Category: Technology

  • MIL-OSI Security: Registered sex offender charged federally with possession of images of child sexual abuse

    Source: Office of United States Attorneys

    State probation officers find defendant with unauthorized electronic devices allegedly containing child sexual abuse images

    Seattle A 34-year-old Kirkland, Washington man appeared on a federal criminal complaint today charging him with possession of images of child sexual abuse, announced Acting U.S. Attorney Teal Luthy Miller. Daniel Jose Lile was arrested April 16, 2025, by Department of Corrections Officers for possessing unapproved electronic devices. Lile remains detained at the Federal Detention Center (FDC) at SeaTac.

    According to the criminal complaint, Lile was on community supervision from the Washington State Department of Corrections for a 2019 conviction for child sexual abuse. Lile was arrested April 16, 2025, for having unauthorized electronic devices. On May 12, 2025, law enforcement served a search warrant at the residence Lile had shared with his girlfriend. At that location they seized additional unauthorized electronic devices including two external hard drives, a laptop, and a cellphone.

    Forensic analysis of the electronics is ongoing. One of the external hard drives was found to contain more than 130,000 files of child sexual abuse. One folder alone allegedly contains more than fifty videos and picture files of infants and toddlers being sexually abused.

    Law enforcement was in the process of pursuing a report from Google to the National Center for Missing and Exploited Children (NCMEC) about Lile uploading images of child sexual abuse when the Department of Corrections found the unapproved electronics.

    Possession of images of child sexual abuse is punishable by up to 20 years imprisonment and carries a mandatory minimum of ten years in this circumstance.

    The charges contained in the criminal complaint are only allegations.  A person is presumed innocent unless and until he or she is proven guilty beyond a reasonable doubt in a court of law.

    The case is being investigated by Homeland Security Investigations (HSI), the Washington State Department of Corrections and the Kirkland Police Department.

    The case is being prosecuted by Assistant United States Attorney Cecelia Gregson.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by United States Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    MIL Security OSI

  • MIL-OSI Security: Convicted Child Predator Sentenced To 16 Years In Federal Prison For Distributing Child Sexual Abuse Material

    Source: Office of United States Attorneys

    Offender Committed New Crime Less Than Three Months After Being Released From Prison for a Prior Child Exploitation Offense

    ASHEVILLE, N.C. – A previously-convicted child predator was sentenced to 192 months in prison today for distribution of child sexual abuse material (CSAM), announced Russ Ferguson, U.S. Attorney for the Western District of North Carolina. Justin Matthew Adkins, 40, of Marion, North Carolina, was also ordered to serve a lifetime of supervised release and to register as a sex offender after he is released from prison.

    According to records, Adkins was convicted of Second-Degree Exploitation of a Minor in Buncombe County and was sentenced to a term of imprisonment. Adkins was released from state custody in April 2023, and was placed on post-release supervision until 2028. On November 7, 2023, officers with the North Carolina Department of Adult Corrections, deputies with the McDowell County Sheriff’s Office, and deputy marshals with the U.S. Marshals Service conducted a probation search at Adkins’ home. During the search, law enforcement reviewed Adkins’s electronic devices for compliance with his post-release conditions and found that the defendant possessed CSAM. Law enforcement also seized narcotics and drug paraphernalia.

    Court records show that a computer forensic analyst with Homeland Security Investigations (HSI) analyzed Adkins’s electronic devices and located thousands of CSAM images and videos depicting the sexual abuse of prepubescent children. The analysis also revealed that Adkins had distributed CSAM to other individuals online.

    On December 18, 2024, Adkins pleaded guilty to distribution of child pornography. He is in federal custody and will be transferred to the custody of the Federal Bureau of Prisons upon designation of a federal facility.

    In making today’s announcement, U.S. Attorney Ferguson commended HSI in Greenville, the U.S. Marshals Service, the North Carolina Department of Adult Corrections, and the McDowell County Sheriff’s Office.

    Assistant United States Attorney Alexis Solheim of the U.S. Attorney’s Office in Asheville prosecuted the case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse, launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit https://www.justice.gov/psc.

     

     

     

     

     

     

    MIL Security OSI

  • MIL-OSI Security: Saratoga County Man Arrested and Charged with Sexual Exploitation of a Child

    Source: Office of United States Attorneys

    ALBANY, NEW YORK – Eric Mosier, age 37, of Galway, New York, made an initial appearance yesterday on a criminal complaint charging him with the sexual exploitation of a child.   United States Attorney John A. Sarcone III and Erin Keegan, Special Agent in Charge of the Homeland Security Investigations (HSI) Buffalo Field Office, made the announcement.

    According to the complaint, between on or about March 1, 2025 and May 17, 2025, Mosier used a 4-year-old child to engage in sexually explicit conduct for the purpose of creating child sexual abuse material. The charge in the complaint is merely an accusation. The defendant is presumed innocent unless and until proven guilty.

    United States Attorney John A. Sarcone III stated, “We are thankful for the quick response of the New York State Police and HSI, which led to the defendant’s arrest. As U.S. Attorney I will continue to do everything I can to keep our children safe from sexual predators and pedophiles.”

    HSI Special Agent in Charge Erin Keegan stated: “Through his alleged crimes, the defendant subjected this four-year-old victim to unimaginable exploitation and trauma. Our children deserve the right to be children, free from the awareness of the darkness that exists in our society. HSI Albany commits to working with our state and federal partners in our pursuit for justice on behalf of this victim.”

    Mosier initially appeared yesterday afternoon before United States Magistrate Daniel J. Stewart and was ordered detained pending trial.  If convicted, he faces at least 15 years and up to 30 years in prison, a fine of up to $250,000, and a supervised release term of at least 5 years and up to life.  Mosier may also be ordered to pay restitution to the victim of his offense and forfeit the device used in the offense.  A defendant’s sentence is imposed by a judge based on the particular statute the defendant is convicted of violating, the U.S. Sentencing Guidelines, and other factors.  If convicted, Mosier would also have to register as a sex offender upon his release from prison.

    HSI is investigating this case with assistance from the New York State Police and its Internet Crimes Against Children Task Force.  Assistant United States Attorneys Joseph Hartunian and Allen J. Vickey are prosecuting this case as part of Project Safe Childhood.

    Launched in May 2006 by the Department of Justice, Project Safe Childhood is led by United States Attorney’s offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), and is designed to marshal federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit https://www.justice.gov/psc

    MIL Security OSI

  • MIL-OSI Security: Cayuga County Man Sentenced to 12 Years for Possessing Child Pornography

    Source: Office of United States Attorneys

    SYRACUSE, NEW YORK – Andrew Wilbur, age 25, was sentenced today to 12 years’ incarceration for possessing child pornography. United States Attorney John A. Sarcone III and Craig L. Tremaroli, Special Agent in Charge of the Albany Field Office of the Federal Bureau of Investigation (FBI), made the announcement.

    As a part of his prior guilty plea, Wilbur, who previously served a state sentence for a 2019 child pornography conviction in Cayuga County Court, admitted that between January and May of 2024 he possessed child pornography images and videos depicting children as young as 4 years old being sexually abused.  Wilbur admitted that he maintained these files in both an online social communication platform, and on his cellular telephone.    

    In addition to the 12-year sentence, Wilbur was ordered to serve 15 years of supervised release following his term of incarceration, and to forfeit the cellular telephone he used to commit the offense. In addition, Wilbur will be required to continue to register as a sex offender.

    United States Attorney John A. Sarcone III stated, “This arrest continues to demonstrate my office’s close cooperation with our state and local partners to prosecute offenders to the fullest extent of the law, especially those who repeatedly victimize children.”

    FBI Special Agent in Charge Tremaroli said, “This sentence sends a clear message that our office will use every resource available to bring individuals who repeatedly victimize innocent children to justice. We remain committed to working with our law enforcement partners to protect our communities from these dangerous predators.”

    The FBI’s Child Exploitation and Human Trafficking Task Force investigated this case, which was initiated by the New York State Police, and the Cayuga County District Attorney’s Office. Assistant U.S. Attorney Lisa Fletcher, Project Safe Childhood Coordinator for the Northern District of New York, prosecuted the case. 

    Project Safe Childhood is a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse. Led by the U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit https://www.justice.gov/psc.

    MIL Security OSI

  • MIL-OSI Security: Shohini Sinha Named Assistant Director of the Victim Services Division

    Source: US FBI

    The Federal Bureau of Investigation has named Shohini Sinha as the assistant director of the Victim Services Division. Ms. Sinha most recently served as the special agent in charge of the Salt Lake City Field Office.

    Ms. Sinha joined the FBI as a special agent in 2001. She was first assigned to the Milwaukee Field Office, where she worked in counterterrorism investigations. She also served temporary assignments at the Guantanamo Bay Naval Base, the FBI Legal Attaché Office in London, and the Baghdad Operations Center.

    Ms. Sinha was promoted in 2009 to supervisory special agent and transferred to the Counterterrorism Division in Washington, D.C. She served as program manager of Canada-based extraterritorial investigations and facilitated liaison efforts with Washington-based Canadian liaison officers.

    In 2012, Ms. Sinha was promoted to assistant legal attaché in Ottawa, Canada, working counterterrorism matters in collaboration with the Royal Canadian Mounted Police and the Canadian Security Intelligence Service. In 2015, she was promoted to field supervisor in the Detroit Field Office, where she led squads responsible for investigating international terrorism matters.

    In early 2020, Ms. Sinha transferred to the Cyber Intrusion squad, which worked both national security and criminal cyber intrusion matters. Later in 2020, she was promoted to assistant special agent in charge for national security matters, and later criminal matters, in the Portland Field Office.

    Ms. Sinha was selected to serve as the executive special assistant to the director in 2021. She has been serving as the special agent in charge of the Salt Lake City Field Office since July of 2023.

    Prior to her employment with the FBI, Ms. Sinha worked as a therapist and later as an administrator for a private, not-for-profit clinic. She earned a bachelor’s degree in psychology and a master’s degree in mental health counseling from Purdue University in Indiana.

    MIL Security OSI

  • MIL-OSI Security: Two Eastern European Organized Crime Leaders Convicted of Murder for Hire Targeting U.S.-Based Journalist on Behalf of Iranian Government

    Source: US FBI

    Iranian Government Hired Polad Omarov and Rafat Amirov to Kill Masih Alinejad in Exchange for $500,000

    A federal jury returned guilty verdicts yesterday on all five counts in the superseding indictment against Rafat Amirov, also known as Farkhaddin Mirzoev, Pᴎᴍ, and Rome, 46, of Iran; and Polad Omarov, also known as Araz Aliyev, Polad Qaqa, and Haci Qaqa, 40, of Georgia. The defendants were convicted of murder-for-hire and attempted murder in aid of racketeering charges, in a trial before U.S. District Judge Colleen McMahon. Amirov and Omarov are scheduled to be sentenced on Sept. 17.

