Category: Police

  • MIL-OSI New Zealand: More than $2.5m worth of assets restrained in undeclared tobacco case

    Source: New Zealand Police (National News)

    A discovery of undeclared tobacco by the New Zealand Customs Service has resulted in the restraint of more than NZ$2.5 million worth of assets by New Zealand Police under the Criminal Proceeds (Recovery) Act 2009.

    This case shows crime doesn’t pay, and profiting from criminal activities will eventually catch up with people, say the agencies.

    In November 2023, Customs intercepted 110 kilograms of loose tobacco and over 230,000 cigarettes (or approximately 10,000 packets) concealed in Chinese tea packets destined for residential and business addresses in Napier and Gisborne.

    No importation permits were held for the seized tobacco and cigarettes, and no excise equivalent duties were paid, amounting to around $645,000 in defrauded revenue.

    Further investigations identified previous similar consignments had been successfully imported into New Zealand and were being sold by a restaurant in Gisborne to the public.

    In March 2024, Customs carried out search warrants in Gisborne and located $10,000 cash in a bedroom, $106,371.20 cash inside a vehicle parked outside the restaurant, and over a kilogram of loose tobacco along with 11,000 cigarettes inside the restaurant.

    The Customs investigation resulted in the seizure of 306,200 cigarettes in total, and charges were laid against four people for various offences under the Customs and Excise Act 2018.

    With court proceedings still underway, the Police Asset Recovery Unit applied to the court and was granted restraint of the cash seized in the investigation along with further money from bank accounts, as well as four residential properties in Gisborne.

    In total, over $2.5m in assets has been restrained, and a forfeiture of the money and residential properties will be sought by the Police Asset Recovery Unit at the conclusion of the criminal charges.

    Detective Senior Sergeant Mike Fischer from the Central Asset Recovery Unit said this investigation shows the reach of the Criminal Proceeds (Recovery) Act, and how closely Police are working with other government organisations to disrupt the flow of illicit funds.

    “Funds sourced from any type of illegal activity can form the basis of criminal proceeds action. In this case, the blatant disregard of the law for personal gain has helped Customs and Police uncover a large-scale fraud generating a high amount of income, from an activity that is unfortunately becoming more and more common,” he said.

    Chief Customs Officer, Nigel Barnes, said that illicit tobacco is not a victimless crime.

    “It takes money out from our communities and puts it in the pockets of organised crime groups that then go on to use the money for other crimes,” Mr Barnes says.

    “The motive for this offending is you can make a lot of money with low risk – but it’s not actually low-risk, and this is a prime example of how criminals can expect to lose their ill-gotten gains.”

    If you know or suspect someone may be involved in illegal smuggling, call Customs on 0800 WE PROTECT (0800 937 768), a 24-hour confidential hotline, or contact Crimestoppers anonymously on 0800 555 111.

    ENDS

    Issued by Police Media Centre

    MIL OSI New Zealand News

  • MIL-OSI Australia: Call for information – Disturbance – Wadeye

    Source: Northern Territory Police and Fire Services

    Northern Territory Police are calling for information after an incident in Wadeye last week.

    Around 4pm on Thursday 19 December 2024, it is alleged that a man was damaging a vehicle within the community when he was confronted by the owner, who went on to perform a citizen’s arrest.

    Police attended the scene and the man who allegedly damaged the vehicle was arrested, however, has since been released pending further investigations.

    Local police are continuing to investigate the incident and a number of witnesses statements have been obtained.

    Police are aware that footage of the incident is circulating on social media and are urging anyone with information on the incident to contact police on 131 444 or to visit your local station.

    MIL OSI News

  • MIL-OSI Australia: Man charged with drug trafficking, Burnie

    Source: Tasmania Police

    Man charged with drug trafficking, Burnie

    Monday, 23 December 2024 – 2:43 pm.

    A 37-year-old Burnie man has been charged with drug trafficking and other drug offences after Taskforce Scelus intercepted a vehicle in Burnie this morning.
    The vehicle and its occupants were searched, and officers seized $42,000 in cash and quantities of methylamphetamine, GHB and cannabis.
    The man who was driving the vehicle was arrested and bailed to face the Burnie Magistrates Court at a later date.
    Anyone with information about illicit drug distribution or importation should contact police on 131 444 or Crime Stoppers Tasmania at crimestopperstas.com.au. You can stay anonymous.

    MIL OSI News

  • MIL-OSI New Zealand: Appeal for information following woman’s death, Lower Hutt

    Source: New Zealand Police (District News)

    Please attribute to Detective Inspector Nick Pritchard, Wellington Police:

    Police are investigating after the death of a Wellington woman who died in hospital after she was admitted following an assault just over a week ago.

    The victim, 53-year-old Lillian Wharton, died in Wellington Hospital on Thursday (19 December 2024).

    Police are still working to establish the circumstances surrounding her death and are treating it as unexplained at this stage.

    On Saturday 14 December, Lillian was at a friend’s address in Lower Hutt and left with people known to her to walk back to her home on Waiwhetu Road.

    At some point after the leaving the address she was assaulted and admitted to hospital in a serious condition before she passed away on Thursday.

    Police have charged a man, who is known to the victim, with assault, assault with intent to injure and injuring with intent to injure and he appeared in Lower Hutt District Court yesterday where he was remanded in custody until his next appearance.

    Police are asking the public for any sightings on Saturday 14 December, between 8pm and 10pm, of two adult women and one male. One of the women was pushing a pram.

    We are asking if anyone saw them or anything of concern between Randwick Road, York Street, Awamutu Road, Leighton Avenue and around the intersections of Whites Line East and Waiwhetu Road.

    We would ask anyone who has information which may assist our enquiries to please update Police online or call 105 quoting file number 241219/9880. Information can also be provided anonymously via Crime Stoppers on 0800 555 111. 

    ENDS

    Issued by Police Media Centre

    MIL OSI New Zealand News

  • MIL-OSI Australia: Arrest – Domestic Violence – Central Desert

    Source: Northern Territory Police and Fire Services

    Northern Territory Police have arrested a 36-year-old man in relation to a domestic violence assault that occurred in Harts Range early this morning.

    Around 4:40am, the Joint Emergency Services Communication Centre (JESCC) received a report that a 31-year-old woman had been assaulted by a man with a blunt weapon at a residence within the community.

    Police responded and arrested the man without incident after he fled into nearby bushland.

    The woman suffered significant injuries to her legs and is currently being conveyed to Alice Springs Hospital for treatment.

    Investigations are ongoing and police urge anyone who has information to contact police on 131 444 and quote reference P24357246. You can also anonymously report through Crime Stoppers on 1800 333 000 or via https://crimestoppersnt.com.au/.

    Support services for those affected by domestic or family violence are available, including 1800RESPECT (1800 737 732) and Lifeline (13 11 14).

    MIL OSI News

  • MIL-OSI Australia: Stay safe this Christmas and enjoy a happy New Year

    Source: Northern Territory Police and Fire Services

    A message from Police Commissioner Michael Murphy APM

    As Christmas morning 2024 draws near, our thoughts turn to a day etched into Darwin’s history: 50 years ago, the fury of Cyclone Tracy tore through this city, leaving devastation in its wake and testing the grit and determination of all Territorians.

    On that fateful morning in 1974, Tracy battered our shores with winds so ferocious they forever changed the landscape – and the psyche – of our community. Yet, out of the wreckage, Darwin rose stronger, prouder, and more united than ever before.

    That spirit of resilience still lives on today. In the face of any emergency – be it a cyclone, flood, bushfire, or other crisis – your Northern Territory Police Force stands ready and willing to step forward and protect all who call this place home. Through rigorous planning, training, and preparation, we remain unwavering in our commitment to the safety and wellbeing of Territorians.

    This Christmas, as we pause to remember the hardships endured in 1974, we also celebrate the extraordinary unity that carried us through. It is that same sense of togetherness that will guide us whenever danger looms anywhere in the Territory. From the lessons of Cyclone Tracy, we know there is no storm we cannot weather if we stand shoulder to shoulder.

    So, as you gather with loved ones this festive season, reflect on the legacy of a city rebuilt, and on the courage it took to get us here. And know this: the NT Police Force will be here to safeguard our community – ready to act swiftly and decisively, no matter what comes our way.

    On Behalf of the Northern Territory Police Force, enjoy a safe and Merry Christmas and a happy New Year.

    MIL OSI News

  • MIL-OSI New Zealand: Napier homicide investigation: Third arrest made

    Source: New Zealand Police (National News)

    Police have arrested a third man, aged 19,  in relation to the death of Boy Taylor. 

    He will be appearing in the Hastings District Court on Tuesday 24 March charged with wounding with intent to cause grievous bodily harm.

    The investigation is ongoing, and Police cannot rule out further arrests and charges.

    ENDS

    Issued by Police Media Centre

    MIL OSI New Zealand News

  • MIL-OSI New Zealand: Correction – Napier homicide investigation: Third arrest made

    Source: New Zealand Police (District News)

    An earlier release stated the third man arrested in relation to the death of Boy Taylor will appear in Hastings District Court in March.

    The correct date is tomorrow, 24 December.

    We apologise for any confusion caused.

    ENDS 

    Issued by Police Media Centre 

    MIL OSI New Zealand News

  • MIL-OSI United Kingdom: Should young voters be able to use TfL travelcards for voter ID?

    Source: Mayor of London

    In its wide-ranging review of the 2024 Mayor of London and London Assembly Elections, the London Assembly Elections Review Working Group wants Transport for London (TfL) to provide the Greater London Authority (GLA) with details of how many people hold each of its photo ID cards. As government reviews the list of eligible photo ID, the Working Group has also asked how secure TfL considers the application processes for these cards to be, and the GLA should use this information to advocate for Londoners.

    The Working Group found that while photo ID requirements introduced before the elections did not create a “London-wide problem”:

    • 5,621 voters were recorded by polling station staff in London as being initially turned away due to lack of photo ID. Of these, 4,103 returned to vote and 1,518 did not.
    • Some Londoners believe that the list of acceptable ID is exclusionary for certain demographics, which has the potential to cause damage to people’s engagement in democracy.

    The Group welcomed the Government’s review of the list of eligible photo ID and recommends that this should include consideration of groups particularly impacted – including young people, ethnic minority groups and disabled people – and how this policy will interact with government manifesto commitments, such as lowering the voting age to 16.

