contact your local FBI field office directly.

    The FBI continues to investigate Integrity Technology Group’s and Flax Typhoon’s computer intrusion activities.

    MIL Security OSI

  • MIL-OSI Security: North Dakota Man Sentenced to 25 Years in Federal Prison for Distribution of a Controlled Substance Resulting in Death

    Source: Office of United States Attorneys

    PIERRE – United States Attorney Alison J. Ramsdell announced today that U.S. District Judge Charles B. Kornmann has sentenced a Mandan, North Dakota, man convicted of Distribution of a Controlled Substance Resulting in Death. The sentencing took place on May 19, 2025.

    Carlin Mellette, age 29, was sentenced to 25 years in federal prison, followed by five years of supervised release, and ordered to forfeit the firearm, pay a $1,000 fine, and pay a $100 special assessment to the Federal Crime Victims Fund.

    Mellette was indicted by a federal grand jury in August 2023. He pleaded guilty on September 30, 2024.

    This conviction stemmed from events that occurred during the early morning hours of February 26, 2023, when the victim and friends were socializing with a co-defendant and others at a residence in Aberdeen, South Dakota. Mellette arrived at the residence and provided the co-defendant with three pills containing fentanyl. The co-defendant took the pills inside the residence where the pills were then ingested by the co-defendant and the victim, who ingested only half of a pill, resulting in the fentanyl overdose death of the victim. Later that day, Walworth County Sheriff’s deputies attempted to conduct an unrelated traffic stop of Mellette’s vehicle for speeding in an area west of Aberdeen. Mellette led law enforcement on a 26-mile pursuit with speeds in excess of 100 mph. Mellette was apprehended after getting his vehicle stuck in a snowbank. A search of his vehicle revealed 99 grams of methamphetamine, additional fentanyl pills, drug ledgers, scales, other drug paraphernalia, and a Ruger .45 caliber pistol.

    This case was investigated by the FBI Northern Plains Safe Trails Drug Enforcement Task Force, the Aberdeen Police Department, the Walworth County Sheriff’s Office, the Campbell County Sheriff’s Office, the Corson County Sheriff’s Office, the Potter County Sheriff’s Office, and the Gettysburg Police Department. Assistant U.S. Attorney Meghan Dilges prosecuted the case.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.

    Mellette was immediately remanded to the custody of the U.S. Marshals Service. 

    MIL Security OSI

  • MIL-OSI Security: Watertown Man Found Guilty of Aggravated Sexual Abuse and Sexual Abuse of a Minor within the Lake Traverse Reservation

    Source: Office of United States Attorneys

    ABERDEEN – United States Attorney Alison J. Ramsdell announced that a jury has convicted Gokoh Frank Brown, age 29, from Watertown, South Dakota, of one count of Aggravated Sexual Abuse by Force and one count of Sexual Abuse of a Minor following a two-day jury trial in federal district court in Aberdeen, South Dakota. The verdict was returned on May 21, 2025.

    The charges carry a maximum penalty of life in federal prison and/or a $250,000 fine, and up to a lifetime term of supervised release.

    Brown was indicted by a federal grand jury in August 2024. 

    From January 2023 to August 2023, Brown sexually assaulted a 12–13-year-old girl while living in Red Iron Housing on the Lake Traverse Reservation. Brown was 26-27 years old at the time.

    This case was investigated by the FBI, Sisseton-Wahpeton Oyate Law Enforcement, and the DCI. Assistant U.S. Attorney Elizabeth Ebert-Webb prosecuted the case.

    A presentence investigation was ordered, and a sentencing date has been set for August 18, 2025. The defendant was remanded to the custody of the U.S. Marshals Service. 

    MIL Security OSI

  • MIL-OSI Security: Brooklyn Center Woman Pleads Guilty for Her Role in a Black-Market Travel Agent Fraud Scheme

    Source: Office of United States Attorneys

    MINNEAPOLIS – Reginae Calhoun of Brooklyn Center, Minnesota has pleaded guilty to access device fraud and aggravated identify theft, announced Acting U.S. Attorney Lisa D. Kirkpatrick.

    According to court documents, from at least April 2024 to June 2024, Reginae Calhoun, 23, operated as a black-market travel agent.  She  purchased credit card information—including name, address, card numbers, expiration date, and CV2 code—of approximately 216 different victims on the dark web, which she used to book hotel rooms and rental cars for others.  Calhoun’s customers paid her a fraction of the actual booking costs through peer-to-peer payment applications or in cash.

    According to court documents, on June 2, 2024, Calhoun attempted to purchase airline tickets by using several different credit cards until the purchase was successful.  Due to the several attempts, the airline reported suspected credit card fraud to the airport police.  Airport police confirmed with the credit card owners that Calhoun was not authorized to use their cards.

