Category: Security Intelligence

  • MIL-OSI Security: Former Chief Financial Officer Pleads Guilty to Theft in Connection with Health Care

    Source: US FBI

    PORTLAND, Ore.—The former Chief Financial Officer of Pacific States Marine Fisheries Commission (PSMFC) pleaded guilty Thursday for stealing money from PSMFC’s health benefit trust account.

    Pamela J. Kahut, 67, of Wilsonville, Oregon, pleaded guilty to theft in connection with health care.

    According to court documents, Kahut, as Chief Financial Officer of PSFMC, had access to and controlled PSMFC’s health benefit trust account that was created to pay benefits, fees, and other charges for PSFMC employees covered under its self-funded health care benefit program.

    On September 21, 2020, Kahut wrote a check in the amount of $2,812.85 from the health benefit trust account to pay for her spouse’s participation in PSFMC’s long-term care insurance program.   

    In total, between October 2014 and September 2020, defendant stole approximately $211,083 from PSMFC’s health benefit trust account. Kahut used the funds to pay for her spouse’s long-term care annual premiums, pay off her pension loans, and to pay her credit card bills.

    Theft in connection with health care fraud is punishable up to 10 years in federal prison and three years’ supervised release.  The charge may also result in a fine of up to $250,000 or twice the gross gains or losses resulting from the offense.

    Kahut will be sentenced on September 3, 2025, before a U.S. District Judge.

    This case was investigated by the FBI, U.S. Department of Commerce Office of Inspector General, and U.S. Department of Energy Office of Inspector General.  It is being prosecuted by Robert Trisotto, Assistant U.S. Attorney for the District of Oregon.

    MIL Security OSI

  • MIL-OSI Security: Drug Supplier From Lowell Sentenced to Nine Years in Prison for Role in Drug Trafficking Conspiracy

    Source: US FBI

    Defendant supplied thousands of counterfeit “Adderall” pills containing methamphetamine to Asian Boyz gang

    BOSTON – A Lowell man was sentenced on June 4, 2025 in federal court in Boston for conspiring with gang members to traffic methamphetamine pills made to look like the legitimate pharmaceutical product, Adderall.

    Brian Gingras, a/k/a “Cheech,” 39, was sentenced by U.S. District Court Judge Nathaniel M. Gorton to nine years in prison, to be followed by four years of supervised release. In January 2025, Gingras pleaded guilty to one count of conspiracy to distribute and to possess with intent to distribute 50 grams and more of methamphetamine, and one count of possession with intent to distribute 50 grams and more of methamphetamine.

    Gingras was a drug supplier in an extensive distribution network involving Asian Boyz gang member, Bill Phim, a/k/a “Bonez.” Between May 2022 and September 2022, Gingras delivered over 5,000 counterfeit Adderall pills – which were referred to as “Ads,” “Addies,” or simply, “A’s” – to Phim on numerous occasions. Phim then sold the pills to an undercover federal agent for more than $18,000. Chemical testing confirmed that the pills contained a dangerous compound of methamphetamine and caffeine.

    During a search of Gingras’ residence, hundreds of additional counterfeit “Adderall” pills as well as counterfeit “Xanax” pills and a pill press were discovered. The search also revealed that Gingras maintained a storage unit where he kept a loaded firearm and over 30 kilograms of counterfeit “Adderall” pills made with caffeine only, bags of suspected marijuana as well as boxes of THC extract and edible products.  

    Phim was sentenced by Judge Gorton in May 2025 to 10 years in prison.
     
    United States Attorney Leah B. Foley; Kimberly Milka, Acting Special Agent in Charge of the Federal Bureau of Investigation, Boston Division; and Superintendent Gregory C. Hudon of the Lowell Police Department made the announcement today. Valuable assistance was provided by the Massachusetts State Police; and the Billerica, Haverhill, North Andover and Salem Police Departments. Assistant U.S. Attorney Fred M. Wyshak, III of the Organized Crime & Gang Unit prosecuted the case.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce gun violence and other violent crime, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results. For more information about Project Safe Neighborhoods, please visit https://www.justice.gov/PSN.

    This case is also part of an Organized Crime Drug Enforcement Task Forces (OCDETF) operation. OCDETF identifies, disrupts, and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach. Additional information about the OCDETF Program can be found at https://www.justice.gov/OCDETF.

    MIL Security OSI

  • MIL-OSI Security: Security News: Founder of Cryptocurrency Payment Company Charged with Evading Sanctions and Export Controls, Defrauding Financial Institutions, and Violating the Bank Secrecy Act

    Source: United States Department of Justice

    Defendant Allegedly Laundered More Than $500M Through the U.S. Financial System, Including by Facilitating Transactions with Sanctioned Russian Banks

    A 22-count indictment was unsealed today charging Iurii Gugnin, also known as Iurii Mashukov and George Goognin, 38, a resident of New York and citizen of Russia, with various offenses related to using his cryptocurrency company Evita to funnel more than $500 million of overseas payments through U.S. banks and cryptocurrency exchanges while hiding the source and purpose of the transactions.

    According to court documents, Gugnin is charged with wire and bank fraud, conspiracy to defraud the United States, violation of the International Emergency Economic Powers Act (IEEPA), operating an unlicensed money transmitting business, failing to implement an effective anti-money laundering compliance program, failing to file suspicious activity reports, money laundering, and related conspiracy charges. Gugnin was arrested and arraigned today in New York.

    “The defendant is charged with turning a cryptocurrency company into a covert pipeline for dirty money, moving over half a billion dollars through the U.S. financial system to aid sanctioned Russian banks and help Russian end-users acquire sensitive U.S. technology,” said John A. Eisenberg, Assistant Attorney General for National Security. “The Department of Justice will not hesitate to bring to justice those who imperil our national security by enabling our foreign adversaries to sidestep sanctions and export controls.”

    “As alleged, Gugnin came to the United States and set up a money laundering operation under the guise of a cryptocurrency start-up, which he then used to evade sanctions and export controls and defraud U.S. financial institutions,” said U.S. Attorney Joseph Nocella Jr. for the Eastern District of New York. “Today’s arrest demonstrates that this Office will vigorously prosecute those who abuse the U.S. financial system in furtherance of criminal activity, particularly when it undermines national security.”

    “Gugnin’s cryptocurrency company allegedly served as a front to launder hundreds of millions of dollars for sanctioned Russian entities and to obtain export-controlled technology for the Russian government,” said Assistant Director Roman Rozhavsky of the FBI’s Counterintelligence Division. “Let this serve notice that using cryptocurrency to hide illegal conduct will not prevent the FBI and our partners from holding you accountable.”

    As alleged in the indictment, Gugnin is the founder, President, Treasurer, and Compliance Officer of U.S-based Evita Investments Inc. (Evita Investments) and Evita Pay Inc. (Evita Pay) (collectively, Evita). Gugnin used both companies to enable foreign customers — many of whom held funds at sanctioned Russian banks — to provide him with cryptocurrency, which he then laundered through cryptocurrency wallets and U.S. bank accounts. Gugnin ultimately converted the funds into U.S. dollars or other fiat currencies and then made payments through bank accounts in Manhattan on behalf of his foreign customers. In the process, the sources of the funds were obscured, disguising the audit trail and hiding the true counterparties to the transactions. Between June 2023 and January 2025, Gugnin used Evita to facilitate the movement of approximately $530 million through the U.S. financial system, most of which he received in the form of a cryptocurrency stablecoin known as Tether, or “USDT.”

    To effectuate the scheme, Gugnin defrauded various banks and cryptocurrency exchanges through which he converted funds and made wire transfers. Gugnin repeatedly lied to these banks and exchanges, telling them that Evita did not conduct business with entities in Russia and did not deal with sanctioned entities. In fact, many of Gugnin’s customers were located in Russia, and he facilitated payments in funds held at sanctioned Russian banks, including PJSC Sberbank, PJSC Sovcombank, PJSC VTB Bank, and JSC Tinkoff Bank. Gugnin maintained personal accounts at two sanctioned Russian banks, JSC Alfa-Bank and PJSC Sberbank, with which he transacted while residing in the United States. Gugnin also facilitated payments by foreign customers to procure sensitive electronics, including an export-controlled server designed by a U.S. technology company, and laundered funds from a Moscow-based supplier to purchase parts for Rosatom, Russia’s state-owned nuclear technology company. To conceal his activities, Gugnin regularly obfuscated invoices by digitally “whiting out” the names and addresses of his Russian customers.

    Gugnin also failed to implement Evita’s own purported anti-money laundering program and failed to file suspicious activity reports, as required under the Bank Secrecy Act. Although Gugnin represented to banks and cryptocurrency exchanges that Evita followed rigorous anti-money laundering and know-your-customer requirements, in practice he flouted those requirements, as well as the requirement to file reports of suspicious activities with the Financial Crimes Enforcement Network (FinCEN). Gugnin ultimately registered Evita Pay as a money transmitter with FinCEN and the state of Florida but did so by making materially false statements to the state of Florida about Evita Pay’s business. Gugnin used that fraudulently obtained state license to induce a cryptocurrency exchange to process transactions on his behalf.

    In the course of his scheme, Gugnin conducted web searches that confirmed his awareness that he was breaking the law, including searches for “how to know if there is an investigation against you”; “evita investments inc. criminal records search”; “Iurii Gugnin criminal records”; “money laundering penalties US”; and “penalties for sanctions violations EU luxury goods.” He also visited website pages titled, respectively “am I being investigated?”; “signs you may be under criminal investigation”; and “what are the best ways to find out if you’re being investigated and what can someone do when they think they might be under investigation.”

    If convicted, Gugnin faces a maximum penalty of 30 years in prison for each count of bank fraud; a maximum penalty of 20 years in prison for each of the wire fraud, IEEPA, money laundering, and related conspiracy counts; a maximum penalty of 10 years in prison for failure to implement an effective anti-money laundering program and failure to file suspicious activity reports; and a maximum penalty of five years in prison for conspiracy to defraud the United States and operating an unlicensed money transmitting business.