    In its report, the Group also noted that the Government’s Devolution White Paper did not give any detail on plans for the future of the Mayoral voting system. The report urges the government to provide clarity on its position before May 2025 to help election planning for 2028, and to ensure that any changes are lasting and take into account the views of Londoners.

    The GLA elections in May 2024 were the first to take place in London since the Elections Act 2022 brought in several changes, including the requirement for voters to bring photo ID to polling stations, the move to a manual count, and introduction of a first past the post system in the Mayoral vote.

    Further recommendations include:

    • The GLA and Metropolitan Police should conduct a review of abuse and intimidation of candidates at the GLA Elections, setting out how these issues were dealt with and what further lessons it can learn from national and local government.
    • The Government should remove the ‘mixing requirement’ for a manual count in GLA Elections legislation to allow for more granular data to be published. 

    Chair of the Elections Review Working Group, Len Duvall OBE AM, said:

    “The GLA elections are of a different magnitude to all other regional elections in the UK in their size and complexity: nearly 7.5 million ballots were counted in the May 2024 elections, with two different voting systems for administrators to manage across all 32 London Boroughs.

    “Considering the extent of the changes made before these elections, it is a huge achievement that they were run as smoothly and as effectively for Londoners as we have found.

    “There remain some issues that must be addressed before the next elections are held. The Working Group is concerned by the evidence that Voter ID requirements are having a disproportionate impact on certain groups, and we urge the government to address this in its upcoming review of acceptable forms of ID.

    “Londoners also need clarity on the voting system to be used for the next Mayoral elections. The government should swiftly set out its intentions and – crucially – ensure that the public’s views on the proposals are taken into account.”

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: BLOG: How we’re tackling rogue landlords

    Source: City of Liverpool

    One year ago, Liverpool City Council launched a Private Sector Housing Intelligence and Enforcement Task Force, and the results have made a real difference in our city. Tom Mullan from the team reflects on the last year...

    This anniversary gives us a chance to celebrate the team’s achievements in disrupting rogue landlords, improving housing conditions and creating safer communities. Through multi-agency collaboration, intelligence sharing and enforcement, the Task Force has delivered significant outcomes that benefit our city and its residents.

    The Task Force, established with funding from the Ministry of Housing, Communities and Local Government’s (MHCLG) Pathfinders Programme, was tasked with establishing new and innovative ways to combat landlords who:

    • Ignore their legal obligation to license properties
    • Fail to meet safety standards for tenants
    • Use properties for illegal activities, like drug-related crime or human trafficking

    Cllr Sam East, Cabinet Member for Housing, emphasised the importance of the initiative: “This Task Force was established to proactively target and disrupt rogue and criminal landlords and managing agents operating in the private sector in Liverpool and the threats they pose to our city’s vulnerable residents, safe neighbourhoods and community cohesion. The team’s collaborative, intelligence-led, multi-agency approach is a real success.”

    Some of our achievements so far…

    Improved housing safety
    Over 129 serious hazards were identified in private rental properties, with 139 enforcement notices issued, including 21 Housing Act Improvement Notices and a further 8 Emergency Prohibition Orders.

    Disrupting criminal activity
    Joint operations with Merseyside Police and the Home Office resulting in the seizure of £13 million (street value) of cannabis and the emergency closure of eight properties.

    Creating trusting relationships
    Established service level data sharing agreements with the other local authorities in the Liverpool City Region and our external partners to foster joint working in tackling rogue and criminal landlords.

    Safeguarding vulnerable residents
    Investigated over 20 properties linked to human trafficking and sexual exploitation, working with our third sector partner, Changing Lives, to provide support for victims.

    Investigating Trading Standards
    Proactively investigated and enforced trading standards compliance on over 40 managing and letting agents operating in Liverpool.

    Making an impact across the country
    Submitted 586 intelligence reports to a national database, helping disrupt criminal operations locally and nationwide, and partnered with Shelter to develop e-learning modules for agents on tenant rights, deposit security and consumer protections.

    Cllr Laura Robertson-Collins, Cabinet Member for Neighbourhoods, Communities & Streetscene, said: “The targeted work across the city has had a real impact, improving housing conditions and creating safer neighbourhoods for our residents. Their proactive partnership working with Merseyside Police, housing providers and local voluntary organisations is helping to restore pride in our communities and make a real difference in people’s lives.”

    Making a difference in our communities

    Beyond the numbers, the Task Force’s work is creating safer, more stable communities:

    In Norris Green, operations reduced drug-related crime and anti-social behaviour by targeting rogue landlords and unsafe properties.

    Cllr Kevin Pilnick reflects on the work in his ward: “The team’s targeted operations in the Norris Green area have made a real difference.  Their work with the Council’s community co-ordinators and neighbourhood managers, alongside other stakeholder agencies, is helping to reduce anti-social behaviour and drug-related crime.”

    Working together to make an impact

    This progress is the result of teamwork across the council and partnerships with external agencies. Here’s what some of our partners had to say:

    Sarah Clarke, from Changing Lives, said: “The collaborative working that we undertake with the Task Force in Liverpool provides us with critical opportunities to offer safeguarding to victims of adult sexual exploitation and human trafficking who face significant harm from organised crime groups.  We cannot safeguard in silo and the joint working has evidenced this.”

    Peter Yoh, Head of Liverpool City Region Housing at Riverside: “The partnership working and intelligence sharing is proving vital to the success in making a real difference to customers of the private rented sector living within our communities.  Our collaborative approach with the Council’s Task Force is resulting in enforcement action being taken against irresponsible landlords, which is stabilising communities and sustaining tenancies.”

    Merseyside Police said: “Merseyside Police works in close partnership with the Task Force and other partner agencies from the voluntary and community sector, establishing a multi-agency approach to engaging the local community and gathering intelligence for detecting and disrupting sexual exploitation and supporting victims.”

    Looking Ahead

    With three months left in its current phase, the Task Force is already embedding its strategies into Liverpool City Council’s long-term private sector housing operations. The aim is to make our proactive, intelligence-led approach a standard for how we handle housing enforcement.

    If you have any concerns about rogue and criminal landlords, please contact privatesectorhousing.intel@liverpool.gov.uk or use our freephone number 0800 707 6245.

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Council staff seize fake goods from St Johns

    Source: City of Liverpool

    High-end clothing deals have turned out to be too good to be true at St John’s Precinct, as bags of counterfeit products are seized by Liverpool City Council. 

    The Council’s Trading Standards team, working in partnership with Merseyside Police, has removed hundreds of fake goods after receiving a report from a member of the public.  

    An inspection of five stores in St Johns resulted in 280 counterfeit items of clothing being seized, including fake versions of White Fox, Prada and Diesel. Although the items were being sold at bargain prices, the haul would be worth approximately £25,000 if they were real. 

    In a previous operation earlier this year, the team seized over 1,500 fake products, believed to be worth roughly £15,000 in total. Items included a haul of fake Apple, Samsung and Sony items, which could have posed a serious safety risk to potential buyers. 

    As well as counterfeit goods, the Council has recently cracked down on the selling of illegal vapes. Since January 2024, over 18,000 vapes have been seized, estimated to be worth around £220,000. The vapes were found to have exceeded the legal limit of nicotine and could be harmful to people using them. 

    To help remove any health and safety risk to the public, all reported counterfeit or illegal goods are investigated and seized. Where possible, any branding will be taken off the items before they are recycled or donated. In cases where items are unsafe, they will be destroyed.

    Cllr Laura Robertson-Collins, Liverpool City Council’s Cabinet Member for Communities, Neighbourhoods and Streetscene said: “Everyone loves a good bargain, especially in the lead up to Christmas, but we want everyone to be vigilant about counterfeit goods. 

    “Thanks to keen-eyed shoppers, we were alerted to a number of shops selling fake items to the public. Our Trading Standards team, along with Merseyside Police, acted quickly to inspect these items and take them off the shelves for good. 

    “While they might look like the real thing, counterfeit clothing is usually made from poor quality materials and may be easily flammable or otherwise unsafe. It might seem like a good deal now, but it could cost you dearly in the long run.” 

    Anyone concerned about fake goods can report them on the Council website or by calling Crimestoppers on 0800 555 111.  

    MIL OSI United Kingdom

  • MIL-OSI Security: Renewed appeal in connection with murder of Fiona Holm

    Source: United Kingdom London Metropolitan Police

    The Met is renewing its reward of up to £20,000 for help finding the remains of a murdered woman, as her family face their second Christmas without her.

    The reward is on offer for information leading to the recovery of the remains of 48-year-old Fiona Holm.

    Fiona was last seen alive leaving a residential address in Verdant Lane, Catford, on 20 June, 2023. She was reported missing nine days later.

    Her partner, Carl Cooper, was jailed for life in July for her murder which took place in the living room of his flat in Broadfield Road, Catford. Cooper lied to Fiona’s family and police, and took extensive steps to cover up the killing. Fiona’s body has never been recovered.

    Cooper was also convicted of murdering another girlfriend, 41-year-old Naomi Hunte, who was found dead at her home in Woolwich in 2022.

    Detective Chief Inspector Kate Blackburn, who leads the investigation, said: “My team has carried out a huge amount of work to try to find Fiona, using specialist teams to search areas she was known to frequent, open spaces, bodies of water, houses, cars and lockups. Thousands of hours of CCTV has been seized and viewed, substantial mobile phone enquiries have been reviewed and hundreds of witness statements have been taken, including interviews with Fiona’s family and friends. Those efforts have continued since Cooper’s conviction.

    “This Christmas, our thoughts are with Fiona’s family, who are still waiting for answers almost two years after her tragic murder. Our thoughts are also with Naomi’s family at this difficult time.

    “I am appealing to anybody who may be able to assist the ongoing search for Fiona’s remains to come forward, no matter how insignificant you think your information could be. Perhaps now Cooper has been convicted, you feel able to come forward and tell us what you know or have heard.”

    Fiona’s family have described her as a kind and loving person, and say they are tormented by the lack of closure.

    Fiona’s daughter Savannah said: “This year is the second Christmas without my beloved mother. As the heartache still continues, the restless nights go on knowing that she has been out there this long, and no-one has come forward with any information, which I find disturbing.

    “The thought of us finding her remains is sickening to think about, but this would also bring my whole family peace.

    “My Nan has not been the same since. The only thing she worries about is where her daughter is, as she wants her to be found. Nan misses her daughter’s big heart and kind ways the most.”

    If you have any information, please contact the incident room on 020 8721 4005, or 999 if you need urgent police attendance. If you want to give your information anonymously, you can contact Crimestoppers on 0800 555 111.