    “The ingenuity of Minnesota’s fraudsters seems to know no bounds,” said Acting U.S. Attorney Lisa D. Kirkpatrick.  “Calhoun stole hundreds of victim identities and used them to conduct a black-market travel agent fraud scheme—stealing from others to enrich herself. She will now be held accountable in federal court.”     

    “Criminals who turn to the dark web to buy and sell stolen information are part of a growing threat to our digital security,” said Special Agent in Charge Alvin M. Winston Sr. of FBI Minneapolis. “This defendant built a business by exploiting the stolen identities and financial information of over 200 of innocent victims. The anonymity of the internet does not protect offenders from detection. The FBI and our partners will continue to find and expose these schemes and hold offenders accountable.”

    Calhoun pleaded guilty on May 19, 2025, in U.S. District Court before Judge John R. Tunheim to one count of access device fraud and one count of aggravated identity theft.

    This case is the result of an investigation conducted by the FBI and the MSP Airport Police Department.

    Assistant U.S. Attorney Matthew C. Murphy prosecuted the case.

    MIL Security OSI

  • MIL-OSI Security: Minneapolis Woman Sentenced to 51 Months in Prison for Role in Feeding Our Future $250 Million Fraud Scheme

    Source: Office of United States Attorneys

    MINNEAPOLIS – Sahra Nur of Minneapolis has been sentenced to 51 months in prison followed by 2 years of supervised release for her role in a $250 million fraud scheme that exploited a federally funded child nutrition program during the COVID-19 pandemic, announced Acting U.S. Attorney Lisa D. Kirkpatrick. Nur was also ordered to pay restitution in the amount of $5,000,240.

    According to court documents, from December 2020 through January 2022, Sahra Mohamed Nur, 63, knowingly and willfully conspired with others in a fraudulent scheme to obtain and misappropriate millions in federal child nutrition funds. As the owner and operator of S & S Catering Inc., Nur initially enrolled in the Federal Child Nutrition Program as a food distribution site under the sponsorship of Feeding Our Future. As the fraud scheme progressed, S & S Catering operated as a vendor for other food distribution sites affiliated with Feeding Our Future.

    Between September 2020 and April 2021, Nur claimed to have served over 1.2 million meals to children from S & S Catering alone. Between December 2020 and December 2021, sites who used S & S Catering as a vendor reported serving more than eight million meals through the food program. Based on their fraudulent claims, S & S Catering received more than $10 million in payment from these companies they purportedly served food to, and over $16 million in reimbursements from Feeding Our Future. Rather feed children during the pandemic, Nur misappropriated the funds for her own personal benefit, such as commercial real estate.

    Nur was one of eight defendants charged in a 23-count indictment in September 2022. On September 7, 2023, Nur pleaded guilty to one count of wire fraud and one count of money laundering. She was sentenced today in U.S. District Court by Judge Nancy E. Brasel.  In imposing sentence, Judge Brasel called the loss amount “staggering” and explained that “public trust in government programs has significant decreased” as a result of the defendant’s fraud.  Judge Brasel noted that it was “tragic” how the fraud scheme has damaged the reputation of Somali-American community.

    The case is the result of an investigation by the FBI, IRS – Criminal Investigations, and the U.S. Postal Inspection Service.

    Assistant U.S. Attorneys for the District of Minnesota Joseph H. Thompson, Harry M. Jacobs, Matthew S. Ebert, and Daniel W. Bobier prosecuted the case. Assistant U.S. Attorney Craig Baune is handling the seizure and forfeiture of assets.

    MIL Security OSI

  • MIL-OSI Security: Two Charged in $227M Medicare Fraud Scheme

    Source: United States Attorneys General 13

    WASHINGTON — An Illinois man and a foreign national were arrested yesterday on criminal charges related to their alleged submission of more than $227 million in fraudulent claims to Medicare.

    According to court documents, Syed Murtuza Kablazada, 34, of Arlington Heights, and Syed Mehdi Hussain, 32, of Carol Stream, owned and operated purported medical laboratories that submitted fraudulent claims to Medicare for the reimbursement of over-the-counter COVID-19 test kits allegedly provided to Medicare beneficiaries. The defendants allegedly installed foreign nationals to act as nominee owners at the laboratories to submit fraudulent claims to Medicare for the provision of over-the-counter COVID-19 test kits, with the understanding the nominee owners would flee the United States when they learned that their laboratory was under investigation.

    “As alleged, the defendants used straw owners at multiple laboratories to cause the submission of more than $200 million in fraudulent claims to Medicare for COVID-19 test kits,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “Health care fraud harms Americans by squandering taxpayer money and diverting limited resources from those who need them most. The Criminal Division will continue to aggressively prosecute these crimes to hold fraudsters accountable, protect victims, and recover financial losses.”

