Case Name: United States v. In the Matter of the Search of United States Postal Service first class mail parcel addressed to Michael Gilhome, 4 Kylemore Court, Leopold VIC 3224, Australia (SUBJECT PARCEL 11)
Case Name: United States v. One Maritimo M70 yacht manufactured by Maritimo Offshore PTY Ltd. at Coomera QLD, Australia in 2016, named Dragon Pearl, measuring 70 feet 7 inches, weighing 92 gross tons, and registered in the Republic of the Marshall Islands, with a registratio
Case Name: United States v. In the Matter of the Search of United States Postal Service first class mail parcel addressed to Audree Clemence, PO Box 546, Arlie Beach QLD 4802, Australia (SUBJECT PARCEL 10)
Description: The fiscal year of the data file obtained from the AOUSC
Format: YYYY
Description: The code of the federal judicial circuit where the case was located
Format: A2
Description: The code of the federal judicial district where the case was located
Format: A2
Description: The code of the district office where the case was located
Format: A2
Description: Docket number assigned by the district to the case
Format: A7
Description: A unique number assigned to each defendant in a case which cannot be modified by the court
Format: A3
Description: A unique number assigned to each defendant in a case which can be modified by the court
Format: A3
Description: A sequential number indicating whether a case is an original proceeding or a reopen
Format: N5
Description: Case type associated with the current defendant record
Format: A2
Description: A concatenation of district, office, docket number, case type, defendant number, and reopen sequence number
Format: A18
Description: A concatenation of district, office, docket number, case type, and reopen sequence number
Format: A15
Description: The status of the defendant as assigned by the AOUSC
Format: A2
Description: A code indicating the fugitive status of a defendant
Format: A1
Description: The date upon which a defendant became a fugitive
Format: YYYYMMDD
Description: The date upon which a fugitive defendant was taken into custody
Format: YYYYMMDD
Description: The date when a case was first docketed in the district court
Format: YYYYMMDD
Description: The date upon which proceedings in a case commenced on charges pending in the district court where the defendant appeared, or the date of the defendant’s felony-waiver of indictment
Format: YYYYMMDD
Description: A code used to identify the nature of the proceeding
Format: N2
Description: The date when a defendant first appeared before a judicial officer in the district court where a charge was pending
Format: YYYYMMDD
Description: A code indicating the event by which a defendant appeared before a judicial officer in the district court where a charge was pending
Format: A2
Description: A code indicating the type of legal counsel assigned to a defendant
Format: N2
Description: The title and section of the U.S. Code applicable to the offense committed which carried the highest severity
Format: A20
Description: A code indicating the level of offense associated with FTITLE1
Format: N2
Description: The four digit AO offense code associated with FTITLE1
Format: A4
Description: The four digit D2 offense code associated with FTITLE1
Format: A4
Description: A code indicating the severity associated with FTITLE1
Format: A3
Description: The FIPS code used to indicate the county or parish where an offense was committed
Format: A5
Description: The date of the last action taken on the record
Format: YYYYMMDD
Description: The date upon which judicial proceedings before the court concluded
Format: YYYYMMDD
Description: The date upon which the final sentence is recorded on the docket
Format: YYYYMMDD
Description: The date upon which the case was closed
Format: YYYYMMDD
Description: The total fine imposed at sentencing for all offenses of which the defendant was convicted and a fine was imposed
Format: N8
Description: A count of defendants filed including inter-district transfers
Format: N1
Description: A count of defendants filed excluding inter-district transfers
Format: N1
Description: A count of original proceedings commenced
Format: N1
Description: A count of defendants filed whose proceedings commenced by reopen, remand, appeal, or retrial
Format: N1
Description: A count of defendants terminated including interdistrict transfers
Format: N1
Description: A count of defendants terminated excluding interdistrict transfers
Format: N1
Description: A count of original proceedings terminated
Format: N1
Description: A count of defendants terminated whose proceedings commenced by reopen, remand, appeal, or retrial
Format: N1
Description: A count of defendants pending as of the last day of the period including long term fugitives
Format: N1
Description: A count of defendants pending as of the last day of the period excluding long term fugitives
Format: N1
Description: The source from which the data were loaded into the AOUSC’s NewSTATS database
Format: A10
Description: A sequential number indicating the iteration of the defendant record
Format: N2
Description: The date the record was loaded into the AOUSC’s NewSTATS database
Format: YYYYMMDD
Description: Statistical year ID label on data file obtained from the AOUSC which represents termination year
HOUSTON – A 40-year-old associate of the Jalisco New Generation Cartel (CJNG) has pleaded guilty to drug trafficking and money laundering offenses, announced U.S. Attorney Alamdar H. Hamdani.
Mexican national Victor Miguel Curiel Valadez admitted to conspiring to launder monetary instruments, possession with intent to distribute meth and that he was an associate of the CJNG.
Members and associates of the CJNG hired Valadez to retrieve drug proceeds in the United States, Canada, Europe and Australia and move them back to Mexico.
From 2016 to 2019, Valadez recruited others in Chicago, Illinois; Atlanta, Georgia; Detroit, Michigan; Kansas City, Missouri, and other cities across the United States to pick up drug proceeds in the United States. Those individuals were in possession of drug proceeds that needed to be moved to Mexico. Valadez then coordinated the transfer of proceeds back to Mexico through financial institutions.
Valadez and co-conspirators laundered more than $1.5 million in drug proceeds during the course of the conspiracy.
He also admitted in February 2018 that he negotiated and coordinated the distribution of three kilograms of meth. He proceeded to direct a co-conspirator to deliver the meth to an individual in Houston.
“The CJNG is one of the most powerful and dangerous criminal organizations in Mexico, characterized by a business model of extreme violence and trafficking in the most deadly of substances - cocaine, heroin, meth and fentanyl - relying on money launderers and drug distributors, like Valadez, to wash its ill-gotten gains and infect local communities with drugs,” said Hamdani. “This prosecution should serve as a warning to the Mexican cartels of my office’s focus on dismantling and disrupting their operations, while holding to account anyone who seeks to help launder monies and deliver dangerous drugs that destroy our neighborhoods and communities.”
U.S. District Judge Keith P. Ellison has set sentencing for Nov. 20. At that time, Valadez faces up to life in federal prison and a possible $1o million maximum fine for the drug conviction. He also faces up to 20 years and a $500,000 maximum fine or twice the value of the property involved in the transaction, whichever is greater, for the money laundering conspiracy.