    Assistant U.S. Attorney Matthew Skurnik for the Eastern District of New York and Trial Attorney Dallas Kaplan of the National Security Division’s Counterintelligence and Export Control Section are prosecuting the case. Assistant U.S. Attorney Laura Mantell for the Eastern District of New York’s Asset Recovery Section is handling forfeiture matters.

    Today’s actions were coordinated through the Justice and Commerce Departments’ Disruptive Technology Strike Force. The Disruptive Technology Strike Force is an interagency law enforcement strike force co-led by the Departments of Justice and Commerce designed to target illicit actors, protect supply chains, and prevent critical technology from being acquired by authoritarian regimes and hostile nation-states.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: Former Orange County Supervisor Sentenced to 5 Years in Prison for Bribery Scheme Involving More Than $10 Million in COVID Funds

    Source: Office of United States Attorneys

    SANTA ANA, California – A former politician who served on the Orange County Board of Supervisors was sentenced today to 60 months in federal prison for accepting more than $550,000 in bribes for directing and voting in favor of more than $10 million in COVID-19 pandemic relief funds to a charity affiliated with one of his daughters.

    Andrew Hoang Do, 62, of Santa Ana, was sentenced by United States District Judge James V. Selna, who scheduled a restitution hearing for August 11.

    Do pleaded guilty in October 2024 to one count of conspiracy to commit bribery concerning programs receiving federal funds.

    “Elected officials have a sworn duty to put their constituents’ interests ahead of their own,” said United States Attorney Bill Essayli. “Public money intended to assist aging and ailing pandemic victims instead filled the coffers of Do, his family, and insiders. I commend our prosecutors and law enforcement partners for their work on this important case and for helping to remove a corrupt politician from his seat of power.”

    “As a county supervisor, Andrew Do transformed the County of Orange into an ATM available to his insiders, his loved ones, and himself, withdrawing millions of dollars to buy houses, lavish dinners, and expensive wine while the elderly, the sick, and the vulnerable who depended on Andrew Do were left to fend for themselves,” said Orange County District Attorney Todd Spitzer. “We, along with our federal partners, are continuing to peel back the layers of conspiracy to hold every thief accountable and return those stolen monies to the communities to which they belonged.”    

    “Mr. Do abused his powerful position as a county supervisor to profit personally at the expense of individuals in need, as well as the residents of Orange County, who deserve honest leadership,” said Akil Davis, the Assistant Director in Charge of the FBI’s Los Angeles Field Office. “The FBI will continue to pursue corrupt public officials whose actions erode trust in government.”

    From February 2015 until his resignation in October 2024, Do was one of five supervisors on the Orange County Board of Supervisors, which is responsible for the county’s $9 billion annual budget. As supervisor for the First District, Do represented the cities of Cypress, Fountain Valley, Garden Grove, Huntington Beach, La Palma, Los Alamitos, Midway City, Rossmoor, Seal Beach, and Westminster.

    Beginning in 2020, in exchange for more than $550,000 in bribes, Do voted in favor of and directed millions of dollars in COVID-related funds to the Viet America Society (VAS), a charity affiliated with his daughter. Do directed and worked together with other county employees to approve contracts with – and payments to – VAS. Do further admitted he acted corruptly and abused his position of trust as a county supervisor.

    Shortly after receiving the COVID-related public funds from the county government – funds that were intended to provide meals to the elderly and disabled – VAS from April 2021 to February 2024 paid a business identified in court documents as “Company #1” $100,000 or more per month, which totaled approximately $3,804,000. In September 2021, VAS increased its payments to Company #1 from $100,000 to $108,000 per month. Company #1 then began paying Rhiannon Do – Do’s daughter – $8,000 per month, totaling by February 2024 approximately $224,000.

    In addition to the $8,000 monthly payments that Company #1 had made to Do’s daughter, in July 2023, Company #1 also transferred a total of $381,500 from the funds it had received from VAS to an escrow company. In July 2023, Do’s daughter used the escrow account funds to purchase a home, in her name, in Tustin for $1,035,000. As part of that transaction, a mortgage for more than $600,000 was obtained by a loan application that contained false information and with fabricated documents. Do’s daughter has admitted in court documents that her conduct was criminal and violated federal and state law.

    The $381,500 from Company #1 that his daughter used to purchase the Tustin house in 2023 was a disguised bribe to Do. An additional $100,000 in payments sent to his other daughter, including three $25,000 checks from Company #2 – an air conditioning company that had been paid by VAS – also were bribes to Do.

    Some of the bribe funds that had been funneled to his daughters were spent for his direct benefit. For example, during 2022, a total of $14,849 of funds that had been funneled to Do’s daughters was used to make property tax payments for properties in Orange County owned by Do and his wife. Approximately $15,000 was used to pay for one of Do’s credit card bills.

    Do knew that VAS was not providing all the meals for which the county had paid VAS. Instead, much of the funds were used for the benefit of insiders, including to buy real estate in the name of both Do’s daughter and Company #1, bribe payments to both of Do’s daughters, payments to other conspirators, payments to other companies affiliated with VAS’s listed officers, and through hundreds of thousands of dollars in cash withdrawals.

    Do forfeited assets connected to the bribery scheme, including the Tustin property his daughter purchased in 2023. As part of his daughter’s related diversion agreement, she forfeited the Tustin property. The plea agreement requires Do to pay full restitution by paying back the bribe money he and his daughters received. In August 2024, the government seized more than $2.4 million from VAS’s and Company #1’s bank accounts.

    Do resigned from the Orange County Board of Supervisors as part of a related agreement with the Orange County District Attorney’s Office (OCDA). He also agreed to forfeit any pension credit for the time where he participated in the bribery conspiracy.

    The FBI; the Orange County District Attorney’s Office Bureau of Investigation; the Federal Deposit Insurance Corp. Office of the Inspector General; IRS Criminal Investigation; and the United States Department of Education Office of the Inspector General investigated this matter.

    This matter is being jointly prosecuted by the United States Attorney’s Office and OCDA. The prosecution is being led by Assistant United States Attorneys Nandor F.R. Kiss, Rosalind Wang, and Tara Vavere of the United States Attorney’s Office and Senior Deputy District Attorney Avery T. Harrison and Deputy District Attorney Anthony J. Schlehner of the OCDA. 

    Any member of the public who has information related to this or any other public corruption matter in Orange County is encouraged to send information to the FBI’s email tip line at https://tips.fbi.gov and/or to contact the FBI’s Los Angeles Field Office at (310) 477-6565.

    MIL Security OSI

  • MIL-OSI Security: FORMER BATON ROUGE CITY PARISH CONTRACTOR SENTENCED TO 86 MONTHS FOR DISTRIBUTION OF CHILD PORNOGRAPHY

    Source: Office of United States Attorneys

    Acting United States Attorney Ellison C. Travis announced that U.S. District Judge Brian A. Jackson sentenced Blake Joseph Steiner, age 37, of Baton Rouge, Louisiana, to 86 months in federal prison following his conviction for distribution of child pornography. The Court further sentenced Steiner to serve five years of supervised release following his term of imprisonment and ordered him to complete sex offender treatment and register as a sex offender upon his release.

    According to admissions made during his plea, Steiner initiated a conversation on a mobile application group chat with an undercover agent (“UCA”). Steiner hoped to gain access to a group that was dedicated to sharing and trading child pornography. To gain access, Steiner first sent the UCA a video of himself and the date to verify his identity. In another effort to gain access to what he thought was an online child pornography group, Steiner sent a video of a girl under 12 years old being raped by an adult male.  Steiner further admitted to the UCA that he managed another child pornography group online and that he engaged in hands-on conduct involving a minor. 

    This matter was investigated by the U.S. Department of Homeland Security – Homeland Security Investigations, and the Louisiana State Police and was prosecuted by Assistant United States Attorney Edward H. Warner, who also serves as Deputy Criminal Chief.   

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse, launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend, and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit http://www.justice.gov/psc.

    MIL Security OSI

  • MIL-OSI Security: Canadian Father and Son Plead Guilty to Illegal Entry

    Source: Office of United States Attorneys

    Burlington, Vermont – The United States Attorney’s Office for the District of Vermont stated that on June 6, 2025, Van Hoa Phung, 49, and Reason Phung, 18, both citizens of Canada, pleaded guilty to criminal complaints charging them, respectively, with illegally entering the United States at a time or place other than designated for entering the country by immigration authorities, and illegally entering the United States by making willfully false statements.

    According to court records, on June 5, 2025, at approximately 2:35 p.m., the United States Border Patrol observed a man walking south and crossing the United States-Canada international border near the Haskell Free Library in Derby Line, Vermont. The Haskell Free Library and its vicinity do not constitute a time or place as designated by immigration officers to lawfully enter the United States.

    After entering the U.S., the man, who was wearing a red shirt with shorts, entered the passenger side of a Red Tesla motor vehicle. Border Patrol agents stopped the vehicle in a parking lot in Derby, Vermont and identified the driver as Reason Phung, and the passenger as Van Hoa Phung, Reason Phung’s father. Van Hoa Phung was wearing a red shirt with shorts consistent with the description of the individual who illegally crossed the border.

    During the vehicle stop, Border Patrol determined that the Red Tesla previously crossed through a legal port of entry in Derby, Vermont. At the time the vehicle entered, Reason Phung was the only occupant.

    Reason Phung admitted that he travelled to the border where he dropped off his father, Van Hoa Phung, at the Haskell Free Library in Derby Line, Vermont. Thereafter, Reason Phung entered through the port of entry, and then picked his father up in the U.S. after Van Hoa Phung illegally crossed the border in the vicinity of the library. Reason Phung intended to transport his father to an airport and then return to Canada.

    When he entered through the Port of Entry earlier, Reason Phung stated his purpose in entering the United States was to visit his grandparents. Because his real purpose was to pick up and transport his father and then return to Canada, that statement was false.

    Van Hoa Phung and Reason Phung had their initial court appearances before United States Magistrate Judge Kevin J. Doyle on June 6, 2025, where they each pleaded guilty, and both received time-served sentences.