    “The overwhelming fraud uncovered in this investigation details a blatant disregard for America’s critical health care program, Medicare, and puts all patients at risk,” said Special Agent in Charge Douglas S. DePodesta of the FBI Chicago Field Office. “The FBI and our partners will not tolerate anyone who abuses the health care system for personal gain and will aggressively pursue justice on behalf of both patients and taxpayers.”

    As alleged in the indictment, the defendants rarely provided Covid-19 test kits to Medicare beneficiaries but instead submitted reimbursement claims on behalf of beneficiaries who had not requested COVID-19 test kits, including individuals who were deceased. Further, the defendants allegedly paid a marketing company to provide the names of hundreds of thousands of Medicare beneficiaries that the defendants used to submit fraudulent claims. In total, between September 2022 and June 2023, the defendants’ labs billed Medicare approximately $227 million in fraudulent claims, of which Medicare paid approximately $136 million in reimbursements.

    Kablazada and Hussain are both charged by indictment with four counts of health care fraud. If convicted, they face a maximum penalty of 10 years in prison on each of the four counts.

    The FBI Chicago Field Office and HHS-OIG are investigating the case.

    Trial Attorney Andres Q. Almendarez of the Criminal Division’s Fraud Section is prosecuting the case, with assistance from Assistant U.S. Attorney Jasmina Vajzovic for the Northern District of Illinois.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Force Program. Since March 2007, this program, currently comprised of 9 strike forces operating in 27 federal districts, has charged more than 5,800 defendants who collectively have billed federal health care programs and private insurers more than $30 billion. In addition, the Centers for Medicare & Medicaid Services, working in conjunction with the Office of the Inspector General for the Department of Health and Human Services, are taking steps to hold providers accountable for their involvement in health care fraud schemes. More information can be found at www.justice.gov/criminal-fraud/health-care-fraud-unit.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Economics: Influencers embrace Google’s Veo 3 as future of filmmaking, reveals GlobalData

    Source: GlobalData

    Influencers embrace Google’s Veo 3 as future of filmmaking, reveals GlobalData

    Posted in Business Fundamentals

    Google LLC has captured the attention of influencers on X, largely due to the launch of its innovative AI video generation model, Veo 3, in the third week of May 2025, during the Google I/O event. Influencers have pointed out how this technology makes it increasingly difficult to distinguish between real and AI-generated content, generating excitement about its potential applications. The buzz is further fueled by the integration of Veo 3 with other cutting-edge tools like Flow and Imagen 4, which can collectively enhance the creative process for filmmakers and content creators, reveals the Social Media Analytics Platform of GlobalData, a leading data and analytics company.

    Shreyasee Majumder, Social Media Analyst at GlobalData, comments: “The reactions from influencers predominantly reflect a strong sense of optimism regarding the implications of Veo 3’s capabilities. Many are excited about the transformative potential of AI in filmmaking, with predictions that traditional CGI may soon be replaced by AI-generated visuals in movies.

    “Influencers are particularly enthusiastic about how Veo 3 can enhance creativity and streamline the filmmaking process, allowing creators to produce high-quality content more efficiently. The integration of features like native audio generation and the collaborative tool Flow is seen as a game-changer for filmmakers and content creators, empowering them to explore new storytelling techniques.”

    Below are a few popular influencer opinions captured by GlobalData’s Social Media Analytics Platform:

    1. Shubham Saboo, Head of Developer Relations at Tenstorrent Inc:

    “Google Veo 3 literally generated this video with voiceover and sound from a single prompt.This is INSANE!! The AI FUTURE is here.”

    1. Bilawal Sidhu, TED Curator:

    “non-human intelligence comes in peace the dialogue, lip movement, environmental audio — all perfectly synced — all from one prompt what should i prompt with google veo 3 next?.”

    1. Derya Unutmaz, Professor at The Jackson Laboratory:

    “Veo 3 by @GeminiApp is incredible! It now supports both visuals and sound, this is another landmark advance in AI video! It can generate videos with sound effects, background noise and dialogue! Best of #GoogleIO so far, film making is revolutionized!”

    1. Ashish Rajan, Chief Information Security Officer at Kaizenteq:

    “I was gonna watch a movie this weekend… but now I might just make one. Google’s new AI Veo 3, can generate entire videos with music, people, dialogue, everything. (Play the Clip below) As a creator, this is wild. The game is changing fast. Could you tell this is not AI?”

    1. Haider, Technology Expert:

    “ngl, google “Veo 3” is more than crazy in the next 2 years, movies may use AI instead of traditional CGI for short scenes this could grow fast, which would lead to a big-budget film made almost fully with AI, though humans would still guide the process. AI could create thousands of hours of content before the final version is ready”

    MIL OSI Economics