Homeland Security Investigations conducted investigation as part of the Organized Crime Drug Enforcement Task Forces (OCDETF) Strike Force Initiative with the assistance of the Drug Enforcement Administration and IRS Criminal Investigation. These such cooperative matters provide for the establishment of permanent multi-agency task force teams that work side-by-side in the same location. This co-located model enables agents from different agencies to collaborate on intelligence-driven, multi-jurisdictional operations to disrupt and dismantle the most significant drug traffickers, money launderers, gangs and transnational criminal organizations. The specific mission of the Houston Strike Force is to disrupt and dismantle the drug trafficking organizations that are designated as Consolidated Priority Organization or Regional Priority Organization Targets and that impact Houston and south Texas. Additional information about the OCDETF Program can be found on the Department of Justice’s OCDETF webpage.
Assistant U.S. Attorneys Anibal J. Alaniz and Casey N. MacDonald are prosecuting the case.
HOUSTON - An Indian national has entered a guilty plea for his role in operating and funding India-based call centers which defrauded thousands of victims out of millions of dollars between 2013 and 2016.
Hitesh Madhubhai Patel aka Hitesh Hinglaj, 43, of Ahmedabad, India, pleaded guilty to conspiracy to commit wire fraud as well as a general conspiracy to commit identification fraud, access device fraud, money laundering and to impersonate a federal officer or employee.
“Hitesh Patel played a prominent role in this massive, India-based fraud scheme that bilked vulnerable Americans out of millions of dollars,” said Assistant Attorney General Brian Benczkowski of the Justice Department’s Criminal Division. “This important resolution would not have occurred without the assistance of our Singaporean colleagues, to whom we extend our deep appreciation.”
Patel and his conspirators perpetrated a complex scheme in which employees from call centers in Ahmedabad, India, impersonated officials from the IRS and U.S. Citizenship and Immigration Services (USCIS). They also engaged in other telephone call scams designed to defraud victims throughout the United States. U.S. victims were threatened with arrest, imprisonment, fines or deportation if they did not pay alleged monies owed to the government. Those who fell victim to the scammers were instructed how to provide payment, including by purchasing general purpose reloadable (GPR) cards or wiring money. Upon payment, the call centers would immediately turn to a network of “runners” based in the United States to liquidate and launder the fraudulently-obtained funds.
In his plea, Patel admitted to operating and funding several India-based call centers from which the fraud schemes were perpetrated, including organizational co-defendant call center HGLOBAL. Patel frequently corresponded by email and WhatsApp messaging with co-defendants to exchange credit card numbers, telephone scam scripts, deposit slips, payment information, call center operations information, instructions and bank account information. The scripts included impersonation of IRS, USCIS, Canada Revenue Agency and Australian Tax Office personnel as well as payday loan, U.S. government grant and debt collection fraud schemes.
Patel also received monthly income and expense reports to his personal email from the call centers and used his Indian cell phone number to access GPR cards through automated telephone systems on many occasions.
A co-defendant described Patel as “the top person in India and the boss for whom most of the other defendants worked.” Another co-defendant claimed Patel was arrested in India in 2016, but paid a bribe and was released. Additionally, Patel admitted he was accountable for approximately $25-65 million.
Patel was extradited from Singapore in April 2019 to face charges in this large-scale telefraud and money laundering scheme. Singapore authorities apprehended Patel at the request of the United States pursuant to a provisional arrest warrant in September 2018 after Patel flew there from India.
U.S. District Judge David Hittner accepted the plea today and set sentencing for April 3. At that time, Patel faces up to 20 years in prison for the wire fraud conspiracy and five years for the general conspiracy. Both counts also carry the possibility of a fine of up $250,000 or twice the gross gain or loss from the offense.
A total of 24 domestic defendants associated with this transnational criminal scheme have already been convicted and sentenced to up to 20 years in prison in the Southern District of Texas, District of Arizona and Northern District of Georgia. They were also ordered to pay millions of dollars in victim restitution and money judgments and to forfeit seized assets. Some defendants were removed from the country based on their illegal immigration status, while another defendant had his U.S. citizenship revoked due to a separate conviction for immigration fraud. Charges remain pending for other India-based defendants. They are presumed innocent unless and until convicted through due process of law.
Immigration and Customs Enforcement’s Homeland Security Investigations (HSI), Department of Homeland Security – Office of Inspector General and Treasury Inspector General for Tax Administration conducted the investigation. The Department of Justice’s Office of International Affairs and HSI Singapore provided significant support in securing and coordinating Patel’s arrest and extradition, working in concert with their counterparts at the Singapore Attorney General’s-Chambers and the Singapore Police Force.
Assistant U.S. Attorneys Mark McIntyre and Craig Feazel of are prosecuting the case along with Trial Attorney Mona Sahaf of the Criminal Division’s Human Rights and Special Prosecutions Section and Amanda Wick of the Criminal Division’s Money Laundering and Asset Recovery Section.
HOUSTON – The 27-year-old Spring man convicted of providing material support to a designated foreign terrorist organization has been ordered to prison for 12 years following reversal of original sentence, announced Acting U.S. Attorney Jennifer B. Lowery.
Asher Abid Khan pleaded guilty Dec. 4, 2017, to providing material support to the Islamic State of Iraq and the Levant (ISIL) aka ISIS (the Islamic State of Iraq and al-Sham).
On June 25, 2018, U.S. District Judge Lynn H. Hughes downwardly departed from the U.S. Sentencing Guidelines and ordered Khan to serve a total of 18 months in prison. Following an appeal, the court resentenced him Dec. 23, 2019, again to serve the 18-month term of imprisonment. The government then again appealed to the U.S. Court of Appeals for the 5th Circuit, arguing the sentence was not reasonable for the severity of the offense committed.
That court granted to government’s appeal and ordered the judgment reversed and vacated, and the matter reassigned.
Today, U.S. District Judge Charles R. Eskridge sentenced Khan to 144 months in federal prison to be immediately followed by 15 years of supervised release. At the hearing, the court noted the strong condemnation by Congress regarding this conduct and that a young man died.
“Attempting to travel to wage violent jihad on behalf of ISIS is a serious act which deserves vigorous prosecution,” said Lowery. “The sentence imposed today accurately reflects the gravity of the crime for which Khan was convicted. We, along with the FBI’s Joint Terrorism Task Force, National Security Division and other partners, will continue to work to disrupt those trying to support foreign terrorist organizations here or abroad.”
“This outcome marks the culmination of a lengthy counterterrorism investigation highlighting FBI Houston’s steadfast dedication to our mission to fight all forms of terrorism,” said Acting Special Agent in Charge Richard A. Collodi of the FBI. “Khan pleaded guilty to material support of terrorism for recruiting and facilitating the travel of others to fight and die for ISIS overseas. Today’s sentence provides justice for Khan’s actions.”