    “The Iranian regime’s brazen plot to silence and murder Americans will not be tolerated,” said Sue J. Bai, head of the Justice Department’s National Security Division. “This verdict underscores the Department’s commitment to finding and holding accountable those who threaten our citizens and our freedoms. With the great work of our prosecutors and law enforcement partners, we are now one step closer to justice.”

    “For years, the Government of Iran has attempted to silence an outspoken Iranian journalist, author, activist and critic of their regime through any means necessary, including harassment, violence, intimidation, and even attempted murder,” said Acting U.S. Attorney Matthew Podolsky for the Southern District of New York. “Chillingly, the plot to murder this Iranian dissident culminated over 6,000 miles from Iran, on U.S. soil, right here in New York, when a hitman with an AK-47 camped outside her home to kill her. I commend the career prosecutors of this office, and our law enforcement partners at the FBI’s Counterintelligence Division for their tireless work in bringing these defendants to justice. This verdict should send a clear message around the world: if you target U.S. citizens, we will find you, no matter where you are, and bring you to justice.”

    “The defendants participated in a brazen plot to kill an Iranian American dissident in New York who criticized the regime in Iran,” said Acting Assistant Director Roman Rozhavsky of the FBI’s Counterintelligence Division. “Thanks to the good work of the FBI and our partners their plan failed. This verdict demonstrates the FBI will not tolerate Iran’s attempts to threaten, silence, or harm American citizens.”

    According to court documents, Amirov and Omarov were high-ranking members of an Eastern European organized crime group (the Organization) who worked with other members of the Organization to attempt to kill Masih Alinejad on instructions from high-ranking members of the Islamic Revolutionary Guard Corps (IRGC). Alinejad has previously been the target of plots by the Government of Iran to intimidate, harass, and kidnap her for her work as a journalist, author, and human rights activist who has publicized the Government of Iran’s human rights abuses around the world. As recently as 2020 and 2021, Iranian intelligence officials and assets plotted to kidnap Alinejad from within the U.S. for rendition to Iran in an effort to silence her criticism of the Iranian regime.

    After these brazen efforts to kidnap Alinejad from the U.S. failed, the IRGC turned to Amirov and Omarov to locate, surveil, and murder her. Beginning in approximately July 2022, Amirov sent targeting information—which he had received directly from IRGC officials in Iran—about Alinejad to Omarov. In turn, Omarov communicated this information to Khalid Mehdiyev, another member of the Organization who had been residing in Yonkers, New York, so that Mehdiyev could surveil Alinejad and murder her. In turn, Mehdiyev sent photographs and videos of Alinejad’s residence to Omarov, who shared these materials with Amirov and the IRGC officials who orchestrated the plot in Iran. Amirov and Omarov then arranged for a $30,000 cash payment to Mehdiyev, who used a portion of this payment to buy an AK-47 style assault rifle, two magazines, and at least 66 rounds of ammunition; as Mehdiyev boasted in electronic communications, a “war machine” he could use to kill Alinejad.

    In late July 2022, Mehdiyev repeatedly traveled to Alinejad’s neighborhood to surveil her. Mehdiyev sent reports of his surveillance to Omarov, who passed them to Amirov. On July 24, 2022, Mehdiyev reported to Omarov from Alinejad’s residence that he was “at the crime scene.” On July 27, 2022, Omarov told Amirov that Mehdiyev was ready to kill Alinejad, writing “this matter will be over today. I told them to make a birthday present for me. I pressured them, they will sleep there this night.”  On July 28, 2022, Mehdiyev sent Omarov a video taken from inside the car that Mehdiyev was driving with the assault rifle and a message reading “we are ready.” Amirov sent an image of the interior of Alinejad’s home to Omarov to be forwarded to Mehdiyev, writing “this is the house where she stays.”  As Omarov continued to update Amirov about Mehdiyev’s readiness, Amirov cautioned Omarov “let him keep the car clean.”  When Mehdiyev subsequently drove from where he was surveilling the residence, he was stopped after a traffic violation and, during a subsequent search of the vehicle, police officers found the assault rifle, 66 rounds of ammunition, approximately $1,100 in cash, and a black ski mask.

    After Mehdiyev was arrested and placed into custody, Omarov contacted Mehdiyev’s mother and threatened to kill her and her other son if she did not locate Mehdiyev.

    Amirov and Omarov were convicted on five counts: murder-for-hire, which carries a maximum penalty of 10 years in prison (Count One); conspiracy to commit murder-for-hire, which carries a maximum penalty of 10 years in prison (Count Two); conspiracy to commit money laundering, which carries a maximum penalty of 20 years in prison (Count Three); attempted murder in aid of racketeering, which carries a maximum penalty of 10 years in prison (Count Four); and possession and use of a firearm in connection with the attempted murder, which carries a maximum penalty of life in prison and a mandatory minimum penalty of five years in prison (Count Five).

    The FBI New York Field Office Counterintelligence-Cyber Division and the New York FBI Iran Threat Task Force are investigating the case, with assistance from the New York City Police Department (NYPD) and the NYPD Intelligence Bureau. The Department of Justice’s Office of International Affairs provided valuable assistance. The Justice Department thanked the authorities in the Czech Republic for their assistance.

    Assistant U.S. Attorneys Michael D. Lockard, Jacob H. Gutwillig, and Matthew J.C. Hellman for the Southern District of New York are prosecuting the case with assistance from paralegal specialist Owen Foley and Trial Attorneys Christopher Rigali and Leslie Esbrook of the National Security Division’s Counterintelligence and Export Control Section.

    MIL Security OSI

  • MIL-OSI Security: Albuquerque Man Sentenced for Threatening and Stalking a Raleigh Woman He Met Online

    Source: US FBI

    NEW BERN, N.C. – An Albuquerque, New Mexico, man was sentenced Thursday to more than five years in prison (65 months) for defrauding Verizon Wireless, committing aggravated identity theft, and threatening and stalking a victim in Raleigh.  Robert Michael Glauner, 60, pleaded guilty to the charges on January 13, 2025.

    According to court documents and other information presented in court, Glauner briefly met and communicated online with a Raleigh woman in September 2023.  When she rejected further attempts at communication, Glauner began stalking her. In order to find additional ways to reach her, Glauner drafted fake search warrants for her phone records and submitted them to Verizon Wireless.  In the search warrant, he claimed to be member of law enforcement and included a North Carolina Superior Court Judge’s name as authorizing the search. Verizon accepted the search warrants and provided Glauner with the requested information.  Glauner then called or texted the victim’s family, friends, and workplace in order to force her to speak to him.  When that ultimately failed, Glauner drove from Albuquerque to Raleigh, sending the victim threating messages along the way. Members of the Raleigh Police Department intercepted Glauner when he arrived in Raleigh and arrested him on November 6, 2023.  At the time of his arrest, Glauner was in possession of a knife, rope, and illegal narcotics.

    “Glauner’s exploitation of technology and posing as the police to harass and intimidate the victim in this case is incredibly serious behavior,” Acting U.S. Attorney Daniel P. Bubar said today.  “This case also demonstrates law enforcement’s commitment to vigorously pursue cyberstalking allegations, and I want to thank our partners at FBI and the Raleigh Police Department for their work, which brought Glauner to justice.”

    “Online dating is scary enough without someone refusing to take no for an answer.  Mr. Glauner took that to the extreme, pretending to be a law enforcement officer multiple times to track down the victim.  When someone’s response to rejection is so extreme it escalates to stalking, the FBI will step in to stop the offender and hold them accountable every time,” said Robert M. DeWitt, the FBI Special Agent in Charge in North Carolina. 

    Glauner pleaded guilty to three counts of fraud in connection with obtaining confidential phone records; three counts of aggravated identity theft; transmitting a threat; and stalking.

    Daniel P. Bubar, Acting U.S. Attorney for the Eastern District of North Carolina, made the announcement after sentencing by U.S. District Judge Louise W. Flanagan.  The Federal Bureau of Investigation (FBI) and the Raleigh Police Department investigated the case, and Assistant U.S. Attorney Lori Warlick prosecuted the case.

    Related court documents and information can be found on the website of the U.S. District Court for the Eastern District of North Carolina or on PACER by searching for Case No. 5:24-CR-25-FL.

    ###

    MIL Security OSI

  • MIL-OSI Security: Meet the Cyber Action Team

    Source: US FBI

    Across the globe, malicious cyber activity threatens public safety and national and economic security. Criminals target organizations such as schools, hospitals, power and utility companies, and other critical infrastructure entities that serve communities.

    As the lead federal agency for investigating cyberattacks and intrusions, the FBI developed a specialty group—the Cyber Action Team, or CAT—that can deploy across the globe within hours to respond to major cyber threats and attacks against these critical services.

    Composed of about 65 members, CAT is an investigative rapid response fly team that leverages special agents, computer scientists, intelligence analysts, and information technology specialists from across FBI field offices and Headquarters.

    “We respond onsite to victims who may include national government entities, private companies, or even sometimes foreign partner networks that have been compromised by an adversary,” said Scott Ledford, head of the Cyber Action Team and the Advanced Digital Forensics Team. “Our job is to help conduct the investigation—we collect digital evidence and locate, identify, and reverse engineer malware. We also help the victim understand when they were compromised and how, writing a timeline and a narrative of that intrusion with the ultimate goal of identifying who is responsible, attributing that attack.”

    CAT was established in 2005 in response to an increase in the number and complexity of computer intrusion investigations in FBI field offices. At the time, not all field offices had personnel with the cyber expertise necessary to properly respond to and investigate sophisticated computer intrusions.

    “There was this transition that was taking place between what investigations the FBI was responsible for and the types of crimes that we were starting to see,” explained Ledford. “Cyber was such a growing threat at the time, and so it became necessary that some field offices would reach out and say, ‘Hey, do you know of any cyber experts who can help me work through an investigation?”

    As the team formalized its processes and expanded, in 2016, the Presidential Policy Directive 41, “United States Cyber Incident Coordination” was signed, setting forth principles for the federal government’s response to cyber incidents involving government or private sector entities. The FBI was appointed the lead federal agency for cyber threat response activities.

    “From an investigative standpoint, the FBI is unique. We’re one of the few agencies in the U.S. government that has both law enforcement and counterintelligence authorities,” said Ledford. “And those authorities, and the American people’s trust in us, help us to deliver a unique blend of national security and criminal investigative skills, expertise, and resources to implement that blended response and help facilitate an investigation, regardless of whether it leads us overseas or to a courtroom here in the U.S.”

    The bulk of CAT’s cases usually involve the FBI identifying an organization with a particular intrusion that’s either so complex or large-scale that the local field office requests additional assistance.

    In one case, CAT deployed to a health care company that a separate intrusion investigation had identified as compromised. CAT’s response helped lead to the identification of several compromised systems and accounts on their network. While working alongside the company, CAT disrupted the threat—and prevented further exploitation across their network.

    CAT also receives requests from FBI legal attachés, the State Department, the National Security Council, and the White House to assist other countries when they face cyberattacks.