    MIL Security OSI

  • MIL-OSI Economics: sante-Itd.com.co: BaFin investigates Sante Limited

    Source: Bundesanstalt für Finanzdienstleistungsaufsicht – In English

    The Federal Financial Supervisory Authority (BaFin) warns consumers about the company Sante Limited and the services it is offering. BaFin has information that the company is offering banking business and/or financial services on its website sante-Itd.com.co without the required authorisation. The company is not supervised by BaFin.

    Banking business and financial services may only be offered in Germany with authorisation from BaFin. However, some companies offer these services without the required authorisation. Information on whether particular companies have been authorised by BaFin can be found in BaFin’s database of companies.

    The information provided by BaFin is based on section 37 (4) of the German Banking Act (Kreditwesengesetz – KWG).

    Please be aware:

    BaFin, the German Federal Criminal Police Office (BundeskriminalamtBKA) and the German state criminal police offices (Landeskriminalämter) recommend that consumers seeking to invest money online should exercise the utmost caution and do the necessary research beforehand in order to identify fraud attempts at an early stage.

    MIL OSI Economics

  • MIL-OSI Asia-Pac: Opening ceremony of reprovisioned Chung Ying Street Checkpoint in Sha Tau Kok held today (with photos)

    Source: Hong Kong Government special administrative region

    Opening ceremony of reprovisioned Chung Ying Street Checkpoint in Sha Tau Kok held today (with photos/video)
    Opening ceremony of reprovisioned Chung Ying Street Checkpoint in Sha Tau Kok held today (with photos/video)
    ******************************************************************************************

         The opening ceremony of the reprovisioned Chung Ying Street Checkpoint in Sha Tau Kok was held today (December 23). A pilot scheme for facial recognition technology has been introduced at the new checkpoint, allowing people living or working at Chung Ying Street to access the area unimpeded through “contactless channels” without having to stop and produce their Closed Area Permit (CAP) or use their fingerprint to verify their identity. The aim is to facilitate the flow of people and enhance the checkpoint’s processing capacity.     Addressing the opening ceremony, the Chief Secretary for Administration, Mr Chan Kwok-ki, noted that to facilitate entry to and exit from Chung Ying Street, the Government has replaced the former checkpoint made up of marquees with a permanent structure, and for the first time introduced facial recognition technology. This allows people living and working on Chung Ying Street to be the first to use “contactless channels” for unimpeded access. The Government will continue to explore the application of relevant technology to complement the future opening of Chung Ying Street for tourism. In the future, holders of valid CAPs for access to Chung Ying Street may, upon prior enrolment, pass through the checkpoint via “contactless channels”. In adopting the pilot scheme, the Government hopes to replace the current mode of manual inspections through applying innovative technology to assist users of the checkpoint, enhance the checkpoint’s capacity, and highlight Hong Kong’s high-quality digital technology as an international metropolis.     Mr Chan also expressed his gratitude to the various government departments and organisations for their joint efforts in the successful completion of the reprovision project, thereby providing better facilities for Chung Ying Street, an area rich in unique historical and cultural value.     The checkpoint’s design has integrated historical and modern elements, showcasing the characteristics of Hong Kong’s traditional train stations. Its exterior wall is decorated with copper plate engravings featuring a historical train, preserving the history of the branch line. In addition, multiple energy-saving designs have been incorporated in the checkpoint which combines functionality and aesthetics, creating a cultural landmark for Chung Ying Street.     ???Other officiating guests included the Secretary for Security, Mr Tang Ping-keung; the Permanent Secretary for Security, Mr Patrick Li; the Commissioner of Customs and Excise, Ms Louise Ho; the Director of Immigration, Mr Kwok Joon-fung; the Deputy Commissioner of Police (Operations), Mr Chow Yat-ming; the Deputy Director of Architectural Services, Mr Alan Sin; the Chairman of the New Territories Heung Yee Kuk, Mr Kenneth Lau; and the Chairman of the Sha Tau Kok District Rural Committee, Mr Lee Koon-hung.

     
    Ends/Monday, December 23, 2024Issued at HKT 18:56

    NNNN

    MIL OSI Asia Pacific News

  • MIL-OSI Security: Met release photo after serious assault near Covent Garden

    Source: United Kingdom London Metropolitan Police

    Officers investigating the assault of two men in Westminster – leaving one with life-changing injuries – have issued an image of a suspect they are keen to trace.

    Police were called at 22.33hrs on Saturday, 12 October, by an off-duty officer, who reported being punched in the back of the head in Covent Garden, close to the Royal Opera House.

    The suspect then approached another man in nearby King Street and asked him for directions, before assaulting him. This man – aged in his 70s – was pushed to the ground, and suffered a bleed on his brain. He temporarily lost consciousness, and required 15 stitches to the back of the head.

    The officer, attached to the Central East Command Unit, was not injured.

    The suspect is described as white, around 5ft 9in tall, of medium build, and wearing a black jacket. He was last seen fleeing towards Bedford Street.

    The two victims are not known to each other, and, at this stage, there is no clear motive.

    Detective Sergeant Glenn Smith – attached to the Central West Command Unit – said: “This was a serious incident which left a man in his 70s with life-altering injuries.

    “The attacks were apparently random. We are appealing for witness accounts, or for any information that may assist the investigation.

    “In addition, we are releasing a CCTV image of a man police wish to speak to in light of the incident. Do you recognise him?”

    Anyone with information about either of the assaults should call 101, quoting CAD reference 7846/12OCT.

    To make an anonymous report, contact the independent charity Crimestoppers on 0800 555 111.

    MIL Security OSI

  • MIL-OSI Security: Elmsdale — Crash leads to arrest in connection to stolen vehicle

    Source: Royal Canadian Mounted Police

    December 20, 2024, Elmsdale PEI – A single-vehicle crash in Elmsdale yesterday afternoon led to the arrest of a 22-year-old man in connection to a stolen vehicle.

    Yesterday at 1:00 p.m., West Prince RCMP responded to a report of a single-vehicle crash involving a car and a telephone pole in Elmsdale. Police learned that the vehicle had been stolen, and the lone occupant fled on foot. Police located him a short distance away. He was treated for minor injuries and arrested. He was released on conditions and will appear in Summerside Provincial Court on February 5th at 9:30 to answer to charges in connection to this incident.

    MIL Security OSI

  • MIL-OSI Security: United States Charges Dual Russian and Israeli National as Developer of LockBit Ransomware Group

    Source: United States Attorneys General

    Defendant Rostislav Panev in Custody Pending Extradition from Israel to the United States

    Note: A copy of the superseding criminal complaint can be found here.

    A superseding criminal complaint filed in the District of New Jersey was unsealed today charging a dual Russian and Israeli national for being a developer of the LockBit ransomware group.

    In August, Rostislav Panev, 51, a dual Russian and Israeli national, was arrested in Israel pursuant to a U.S. provisional arrest request with a view towards extradition to the United States. Panev is currently in custody in Israel pending extradition on the charges in the superseding complaint.

    “The Justice Department’s work going after the world’s most dangerous ransomware schemes includes not only dismantling networks, but also finding and bringing to justice the individuals responsible for building and running them,” said Attorney General Merrick B. Garland. “Three of the individuals who we allege are responsible for LockBit’s cyberattacks against thousands of victims are now in custody, and we will continue to work alongside our partners to hold accountable all those who lead and enable ransomware attacks.”

    “The arrest of Mr. Panev reflects the Department’s commitment to using all its tools to combat the ransomware threat,” said Deputy Attorney General Lisa Monaco. “We started this year with a coordinated international disruption of LockBit — the most damaging ransomware group in the world. Fast forward to today and three LockBit actors are in custody thanks to the diligence of our investigators and our strong partnerships around the world. This case is a model for ransomware investigations in the years to come.”

    “The arrest of alleged developer Ratislav Panev is part of the FBI’s ongoing efforts to disrupt and dismantle the LockBit ransomware group, one of the most prolific ransomware variants across the globe,” said FBI Director Christopher Wray. “The LockBit group has targeted both public and private sector victims around the world, including schools, hospitals, and critical infrastructure, as well as small businesses and multi-national corporations.  No matter how hidden or advanced the threat, the FBI remains committed to working with our interagency partners to safeguard the cyber ecosystem and hold accountable those who are responsible for these criminal activities.” 

    “The criminal complaint alleges that Rotislav Panev developed malware and maintained the infrastructure for LockBit, which was once the world’s most destructive ransomware group and attacked thousands of victims, causing billions of dollars in damage,” said Principal Deputy Assistant Attorney General Nicole M. Argentieri, head of the Justice Department’s Criminal Division. “Along with our domestic and international law enforcement partner actions to dismantle LockBit’s infrastructure, the Criminal Division has disrupted LockBit’s operations by charging seven of its key members (including affiliates, developers, and its administrator) and arresting three of these defendants — including Panev. We are especially grateful for our partnerships with authorities in Europol, the United Kingdom, France, and Israel, which show that, when likeminded countries work together, cybercriminals will find it harder to escape justice.”

    “As alleged by the complaint, Rostislav Panev for years built and maintained the digital weapons that enabled his LockBit coconspirators to wreak havoc and cause billions of dollars in damage around the world,” said U.S. Attorney Philip R. Sellinger for the District of New Jersey. “But just like the six other LockBit members previously identified and charged by this office and our FBI and Criminal Division partners, Panev could not remain anonymous and avoid justice indefinitely. He must now answer for his crimes. Today’s announcement represents another blow struck by the United States and our international partners against the LockBit organization, and our efforts will continue relentlessly until the group is fully dismantled and its members brought to justice.”

    According to the superseding complaint, documents filed in this and related cases, and statements made in court, Panev acted as a developer of the LockBit ransomware group from its inception in or around 2019 through at least February 2024. During that time, Panev and his LockBit coconspirators grew LockBit into what was, at times, the most active and destructive ransomware group in the world. The LockBit group attacked more than 2,500 victims in at least 120 countries around the world, including 1,800 in the United States. Their victims ranged from individuals and small businesses to multinational corporations, including hospitals, schools, nonprofit organizations, critical infrastructure, and government and law-enforcement agencies. LockBit’s members extracted at least $500 million in ransom payments from their victims and caused billions of dollars in other losses, including lost revenue and costs from incident response and recovery.

    LockBit’s members comprised “developers,” like Panev, who designed the LockBit malware code and maintained the infrastructure on which LockBit operated. LockBit’s other members, called “affiliates,” carried out LockBit attacks and extorted ransom payments from LockBit victims. LockBit’s developers and affiliates would then split ransom payments extorted from victims.