The investigation began in 2014 when Khan and his friend, who was living in South Texas, devised a plan to travel to Turkey and then to Syria for the purpose of fighting on behalf of ISIS. Khan had been living with a relative in Australia. Prior to leaving for Turkey from there, Khan told Mohamed Zuhbi, a Turkish-based foreign terrorist fighter facilitator, that he wanted to join ISIS.
Khan provided instructions to his friend on travel and how to reach him once Khan arrived in Turkey. During this part of the planning phase, it was Khan - not his friend - who was in touch with Zuhbi. On Feb. 24, 2014, Khan and his friend met in Istanbul, Turkey. At that time, Khan gave his South Texas friend money, knowing he intended to travel to Syria and join and fight with ISIS.
Khan then departed from the Istanbul Airport in Turkey and returned to the United States after his family tricked him into coming home to Houston because of an alleged hospitalization of his mother.
As soon as Khan returned to the United States, he contacted Zuhbi with the purpose of introducing him to his friend so he could enter Syria and join ISIS as a fighter with Zuhbi’s help. Khan then provided to his friend a Turkish cell phone number for reaching Zuhbi. The following day, Khan’s friend sent an electronic message to Khan indicating he had “been delivered :),” by Zuhbi, but that he was not with ISIS yet. Over the next few months, the friend attended fighter training camps and stayed in touch with Zuhbi and Khan. During that time, Khan offered his friend money and instructed him to try to get to ISIS
On Aug. 11, 2014, the friend finally made it to ISIS with Khan and Zuhbi’s assistance. After September 2014, he had ceased all forms of communications. On Dec. 25, 2014, the friend’s mother received an electronic message explaining that her son had died while fighting.
Australian authorities are prosecuting Zuhbi where he is currently being detained.
Khan has been and will remain in custody pending transfer to a U.S. Bureau of Prisons facility to be determined in the near future.
The FBI’s Joint Terrorism Task Force conducted the investigation. Assistant U.S. Attorneys (AUSA) Carolyn Ferko and Alamdar Hamdani prosecuted the case with assistance of Trial Attorney Rebecca Magnone of NSD’s Counterterrorism Section. NSD Appellate Attorney Danielle Tarin and AUSA Anna Kalluri handled the appeal.
HOUSTON – A 56-year-old Houston resident has pleaded guilty to a scheme to fraudulently sell 50 million non-existent N95 facemasks to the Australian government, announced Acting U.S. Attorney Jennifer B. Lowery.
In early April 2020, Arael Doolittle attempted to sell 50 million 3M N95 respirator masks to the government of Australia. However, he actually did not possess them.
The Australian government was supposed to pay over $317 million for the masks, but authorities disrupted the transaction before it was completed.
U.S. District Judge Lynn N. Hughes accepted the plea and set sentencing for Oct. 25. At that time, Doolittle faces up tofive5 years in federal prison and a possible $250,000 maximum fine. He has been and will remain in custody pending that hearing.
The Secret Service conducted the investigation. Assistant U.S. Attorney Justin R. Martin prosecuted the case.
On May 17, the Attorney General established the COVID-19 Fraud Enforcement Task Force to marshal the resources of the Department of Justice in partnership with agencies across government to enhance efforts to combat and prevent pandemic-related fraud. The task force bolsters efforts to investigate and prosecute the most culpable domestic and international criminal actors and assists agencies tasked with administering relief programs to prevent fraud by, among other methods, augmenting and incorporating existing coordination mechanisms, identifying resources and techniques to uncover fraudulent actors and their schemes and sharing and harnessing information and insights gained from prior enforcement efforts. For more information on the Department’s response to the pandemic - https://www.justice.gov/coronavirus.
Anyone with information about allegations of attempted fraud involving COVID-19 can report it by calling the Department of Justice’s National Center for Disaster Fraud (NCDF) Hotline at 866-720-5721 or via the NCDF Web Complaint Form.
HOUSTON – A 56-year-old Houston resident has been ordered to federal prison for scheming to fraudulently sell 50 million non-existent N95 facemasks to the Australian government, announced U.S. Attorney Jennifer B. Lowery.
Arael Doolittle pleaded guilty July 27, 2021.
Today, U.S. District Judge Lynn N. Hughes ordered him to serve a 54-month sentence. At the hearing, the court heard additional evidence that Doolittle had stolen another person’s identity and forged their signature during the commission of the offense. In handing down the sentence, Judge Hughes noted even though there was no actual financial loss in this case, there are still costs associated with cases like this that victims of frauds suffer.
In early April 2020, Doolittle attempted to sell 50 million 3M N95 respirator masks to the government of Australia. However, he actually did not possess them.
The Australian government was supposed to pay over $317 million for the masks, but authorities disrupted the transaction before it was completed.
Doolittle was also charged and convicted in a separate case for conspiracy to commit wire fraud. In that scheme, he solicited victims to invest in a petroleum trading company. However, Doolittle did not invest their money as promised. He actually used the funds to finance unrelated business and personal expenses. Doolittle defrauded the victims of this petroleum trading scheme out of a total of $1,935,613.95. He was previously ordered to serve a 54-month sentence.
The two sentences are ordered to be served consecutively, resulting in a total of 108 months in prison.
Doolittle has been and will remain in custody pending transfer to a U.S. Bureau of Prisons facility to be determined in the near future.
The Secret Service conducted the investigation of the fraudulent N95 masks. Assistant U.S. Attorney Justin R. Martin prosecuted the case. The FBI investigated the petroleum investment scheme.
On May 17, the Attorney General established the COVID-19 Fraud Enforcement Task Force to marshal the resources of the Department of Justice in partnership with agencies across government to enhance efforts to combat and prevent pandemic-related fraud. The task force bolsters efforts to investigate and prosecute the most culpable domestic and international criminal actors and assists agencies tasked with administering relief programs to prevent fraud by, among other methods, augmenting and incorporating existing coordination mechanisms, identifying resources and techniques to uncover fraudulent actors and their schemes and sharing and harnessing information and insights gained from prior enforcement efforts. For more information on the Department’s response to the pandemic - https://www.justice.gov/coronavirus.
