Category: Security Intelligence

  • MIL-OSI Security: Two Luzerne County Residents Charged With Drug Trafficking And Firearms Violations

    Source: Office of United States Attorneys

    SCRANTON – The United States Attorney’s Office for the Middle District of Pennsylvania announced that Craig Lee Hickson, age 34, of Plymouth, Pennsylvania, and Rasheeda Kelly, age 46, of Wilkes-Barre, Pennsylvania, were indicted on March 4, 2025, by a federal grand jury on drug trafficking and a firearms violations.

    According to Acting United States Attorney John C. Gurganus, the indictment alleges that on February 21, 2025, in Luzerne County, Hickson and Kelly conspired and attempted to distribute and possess with intent to distribute over 500 grams of methamphetamine.  The indictment also alleges that Kelly possessed several firearms as a felon prohibited from possessing firearms.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities and measuring the results.

    The case was investigated by Homeland Security Investigations (HSI) and the Pennsylvania Office of Attorney General. Assistant U.S. Attorney Jenny P. Roberts is prosecuting the case.

    The maximum penalty under federal law for this offense is life imprisonment, a term of supervised release following imprisonment, and a fine. A sentence following a finding of guilt is imposed by the Judge after consideration of the applicable federal sentencing statutes and the Federal Sentencing Guidelines.

    Indictments are only allegations. All persons charged are presumed to be innocent unless and until found guilty in court.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Guatemalan National Charged with Child Exploitation Offenses

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    Marc H. Silverman, Acting United States Attorney for the District of Connecticut, Anish Shukla, Acting Special Agent in Charge of the New Haven Division of the FBI, and West Haven Police Chief Joseph Perno announced that MARIO RENE GARCIA MARTINEZ, also known as “Mario Rene Martinez Garcia,” 33, a citizen of Guatemala was arrested today on a federal criminal complaint charging him with child exploitation offenses.

    As alleged in court documents and statements made in court, on two occasions in February 2024, in Connecticut, Garcia Martinez used his smartphone to record sexually explicit videos and images of a prepubescent minor female while she was sleeping.

    Garcia Martinez was arrested this morning in Valley Stream, New York.  He appeared this afternoon before U.S. Magistrate Judge S. Dave Vatti in Bridgeport and was ordered detained.

    The complaint charges Garcia Martinez with production of child pornography, an offense that carries a mandatory minimum term of imprisonment of 15 years and a maximum term of imprisonment of 30 years, and with possession of child pornography, an offense that carries a maximum term of imprisonment of 20 years.

    Acting U.S. Attorney Silverman stressed that a complaint is only a charge and is not evidence of guilt.  Charges are only allegations, and a defendant is presumed innocent unless and until proven guilty beyond a reasonable doubt.

    This matter is being investigated by the Federal Bureau of Investigation and the West Haven Police Department.  The case is being prosecuted by Assistant U.S. Attorney Daniel E. Cummings with the assistance of the Office of the State’s Attorney for the Judicial District of Ansonia-Milford.

    This prosecution is part of the U.S. Department of Justice’s Project Safe Childhood Initiative, which is aimed at protecting children from sexual abuse and exploitation. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

    To report cases of child exploitation, please visit www.cybertipline.com.

    MIL Security OSI

  • MIL-OSI Security: Convicted Sex Offender Sentenced to 10 Years in Federal Prison for Second Offense

    Source: Federal Bureau of Investigation (FBI) State Crime News

    WILMINGTON, Del. – Shannon T. Hanson, Acting U.S. Attorney for the District of Delaware, announced that Michael Natale, of Laurel, Delaware, was sentenced yesterday in the U.S. District Court for the District of Delaware for his crime of possessing child sexual abuse material. The Honorable Colm F. Connolly, Chief Judge, issued the sentence.

    In October 2024, Mr. Natale plead guilty to Possession of Child Sexual Abuse Material. The case against Mr. Natale arose from conversations he was having online with another individual on the instant messaging platform “Kik.” Mr. Natale and the other individual exchanged graphic videos depicting the sexual abuse of children, to include the sexual abuse of the other individual’s own young son. That individual was arrested and a search of her Kik account led to the identification of Mr. Natale.

    Today, Chief Judge Connolly sentenced Mr. Natale to 10 years of imprisonment. This sentence is the mandatory minimum sentence Mr. Natale must serve because he has a prior conviction in the State of Delaware for dealing in child pornography.

    Acting U.S. Attorney Hanson stated, “Our office has always been dedicated to the protection of Delaware’s most vulnerable community members, the children. We will continue to aggressively pursue those who exploit children for their own twisted satisfaction, especially those who refuse to change their behavior after previous convictions. I commend the FBI’s dedication and collaboration across districts in bringing this case, and that of Mr. Natale’s co-conspirator, to justice.”

    “Natale posed a significant threat to children as demonstrated by his repeated perverse and sick exploitation. Even in the darkest corners of the internet, the FBI will find a way to seek justice for our children and stop the monsters who threaten their innocence and sense of security,” said FBI Baltimore Special Agent in Charge William J. DelBagno.

    This case was investigated by the FBI. Assistant U.S. Attorney Briana Knox is prosecuting the case.

    A copy of this press release is located on the website of the U.S. Attorney’s Office for the District of Delaware. Related court documents and information is located on the website of the District Court for the District of Delaware or on PACER.

    MIL Security OSI

  • MIL-OSI Security: Edgewood Man Sentenced for Methamphetamine Trafficking

    Source: Office of United States Attorneys

    COVINGTON, Ky. – An Edgewood, Ky. man, Eric Fultz, 52, was sentenced on Friday to 262 months in prison, by Chief U.S. District Judge David Bunning, for possession with the intent to distribute more than 50 grams of actual methamphetamine.

    According to his plea agreement, on June 29, 2024, law enforcement stopped Fultz’s vehicle travelling on Interstate 75 in Erlanger.  Shortly thereafter, a K-9 alerted to the odor of narcotics coming from the vehicle.  Officers searched the vehicle and found 55.5 grams of actual methamphetamine.  Fultz admitted in his plea agreement that he possessed the methamphetamine with the intent to distribute it.

    Under federal law, Fultz must serve 85 percent of his prison sentence.  Upon his release from prison, he will be under the supervision of the U.S. Probation Office for 10 years.

    Paul C. McCaffrey, Acting United States Attorney for the Eastern District of Kentucky; Jim Scott, Special Agent in Charge, DEA, Louisville Field Division; and Director Scott Hardcorn, Northern Kentucky Drug Strike Force jointly announced the sentence.

    The investigation was conducted by the DEA and the Northern Kentucky Drug Strike Force. Assistant U.S. Attorney Kyle Winslow prosecuted the case on behalf of the United States.

    — END — 

    MIL Security OSI

  • MIL-OSI Security: Five More Sentenced in Federal Pandemic Fraud Unemployment Benefit Scheme

    Source: Office of United States Attorneys

    ABINGDON, Va. – An additional five of the 17 defendants charged with conspiring to defraud the United States, commit program fraud, and commit mail fraud in connection to a scheme involving the filing of fraudulent claims for pandemic unemployment benefits, were sentenced this week in U.S. District Court in Abingdon.

    On Thursday, Christopher Kirk Webb, 40, of Raven, Virginia was sentenced to 20 months in federal prison. Russell Eric Stiltner, 42, of Abingdon, Virginia, was sentenced to 24 months. Jessica Dawn Lester, 35, of North Tazewell, Virginia, and Cara Camille Bailey, 38, of Davenport, Virginia, were both sentenced to 19 months, and Justin Warren Meadows, 39, of Oakland, Virginia, was sentenced to 18 months. All defendants were also ordered to pay restitution to the Virginia Employment Commission for the amount of their individual fraudulent claims. 

    Six Defendants were previously sentenced for their roles in the scheme.

    Jonathan Webb, the individual charged with ‘recruiting’ others to file fraudulent claims, mostly inmates at local jails, was sentenced to 48 months in federal prison and was ordered to pay $150,218 in restitution.

    Terrence Brooks Vilacha was sentenced to 18 months in prison and was ordered to pay $14,894 in restitution. Joseph Hass was sentenced to 27 months’ incarceration and was ordered to pay $19,316 in restitution. Brian Addair was sentenced to 24 months in prison and was ordered to pay $22,284.

    Stephanie Amber Barton and Hayleigh McKenzie Wolfe were each sentenced to 12 months and 1 day.

    According to court documents, between March 2020 and September 2021, Josef Brown, Jonathan Webb, and Crystal Shaw developed a scheme to file fraudulent claims and recertifications for pandemic unemployment befits via the Virginia Employment Commission website. The scheme involved the collection of personal identification information (PII) of inmates housed at SWVRJA-Haysi, as well as personal friends and acquaintances of Brown, Webb, and Shaw. The conspirators used that information to file fraudulent claims and recertifications for pandemic unemployment benefits for incarcerated individuals and others who were ineligible for the benefits.

    In all, the defendants stole $341,205 in pandemic relief to which they were not entitled.

    As part of the Pandemic Response Accountability Committee (PRAC) Task Force, this investigation was conducted by the Special Inspector General for Pandemic Recovery. The PRAC’s 20 member Inspectors General identify major risks that cross program and agency boundaries to detect fraud, waste, abuse, and mismanagement in the more than $5 trillion in COVID-19 spending.

    Acting United States Attorney Zachary T. Lee, Stanley M. Meador, Special Agent in Charge of the FBI’s Richmond Division, and Virginia Attorney General Jason Miyares announced the sentences.

    Agencies that assisted with this investigation included the Dickenson County Sheriff’s Office, the Southwest Virginia Regional Jail Authority, the FBI, U.S. Department of Labor, and the Virginia Employment Commission.

    Special Assistant U.S. Attorney M. Suzanne Kerney-Quillen, a Senior Assistant Attorney General with the Virginia Attorney General’s Major Crimes and Emerging Threats Section, and Assistant United States Attorney Danielle Stone are prosecuting the case for the United States.

    MIL Security OSI

  • MIL-OSI Security: DHS Ends Collective Bargaining for TSA’s Transportation Security Officers, Enhancing Safety, Efficiency, and Organizational Agility

    Source: US Department of Homeland Security

    WASHINGTON – Today, the Department of Homeland Security (DHS) announced it is ending collective bargaining for the Transportation Security Administration’s (TSA) Transportation Security Officers, which has constrained TSA’s chief mission: to safeguard our transportation systems and keep Americans safe.

    Eliminating collective bargaining removes bureaucratic hurdles that will strengthen workforce agility enhance productivity and resiliency, while also jumpstarting innovation.