    As alleged in the superseding complaint, at the time of Panev’s arrest in Israel in August, law enforcement discovered on Panev’s computer administrator credentials for an online repository that was hosted on the dark web and stored source code for multiple versions of the LockBit builder, which allowed LockBit’s affiliates to generate custom builds of the LockBit ransomware malware for particular victims. On that repository, law enforcement also discovered source code for LockBit’s StealBit tool, which helped LockBit affiliates exfiltrate data stolen through LockBit attacks. Law enforcement also discovered access credentials for the LockBit control panel, an online dashboard maintained by LockBit developers for LockBit’s affiliates and hosted by those developers on the dark web.

    The superseding complaint also alleges that Panev exchanged direct messages through a cybercriminal forum with LockBit’s primary administrator, who, in an indictment unsealed in the District of New Jersey in May, the United States alleged to be Dimitry Yuryevich Khoroshev (Дмитрий Юрьевич Хорошев), also known as LockBitSupp, LockBit, and putinkrab. In those messages, Panev and the LockBit primary administrator discussed work that needed to be done on the LockBit builder and control panel.

    Court documents further indicate that, between June 2022 and February 2024, the primary LockBit administrator made a series of transfers of cryptocurrency, laundered through one or more illicit cryptocurrency mixing services, of approximately $10,000 per month to a cryptocurrency wallet owned by Panev. Those transfers amounted to over $230,000 during that period.

    In interviews with Israeli authorities following his arrest in August, Panev admitted to having performed coding, development, and consulting work for the LockBit group and to having received regular payments in cryptocurrency for that work, consistent with the transfers identified by U.S. authorities. Among the work that Panev admitted to having completed for the LockBit group was the development of code to disable antivirus software; to deploy malware to multiple computers connected to a victim network; and to print the LockBit ransom note to all printers connected to a victim network. Panev also admitted to having written and maintained LockBit malware code and to having provided technical guidance to the LockBit group.

    The LockBit Investigation

    The superseding complaint against, and apprehension of, Panev follows a disruption of LockBit ransomware in February by the United Kingdom (U.K.)’s National Crime Agency (NCA)’s Cyber Division, which worked in cooperation with the Justice Department, FBI, and other international law enforcement partners. As previously announced by the Department, authorities disrupted LockBit by seizing numerous public-facing websites used by LockBit to connect to the organization’s infrastructure and by seizing control of servers used by LockBit administrators, thereby disrupting the ability of LockBit actors to attack and encrypt networks and extort victims by threatening to publish stolen data. That disruption succeeded in greatly diminishing LockBit’s reputation and its ability to attack further victims, as alleged by documents filed in this case.

    The superseding complaint against Panev also follows charges brought in the District of New Jersey against other LockBit members, including its alleged primary creator, developer, and administrator, Dmitry Yuryevich Khoroshev. An indictment against Khoroshev unsealed in May alleges that Khoroshev began developing LockBit as early as September 2019, continued acting as the group’s administrator through 2024, a role in which Khoroshev recruited new affiliate members, spoke for the group publicly under the alias “LockBitSupp,” and developed and maintained the infrastructure used by affiliates to deploy LockBit attacks. Khoroshev is currently the subject of a reward of up to $10 million through the U.S. Department of State’s Transnational Organized Crime (TOC) Rewards Program, with information accepted through the FBI tip website at www.tips.fbi.gov/.

    A total of seven LockBit members have now been charged in the District of New Jersey. Beyond Panev and Khoroshev, other previously charged LockBit defendants include:

    • In July, two LockBit affiliate members, Mikhail Vasiliev, also known as Ghostrider, Free, Digitalocean90, Digitalocean99, Digitalwaters99, and Newwave110, and Ruslan Astamirov, also known as BETTERPAY, offtitan, and Eastfarmer, pleaded guilty in the District of New Jersey for their participation in the LockBit ransomware group and admitted deploying multiple LockBit attacks against U.S. and foreign victims. Vasiliev and Astamirov are presently in custody awaiting sentencing.
    • In February, in parallel with the disruption operation described above, an indictment was unsealed in the District of New Jersey charging Russian nationals Artur Sungatov and Ivan Kondratyev, also known as Bassterlord, with deploying LockBit against numerous victims throughout the United States, including businesses nationwide in the manufacturing and other industries, as well as victims around the world in the semiconductor and other industries. Sungatov and Kondratyev remain at large.
    • In May 2023, two indictments were unsealed in Washington, D.C., and the District of New Jersey charging Mikhail Matveev, also known as Wazawaka, m1x, Boriselcin, and Uhodiransomwar, with using different ransomware variants, including LockBit, to attack numerous victims throughout the United States, including the Washington, D.C., Metropolitan Police Department. Matveev remains at large and is currently the subject of a reward of up to $10 million through the U.S. Department of State’s TOC Rewards Program, with information accepted through the FBI tip website at www.tips.fbi.gov/.

    The U.S. Department of State’s TOC Rewards Program is offering rewards of:

    Information is accepted through the FBI tip website at tips.fbi.gov.

    Khoroshev, Matveev, Sungatov, and Kondratyev have also been designated for sanctions by the Department of the Treasury’s Office of Foreign Assets Control for their roles in launching cyberattacks.

    Victim Assistance

    LockBit victims are encouraged to contact the FBI and submit information at www.ic3.gov/. As announced by the Department in February, law enforcement, through its disruption efforts, has developed decryption capabilities that may enable hundreds of victims around the world to restore systems encrypted using the LockBit ransomware variant. Submitting information at the IC3 site will enable law enforcement to determine whether affected systems can be successfully decrypted.

    LockBit victims are also encouraged to visit www.justice.gov/usao-nj/lockbit for case updates and information regarding their rights under U.S. law, including the right to submit victim impact statements and request restitution, in the criminal litigation against Panev, Astamirov, and Vasiliev.

    The FBI Newark Field Office, under the supervision of Acting Special Agent in Charge Nelson I. Delgado, is investigating the LockBit ransomware variant. Israel’s Office of the State Attorney, Department of International Affairs, and Israel National Police; France’s Gendarmerie Nationale Cyberspace Command, Paris Prosecution Office — Cyber Division, and judicial authorities at the Tribunal Judiciare of Paris; Europol; Eurojust; the U.K.’s NCA; Germany’s Landeskriminalamt Schleswig-Holstein, Bundeskriminalamt, and the Central Cybercrime Department North Rhine-Westphalia; Switzerland’s Federal Office of Justice, Public Prosecutor’s Office of the Canton of Zurich, and Zurich Cantonal Police; Spain’s Policia Nacional and Guardia Civil; Japan’s National Police Agency; Australian Federal Police; Sweden’s Polismyndighetens; Canada’s Royal Canadian Mounted Police; Politie Dienst Regionale Recherche Oost-Brabant of the Netherlands; and Finland’s National Bureau of Investigation have provided significant assistance and coordination in these matters and in the LockBit investigation generally.

    Trial Attorneys Debra Ireland and Jorge Gonzalez of the Criminal Division’s Computer Crime and Intellectual Property Section (CCIPS) and Assistant U.S. Attorneys Andrew M. Trombly, David E. Malagold, and Vinay Limbachia for the District of New Jersey are prosecuting the charges against Panev and the other previously charged LockBit defendants in the District of New Jersey.

    The Justice Department’s Cybercrime Liaison Prosecutor to Eurojust, Office of International Affairs, and National Security Division also provided significant assistance.

    Additional details on protecting networks against LockBit ransomware are available at StopRansomware.gov. These include Cybersecurity and Infrastructure Security Agency Advisories AA23-325A, AA23-165A, and AA23-075A. 

    A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: Berwick — Valley Integrated Street Crime Enforcement Unit charges four people with firearm and drug offences

    Source: Royal Canadian Mounted Police

    The Valley Integrated Street Crime Enforcement Unit (VISCEU) has charged four people with drug offences after a search warrant was executed at a home in South Berwick.

    On December 6, VISCEU with the assistance of Kings District RCMP, Kentville Police and the Criminal Intelligence Service Nova Scotia (CISNS) executed a search warrant at a home on Buchanan Rd., as part of an ongoing drug trafficking investigation.

    At the home, police safely arrested four people then located and seized a quantity of cocaine, methamphetamine, scales, cellphones, firearms, cash and stolen property.

    Scott Graham, 51, of Berwick; Jessie Jones, 35, of Waterville; and Theresa Atwell, 59, and Josh Jackson, 33, both from Cambridge, have been charged with:

    • Unauthorized Possession of Firearm (2 counts)
    • Possession of Firearm Knowing its Possession is Unauthorized (2 counts)
    • Careless Use of Firearm (2 counts)
    • Possession of Property Obtained by Crime (over $5,000)
    • Possession for Purpose of Trafficking (3 counts)

    Atwell was also charged with Possession Contrary to Order, and Jackson was also charged with Failure to Comply with Probation Order.

    All four were released by the Court on conditions and are scheduled to appear in Kentville Provincial Court on February 11 at 9:30 a.m.

    Nova Scotians are encouraged to contact their nearest RCMP detachment or local police to report crime, including the illegal sale of drugs, in their communities. Anonymous tips can be made by calling Nova Scotia Crime Stoppers, toll-free, at 1-800-222-TIPS (8477), submitting a secure web tip at www.crimestoppers.ns.ca, or using the P3 Tips app.

    Note: The Valley Integrated Street Crime Enforcement Unit is comprised of members of the Kings District RCMP and the Kentville Police Service.

    File # 2024-1779565

    MIL Security OSI

  • MIL-OSI Security: Wake County Man Responsible for Trafficking Methamphetamine Sentenced to 10 Years

    Source: Office of United States Attorneys

    RALEIGH, N.C. – Michael Lynn Russell, a 62-year-old resident of Fuquay-Varina, has been sentenced to 120 months in prison after being arrested twice for trafficking methamphetamine.  Russell pled guilty on October 8, 2024.

    “This sentencing reflects the commitment of the Fuquay-Varina Police Department to protecting our community from the devastating impact of methamphetamine trafficking. We are grateful for the collaboration with the United States Attorney’s Office, the DEA, the North Carolina State Highway Patrol, and our dedicated officers who worked tirelessly to bring this case to justice. Let this serve as a clear message: we will not tolerate illegal drug activity in Fuquay-Varina,” said Fuquay-Varina Police Chief Tim Smith.