Anyone with information about allegations of attempted fraud involving COVID-19 can report it by calling the Department of Justice’s National Center for Disaster Fraud (NCDF) Hotline at 866-720-5721 or via the NCDF Web Complaint Form
CORPUS CHRISTI, Texas – A 19-year-old Corpus Christi resident has admitted to distribution of child pornography, announced U.S. Attorney Nicholas J. Ganjei.The investigation began in December 2023, when Angel Valdez left a comment on a social media page supporting the work of an individual who had recently been sentenced to prison in Australia for animal cruelty.Australian law enforcement investigated further and began conversations with Valdez in an undercover capacity. In those communications, Valdez spoke about his interest in animal cruelty which later developed into child sexual abuse material (CSAM).On Feb. 14, 2024, Valdez sent a video depicting CSAM which included a video of a nude prepubescent girl and a nude adult female wearing a mask. The depiction showed the young child being forced to perform oral sex on the adult female.Law enforcement executed a search warrant June 28, 2024, which resulted in the discovery of a laptop containing CSAM. Valdez also admitted he had participated in the online conversation and to distributing the CSAM.U.S. District Judge Nelva Gonzales Ramos will impose sentencing Aug. 12. At the time, Valdez faces up to 20 years in federal prison and a possible $250,000 maximum fine.He has been and will remain in custody pending that hearing.Immigration and Customs Enforcement - Homeland Security Investigations and Corpus Christi Police Department conducted the investigation with the assistance of authorities in Australia.Assistant U.S. Attorney Patrick Overman is prosecuting the case, which was brought as part of Project Safe Childhood (PSC), a nationwide initiative the Department of Justice (DOJ) launched in May 2006 to combat the growing epidemic of child sexual exploitation and abuse. U.S. Attorneys' Offices and the Criminal Division's Child Exploitation and Obscenity Section leads PSC, which marshals federal, state and local resources to locate, apprehend and prosecute individuals who sexually exploit children and identifies and rescues victims. For more information about PSC, please visit DOJ’s PSC page. For more information about internet safety education, please visit the resources tab on that page.
HOUSTON – A total of 11 men from the countries of Tanzania, Pakistan and Iran have been ordered to federal prison for their part in trafficking multiple kilograms of heroin to the United States from abroad, announced U.S. Attorney Ryan K. Patrick.
Ali Khatib Haji Hassan, 49, Makame Haji Mwinyi, 49, Ernest Michael Mbwile, 35, Abdulahtif Juma Maalim, 43, Ibrahim Omary Madega, 52, Tiko Emanuel Adam, 41, Iddy Saleme Mfullu, 46, Mohammed Said Mohammed, 48, Daud Michael Vedasto, 58, all from Tanzania, previously pleaded guilty as did Salim Omar Balouch, 36, from Iran, and Abdul Basit Jahangir, 40, from Karachi, Pakistan.
On Aug. 7, 2019, U.S. District Judge Sim Lake completed two days of hearings and ordered them all to federal prison.
Jahangir received a 151-month term of imprisonment. Mfullu and Mohammed both received terms of 50 months, while Hassan, Mwinyi, Mbwile, Maalim, Madega, Adam and Vedasto, were ordered to serve 99, 62, 52, 46, 87, 37 and 46 months, respectively. The court imposed a 135-month sentence for Balouch. Not U.S. citizens, they are all expected to face deportation proceedings following their sentences.
This case began with the arrest of an internal body carrier at Houston’s Bush Intercontinental Airport June 3, 2012. That defendant had swallowed 1.5 kilograms of heroin packaged in 100 pellets.
The investigation eventually led to the charging of 15 defendants, including two Consolidated Priority Organization Targets, one U.S. Treasury Department designated “King Pin” and seizures of approximately 1,600 kilograms of heroin.
This investigation not only touched the United States, but also Canada, Afghanistan, Pakistan, Iran, South Africa, Tanzania, The Republic of Seychelles, Hong Kong, Australia, Oman, United Kingdom (UK), Italy, Brazil, United Arab Emirates, South Korea, Mozambique, The Netherlands and Saudi Arabia.
Thirteen have pleaded guilty. Two remain fugitives.
Immigration and Customs Enforcement’s Homeland Security Investigations (HSI) conducted the Organized Crime Drug Enforcement Task Force Investigation dubbed Operation Diver Down with assistance from other HSI offices domestic and foreign, Drug Enforcement Administration, South African Police Service, Dubai Police Department, Royal Oman Police, UK National Crime Agency, Royal Canadian Mounted Police and Australian Federal Police.
Assistant U.S. Attorney Richard Magness is prosecuting the case.
HOUSTON – Asher Abid Khan, 23, of Spring, pleaded guilty today to providing material support to the Islamic State of Iraq and al-Sham (ISIS), a designated foreign terrorist organization.
Acting U.S. Attorney Abe Martinez, Acting Assistant Attorney General for National Security Dana J. Boente and Special Agent in Charge Perrye K. Turner of the FBI’s Houston Field Office made the announcement.
“We aggressively investigate and prosecute persons who provide material support to terrorist organization like ISIS,” said Martinez. “Khan provided ISIS a battlefield soldier to further the terrorist organization’s violent agenda. Khan’s guilty plea is indicative of the priority this office has placed on those who would give aid and comfort to terrorists operating in the United States and abroad. ”
The investigation began in 2014 when Khan and his friend, who was living in South Texas, devised a plan to travel to Turkey and then to Syria for the purpose of fighting on behalf of ISIS. Khan had been living with a relative in Australia. Prior to leaving for Turkey from there, Khan told Mohamed Zuhbi, a Turkish-based foreign terrorist fighter facilitator, that he wanted to join ISIS.
Khan provided instructions to his friend on travel and how to reach him once Khan arrived in Turkey. During this part of the planning phase, it was Khan - not his friend - who was in touch with Zuhbi. On Feb. 24, 2014, Khan and his friend met in Istanbul, Turkey. At that time, Khan gave his South Texas friend money, knowing he intended to travel to Syria and join and fight with ISIS.
Khan then departed from the Istanbul Airport in Turkey and returned to the United States after his family tricked him into coming home to Houston because of an alleged hospitalization of his mother.
As soon as Khan returned to the U.S., he contacted Zuhbi with the purpose of introducing him to his friend so he could enter Syria and join ISIS as a fighter with Zuhbi’s help. Khan then provided to his friend a Turkish cell phone number for reaching Zuhbi. The following day, Khan’s friend sent an electronic message to Khan indicating he had “been delivered :),” by Zuhbi, but that he was not with ISIS yet. Over the next few months, the friend attended fighter training camps and stayed in touch with Zuhbi and Khan. During that time, Khan offered his friend money and instructed him to try to get to ISIS.
On Aug. 11, 2014, the friend finally made it to ISIS with Khan and Zuhbi’s assistance. After September 2014, he had ceased all forms of communications. On Dec. 25, 2014, the friend’s mother received an electronic message explaining that her son had died while fighting.
Zuhbi is still at large and is believed to be residing in either Turkey or Syria. There are pending criminal charges in the Southern District of Texas against Zubhi. Anyone with information about his whereabouts is asked to contact the FBI at 713-693-5000.