    Making America’s Transportation Networks Resilient Again

    Gaps in benefit programs, including non-verifiable Family and Medical Leave, are being exploited by a select few poor performers, placing greater burden on TSOs at the expense of American travelers and taxpayers.

    This includes instances, where a TSO requested sick leave seven months in advance.

    TSA has more people doing full-time union work than we have performing screening functions at 86% of our airports. Of the 432 federalized airports, 374 airports have fewer than 200 TSA Officers to preform screening functions.

    Nearly 200 TSA Officers are paid by the government but work full-time on union matters. These people do not retain certification to perform screening functions. Additionally, in a recent TSA employee survey, over 60% said poor performers are allowed to stay employed and, not surprisingly, continue to not perform.

    Fighting for TSA Workers

    The Transportation Security officers are losing their hard-earned dollars to a union that did not represent or protect their interests. The union has hindered merit-based performance recognition and advancement—that’s not the American way.

    By eliminating the collective bargaining agreement, Transportation Security Officers will now have opportunities based on their performance, not longevity or union membership.

    A statement from a DHS Spokesperson is below:

    “Thanks to Secretary Noem’s action, Transportation Security Officers will no longer lose their hard-earned dollars to a union that does not represent them. The Trump Administration is committed returning to merit-based hiring and firing policies.

    “This action will ensure Americans will have a more effective and modernized workforces across the nation’s transportation networks. TSA is renewing its commitment to providing a quick and secure travel process for Americans.”

    MIL Security OSI

  • MIL-OSI Security: Florida Man Sentenced to Five Years in Prison for Telegram-Based Bank Fraud Scheme That Targeted Alabama Businesses

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    BIRMINGHAM, Ala. – A Florida man has been sentenced for his role in a Telegram-based check fraud scheme, announced U.S. Attorney Prim F. Escalona and U.S. Secret Service Special Agent in Charge Patrick Davis.

    U.S. District Court Judge Madeline Haikala sentenced Gabriel Samuel Odiot, 21, of Kissimmee, Florida, to 60 months in prison and ordered him to forfeit $84,000. In December 2024, Odiot pleaded guilty to conspiracy to commit bank fraud and wire fraud and aggravated identity theft.

    According to the plea agreement and other court documents, from August 2022 to March 2023, Odiot served as an administrator of “RICH OFF PLAYS,” a Telegram channel dedicated to the negotiation of fraudulent checks. Odiot used the channel to recruit mail carriers, to advertise the services of bank insiders, and to collaborate with others to commit bank fraud. He frequently posted pictures and videos of himself committing bank fraud on the channel. These included pictures and videos depicting stolen checks, transaction receipts, and large amounts of cash. In many cases, the pictures and videos were branded with Odiot’s nickname “Motion.”

    The U.S. Secret Service investigated the case with assistance from the Federal Bureau of Investigation, the U.S. Postal Inspection Service, and the Heflin Police Department.  Assistant U.S. Attorney Edward J. Canter prosecuted the case. 

    MIL Security OSI

  • MIL-OSI Security: FBI Denver Warns of Online File Converter Scam

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    The FBI Denver Field Office is warning that agents are increasingly seeing a scam involving free online document converter tools, and we want to encourage victims to report instances of this scam.

    In this scenario, criminals use free online document converter tools to load malware onto victims’ computers, leading to incidents such as ransomware.

    “The best way to thwart these fraudsters is to educate people so they don’t fall victim to these fraudsters in the first place,” said FBI Denver Special Agent in Charge Mark Michalek. “If you or someone you know has been affected by this scheme, we encourage you to make a report and take actions to protect your assets. Every day, we are working to hold these scammers accountable and provide victims with the resources they need.”

    To conduct this scheme, cyber criminals across the globe are using any type of free document converter or downloader tool. This might be a website claiming to convert one type of file to another, such as a .doc file to a .pdf file. It might also claim to combine files, such as joining multiple .jpg files into one .pdf file. The suspect program might claim to be an MP3 or MP4 downloading tool.

    These converters and downloading tools will do the task advertised, but the resulting file can contain hidden malware giving criminals access to the victim’s computer. The tools can also scrape the submitted files for:

    • Personal identifying information, such as social security numbers, dates of birth, phone numbers, etc.)
    • Banking information
    • Cryptocurrency information (seed phrases, wallet addresses, etc.)
    • Email addresses
    • Passwords

    Unfortunately, many victims don’t realize they have been infected by malware until it’s too late, and their computer is infected with ransomware or their identity has been stolen.

    The FBI Denver Field Office encourages victims or attempted victims of this type of scheme to report it to the FBI Internet Crime Complaint Center at www.ic3.gov.

    In addition, the FBI Denver Field Office recommends taking the following actions to protect yourself from this scam:

    • Take a breath, slow down and think. Be aware of your actions online and what risks you could be exposed to.
    • Keep your virus scan software up to date and scan any file you receive before opening it to help eliminate malicious software from being installed on your computer.

    If you are a victim of this scam, here are some steps to take:

    • Contact your financial institutions immediately. Take steps to protect your identity and your accounts.
    • Change all your passwords using a clean, trusted device.
    • Make a report at IC3.gov
    • Run up-to-date virus scan software to check for potentially malicious software installed by the scammers. Consider taking your computer to a professional company specializing in virus and malware removal services.

    MIL Security OSI

  • MIL-OSI Security: La Oficina del FBI en Denver Advierte Sobre Estafas al Usar Los Conversores de Archivos en Línea

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    La Oficina del FBI en Denver ha emitido una advertencia alertando sobre un aumento en las estafas relacionadas con herramientas en línea gratuitas para convertir documentos. Se insta a las víctimas a reportar cualquier caso relacionado con dichas estafas.

    En este tipo de esquemas, los delincuentes aprovechan las herramientas gratuitas de conversión de documentos en línea para cargar malware o ransomware en las computadoras de las víctimas.

    “Como parte de nuestros esfuerzos continuos para combatir el fraude, creemos que la forma más efectiva de detener a estos delincuentes es mediante la educación”, señaló Mark Michalek, agente especial a cargo de la Oficina del FBI en Denver. “Al promover la concienciación, podemos evitar que las personas caigan en estas trampas. Si usted o alguien que usted conoce ha sido afectado, le recomendamos que lo reporte de inmediato y tome las medidas necesarias para proteger sus activos. Todos los días trabajamos para responsabilizar a los estafadores y proporcionar a las víctimas el apoyo y los recursos necesarios.”

    Para llevar a cabo este esquema, los ciberdelincuentes de todo el mundo están aprovechando diversas herramientas gratuitas de conversión o descarga de documentos. Estas incluyen sitios web que prometen convertir archivos de un formato a otro, como transformar un archivo .doc en .pdf, o servicios que permiten combinar archivos, como unir varios .jpg en un solo .pdf. Además, los programas sospechosos pueden presentarse como herramientas para descargar archivos MP3 o MP4.

    Estos conversores y herramientas de descarga cumplen con lo que prometen, pero el archivo resultante contiene malware oculto que permite a los delincuentes acceder a la computadora de la víctima. Además, estas herramientas pueden recopilar los archivos enviados para extraer:

    • Información personal identificable, como números de seguro social, fechas de nacimiento, números de teléfono, entre otros.
    • Información bancaria.
    • Datos relacionados con criptomonedas (frases semilla, direcciones de billeteras, etc.).
    • Direcciones de correo electrónico.
    • Contraseñas.

    Desafortunadamente, muchas víctimas no se dan cuenta de que sus computadoras han sido infectadas con malware hasta que ya es demasiado tarde y su dispositivo ha sido comprometido con ransomware o su identidad ha sido robada.

    La Oficina del FBI en Denver exhorta a las víctimas, o a aquellos que hayan sido blanco de intentos de estafa, a denunciarlo en el Centro de Quejas de Crímenes en Internet del FBI en www.ic3.gov.

    Asimismo, recomienda seguir las siguientes precauciones para evitar caer en esta estafa:

    • Respire profundamente, tómese su tiempo y piense. Sea consciente de sus acciones en línea y los riesgos a los que podría estar expuesto.
    • Mantenga su software antivirus actualizado y escanee cualquier archivo que reciba antes de abrirlo para evitar la instalación de software malicioso en su computadora.
    •  

    Si es víctima de esta estafa, siga estos pasos:

    • Póngase en contacto con sus instituciones financieras de inmediato. Tome medidas para proteger su identidad y sus cuentas.
    • Cambie todas sus contraseñas utilizando un dispositivo limpio y confiable.
    • Reporte el incidente en IC3.

    Ejecute un escaneo con software antivirus actualizado para verificar si hay algún software malicioso instalado por los estafadores. Considere la posibilidad de llevar su computadora a un profesional para que la limpie.

    MIL Security OSI

  • MIL-OSI Security: Group convicted of being part of Russian spying operation

    Source: United Kingdom London Metropolitan Police

    A group of six Bulgarians living in the UK have been convicted of being part of a spying operation across Europe on behalf of Russia.

    Following a three-month trial at the Old Bailey, two women and a man were found guilty of conspiring to obtain information intended to be directly or indirectly useful to Russia.

    Three other men pleaded guilty to Official Secrets Act charges before the trial started.

    Commander Dominic Murphy, head of the Met’s Counter Terrorism Command, said: “These convictions have been achieved as the result of an extremely complex investigation into a group that was carrying out sophisticated surveillance operations in the UK, and in Europe, on behalf of the Russian state.

    “This case is a clear example of the increasing amount of state threat casework we are dealing with in the UK – particularly linked to Russia. It also highlights a relatively new phenomenon whereby espionage is being ‘outsourced’ by certain states.

    “While the outsourcing of espionage activity might suggest that recent efforts by the UK to thwart direct Russian activity have been effective, it means that we also have to guard against this new kind of emerging threat.

    “But regardless of the form the threat takes, this investigation shows that we will take action to identify and disrupt any such activity that puts UK national security and the safety of the public at risk.”

    The court heard that detectives from the Met’s Counter terrorism Command sifted through more than 200,000 messages and seized hundreds of items after a co-ordinated series of raids and arrests were carried out on 8 February 2023.

    In particular, a 33-room former hotel belonging to Orlin Roussev was found to contain items, including sophisticated spying equipment such as listening devices, concealed cameras and a fake ID card printer.

    Through their investigation, detectives identified that Roussev, who was leading the group, was in direct contact with Jan Marsalek – an Austrian national who, in turn, was identified as working with the Russian intelligence services.

    The investigation team identified six core spying ‘plots’ the group were involved in. This included activity that targeted two investigative journalists who were seen as reporting stories contrary to the interests of the Russian state.