    According to the court documents and other information review by the court, in August and September 2022, officers with the Fuquay-Varina Police Department (FVPD) received information from a confidential source (CS1) that Russell was sourcing drug sales occurring at the Marquee Station Apartments in Fuquay-Varina.  Law enforcement conducted surveillance on Russell between September 2022 and December 2022.  On December 2, 2022, officers with the North Carolina State Highway Patrol (NCSHP), the FVPD, and the Drug Enforcement Administration (DEA) conducted a traffic stop on Russell’s vehicle after he left a hotel. A K-9 officer then conducted an open-air sniff search of the car, which resulted in a positive alert for controlled substances.  

    A search of Russell resulted in the seizure of two large bundles of cash folded in half and rubber banded. A search of the vehicle revealed two scales, a meth pipe, torches, baggies, methamphetamine, Suboxone, hydrocodone and Adderall pills, cocaine, and a locked box containing U.S. currency. A total of $10,779.00 in cash was seized during the traffic stop.  Russell was arrested following the traffic stop and released on a state bond.

    From August 2022 through May 15, 2024, Russell was arrested twice each while possessing additional drugs. At sentencing Russell was found to be responsible for 44 kilograms of methamphetamine, 10 milligrams of hydrocodone, 11 dosage units of Suboxone, 150 milligrams of pure methamphetamine, 5 grams of cocaine, and 26 dosage units of Alprazolam.  After each of his arrests, Russell admitted to his criminal activities to law enforcement.

    Michael F. Easley, Jr., U.S. Attorney for the Eastern District of North Carolina, made the announcement after sentencing by Chief Judge Richard Myers. The Drug Enforcement Administration, Fuquay-Varina Police Department, and the North Carolina State Highway Patrol investigated the case. Assistant U.S. Attorney Jennifer C. Nucci prosecuted the case.

    Related court documents and information can be found on the website of the U.S. District Court for the Eastern District of North Carolina or on PACER by searching for case number 5:24-cr-00142-M-BM.

    MIL Security OSI

  • MIL-OSI United Kingdom: New safety measures installed at bus station to tackle ASB

    Source: City of Stoke-on-Trent

    Published: Friday, 20th December 2024

    Major improvement work is being carried at a Stoke-on-Trent bus station, making it safer, more comfortable and easier for passengers travelling around the city.

    New lighting, seating and CCTV is being installed at Longton Bus Station as part of the project which aims to improve the look of the station and reduce anti-social behaviour in the area.

    Part of the existing canopy which covers all nine stands at the bus station is also being removed to create more open space and improve visibility.

    In addition, information boards displaying real-time passenger information will be installed in the new year, during Stoke-on-Trent’s Centenary year.

    The work has been carried out in partnership with Staffordshire’s Police, Fire and Crime Commissioner. It has been funded by £46,409 of Government funding as part of the Safer Streets 5 programme.

    Councillor Majid Khan, cabinet member for community safety and resilience at Stoke-on-Trent City Council, said: “We are aware of some of the problems which have been reported in this area including dangerous driving, disorder, vandalism and criminal damage and we believe that these improvements will go a long way to combat these issues.

    “We are working with partners all over the city to design out crime in our town centres and this project is just one example of how we working together to make our city safer for all.”

    In addition to the work at Longton Bus Station, a separate package of improvements is being planned in the near future, funded by the Ministry of Housing, Community and Local Government.

    This work will include improved pedestrian links between the bus station and the neighbouring retail park, market and surrounding businesses.

    Ben Adams, Staffordshire Commissioner for Police, Fire & Rescue and Crime, said: “Funding from the Safer Streets project has been used across Staffordshire and Stoke-on-Trent to tackle anti-social behaviour which can blight our communities.

    “I hope that bus station users will feel much safer as a result of this work.”

    Stoke-on-Trent South MP Allison Gardner said: “The work at Longton bus station is just a small part of the work the council are doing to make the city safer for everyone.

    “Additional lights, cameras and the open plan bus station will provide better access and improve visibility to deter people from using the station for anti-social activities.

    “The Safer Streets funding will improve the streets, leading to a safer more accessible city. I hope everyone will feel the benefits of this.”

    MIL OSI United Kingdom

  • MIL-OSI Security: U.S. Charges Dual Russian And Israeli National As Developer Of Lockbit Ransomware Group

    Source: Office of United States Attorneys

    Defendant Rostislav Panev in Custody Pending Extradition from Israel to the United States

    NEWARK, N.J. – A superseding criminal complaint filed in the District of New Jersey was unsealed today charging a dual Russian and Israeli national for being a developer of the LockBit ransomware group, U.S. Attorney Philip R. Sellinger announced.

    In August, Rostislav Panev, 51, a dual Russian and Israeli national, was arrested in Israel pursuant to a U.S. provisional arrest request with a view towards extradition to the United States. Panev is currently in custody in Israel pending extradition on the charges lodged in the superseding complaint.

    “As alleged by the complaint, Rostislav Panev for years built and maintained the digital weapons that enabled his LockBit coconspirators to wreak havoc and cause billions of dollars in damage around the world. But just like the six other LockBit members previously identified and charged by this office and our FBI and Criminal Division partners, Panev could not remain anonymous and avoid justice indefinitely. He must now answer for his crimes. Today’s announcement represents another blow struck by the United States and our international partners against the LockBit organization, and our efforts will continue relentlessly until the group is fully dismantled and its members brought to justice.”

    U.S. Attorney Philip R. Sellinger

    “The Justice Department’s work going after the world’s most dangerous ransomware schemes includes not only dismantling networks, but also finding and bringing to justice the individuals responsible for building and running them,” said Attorney General Merrick B. Garland. “Three of the individuals who we allege are responsible for LockBit’s cyberattacks against thousands of victims are now in custody, and we will continue to work alongside our partners to hold accountable all those who lead and enable ransomware attacks.”

    “The arrest of Mr. Panev reflects the Department’s commitment to using all its tools to combat the ransomware threat,” said Deputy Attorney General Lisa Monaco. “We started this year with a coordinated international disruption of LockBit — the most damaging ransomware group in the world. Fast forward to today and three LockBit actors are in custody thanks to the diligence of our investigators and our strong partnerships around the world. This case is a model for ransomware investigations in the years to come.”

    “The arrest of alleged developer Rostislav Panev is part of the FBI’s ongoing efforts to disrupt and dismantle the LockBit ransomware group, one of the most prolific ransomware variants across the globe,” said FBI Director Christopher Wray. “The LockBit group has targeted both public and private sector victims around the world, including schools, hospitals, and critical infrastructure, as well as small businesses and multi-national corporations. No matter how hidden or advanced the threat, the FBI remains committed to working with our interagency partners to safeguard the cyber ecosystem and hold accountable those who are responsible for these criminal activities.”

    “The criminal complaint alleges that Rotislav Panev developed malware and maintained the infrastructure for LockBit, which was once the world’s most destructive ransomware group and attacked thousands of victims, causing billions of dollars in damage,” said Principal Deputy Assistant Attorney General Nicole M. Argentieri, head of the Justice Department’s Criminal Division. “Along with our domestic and international law enforcement partner actions to dismantle LockBit’s infrastructure, the Criminal Division has disrupted LockBit’s operations by charging seven of its key members (including affiliates, developers, and its administrator) and arresting three of these defendants — including Panev. We are especially grateful for our partnerships with authorities in Europol, the United Kingdom, France, and Israel, which show that, when likeminded countries work together, cybercriminals will find it harder to escape justice.”

    “For five years, Panev helped to grow LockBit into a ransomware machine of deception and extortion,” said Acting Special Agent in Charge Nelson I. Delgado of the FBI Newark Field Office.  “His reach was far and wide but FBI Newark and our international law enforcement partners were able to disrupt his reign. Panev’s arrest marks a victory against these conspirators, and is a step towards upholding justice and neutralizing these criminals.”

    According to the superseding complaint, documents filed in this and related cases, and statements made in court, Panev acted as a developer of the LockBit ransomware group from its inception in or around 2019 through at least February 2024. During that time, Panev and his LockBit coconspirators grew LockBit into what was, at times, the most active and destructive ransomware group in the world. The LockBit group attacked more than 2,500 victims in at least 120 countries around the world, including 1,800 in the United States. Their victims ranged from individuals and small businesses to multinational corporations, including hospitals, schools, nonprofit organizations, critical infrastructure, and government and law-enforcement agencies. LockBit’s members extracted at least $500 million in ransom payments from their victims and caused billions of dollars in other losses, including lost revenue and costs from incident response and recovery.

    LockBit’s members comprised “developers,” like Panev, who designed the LockBit malware code and maintained the infrastructure on which LockBit operated. LockBit’s other members, called “affiliates,” carried out LockBit attacks and extorted ransom payments from LockBit victims. LockBit’s developers and affiliates would then split ransom payments extorted from victims.

    As alleged in the superseding complaint, at the time of Panev’s arrest in Israel in August, law enforcement discovered on Panev’s computer administrator credentials for an online repository that was hosted on the dark web and stored source code for multiple versions of the LockBit builder, which allowed LockBit’s affiliates to generate custom builds of the LockBit ransomware malware for particular victims. On that repository, law enforcement also discovered source code for LockBit’s StealBit tool, which helped LockBit affiliates exfiltrate data stolen through LockBit attacks. Law enforcement also discovered access credentials for the LockBit control panel, an online dashboard maintained by LockBit developers for LockBit’s affiliates and hosted by those developers on the dark web.

    The superseding complaint also alleges that Panev exchanged direct messages through a cybercriminal forum with LockBit’s primary administrator, who, in an indictment unsealed in the District of New Jersey in May, the United States alleged to be Dimitry Yuryevich Khoroshev (Дмитрий Юрьевич Хорошев), also known as LockBitSupp, LockBit, and putinkrab. In those messages, Panev and the LockBit primary administrator discussed work that needed to be done on the LockBit builder and control panel.

    Court documents further indicate that, between June 2022 and February 2024, the primary LockBit administrator made a series of transfers of cryptocurrency, laundered through one or more illicit cryptocurrency mixing services, of approximately $10,000 per month to a cryptocurrency wallet owned by Panev. Those transfers amounted to over $230,000 during that period.

    In interviews with Israeli authorities following his arrest in August, Panev admitted to having performed coding, development, and consulting work for the LockBit group and to having received regular payments in cryptocurrency for that work, consistent with the transfers identified by U.S. authorities. Among the work that Panev admitted to having completed for the LockBit group was the development of code to disable antivirus software; to deploy malware to multiple computers connected to a victim network; and to print the LockBit ransom note to all printers connected to a victim network. Panev also admitted to having written and maintained LockBit malware code and to having provided technical guidance to the LockBit group.