U.S. District Judge Lynn N. Hughes accepted the guilty plea today and has sentencing for March 5, 2018, at 1:30pm. At that time, Khan faces up to 15 years in federal prison and a maximum fine of $250,000. The maximum statutory sentence is prescribed by Congress and is provided here for informational purposes. If convicted of any offense, the sentencing of the defendant will be determined by the court based on the advisory Sentencing Guidelines and other statutory factors.
The FBI’s Joint Terrorism Task Force conducted the investigations. Assistant U.S. Attorneys Carolyn Ferko, Alamdar Hamdani and Steve Mellin of the Southern District of Texas are prosecuting the case along with the Counterterrorism Section of the Justice Department’s National Security Division.
An indictment was unsealed today charging an attorney with evading taxes on approximately $1 million of income, as well as filing false tax returns and making false statements to federal authorities. Richard Graham Foote O’Donoghue previously lived in Washington, D.C., but currently lives in the United Kingdom. He was arrested on entering the United States on May 9, based on the criminal charges.The following is according to the indictment: from 2012 through 2015, O’Donoghue made substantial income first as an independent contractor for several non-U.S. businesses, including a defense contractor based out of Dubai, United Arab Emirates, and then as CEO of that contractor. While he was CEO, O’Donoghue also allegedly received significant bonuses and benefits including a car and driver and a rented luxury villa for his family.According to the indictment, O’Donoghue did not timely file tax returns for tax years 2012 through 2014. In 2016, however, O’Donoghue hired a return preparer to prepare tax returns for 2012 through tax year 2015. O’Donoghue allegedly provided false information to his return preparer about his employment and income. For example, O’Donoghue allegedly told the return preparer that he was the general manager of the company, not the CEO, and concealed his bonuses and the expenses the company paid on his behalf. These lies allegedly caused the return preparer to prepare and file false tax returns for those years that underreported his income by approximately $1 million. Because O’Donoghue had previously made estimated payments, his false returns allegedly requested refunds from the IRS of more than $247,000 — much of which the IRS paid out.The indictment further alleges that in February 2023, O’Donoghue made false statements about his income and other matters to law enforcement agents and Department of Justice prosecutors.If convicted, O’Donoghue faces a maximum penalty of five years in prison for each tax evasion count, a maximum penalty of three years in prison for each count of subscribing to a false tax return, and a maximum penalty of five years in prison for the false statements count. O’Donoghue also faces a period of supervised release, restitution, and monetary penalties. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.Acting Deputy Assistant Attorney General Karen E. Kelly of the Justice Department’s Tax Division and U.S. Attorney Edward R. Martin Jr. for the District of Columbia made the announcement.IRS Criminal Investigation and the Special Inspector General for Afghanistan Reconstruction are investigating the case, with assistance from His Majesty’s Revenue & Customs of the United Kingdom. Assistance was also provided by the Joint Chiefs of Global Tax Enforcement (J5), which brings together the taxing authorities of Australia, Canada, the Netherlands, the United Kingdom, and the United States.Assistant Chief Sarah Ranney and Trial Attorney Ezra Spiro of the Tax Division and Assistant U.S. Attorney Joshua Gold for the District of Columbia are prosecuting the case.An indictment is merely an allegation. All defendants are presumed innocent unless and until proven guilty beyond a reasonable doubt in a court of law.
HOUSTON - The former CEO and chief operations officer (COO) of a Monaco-based intermediary company have pleaded guilty for their roles in a scheme to corruptly facilitate millions of dollars in bribe payments to officials in multiple countries. These included Algeria, Angola, Azerbaijan, the Democratic Republic of Congo, Iran, Iraq, Kazakhstan, Libya and Syria. The company’s former business development director also pleaded guilty for his role in paying bribes in Libya.
Cyrus Ahsani, 51, and Saman Ahsani, 46, both of United Kingdom (UK), each pleaded guilty March 25 to one count of conspiracy to violate the Foreign Corrupt Practices Act (FCPA), Conspiring to facilitate bribes on behalf of companies in foreign countries in order to secure oil and gas contracts. UK resident Steven Hunter, 50, former business development director, pleaded guilty Aug. 2, 2018, to one count of conspiracy to violate the FCPA. Cyrus and Saman Ahsani are set for sentencing April 20, 2020, before U.S. District Judge Vanessa Gilmore of the Southern District of Texas. Hunter’s sentencing is scheduled for March 13, 2020, before U.S. District Judge David Hittner.
According to court documents, former U.S. resident and CEO Cyrus Ahsani and former COO Saman Ahsani managed a Monaco-based intermediary company that provided services for multinational companies operating in the energy sector. From approximately 1999 to 2016, the Ahsanis conspired with others, including multiple companies and individuals, to make millions of dollars in bribe payments to government officials in Algeria, Angola, Azerbaijan, the Democratic Republic of Congo, Iran, Iraq, Kazakhstan, Libya and Syria.
Additionally, court documents reflect Cyrus and Saman Ahsani laundered the proceeds of their bribery scheme in order to promote and conceal the schemes and to cause the destruction of evidence in order to obstruct investigations in the United States and elsewhere. Hunter participated in the conspiracy to violate the FCPA by, among other things, facilitating bribe payments to Libyan officials between about 2009 and 2015.
The FBI, IRS-Criminal Investigation and U.S. Postal Inspection Service con ducted the investigation. Trial Attorneys Dennis R. Kihm, Gerald M. Moody Jr., Jonathan P. Robell and Gwendolyn A. Stamper of the Criminal Division’s Fraud Section and Assistant U.S. Attorney Suzanne Elmilady of the Southern District of Texas are prosecuting the case. The Criminal Division’s Office of International Affairs also provided substantial assistance in this matter.
The governments of Australia, Canada, France, Guernsey, Italy, Monaco, the Netherlands, Portugal, Switzerland and UK provided significant assistance in this matter as did the U.S. Securities and Exchange Commission and Eurojust.
The Fraud Section is responsible for investigating and prosecuting all FCPA matters. Additional information about the Justice Department’s FCPA enforcement efforts can be found at www.justice.gov/criminal-fraud/foreign-corrupt-practices-act.