    “It could be a country that doesn’t have the resources or the expertise that the U.S. government has, and they’ve reached out and asked for help,” said Ledford. “There can be a NATO or a non-NATO ally country that says, ‘We’ve been hit hard by this adversary, and we don’t have the localized personnel, we don’t have the resources, we don’t have the expertise to respond to this. Can you help us with it?”

    In another case, CAT deployed overseas to provide incident response support to a NATO ally that had been targeted by a destructive cyberattack. CAT responded and worked together with U.S. partners to determine the initial intrusion vector, identify other networks that were impacted, collect and analyze digital evidence, and ultimately attribute the intrusion to a foreign government. The NATO ally severed diplomatic ties with the foreign government, closed the foreign government’s in-country embassy, and evicted them from the country.

    “We have some talented people, and they work hard every single day,” said Ledford. “It’s an honor to sit alongside them.”

    Key Tactic: Strong Communication Skills

    In addition to excellent technical skills, CAT members are closely vetted for strong communication skills. Ledford explained that part of the CAT applicant selection process entails a multi-day live technical exercise that’s designed and curated by CAT:

    “We design a network environment. We may mimic an industry, for example, an electric utility. And then we compromise that environment, and we litter it with artifacts, digital evidence, and malware. Then we task applicants to investigate this cyber incident and present their findings.

    At the end of the five days, applicants present their findings, and we identify who has the technical capability and expertise to find digital evidence of a crime hidden within this mountain of data that we’ve thrown at them.

    If the applicant passes that phase of that selection exercise, we invite them to participate in a panel presentation. Our CAT members will play the roles of the victims we’re trying to help and their own resource teams, for example, a company CEO, a U.S. attorney, a third-party legal counsel, or IT administrator.

    You’re essentially giving us the narrative of the cyber intrusion. You’re telling us a story about what happened. While some of the panel questions will be very technical in nature, some will be more basic questions—the applicant will need to be able to explain to a CEO, for example, who might not have technical expertise, what the problem was and how to fix it. We’re looking to see whether you can take something that’s exceptionally technically complex and explain it in such a way that everyone in the room understands it.

    We’re also looking for interpersonal ability. For example, in the case of a company CEO, at that moment during a cyberattack, they may be going through one of the most stressful times of their company’s existence—there may be data leaked that can make or break that company’s future and their profits, as well as their ability to employ people and their ability to deliver services to their customers. You need the communications skills to interact with them during a difficult time and gain trust.”

    MIL Security OSI

  • MIL-OSI Security: Students Get Inside Look at Life as an FBI Agent

    Source: US FBI

    The course is a lively mix of presentations and practical exercises. FBI personnel—including linguists, technical experts, forensic accountants, intelligence analysts, special agents, and bomb technicians—answered questions about their jobs and how they arrived at the FBI.

    In a mock scenario on the first day, a special agent explained how investigators assemble the building blocks of a case by looking at the available facts and evidence and then asking the right questions. Then students separated into “squads” and practiced.

    On day two, students learned best practices for dusting for fingerprints, sketching crime scenes, and interviewing subjects—all while dutifully documenting everything. For many, the rigors of tracking every photo, statement, and piece of evidence was illuminating.

    “It was really eye-opening,” said Ryan, an FAIT participant. “It’s been very jarring to see, like, just how methodical that process is for any kind of crime scene like this.”

    Photo Gallery

    Select image to view gallery

    “There’s a lot more that goes into examining a crime scene than people realize,” added Hannah, another FAIT participant. “There were multiple different things we needed to include, like the case number, the item number, description, location, time.”

    The Cleveland Division borrowed the idea for Future Agents in Training from the FBI’s Washington Field Office in 2015, seeing it as a way to connect with students in the communities it serves. FBI field offices rely on outreach efforts like FAIT, Citizens Academies, Junior Special Agents, college Honors Internships, and Teen and Youth Academies to help strengthen relationships with communities.

    MIL Security OSI

  • MIL-OSI Security: Highlighting Safety Measures to Protect Nation’s Food Infrastructure

    Source: US FBI

    “Wherever in the country you may live—from California to Nebraska to Georgia to points in between—the cyber risk and the national security risk for farms and ranches and our food processing facilities is growing exponentially,” said Gene Kowel, special agent in charge of the FBI’s Omaha Field Office, which partnered with the Nebraska Farm Bureau to host the August 12 symposium. “The threats are evolving. They’re becoming more complex and more severe.”

    Examples shared during the daylong event included ransomware attacks that cripple operations, network hacks that take control of systems, and the theft of seeds worth millions of dollars in intellectual property and research.

    Kowel said the FBI is monitoring four major threats to the nation’s agriculture sector, which—like water, power, and transportation—is considered part of the nation’s critical infrastructure. The threats include ransomware attacks, malicious software (malware) from foreign adversaries, theft of data and intellectual property, and bioterrorism.

    Foreign actors—most notably the People’s Republic of China—are actively seeking ways to disrupt the United States’ agriculture industry, Kowel said. He urged farmers, cattle ranchers, and others to add cyber hygiene to their long list of chores. Cyber hygiene includes basic steps like using multi-factor authentication to access networks and backing up critical data.

    “We all know that in agriculture today, almost all of our data is stored in the cloud,” Kowel said. “Almost all of our complex machinery is connected to the internet, connected to the cloud, so protecting that control and protecting that data is critical.”

    MIL Security OSI

  • MIL-OSI Security: 2023 Cryptocurrency Fraud Report Released

    Source: US FBI

    Losses related to cryptocurrency fraud totaled over $5.6 billion in 2023, a 45% increase in losses since 2022, according to a report from FBI’s Internet Crime Complaint Center (IC3) published on September 9, 2024. The number of complaints from the public regarding cryptocurrency fraud continues to steadily increase, reaching 69,000 in 2023.

    Cryptocurrency is a type of digital currency that you can use to buy goods or services or to invest. Examples of cryptocurrencies include bitcoin, ether, or tether.

    As the use of cryptocurrency in the global financial system continues to grow, criminals are increasingly using cryptocurrency due to its decentralized nature, the speed of irreversible transactions, and the ability to transfer value around the world. Using cryptocurrency also makes it harder for victims to recover stolen funds. Once an individual sends a payment, the recipient owns the cryptocurrency. Recipients often quickly transfer that digital currency into an account overseas for cashout purposes.

    Criminals can exploit cryptocurrencies in many types of criminal schemes. In 2023, most cryptocurrency complaints involved investment scams. These losses totaled $3.9 billion and accounted for almost 71% of all losses related to cryptocurrency in 2023. Other examples of scams associated with cryptocurrency include tech support, confidence and romance, and government impersonation scams.   

    Cryptocurrency investment fraud is the most common type of cryptocurrency scam. In this type of fraud, criminals use various means of manipulation to convince victims to deposit increasing amounts of money into financial “investments” using cryptocurrency. In truth, these investments are fake; criminal actors who are usually located overseas control—and ultimately steal—all victim money. As a result, victims typically lose everything they invested.

    Losses from cryptocurrency-related investment fraud schemes reported to the IC3 rose from $2.57 billion in 2022 to $3.96 billion in 2023‚a 53% increase. Many individuals have accumulated massive debt to cover losses from these fraudulent investments.

    Individuals aged 30-39 and 40-49 filed the most complaints related to cryptocurrency investment fraud (approximately 5,200 reports in each age group). But complainants over the age of 60 reported the highest losses (over $1.24 billion).

    Learn more about the process behind cryptocurrency investment fraud. 

    The FBI, along with the Department of Justice, law enforcement, regulatory agencies, and financial institution partners, is dedicated to identifying the perpetrators of these schemes and bringing them to justice.

    The FBI’s IC3 is the central intake hub for individuals in the U.S. or abroad to report fraud and cybercrime. The IC3 analyzes complaints and aggregates them to identify trends and help develop strategies to combat these schemes and protect scam victims from loss. IC3 also shares the complaints it receives with FBI field offices, other law enforcement agencies, and regulatory entities for further investigation or action, as appropriate.

    In February 2022, the FBI formed the Virtual Assets Unit (VAU), a specialized team dedicated to investigating cryptocurrency-related crimes. The VAU centralizes the FBI’s cryptocurrency expertise into one nerve center, providing technological equipment, blockchain analysis, virtual asset seizure training, and other sophisticated training for FBI personnel. 

    If you believe you or someone you know may be a victim of cryptocurrency fraud, immediately submit a report to the IC3 via ic3.gov or contact your local FBI field office and provide as much transaction information as possible. We encourage you to submit a complaint through ic3.gov, even if a financial loss did not occur.

    When submitting a report to ic3.gov, include as much as you can of the following information: 

    • Financial transaction details, including: 
      • Cryptocurrency wallet addresses 
      • The amounts and types of cryptocurrencies involved 
      • Date and time of the transactions, and transaction IDs (hash)
    • Information about how you met the scammer(s)
    • What platforms you used to communicate with the scammer(s)
    • Any website address(es) involved in the scheme
    • Any phone numbers or other identifiers you might have about the scammer(s)

    You can refer to IC3’s public service announcement, “FBI Guidance for Cryptocurrency Scam Victims,” for more information about what to report.

    Individuals aged 60 or older can also contact the National Elder Fraud Hotline (833-372-8311) to assist with filing an IC3 complaint. 

    MIL Security OSI

  • MIL-OSI Security: FBI Director Announces Chinese Botnet Disruption, Exposes Flax Typhoon Hacker Group’s True Identity at Aspen Cyber Summit

    Source: US FBI

    The FBI and our partners disrupted a Chinese botnet and freed thousands of impacted devices from its clutches, Director Christopher Wray announced September 18. 

    The botnet, which was operated by a Chinese government-sponsored hacker group known as Flax Typhoon, targeted internet-connected devices such as storage devices, cameras, and video recorders to compromise victims’ systems and steal their confidential data, Director Wray said during a keynote at the 2024 Aspen Cyber Summit in Washington, D.C.

    “Ultimately, as part of this operation, we were able to identify thousands of infected devices, and, then, with court authorization, issued commands to remove the malware from them, prying them from China’s grip,” Wray said.  

    Approximately half of the devices under the botnet’s control were based in the United States, he noted. The hacker group’s targets included organizations in the public and private sectors, as well as academia and the media, he added. Wray also revealed the hacker group’s true identity to be an information security company known as the Integrity Technology Group. “But their chairman has publicly admitted that for years his company has collected intelligence and performed reconnaissance for Chinese government security agencies,” Wray added. 

    Wray called the cyber disruption a success but cautioned that the effort was “just one round in a much longer fight.” 

    “The Chinese government is going to continue to target your organizations and our critical infrastructure—either by their own hand or concealed through their proxies,” Wray said. “And we’ll continue to work with our partners to identify their malicious activity, disrupt their hacking campaigns, and bring them to light.” 

    Saving victims time and money 

    During his remarks, Wray also underscored the Bureau’s dedication to working with victims of cyber intrusions, whether they’re individuals or organizations. According to Wray, reporting ransomware attacks to the FBI can potentially help us: 

    • Recover ransomed data 
    • Negotiate-down ransoms demanded by cybercriminals—or spare victims from having to pay ransoms at all 
    • Help impacted organizations resume their normal operations in a speedy manner 

    “I’m extremely proud to report that, in just the past two years, the FBI has handed out nearly 1,000 decryptors, and we’ve saved victims around the world something like $800 million in ransom payments,” Wray said. 