    The LockBit Investigation

    The superseding complaint against, and apprehension of, Panev follows a disruption of LockBit ransomware in February by the U.K. National Crime Agency (NCA)’s Cyber Division, which worked in cooperation with the Justice Department, FBI, and other international law enforcement partners. As previously announced by the Department, authorities disrupted LockBit by seizing numerous public-facing websites used by LockBit to connect to the organization’s infrastructure and by seizing control of servers used by LockBit administrators, thereby disrupting the ability of LockBit actors to attack and encrypt networks and extort victims by threatening to publish stolen data. That disruption succeeded in greatly diminishing LockBit’s reputation and its ability to attack further victims, as alleged by documents filed in this case.

    The superseding complaint against Panev also follows charges brought in the District of New Jersey against other LockBit members, including its alleged primary creator, developer, and administrator, Dmitry Yuryevich Khoroshev. An indictment against Khoroshev unsealed in May alleges that Khoroshev began developing LockBit as early as September 2019, continued acting as the group’s administrator through 2024, a role in which Khoroshev recruited new affiliate members, spoke for the group publicly under the alias “LockBitSupp,” and developed and maintained the infrastructure used by affiliates to deploy LockBit attacks. Khoroshev is currently the subject of a reward of up to $10 million through the U.S. Department of State’s Transnational Organized Crime (TOC) Rewards Program, with information accepted through the FBI tip website at www.tips.fbi.gov/.

    A total of seven LockBit members have now been charged in the District of New Jersey. Beyond Panev and Khoroshev, other previously charged LockBit defendants include:

    • In July, two LockBit affiliate members, Mikhail Vasiliev, also known as Ghostrider, Free, Digitalocean90, Digitalocean99, Digitalwaters99, and Newwave110, and Ruslan Astamirov, also known as BETTERPAY, offtitan, and Eastfarmer, pleaded guilty in the District of New Jersey for their participation in the LockBit ransomware group and admitted deploying multiple LockBit attacks against U.S. and foreign victims. Vasiliev and Astamirov are presently in custody awaiting sentencing.
    • In February, in parallel with the disruption operation described above, an indictment was unsealed in the District of New Jersey charging Russian nationals Artur Sungatov and Ivan Kondratyev, also known as Bassterlord, with deploying LockBit against numerous victims throughout the United States, including businesses nationwide in the manufacturing and other industries, as well as victims around the world in the semiconductor and other industries. Sungatov and Kondratyev remain at large.
    • In May 2023, two indictments were unsealed in Washington, D.C., and the District of New Jersey charging Mikhail Matveev, also known as Wazawaka, m1x, Boriselcin, and Uhodiransomwar, with using different ransomware variants, including LockBit, to attack numerous victims throughout the United States, including the Washington, D.C., Metropolitan Police Department. Matveev remains at large and is currently the subject of a reward of up to $10 million through the U.S. Department of State’s TOC Rewards Program, with information accepted through the FBI tip website at www.tips.fbi.gov/.

    The U.S. Department of State’s Transnational Organized Crime (TOC) Rewards Program is offering rewards of:

    Information is accepted through the FBI tip website at tips.fbi.gov.

    Khoroshev, Matveev, Sungatov, and Kondratyev have also been designated for sanctions by the Department of the Treasury’s Office of Foreign Assets Control for their roles in launching cyberattacks.

    Victim Assistance

    LockBit victims are encouraged to contact the FBI and submit information at www.ic3.gov. As announced by the Department in February, law enforcement, through its disruption efforts, has developed decryption capabilities that may enable hundreds of victims around the world to restore systems encrypted using the LockBit ransomware variant. Submitting information at the IC3 site will enable law enforcement to determine whether affected systems can be successfully decrypted.

    LockBit victims are also encouraged to visit www.justice.gov/usao-nj/lockbit for case updates and information regarding their rights under U.S. law, including the right to submit victim impact statements and request restitution, in the criminal litigation against Panev, Astamirov, and Vasiliev.

    The FBI Newark Field Office, under the supervision of Acting Special Agent in Charge Nelson I. Delgado, is investigating the LockBit ransomware variant. Israel’s Office of the State Attorney, Department of International Affairs, and Israel National Police; France’s Gendarmerie Nationale Cyberspace Command, Paris Prosecution Office — Cyber Division, and judicial authorities at the Tribunal Judiciare of Paris; Europol; Eurojust; the United Kingdom’s National Crime Agency; Germany’s Landeskriminalamt Schleswig-Holstein, Bundeskriminalamt, and the Central Cybercrime Department North Rhine-Westphalia; Switzerland’s Federal Office of Justice, Public Prosecutor’s Office of the Canton of Zurich, and Zurich Cantonal Police; Spain’s Policia Nacional and Guardia Civil; Japan’s National Police Agency; Australian Federal Police; Sweden’s Polismyndighetens; Canada’s Royal Canadian Mounted Police; Politie Dienst Regionale Recherche Oost-Brabant of the Netherlands; and Finland’s National Bureau of Investigation have provided significant assistance and coordination in these matters and in the LockBit investigation generally.

    Assistant U.S. Attorneys Andrew M. Trombly, David E. Malagold, and Vinay Limbachia for the District of New Jersey and Trial Attorneys Debra Ireland and Jorge Gonzalez of the Criminal Division’s Computer Crime and Intellectual Property Section (CCIPS) are prosecuting the charges against Panev and the other previously charged LockBit defendants in the District of New Jersey.

    The Justice Department’s Cybercrime Liaison Prosecutor to Eurojust, Office of International Affairs, and National Security Division also provided significant assistance.

    Additional details on protecting networks against LockBit ransomware are available at StopRansomware.gov. These include Cybersecurity and Infrastructure Security Agency Advisories AA23-325A, AA23-165A, and AA23-075A. 

    The charges and allegations contained in the superseding complaint are merely accusations, and the defendant is presumed innocent unless and until proven guilty.

    Defense counsel: Frank Arleo, Esq.

    MIL Security OSI

  • MIL-OSI Security: United States Attorney Christopher R. Kavanaugh Steps Down

    Source: Office of United States Attorneys

    CHARLOTTESVILLE, Va. – Christopher R. Kavanaugh announced today that he will step down as the United States Attorney for the Western District of Virginia, resigning from the Department of Justice, effective Friday, December 20, 2024 at 11:59 p.m. after serving more than three years in office.

    “Four years ago, Chris Kavanaugh was one of the first people I brought in to join the Office of the Deputy Attorney General because of his experience within the Department and his leadership on national security issues,” said Deputy Attorney General Lisa Monaco. “Throughout his distinguished career – at Main Justice, as an Assistant U.S. Attorney in the District of Columbia and the Western District of Virginia, and as United States Attorney – Chris has served the Department and his fellow Virginians with integrity and tenacity. I am grateful for his service.”

    Mr. Kavanaugh was sworn in by Deputy Attorney General Monaco on October 7, 2021, after having been unanimously confirmed by the United States Senate.  Mr. Kavanaugh was later appointed to be a member of the Attorney General’s Advisory Committee, a group that advises the Attorney General and Deputy Attorney General on emerging policy issues facing the Department and the United States Attorney community.  Mr. Kavanaugh also chaired the AGAC’s National Security Subcommittee, which supported the Department’s enhanced focus on investigations and prosecutions of malign foreign influence and nation state threats.   

    “Chris Kavanaugh has been an incredible partner for ATF and a national leader in the fight against violent crime.  He has worked side-by-side with law enforcement to bring impactful cases, prosecute dangerous criminals, and lead in the innovative use of Crime Gun Intelligence to make Virginia, and this Nation, safer,” said Steven M. Dettelbach, Director of the Bureau of Alcohol, Tobacco, Firearms and Explosives.

    During his tenure, Mr. Kavanaugh led the U.S. Attorney’s Office through a transitional period, expanding its footprint, hiring a record number of federal prosecutors and staff, and spearheading ground-breaking criminal and affirmative civil enforcements.

    “Every day, the public servants of United States Attorney’s Office for the Western District of Virginia work to make the District – and our Nation – a safer and better place for us all,” United States Attorney Kavanaugh said today.  “It has been the honor of my life to lead this team of selfless individuals who are so dedicated to fairness, the rule of law, and doing what is right.  I know that WDVA will continue to make an outsized impact as citizens of the Justice Department, and I look forward to its future.

    I thank President Biden for nominating me, Senators Mark Warner and Tim Kaine for their recommendation, and Attorney General Garland and Deputy Attorney General Monaco for leading the Department and supporting the United States Attorney community during my tenure.  It has been an honor to serve the American people.”

    Under Mr. Kavanaugh’s leadership, the Western District of Virginia has achieved notable successes in numerous complex criminal and civil cases. For example:

    United States v. McKinsey & Company

    For the first time ever, a management consulting firm was held criminally responsible for advice resulting in the commission of a crime by a client, Purdue Pharma, the makers of OxyContin. McKinsey & Company agreed to pay $650 million to resolve criminal and civil investigations into the firm’s consulting work, including a 2013 engagement with Purdue Pharma which McKinsey advised on steps to ‘turbocharge’ sales of OxyContin.  A former senior partner at McKinsey & Company also agreed to plead guilty to one felony count of obstruction of justice for deleting Purdue related documents in an attempt to obstruct future investigations.

    United States v. Envigo

    In 2024, the Western District of Virginia obtained criminal convictions of Envigo, a biotechnology company dedicated to breeding animals for medical research with locations throughout North America.  WDVA’s investigation revealed that Envigo was mistreating animals in violation of the Animal Welfare Act and polluting waterways in violation of the Clean Water Act.  After a federal search warrant was executed, the Justice Department secured the surrender of over 4,000 beagles from an Envigo facility in Cumberland, Virginia. Envigo pled guilty to violating the Animal Welfare Act and the Clean Water Act, agreeing to pay more than $35 million in criminal penalties and fines – a record for any prosecution under the Animal Welfare Act.

    The Killing of Big Stone Gap Police Officer Michael Chandler

    Tragedy struck the small town of Big Stone Gap, Virginia in the early morning hours of November 13, 2021, when Big Stone Gap Police Officer Michael Chandler was murdered while responding to a disturbance call.  The United States Attorney’s Office for WDVA brought federal charges against not only the person who shot and killed Chandler, Michael Donivan White, but also 18 other defendants who were a part of a methamphetamine trafficking conspiracy.  Over the last few years, every single defendant has been convicted. White is scheduled to be sentenced in February 2025 and faces between 40- and 100-years’ incarceration.