Description: The fiscal year of the data file obtained from the AOUSC
Format: YYYY
Description: The code of the federal judicial circuit where the case was located
Format: A2
Description: The code of the federal judicial district where the case was located
Format: A2
Description: The code of the district office where the case was located
Format: A2
Description: Docket number assigned by the district to the case
Format: A7
Description: A unique number assigned to each defendant in a case which cannot be modified by the court
Format: A3
Description: A unique number assigned to each defendant in a case which can be modified by the court
Format: A3
Description: A sequential number indicating whether a case is an original proceeding or a reopen
Format: N5
Description: Case type associated with the current defendant record
Format: A2
Description: A concatenation of district, office, docket number, case type, defendant number, and reopen sequence number
Format: A18
Description: A concatenation of district, office, docket number, case type, and reopen sequence number
Format: A15
Description: The status of the defendant as assigned by the AOUSC
Format: A2
Description: A code indicating the fugitive status of a defendant
Format: A1
Description: The date upon which a defendant became a fugitive
Format: YYYYMMDD
Description: The date upon which a fugitive defendant was taken into custody
Format: YYYYMMDD
Description: The date when a case was first docketed in the district court
Format: YYYYMMDD
Description: The date upon which proceedings in a case commenced on charges pending in the district court where the defendant appeared, or the date of the defendant’s felony-waiver of indictment
Format: YYYYMMDD
Description: A code used to identify the nature of the proceeding
Format: N2
Description: The date when a defendant first appeared before a judicial officer in the district court where a charge was pending
Format: YYYYMMDD
Description: A code indicating the type of legal counsel assigned to a defendant
Format: N2
Description: The title and section of the U.S. Code applicable to the offense committed which carried the highest severity
Format: A20
Description: A code indicating the level of offense associated with FTITLE1
Format: N2
Description: The four digit AO offense code associated with FTITLE1
Format: A4
Description: The four digit D2 offense code associated with FTITLE1
Format: A4
Description: A code indicating the severity associated with FTITLE1
Format: A3
Description: The FIPS code used to indicate the county or parish where an offense was committed
Format: A5
Description: The date of the last action taken on the record
Format: YYYYMMDD
Description: The date upon which judicial proceedings before the court concluded
Format: YYYYMMDD
Description: The date upon which the final sentence is recorded on the docket
Format: YYYYMMDD
Description: The date upon which the case was closed
Format: YYYYMMDD
Description: The total fine imposed at sentencing for all offenses of which the defendant was convicted and a fine was imposed
Format: N8
Description: A count of defendants filed including inter-district transfers
Format: N1
Description: A count of defendants filed excluding inter-district transfers
Format: N1
Description: A count of original proceedings commenced
Format: N1
Description: A count of defendants filed whose proceedings commenced by reopen, remand, appeal, or retrial
Format: N1
Description: A count of defendants terminated including interdistrict transfers
Format: N1
Description: A count of defendants terminated excluding interdistrict transfers
Format: N1
Description: A count of original proceedings terminated
Format: N1
Description: A count of defendants terminated whose proceedings commenced by reopen, remand, appeal, or retrial
Format: N1
Description: A count of defendants pending as of the last day of the period including long term fugitives
Format: N1
Description: A count of defendants pending as of the last day of the period excluding long term fugitives
Format: N1
Description: The source from which the data were loaded into the AOUSC’s NewSTATS database
Format: A10
Description: A sequential number indicating the iteration of the defendant record
Format: N2
Description: The date the record was loaded into the AOUSC’s NewSTATS database
Format: YYYYMMDD
Description: Statistical year ID label on data file obtained from the AOUSC which represents termination year
Description: The fiscal year of the data file obtained from the AOUSC
Format: YYYY
Description: The code of the federal judicial circuit where the case was located
Format: A2
Description: The code of the federal judicial district where the case was located
Format: A2
Description: The code of the district office where the case was located
Format: A2
Description: Docket number assigned by the district to the case
Format: A7
Description: A unique number assigned to each defendant in a case which cannot be modified by the court
Format: A3
Description: A unique number assigned to each defendant in a case which can be modified by the court
Format: A3
Description: A sequential number indicating whether a case is an original proceeding or a reopen
Format: N5
Description: Case type associated with the current defendant record
Format: A2
Description: Case type associated with a magistrate case if the current case was merged from a magistrate case
Format: A2
Description: A concatenation of district, office, docket number, case type, defendant number, and reopen sequence number
Format: A18
Description: A concatenation of district, office, docket number, case type, and reopen sequence number
Format: A15
Description: The docket number originally given to a case assigned to a magistrate judge and subsequently merged into a criminal case
Format: A7
Description: A unique number assigned to each defendant in a magistrate case
Format: A3
Description: The status of the defendant as assigned by the AOUSC
Format: A2
Description: A code indicating the fugitive status of a defendant
Format: A1
Description: The date upon which a defendant became a fugitive
Format: YYYYMMDD
Description: The date upon which a fugitive defendant was taken into custody
Format: YYYYMMDD
Description: The date when a case was first docketed in the district court
Format: YYYYMMDD
Description: The date upon which proceedings in a case commenced on charges pending in the district court where the defendant appeared, or the date of the defendant’s felony-waiver of indictment
Format: YYYYMMDD
Description: A code used to identify the nature of the proceeding
Format: N2
Description: The date when a defendant first appeared before a judicial officer in the district court where a charge was pending
Format: YYYYMMDD
Description: A code indicating the event by which a defendant appeared before a judicial officer in the district court where a charge was pending
Format: A2
Description: A code indicating the type of legal counsel assigned to a defendant
Format: N2
Description: The title and section of the U.S. Code applicable to the offense committed which carried the highest severity
Format: A20
Description: A code indicating the level of offense associated with FTITLE1
Format: N2
Description: The four digit AO offense code associated with FTITLE1
Format: A4
Description: The four digit D2 offense code associated with FTITLE1
Format: A4
Description: A code indicating the severity associated with FTITLE1
Format: A3
Description: The FIPS code used to indicate the county or parish where an offense was committed
Format: A5
Description: The date of the last action taken on the record
Format: YYYYMMDD
Description: The date upon which judicial proceedings before the court concluded
Format: YYYYMMDD
Description: The date upon which the final sentence is recorded on the docket
Format: YYYYMMDD
Description: The date upon which the case was closed
Format: YYYYMMDD
Description: The total fine imposed at sentencing for all offenses of which the defendant was convicted and a fine was imposed
Format: N8
Description: A count of defendants filed including inter-district transfers
Format: N1
Description: A count of defendants filed excluding inter-district transfers
Format: N1
Description: A count of original proceedings commenced
Format: N1
Description: A count of defendants filed whose proceedings commenced by reopen, remand, appeal, or retrial
Format: N1
Description: A count of defendants terminated including interdistrict transfers
Format: N1
Description: A count of defendants terminated excluding interdistrict transfers
Format: N1
Description: A count of original proceedings terminated
Format: N1
Description: A count of defendants terminated whose proceedings commenced by reopen, remand, appeal, or retrial
Format: N1
Description: A count of defendants pending as of the last day of the period including long term fugitives
Format: N1
Description: A count of defendants pending as of the last day of the period excluding long term fugitives
Format: N1
Description: The source from which the data were loaded into the AOUSC’s NewSTATS database
Format: A10
Description: A sequential number indicating the iteration of the defendant record
Format: N2
Description: The date the record was loaded into the AOUSC’s NewSTATS database
Format: YYYYMMDD
Description: Statistical year ID label on data file obtained from the AOUSC which represents termination year
CORPUS CHRISTI, Texas - A 40-year-old Corpus Christi man has admitted he possessed child pornography, announced U.S. Ryan K. Patrick.