    Acting United States Attorney Michael P. Drescher commended the investigatory efforts of the United States Border Patrol and United States Customs and Border Protection.

    The prosecutor is Assistant United States Attorney Zachary Stendig. Van Hoa Phung is represented by Federal Public Defender Michael Desautels. Reason Phung is represented by Robert Behrens, Esq.

    This case is part of Operation Take Back America a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations (TCOs), and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces (OCDETFs) and Project Safe Neighborhood (PSN).

    MIL Security OSI

  • MIL-OSI Security: Third Grade Teacher Charged With Additional Child Exploitation Offenses

    Source: Office of United States Attorneys

    Tampa, Florida – United States Attorney Gregory W. Kehoe announces the return of a superseding indictment charging Lee Hughes (45, Pinellas Park) with attempted transmission of harmful material to a minor, attempted enticement or coercion of a minor, and receipt and possession of child sexual abuse material. If convicted on all counts, Hughes faces a minimum sentence of 10 years, up to life, in federal prison. 

    According to the indictment and court documents, Hughes communicated with an undercover officer in an attempt to engage in sexual intercourse with the undercover officer’s purported nine-year-old daughter. Throughout their communications, Hughes sent the undercover officer approximately 10 explicit photos and/or videos of himself, with the request they be shown to the purported child. On May 1, 2025, Hughes traveled to an agreed-upon location to engage in sexual intercourse with the purported nine-year-old girl and was arrested. Law enforcement searched Hughes’s cellphone and discovered he had received and possessed child sexual abuse material. 

    An indictment is merely a formal charge that a defendant has committed one or more violations of federal criminal law, and every defendant is presumed innocent unless, and until, proven guilty.

    This case was investigated by the Federal Bureau of Investigation. It will be prosecuted by Assistant United States Attorney Abigail K. King.

    It is another case brought as part of Project Safe Childhood, a nationwide initiative launched in 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue child victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    MIL Security OSI

  • MIL-OSI Security: Wilson Gang Member Sentenced to Seven Years in Prison

    Source: Office of United States Attorneys

    RALEIGH, N.C. – A Wilson man was sentenced Friday to seven years in prison followed by three years of supervised release for illegally possessing a firearm after being convicted of a felony.  Joshua Elijah Strickland, 22, pled guilty to the charge on March 11, 2025.

    According to court documents and other information presented in court, Strickland was arrested last July when the Wilson Police Department searched a house where Strickland and other gang members stored guns and drugs. That search came on the heels of a June 26, 2024, incident in which multiple men were spotted retreating to the gang house after firing 11 rounds into another occupied house just a few blocks away. The June 26 shooting was part of a spike in gang violence last summer, when Wilson saw at least 12 gang-related shootings occur in less than one month. Strickland has several prior felony convictions, including possession of a stolen firearm and maintaining a place for the use, storage, or sale of a controlled substance.

    Daniel P. Bubar, Acting U.S. Attorney for the Eastern District of North Carolina made the announcement after sentencing by U.S. District Judge James C. Dever III. The Federal Bureau of Investigation’s Raleigh-Durham Safe Streets Task Force and the Wilson Police Department investigated the case. Assistant U.S. Attorneys Phil Aubart and Chris Cogburn prosecuted the case.

    Related court documents and information can be found on the website of the U.S. District Court for the Eastern District of North Carolina or on PACER by searching for Case No. 4:24-CR-305.

    ###

    MIL Security OSI

  • MIL-OSI Security: Five Plead Guilty In Kissimmee Cocaine Conspiracy

    Source: Office of United States Attorneys

    Orlando, Florida – United States Attorney Gregory W. Kehoe announces that Luis Ruben Martinez Calderon (26, Kissimmee) has pleaded guilty to conspiracy to distribute cocaine. Martinez Calderon is the final defendant to plead guilty in this case.

    Name

    Date of Plea

    Charges

    Maximum Penalties

    Luis Ruben Martinez Calderon

    (26, Kissimmee)

    June 5, 2025 Drug conspiracy Minimum 5 years, up to 40 years in federal prison

    Quamain Alique Barber

    (34, Kissimmee)

    April 30, 2025

    Drug conspiracy

    Possession of a firearm in furtherance of drug trafficking

    Minimum 5 years, up to 40 years in federal prison  

    Minimum 5 years, up to life in federal prison to run consecutive

    Bernardo Antonio Brea

    (31, Kissimmee)

    April 22, 2025

    Drug conspiracy

    Possession of firearm by convicted felon

    20 years in federal prison

    15 years in federal prison

    Aisha Nicolle Sanchez (25, Kissimmee) May 20, 2025 Drug conspiracy Minimum 5 years, up to 40 years in federal prison
    Evelyn Calderon (57, Kissimmee) May 13, 2025 Drug conspiracy Minimum 5 years, up to 40 years in federal prison

    According to the plea agreements filed in the case, Martinez Calderon regularly supplied retail dealers such as Barber from his apartment in Kissimmee, where he lived with his girlfriend, Sanchez. In January 2025, Barber sold cocaine to an undercover officer, and immediately drove to Martinez Calderon to be resupplied.

     

    The investigation also revealed that Martinez Calderon supplied Barber with cocaine that Martinez Calderon stored with his mother, Evelyn Calderon, who resupplied him when needed. Sanchez helped to recover a suitcase with at least two kilograms of cocaine from the mother’s home for Martinez Calderon to distribute. In late January 2025, Martinez Calderon worked with Brea to obtain cocaine for Barber to distribute.

    On February 6, 2025, when a series of arrest warrants were executed, Brea and Barber were found to be in possession of firearms. Brea was prohibited from possessing firearms because he was previously convicted of felonies, including possessing a firearm as a convicted felon to which he pleaded guilty one week before he was found in possession of a firearm by federal agents. Barber’s firearm was recovered along with bags of cocaine prepared for distribution.

     

    This case was investigated by the Federal Bureau of Investigation’s Safe Streets Task Force and the Bureau of Alcohol, Tobacco, Firearms and Explosives, with assistance from the Kissimmee Police Department, the Osceola County Sheriff’s Office, and the Florida Highway Patrol. It is being prosecuted by Assistant United States Attorney Dana E. Hill.

    This case was part of an Organized Crime Drug Enforcement Task Force (OCDETF) investigation. OCDETF identifies, disrupts, and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach. Additional information about the OCDETF Program can be found at www.justice.gov/OCDETF.

    MIL Security OSI

  • MIL-OSI Security: Founder of Cryptocurrency Payment Company Charged with Evading Sanctions and Export Controls, Defrauding Financial Institutions, and Violating the Bank Secrecy Act

    Source: United States Attorneys General 8

    Defendant Allegedly Laundered More Than $500M Through the U.S. Financial System, Including by Facilitating Transactions with Sanctioned Russian Banks

    A 22-count indictment was unsealed today charging Iurii Gugnin, also known as Iurii Mashukov and George Goognin, 38, a resident of New York and citizen of Russia, with various offenses related to using his cryptocurrency company Evita to funnel more than $500 million of overseas payments through U.S. banks and cryptocurrency exchanges while hiding the source and purpose of the transactions.

    According to court documents, Gugnin is charged with wire and bank fraud, conspiracy to defraud the United States, violation of the International Emergency Economic Powers Act (IEEPA), operating an unlicensed money transmitting business, failing to implement an effective anti-money laundering compliance program, failing to file suspicious activity reports, money laundering, and related conspiracy charges. Gugnin was arrested and arraigned today in New York.

    “The defendant is charged with turning a cryptocurrency company into a covert pipeline for dirty money, moving over half a billion dollars through the U.S. financial system to aid sanctioned Russian banks and help Russian end-users acquire sensitive U.S. technology,” said John A. Eisenberg, Assistant Attorney General for National Security. “The Department of Justice will not hesitate to bring to justice those who imperil our national security by enabling our foreign adversaries to sidestep sanctions and export controls.”

    “As alleged, Gugnin came to the United States and set up a money laundering operation under the guise of a cryptocurrency start-up, which he then used to evade sanctions and export controls and defraud U.S. financial institutions,” said U.S. Attorney Joseph Nocella Jr. for the Eastern District of New York. “Today’s arrest demonstrates that this Office will vigorously prosecute those who abuse the U.S. financial system in furtherance of criminal activity, particularly when it undermines national security.”

    “Gugnin’s cryptocurrency company allegedly served as a front to launder hundreds of millions of dollars for sanctioned Russian entities and to obtain export-controlled technology for the Russian government,” said Assistant Director Roman Rozhavsky of the FBI’s Counterintelligence Division. “Let this serve notice that using cryptocurrency to hide illegal conduct will not prevent the FBI and our partners from holding you accountable.”

    As alleged in the indictment, Gugnin is the founder, President, Treasurer, and Compliance Officer of U.S-based Evita Investments Inc. (Evita Investments) and Evita Pay Inc. (Evita Pay) (collectively, Evita). Gugnin used both companies to enable foreign customers — many of whom held funds at sanctioned Russian banks — to provide him with cryptocurrency, which he then laundered through cryptocurrency wallets and U.S. bank accounts. Gugnin ultimately converted the funds into U.S. dollars or other fiat currencies and then made payments through bank accounts in Manhattan on behalf of his foreign customers. In the process, the sources of the funds were obscured, disguising the audit trail and hiding the true counterparties to the transactions. Between June 2023 and January 2025, Gugnin used Evita to facilitate the movement of approximately $530 million through the U.S. financial system, most of which he received in the form of a cryptocurrency stablecoin known as Tether, or “USDT.”

    To effectuate the scheme, Gugnin defrauded various banks and cryptocurrency exchanges through which he converted funds and made wire transfers. Gugnin repeatedly lied to these banks and exchanges, telling them that Evita did not conduct business with entities in Russia and did not deal with sanctioned entities. In fact, many of Gugnin’s customers were located in Russia, and he facilitated payments in funds held at sanctioned Russian banks, including PJSC Sberbank, PJSC Sovcombank, PJSC VTB Bank, and JSC Tinkoff Bank. Gugnin maintained personal accounts at two sanctioned Russian banks, JSC Alfa-Bank and PJSC Sberbank, with which he transacted while residing in the United States. Gugnin also facilitated payments by foreign customers to procure sensitive electronics, including an export-controlled server designed by a U.S. technology company, and laundered funds from a Moscow-based supplier to purchase parts for Rosatom, Russia’s state-owned nuclear technology company. To conceal his activities, Gugnin regularly obfuscated invoices by digitally “whiting out” the names and addresses of his Russian customers.