    A former senior Kazakh politician who lived in the UK was also targeted, and the group planned to stage protests at the Kazakhstan embassy in London. Both operations were part of an elaborate plan to help the Russia state gain favour with Kazakhstan.

    The group also carried out surveillance at a US military site in Germany, where they believed Ukrainian soldiers were being trained.

    Another man who was designated as a ‘foreign agent’ by Russia was also targeted by the group during surveillance operations in Montenegro.

    Sifting through thousands of messages, and then matching this up with physical travel, financial statements and surveillance reports and footage, meant detectives were able to build up a compelling picture of the group’s activity, as well as identify those involved and their roles within the group.

    The six members of the group were:

    – Orlin Roussev, 46 (06.02.1978) of Great Yarmouth, Norfolk
    – Bizer Maksimov Dzhambazov, 43 (21.04.1981), of Harrow, north London
    – Katrin Nikolayeva Ivanova, 33 (01.07.1991) of Harrow, north London
    – Ivan Iliev Stoyanov, 33 (22.12.1991) of Greenford, west London
    – Vanya Nikolaveva Gaberova, 30 (10.08.1994) of Euston, north London.

    – Tihomir Ivanov Ivanchev, 39 (31.07.85) of Acton, west London

    Officers found that Roussev was directing the group’s activity, and was receiving tasks through his contact with Marsalak. Dzambaszov was effectively the second in command.

    The other four were all found to be involved in the execution of various espionage and surveillance activities across the UK and Europe in relation to the six plots identified by detectives.

    Ivanova, Gaberova and Ivanchev were all found guilty of conspiracy to spy, contrary to Section 1 of the Criminal Law Act 1977 after a three-month trial at the Old Bailey

    Roussev and Dzhambazov pleaded guilty before the trial started to conspiracy to spy, contrary to Section 1 of the Criminal Law Act 1977.

    Stoyanov pleaded guilty before the trial to spying, contrary to section 1(1)(c) of the Official Secrets Act 1911.

    The group will be sentenced at the Old Bailey in May.

    All material from the trial is available to download here https://mps.box.com/s/z3jt1xiy…

    MIL Security OSI

  • MIL-OSI Security: Garantex Cryptocurrency Exchange Disrupted in International Operation

    Source: United States Attorneys General 1

    Note: View the indictment here.

    Two Administrators Charged with Operating Multibillion-Dollar Crypto Money Laundering Service

    The Justice Department announced today a coordinated action with Germany and Finland to disrupt and take down the online infrastructure used to operate Garantex, a cryptocurrency exchange that allegedly facilitated money laundering by transnational criminal organizations — including terrorist organizations — and sanctions violations. Since April 2019, Garantex has processed at least $96 billion in cryptocurrency transactions.

    Garantex Splash Page

    In conjunction with the operation targeting Garantex, the Department also announced the unsealing of an indictment in the Eastern District of Virginia against Aleksej Besciokov, 46, a Lithuanian national and Russian resident, and Aleksandr Mira Serda (previously Aleksandr Ntifo-Siaw), 40, a Russian national and United Arab Emirates resident. Mira Serda and Besciokov are charged with money laundering conspiracy, and Besciokov is charged with conspiracy to violate sanctions and conspiracy to operate an unlicensed money transmitting business.

    According to court documents, between 2019 and 2025, Besciokov and Mira Serda controlled and operated Garantex. Besciokov was Garantex’s primary technical administrator and responsible for obtaining and maintaining critical Garantex infrastructure, as well as reviewing and approving transactions. Mira Serda was Garantex’s co-founder and chief commercial officer.

    Garantex received hundreds of millions in criminal proceeds and was used to facilitate various crimes, including hacking, ransomware, terrorism, and drug trafficking, often with substantial impact to U.S. victims. According to the indictment, Besciokov and Mira Serda knew that criminal proceeds were being laundered through Garantex and took steps to conceal the facilitation of illegal activities on its platform. For example, when Russian law enforcement sought records relating to an account registered to Mira Serda, Garantex provided incomplete information in response and falsely claimed the account was not verified. In reality, Garantex had associated the account with Mira Serda’s personal identifying documents, even while disclosing identifying information related to other accounts requested by Russian law enforcement.

    On April 5, 2022, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned Garantex for its role in facilitating money laundering of funds from ransomware actors and darknet markets. According to court documents, despite the widespread publicity of the sanctions and Garantex administrator’s personal knowledge of them, Besciokov and his co-conspirators violated those sanctions by continuing to transact with U.S.-based entities. Further, Besciokov and his co-conspirators redesigned Garantex’s operations to evade and violate U.S. sanctions and induce U.S. businesses to unwittingly transact with Garantex in violation of the sanctions. For example, Garantex moved its operational cryptocurrency wallets to different virtual currency addresses on a daily basis in order to make it difficult for U.S.-based cryptocurrency exchanges to identify and block transactions with Garantex accounts.

    Despite doing substantial business in the United States and operating as a money transmitting business, Garantex failed to register with the Financial Crimes Enforcement Network (FinCEN) as required.

    On March 6, U.S. law enforcement, led by the U.S. Secret Service (USSS), executed a seizure order authorized by a judge in the Eastern District of Virginia against three website domain names used to support Garantex’s operations. According to court records unsealed today, Garantex.org, Garantex.io, and Garantex.academy were associated with the administration and operation of Garantex. The seizure of these domains will prevent these sites from being used for money laundering and additional crimes. Individuals visiting those sites now will see a message indicating that the site has been seized by law enforcement.

    As part of the coordinated actions, German and Finnish law enforcement seized servers hosting Garantex’s operations. U.S. law authorities have separately obtained earlier copies of Garantex’s servers, including customer and accounting databases. In addition, U.S. law enforcement has also frozen over $26 million in funds used to facilitate Garantex’s money laundering activities.

    Besciokov and Mira Serda are each charged with one count of conspiracy to commit money laundering, which carries a maximum penalty of 20 years in prison. Besciokov is also charged with one count of conspiracy to violate the International Emergency Economic Powers Act, which carries a maximum penalty of 20 years in prison, and with conspiracy to operate an unlicensed money transmitting business, which carries a maximum penalty of five years in prison.    

    Supervisory Official Matthew R. Galeotti of the Justice Department’s Criminal Division, U.S. Attorney Erik S. Siebert for the Eastern District of Virginia, Assistant Director Michael Centrella of the USSS’ Office of Field Operations, and Assistant Director Bryan Vorndran of the FBI’s Cyber Division made the announcement.

    USSS and the FBI are investigating the case.

    Assistant U.S. Attorney Zoe Bedell for the Eastern District of Virginia and Trial Attorney Tamara Livshiz of the Criminal Division’s Computer Crime and Intellectual Property Section’s National Cryptocurrency Enforcement Team are prosecuting the case. The Justice Department’s National Security Division and Office of International Affairs provided valuable assistance.

    The Justice Department also recognizes the critical cooperation of the German Federal Criminal Police Office, the Frankfurt General Prosecutor’s Office, the Dutch National Police, Europol, the Finnish National Bureau of Investigation, and the Estonian National Criminal Police.

    Finally, the Department thanks Tether and blockchain analytics firm Elliptic for their proactive assistance in this investigation.

    Any individual who believes he/she is a victim whose funds were laundered through Garantex or who may otherwise have a claim to restrained funds should reach out to law enforcement via email address GarantexClaimants@secretservice.gov.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: Detectives arrest man in Stockwell murder investigation

    Source: United Kingdom London Metropolitan Police

    Met detectives investigating the murder of Lathaniel Burrell in Stockwell have arrested a man.

    A 32-year-old man was arrested on suspicion of murder in Croydon on the morning of Friday, 7 March. He remains in custody.

    Lathaniel, from Stockwell, died at the scene following the shooting in Paradise Road, SW4, on Tuesday, 4 March. He was 16 years old.

    Detective Chief Inspector Sarah Lee said: “Our detectives are working hard to piece together the events of Tuesday afternoon and identify those responsible for killing Lathaniel.

    “We continue to appeal for anyone with information about Lathaniel’s murder to please come forward and speak to us.”

    Officers were alerted at 15:21hrs on Tuesday, 4 March to reports of a shooting and officers attended with emergency service colleagues.

    Medics from London’s Air Ambulance and the London Ambulance Service treated Lathaniel at the scene but despite their efforts, he sadly died. His family are being supported by officers.

    If you have any information which may help the investigation, please call 101 with the reference 4116/04MAR.

    You can also contact the independent charity Crimestoppers on 0800 555 if you want to remain anonymous.

    MIL Security OSI

  • MIL-OSI Security: United States Attorney’s Office Charges 46 Illegal Aliens with Various Offenses including Immigration Crimes, Drug Trafficking, Weapons Offenses, and Child Pornography

    Source: Office of United States Attorneys

    DETROIT – Since January of this year, the United States Attorney’s Office for the Eastern District of Michigan has charged 46 aliens who were unlawfully present in the United States with offenses including illegal reentry into the United States, drug trafficking, illegal possession of firearms, and child pornography offenses. These aliens’ home countries include Guatemala, Honduras, Mexico, and Venezuela. Several had prior convictions for human smuggling, drug trafficking, drunk driving, assault, and theft. In many cases, the aliens had been returned to their home country numerous times but have continued to violate immigration laws by re-entering the United States.

    Recent cases include:

    Hector Bejerano-Bejerano, a native of Mexico, was located at a gas station in Novi, Michigan, when he was creating a nuisance to customers. He was arrested and identified by United States Border Patrol and found to have two prior federal immigration convictions, including one in which Bejerano-Bejerano was caught smuggling three other illegal aliens into the United States from Mexico. During this encounter, Bejerano-Bejerano fled from a Border Patrol Agent and assaulted him. According to court filings in that case, Bejerano-Bejerano was encountered by Border Patrol 18 times during 2021 alone.

    Dulce Rubio-Rivera, a native of Mexico, was found in Detroit, Michigan, when agents from the Federal Bureau of Investigation and Immigration and Customs Enforcement executed a federal search warrant at a house. Inside the house was Rubio-Rivera, along with drugs, a scale, ammunition and an AK-47 rifle. Rubio-Rivera pleaded guilty to conspiracy to distribute 6.25 kilograms of crystal methamphetamine.