    The Bribery Trial of Sheriff Scott Jenkins

    This week, a federal jury in the Charlottesville Division of WDVA returned guilty verdicts on all counts against former Culpeper County Sheriff Scott Jenkins.  Jenkins had accepted numerous cash bribes and bribes in the form of campaign contributions from at least eight different people – one of whom he believed to be a felon – in exchange for appointing them as Auxiliary Deputy Sheriffs.  A jury found Jenkins guilty of bribery, honest services fraud, and conspiracy after a trial and he will be sentenced in March 2025.

    District Transformation

    In addition to the case work victories, under Mr. Kavanaugh’s leadership, the U.S Attorney’s Office itself has transformed. Offices in Abingdon and Charlottesville have expanded, and the Office was awarded a nearly 20% increase in Assistant United States Attorneys, expanding the level of federal prosecutors to their highest levels in history.  In a challenging budget climate, Mr. Kavanaugh has also made strides to modernize the Office’s capabilities to process voluminous amounts of documents for its more sophisticated prosecutions.

    “On behalf of FBI Richmond, I sincerely thank Chris Kavanaugh for his service as U.S. Attorney. His unwavering commitment to justice and his exceptional partnership have been instrumental in advancing our shared mission of keeping Virginia safe. Chris’ leadership and collaboration have made a profound impact, and we deeply appreciate his dedication to ensuring the rule of law prevails,” said Stanley M. Meador, Special Agent in Charge of the FBI Richmond Division.

    “U.S. Attorney Kavanaugh’s leadership and vision have been instrumental in our initiatives to safeguard the health and safety of the citizens of Western Virginia. His determination in developing effective judicial strategies have contributed to the dismantling of many drug-trafficking networks and significantly mitigating this threat to our communities. We extend our best wishes to him in his future endeavors,” said Jarod Forget, Special Agent in Charge of the Drug Enforcement Administration’s Washington Division.

    Prior to his time as United States Attorney, Mr. Kavanaugh was an Assistant United States Attorney for 14 years, having served in United States Attorney’s Offices for both the Western District of Virginia and the District of Columbia.  During his career, Mr. Kavanaugh directed numerous multi-agency investigations and prosecutions, with a focus on national security, white-collar crime, civil rights, and violent crimes involving racketeering and homicides. In WDVA, he served as the District’s chief national security prosecutor and Senior Litigation Counsel.  Among other matters, he led the Department’s investigations and prosecutions into the Unite the Right riots of August 2017 in Charlottesville, Virginia. Just prior to his confirmation, Mr. Kavanaugh was Senior Counsel to Deputy Attorney General Lisa O. Monaco at the U.S. Department of Justice in Washington, D.C.

    MIL Security OSI

  • MIL-OSI Security: Dutch National Sentenced to 33 Months in Prison for Money Laundering

    Source: Office of United States Attorneys

    ALBANY, NEW YORK – Xiomara Christian, age 37, of Amsterdam, The Netherlands, was sentenced yesterday to 33 months of incarceration following her guilty plea to conspiracy to commit money laundering. 

    United States Attorney Carla B. Freedman and Frank A. Tarentino III, Special Agent in Charge of the U.S. Drug Enforcement Administration (DEA), New York Division, made the announcement.

    As part of her guilty plea on October 10, 2024, Christian admitted that from May 2017 to November 2018, she and a co-conspirator laundered drug proceeds from Europe and Australia through bank accounts in the Northern District of New York, intending to conceal the true source of the proceeds, and to make it appear as though the money was legally obtained through legitimate business transactions.

    On October 4, 2018, Christian delivered €101,950 ($114,816.09) in drug proceeds to an undercover agent with the National Police of The Netherlands in The Netherlands. On October 5, 2018, an undercover agent with the Australian Criminal Intelligence Commission picked up $85,000 AUD ($57,843 USD) in drug proceeds from another co-conspirator in Melbourne, Australia. Christian then had the money wired through a bank account in Latham, New York, and sent to bank accounts in Panama.

    In addition to the term of imprisonment, Senior United States District Judge Lawrence E. Kahn also ordered the entry of a money judgment against Christian in the amount of $172,659. Christian faces removal from the United States following service of her term of imprisonment.

    The DEA investigated this case and Assistant U.S. Attorney Douglas Collyer prosecuted the case.

    MIL Security OSI

  • MIL-OSI Security: UPDATE: Appeal to trace witnesses following fatal shooting in Brent

    Source: United Kingdom London Metropolitan Police

    Detectives investigating the murder of Michelle Sadio have issued an image of individuals they are keen to speak to.

    Detectives from the Met’s Specialist Crime Command are leading the investigation into Michelle’s murder and have today released an image of people they believe may have information about the occupants of a car linked to the shooting.

    The car, a black Kia Niro with distinctive alloys, with the number plate LA23 XRE was being driven by the suspects who then fired a number of shots in Gifford Road, NW10 on Saturday, 14 December.

    Michelle was one of three people injured and she sadly died at the scene.

    Following the shooting, the car was driven from Gifford Road to Barnhill Road where it was then abandoned and set alight.

    Detective Chief Inspector Phil Clarke, who is leading the investigation, said: “Our investigation has progressed at pace but we are still keen to hear from anyone who can help piece together the series of events which led to Michelle’s murder.

    “We have an image of a number of people who were seen speaking to the occupants of a black Kia Niro of interest on Church Road, NW10 at 20:50hrs on Saturday, 14 December.

    “Are you one of the people pictured in the white Mercedes or on the pavement nearby, or do you recognise anyone? Did you hear or see something either before or after the shooting that may help with the investigation?

    “I would like to stress that none of those pictured have done anything wrong. They may not live in the area but they could hold information that is important to the investigation and I urge them to contact us.”

    At approximately 21:15hrs on Saturday, police were called to reports of the shooting, which happened as Michelle and others were standing outside the church following a wake. Officers and London Ambulance Service paramedics attended the scene.

    Michelle, aged 44, was found suffering serious injuries – despite the efforts of the emergency services she was pronounced dead at the scene.

    Michelle’s family have been informed and continue to be supported by specialist officers. They have requested that media respect their privacy during this difficult time.

    Two men, both aged in their 30s, also suffered injuries. One remains in hospital in a critical condition; the other man’s injuries are not life threatening.

    There have been no arrests at this stage and enquiries into the circumstances continue.

    Anyone with information that could assist police is asked to call 101 or message @MetCC on X giving the reference CAD 7137/14DEC.

    You can also provide information, or upload images and footage, through the online portal here or by scanning the attached QR code.

    Information can also be provided anonymously to the independent charity Crimestoppers on 0800 555 111.

    MIL Security OSI

  • MIL-OSI Security: Miami Duo Found Guilty of Kidnapping and Murder

    Source: Office of United States Attorneys

    MIAMI – On Dec. 17., James Edward Daniels, 59, and Frederick Eugene Rudolph, 69, of Miami, Fla., were found guilty of conspiracy to commit kidnapping resulting in death, multiple counts of kidnapping resulting in death, and kidnapping, at trial before U.S. District Court Judge Roy K. Altman. 

    On Dec. 5, 2020, Daniels, Rudolph, and other co-conspirators kidnapped three victims from a truck yard in Opa Locka, Fla. They bound and tortured the victims, duct-taped their eyes, and threw them into the back of a rented van after stealing the victims’ drugs. They drove around the city for hours before taking the victims to an abandoned house in Opa-Locka and attempting to execute them by shooting the three victims. Two of the victims died, while one miraculously survived.

    Daniels stole jewelry from one of the murdered victims, and all the defendants benefitted by receiving drugs, money, or both, in exchange for their participation in the conspiracy.

    A third defendant, Herbert Barr, 56, pled guilty to kidnapping on Nov. 26.

    U.S. Attorney Markenzy Lapointe for the Southern District of Florida, Special Agent in Charge Jeffrey B. Veltri of the FBI, Miami Field Office, Director Stephanie V. Daniels of the Miami-Dade Police Department, and Special Agent in Charge Deanne L. Reuter of the Drug Enforcement Administration (DEA), Miami Field Division, made the announcement.

    FBI Miami Division Homestead Resident Agency, Miami-Dade Police Department Homicide Bureau,  and DEA Homestead Office investigated the case. Assistant U.S. Attorneys Yara Dodin, Nardia Haye, and Katie Guthrie are prosecuting the case.

    Sentencing is scheduled for March 10, 2025, before Judge Altman. Daniels and Rudolph face up to life in prison, criminal fines of up to $250,000 as to each count, and up to a lifetime on supervised release.

    This investigation was carried out by members of the South Florida High Intensity Drug Trafficking Area (HIDTA) Task Force.  The South Florida HIDTA, established in 1990, is made up of federal, state, and local law enforcement agencies who, cooperatively, target the region’s drug-trafficking and money laundering organizations.  The South Florida HIDTA is funded by the Office of National Drug Control Policy, which sponsors a variety of initiatives focused the nation’s illicit drug trafficking threats. For more information regarding HIDTA visit https://www.dea.gov/operations/hidta.

    You may find a copy of this press release (and any updates) on the website of the United States Attorney’s Office for the Southern District of Florida at www.usdoj.gov/usao/fls.

    Related court documents and information may be found on the website of the District Court for the Southern District of Florida at www.flsd.uscourts.gov or at http://pacer.flsd.uscourts.gov, under case number 23-cr-20431.

    ###

    MIL Security OSI

  • MIL-OSI Security: Denver Man Sentenced for Operating Illegal Gambling Parlor

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    DENVER – The United States Attorney’s Office for the District of Colorado announces that Jonathan Arvay, 38, of Denver, was sentenced to one year and one day in prison after being found guilty by a federal jury on one count of conducting an illegal gambling business and one count of conspiracy to conduct an illegal gambling business.

    According to the facts established at trial, Arvay operated Player One Arcade in Denver, part of a network of gambling parlors extending from Greeley to Pueblo.  These parlors offered several electronic forms of gambling through games made to resemble arcade games, as well as virtual slot machines in which customers attempted to earn credits.  Upon completing their game of choice, customers would exchange any credits won for a purported cryptocurrency, Obsidian Digital Asset Coin (ODAC), whose only function was to be exchanged for cash at an ATM-like “cryptocurrency teller machine” next door to or within the gambling parlor.  Customers were required to pay a transaction fee to exchange the ODAC for U.S. currency.