    Decryptors—also known as decryption keys—function like passwords to unlock data that ransomware criminals hold captive. But, Wray explained, some of those keys require information about the victim to work.  

    So it’s paramount that organizations contact the FBI if they fall victim to ransomware attacks. Otherwise, he cautioned, the Bureau “might not be able to make that match—and we might not be able to save you that ransom payment.” 

    Wray also discussed how information sharing between the Bureau and our public and private sector partners can help the FBI combat ongoing cyberattacks and lessen the impact of future cyber incidents.  

    As an example, he pointed to a recent interagency effort to alert the private sector that a pro-Russian hacktivist group was targeting “operational technology networks.”  

    “They had set their sights across our critical infrastructure—from dams and wastewater systems to the energy, food, and agriculture sectors,” Wray explained.  

    But, he said, the FBI’s joint advisory about the cyber threat allowed private sector organizations to fix the vulnerability these bad actors were using to infiltrate networks, thereby protecting the companies and the American public, alike. 

    “So, if there’s only one thing you take away from my time here today, I hope it’s this: The FBI needs and wants to work with you,” Wray said. “Let us save you money, save you time, and save you from future attacks so that you can keep your organization’s focus where it should be: on your operations, and—together—we can help keep our nation safe.” 

    West Palm Beach investigation updates 

    During his remarks, Wray also addressed the Bureau’s investigation into the September 15 assassination attempt on former President Donald Trump.  

    “For the second time in just over two months, we’ve witnessed what appears to be an attempt to attack our democracy and our democratic process,” he said. “I’m relieved that former President Trump is safe, and I want the American people to know the men and women of the FBI are working tirelessly to get to the bottom of what happened.” 

    Wray acknowledged that the ongoing nature of the investigation limited how much the Bureau could say about the matter. 

    “What I can say is that we have dedicated the full force of the FBI to this investigation, and that runs the gamut from criminal to national security resources, from tactical support to Evidence Response Teams, from forensic scientists to operational technology personnel,” he said.“Together, we’re working around the clock to investigate this.” 

    MIL Security OSI

  • MIL-Evening Report: Disaster or digital spectacle? The dangers of using floods to create social media content

    Source: The Conversation (Au and NZ) – By Samuel Cornell, PhD Candidate in Public Health & Community Medicine, School of Population Health, UNSW Sydney

    Almost 700 rescues had been carried out in New South Wales by Friday morning as
    record-breaking rainfall pounds the state. Tragically, four people have died in floodwaters.

    Amid the chaos, videos posted on social media show people deliberately entering or standing above swollen rivers and flooded roads. It is a pattern of dangerous behaviour that occurs frequently during natural disasters in Australia.

    Filming unsafe acts for social media is not just risky for participants. It may inspire copycat behaviour, and, if things go wrong, can endanger the lives of rescuers. It’s a public health problem which requires new remedies.

    Selfies in floods: a risky business

    During a flood, water can be deceiving. Just 15cm of water can knock an adult off their feet or cause a car to lose traction and float. Submerged debris and contaminated water add to the dangers.

    Emergency services routinely warn the public not to enter floodwaters – on foot or in vehicles. But many people ignore the warnings, including those out to create social media content.

    In a startling example posted on Tiktok during the current floods, a young man stands on a mossy log which has fallen over a flooded river. The video, accompanied by dramatic music, shows swirling floodwaters surging beneath him. One wrong step, and the man could easily have drowned.

    In other examples posted on Tiktok in recent days, a woman wades through murky floodwaters, and a person films as the car they are travelling in drives down a flooded road.

    Similar behaviour was observed during floods in Townsville earlier this year. Residents filmed themselves diving and wading into floodwaters, and towing each other on inflatable rafts.

    And during ex-Tropical Cyclone Alfred, social media was filled with images of people in Queensland surfing dangerous swells and wading in rough surf.

    A worrying trend

    Our research explores the links between social media and adverse health outcomes.

    Selfie-related injury has become a public health concern. People are increasingly venturing off-trail, seeking out attractive but hazardous locations such as cliff edges and coastal rock platforms.

    These behaviours can lead to injury and death. They can also put emergency services personnel in harm’s way. In 2021, for example, a woman fell into a swollen river on Canberra’s outskirts while trying to take a selfie with friends, prompting a police official to warn:

    There is no photo or social media post that is worth risking your life to get. Any water rescue puts the lives of not only of yourself but those of emergency services personnel at risk.

    Getting to grips with the problem

    How should the problem be tackled? Previous research by others has recommended “no-selfie zones”, barriers, and signs as ways to prevent selfie incidents. But our research suggests these measures may not be enough.

    The phenomenon of selfie-related incidents requires a public health approach. This entails addressing the behaviour through prevention, education, and other interventions such as via social media platforms.

    In the latest floods, unsafe behaviour has occurred despite a series of official flood, weather and other warnings. Residents also continue to drive into floodwaters, despite repeated pleas from authorities.

    Official warnings compete with – and can lose out to – more emotionally compelling, visually rich content. If the public sees other people behaving recklessly and apparently unharmed, then even clear, fact-based warnings can be ignored.

    This is especially true in communities experiencing “alert-fatigue” after having gone through disasters before.

    Sometimes, vague terminology in warnings means the messages don’t necessarily cut through. We’ve seen this before in relation to surf safety. Technical phrases such as “hazardous swell” don’t change behaviour if people don’t understand what they mean.

    For warnings to work, they need to be clear and provide instruction – stating what the danger actually is, and what to explicitly do, or not do.

    For social media users, that might mean spelling out not to go into floodwaters to capture content for social media.

    We’ve also previously called on social media companies to be held more accountable for the dangerous content they publish – by flagging risky content and supporting in-app safety messaging, especially at high-risk locations or during extreme weather events.

    What to do right now

    If you’re in or near a flood zone, follow guidance from emergency services to keep yourself and your loved ones safe.

    When it comes to using social media in an emergency:

    • stay entirely out of floodwaters, even for a quick photo

    • think before you post. Your safety is more important than your content. No post is worth risking your life

    • avoid glamourising risk. Sharing risky photos or videos can influence others to do the same, potentially with worse outcomes

    • follow official advice. Floodwaters are unpredictable. Warnings are issued for a reason

    • use your platform for good. Share verified information, support affected communities and help amplify safety messages.

    As extreme weather becomes more frequent in Australia under climate change, so too will the urge to document them. But we risk turning disasters into digital spectacles – at the expense of our lives and that of rescuers.

    Samuel Cornell receives funding from Meta Platforms, Inc. His research is supported by a University of New South Wales Sydney, University Postgraduate Award. His research is supported by Royal Life Saving Society – Australia to aid in the prevention of drowning. Research at Royal Life Saving Society – Australia is supported by the Australian government. He has been affiliated with Surf Life Saving Australia and Surf Life Saving NSW in a paid and voluntary capacity.

    Amy Peden receives funding from the National Health and Medical Research Council, Meta Platforms, and NSW National Parks and Wildlife Service. She holds an honorary affiliation with Royal Life Saving Society – Australia.

    ref. Disaster or digital spectacle? The dangers of using floods to create social media content – https://theconversation.com/disaster-or-digital-spectacle-the-dangers-of-using-floods-to-create-social-media-content-257350

    MIL OSI AnalysisEveningReport.nz

  • MIL-OSI Security: FBI Cyber Lead Urges Potential LockBit Victims to Contact Internet Crime Complaint Center

    Source: US FBI

    FBI Cyber Division Assistant Director Bryan Vorndran on June 5 highlighted the Bureau’s “ongoing disruption” of the LockBit ransomware group and its affiliates, and urged potential victims to contact the Bureau’s Internet Crime Complaint Center (IC3)

    The Bureau now has more than 7,000 LockBit decryption keys in its possession, Vorndran said in a keynote at the 2024 Boston Conference on Cyber Security. We can use these keys to help victims get their data back, he noted. Potential victims can contact IC3 by visiting our LockBit Victim Reporting Form at lockbitvictims.ic3.gov

    “We are reaching out to known LockBit victims and encouraging anyone who suspects they were a victim to visit our Internet Crime Complaint Center at ic3.gov,” he said.

    The LockBit ransomware variant has been utilized in over 2,400 cyberattacks around the world—more than 1,800 of which impacted victims in the U.S.—he said. These attacks have targeted various sectors and racked up “billions of dollars in damages,” Vorndran said.

    FBI Cyber Division Assistant Director Bryan Vorndran delivers a keynote address at the 2024 Boston Conference on Cyber Security on June 5, 2024.

    MIL Security OSI

  • MIL-OSI Security: Private Investigator Sentenced to 18 Months in Prison for Acting as an Illegal Agent of the People’s Republic of China

    Source: US FBI

    Michael McMahon, a Former New York City Police Department Sergeant, Was Convicted at Trial for Participating in a Scheme to Stalk and Coerce a U.S. Resident to Return to the PRC as Part of the PRC’s “Operation Fox Hunt”

    Earlier today, in federal court in Brooklyn, Michael McMahon was sentenced by United States District Judge Pamela K. Chen to 18 months in prison for acting as an illegal agent of the government of the People’s Republic of China (PRC), as well as for interstate stalking and conspiracy to commit such acts in connection with his participation in a scheme to coerce a U.S. resident to return to the PRC as part of its international repatriation effort known as “Operation Fox Hunt.”  McMahon and co-defendants Zhu Yong and Congying Zheng were convicted by a federal jury in June 2023 following a three-week trial.  As part of his sentence, McMahon was also ordered to pay a fine of $11,000.

    John J. Durham, United States Attorney for the Eastern District of New York; Sue J. Bai, head of the Justice Department’s National Security Division; Terence G. Reilly, Acting Special Agent in Charge, Federal Bureau of Investigation, Newark Field Office (FBI); and Michael Alfonso, Acting Special Agent in Charge, Homeland Security Investigations, New York (HSI New York) announced the sentences. 

    “McMahon, a former law enforcement officer who swore an oath to protect the public, went rogue and dishonorably engaged in a scheme at the direction of the People’s Republic of China, terrorized victims living in the New York metropolitan area, and shattered their sense of safety and security,” stated United States Attorney Durham.  “Thanks to the efforts of law enforcement, the defendants’ plan to coerce the victims to return to China failed, and the defendants have instead been brought to justice for their role in China’s insidious Operation Fox Hunt.  My Office remains unwavering in its commitment to exposing and undermining efforts by foreign governments to perpetrate transnational repression schemes that threaten our national security interests and harm individuals living in the United States.” 

    Mr. Durham expressed his appreciation to the Department of State’s Diplomatic Security Service and the FBI’s New York Field Office for their work on the case. 