    Luis Fernando Santillan-Valderrabano, a native of Mexico, was located in the passenger seat of a vehicle in Detroit. Santillan-Valderrabano was originally admitted into the United States on a special visa that permitted him to stay in the United States for only 72 hours and within 25 miles of the United States-Mexico border. However, five months later Santillan-Valderrabano was arrested and pleaded guilty to theft charges in Georgia. A year after that, he was again arrested and convicted in Nebraska for resisting arrest and felony theft. Santillan-Valderrabano was removed back to Mexico in 2009, but illegally returned and was arrested in 2010 in Ithaca, Michigan, for a driving offense. Santillan-Valderrabano was removed again but tried to sneak back into the United States in 2011, was caught, and federally prosecuted in Texas for illegal entry. Santillan-Valderrabano was removed a third time in 2011, but again tried to illegally enter the United States, was caught, federally prosecuted in Texas for illegal reentry, and removed in 2012. In 2021, he was arrested in Wixom, Michigan, for driving 86 miles per hour in a 45 mile per hour zone. During this encounter with police, he used a fake name and date of birth and failed to appear for his court hearing after being charged with reckless driving, providing false identification, and not having a vehicle operation license.

    Gustavo Placencia-Rosales, a native of Mexico who was unlawfully present in the United States, was arrested and charged in a criminal complaint with conspiracy to possess and possession with intent to distribute cocaine and carrying a firearm during and in relation to a drug trafficking offense. The complaint alleges that agents with the DEA have been investigating Placencia-Rosales for involvement in drug trafficking actitivies. Law enforcement initiated a traffic stop of a vehicle occupied by Placenia-Rosales, with three others, and recovered four brick-shaped packages that field tested positive as cocaine along with two firearms.

    Luis Gerardo Rodriguez-Rey, a native of Columbia who was unlawfully present in the United States, was arrested and charged in a criminal complaint with being an alien in possession of a firearm and ammunition.  According to the complaint, officers with the River Rouge Police Department were on routine patrol when they encountered Rodriguez-Rey traveling at a high rate of speed in a vehicle which did not have any exterior lights illuminated.  A traffic stop was conducted and upon a search of his person and vehicle, officers recovered a Smith & Wesson pistol along with ammunition.

    Luis Angel Alvarez-Alvarez, a native of Venuzuela, was arrested by agents of Immigration and Customs Enforcement’s Homeland Security Investigations and U.S. Border Patrol after agents stopped a vehicle that Alvarez-Alvarez was operating without a license plate.  Alvarez-Alvarez had a prior final order of removal at the time of the arrest.   During a search of his cellular device, officers discovered alleged child sexually abusive material.  Alvarez was charged with production and possession of child pornography and remains in custody pending the disposition of his charges.

    “The United States Attorney’s Office for the Eastern District of Michigan has a long-standing commitment to enforcing the immigrations laws of the United States, and that commitment is unwavering,” said Acting U.S. Attorney Julie Beck. “We will continue to work with our law enforcement partners to investigate and prosecute those individuals who are in our district unlawfully.”

    “These cases represent a fraction of the criminal aliens we and our federal partners arrest every day across the Detroit Sector that’s making this country safer than it was just a few short months ago,” said Detroit Sector Chief Patrol Agent John R. Morris. “I could not be more proud of our agents for their enforcement efforts as well as their ability to form strong bonds with our local, state and federal partnerships such as we see exemplified here with U.S. Immigration and Customs Enforcement.”

    “Keeping dangerous people and illicit drugs and weapons from infecting our communities is at the core of our comprehensive border security mandate,” said Director of Field Operations Marty C. Raybon. “The CBP Office of Field Operations is as committed as ever in protecting our homeland alongside our local, state, and federal law enforcement partners.”

    “Our ICE Detroit officers will continue to secure our communities through the apprehension and arrest of criminal aliens and immigration violators,” said ICE ERO Detroit Field Office Director Robert Lynch. “Working with our law enforcement partners, we have been able to apprehend serious public safety threats from foreign sex offenders to drug traffickers and aliens in possession of illegal firearms.”

    “As the investigative arm of the Department of Homeland Security, our agents are prioritizing investigations into bad actors who exploit our immigration system,” said ICE HSI Detroit acting Special Agent in Charge Jared Murphey. “From illegal aliens in possession of child sexually abusive material to dismantling human smuggling or trafficking rings, our ICE HSI team stands ready to safeguard the homeland alongside our partners.”

    “The men and women of DEA work hard – day in and day out – to protect families from the dangers and violence associated with drug trafficking in our communities,” said DEA Acting Special Agent in Charge Andrew Lawton.  “In that vein, we have prioritized our drug investigations on those involving violent, illegal criminals responsible for flooding our neighborhoods with deadly and dangerous drugs. We will continue to work with the Department of Homeland Security and our federal partners with immigration enforcement efforts.”

    “ATF, along with our Department of Justice partners, stand side by side with the Department of Homeland Security and other federal law enforcement partners in their efforts to enforce immigration laws and protect public safety,” said ATF Detroit Special Agent in Charge James Deir. “We remain committed to supporting coordinated enforcement actions to uphold the rule of the law and ensure the security of our communities.”

    “Members of the FBI’s Detroit Field Office, in collaboration with federal law enforcement partners—including Immigration and Customs Enforcement (ICE), U.S. Border Patrol (CBP), and the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), are actively investigating and apprehending individuals wanted for federal violations and those unlawfully present in the United States,” said Cheyvoryea Gibson, Special Agent in Charge of the FBI’s Michigan Division. “The FBI in Michigan remains steadfast in its mission to uphold the Constitution and ensure the safety and security of the American people.”

    A complaint/indictment is merely a formal charge and is not evidence of guilt.  Every defendant is presumed innocent unless and until proven guilty.  It is the burden of the government to prove guilt beyond a reasonable doubt.

    These cases were investigated by agents of Immigration and Customs Enforcement’s Enforcement and Removal Operations and Homeland Security Investigations, U.S. Border Patrol, U.S. Customs and Border Protection, the Bureau of Alcohol, Tobacco, Firearms and Explosives, the Federal Bureau of Investigation and the Drug Enforcement Administration.

    These cases are being prosecuted by Assistant United States Attorneys in the National Security Unit of the United States Attorney’s Office.

    MIL Security OSI

  • MIL-OSI Security: California Lawyer Sentenced to More Than Five Years in Federal Prison for Wire Fraud and Money Laundering

    Source: Office of United States Attorneys

    The defendant stole more than $2 million of client funds.

    Greenbelt, Maryland – U.S. District Judge Lydia K. Griggsby sentenced Matthew C. Browndorf, 54, of Irvine, California, to more than five years in federal prison for money laundering and wire fraud.

    Kelly O. Hayes, U.S. Attorney for the District of Maryland, announced the sentence with Special Agent in Charge William J. DelBagno of the Federal Bureau of Investigation (FBI) Baltimore Field Office and Special Agent in Charge Edwin Bonano, Federal Housing Finance Agency, Office Inspector General (FHFA-OIG). 

    According to the guilty plea, the defendant served as an attorney licensed to practice law in New York, Pennsylvania, and New Jersey, and was a named partner at a law firm. Browndorf was also majority owner and CEO of Plutos Sama, LLC, which operated as a holding company for his various business endeavors. 

    Plutos Sama, with Browndorf signing the purchase agreement as a managing member, procured the Fisher Law Group.  After Plutos Sama acquired the Fisher Law Group, it changed the name to BP Fisher which served as an organization that represented lending and loan servicing clients in foreclosure proceedings.  The newly acquired company had agreements with its clients to facilitate the foreclosure of a property, take out its expenses, and then return the remaining money.

    BP Fisher also maintained an Interest on Lawyer’s Trust Account (IOLTA) and operating account, which the defendant oversaw. An IOLTA is maintained in a financial institution for the deposit of funds received or held by an attorney or law firm on behalf of a client or third person.  All funds received into an IOLTA account must be delivered in whole or in part to a client, unless received as payment for fees owed to the lawyer by the client or in reimbursement for expenses that the lawyer properly advanced on behalf of the client.

    Over several years, the defendant led clients to believe that they had immediate access to the money in the two BP Fisher IOLTA accounts. But Browndorf was directing employees to transfer the clients’ money into Plutos Sama accounts and other accounts that he controlled.  The scheme caused more than $2.4 million in losses to BP Fisher’s clients. Browndorf used the stolen funds to pay for expenses such as his American Express credit card bill, car-lease payment to Ferrari and Maserati of Newport Beach, and mortgage.

    U.S. Attorney Hayes commended the FBI and FHFA-OIG for their work in this investigation. Ms. Hayes also thanked Assistant U.S. Attorneys Christopher Sarma, Joshua Rosenthal, and Matthew Phelps, who prosecuted the federal case.

    For more information about the Maryland U.S. Attorney’s Office, its priorities, and resources available to help the community, please visit www.justice.gov/usao-md and https://www.justice.gov/usao-md/community-outreach.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Wisconsin Man Sentenced to 30 Years in Federal Prison for Production of Child Sexual Abuse Materials*

    Source: Office of United States Attorneys

    ANDERSON, S.C. — Tyler Michael Berlick, 36, of Muskego, Wisconsin, has been sentenced to 30 years in federal prison after pleading guilty to production of child sexual abuse materials.

    Evidence presented to the court showed that Berlick met a girl he believed to be 13 years old located in Greenville, South Carolina in an online game. He sent the child sexually explicit messages and produced sexual abuse materials of the child over the internet. Berlick also traveled from Wisconsin to South Carolina and engaged in sexual activity with the child and then traveled with the minor to Florida and further engaged in sexual activity with the child. 

    “This defendant targeted and exploited someone he knew was a child, and this sentence reflects magnitude of such an offense,” said Acting U.S. Attorney Brook B. Andrews for the District of South Carolina. “This child was brought home safely due to law enforcement coordination across multiple states. Our office will continue to bring every resource we have to bear in the fight to keep our child safe from predators like this.”

    “The FBI is steadfast in its commitment to combating violent crime, especially cases involving the exploitation of children,” said Steve Jensen, Special Agent in Charge of the FBI Columbia field office. “This defendant, preyed on a child, and he is now facing justice. The FBI and our law enforcement partners will always prioritize safeguarding children and pursuing those who pose a threat to their safety.”

    United States District Judge Timothy M. Cain sentenced Berlick to 360 months imprisonment, to be followed by a lifetime of court-ordered supervision.  There is no parole in the federal system.

    This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the U.S. Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals, who sexually exploit children, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit http://www.justice.gov/psc.

    This case was investigated by the FBI Columbia field office, the Greenville County Sheriff’s Office, the FBI Miami Field Office, the Latana Police Department (Florida), the Monroe County Sheriff’s Office (Florida) and the Waukesha County Sheriff’s Department (Wisconsin). Assistant U.S. Attorney Winston Marosek is prosecuting the case.