In March 2017, Queensland Police Services in Australia identified a computer discussing child pornography on an Internet website. That computer was later linked to Timothy Traut who was using a profile name of “Horndog.” Traut had posted pictures to that website and made comments about the desire to have sexual intercourse with a child pictured in some of those images.
Agents later executed a search warrant at his residence, at which time they seized various electronic devices. Forensic analysis on those devices revealed more than 850 images and approximately 104 videos child pornography. Many of those videos included images of sexually explicit conduct involving prepubescent girls.
Today, Traut admitted he reviewed and collected child pornography.
U.S. District Judge Nelva Gonzalez Ramos accepted the guilty plea today and set sentencing for May 2, 2018. At that time, Traut faces up to 20 years in federal prison and a possible $250,000 maximum fine. Upon completion of any prison term imposed, Traut also faces a maximum of life on supervised release during which time the court can impose a number of special conditions designed to protect children and prohibit the use of the Internet.
Traut has been and will remain in custody pending his sentencing hearing.
Immigration and Customs Enforcement’s Homeland Security Investigations conducted the investigation with the assistance of the Corpus Christi Police Department’s Internet Crimes Against Children Task Force.
Assistant U.S. Attorney Hugo R. Martinez is prosecuting the case, which was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorneys' Offices and the Criminal Division's Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state and local resources to locate, apprehend and prosecute individuals who sexually exploit children, and to identify and rescue victims. For more information about Project Safe Childhood, please visit www.usdoj.gov/psc. For more information about internet safety education, please visit www.usdoj.gov/psc and click on the tab "resources."
CORPUS CHRISTI, Texas - A 41-year-old Corpus Christi man has been sent to federal prison following his conviction of possessing child pornography, announced U.S. Ryan K. Patrick. Timothy Traut pleaded guilty Feb, 1, 2018.
Today, U.S. District Judge Nelva Gonzalez Ramos sentenced Traut to 120 months in prison. At the hearing, the court heard that Traut possessed images of children he knew and that he superimposed the children’s faces to images of child pornography. The court also read two letters from the parents of those children explaining how the crime impacted their lives.
Traut was further ordered to serve 15 years on supervised release following completion of his prison term, during which time he will have to comply with numerous requirements designed to restrict his access to children and the internet. He will also be ordered to register as a sex offender.
In March 2017, Queensland Police Services in Australia identified a computer discussing child pornography on an internet website. That computer was later linked to Traut who was using a profile name of “Horndog.” Traut had posted pictures to that website and made comments about the desire to have sexual intercourse with a child pictured in some of those images.
Agents later executed a search warrant at his residence, at which time they seized various electronic devices. Forensic analysis on those devices revealed more than 850 images and approximately 104 videos child pornography. Many of those videos included images of sexually explicit conduct involving prepubescent girls.
Traut has been and will remain in custody pending transfer to a U.S. Bureau of Prisons facility to be determined in the near future.
Immigration and Customs Enforcement’s Homeland Security Investigations conducted the investigation with the assistance of the Corpus Christi Police Department’s Internet Crimes Against Children Task Force.
Assistant U.S. Attorney Hugo R. Martinez is prosecuting the case, which was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorneys' Offices and the Criminal Division's Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state and local resources to locate, apprehend and prosecute individuals who sexually exploit children, and to identify and rescue victims. For more information about Project Safe Childhood, please visit www.usdoj.gov/psc. For more information about internet safety education, please visit www.usdoj.gov/psc and click on the tab "resources."
HOUSTON - An Indian national was sentenced to 20 years in prison for his role in operating and funding India-based call centers that defrauded U.S. victims out of millions of dollars between 2013 and 2016.
U.S. District Judge David Hittner sentenced Hitesh Madhubhai Patel aka Hitesh Hinglaj, 44, of Ahmedabad, India, for wire fraud conspiracy and general conspiracy to commit identification fraud, access device fraud, money laundering and impersonation of a federal officer or employee. Patel was also ordered to pay restitution of $8,970,396 to identified victims of his crimes.
“The long arm of federal law enforcement was key to bringing this con artist to justice,” said U.S. Attorney Ryan K. Patrick of the Southern District of Texas. “Transnational call center scams are complex cases to investigate and prosecute but our agencies are up to the task. Many of these fraudsters prey on the most vulnerable from the perceived safety of foreign lands so there is no sorry in seeing him head to prison. His access to a phone is now greatly diminished. Across the globe, U.S. law enforcement is chasing and dismantling these schemes.”
“The defendant defrauded vulnerable U.S. victims out of tens of millions of dollars by spearheading a conspiracy whose members boldly impersonated federal government officials and preyed on victims’ fears of adverse government action,” said Acting Attorney General Brian C. Rabbitt of the Justice Department’s Criminal Division. “Today’s sentence demonstrates the department’s commitment to prosecuting high-level perpetrators of such nefarious schemes. Even fraudsters operating scams from beyond our borders are not beyond the reach of the U.S. judicial system.”
According to admissions in his plea agreement, Patel and his co-conspirators perpetrated a complex scheme in which employees from call centers in Ahmedabad, India, impersonated officials from the IRS and U.S. Citizenship and Immigration Services (USCIS) and engaged in other telephone call scams designed to defraud victims throughout the United States. U.S. victims were threatened with arrest, imprisonment, fines or deportation if they did not pay alleged monies owed to the government. Those who fell victim were instructed how to provide payment, including by purchasing general purpose reloadable (GPR) cards or wiring money. Upon payment, the call centers would immediately turn to a network of “runners” based in the United States to liquidate and launder the fraudulently obtained funds.
In his plea, Patel admitted to operating and funding several India-based call centers from which the fraud schemes were perpetrated, including the call center HGLOBAL. Patel corresponded by email and WhatsApp messaging frequently with his co-defendants to exchange credit card numbers, telephone scam scripts and call center operations instructions. The scripts included IRS impersonation, USCIS impersonation, Canada Revenue Agency impersonation, Australian Tax Office impersonation, payday loan fraud, U.S. Government grant fraud and debt collection fraud.
A co-defendant described Patel as “the top person in India and the boss for whom most of the other defendants worked,” and the owner of multiple call centers. Another stated Patel was arrested in India in 2016, but then paid a bribe and was released. Additionally, Patel admitted that a reasonably foreseeable loss of more than $25 million but less than $65 million was attributable to him, based on the government’s evidence against him.