    Gugnin also failed to implement Evita’s own purported anti-money laundering program and failed to file suspicious activity reports, as required under the Bank Secrecy Act. Although Gugnin represented to banks and cryptocurrency exchanges that Evita followed rigorous anti-money laundering and know-your-customer requirements, in practice he flouted those requirements, as well as the requirement to file reports of suspicious activities with the Financial Crimes Enforcement Network (FinCEN). Gugnin ultimately registered Evita Pay as a money transmitter with FinCEN and the state of Florida but did so by making materially false statements to the state of Florida about Evita Pay’s business. Gugnin used that fraudulently obtained state license to induce a cryptocurrency exchange to process transactions on his behalf.

    In the course of his scheme, Gugnin conducted web searches that confirmed his awareness that he was breaking the law, including searches for “how to know if there is an investigation against you”; “evita investments inc. criminal records search”; “Iurii Gugnin criminal records”; “money laundering penalties US”; and “penalties for sanctions violations EU luxury goods.” He also visited website pages titled, respectively “am I being investigated?”; “signs you may be under criminal investigation”; and “what are the best ways to find out if you’re being investigated and what can someone do when they think they might be under investigation.”

    If convicted, Gugnin faces a maximum penalty of 30 years in prison for each count of bank fraud; a maximum penalty of 20 years in prison for each of the wire fraud, IEEPA, money laundering, and related conspiracy counts; a maximum penalty of 10 years in prison for failure to implement an effective anti-money laundering program and failure to file suspicious activity reports; and a maximum penalty of five years in prison for conspiracy to defraud the United States and operating an unlicensed money transmitting business.

    Assistant U.S. Attorney Matthew Skurnik for the Eastern District of New York and Trial Attorney Dallas Kaplan of the National Security Division’s Counterintelligence and Export Control Section are prosecuting the case. Assistant U.S. Attorney Laura Mantell for the Eastern District of New York’s Asset Recovery Section is handling forfeiture matters.

    Today’s actions were coordinated through the Justice and Commerce Departments’ Disruptive Technology Strike Force. The Disruptive Technology Strike Force is an interagency law enforcement strike force co-led by the Departments of Justice and Commerce designed to target illicit actors, protect supply chains, and prevent critical technology from being acquired by authoritarian regimes and hostile nation-states.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: Six Men Sentenced for Illegally Transmitting More Than $15 Million Dollars Using Hawala Network

    Source: US FBI

    Jay Clayton, the United States Attorney for the Southern District of New York, and Christopher G. Raia, the Assistant Director in Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced that HIRENKUMAR PATEL, the last of six defendants in a case involving an unlicensed money transmitting business that illegally sent millions of dollars in cash throughout the U.S. and between the U.S. and India, was sentenced to 21 months in prison by U.S. District Judge Kenneth M. Karas.  PATEL previously pled guilty to one count of conspiracy to operate an unlicensed money transmitting business and one count of operation of an unlicensed money transmitting business on September 12, 2024, before U.S. Magistrate Judge Victoria Reznik.

    “The anonymous transmission of money is a linchpin of international criminal activity, whether hacking, drug dealing, sex trafficking, or terrorism” said U.S. Attorney Jay Clayton.  “Unlicensed money transmission organizations, like the ‘halawa’ network operated by Patel and his cohorts, are tailor made for supporting international criminal activity.  Together with our law enforcement partners, we will seek to shut down these unlicensed networks and stop the flow of dirty money to criminals who do harm to Americans from abroad.”

    FBI Assistant Director in Charge Christopher G. Raia said: “These six defendants engaged in an unregulated money transferring scheme responsible for illegally transmitting $15 million in less than a year.  Illicit financial schemes like this one cause damage to our economic system that extends beyond the directly involved bad actors.  The sentencings announced today demonstrate the FBI’s commitment to ensuring those who attempt to carry out illegal financial schemes face the repercussions in the criminal justice system.”

    According to allegations contained in the Complaint, the Information, court filings, and public court proceedings:

    In or about April 2021, law enforcement identified a vendor (“Vendor”) on the dark web who was offering, in exchange for a fee, a service to convert cryptocurrency into cash.  The Vendor indicated to an undercover agent that some of his clients made money by selling drugs, his wealthiest clients were hackers, and that he had made approximately $30 million over the prior three years through the conversion of cryptocurrency to cash.

    In or about February 2023, law enforcement began working with a confidential source and learned that the Vendor was using a “hawala”[1] to obtain the cash that was ultimately exchanged for the cryptocurrency.  As part of this hawala, several of the defendants collected cash along the East Coast of the U.S., which was later delivered to an individual who mailed the cash to the Vendor’s customers.  All six defendants participated in the delivery of, and/or coordinated the delivery of, the collected cash.  The persons who supplied the cash for collection, in turn, used the hawala to have their cash converted into rupees delivered to designated individuals in India.

    Of the approximately $15 million sent through the hawala between in or about February 2023 and in or about September 2023, PATEL was responsible for participating in 42 deliveries of bags of cash totaling more than $7.7 million.  Neither PATEL nor his co-defendants were licensed or registered to operate as a money transmitting business in New York or under federal law.

    *                *                *

    A chart containing the names of the defendants, the charges they were convicted of, and the sentences they received is set forth below.

    Mr. Clayton praised the outstanding work of the FBI, the U.S. Postal Inspection Service, and the U.S. Attorney’s Office for the Eastern District of Kentucky in connection with this investigation.

    The prosecution is being handled by the Office’s White Plains Division. Assistant U.S. Attorneys Benjamin Levander and Timothy Ly are in charge of the prosecution.

    Defendant

    Age

    Convictions

    Sentence

    Rajendrakumar Patel 52 Conspiracy to Operate an Unlicensed Money Transmitting Business and Operation of an Unlicensed Money Transmitting Business 27 months in prison
    Brijeshkumar Patel 32 Conspiracy to Operate an Unlicensed Money Transmitting Business and Operation of an Unlicensed Money Transmitting Business 18 months in prison
    Hirenkumar Patel 40 Conspiracy to Operate an Unlicensed Money Transmitting Business and Operation of an Unlicensed Money Transmitting Business 21 months in prison
    Naineshkumar Patel 51 Conspiracy to Operate an Unlicensed Money Transmitting Business and Operation of an Unlicensed Money Transmitting Business 12 months and one day in prison
    Nileshkumar Patel 33 Conspiracy to Operate an Unlicensed Money Transmitting Business and Operation of an Unlicensed Money Transmitting Business 3 years of probation
    Shaileshkumar Goyani 36 Conspiracy to Operate an Unlicensed Money Transmitting Business and Operation of an Unlicensed Money Transmitting Business Time served

    [1] A “hawala” is an unregulated method of transferring money—usually internationally—from one person to another without the money being physically transported from one location another. Rather, someone who seeks to have money transferred relies on brokers who use their own capital to disburse money and informal ledgers to track the receipt and disbursal of money.  

    MIL Security OSI

  • MIL-OSI Security: Executive at Investor Relations Firm and Two Associates Plead Guilty to Insider Trading Scheme

    Source: US FBI

    Robert Yedid, Andrew Kaufman, and Mark Jacobs Admit to Illegal Trading in Several Health Care Company Clients of Investor Relations Firm

    Jay Clayton, the United States Attorney for the Southern District of New York, and Christopher G. Raia, the Assistant Director in Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced today that ROBERT YEDID, ANDREW KAUFMAN, and MARK JACOBS pled guilty to participating in a five-year insider trading scheme to reap illegal profits from stock and options trading based on inside information about several health care company clients of the investor relations firm where YEDID was employed.  Together, YEDID, KAUFMAN and JACOBS made more than $500,000 in illicit gains through this scheme.  JACOBS pled guilty today before U.S. Chief District Judge Laura Taylor Swain.  YEDID and KAUFMAN pled guilty before Chief Judge Swain on May 29, 2025.

    “Robert Yedid betrayed the trust of his employer and its clients by stealing confidential information and passing it to two friends, Andrew Kaufman and Mark Jacobs, to make unlawful, profitable trades based on inside information,” said U.S. Attorney Jay Clayton.  “This Office is committed to prosecuting securities fraud and ensuring that insiders and their friends can’t cheat their way to profits.  With our law enforcement partners, we will continue to police the financial markets and hold those accountable who misuse nonpublic information for personal gain.” 

    FBI Assistant Director in Charge Christopher G. Raia said: “Robert Yedid abused his authority as a former investor relations director and provided his friends with material nonpublic information to obtain hundreds of thousands of dollars in illicit profits.  By betraying the trust placed in his position, Yedid established an unlawful financial advantage for his insular social circle that was not afforded to all investors.  May today’s plea serve as a deterrent to any individual who exploits confidential trading information for personal benefit.”

    According to the allegations contained in the Information and statements made in public filings and in public court proceedings:

    Between 2019 and 2024, YEDID, KAUFMAN, and JACOBS engaged in a scheme to trade in stocks and options based on material nonpublic information about several publicly traded health care companies, in violation of the duties of trust and confidence that YEDID owed to his employer, an investor relations firm, and to the companies.

    YEDID was a director at an investor relations firm that provided public relations services to health care companies, including BioDelivery Sciences International Inc. (“BDSI”), CinCor Pharma (“CinCor”), Inotiv (“Inotiv”), Inspire Medical Systems (“Inspire”), Nano-X Imaging Ltd. (“Nano-X”), and OncoCyte Corp. (“OncoCyte”).  In this role, YEDID had access to the content of upcoming press releases, which often contained highly sensitive, non-public, and potentially market-moving news, such as earning reports, regulatory approvals, clinical trial results, and merger and acquisition announcements.  YEDID owed a duty of trust and confidence to his employer and its clients and was prohibited from misusing or disclosing the firm’s confidential information for personal gain or to benefit others.