    “Most private investigators operate within the bounds of the law and ethical conduct. McMahon knew exactly what he was doing—and at trial, we proved his knowing and willing participation in this scheme,” stated FBI Special Agent in Charge Reilly.  “His client, the People’s Republic of China, has invested years and millions of dollars trying to silence dissent beyond its borders. When those efforts cross into our country, they threaten our national security.  The PRC needs to understand: we will not tolerate it.”

    “This defendant allowed himself to become a partner in the PRC’s cruel harassment and intimidation campaign,” stated HSI New York Special Agent in Charge Alfonso.  “HSI, together with our federal counterparts, will continue to outfox our adversaries’ attempts to circumvent U.S. regulations, undermine national security, and target the American public.”

    As proven at trial, between approximately 2016 and 2019, McMahon and his co-conspirators participated in an international campaign to threaten, harass, surveil, and intimidate John Doe #1 and his family in order to force him and his wife, Jane Doe #1, to return to the PRC to face purported corruption charges.  Beginning in 2012, John Doe #1 and Jane Doe #1 had been targeted for repatriation as part of the PRC’s transnational repression programs known as “Operation Fox Hunt” and “Operation Sky Net.”  John Doe #1 and his family had accordingly sought to keep their address out of public records.

    Yong hired McMahon, a retired NYPD sergeant working as a private investigator, to locate John Doe #1.  McMahon obtained sensitive information about John Doe #1, which he then reported back to Zhu and others, including a PRC police officer.  McMahon also conducted surveillance outside the New Jersey home of John Doe #1’s relative and provided Zhu and PRC officials with detailed reports of what he observed.  The operation was supervised and directed by several PRC officials, including a PRC police officer and a PRC prosecutor.

    As proven at trial, McMahon knew the operation was intended not only to locate John Doe #1, but to coerce him to return to the PRC by exerting pressure on his family members.  In April 2017, PRC officials threatened to jail John Doe #1’s sister, who lived in the PRC, in order to coerce John Doe #1’s then-82-year-old father to travel from the PRC to their relative’s home in New Jersey.  John Doe #1’s father, who had recently suffered a brain hemorrhage, was so frail that a doctor accompanied him for the trip.  McMahon followed John Doe #1’s father from the relative’s New Jersey home, and, by doing so, was able to learn John Doe #1’s address. McMahon immediately provided this information to a PRC operative. 

    On September 4, 2018, Zheng and another co-conspirator drove to the New Jersey residence of John Doe #1 and Jane Doe #1 – at the address that McMahon had provided – where they pounded on the front door, attempted to enter the house, and then peered through the windows in the back of the home.  They left a note on the front door informing John Doe #1 that his “wife and children will be okay” if John Doe #1 surrendered himself to face a ten-year prison term in the PRC.

    McMahon knew that the subjects of his investigation were wanted by the PRC government, a fact that he texted about with another investigator he hired to help him.  Following his arrest, McMahon acknowledged knowing that his employers wanted to get the victim back to China “so they could prosecute him.”  After providing the victims’ address, McMahon told his surveillance partner that he was “waiting for a call” to find out what to do next.  McMahon’s partner responded, “Yeah.  From NJ State Police about an abduction,” to which McMahon responded “Lol.”  McMahon later suggested to a PRC co-conspirator that they “harass” John Doe #1 by “[p]ark[ing] outside his home and let[ting] him know we are there.”  McMahon took other investigative steps designed to harass the victims, such as researching their daughter’s university residence and college major.

    McMahon was paid more than $19,000 in total for his role in the illegal repatriation scheme.  In an apparent attempt to conceal the source of payments from his PRC clients, McMahon deposited those payments into his son’s bank account, the only time he had done so with client payments.

    Previously, in January 2025, Zhu and Zheng were sentenced respectively to 24 months’ and 16 months’ imprisonment.  Three additional co-defendants pleaded guilty in connection with their roles in the PRC-directed harassment and intimidation campaign.  They are awaiting sentencing.  Five co-defendants in the indictment, Hu Ji, Li Minjun, Tu Lan, Zhu Feng, and Zhai Yongqiang are fugitives.

    The FBI has created a website for victims to report efforts by foreign governments to stalk, intimidate, or assault people in the United States.  If you believe that you are or have been a victim of transnational repression, please visit https://www.fbi.gov/investigate/counterintelligence/transnational-repression.

    The government’s case is being handled by the Office’s National Security and Cybercrime Section.  Assistant United States Attorneys Meredith A. Arfa and Irisa Chen are in charge of the prosecution, with assistance from Trial Attorneys Christine A. Bonomo and Scott A. Claffee of the National Security Division’s Counterintelligence and Export Control Section.  Paralegal Specialist Rebecca Roth also has provided valuable assistance.

    The Defendants:

    MICHAEL MCMAHON
    Age: 57
    Mahwah, New Jersey

    ZHU YONG
    Age: 68
    East Elmhurst, New York

    CONGYING ZHENG
    Age: 29
    Brooklyn, New York

    E.D.N.Y. Docket No. 21-CR-265 (S-1) (PKC)

    MIL Security OSI

  • MIL-OSI Security: Texas Man Formerly Employed by Ohio Company Convicted of Damaging Source Code and Deleting Data

    Source: US FBI

    CLEVELAND — A federal jury in Cleveland convicted a Texas man today for writing and deploying malicious code on his former employer’s network.

    According to court documents and evidence presented at trial, Davis Lu, 55, of Houston, was employed as a software developer for the victim company headquartered in Beachwood, Ohio, from November 2007 to October 2019.

    Following a 2018 corporate realignment that reduced his responsibilities and system access, Lu began sabotaging his employer’s systems. By Aug. 4, 2019, he introduced malicious code that caused system crashes and prevented user logins. Specifically, he created “infinite loops” (in this case, code designed to exhaust Java threads by repeatedly creating new threads without proper termination and resulting in server crashes or hangs), deleted coworker profile files, and implemented a “kill switch” that would lock out all users if his credentials in the company’s active directory were disabled. The “kill switch” code — which Lu named “IsDLEnabledinAD”, abbreviating “Is Davis Lu enabled in Active Directory” — was automatically activated upon his termination on Sept. 9, 2019, and impacted thousands of company users globally. Lu named other code “Hakai,” a Japanese word meaning “destruction,” and “HunShui,” a Chinese word meaning “sleep” or “lethargy.”

    Additionally, on the day he was directed to turn in his company laptop, Lu deleted encrypted data. His internet search history revealed he had researched methods to escalate privileges, hide processes, and rapidly delete files, indicating an intent to obstruct efforts of his co-workers to resolve the system disruptions. Lu’s employer suffered hundreds of thousands of dollars in losses as a result of Lu’s actions.

    “Mr. Lu was calculating in his intent to inflict damage to a company that provides products and services to businesses and organizations that span a variety of industries and fields,” said Acting United States Attorney Carol M. Skutnik of the United States Attorney’s Office for the Northern District of Ohio. “Together with our colleagues from the Criminal Division and the FBI, the U.S. Attorney’s Office will prosecute those who intend to disrupt business operations, especially, if it has the potential to inflict greater harm on national and international levels. We will hold perpetrators accountable and pursue justice against vindictive employees who break federal laws.”

    “Sadly, Davis Lu used his education, experience, and skill to purposely harm and hinder not only his employer and their ability to safely conduct business, but also stifle thousands of users worldwide,” said FBI Special Agent in Charge Greg Nelsen. “The FBI and its cadre of exceptionally qualified agents and analysts will continue to identify, find, and investigate individuals who seek to carry out deliberate and destructive actions against businesses or organizations for retaliatory or malicious purposes.”

    The jury convicted Lu of causing intentional damage to protected computers, for which he faces a maximum penalty of 10 years in prison. A sentencing date has not been set. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    The FBI Cleveland Division investigated the case.

    Senior Counsel Candina S. Heath of the Criminal Division’s Computer Crime and Intellectual Property Section and Assistant U.S. Attorneys Daniel J. Riedl and Brian S. Deckert for the Northern District of Ohio are prosecuting the case.

    MIL Security OSI

  • Markets open higher; Nifty crosses 24,700 mark on broad-based buying

    Source: Government of India

    Source: Government of India (4)

    Indian equity markets opened on a firm note on Friday, with benchmark indices trading higher amid mixed global cues and strong domestic macroeconomic fundamentals. Early gains were led by buying interest in FMCG, IT, and auto stocks.

    At 9:29 AM, the BSE Sensex was up by 281.75 points, or 0.35%, at 81,233.74, while the NSE Nifty climbed 109.75 points, or 0.45%, to trade at 24,719.45.

    The Nifty Bank index was also in the green, rising 69.85 points, or 0.13%, to 55,011.15. Broader markets mirrored the positive trend, with the Nifty Midcap 100 gaining 258.10 points (0.46%) to 56,582.95 and the Nifty Smallcap 100 advancing 58.30 points (0.33%) to 17,561.40.

    Market experts attributed the upbeat sentiment to India’s robust economic indicators, including steady GDP growth and declining inflation and interest rates.

    Top gainers in the Sensex included ITC, Adani Ports, Infosys, PowerGrid, Tech Mahindra, Tata Steel, SBI, HCL Tech, UltraTech Cement, Tata Motors, and L&T. On the flip side, Sun Pharma, M&M, NTPC, Bajaj Finance, Bharti Airtel, Maruti Suzuki, and ICICI Bank were among the major laggards.

    In Asia, major markets such as China, Hong Kong, Bangkok, Seoul, Jakarta, and Japan were trading in the green, providing a supportive backdrop to Indian equities.

    Overnight in the US, key indices posted a mixed close. The Dow Jones Industrial Average ended almost flat at 41,859.09, down 1.35 points. The S&P 500 slipped 2.60 points to 5,842.01, while the Nasdaq Composite rose 53.09 points to 18,925.74.

    Experts noted that US equities were volatile following the retreat of Treasury yields after the passage of tax and spending legislation by the US House of Representatives.

    On the institutional front, foreign institutional investors (FIIs) were net sellers to the tune of ₹5,045.36 crore on May 22, while domestic institutional investors (DIIs) bought equities worth ₹3,715.00 crore.

    “Even when the market turns weak, domestic demand-driven segments like financials, telecom, and aviation remain resilient. This is evident in the strength of stocks like ICICI Bank, Bharti Airtel, and InterGlobe Aviation. The market is sending a clear signal,” said Dr. V.K. Vijayakumar, Chief Investment Strategist at Geojit Financial Services.

    -IANS

  • MIL-OSI Security: Ohio Woman Loses Life Savings in Cryptocurrency Investment Scam

    Source: US FBI

    CLEVELAND – The United States Attorney’s Office for the Northern District of Ohio (USAO) has filed a civil complaint in forfeiture against 8,207,578 Tether (USDT) cryptocurrency, valued at more than $8.2 million. USDT is a virtual currency which are digital tokens of value circulated over the internet. Its transactions are publicly recorded on what is known as a blockchain.

    According to court documents, the FBI has identified 33 victims of an investment fraud scheme across the country, including a victim from Northeast Ohio residing in the city of Mentor. In total, victims lost approximately $4.9 million. Five more accounts have also been found to be affected and the FBI is attempting to identify the respective owners. The victims associated with the additional accounts have lost approximately $1,071,086.