    ###

    * The term “child pornography” is currently used in federal statutes and is defined as any visual depiction of sexually explicit conduct involving a person less than 18 years old. While this phrase still appears in federal law, “child sexual abuse material” is preferred, as it better reflects the abuse that is depicted in the images and videos and the resulting trauma to the child. The Associated Press Stylebook also discourages use of the phrase “child pornography.”

    MIL Security OSI

  • MIL-OSI Security: Around the Air Force: Skyraider II, Training Wing F-35 Transition, ACE Field Training

    Source: United States Air Force

    In this week’s look Around the Air Force, AFSOC has a new airframe, the Skyraider II, that can provide close air support and reconnaissance, the last F-16 training squadron at Luke AFB transitions to the F-35A Lightning II, and a professional development course for SNCOs in the Pacific runs its first-ever ACE field training exercise.

    MIL Security OSI

  • MIL-OSI Security: FBI Philadelphia Reminds Spring Breakers of Safety Aboard Aircrafts

    Source: Federal Bureau of Investigation FBI Crime News (b)

    PHILADELPHIA—As March means spring break travel for many, the FBI Philadelphia Field Office advises travelers to remain vigilant and exercise caution when traveling aboard aircrafts and navigating airports.

    The FBI remains committed to prioritizing investigations into federal crimes occurring on aircrafts that endanger the safety of passengers, the flight crews, and flight attendants.

    “As spring breakers take to the skies, the FBI wants to remind them to prioritize safety while traveling through airports and flying,” said Wayne A. Jacobs, special agent in charge of FBI Philadelphia. “Working with our federal, state, and local partners, and most importantly the public, is key to identifying these threats and combating crime in airports and aboard aircrafts.”

    Each of the FBI’s 55 field offices have airport liaison agents (ALA). These agents are assigned to the nearly 450 U.S. aviation facilities that have passenger screening operations regulated by the Transportation Security Administration (TSA), and respond to crime aboard an aircraft, a violation which falls within the FBI’s special investigative jurisdiction.

    Some of the violations the FBI investigates if they are committed during a flight are listed below:

    • Sexual misconduct, including sexual assault; indecent exposure, lewd, indecent, sexual, or obscene acts; and indecent or sexual proposal to a minor.
    • Assault, including striking or hitting, throwing an object, grabbing or unwanted touching, and spitting.
    • Interference with flight crew members, including assault, threats, or intimidation and/or an attempt or conspiracy to do the same.
    • Theft

    In addition, the FBI investigates airport-based violations. This includes violence against persons and property at international airports if the victim or offender is a United States national, or if the offender is located within the U.S. It also includes interfering with airport security screening personnel ahead of a flight, including airport employees or airline employees working at the gate.

    The FBI also investigates bomb threats whether they are made on the ground or in-flight.

    Everyone should be aware of their surroundings while onboard an airplane or in an airport. If you have been the victim of one of these crimes or if you have witnessed one take place, report it to your flight crew, airport authority police and the FBI.

    FBI Philadelphia can be reached at (215) 418-4000 or tips can be reported online at tips.fbi.gov.

    MIL Security OSI

  • MIL-OSI Security: Lancaster County Man and Long-Distance Trucking Company Sentenced for Violations of Clean Air Act

    Source: Office of United States Attorneys

    HARRISBURG – The United States Attorney’s Office for the Middle District of Pennsylvania announced that Leon Martin, age 42, of Lititz, PA, and Frock Brothers Trucking, Inc. (Frock Brothers), of New Oxford, PA, were sentenced by U.S. District Court Judge Julia K. Munley for conspiracy and violations of the Clean Air Act. 

    Martin was sentenced to a two-year term of probation, with three months of a home curfew, and a $500,000 fine. Frock Brothers Trucking, Inc. was sentenced to a two-year term of probation and an $80,000 fine.

    According to Acting United States Attorney John C. Gurganus, Martin was a mechanic who worked at a diesel repair shop, in Ephrata, PA.  Between 2018 through October 2023, Martin provided “tuning” or “reprogramming” services in which he tuned the engine control modules (ECMs) on diesel trucks. The ECM is a computerized system that manages and controls the engine’s performance.  During that time, Martin began tampering with the emissions diagnostic systems on the vehicles of many companies to prevent the diagnostic system software from monitoring the emission control system hardware, thereby defeating the systems’ ability to reduce pollutant gases and particulate matter being emitted to the atmosphere by the trucks. 

    In November and December 2018, Martin did work for Frock Brothers Trucking, Inc., a long-distance trucking company that delivers general freight and other products.  At that time, Martin, Frock Brothers, and others, conspired to tamper with the emission control hardware on approximately eight diesel vehicles of Frock Brothers, in violation of the Clean Air Act.  The illegal actions were for the purpose of obtaining economic benefits, including, among other things, reduced or avoidance of repair costs, fuel savings from improved fuel economy on modified vehicles, and reduced expenditures on diesel exhaust fluids required to operate emissions systems components.  As part of the scheme, Frock Brothers removed the vehicles’ ECMs from their engines and shipped them to Leon Martin for reprogramming. Once the devices were “tuned,” Martin shipped them back to Frock Brothers, where they were reinstalled on the trucks. As a result of the emissions systems tampering, Frock Brothers vehicles emitted excess emissions, including nitrogen oxides and particulate matter, into the atmosphere. 

    “Tampering with required emissions monitoring devices in heavy duty vehicles results in a significant increase in air pollution,” said Allison Landsman, EPA-CID Special Agent in Charge. “Today’s sentencing demonstrates that we will hold violators accountable for breaking our environmental laws.” 

    The case was investigated by the Environmental Protection Agency’s Criminal Investigations Division. Assistant U.S. Attorney William Behe prosecuted the case.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Foreign National Extradited From Spain To Face Charges For Alleged International “Tech Support Fraud Scheme”

    Source: Office of United States Attorneys

    CHARLOTTE, N.C. – Acting U.S. Attorney Lawrence J. Cameron announced today that Bikramjit Ahluwalia, 39, a dual citizen of the United Kingdom and the United Arab Emirates living in Dubai, was extradited from Spain and will appear in federal court in Charlotte later today. Ahluwalia, also known as “Biku,” “Internetteam5000,” “Don Bonsa,” and “Bobby,” is charged in a federal indictment with conspiracy to commit wire fraud, money laundering conspiracy, conspiracy to damage a protected computer, and wire fraud for his alleged role in an extensive “tech support fraud scheme.”

    Generally, a tech support fraud scheme causes malicious pop-ups to appear on unsuspecting users’ computers, warning their devices have been infiltrated by a virus or another serious computer issue, convincing users to purchase unnecessary repair services or technical support using a telephone number or a link on the victims’ computer screens.

    According to allegations in the indictment, Ahluwalia and his co-defendant, Andrew Brolese, owned Digital Marketing Support Services (DMSS), a Seychelles-based company that published and sold malicious pop-ups as a means of generating customer traffic for overseas call centers from victims of their tech support scheme. From April 2016 to March 2021, Ahluwalia and Brolese and their conspirators targeted victims throughout the United States, some of whom were 55 and older. It is alleged that the victims targeted in the scheme experienced computer pop-ups that mimicked fatal system-error screens, also known as “blue screens of death,” malicious pop-ups suggesting malware had been installed on their computers, or urgent warnings for technical issues related to the victims’ services, software, or devices. The indictment alleges that victims targeted by the malicious pop-ups were then instructed to call a number to receive technical services to help resolve their issues. As alleged in the indictment, the various overseas call centers, upon receipt of the victim call traffic, would use the misrepresentations in the pop-ups, false diagnoses of computer issues, and other deceptive sales techniques to trick the victims into paying hundreds and sometimes thousands of dollars to the call centers to receive unnecessary technical support for the non-existent computer issues.

    The indictment alleges that Ahluwalia and Brolese conspired with others to sell incoming calls from targeted victims seeking purported tech support to companies around the world, including to an individual who owned companies in the Western District of North Carolina. It is further alleged that Ahluwalia and Brolese received over $31.2 million in illicit payments from the tech support scheme, through wire transfers made to DMSS’s bank accounts located overseas.

    Ahluwalia is expected to appear for his initial hearing before U.S. Magistrate Judge David C. Keesler in Charlotte at 10:15 a.m.

    Ahluwalia’s charges for conspiracy to commit wire fraud and wire fraud carry a maximum penalty of 30 years in prison. The maximum sentence for money laundering is 20 years in prison, and for the charge of conspiracy to damage a protected computer is five years in prison. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    The charges in the indictment are allegations and the defendant is presumed innocent unless and until proven guilty beyond a reasonable doubt in a court of law.

    The investigation was led by the Nashville Cyber Task Force which comprises the Knoxville Office of the FBI and the Knoxville Police Department. We thank the government of Spain for their substantial assistance arresting and extraditing Ahluwalia. The Justice Department’s Office of International Affairs provided significant assistance in securing the extradition of Ahluwalia from Spain.

    Assistant U.S. Attorney Matthew Warren with the U.S. Attorney’s Office in Charlotte is prosecuting the case.

     

    MIL Security OSI

  • MIL-OSI Security: Eastern NC Man Sentenced to Over Four Years for Role in $1 Million Covid Fraud Scheme

    Source: Office of United States Attorneys

    NEW BERN, N.C. – A Snow Hill man was sentenced to 50 months in prison for Conspiracy to Commit Wire Fraud related to Covid-19 loans.  In March of 2024, TYREEK RASHEED EXUM, 26, was charged in a multi-count indictment alleging various offenses related to a Covid fraud scheme.  On September 24, 2024, Exum pled guilty to Conspiracy to Commit Wire Fraud.  Co-defendant Anthony Wandland, Jr., of Chicago, Illinois, pled guilty to the same charge on November 13, 2024.

    Exum and Wandland conspired to use over 20 stolen identities and the identities of co-conspirators to apply for Economic Injury Disaster Loans (EIDL) and Pandemic Unemployment Assistance benefits. The indictment charged that Wandland provided Exum with the stolen identities, and, in exchange, Exum gave Wandland a percentage of the proceeds. Each loan application submitted by Exum contained false statements, misrepresentations, and omissions related to income, employment, and claimed business entities. Exum signed various financial documents, including loan and security agreements, in the names of those stolen identities and then had the loan proceeds deposited into his personal bank account, nominee bank accounts, bank accounts of family and friends, and into accounts in the names of stolen identities. Exum exercised control over these accounts by obtaining bank debit cards and by causing nominees to transfer the fraud proceeds to other accounts controlled by him via various digital mediums such as PayPal and CashApp. Exum also withdrew the cash at multiple ATMs. In total, the indictment alleged Exum received nearly $1 million in fraudulent loan proceeds.  The Court ordered Exuma to pay more than $620,000 in restitution.