    “This was a modern version of old-fashioned illegal gambling,” said Acting United States Attorney Matt Kirsch. “I am grateful for our local and federal partners who helped put this criminal in prison.”

    “This sentence reflects an appropriate resolution to a complicated case: When you launder money and commit fraud against the government, the FBI and our partners will track you down across jurisdictions,” said FBI Denver Special Agent in Charge Mark Michalek.

    “IRS-CI remains on the cutting edge of cybercrime investigations as financial crimes continue to become more sophisticated,” said Tom Demeo Acting Special Agent in Charge, IRS Criminal Investigation Denver Field Office. “We are committed to staying one step ahead of criminals and leveraging our partnerships with federal and local law enforcement agencies to protect the U.S. tax system.”

    United States District Judge Gordon P. Gallagher presided over the trial. The FBI Denver Field Division, the IRS Criminal Investigation Denver Field Office, and the Pueblo Police Department conducted the investigation. Assistant United States Attorneys Cyrus Y. Chung, Alison Connaughty, and Jena Neuscheler handled the prosecution.

    Case Number: 23-cr-00222-GPG

    MIL Security OSI

  • MIL-OSI Security: FBI and Cincinnati Police Announce $15,000 Reward in Death of Five-Year-Old Arty Stanford

    Source: Federal Bureau of Investigation FBI Crime News (b)

    The FBI and the Cincinnati Police Department today announced a reward of up to $15,000 for information leading to the arrest and conviction of the individual(s) responsible for the death of Artagist “Arty” Stanford III.

    “Arty’s family has suffered greatly since this shooting and anyone responsible for his death should be held accountable,” stated FBI Cincinnati Special Agent in Charge Elena Iatarola. “Someone in our community knows what happened that night and who was involved. We need anyone with information to do the right thing and contact law enforcement.”

    “Silence protects the wrong people,” said Cincinnati Police Chief Teresa Theetge. “Someone knows what happened. Someone holds the key to bringing closure to Arty’s family. Please speak up and help us bring justice for Arty.”

    On October 24, 2024, at approximately 5:48 a.m., the Cincinnati Emergency Communications Center received a report of a drive-by shooting at a house on Holland Drive. Initially, residents believed there were no injuries and the house only received damage from the gunfire. When police arrived, family members found five-year-old Artagist “Arty” Stanford III suffering from a gunshot wound to the head in an upstairs bedroom. There were at least seven bullet impact marks or bullet holes in the front of the house. One of the bullets passed through the front exterior wall into a second-floor bedroom and struck Arty in the head.

    Arty was taken to the hospital for treatment which included multiple surgeries. On October 26, 2024, Arty succumbed to his injuries and his death was ruled a homicide.

    Anyone with information regarding this incident is asked to call the FBI at 1-800-Call-FBI or Crime Stoppers at 513-352-3040.

    MIL Security OSI

  • MIL-OSI Security: Des Moines Individuals Charged in Joint State and Federal Investigation of Fentanyl Trafficking Organization

    Source: Office of United States Attorneys

    DES MOINES, Iowa – A federal grand jury in Des Moines returned a three-count indictment charging five Des Moines individuals with offenses related to fentanyl trafficking.

    The following individuals are charged in the Indictment:

    • Devonte Darnell Hassell, also known as “Domo”, “Dom”, and “Rose”, 28, is charged with conspiracy to distribute and distribution of fentanyl. He faces a mandatory minimum 10-year prison sentence and a maximum sentence of life in prison.
    • Ryan Redmond, also known as “Chiefy”, 31, is charged with conspiracy to distribute and distribution of fentanyl. He faces a mandatory minimum 5‑year prison sentence and a maximum sentence of 40 years in prison.
    • Kevin Stanley Harris, Jr., also known as “Rylo” and “Big Hands”, 42, is charged with conspiracy to distribute and distribution of fentanyl. He faces a mandatory minimum 10-year prison sentence and a maximum sentence of life in prison, as he is alleged to have a prior serious drug felony conviction.
    • Adonis Angel Devora, 43, is charged with conspiracy to distribute fentanyl. She faces a maximum sentence of 20 years in prison.
    • Ricky Jamall Ellis, 30, is charged with conspiracy to distribute fentanyl. He faces a maximum sentence of 30 years in prison.

    These individuals were all arrested on December 18, 2024: four in Des Moines, and one in Houston, Texas. The same day, thirteen federal search warrants were executed, which resulted in the seizure of approximately 610 grams of heroin/fentanyl mixture, approximately 135 grams of methamphetamine, approximately 260 grams of marijuana, as well as 19 firearms and more than $13,000 in U.S. currency.

    The charges stem from a months’ long investigation into fentanyl distribution within the Des Moines area.

    United States Attorney Richard D. Westphal of the Southern District of Iowa made the announcement. The Des Moines Police Department, the United States Postal Inspection Service, and FBI Des Moines Central Iowa Gang Task Force (CIGTF) are investigating the case, with assistance from the Iowa Department of Public Safety-Division of Narcotics Enforcement (DNE), Iowa Department of Public Safety-Division of Intelligence and Fusion Center, Iowa State Patrol, Iowa State Patrol SWAT, United States Marshals Service, Ames Police Department, West Des Moines Police Department, Mid-Iowa Narcotics Enforcement Task Force (MINE), Polk County Sheriff’s Office, Story County Sheriff’s Office, Mid-Iowa Drug Task Force (MIDTF), Central Iowa Drug Task Force (CIDTF), Suburban Emergency Response Team (SERT), Metro Special Tactics and Response (STAR), the Chicago, Illinois Police Department, and the Houston, Texas Police Department.

    This investigation is part of an Organized Crime Drug Enforcement Task Forces (OCDETF) investigation. OCDETF identifies, disrupts, and dismantles the highest-level drug traffickers, money launderers, gangs, and transnational criminal organizations that threaten the United States by using a prosecutor-led, intelligence-driven, multi-agency approach that leverages the strengths of federal, state, and local law enforcement agencies against criminal networks.

    An indictment is merely an allegation, and all defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: Dayton man charged federally with committing string of armed robberies

    Source: Office of United States Attorneys

    DAYTON, Ohio – A Dayton man appeared in federal court on Dec. 19 on charges alleging he committed at least eight armed robberies in the area this month.

    Timothy Farr, 43, allegedly brandished a firearm at local gas stations and drive thru stores, demanding cash and cigarettes.

    According to an affidavit filed in support of the criminal complaint, from Dec. 3 through Dec. 15, Farr committed multiple armed robberies at area businesses.

    Specifically, it is alleged that on Dec. 3, Farr, wearing a dark jacket, pants and shoes, as well as gray two-tone style gloves and a black balaclava mask covering part of his face, entered a Sunoco gas station on Wayne Avenue in Dayton at around 10pm. Farr allegedly brandished a black firearm and demanded cash from both registers. It is alleged Far also demanded several packs of cigarettes and a box of Black and Mild Filter Tips. Farr allegedly brought a green plastic bag with him for the cash and items.

    The next day around 11:30pm, Farr allegedly committed an armed robbery at a Marathon gas station on Linden Avenue in Riverside. Farr allegedly wore the same clothing as the first robbery with the addition of an N-95 style mask.

    Farr is also accused of committing armed robberies on these dates and locations:

    • Dec. 6 at Ray’s Xenia Avenue Market on Xenia Avenue in Dayton
    • Dec. 7 at Free Pike Drive-Thru on Free Pike in Dayton
    • Dec. 8 at Sunoco gas station on Selma Road in Springfield
    • Dec. 10 at Mini Mart on N. Main Street in Dayton
    • Dec. 11 at Marathon gas station on E. Fifth Street in Dayton
    • Dec. 15 at Sammy’s Drive-thru store on Woodman Drive in Riverside

    During the investigation, law enforcement was able to identify a vehicle of interest using the Flock Safety Camera System and identified a 2011 red Ford Taurus linked to armed robbery locations.

    When Dayton police officers initiated a traffic stop of the red Taurus on Dec. 16, Farr was allegedly in the front passenger seat wearing the outfit described in the armed robberies, had an N-95 style mask on the floorboard and gray two-tone gloves in his pocket. Farr also allegedly had a 9mm pistol in his waistband.

    Kenneth L. Parker, United States Attorney for the Southern District of Ohio; Daryl S. McCormick, Special Agent in Charge, U.S. Bureau of Alcohol, Tobacco, Firearms & Explosives (ATF); Springfield Police Chief Allison Elliott, Dayton Police Chief Kamran Afzal, and Riverside Police Chief Frank Robinson announced the charges. Assistant United States Attorney Ryan A. Saunders is representing the United States in this case.

    A criminal complaint merely contains allegations, and defendants are presumed innocent unless proven guilty in a court of law.

    Anyone with information regarding these incidents should contact ATF at 1-888-ATF-TIPS (888-283-8477). Individuals may also email ATFTips@atf.gov, or contact ATF through its website at www.atf.gov/contact/atf-tips. Tips may also be submitted to ATF using the ReportIt® app, available on both Google Play and the Apple App Store, or by visiting www.reportit.com.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Roseville Man Sentenced To 70 Months In Prison For Being A Felon In Possession Of Ammunition

    Source: Office of United States Attorneys

    SACRAMENTO, Calif. — Arnes Krajinic, 33, of Roseville, was sentenced Thursday by United States District Judge Daniel J. Calabretta to 5 years and 10 months in prison for being a felon in possession of ammunition, United States Attorney Phillip A. Talbert announced.

    According to court documents, law enforcement began investigating Krajinic in January 2023 because he was advertising fentanyl and firearms for sale via Instagram. On January 17, 2023, law enforcement arrested Krajinic and found him in possession of approximately 95 grams of fentanyl powder, miscellaneous prescription pills, over $7,000 in cash, a digital scale, and a privately manufactured 9mm firearm that did not have a serial number and was loaded with ammunition. Krajinic was prohibited from possessing firearms and ammunition because he had previously been convicted of multiple felonies, including for robbery, possession of controlled substances while armed, possession of a concealed weapon in a vehicle, felon in possession of a firearm, and possession of controlled substances for sale.

    This case was the product of an investigation by the U.S. Marshals Service, the ATF, and the Placer County Special Investigations Unit, with assistance from the Roseville Police Department. Assistant United States Attorney Emily G. Sauvageau prosecuted the case.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results. For more information about Project Safe Neighborhoods, please visit Justice.gov/PSN.

    MIL Security OSI