    Investigators found that scammers initially contacted the victims through seemingly misdirected, or “wrong number,” text messages. The fraudster then gained the victim’s trust and affection using various manipulative tactics. Once trust was established with the victim, the fraudster would share how much success they, or someone they knew, had with investing in cryptocurrency. This personal testimonial lessened any uncertainties the victims may have had about virtual currencies and eventually had the intended effect to persuade the victim to proceed with the investment.

    The fraudster would then guide the victim, step-by-step, on how to open a legitimate cryptocurrency account, most often with a U.S. based virtual currency exchange such as Crypto.com or Coinbase. The scammer would walk the victim through the entire process of transferring money from their bank to the newly created cryptocurrency account. Next, the victim received instructions on how to transfer the purchased cryptocurrency assets to an online “investment platform,” which would turn out to be a fake site created by the fraudsters to look like a legitimate company. Information on the platforms promised lucrative returns which encouraged victims to invest further. However, once the victim transferred their funds to the “investment platform” they unknowingly handed over complete control and ownership of their funds to the scammer. 

    The complaint also outlines that the perpetrators of such investment fraud schemes often allow victims to withdraw a portion of their “profits” early on in the scheme to build trust and reinforce their belief that the “investment platform” was legitimate. But as the scheme progressed, victims were unable to withdraw their funds and given excuses as to why they could not access their funds. For example, the fraudsters referred to a fake “tax” requirement, stating that taxes must be paid on the proceeds generated from the investment platform. Knowing that the scam would run its course soon, the fraudsters used last-ditch efforts to lie to victims that they had to pay a tax. Ultimately, victims were locked out of their account on the investment platform and lost their funds.

    A woman in Lake County, Ohio became the target of such a scam when she responded to a text on her phone from an unknown number in November 2023. She began sharing information via text with the person and the two bonded over topics such as hobbies and religion. Over a period of time, the victim followed instructions from her new “friend” and opened an account at Crypto.com and then transferred funds into the account. When the victim wanted to withdraw funds, her “friend,” relented and said additional payments were needed and she complied. When the victim no longer had any funds left after making additional payments, her “friend” began to threaten her that he would send his friends to “take care of” her friends and family. Having lost her entire life savings of approximately $663,352, including funds from her Roth IRA, the victim filed a complaint with the FBI’s Internet Crime Complaint Center to report the losses in June 2024. The FBI Cleveland Division subsequently initiated an investigation.

    Investigators conducted a blockchain analysis and determined that a portion of the funds stolen from victims were converted to USDT cryptocurrency and placed into three cryptocurrency addresses. Law enforcement officers executed a federal seizure warrant to recover 8,207,578 USDT tokens, in November 2024. Tether Limited then transferred these funds to a law-enforcement-controlled virtual currency wallet.

    By the Complaint in Forfeiture filed on Feb. 27, 2025, the United States seeks to forfeit the entire 8,207,578 USDT cryptocurrency. In the complaint, the United States alleges that the cryptocurrency accounts also contained additional funds above the victims’ traceable losses and, as proceeds of fraud, are also subject to forfeiture. Additionally, the complaint alleges that such other funds were involved in money laundering violations.     

    The claims asserted in the complaint are allegations only, and the United States must prove these allegations by a preponderance of the evidence at trial.

    If successful in this forfeiture action, the United States would seek to return the stolen funds to the victims.

    The FBI Cleveland Division is actively investigating cryptocurrency fraud schemes perpetrated on victims throughout the United States, including in the Northern District of Ohio. The United States is represented in this matter by Assistant United States Attorney James L. Morford. The USAO would like to acknowledge Tether for its assistance in this matter.

    If you observe something that you believe might be fraudulent conduct involving an older adult, contact the dedicated National Elder Fraud Hotline at 1-833-FRAUD-11 or 1-833-372-8311 and visit the FBI’s IC3 Elder Fraud Complaint Center at IC3.gov to report it.

    View Complaint:

    /usao-ndoh/media/1391461/dl?inline 

    MIL Security OSI

  • MIL-OSI Security: Pennsylvania Man Sentenced to Nine Years for Conspiring to Launder Cybercrime Fraud Proceeds

    Source: US FBI

    BIRMINGHAM, Ala. – A recidivist money launderer from Pennsylvania has been sentenced for his role in an international money laundering conspiracy, announced U.S. Attorney Prim F. Escalona and FBI Special Agent in Charge Carlton Peeples.

    U.S. District Court Judge L. Scott Coogler sentenced Toochukwu Michael Okorie, 46, of Bristol, Pennsylvania, to 108 months in prison.  Okorie was convicted in July of conspiracy to commit money laundering. In 2011, Okorie was convicted of wire fraud and money laundering in the Eastern District of Pennsylvania.

    According to evidence presented at trial, from June 2017 through May 2019, Okorie helped launder hundreds of thousands of dollars in fraud proceeds through two front companies: TMO Consulting LLC and Collective Intelligence Forensics LLC. During the conspiracy, Okorie and his co-conspirators would receive wire transfers from business email compromise, romance scam, and other frauds—including from victims in the Northern District of Alabama. Okorie and his co-conspirators would then move the fraud proceeds among bank accounts in an effort to disguise their origin and conceal their fraudulent nature. After paying themselves a commission, members of the conspiracy ultimately would wire the proceeds to bank accounts in Nigeria or use them to purchase automobiles that were shipped overseas.

    U.S. District Court Judge Anna M. Manasco previously sentenced two other individuals involved in the money laundering conspiracy: On January 20, 2022, Paulinus Ebhodaghe, 40, of Clementon, New Jersey, was sentenced to 37 months in prison; and Ohimai Asikhia, 37, of Glassboro, New Jersey, was sentenced to 18 months in prison.

    The FBI investigated the case. Assistant U.S. Attorneys Edward J. Canter and John M. Hundscheid prosecuted the case. 

    The U.S. Secret Service Cyber Fraud Task Force provided assistance during the investigation.

    For more resources on cybercrime, visit www.ic3.gov.

    MIL Security OSI

  • MIL-OSI Security: Pelham Man Sentenced to 80 Years in Prison on Child Exploitation Charges

    Source: US FBI

    BIRMINGHAM, Ala. – A Pelham man was sentenced today on charges of sexual exploitation of a child, announced U.S. Attorney Prim F. Escalona and Homeland Security Investigations (HSI) Special Agent in Charge Kelly J. Blackmon.

    U.S. District Court Judge L. Scott Coogler sentenced Neal Richard Goodacre, 54, to 960 months in prison, followed by a life term of supervised release.  In July, Goodacre pleaded guilty to two counts of production of child pornography and one count of possession of child pornography. These convictions will require Goodacre to register as a sex offender in accordance with the Sex Offender Registration and Notification Act (SORNA).

    According to the plea agreement, in July 2023, the Queensland, Australia, Child Exploitation Task Force discovered images of child pornography on a Russian file-sharing website. Queensland officers connected the account used to post the images to Goodacre at a residence in Pelham, Alabama. On September 13, 2023, HSI executed a search warrant at Goodacre’s residence.  Agents recovered two electronic devices containing 29 images and one video of child pornography. Goodacre produced some of the child pornography he possessed.

    Homeland Security Investigations investigated the case along with the Queensland, Australia, Child Exploitation Task Force and the Pelham Police Department.  Assistant U.S. Attorney Daniel S. McBrayer prosecuted the case.

    If you suspect or become aware of possible sexual exploitation of a child, please contact law enforcement. To alert the FBI Birmingham Office, call 205-326-6166. Reports can also be filed with the National Center for Missing & Exploited Children (NCMEC) or online at www.cybertipline.org.

    The case was brought as part of Project Safe Childhood, a nationwide initiative launched by the Department of Justice in May 2006 to combat the growing epidemic of child sexual exploitation and abuse.  Led by U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend, and prosecute individuals who exploit children via the Internet and to identify and rescue victims.  For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov.

    MIL Security OSI

  • MIL-OSI Security: Two Individuals Charged in Conspiracy to Sexually Exploit Children

    Source: US FBI

    BIRMINGHAM, Ala. – Two individuals have been indicted on multiple child sexual exploitation charges, announced U.S. Attorney Prim F. Escalona and FBI Special Agent in Charge Carlton L. Peeples.

    A five-count indictment filed in U.S. District Court charges Wisam A. Sharieff, 43, of Euless, Texas, and Blake Miller Barakat, aka “Hamna,” 50, of Shelby County, Alabama, with conspiracy to engage in the sexual exploitation of children, conspiracy to receive and distribute child pornography, sexual exploitation of children, distribution of child pornography, and possession of child pornography. 

    According to the indictment, between September 27, 2024, and October 15, 2024, Sharieff and Barakat conspired together to coerce a minor child to engage in sexually explicit conduct for the purpose of producing visual depictions of that conduct; and they conspired to receive and distribute child pornography.

    FBI Birmingham’s Child Exploitation and Human Trafficking Task Force investigated the case along with the FBI Dallas-Fort Worth Violent Crimes Task Force and the Shelby County Sheriff’s Office. Assistant United States Attorney R. Leann White is prosecuting the case.

    The case was brought as part of Project Safe Childhood, a nationwide initiative launched by the Department of Justice in May 2006 to combat the growing epidemic of child sexual exploitation and abuse.  Led by U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend, and prosecute individuals who exploit children via the Internet and to identify and rescue victims.  For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov.

    An indictment contains only charges.  A defendant is presumed innocent unless and until proven guilty.    

    MIL Security OSI

  • MIL-OSI Security: New Hope Man Pleads Guilty to Cyberstalking, Extortion, and Production of Child Pornography and Agrees to 40-Year Prison Sentence

    Source: US FBI

    HUNTSVILLE, Ala. – A New Hope man pleaded guilty today to stalking and extorting a woman and producing child pornography involving two minor victims, announced U.S. Attorney Prim F. Escalona and Federal Bureau of Investigation Special Agent in Charge Carlton L. Peeples. 

    Donald Wayne Carmody, 30, of New Hope, Alabama, pleaded guilty before U.S. District Judge Liles C. Burke to cyberstalking, two counts of extortion, and two counts of production of child pornography. 

    According to the plea agreement, Carmody used anonymous text messages to threaten to release pictures of the victim on the internet if she did not send him intimate photographs. Carmody also obtained the victim’s login credentials for her social media accounts and accessed their contents. After Carmody was arrested on cyberstalking and extortion charges for this conduct, investigators discovered a USB thumb drive belonging to him that contained images of child pornography that involved two victims under the age of twelve. The FBI’s Video Forensic Analysis Unit compared the images from the thumb drive, which showed a person’s hand, to pictures of Carmody’s hands taken during the investigation. The Unit identified similar class and distinguishing characteristics between the images, demonstrating that the hand in the images on the thumb drive belonged to Carmody.     

    As part of the plea agreement, Carmody stipulated to a 480-month sentence of imprisonment for the offenses. If the Court rejects the stipulated sentence, Carmody or the United States could withdraw from the plea agreement. 