    Daniel P. Bubar, Acting U.S. Attorney for the Eastern District of North Carolina made the announcement after sentencing by U.S. District Judge Louise W. Flanagan. IRS Criminal Investigation investigated the case and Special Assistant U.S. Attorney Lisa Labresh prosecuted the case.

    Related court documents and information can be found on the website of the U.S. District Court for the Eastern District of North Carolina or on PACER by searching for Case Nos. 5:21CR178-M and 5:23CR388-M.

    ###

    MIL Security OSI

  • MIL-OSI Security: Strategic partnerships: Europol boosts cooperation with Latin America

    Source: Europol

    On 7 March 2025, Europol welcomed ministerial delegations from the Latin American Committee for Internal Security (CLASI) to its headquarters in The Hague. The visit marked the final day of the delegates’ official tour, following two days of high-level meetings in Brussels on the margins of the Justice and Home Affairs (JHA) Council on 5 March. Facilitated through the EU-funded…

    MIL Security OSI

  • MIL-OSI Security: Man jailed for raping two girls he met online

    Source: United Kingdom London Metropolitan Police

    A man who raped two teenage girls he met on Snapchat has been jailed for nine years, following an investigation by specialist detectives at the Metropolitan Police Service.

    On Thursday, 6 March, 2025, Himanshu Makwana, 42 (04.04.1982), of Thurlby Road, Wembley, was jailed at Harrow Crown Court after being convicted on two counts of rape. He will serve an additional four years on extended licence, and will be made to register as a sex offender for life.

    The two offences were carried out on separate occasions, four years apart, but both with strikingly similar circumstances.

    Detective Constable Lewis Jelley, who led the investigation, said:

    “Makwana posed as a young man on social media in order to prey on young girls. He carried out a horrific attack on one woman, and then did the same thing again a few years later. He was brought to justice following a painstaking investigation.

    “I want to thank the two brave young women who came forward and reported the offences to us. Without their courage, we would not be in the position we are today.”

    In 2019, Makwana used a Snapchat account to communicate with his first victim, who was aged 18. After speaking for a few months, they decided to meet. He drove her to an empty office block, and once inside of the building, he raped her.

    The offence was reported to police at the time and no suspect was identified.

    In April 2023, Makwana again posed as a 19-year-old man on Snapchat and started speaking to his second victim, who had only recently turned 16.

    Shortly afterwards, he parked on a street close to the victim’s school and waited for her, before asking for her help.

    The victim agreed and helped Makwana carry some books. He then locked her in his car and identified himself as ‘Samir,’ which was the fake identity he had used on Snapchat. He then drove her to an empty commercial premises and raped her.

    Makwana was arrested on Monday, 27 November, 2023 – the day after the second victim reported the incident – thanks to an image captured by a witness which showed the car used in the incident. This enabled officers to locate the vehicle, and arrest Makwana.

    Analysis of a DNA sample taken on his arrest identified him as the previously unknown suspect for the offence against the first victim in 2019.

    He was then charged with the rapes of both victims on Friday, 22 December, 2023, and remanded in custody ahead of trial.

    MIL Security OSI

  • MIL-OSI Security: Home Secretary honours police staff heroes

    Source: United Kingdom National Police Chiefs Council

    Police staff from across the country were honoured at a special ceremony yesterday held at the Senior Police Staff Network conference.

    Over 1,100 nominations were received across seven award categories for the inaugural National Police Staff Awards. These awards have been created to recognise the significant impact that police staff have in policing and celebrate where that work is helping to deliver policing priorities.

    Nominations were received from across UK policing, showcasing the expansive roles and work that police staff undertake. Jointly hosted by the NPCC and College of Policing, this event forms part of the Police Staff Week of Celebration and Recognition 2025.

    We were honoured to have in attendance the Home Secretary the Rt Hon Yvette Cooper MP, who presented the award for the inaugural Police Staff Team of the Year. This was awarded to the police staff who responded after the tragic events in Southport in July 2024, and who would go on to provide vital support to the community in the days and weeks to follow.

    ACO Gemma Stannard, Head of the NPCC’s Strategic Hub, and ACO Alexis Poole of Devon and Cornwall Police are co-founders of the SPSN and were in attendance at today’s ceremony. They said:

    “Today’s event was very special, and we feel privileged to have been able to share it with so many wonderful colleagues from across policing.

    “The police service created these awards to recognise the members of police staff who have gone above and beyond in support of their communities; to recognise those who have shown immense mental, emotional, and mental bravery whilst undertaking their role; and to celebrate those whose work has contributed to vital organisational change. It is so important that we as a service take the time to appropriately recognise and celebrate these achievements.

    “We are sincerely grateful that we were able to have the Home Secretary in attendance presenting the award to Police Staff Team of the Year: these individuals displayed courage, bravery and professionalism of the highest order in unprecedented circumstances and will carry what they saw that day at Southport with them for the rest of their lives.

    “In carrying out their actions, they made a huge contribution to the safety and recovery of the survivors of the attack as well as securing a crime scene to ensure best possible evidence was preserved. We know we speak for all in policing when we say they have our gratitude and our respect.

    “To all of the award winners today across all categories: thank you for all that you do. We hope today was a truly fulfilling experience, and we wish you all the very best”.

    Home Secretary Yvette Cooper said:

    “It has been a privilege to attend the inaugural National Police Staff Recognition Week and honour some truly outstanding people and fantastic achievements.

    “From working with our communities to providing compassionate care to those who need it most, the role our police staff and Police Community Support Officers play in keeping our streets safe is invaluable and will have a crucial role to play as we deliver our Safer Streets Mission.

    “The skill and dedication the award winners have shown is just a fraction of what every team in every force across the country is delivering every day, often in such pressurised environments, and it is fantastic to see staff and their families celebrated.”

    Chief Constable Sir Andy Marsh, CEO of the College of Policing, said:

    “Police staff are too often overlooked, despite providing vital work for their communities every day, often in incredibly challenging circumstances.  

    “Whether it’s the intelligence from a police analyst who helps identify a criminal, a forensic investigator that provides the key piece of evidence that secures a conviction, or a PCSO who helps keep their community safe, police staff are absolutely integral to the police service, and I’m pleased we were able to acknowledge that today.  

    “I’m honoured that the College of Policing was able to host the inaugural Police Staff Awards, and I hope we get to see many more police staff being recognised for their brilliant work in the coming years. 

     

    Award Winners

    Police Staff Team of the Year Award – Merseyside Sefton Area Police Community Support Team’

    The winning team represents the Sefton Area Police Community Support Officers [as constituted at July/August 2024] and also the Social Media Officer who supported with critical work following the attack:

    PSCO Eve Lancaster

    PCSO Brendan Farrell

    PCSO Chris Ward

    PCSO Pawel Janik

    Alexander Pouncey

    PCSO Michelle Newman

    PCSO Alice Cunningham

    PCSO Lucas Cordeiro Reguin Da Silva

    PCSO Timothy Parry

    PCSO Barry Calder

    Natalie Carroll, social media officer

    Police Staff Member of the Year Award – Ian Lawrence, Family Liaison Coordinator, Lancashire Constabulary

    HIGHLY COMMENDED – Lesley Yule Dunlevy, Public Enquiry and Support Assistant, Police Scotland

     

    Police Staff Bravery Award – Anna Beaudro, Police Contact Enquiry Officer (PCEO), Hampshire and Isle of Wight Constabulary.

    HIGHLY COMMENDED – Ashely Heaton, Metropolitan Police Service Circulations Unit Supervisor, Met Police MO4.

    New Police Staff Member (Exceptional Contribution Award) –
    Ryan Clatworthy, Incident Risk and Resolution Officer, South Wales Police.
    Olivia Prosser, Acting Senior Comms Officer, Cheshire Constabulary.

     

    Police Staff Lifetime Achievement Award – Karen Boyd, Executive Assistant to Assistant Commissioner for Specialist Operations (ACSO), Metropolitan Police Service.

    HIGHLY COMMENDED – David McMahon, Service Delivery Manger, Cheshire Constabulary – Enable Network.

     

    Police Staff Ally of the Year Award – Claire Widdison, Head of Strategic Governance, Thames Valley Police

     

    Police Staff Unsung Hero Award – [Undisclosed winner due to operational sensitivities]

    HIGHLY COMMENDED – Hazel Parry, GMP Victims’ Services Coordinator – Bury, Greater Manchester Police.

    MIL Security OSI

  • MIL-OSI Security: Conditions remain in place on weekly protest in Swiss Cottage

    Source: United Kingdom London Metropolitan Police

    The Met has confirmed conditions remain in place on a long-running protest in Swiss Cottage.

    The static protest in Finchley Road, at the junction of Eton Avenue, has been taking place on a weekly basis on Friday’s since October 2023.

    From Friday, 28 February the protest, organised by the International Jewish Anti-Zionist Network (IJAN), must take place within a designated area in Kings Cross.

    The decision to impose these conditions has been made with a view to minimising serious disruption to the community in the Swiss Cottage area.

    Superintendent Jack Rowlands, who is responsible for the policing operation across Camden and Islington, said:

    “Our role is to ensure all those exercising their right to protest can do so without incident and without causing serious disruption to the lives of the wider community.

    “We have imposed conditions under the Public Order Act on when and where this protest can take place. I would ask anyone attending to make themselves aware of these conditions as to breach them, or to incite others to do so, is a criminal offence.”

    The conditions state:

    – Any person participating in the IJAN protest must remain in the area shaded on the attached map outside Kings Cross Station, Euston Road, London, on the pavement between the bus stop and pedestrian crossing.

    – The assembly must finish by 19:30hrs.

    Officers will be in attendance and we would encourage people to speak to them if they have concerns. They are there to ensure everyone is kept safe.

    If you want to report anything suspicious you can call 101 or 999 in an emergency.

    MIL Security OSI

  • MIL-OSI Security: Public Servants Plead Guilty to Covid-19 Relief Fraud

    Source: United States Department of Justice (National Center for Disaster Fraud)

    MIAMI – Angelo Stephen, a Federal Bureau of Prisons (BOP) Correctional Officer, and George Arestuche, a Miami-Dade County Aviation Department employee, have pled guilty to federal charges in separate federal cases for defrauding Covid-19 pandemic relief programs.  

    Stephen pled guilty this week before Chief U.S. District Judge Cecila M. Altonaga to wire fraud in connection with his fraudulent applications for two Paycheck Protection Program (PPP) loans and one Economic Injury Disaster Loan (EIDL). He also admitted to wire fraud for his participation in two bank account takeover schemes.

    Arestuche pled guilty to conspiracy to commit wire fraud in connection with his receipt of one EIDL and one EIDL advance. Senior U.S. District Judge Paul C. Huck accepted Arestuche’s guilty plea this week.