    Beginning in 2019, YEDID knowingly and willfully tipped his friends, KAUFMAN and JACOBS, with valuable, nonpublic information of upcoming corporate announcements involving at least six client companies.  That confidential information included advanced notice of an upcoming merger for BDSI; clinical trial results for healthcare products being developed by OncoCyte and CinCor; and quarterly earnings announcements for Inspire, Nano-X, and Inotiv.

    YEDID understood and intended that the information he provided to KAUFMAN and JACOBS would be used to execute securities trades before the information became public.  As expected, KAUFMAN and JACOBS executed trades based on YEDID’s tips.  In many cases, KAUFMAN and JACOBS traded aggressively in the securities of the companies, often purchasing shares or options just days before major announcements were made.  Together, KAUFMAN and JACOBS traded in stocks and options on at least 17 different occasions based on YEDID’s tips.  KAUFMAN generated profits of more than $480,000, and JACOBS generated profits of more than $35,000. In exchange for the tips, KAUFMAN shared half of his illegal profits with YEDID by giving him cash in envelopes during various meetings in New York City.

    In November 2024, FBI agents approached YEDID, KAUFMAN, and JACOBS as part of this investigation.  Shortly after being contacted by the FBI, KAUFMAN intentionally deleted spreadsheets he maintained that listed the illegal profits he made through trading based on YEDID’s tips.  KAUFMAN deleted these records in order to impede and obstruct the FBI’s investigation.

    *               *                *

    YEDID, 67, of New York, New York, pled guilty to one count of conspiracy to commit securities fraud, which carries a maximum sentence of five years in prison, and one count of securities fraud, which carries a maximum sentence of 25 years in prison.

    KAUFMAN, 68, of New York, New York, pled guilty to one count of conspiracy to commit securities fraud, which carries a maximum sentence of five years in prison; one count of securities fraud, which carries a maximum sentence of 25 years in prison; and one count of obstruction of justice, which carries a maximum sentence of 20 years in prison.

    JACOBS, 77, of Malvern, Pennsylvania, pled guilty to one count of conspiracy to commit securities fraud, which carries a maximum sentence of five years in prison.

    YEDID is scheduled to be sentenced by Chief Judge Swain on September 12, 2025, at 2:30 p.m; KAUFMAN is scheduled to be sentenced by Chief Judge Swain on September 18, 2025, at 11 a.m; and JACOBS is scheduled to be sentenced by Chief Judge Swain on September 19, 2025, at 11 a.m.

    The maximum potential sentences are prescribed by Congress and provided here for informational purposes only, as any sentencing of the defendants will be determined by the judge. 

    Mr. Clayton praised the outstanding work of the FBI.  Mr. Clayton also thanked the U.S. Securities and Exchange Commission for its cooperation and assistance in this investigation. 

    The case is being handled by the Office’s Securities and Commodities Fraud Task Force. Assistant U.S. Attorney Alexandra Rothman is in charge of the prosecution.

    MIL Security OSI

  • MIL-OSI Security: Nigerian Man Sentenced to More Than Five Years for Hacking, Fraud, and Identity Theft Scheme

    Source: US FBI

    Jay Clayton, the United States Attorney for the Southern District of New York, and Christopher G. Raia, the Assistant Director in Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced that KINGSLEY UCHELUE UTULU was sentenced today by U.S. District Judge Paul G. Gardephe to 63 months in prison for his role in a broad hacking, fraud, and identity theft scheme targeting U.S.-based businesses and individuals.  UTULU previously pled guilty to conspiracy to commit wire fraud.

    “Kingsley Uchelue Utulu took part in a scheme to hack into U.S. tax preparation businesses, trade in the stolen personal identifying information, and defraud the IRS and other governmental bodies,” said U.S. Attorney Jay Clayton.  “Offshore scammers like Utulu and his co-conspirators may think they can target hard-working Americans with their hacking and fraud schemes and avoid prosecution.  The message from the Department and the FBI is clear, they cannot.  We are committed to protecting Americans from criminals operating offshore.”   

    FBI Assistant Director in Charge Christopher G. Raia said: “Kingsley Utulu, a Nigerian national, was part of a scheme that targeted and infiltrated electronic systems of U.S.-based companies to steal more than two million dollars through fraudulent tax returns.  Along with his co-conspirators, this defendant’s scheme reached across the globe to exploit sensitive information for financial gain.  The FBI will never exempt any individual who seeks to unlawfully profit through deceitful practices, regardless of where they are located.”

    According to the Indictment, public court filings, and statements made in court:

    Beginning in at least in or about 2019, UTULU and other Nigeria-based conspirators took part in a scheme to hack into U.S-based tax preparation businesses.  The conspirators utilized spearphishing emails to obtain access to these business’s electronic systems.  Once they had obtained access, the conspirators stole the tax and other identifying information of the business’ customers.  The conspirators hacked into several U.S.-based tax businesses, located in New York, Texas, and other states.

    The conspirators obtained the stolen identity information of thousands of individuals.  They used this information to file fraudulent tax returns with the Internal Revenue Service and state tax authorities.  The conspirators sought fraudulent refunds of at least approximately $8.4 million, of which they successfully obtained at least approximately $2.5 million.

    In addition to filing fraudulent tax returns, the conspirators used the stolen identities to file fraudulent claims with the Small Business Administration’s Economic Injury Disaster Loan program.  The conspirators were able to obtain at least an additional approximately $819,000 in fraudulent payouts.

    UTULU was arrested for his involvement in this scheme while being present in the United Kingdom and was thereafter extradited to the U.S. to be prosecuted. 

    *                *                *

    In addition to the prison term, UTULU, 38, of Nigeria, was ordered to pay restitution in an amount of $3,683,029.39 and forfeiture in the amount of $290,250.

    Mr. Clayton praised the outstanding investigative work of the FBI.

    The prosecution of this case is being handled by the Office’s Complex Frauds and Cybercrime Unit. Assistant U.S. Attorney Daniel G. Nessim is in charge of the prosecution.

    MIL Security OSI

  • MIL-OSI Security: Federal Jury Convicts Fort Gibson Resident of Second-Degree Murder in Indian Country

    Source: US FBI

    MUSKOGEE, OKLAHOMA – The United States Attorney’s Office for the Eastern District of Oklahoma announced today that David Allen Lee, age 44, of Fort Gibson, Oklahoma, was found guilty by a federal jury of one count of Second Degree Murder in Indian Country, punishable by up to life in prison.

    The jury trial began with testimony on Tuesday, June 3, 2025, and concluded, on Thursday, June 5, 2025, with the guilty verdict.

    During the trial, the United States presented evidence that on July 2, 2024, Lee stabbed a Tahlequah resident in the chest with a knife at the victim’s residence.  Lee waited to call 911 for several hours after the victim’s death and barricaded himself inside the residence before finally surrendering to police.  The crime occurred in Cherokee County, within the boundaries of the Cherokee Nation Reservation, in the Eastern District of Oklahoma.

    The guilty verdict was the result of an investigation by the Tahlequah Police Department, the Cherokee Nation Marshal Service, and the Federal Bureau of Investigation.

    The Honorable Ronald A. White, Chief U.S. District Judge in the United States District Court for the Eastern District of Oklahoma, presided over the trial and ordered the completion of a presentence report.  The sentencing will be scheduled following completion of the report.  Lee will remain in custody of the United States Marshals until sentencing.

    Assistant U.S. Attorneys Kevin Gross and Patrick Flanigan represented the United States.

    MIL Security OSI

  • MIL-OSI Security: Brooklyn Man Pleads Guilty to Kidnapping a Child From Berks County in 2022

    Source: US FBI

    PHILADELPHIA – United States Attorney David Metcalf announced that Duane Taylor, 50, of Brooklyn, New York, entered a plea of guilty today before United States District Court Judge John M. Gallagher to charges arising from the abduction of a minor child from her home in Reading, Pennsylvania, and transportation of that child across state lines to Taylor’s residence.

    In January 2023, Taylor was charged by superseding indictment with kidnapping, travel with intent to engage in illicit sexual conduct, production of child pornography, possession of child pornography, and transportation of child pornography. He pleaded guilty to all counts.

    As detailed in court filings, on the morning of August 31, 2022, City of Reading police officers responded to the victim’s home when the child’s mother reported her missing from her bedroom, where she had last seen her daughter around 10:30 p.m. the evening prior before going to bed. After searching for the child, her mother observed that the back door of their residence was wide open, and law enforcement found the chain lock on that door was broken.

    Investigators reviewed video surveillance footage from the home’s security system, which showed a person entering the living room area at approximately 2 a.m. and proceeding to the stairs leading to the second floor. A short time later, the victim is seen walking down those stairs and through the living room, followed by the person who was later identified as the defendant, whom the victim’s mother also stated was her former boyfriend.

    Reading investigators contacted the New York City Police Department, who traced the defendant to his residence in Brooklyn, but did not locate the victim there. The victim was located later that day when a citizen called 911 to report a child alone and asking for help because she had been kidnapped from Pennsylvania.

    The defendant is scheduled to be sentenced on September 18 and faces a maximum possible sentence of life in prison.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by United States Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend, and prosecute individuals who exploit children via the internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit projectsafechildhood.gov.

    The case was investigated by the FBI, the Reading Police Department, and the New York City Police Department, and is being prosecuted by Assistant United States Attorneys Rosalynda M. Michetti and Josh A. Davison.

    MIL Security OSI

  • MIL-OSI Security: Thirty-Five-Year-Old Man Arrested for Child Exploitation

    Source: US FBI

    SAN JUAN, Puerto Rico – U.S. Attorney W. Stephen Muldrow of the District of Puerto Rico andSpecial Agent in Charge of the FBI San Juan Field Office Devin J. Kowalski, announced that a federal grand jury in the District of Puerto Rico returned an indictment charging Henry Manuel Sepúlveda-Cruzado, age 35, of Vega Baja, Puerto Rico, with production and possession of child pornography material. On June 5, 2025, FBI special agents arrested Sepúlveda-Cruzado.