    The maximum penalty for cyberstalking is five years imprisonment. The maximum penalty for extortion is two years imprisonment. The maximum penalty for production of child pornography is 30 years imprisonment. Each offense also carries the possibility of a $250,000 fine.

    The FBI investigated the case. Valuable assistance was provided by the Madison County Sheriff’s Office. Assistant U.S. Attorney John M. Hundscheid is prosecuting the case.

    The U.S. Attorney’s Office (USAO) and the National Children’s Advocacy Center (NCAC) have partnered and released a digital series to educate parents and caretakers about sextortion and how they can help prevent kids and teens from being victims. This series offers three-to-five-minute videos about current online safety topics and provides essential information about the true dangers of online activities.  These videos titled “Sextortion Prevention” can be accessed at https://www.youtube.com/@nationalcac/videos

    If you suspect or become aware of possible sexual exploitation of a child, please contact law enforcement. To alert the FBI Birmingham Office, call 205-326-6166. Reports can also be filed with the National Center for Missing & Exploited Children (NCMEC) or online at www.cybertipline.org.

    The case was brought as part of Project Safe Childhood, a nationwide initiative launched by the Department of Justice in May 2006 to combat the growing epidemic of child sexual exploitation and abuse.  Led by U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend, and prosecute individuals who exploit children via the Internet and to identify and rescue victims.  For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov. For more resources on cybercrime, visit www.ic3.gov.

    MIL Security OSI

  • MIL-OSI Security: New Mexico Man Sentenced to More than 27 Years in Prison for Advertising and Selling Child Pornography Online

    Source: US FBI

    BIRMINGHAM, Ala. – A New Mexico man was sentenced yesterday on two felony charges related to his online child sexual exploitation activities, announced U.S. Attorney Prim F. Escalona and FBI Special Agent in Charge Carlton L. Peeples. 

    U.S. District Court Judge Anna M. Manasco sentenced Wesley Alan Crownover, II, 37, to 330 months in prison, followed by a life term of supervised release.  In August 2023, Crownover pleaded guilty to one count of advertising child pornography and one count of sale of child pornography. These convictions will require Crownover to register as a sex offender in accordance with the Sex Offender Registration and Notification Act (SORNA).

    According to the plea agreement, Crownover was a member of 10 separate online groups dedicated to users who have a sexual interest in children. Within some of these groups, Crownover marketed his child pornography collection comprising of thousands of images and videos for sale. When contacted by an FBI undercover agent in one of the online groups, Crownover sold 30 videos containing child sexual abuse material for $25.

    A federal complaint and arrest warrant were obtained in the Northern District of Alabama, and a search warrant for Crownover’s residence was obtained from the District of New Mexico. When the warrants were executed, Crownover was not on the premises. Nonetheless, he saw law enforcement at his residence and fled the state. Crownover was a fugitive from justice for only a few months before he was located in Colorado Springs, Colorado, and arrested by the United States Marshals Service.

    FBI Birmingham’s Child Exploitation and Human Trafficking Task Force investigated the case along with the assistance of FBI Albuquerque, New Mexico, and the United States Marshals Service. Assistant U.S. Attorneys R. Leann White and Kristen Osborne prosecuted the case.

    If you suspect or become aware of possible sexual exploitation of a child, please contact law enforcement. To alert the FBI Birmingham Office, call 205-326-6166. Reports can also be filed with the National Center for Missing & Exploited Children (NCMEC) or online at www.cybertipline.org.

    The case was brought as part of Project Safe Childhood, a nationwide initiative launched by the Department of Justice in May 2006 to combat the growing epidemic of child sexual exploitation and abuse.  Led by U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend, and prosecute individuals who exploit children via the Internet and to identify and rescue victims.  For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov

     

    MIL Security OSI

  • MIL-OSI Security: Administrator of Scam Telegram Channel Sentenced for Multimillion-Dollar Fraud

    Source: US FBI

    BIRMINGHAM, Ala. – A Birmingham-area man has been sentenced to a decade in prison for his role running a Telegram channel that sold millions of dollars in stolen and fraudulent checks, announced U.S. Attorney Prim F. Escalona and FBI Special Agent in Charge Carlton L. Peeples.

    U.S. District Judge Madeline Haikala sentenced Mekhi Diwone Harris, 25, of Birmingham, to 120 months in prison and ordered him to forfeit $160,000. In April 2024, Harris pleaded guilty to one count of conspiracy to commit wire fraud and bank fraud.

    “Check fraud is a growing national problem,” U.S. Attorney Escalona said. “That is in no small part due to Telegram channels like the one run by the defendant, which operated as a one-stop shop for other scammers to purchase stolen financial instruments. Thanks to the tremendous partnership from the U.S. Attorney’s Office for the Southern District of Alabama and our law enforcement partners who worked on this case, we were able to bring the administrator of the ‘Work Related’ channel to justice.”

    “Fraud poses a fundamental threat to our national security as well as to our everyday way of life,” said Special Agent in Charge Peeples. “The FBI is committed to coordinating with our partners and aggressively pursuing those who seek to victimize others for their personal gain. I hope this sentencing serves as a warning to others who might engage in these types of schemes.”

    According to the plea agreement, from April 2022 to August 2023, Harris acted as an administrator of the “Work Related” Telegram channel using the Telegram handle “@O1ihk.” During this period, more than one thousand stolen or fraudulent checks were sold on the channel. The victims included individuals, businesses, churches, schools, and non-profit organizations. The total value of the checks posted to the channel was more than $10 million.

    The FBI investigated the case with significant assistance from the U.S. Postal Service Office of Inspector General, the U.S. Postal Inspection Service, and the U.S. Secret Service Cyber Fraud Task Force. Assistant U.S. Attorney Edward J. Canter prosecuted the case.

    MIL Security OSI

  • MIL-OSI Security: Wasilla Man Charged with Child Pornography, Firearm Offenses

    Source: US FBI

    ANCHORAGE, Alaska – A Wasilla man was charged by criminal complaint last week for allegedly possessing child pornography and possessing a firearm as a felon.

    According to court documents, in June 2022, law enforcement obtained and executed a search warrant for a cell phone belonging to Paul Allen Greeno, 44. Upon review of the phone’s contents, agents found images of child sexual abuse, including sexual abuse of toddlers aged one to four years old.

    On Aug. 5, 2024, the FBI executed a search warrant on Greeno’s person and residence. During the search, agents found four long gun rifles from a vehicle on his property. Several boxes of ammunition were also found in Greeno’s closet in his bedroom. Greeno was convicted of felony misconduct involving a weapon in December 2023.

    The criminal complaint filed against Greeno alleges that he befriended vulnerable youth in Anchorage with promises to supply them with drugs and then sexually exploited them.

    Greeno is charged with one count of being a felon in possession of a firearm and one count of possession of child pornography depicting minors who have not attained 12 years of age. If convicted, Greeno faces up to 20 years in prison. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    U.S. Attorney S. Lane Tucker for the District of Alaska and Special Agent in Charge Rebecca Day of the FBI Anchorage Field Office made the announcement.

    The FBI Anchorage Field Office is investigating the case. If anyone has information concerning Greeno’s alleged actions or may have encountered someone in person or online using the name Paul Allen Greeno, please contact the FBI Anchorage Field Office at (907) 276-4441 or anonymously at tips.fbi.gov.

    Assistant U.S. Attorney Alana Weber is prosecuting the case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit https://www.justice.gov/psc.

    A criminal complaint is merely an allegation, and all defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    ###

    MIL Security OSI

  • MIL-OSI Security: Arizona Man Associated with Online Terror Network Arrested for Production of Child Sex Abuse Material and Cyberstalking

    Source: US FBI

    Baron Martin, 20, of Tucson, Arizona, was arrested on Dec. 11 for producing child sexual abuse material and cyberstalking offenses carried out as part of his participation in online violent terror networks known as 764 and CVLT.

    “764 remains a dangerous network of violent extremists who systematically target children and weaponize child sexual abuse material for the purpose of furthering an accelerationist agenda, destroying civilized society, and causing the collapse of the U.S. Government,” said Assistant Attorney General for National Security Matthew G. Olsen. “The Department of Justice is fully committed to stopping 764’s acts of terrorism and disrupting the 764 network.”

    ”The Department’s Project Safe Childhood strives to protect America’s youth, whether from individual stalkers or organized, virtual networks,” said U.S. Attorney Gary Restaino for the District of Arizona. “This case serves not only to deter unlawful conduct, but also to encourage parents and children to remain vigilant and seek help when they encounter predatory and violent activity in the online world.”

    “The details in this case are simply horrific as the defendant allegedly coerced children to harm themselves multiple times,” said Executive Assistant Director Robert Wells of the FBI’s National Security Branch. “The FBI’s mission is to protect the American people and we take that especially seriously when it comes to the young and vulnerable. The FBI will use all of our authorities to investigate and hold accountable anyone who preys on children.”

    The unsealed complaint alleges that 764 is a network of violent extremists who engage in criminal conduct within the United States and abroad. Those involved with the 764 network, individually and as a network, methodically target vulnerable, underage populations across the United States and the globe by using known online social media communications platforms to support the possession, production, and sharing of extreme gore media and child sexual abuse material (CSAM) with vulnerable, juvenile populations. Members of 764 seek to desensitize young people to violence and break down societal norms regarding violence, and they normalize the possession, production, and sharing of explicit CSAM and gore material to corrupt and groom their victims toward future violence.

    Historically, members of 764 systematically target underage females, groom them, extort them, and force them to mutilate themselves or others and either film or photograph such activity, at times while streaming it online for other members of the network. The network members will then commonly edit compilation photographs or videos of their victims, share these photographs or videos on their social media platforms to gain notoriety among other members of the network, and spread fear among their victims all for the purpose of accelerating chaos under the 764 ideology with an aim toward the disruption of society. The network has shifted names over time and spawned known offshoot networks. Although the network moves between social media channels and changes its name, the core goals and membership remain consistent and appear under the overarching threat of 764.

    Since approximately 2021, “Convict” has appeared as a participant in chatrooms related to the online terror networks 764 and CVLT. According to the complaint, Martin admitted to using the moniker “Convict” on social media platforms and, on multiple occasions, claimed online to be an owner of 764 and CVLT, teaching 764 members how to extort victims, describing himself as the “king of extortion,” and boasting he was “the catalyst for thousands of extortions” in 764. Martin also created and posted on a social media platform a detailed guide on how to identify, groom, and extort vulnerable juveniles.

    The complaint accuses Martin of producing child sex abuse material on Discord, a chat and gaming platform, in September 2022, by making two separate minors self-mutilate for him. On one occasion, Martin had a 13-year-old child cut his name “in every possible place” she could to include her chest, stomach, and thighs, and threatened to “leak” pictures of her if she did not comply. On other occasions, Martin directed this same minor child to cut certain designs into her body to include swastikas and satanic symbols.