    Angelo Stephen

    During his change of plea hearing, Stephen admitted that in an EIDL application he submitted to the Small Business Association (SBA), he falsely claimed to be an independent contractor and sole owner of a 10-employee business that did event planning and entertainment services. He also admitted that in this EIDL application, he falsely certified that for the applicable 12-month period, his business had gross revenues of approximately $62,018 and a cost of goods sold of $0. Stephen obtained from the SBA $20,000 in EIDL funds, to which he was not entitled.  

    Stephen also admitted at the change of plea hearing that he submitted false information in two PPP loan applications. In both applications (one submitted in April 2021, the second a month later), Stephen falsely claimed that he owned a business that grossed $106,554 in income in 2020, submitting a fake IRS Form 1040 Schedule C to support his fraudulent requests. Stephen received separate $20,833 PPP loans from two different SBA-approved lenders for the non-existent business.   

    Finally, at the change of plea, Stephen also admitted his role in two bank account takeover schemes. On March 30, 2023, after his first scheme, Stephen received a $20,000 wire transfer from the account of an unsuspecting victim in Virginia, and thereafter quickly withdrew all illegally obtained money through a series of cash withdrawals and through Zelle transfers to others.  In the second takeover scheme, Stephen and his accomplices obtained new checks from the credit union account of a different unsuspecting victim. Stephen then used one of those checks to obtain $8,500 in cash that he was not entitled to. 

    Stephen is scheduled for sentencing on May 22, 2025, at 8:30 a.m. before Chief U.S. District Judge Altonaga in Miami, Florida, where he faces a possible maximum sentence of up to 20 years in prison.

    George Arestuche

    According to the facts admitted at his change of plea, George Arestuche and a co-conspirator devised a scheme to defraud the SBA by submitting a false and fraudulent application to allow Arestuche to fraudulently obtain an EIDL loan in exchange for Arestuche paying the co-conspirator a large fee.

    To carry out this conspiracy, on July 9, 2020, Arestuche’s submitted to the SBA a false and fraudulent EIDL application on Arestuche’s behalf claiming that Arestuche was an independent contractor and the 100% owner of an “Automotive Repair” business operating under the legal and DBA name “george.”  That EIDL application falsely certified that for the 12-month period prior to January 31, 2020, “george” had gross revenues of $600,000, a cost of goods sold of $184,000, and 10 employees.  In reality, Arestuche was not an independent contractor and did not own any type of business.  This EIDL application was supported by a fraudulent 2019 IRS Form 1040 and Schedule C in Arestuche’s name that falsely claimed that he had a “mechanic” business that had gross receipts of $725,000 and earned a net profit of $706,151.  As a result of this false and fraudulent EIDL application, Arestuche obtained from the SBA $149,900 in EIDL proceeds and a $10,000 EIDL advance, and he subsequently paid his co-conspirator $17,275 for helping him fraudulently obtain this money from the SBA.

    Arestuche is scheduled for sentencing on May 12, 2025, at 11:00 a.m. before Senior U.S. District Judge Paul C. Huck in Miami, where he faces a possible maximum sentence of up to 5 years in prison.

    U.S. Attorney Hayden P. O’Byrne for the Southern District of Florida, Special Agent in Charge Andrew Hartwell of the Department of Justice Office of Inspector General’s Fraud Detection Office (DOJ-OIG), Special Agent in Charge Amaleka McCall-Brathwaite, U.S. Small Business Administration Office of Inspector General (SBA OIG), Eastern Region, Acting Special Agent in Charge Brett Skiles of the FBI, Miami Field Office, and Inspector General Felix Jimenez of the Miami-Dade County Office of Inspector General (MDC-OIG) announced the guilty pleas.

    DOJ-OIG and SBA-OIG investigated the Stephen case.  SBA-OIG and the FBI’s Miami Area Corruption Task Force, which includes task force officers from the MDC-OIG, investigated the Arestuche case. 

    Assistant U.S. Attorney Edward N. Stamm is prosecuting both cases.  Assistant U.S. Attorney Annika Miranda is handling forfeiture matters on the Stephen case while Assistant U.S. Attorney Gabrielle Raemy Charest-Turken is handling forfeiture matters on the Arestuche case.

    In March 2020, the Coronavirus Aid, Relief, and Economic Security (“CARES”) Act was enacted. It was designed to provide emergency financial assistance to the millions of Americans suffering the economic effects caused by the COVID-19 pandemic. Among other sources of relief, the CARES Act authorized and provided funding to the SBA to provide Economic Injury Disaster Loans (“EIDLs”) to eligible small businesses, including sole proprietorships and independent contractors, experiencing substantial financial disruptions due to the COVID-19 pandemic to allow them to meet financial obligations and operating expenses that could otherwise have been met had the disaster not occurred.  EIDL applications were submitted directly to the SBA via the SBA’s on-line application website, and the applications were processed and the loans funded for qualifying applicants directly by the SBA.

    On May 17, 2021, the Attorney General established the COVID-19 Fraud Enforcement Task Force to marshal the resources of the Department of Justice in partnership with agencies across government to enhance efforts to combat and prevent pandemic-related fraud. The Task Force bolsters efforts to investigate and prosecute the most culpable domestic and international criminal actors and assists agencies tasked with administering relief programs to prevent fraud by, among other methods, augmenting and incorporating existing coordination mechanisms, identifying resources and techniques to uncover fraudulent actors and their schemes, and sharing and harnessing information and insights gained from prior enforcement efforts. For more information on the Department’s response to the pandemic, please visit https://www.justice.gov/coronavirus.

    On September 15, 2022, the Attorney General selected the Southern District of Florida’s U.S. Attorney’s Office to head one of three national COVID-19 Fraud Strike Force Teams. The Department of Justice established the Strike Force to enhance existing efforts to combat and prevent COVID-19 related financial fraud. For more information on the department’s response to the pandemic, please click here.

    Anyone with information about allegations of attempted fraud involving COVID-19 can report it by calling the Department of Justice’s National Center for Disaster Fraud (NCDF) Hotline at 866-720-5721 or via the NCDF Web Complaint Form at: https://www.justice.gov/disaster-fraud/ncdf-disaster-complaint-form.

    Related court documents and information may be found on the website of the District Court for the Southern District of Florida at www.flsd.uscourts.gov or at http://pacer.flsd.uscourts.gov, under case numbers 25-cr-20014 and 25-cr-20001.

    ###

    MIL Security OSI

  • MIL-OSI Security: U.S. Marine Corps, Royal Thai Marine Corps, Republic of Korea Marine Corps conduct combat marksmanship practice during Cobra Gold 2025

    Source: United States INDO PACIFIC COMMAND

    Cobra Gold is taking place from Feb. 26 – Mar. 8, 2025, with this year marking the 44th iteration of the exercise. As the largest joint exercise in mainland Asia, Cobra Gold brings together multinational armed forces and multiple civilian agencies in the exchange of knowledge involving training events and discourse with subject matter experts.

    In the combat marksmanship training event, U.S. Marines instructed Thai and ROK Marines in close combat scenarios utilizing a 50 meter rifle range.

    Col. Stuart Glenn, commanding officer of the 13th Marine Expeditionary Unit, Marine Rotational Force-Southeast Asia, was there to witness the cooperative training environment.

    “We’re exchanging knowledge,” said Glenn. “We’re exchanging skills. We’re exchanging best practices and things that we have learned in our collective training. And what makes this particular event unique is that we’re also receiving all of that from our international partners here today.”

    One such partner present, Petty Officer 1st Class Suttiwat Susing of the Royal Thai Marine Corps, has extensive experience with the collaborative training mission, having participated in over four Cobra Gold exercises in the past.

    “I have learned many things from the U.S. Marine Corps in all the Cobra Golds I have been a part of,” said Susing. “Even today on the range, they taught new practices related to safety on the range.”

    In addition to the technical expertise exchanged between service members, Susing has seen many lasting friendships result from the exercises. This fact is not lost on Hospital Corpsman 3rd Class Isaiah Gutierrez, a U.S. Navy Sailor attached to the 1st LAR.

    “Training like this on a range is important for our readiness, but it’s also like a bonding time for these guys,” said Gutierrez. “A lot of these guys like to shoot – American, Korean and Thai. So doing it all together gives a sense of camaraderie between them. And, of course, it helps us all understand how we operate our weapon systems.”

    Lance Cpl. Ryan Bernard, team leader in the 1st LAR, participated in the combat marksmanship training and welcomed the opportunity to learn from marines of other nations.

    “Training with our partners like this, in their own country and with other armed forces, is crucial to our mission,” said Bernard.

    According to Bernard, a day on the range with partners and allies goes a long way toward operational familiarity and camaraderie among service members.

    Republic of Korea Navy Capt. Kim Kyung-ho, commander of the ROK Navy Cobra Gold Exercise Squadron, observed for himself the marines instructing each other in techniques and safety procedures on the range.

    “Through active and practical training like today with our allies and partners, we will be able to enhance the ability to conduct multinational joint operations and contribute to strengthening interoperability and military cooperation while promoting friendship among the participating forces,” said Kyung-ho.

    MIL Security OSI

  • MIL-OSI Security: Secretary Noem Honors Fallen Customs and Border Protection Agent and His Fellow Officers

    Source: US Department of Homeland Security

     In Puerto Rico, Secretary Noem also met with Governor Jennifer González-Colón.

    SAN JUAN, Puerto Rico – Today, Secretary Kristi Noem presented Customs and Border Protection (CBP) Agent Jorge Santiago and Agent Mark Lamphere with the Medal of Valor and Purple Cross awards. The ceremony also officially marked renaming of the Mayagüez Marine Unit to the Michel O. Maceda Marine Unit during a solemn ceremony. 

    Secretary Kristi Noem presented Customs and Border Protection (CBP) Agent Jorge Santiago and Agent Mark Lamphere with the Medal of Valor and Purple Cross awards.

    ” data-asset-id=”58997″ data-asset-link=”1″ data-asset-type=”imageasset” data-entity-type=”emerald” data-image-style=”medium” src=”/sites/default/files/styles/medium/public/externals/a64a381c7460f0b08d2cc2411a3d9f03.jpg.webp?itok=yDP6bZln”/>

    Secretary Kristi Noem presented Customs and Border Protection (CBP) Agent Jorge Santiago and Agent Mark Lamphere with the Medal of Valor and Purple Cross awards. | View Original

    In November 2022, Agent Santiago, Agent Lamphere, and Agent Maceda intercepted a vessel 14 miles off the coast of Cabo Rojo, Puerto Rico. The individuals on board were attempting to smuggle drugs into American communities. After the agents identified themselves as law enforcement, the drug traffickers opened fire. All three agents were hit. Despite his near fatal injuries, Agent Santiago gave lifesaving first aid care to Agent Lamphere and attempted to save Agent Maceda. That day, Agent Maceda made the ultimate sacrifice to protect our great nation. 