    According to court documents, between approximately November 2023 and February 2024, Henry Manuel Sepúlveda-Cruzado knowingly employed, used, persuaded, induced, enticed, and coerced a female minor to engage in sexually explicit conduct for the purpose of producing visual depictions of that conduct. During this period, the defendant also possessed child pornography material involving the minor on his electronic device.

    If convicted, Sepúlveda-Cruzado faces a mandatory minimum sentence of 15 years and a maximum of 30 years in prison for production of child pornography, and up to 10 years in prison for possession of child pornography. The final sentence will be determined by a federal district court judge, who will consider the U.S. Sentencing Guidelines and other statutory factors.

    “The sexual abuse of children is intolerable and victimizes the most innocent and vulnerable members of our community,” said W. Stephen Muldrow, United States Attorney for the District of Puerto Rico. “We will continue working to identify, arrest and prosecute those who steal the innocence of our children.”

    “There is no place in our communities for predators who exploit children—none,” said the Special Agent in Charge of the FBI’s San Juan Field Office, Devin J. Kowalski. “The FBI will hunt these criminals down and ensure they are held fully accountable for their heinous acts. The public can rest assured that we will not hesitate, and we will not relent. To those targeting our youth, we’re coming for you. The FBI and our partners will make sure you face justice.”

    The FBI is investigating the case with the collaboration of the Puerto Rico Police Bureau.

    Assistant US Attorney (AUSA) Elba Gorbea of the Child Exploitation and Immigration Unit is prosecuting the case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and the Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend, and prosecute individuals who exploit children via the internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    An indictment is merely an allegation, and all defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    ###

    MIL Security OSI

  • MIL-OSI Security: Monroe Michigan Man Arrested for Calling-In Hoax Bomb Threat for a Flight at Detroit Metro Airport

    Source: US FBI

    DETROIT – A Monroe, Michigan, resident was arrested on a criminal complaint for calling Spirit Airlines and reporting a fake bomb threat for a flight departing from Detroit Metropolitan Airport yesterday, announced United States Attorney Jerome F. Gorgon, Jr.

    Gorgon was joined in the announcement by Special Agent in Charge Cheyvoryea Gibson, Federal Bureau of Investigation, Detroit Division.

    Charged was John Charles Robinson, 23.

    According to the affidavit, on June 5, 2025, at approximately 6:25 am, an individual later identified as Robinson, used a cellphone to call into Spirit Airlines and conveyed false information about a bomb threat to Flight 2145 departing from Detroit Metro bound for Los Angeles. During the call, Robinson stated in part, “I was calling about 2145… because I have information about that flight,” and “there’s gonna be someone who’s gonna try to blow up the airport,” and “there’s gonna be someone that’s gonna try to blow up that flight, 2145.”  After giving a description of an individual, he then stated: “they’re going to be carrying a bomb through the TSA,” and “they’re still threatening to do it, they’re still attempted to do it, they said it’s not going to be able to be detected.  Please don’t let that flight board.”  The flight was immediately canceled, and the flight’s passengers and crew were deplaned. Bomb sniffing dogs and FBI agents were deployed to sweep the airplane. No bomb or explosives were found.

    Agents soon learned that Robinson was booked on Flight 2145 but missed the flight and was told at the gate that he needed to rebook.  FBI agents subsequently arrested Robinson when he returned to the airport to depart on another flight bound for Los Angeles.

    U.S. Attorney Gorgon said, “No American wants to hear the words ‘bomb’ and ‘airplane’ in the same sentence. Making this kind of threat undermines our collective sense of security and wastes valuable law enforcement resources.”

    “Anyone who threatens to bomb an aircraft and endanger public safety will be swiftly investigated and brought to justice,” said Cheyvoryea Gibson, Special Agent in Charge of the FBI Detroit Field Office. “The alleged bomb threat prompted a coordinated response by our FBI Detroit Joint Terrorism Task Force, in partnership with the Wayne County Airport Authority Police Department and the U.S. Federal Air Marshal Service, leading to the arrest of John Robinson as he attempted to board another flight at Detroit Metropolitan Airport. We remain committed to protecting the public and confronting those who seek to spread fear in our communities.”

    Robinson appeared in federal court in Detroit this afternoon and was released on bond.  His next court appearance will be June 27 for a preliminary examination.

    The charges in a complaint are merely allegations. A defendant remains innocent unless and until proven guilty in a court of law.

    This case is being investigated by special agents from the FBI.

    Assistant U.S. Attorneys Hank Moon and Douglas Salzenstein are prosecuting the case.

    MIL Security OSI

  • MIL-OSI Security: St. Augustine Business Owner Indicted For Attempting To Produce Child Sexual Abuse Materials

    Source: Office of United States Attorneys

    Jacksonville, Florida – United States Attorney Gregory W. Kehoe announces the return of an indictment charging Jack Dymond Leach (43, St. Augustine) with one count of attempted production of child sexual abuse materials, two counts of receipt of child sexual abuse materials, and one count of possession of child sexual abuse materials. If convicted of the attempted production offense, Leach faces a minimum of 15 years, up to 30 years, in federal prison. For each receipt and possession offense, Leach faces a minimum of 5 years, up to 20 years, in federal prison.  

    According to court documents, Leach engaged in conversations on an online chat platform during which he paid money to receive child sex abuse images. An investigation into the account resulted in Leach being identified. Federal search warrants were executed at Leach’s home and business in St. Augustine where law enforcement seized numerous electronic devices. A forensic examination of the devices reveled child sexual abuse material.

    An indictment is merely a formal charge that a defendant has committed one or more violations of federal criminal law, and every defendant is presumed innocent unless, and until, proven guilty. 

    This case was investigated by Homeland Security Investigations (HSI), the Clay County Sheriff’s Office, the St. Johns County Sheriff’s Office, and the Northeast Florida INTERCEPT Task Force. It will be prosecuted by Assistant United States Attorney Ashley Washington.

    It is another case brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    MIL Security OSI

  • MIL-OSI Security: Alien from Wuhan, China, Charged with Making False Statements and Smuggling Biological Materials into the U.S. for Her Work at a University of Michigan Laboratory

    Source: Office of United States Attorneys

    DETROIT –  Chengxuan HAN, a citizen of the People’s Republic of China (PRC), was arrested and charged in a criminal complaint with smuggling goods into the United States and false statements, announced United States Attorney Jerome F. Gorgon, Jr.

    Gorgon was joined in the announcement by Special Agent in Charge Cheyvoryea Gibson, Federal Bureau of Investigation, Detroit Division, Acting Director of Field Operations John Nowak, U.S. Customs and Border Protection and Jared Murphey, acting Special Agent in Charge, U.S. Immigration and Customs Enforcement’s Homeland Security Investigations (HSI), Detroit field office.

    According to the complaint, Han is a citizen of the PRC who is currently pursuing a Ph.D. from the College of Life Science and Technology in the Huazhong University of Science and Technology (HUST) in Wuhan, PRC. In 2024 and 2025, Han sent four packages to the United States from the PRC containing concealed biological material. These packages were addressed to individuals associated with a laboratory at the University of Michigan. On June 8, 2025, Han arrived at the Detroit Metropolitan Airport on a J1 visa. Customs and Border Protection officers conducted an inspection of Han, during which Han made false statements about the packages and the biological materials she had previously shipped to the United States. CBP officers also found that the content of Han’s electronic device had been deleted three days prior to her arrival in the United States. At the conclusion of the border inspection, Han was interviewed by agents from the Federal Bureau of Investigation. During this interview, Han admitted to sending the packages, admitted that the packages contained biological material related to round worms, and admitted to making false statements to the CBP officers during her inspection.

    Han will be appearing this afternoon in federal court in Detroit.

    A complaint is only a charge and is not evidence of guilt. Trial cannot be held on felony charges in a complaint. When the investigation is completed, a determination will be made whether to seek a felony indictment.

    United States Attorney Gorgon stated: “The alleged smuggling of biological materials by this alien from a science and technology university in Wuhan, China—to be used at a University of Michigan laboratory—is part of an alarming pattern that threatens our security. The American taxpayer should not be underwriting a PRC-based smuggling operation at one of our crucial public institutions.”   

    “The guidelines for importing biological materials into the U.S. for research purposes are stringent, but clear, and actions like this undermine the legitimate work of other visiting scholars,” said CBP Acting Director of Field Operations John Nowak. “We will not tolerate the smuggling of regulated biological materials through our ports of entry, and this interdiction is another recent example of our commitment—along with that of our law enforcement partners—to preventing potentially dangerous goods from harming the American people.”

    “ICE HSI is proud to work with our partners at the FBI and CBP to keep Americans and Michiganders safe from biological threats,” said ICE HSI Detroit acting Special Agent in Charge Jared Murphey. “This case should serve as a reminder that multiple law enforcement agencies are working around the clock to provide for our shared national security from malicious foreign actors.”

    The FBI, CBP and ICE HSI are investigating this case.

    MIL Security OSI

  • MIL-OSI Security: Repeat Offender Who Fired Automatic Weapon into St. Paul Neighborhood Sentenced to 82 Months in Prison

    Source: Office of United States Attorneys

    ST. PAUL, Minn. – After pleading guilty to illegally possessing ammunition as a convicted felon, Jermaine Marquize Williams, 35, of Saint Paul, was sentenced to a total of 82 months’ imprisonment—77 months’ imprisonment on the criminal case and an additional 6 months’ imprisonment consecutive for violating the terms of his federal supervised release, announced Acting U.S. Attorney Joesph H. Thompson.

    “While the people of St. Paul were sleeping in their homes, Williams took an automatic firearm and shot it into the neighborhood,” said Acting U.S. Attorney Joseph H. Thompson.  “This conduct was extraordinarily dangerous, utterly brazen, and well-deserving of federal time.”