    Martin also directed another minor victim, 16, on Discord, to scratch herself with her nails, ordering her to “draw blood,” saying “I want it dripping.” He then told her to pour rubbing alcohol over the wounds. Martin later sent three videos of this sadistic abuse of the minor to another Discord user. In the videos, the minor is scratching her forearm with her nails and pouring rubbing alcohol onto the scratches before curling up in apparent pain with a rag in her mouth.

    Martin is also accused of cyberstalking a different 13-year-old minor for threats he sent over Discord in September 2022. Martin told this minor victim he put a “hit” on her grandmother, and he solicited individuals to kill the victim’s grandmother. Martin agreed to pay one person $3,000 to kidnap and murder the victim’s grandmother, whose address he provided. The complaint alleges that in a separate server chat, Martin posted the phone numbers of both the minor and her grandmother and told the network to contact both numbers to harass them.

    If convicted, Martin faces a penalty of up to 30 years in prison for producing child sexual abuse material and a penalty of up to 10 years in prison for cyberstalking when the victim is a minor and no bodily injury resulted from the conduct. Each offense also carries a fine of up to $250,000 and up to a lifetime of supervised release. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    The FBI is investigating the case.

    Assistant U.S. Attorneys Liza Granoff and Carin C. Duryée for the District of Arizona and Trial Attorneys Justin Sher and James Donnelly of the National Security Division’s Counterterrorism Section are prosecuting the case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend, and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    A complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: Computer Programmer Convicted for Helping Run One of the Biggest Illegal Television Show Streaming Services in the United States

    Source: US FBI

    After a two-week trial, a federal jury in Las Vegas yesterday convicted a Cuban citizen and U.S. permanent resident for helping operate an illegal streaming service with one of the largest quantities of infringing works. The defendant, who was convicted of one count of conspiracy to commit criminal copyright infringement, is the eighth and final defendant to be convicted in the case.

    According to court documents and evidence presented at trial, Yoany Vaillant, 43, worked as a computer programmer for Jetflicks, an online, subscription-based service headquartered in Las Vegas that permitted users to stream and, at times, download copyrighted television episodes without the permission of relevant copyright owners. At one point, Jetflicks claimed to have 183,285 different television episodes, far more than Netflix, Hulu, Vudu, Amazon Prime, Disney+, or any other licensed streaming service. At Jetflicks, Vaillant worked directly with Kristopher Dallmann and Jared Jaurequi, who were convicted of criminal copyright offenses by a different jury earlier this year.

    According to his resume, Vaillant had 15 years of computer programming experience when he started at Jetflicks and knew 27 computer languages. During the four-and-a-half months that Vaillant worked at Jetflicks he made significant contributions to the operation of the service, including fixing issues affecting the automated downloading, processing, syncing, uploading, and streaming of Jetflicks’ inventory of infringing television episodes.

    Evidence at trial showed that Vaillant and his co-conspirators scoured the internet to find infringing television programs from pirate sites around the world — including some of the biggest sites specializing in infringing content such as The Pirate Bay, RARBG, altHUB, and Nzbplanet — using automated software and computer scripts that ran nonstop. Vaillant and his co-conspirators reproduced hundreds of thousands of copyrighted television episodes without authorization and streamed the infringing programs to tens of thousands of paid subscribers located throughout the United States, often providing episodes to subscribers the day after the shows originally aired on television. The vast scale of Jetflicks’ piracy affected every significant copyright owner of a television program in the United States and resulted in millions of dollars of losses to the U.S. television show and streaming industries.

    Vaillant was one of eight defendants indicted in the Eastern District of Virginia in 2019 for running Jetflicks. In that case, Vaillant’s co-defendant Darryl Polo, a computer programmer, pleaded guilty to four criminal copyright counts and one money laundering count, which related to Jetflicks as well as another illegal streaming site he operated. Co-defendant Luis Villarino, also a computer programmer, pleaded guilty to conspiracy to commit criminal copyright infringement at Jetflicks. The court sentenced Polo to four years and nine months in prison and Villarino to one year and one day in prison.

    In February 2022, the court transferred the case to the District of Nevada for trial. The court in the District of Nevada subsequently severed Vaillant’s case from the other remaining five defendants — Dallmann, Jaurequi, Douglas Courson, Felipe Garcia, and Peter Huber — and those defendants were tried in Las Vegas last June. Dallmann ran the Jetflicks operation with assistance from Jaurequi and Courson; Garcia was in charge of customer support and helped obtain television show content; and Huber provided computer programming services. A jury found all five defendants guilty of conspiracy to commit criminal copyright infringement, and Dallmann was also found guilty of three additional counts of criminal copyright infringement and two counts of money laundering by concealment. This was the largest internet piracy case by volume of infringed works — and first illegal streaming case — ever to go to trial.

    The court will sentence Dallmann, Courson, Garcia, Jaurequi, Huber, and Vaillant on Feb. 3 and 4, 2025. The court will determine any sentences after considering the U.S. Sentencing Guidelines and other statutory factors.

    Principal Deputy Assistant Attorney General Nicole M. Argentieri, head of the Justice Department’s Criminal Division; U.S. Attorney Jason M. Frierson for the District of Nevada; and Assistant Director in Charge David Sundberg of the FBI Washington Field Office made the announcement.

    The FBI Washington Field Office investigated the case, with assistance from the FBI Las Vegas Field Office.

    Senior Counsel Matthew A. Lamberti, Trial Attorney Michael Christin, and Acting Deputy Chief Christopher S. Merriam of the Criminal Division’s Computer Crime and Intellectual Property Section, and Assistant U.S. Attorney Jessica Oliva for the District of Nevada are prosecuting the case.

    MIL Security OSI

  • MIL-OSI Security: Brooklyn Man Admits to Fraudulently Entering Competitor Laboratory, Destroying and Stealing Equipment

    Source: US FBI

    NEWARK, N.J. –  A Brooklyn, New York man admitted to having entered a laboratory business on false pretenses and destroying and stealing that business’ equipment, U.S. Attorney John Giordano announced.

    Eric Leykin, 33, of Brooklyn, New York, pleaded guilty before U.S. District Judge Esther Salas in Newark federal court to a one-count indictment charging him with wire fraud.

    According to documents filed in this case and statements made in court:

    Leykin was the CEO of a clinical reference laboratory based in New Jersey. Leykin’s laboratory competed against the victim business, another clinical reference laboratory also based in New Jersey.  On June 30, 2022, Leykin bought and activated a prepaid mobile phone and called an employee of the victim business, claiming to be a technician with a vendor that the victim business used to service its laboratory equipment. On that false pretense, Leykin arranged with the victim business’ employee to come to the victim business on the following day, supposedly to service the victim business’ laboratory equipment. On July 1, 2022, the date of the supposed service appointment, Leykin went to the victim business, entered the premises fraudulently posing as a vendor technician, and proceeded to destroy a significant amount of the victim business’ laboratory and computer equipment. Leykin also stole multiple hard drives housed within the victim business’ equipment.

    The wire fraud count carries a maximum potential penalty of 20 years in prison and a maximum fine of either $250,000 or twice the gain or loss from the offense, whichever is greatest. Sentencing is scheduled for July 22, 2025.

    U.S. Attorney Giordano credited special agents of the FBI, under the direction of Acting Special Agent in Charge Terence G. Reilly in Newark, with the investigation leading to the guilty plea.  U.S. Attorney Giordano also thanked the Essex County Prosecutor’s Office, under the direction of Prosecutor Theodore N. Stephens II, and the Millburn Police Department, under the direction of Chief Brian Gilfedder, for substantial assistance provided to the investigation.

    The government is represented by Assistant U.S. Attorneys Andrew M. Trombly, Deputy Chief of the Cybercrime Unit, and Chana Y. Zuckier of the Bank Integrity, Recovery, and Money Laundering Unit.

                                                               ###

    Defense counsel: Albert Dayan, Esq.; Robert DeGroot, Esq.; Oleg Nekritin, Esq.

    MIL Security OSI

  • MIL-OSI Security: Registered Sex Offender Sentenced to 10 Years in Federal Prison for Child Pornography Offense

    Source: US FBI

    FORT SMITH – A Van Buren man was sentenced today to 120 months in prison followed by 10 years of supervised release on one count of Transportation of Child Pornography. The Honorable P.K. Holmes III presided over the sentencing hearing in the U.S. District Court in Fort Smith.

    According to court documents, James Allen Price, age 42, is a registered sex offender. In July 2023 law enforcement was alerted by NCMEC (National Center for Missing and Exploited Children) that someone had emailed child pornography from one email account to another. Subsequent law enforcement investigation identified Price as the owner of both email accounts. A federal search warrant was conducted on Price’s residence and electronic devices were seized. Price was interviewed by law enforcement where he admitted to emailing himself child pornography. Price possessed images of children under the age of twelve years old.

    U.S. Attorney David Clay Fowlkes of the Western District of Arkansas made the announcement.

    The Federal Bureau of Investigation, Van Buren Police Department and Joplin, Missouri Police Department investigated the case.

    Assistant U.S. Attorney Carly Marshall prosecuted the case.

    This case was prosecuted as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    Related court documents may be found on the Public Access to Electronic Records website @ www.pacer.gov.

    MIL Security OSI

  • MIL-OSI Security: World Day Against Trafficking in Persons

    Source: US FBI

    LITTLE ROCK, AR—Today, the FBI recognizes World Day Against Trafficking of Persons. The FBI investigates over 1,000 cases of human trafficking each year and is continually evolving and adapting efforts and resources to outpace this rapidly growing criminal industry.

    The most effective way to investigate human trafficking is through a collaborative, multi-agency approach with our federal, state, local, and tribal partners. FBI Child Exploitation and Human Trafficking Task Forces operate within nearly every FBI field office. These task forces seek to recover victims and investigate traffickers at the state and federal level.

    Human trafficking is the illegal exploitation of a person for labor or services. Anyone can be a victim of human trafficking, and it can occur in any U.S. community—cities, suburbs, and even rural areas. The FBI investigates human trafficking cases under its Crimes Against Children and Human Trafficking program. We take a trauma informed, victim-centered approach to these cases.

    “Human trafficking is one of the most vile and horrific crimes the FBI investigates,” said FBI Little Rock Special Agent in Charge Alicia D. Corder. “FBI Little Rock relentlessly works with our law enforcement partners, non-governmental agencies, and other nonprofits on the frontline to combat human trafficking in Arkansas.”

    Since 2020, the FBI has received nearly 2000 human trafficking tips from the public. While all reports have not resulted in investigations, the FBI encourages the public to continue to report suspicion of human trafficking activity.

    More information about how the FBI investigates human trafficking can be found on the FBI website.

    To report human trafficking, call the National Human Trafficking Resource Center (NHTRC) at 1-888-373-7888 or text 233733. NHTRC is a national, toll-free hotline, with specialists available to answer calls from anywhere in the country, 24 hours a day, seven days a week. Tips can also be submitted on the NHTRC website. Tips involving children in trafficking situations should be submitted through the National Center for Missing & Exploited Children’s CyberTipline or call 1-800-THE-LOST.

    MIL Security OSI