    Secretary Kristi Noem presented Customs and Border Protection (CBP) Agent Jorge Santiago and Agent Mark Lamphere with the Medal of Valor and Purple Cross awards.

    ” data-asset-id=”58999″ data-asset-link=”1″ data-asset-type=”imageasset” data-entity-type=”emerald” data-image-style=”medium” src=”/sites/default/files/styles/medium/public/externals/146e5b3d68ce3a373b0615ff4dcd2018.jpg.webp?itok=5WENAoVu”/>

    Secretary Kristi Noem presented Customs and Border Protection (CBP) Agent Jorge Santiago and Agent Mark Lamphere with the Medal of Valor and Purple Cross awards. | View Original

    A statement from Secretary Noem is below: 

    “It was my honor to present CBP Agent Jorge Santiago and Agent Mark Lamphere with the Medal of Valor and Purple Cross awards. In November 2022, both men and their fellow CBP Agent Michael Maceda were shot by drug traffickers attempting to bring drugs into American communities. Tragically, Agent Maceda lost his life. Thank you to all of our law enforcement who put their lives on the line every day to keep America safe.” 

    While in Puerto Rico, Secretary Noem also met with Governor Jennifer González-Colón to discuss partnership efforts to secure America’s maritime borders.  

    While in Puerto Rico, Secretary Noem also met with Governor Jennifer González-Colón to discuss partnership efforts to secure America’s maritime borders.

    ” data-asset-id=”59000″ data-asset-link=”1″ data-asset-type=”imageasset” data-entity-type=”emerald” data-image-style=”medium” src=”/sites/default/files/styles/medium/public/externals/d4981d754a8cc3a7c068473e1dbab984.jpg.webp?itok=L6-PO0i6″/>

    While in Puerto Rico, Secretary Noem also met with Governor Jennifer González-Colón to discuss partnership efforts to secure America’s maritime borders. | View Original

    MIL Security OSI

  • MIL-OSI Security: Active-Duty and Former U.S. Army Soldiers Arrested for Theft of Government Property and Bribery Scheme

    Source: United States Attorneys General 7

    One Soldier Charged with Conspiring to Transmit National Defense Information to Individuals Located in China

    View the indictment for Jian Zhao.

    Jian Zhao, and Li Tian, active-duty U.S. Army soldiers stationed at Joint Base Lewis-McChord, along with Ruoyu Duan, a former U.S. Army soldier, were arrested today following indictments by federal grand juries in the District of Oregon and the Western District of Washington. Tian and Duan were charged in the District of Oregon for conspiring to commit bribery and theft of government property. Zhao was charged in the Western District of Washington for conspiring to obtain and transmit national defense information to an individual not authorized to receive it, and also for bribery and theft of government property.

    “The defendants arrested today are accused of betraying our country, actively working to weaken America’s defense capabilities and empowering our adversaries in China,” said Attorney General Pamela J. Bondi. “They will face swift, severe, and comprehensive justice.”

    “While bribery and corruption have thrived under China’s Communist Party, this behavior cannot be tolerated with our service members who are entrusted with sensitive military information, including national defense information,” said FBI Director Kash Patel. “The FBI and our partners will continue to work to uncover attempts by those in China to steal sensitive U.S. military information and hold all accountable who play a role in betraying our national defense. The FBI would like to thank U.S. Army Counterintelligence for their close partnership during this investigation.”

    “We thank the FBI and U.S. Army Counterintelligence Command for their hard work on this investigation and commitment to protecting our national security,” said Acting U.S. Attorney William M. Narus for the District of Oregon.

    “These arrests underscore the persistent and increasing foreign intelligence threat facing our Army and nation,” said Brig. Gen. Rhett R. Cox, Commanding General, Army Counterintelligence Command. “Along with the Department of Justice and FBI, Army Counterintelligence Command will continue to work tirelessly to hold those accountable who irresponsibly and selfishly abandon the Army values and choose personal gain over duty to our nation. We remind all members of the Army team to increase their vigilance and protect our Army by reporting suspicious activity.”

    The indictment in the District of Oregon alleges that beginning on or about Nov. 28, 2021, and continuing to at least on or about Dec. 19, 2024, Duan and Tian along with others, known and unknown to the grand jury conspired with each other to surreptitiously gather sensitive military information related to the United States Army’s operational capabilities, including technical manuals and other sensitive information, and that Tian transmitted this information to Duan in return for money, in violation of his official duties as an active-duty U.S. Army officer. Specifically, Tian was tasked with gathering information related U.S. military weapon systems, including information related to the Bradley and Stryker U.S. Army fighting vehicles, and transmitting them to Duan.

    The indictment in the Western District of Washington alleges that beginning in or about July 2024, and continuing to the date of the arrest, Jian Zhao, an active-duty U.S. Army Supply Sergeant, conspired with others known and unknown to the grand jury to obtain and transmit national defense information to individuals based in China. Zhao is further alleged to have committed bribery and theft of government property.

    Specifically, Zhao was charged for his conspiracy to collect and transmit several classified hard drives, including hard drives marked “SECRET” and “TOP SECRET”, negotiating with individuals based in China for their sale, and agreeing to send the classified hard drives to the individuals in China. In exchange for the sale of the classified hard drives, Zhao received at least $10,000. Zhao is further alleged to have conspired to sell an encryption capable computer that was stolen from the U.S. Government, and sensitive U.S. military documents and information, including information related to the High Mobility Artillery Rocket System (HIMARS), and information related to U.S. military readiness in the event of a conflict with the People’s Republic of China. Zhao is alleged to have violated his duties as a U.S. Army Soldier and public official to protect sensitive military information in exchange for money. In total, Zhao is alleged to have corruptly received and accepted payments totaling at least $15,000.

    The FBI and the U.S. Army Counterintelligence Command investigated the case.

    Assistant U.S. Attorneys Geoffrey Barrow and Katherine Rykken for the District of Oregon and Trial Attorneys Christopher Cook and Yifei Zheng of the National Security Division’s Counterintelligence and Export Control Section are prosecuting the case.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: Lancaster man pleads guilty to receiving child pornography

    Source: Office of United States Attorneys

    BUFFALO, N.Y.-U.S. Attorney Michael DiGiacomo announced today that Alexander Grupp, 32, of Lancaster, NY, pleaded guilty before U.S. Magistrate Judge Michael J. Roemer to receipt of child pornography, which carries a mandatory minimum penalty of 15 years in prison and a maximum of 40 years.

    Assistant U.S. Attorney Franz M. Wright, who is handling the case, stated that in March 2018, Grupp was convicted in New York State Court of Possessing Obscene Sexual Performance by a Child less than sixteen years of age, and sentenced, in part, to 10 years’ probation. In October 2022, Grupp communicated with a 15-year-old girl using the instant messaging application, Discord. During these conversations, Grupp persuaded the victim to send him nude pictures of herself.

    The plea is the result of an investigation by the Federal Bureau of Investigation, under the direction of Special Agent-in-Charge Matthew Miraglia.

    Sentencing will be scheduled at a later date.

              # # # # 

    MIL Security OSI

  • MIL-OSI Security: Portland Couple Sentenced to Federal Prison for Stealing $34 Million from Former Client

    Source: Office of United States Attorneys

    A husband and wife from Portland, who together owned and operated a local chauffeur and limousine business, were sentenced to federal prison Wednesday for stealing $34 million dollars from two former clients.

    Sergey Lebedenko, 54, and Galina Lebedenko, 49, were both sentenced to 57 months in federal prison and three years’ supervised release. The sum of restitution they must pay to the victim will be determined at a later date.

    According to court documents, the Lebedenkos owned and operated a Portland area chauffeur and limousine businesses that eventually became Astra Car Service, LLC. Sergey did the driving, and Galina handled the company’s books and finances.

    The Lebedenkos met their victim in 2007 when Sergey was hired to drive the individual to the airport. The individual soon became a regular customer of the Lebedenkos. By 2018, Sergey was driving the individual almost daily in and around Portland, and Galina was performing other personal tasks for the victim and the victim’s partner including paying their bills, sorting their mail, and providing pet care. This expansive personal services arrangement between the Lebedenkos and their victim continued from approximately 2018 until 2023.

    Despite the volume and frequency of paid services the Lebedenkos provided, they never had a written business agreement or contract. In 2013, Galina produced an invoice showing hourly rates of $90 for driving and $60 for other services. In about 2016, after nearly a decade of working together, the victim gave the Lebedenkos his American Express credit card information so they could directly charge the card for their services.

    Other than the single invoice issued in 2013, the Lebedenkos never provided their victim with logs of their hours or information about how much they were charging for their services. For much of their work, only the Lebedenkos knew the amount of time they spent providing services. On rare occasions, Sergey was questioned by the victim about certain minimal charges and Sergey would repeatedly play up their longstanding, trusting relationship.

    The Lebedenkos stole approximately $34 million over seven years. On a single day in 2023, the Lebedenkos charged their victim’s credit card 17 times for a total of $17,900 for picking up and delivering a prescription and meals.

    The Lebedenkos used their ill-gotten gains to fund an extraordinarily extravagant lifestyle for themselves and others, purchasing 14 homes and properties, 7 vehicles, an ownership interest in a private jet, and countless luxury items including shoes, watches, wallets, jewelry, and gold bars. As part of their sentences, the court entered a Final Order of Forfeiture against assets the Lebedenkos purchased with proceeds of their fraud, including 14 real properties and 19 financial accounts, which are pending forfeiture and sale. The government intends to seek remission of forfeited assets to the victim.

    On January 22, 2024, the Lebedenkos were together charged by federal criminal complaint with committing wire fraud and money laundering. Later, on February 21, 2024, a federal grand jury in Portland returned an indictment charging the couple with conspiracy to commit wire fraud and money laundering, and 34 individual counts of wire fraud.

    On October 25, 2024, the Lebedenkos both pleaded guilty to one count of conspiracy to commit wire fraud, conspiracy to commit money laundering, and wire fraud.

    This case was investigated by the FBI and IRS Criminal Investigation. It was prosecuted by Meredith D.M. Bateman and Andrew T. Ho, Assistant U.S. Attorneys for the District of Oregon. Forfeiture proceedings are being handled by Assistant U.S. Attorney Katie C. de Villiers, also of the District of Oregon.

    MIL Security OSI