    According to court documents, in August of 2024, Williams fired off multiple rounds from a fully automatic firearm in a densely populated Saint Paul neighborhood, outside a bar just before midnight.  Video surveillance depicted Williams firing the machine gun out the driver’s side door of his vehicle before fleeing from the scene in his vehicle.  Police recovered multiple discharged casings from the shooting.  Williams has a prior 2019 federal conviction for illegally possessing a firearm as a felon, for which he received 65 months’ imprisonment.  Williams had only been on federal supervised release for six months at the time he committed this crime.

    Williams was sentenced in U.S. District Court on May 28, 2025, before Judge Paul A. Magnuson.

    This case is the result of an investigation conducted by Federal Bureau of Alcohol, Tobacco, and Firearms (ATF) and the St. Paul Police Department.

    Assistant U.S. Attorney Benjamin Bejar prosecuted the case.

    MIL Security OSI

  • MIL-OSI Security: Two South Florida Men Charged with Mail Theft, Thanks to Public

    Source: Office of United States Attorneys

    MIAMI – Two South Florida men are charged with mail theft after surveillance video released to the public resulted in their identification.

    According to the charging complaint and indictment, on April 26, Wilfredo Rivero, 31, was seen on surveillance forcibly opening a cluster of mailboxes at an apartment complex in Sunrise, Florida. Once the mailboxes were opened, Rivero examined and removed pieces of mail. Two days later, on April 28, Rivero returned to the apartment complex with Fernando Bernabe Rodriguez, 28. Rivero and Rodriguez were seen on surveillance prying open another cluster of mailboxes and removing mail.

    On May 9, CBS News Miami ran a news story about the mail theft at the apartment complex and aired the April 28 surveillance video to assist the U.S. Postal Inspection Service (USPIS) in identifying, then unknown, Rivero and Rodriguez. As a result of the news story, the USPIS national hotline received several tips regarding the identity of Rivero and Rodriguez.

    U.S. Attorney Hayden P. O’Byrne of the Southern District of Florida and acting Inspector in Charge Bladismir Rojo of the USPIS made the announcement.

    USPIS investigated the case, with substantial assistance from the public. The Sunrise Police Department and Hialeah Police Department provided support as well.

    Assistant U.S. Attorney Christopher Killoran is prosecuting the case.

    An indictment is merely an accusation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    You may find a copy of this press release (and any updates) on the website of the United States Attorney’s Office for the Southern District of Florida at www.usdoj.gov/usao/fls.

    Related court documents and information may be found on the website of the District Court for the Southern District of Florida at www.flsd.uscourts.gov or at http://pacer.flsd.uscourts.gov, under case number 25-cr-60134.

    ###

    MIL Security OSI

  • MIL-OSI Security: New Britain Man Sentenced to 10 Years in Federal Prison for Child Exploitation Offense

    Source: Office of United States Attorneys

    David X. Sullivan, United States Attorney for the District of Connecticut, announced that JOSHUA GLAESER, 37, of New Britain, was sentenced today by U.S. District Judge Omar A. Williams in Hartford to 120 months of imprisonment, followed by 15 years of supervised release, for possessing and sharing child sex abuse material.

    According to court documents and statements made in court, in the summer of 2022, a Connecticut State Police detective investigating child exploitation offenses identified an IP address at Glaeser’s New Britain residence that was being used in the distribution of child sex abuse material.  In 2012, Glaeser was convicted in state court of possession of child pornography and was sentenced to 10 years of imprisonment, execution suspended after two years, followed by 10 years of probation, which Glaeser was currently serving.

    On December 9, 2022, HSI special agents executed a court authorized search warrant at Glaeser’s residence and seized his Chromebook, tablet, smartphone, and storage cards.  Analysis of the seized items revealed more 3,000 images and videos of child pornography, including images depicting the sexual abuse of infants and toddlers.  The investigation also revealed that Glaeser used a peer-to-peer file sharing network to distribute child pornography to other users.

    Glaeser has been detained since December 9, 2022.  On September 26, 2024, he pleaded guilty to possession of child pornography.

    This matter was investigated by Homeland Security Investigations (HSI) and the Connecticut State Police.  The case was prosecuted by Assistant U.S. Attorney Daniel E. Cummings.

    This prosecution is part of the U.S. Department of Justice’s Project Safe Childhood Initiative, which is aimed at protecting children from sexual abuse and exploitation.  For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    To report cases of child exploitation, please visit www.cybertipline.com.

    MIL Security OSI

  • MIL-OSI Security: District Man Pleads Guilty to February 2025 Armed Carjacking

    Source: Office of United States Attorneys

                WASHINGTON – Parren Hawkins, 33, of the District of Columbia, pleaded guilty today to carjacking and unlawful possession of a firearm in connection with a carjacking that occurred on February 2, 2025. The plea was announced by U.S. Attorney Jeanine Ferris Pirro and Metropolitan Police Department (MPD) Chief Pamela Smith.

                According to the government’s evidence, at approximately 2:47 a.m. on February 2, 2025, police officers responded to the 300 block of 15th Street, NE, where they found the victim. The victim reported that Hawkins approached him while he was in his vehicle, pointed a handgun at him, and ordered him out. The victim complied. Hawkins then demanded money, taking the victim’s wallet and cell phone before entering the victim’s vehicle and fleeing northbound on the 400 block of 15th Street, NE. The victim flagged down a passerby and called 911.

                While police were interviewing the victim, Prince George’s County Police observed the stolen vehicle in Oxon Hill, Maryland. Officers pursued the vehicle until Hawkins ultimately crashed into a curb at the intersection of Bonini Road, SE, and Barnaby Road, SE, in Washington, D.C. Hawkins, the sole occupant, fled on foot but was quickly apprehended by police. Officers recovered a handgun from Hawkins’s pocket, along with the victim’s wallet and phone.

                Hawkins is scheduled to be sentenced on August 7, 2025, before the Honorable Judge Robert Salerno.

                The Metropolitan Police Department investigated the case. Assistant U.S. Attorney Shaniqua Butler is prosecuting the case.

    MIL Security OSI

  • MIL-OSI Security: Justice Department Sues Coffee House for Refusal to Serve Jewish Customers

    Source: United States Attorneys General

    Note: View complaint here.

    The Justice Department announced today that it filed a lawsuit against Fathi Abdulrahim Harara and Native Grounds LLC, the owners of the Jerusalem Coffee House in Oakland, California. The lawsuit alleges that the defendants discriminated against Jewish customers, in violation of Title II of the Civil Rights Act of 1964, which prohibits discrimination based on race, color, religion, or national origin in places of public accommodation.

    “It is illegal, intolerable, and reprehensible for any American business open to the public to refuse to serve Jewish customers,” said Assistant Attorney General Harmeet K. Dhillon of the Justice Department’s Civil Rights Division. “Through our vigorous enforcement of Title II of the Civil Rights Act and other laws prohibiting race and religious discrimination, the Justice Department is committed to combatting anti-Semitism and discrimination and protecting the civil rights of all Americans.”

    The lawsuit, filed today in the U.S. District Court for the Northern District of California, alleges that defendants discriminated against Jewish customers through policies and practices that denied them the full and equal enjoyment of the Jerusalem Coffee House’s services, accommodations, and privileges. Specifically, the lawsuit alleges that on two separate occasions, Harara ordered Jewish customers — identified because they were wearing baseball caps with Stars of David on them — to leave the coffee house. During one incident, an employee told a Jewish customer who was trying to make a purchase, “You’re the guy with the hat. You’re the Jew. You’re the Zionist.  We don’t want you in our coffee shop. Get out.” During another incident, Harara accused another Jewish customer who was with his five-year-old son of wearing a “Jewish star,” being a “Zionist,” and supporting “genocide.” Harara repeatedly demanded that the customer and his son leave and falsely accused them of “trespassing” to the Oakland police. Neither customer stated anything about their political views to Harara or any other employees while at the coffee house.

    The lawsuit also alleges that, on the one-year anniversary of the Oct. 7, 2023, Hamas terrorist attacks on Israel, the Jerusalem Coffee House announced two new drinks: “Iced In Tea Fada,” an apparent reference to “intifada,” and “Sweet Sinwar,” an apparent reference to Yahya Sinwar, the former leader of Hamas who orchestrated the attacks on Israel. The lawsuit further alleges that the coffee house’s exterior side wall displays inverted red triangles, a symbol of violence against Jews that has been spraypainted on Jewish homes and synagogues in anti-Semitic attacks.

    Under Title II, the Justice Department’s Civil Rights Division can obtain injunctive relief that changes policies and practices to remedy the discriminatory conduct. Title II does not authorize the division to obtain monetary damages for customers who are victims of discrimination.

    More information about the Civil Rights Division and the laws it enforces is available at http://www.justice.gov/crt. Individuals may report discrimination in places of public accommodation that violates Title II by calling the Justice Department at 1-833-591-0291, or submitting a report online.

    MIL Security OSI

  • MIL-OSI Security: Body in Hampshire confirmed to be Yajaira Castro Mendez

    Source: United Kingdom London Metropolitan Police

    Detectives can confirm the body found in Hampshire on Saturday, 7 June is sadly that of Yajaira Castro Mendez from Ilford.

    Yajaira was last seen in Camden on Thursday, 29 May. Following extensive enquiries by officers a murder investigation was launched.

    Detectives carried out urgent enquiries and during searches in the Bolderwood area of Hampshire, they found a body.

    Formal identification has now taken place. Her family continue to be supported by specialist officers.

    Acting Detective Chief Inspector Sean Beasley, who is leading the investigation, said: “This is a very sad development in the investigation and our thoughts are very much with Yajaira’s family and friends at this incredibly difficult time.

    “Officers have been working around the clock and continue to investigate the circumstances.

    “There are still crime scenes in place and we’re working closely with Hampshire Police. We thank the community for their patience as we carry out our investigation and we continue to appeal to anyone with information that could assist the investigation to please come forward.”

    On Friday, 6 June, Juan Francisco Toledo, 51 (17.10.1973), of Lambeth appeared at Barkingside Magistrates’ Court charged with murder.

    He was remanded in custody to next appear on Tuesday, 10 June at the Old Bailey.

    He had been arrested on Wednesday, 4 June in Lambeth.

    Anyone with information relating to this investigation is asked to contact police via 101 or @MetCC quoting CAD 3020/06JUN2

    To remain 100 per cent anonymous call the independent charity Crimestoppers on 0800 555 111 or visit Crimestoppers-uk.org.

    MIL Security OSI

  • MIL-OSI Security: Canning — RCMP seeking information to identify a person involved in sexual assault against a youth

    Source: Royal Canadian Mounted Police

    Kings District RCMP is seeking information from the public to identify a person involved in a sexual assault against a youth victim in Canning.

    On June 6, at approximately 3:40 p.m., RCMP officers responded to a report of a sexual assault that occurred on a walking trail between Northeast Kings Education Centre and the Glooscap District Arena.

    Responding officers learned that approximately 10 minutes prior, a male assaulted then sexually assaulted a youth victim who was walking to the arena from the school.

    A search of the area, assisted by RCMP Police Dog Services, was not successful in locating the suspect.

    At this time, the male, who approached the victim from behind, is believed to be a youth. He is described as white, 5-foot-5 and heavy build. At time of the incident, he was wearing a ski mask, a red shirt and winter gloves.

    “I want to assure everyone in our communities that this investigation is a top priority for us. We have engaged various specialized units to assist our committed local investigators”, says S/Sgt. Ed Nugent, King District RCMP. “We encourage anyone who may have information about the incident to contact us. You can also provide information anonymously through Crime Stoppers.”

    Kings District RCMP: 902-679-5555

    Nova Scotia Crime Stoppers: toll-free, 1-800-222-TIPS (8477), www.crimestoppers.ns.ca, or the P3 Tips app.

    If you have experienced sexual violence, you are not alone. The elimination of gender-based and sexual violence continues to be a priority for the Nova Scotia RCMP, and the RCMP employs a trauma-informed approach. Survivor support is available and you can contact us and discuss an incident before deciding to further participate in the investigation and court process.

    File: 2025-784797

    MIL Security OSI

  • MIL-OSI Security: Sex Offender Who Approached 11-Year-Old Online Sentenced to 16 Years in Prison

    Source: US FBI

    ST. LOUIS – U.S. District Judge Stephen R. Clark on Thursday sentenced a registered sex offender who possessed child sexual abuse material and initiated a sexual conversation with a 11-year-old girl via Facebook Messenger to 16 years in prison. 

    Seth Allen Barger, 42, of Jefferson County, Missouri, sent a friend request to the victim in 2023. Via Facebook Messenger on July 26, 2023, he sought to engage her in a sexual conversation. The victim’s mother contacted the St. Louis County Police Department, and a detective interviewed Barger. Barger said his account had been hacked. After Barger consented to a search of his phone, a detective with the Jefferson County Sheriff’s Office found 35 images containing child sexual abuse material.

    Barger pleaded guilty in November in U.S. District Court in St. Louis to one count of receiving child pornography and one count of enticement of a minor.

    The St. Louis County Police Department, the Jefferson County Sheriff’s Office and the FBI investigated the case. Assistant U.S. Attorney Dianna Edwards prosecuted the case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and the Department of Justice Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    MIL Security OSI

  • MIL-OSI Security: Nine Defendants Arrested for Methamphetamine Trafficking

    Source: Office of United States Attorneys

    FARGO – Acting United States Attorney Jennifer Klemetsrud Puhl announced that beginning on May 15, 2025, a multi-state law enforcement operation resulted in the arrests of nine defendants following their indictment by a federal grand jury in the District of North Dakota for roles in a methamphetamine trafficking conspiracy with ties to the Almighty Latin King Nation criminal street gang.

    The defendants arrested are:

    Ricardo Jaquez, 46, Oakes, North Dakota

    Israel David Flores, a/k/a Izzy, 45, Audubon, Minnesota

    Michelle Lee Fuller, 38, Audubon, Minnesota

    Jose Manuel Jaquez, a/k/a Cash, 36, Oakes, North Dakota

    Jacob Edward Lambert, 37, Oakes, North Dakota

    Ashley Marie Bleecker, 40, Belcourt, North Dakota

    Alfredo Hernandez Jaquez, a/k/a Freddy, 47, Wells, Minnesota

    Wesley Wayne Tolleson, 37, Wells, Minnesota

    Jason Leonard Gulden, 44, Aberdeen, South Dakota

    All defendants have made appearances in federal court in North Dakota and face up to life in prison with a 10-year minimum mandatory if convicted.

    This case is part of Operation Crown Down, an Organized Crime Drug Enforcement Task Force (OCDETF) investigation into methamphetamine trafficking in North Dakota and other states. OCDETF identifies, disrupts, and dismantles the highest-level drug traffickers, money launderers, gangs, and transnational criminal organizations that threaten the United States by using a prosecutor-led, intelligence-driven, multi-agency approach that leverages the strengths of federal, state, and local law enforcement agencies against criminal networks.

    An indictment is not evidence of guilt. The defendants are presumed innocent unless or until proven guilty beyond a reasonable doubt at trial.

    This case is being investigated by the Drug Enforcement Administration; the Federal Bureau of Investigation; the Bureau of Alcohol, Tobacco, Firearms and Explosives; the Bureau of Indian Affairs, Division of Drug Enforcement; Homeland Security Investigations; the Oakes Police Department; the North Dakota Bureau of Criminal Investigation; the Cass County Drug Task Force; the Minnesota Bureau of Criminal Apprehension; the Paul Bunyan Drug Task Force; the Pine to Prairie Drug Task Force; the CEE-VI Drug Task Force; the South Dakota Division of Criminal Investigation; and the Brown County (South Dakota) Sheriff’s Office.

    The case is being prosecuted by Assistant United States Attorney Matthew P. Kopp.

                                                                                                                                         # # #

    MIL Security OSI

  • MIL-OSI Security: Bristol, Virginia Man Convicted on Federal Drug Charges

    Source: Office of United States Attorneys

    ABINGDON, Va. – A federal jury convicted a Bristol, Virginia man of conspiring to distribute methamphetamine following a three-day jury trial in U.S. District Court in Abingdon.

    Christopher M. Sullivan, 31, was found guilty of one count of conspiracy to distribute methamphetamine and one count of using a communication facility in furtherance of a drug trafficking crime.

    According to court documents and evidence presented at trial, Sullivan conspired with Christopher David Johnson – an inmate in a Georgia state prison – and numerous others to traffic and distribute kilograms of methamphetamine from Georgia into Southwest Virginia.

    Johnson used smuggled cell phones to operate a large-scale methamphetamine-distribution operation from his prison cell in Georgia. He regularly communicated with his co-conspirators using Facebook, WhatsApp, Signal, phone calls, and text messaging to coordinate deliveries, pricing, quantities, recruitment, intimidation, and sales.

    Evidence showed that Sullivan regularly communicated with Johnson to accomplish the goals of the conspiracy.  Sullivan also distributed methamphetamine for Johnson, wired money to Mexico at Johnson’s direction, and paid Johnson for methamphetamine.

    In December 2024, Johnson was sentenced for his role in the conspiracy to 20 years in federal prison – to run following his state prison time – and ten years of supervised release. Eighteen other defendants received prison sentences ranging from three to fifteen years.  At sentencing, Sullivan faces a minimum prison sentence of 5 years and a maximum sentence of 40 years.

    Acting United States Attorney Zachary T. Lee and Special Agent in Charge Ibrar A. Mian of the DEA Washington Division made the announcement.

    The Drug Enforcement Administration and multiple law enforcement agencies in Georgia, Tennessee, and Virginia investigated the case, including the Bristol (Tennessee) Police Department, the Bristol (Virginia) Police Department, the Sullivan County Sheriff’s Office, the 2nd Judicial Drug Task Force, and the Georgia State Patrol.

    Assistant U.S. Attorneys Whit Pierce and Corey Hall are prosecuting the case.

    MIL Security OSI

  • MIL-OSI Security: Ohio Company Sentenced for Violating OSHA Rule Leading to Worker’s Death

    Source: United States Attorneys General

    A Delaware corporation with a manufacturing facility in Ohio was sentenced today to pay a $500,000 fine, the statutory maximum, after pleading guilty to willfully violating an Occupational Safety and Health Administration (OSHA) rule. In addition to the fine, Fabcon will serve two years of organizational probation and comply with a Safety Compliance Plan. The criminal charge is related to an incident where an employee was killed when a pneumatic door closed on his head.

    Fabcon Precast LLC makes precast concrete panels at its facility in Grove City, Ohio. Batch operators were employees responsible for operating and cleaning the facility’s only concrete mixer, which discharged concrete from its bottom through a pneumatic door. The mixer had an exhaust valve that, by design, released the pneumatic energy which powered the discharge door to make it inoperable.

    The valve’s handle broke off, and was not replaced, prior to June 6, 2020. On that day, batch operator Zachary Ledbetter was injured trying to close the discharge door due to the broken valve. Ledbetter was eventually freed from the door, but he died at a hospital five days later.

    “Today’s sentencing reflects Fabcon’s willful failure to implement measures to protect its workers,” said Acting Assistant Attorney General Adam Gustafson of the Justice Department’s Environment and Natural Resources Division (ENRD). “Sadly, this led to Zachary’s death. This tragedy shows the importance of following safety standards.”

    “Fabcon Precast LLC willfully failed to adhere to OSHA safety regulations which resulted in the tragic and preventable loss of a worker’s life. This sentencing highlights our steadfast commitment to continue working with OSHA and our law enforcement partners to hold accountable those who jeopardize workers’ safety,” said Special Agent in Charge Megan Howell of the U.S. Department of Labor Office of Inspector General, Great Lakes Region.

    Federal law makes it a class B misdemeanor to willfully fail to follow an OSHA safety standard, where the failure causes the death of an employee. The class B misdemeanor is the only federal criminal charge covering such workplace safety violations.

    The Department of Labor’s Office of Inspector General investigated the case.

    Senior Trial Attorney and Special Assistant U.S. Attorney Adam Cullman, of ENRD’s Environmental Crimes Section and for the Southern District of Ohio respectively, prosecuted the case.

    MIL Security OSI