Patel was prosecuted in the United States after being extradited from Singapore in April 2019 to face charges in this large-scale telefraud and money laundering scheme. Singapore authorities apprehended Patel at the request of the United States pursuant to a provisional arrest warrant in September 2018 after Patel flew there from India.
“For years, this individual preyed on the fears of his victims to perpetuate a global scheme to manipulate U.S. institutions and taxpayers,” said Special Agent in Charge Mark B. Dawson of Immigration and Customs Enforcement’s Homeland Security Investigations (HSI). “Working with our law enforcement partners around the globe we have successfully executed the first ever large-scale, multi-jurisdictional investigation and prosecution targeting the India call center scam industry to hold him accountable for his illegal acts and deter similar scams in the future.”
“Since 2013, American taxpayers have been subjected to unprecedented attempts to fraudulently obtain money by individuals utilizing Indian call centers to impersonate IRS employees and scam American taxpayers,” said J. Russell George, the Treasury Inspector General for Tax Administration (TIGTA). “We appreciate the support of our law enforcement partners.”
“The sentence imposed today provides a clear deterrent to those who would seek to enrich themselves by extorting the most vulnerable in our society through these types of scams,” said Special Agent in Charge David Green of the Department of Homeland Security Office of Inspector General (DHS-OIG). “These foreign call center operators and their U.S. based affiliates should know that their actions carry real life consequences, both for their victims and for themselves, and that there are dedicated agents and prosecutors who will work tirelessly to identify them, find them and hold them accountable for their crimes.”
The indictment in this case, which was unsealed in October 2016, charged Patel and 60 other individuals and entities with general conspiracy, wire fraud conspiracy and money laundering conspiracy. A total of 24 domestic defendants associated with this transnational criminal scheme were previously convicted and sentenced to terms of imprisonment of up to 20 years in the Southern District of Texas, District of Arizona and Northern District of Georgia. The defendants were also ordered to pay millions of dollars in victim restitution and money judgments and to forfeit seized assets. Some defendants were ordered to be removed based on their illegal immigration status, with another defendant having his U.S. citizenship revoked due to a separate conviction for immigration fraud. Charges remain pending for other India-based defendants. They are presumed innocent unless and until convicted through due process of law.
HSI, DHS-OIG and TIGTA led the investigation of this case. The Justice Department’s Office of International Affairs and HSI Singapore provided significant support in securing and coordinating Patel’s arrest and extradition, working in concert with their counterparts at the Singapore Attorney General’s-Chambers and the Singapore Police Force.
Also providing significant support during the course of the investigation and prosecutions related to this scheme were the Ft. Bend County Sheriff’s Office; police departments in Hoffman Estates and Naperville, Illinois, and Leonia, New Jersey; San Diego County District Attorney’s Office Family Protection/Elder Abuse Unit; Secret Service; Small Business Administration - Office of Inspector General; IOC-2; INTERPOL Washington; USCIS; State Department’s Diplomatic Security Service; and the U.S. Attorney’s Offices of the Northern District of Alabama, District of Arizona, Central and Northern Districts of California, District of Colorado, Northern and Middle Districts of Florida, Northern District of Georgia, Northern District of Illinois, Northern District of Indiana, Eastern District of Louisiana, District of Nevada and the District of New Jersey. The Federal Communications Commission’s Enforcement Bureau provided assistance in TIGTA’s investigation. Additionally, the Executive Office for U.S. Attorneys, Legal and Victim Programs provided significant support to the prosecution.
Assistant U.S. Attorneys Mark McIntyre and Craig Feazel of the Southern District of Texas prosecuted the case along with Trial Attorney Mona Sahaf of the Criminal Division’s Human Rights and Special Prosecutions Section (HRSP), former Trial Attorney Amanda S. Wick of the Criminal Division’s Money Laundering and Asset Recovery Section. Kaitlin Gonzalez of HRSP was the paralegal for this case.
A Department of Justice website has been established to provide information about the case to already identified and potential victims and the public. Anyone who believes they may be a victim of fraud or identity theft in relation to this investigation or other telefraud scam phone calls may contact the FTC via this website.
The year 2020 marks the 150th anniversary of the Department of Justice. Learn more about the history of our agency at www.Justice.gov/Celebrating150Years
WASHINGTON – A 14-count indictment has been unsealed today in San Antonio, Texas, charging five individuals with coordinating an identify-theft and fraud scheme targeting servicemembers and veterans. The charged defendants, who were based both in the Philippines and the United States, are alleged to have used the stolen personal identifying information (PII) of thousands of military members to access Department of Defense and Veterans Affairs benefits sites and steal millions of dollars.
The defendants, Robert Wayne Boling Jr., Fredrick Brown, Trorice Crawford, Allan Albert Kerr, and Jongmin Seok, were charged with multiple counts of conspiracy, wire fraud, and aggravated identify theft based on their alleged leading roles in the theft and exploitation of victim PII to conduct their fraud scheme. Boling (a U.S. citizen), Kerr (an Australian citizen), and Seok (a South Korean citizen) were arrested in the Philippines. Brown and Crawford, both U.S. citizens, were arrested in Las Vegas and San Diego respectively. Brown has been detained pending trial. Crawford is awaiting a detention hearing.
“The crimes charged today are reprehensible and will not be tolerated by the Department of Justice. These defendants are alleged to have illegally defrauded some of America’s most honorable citizens, our elderly and disabled veterans and servicemembers,” said Attorney General William P. Barr. “Through today’s action, the Department is honoring our pledge to target elder fraud schemes, especially those committed by foreign actors using sophisticated means, and to protect the veterans of our great country. I am proud of the quick and effective work done on this case by our Consumer Protection Branch and the U.S. Attorney’s Office for the Western District of Texas, with strong investigative support from the Departments of Defense and Veterans Affairs. We all will continue to work together to ensure that our veterans and servicemembers are protected from fraud.”
“Our message is pretty simple,” said U.S. Attorney Bash. “It doesn’t matter where on this planet you reside. If you target our veterans, we’re coming for you. Our veterans were willing to risk everything to protect this Nation from foreign threats. Now it’s our turn to seek justice for them.”
“The compromise of personally identifiable information can significantly harm our service members, veterans and their families and we will aggressively investigate such matters,” said Glenn A. Fine, Principal Deputy Inspector General, performing the duties of the Inspector General of the Department of Defense Office of Inspector General. “This indictment and the coordinated actions of our criminal investigative component, the Defense Criminal Investigative Service, demonstrate our commitment to swift action against those who attempt to enrich themselves through identify theft, money laundering, and conspiracy. The DoD OIG, working in partnership with the Department of Justice, will continue to identify, disrupt, and bring to justice those who threaten military members, retirees, and veterans through fraud and corruption.”
“VA is working with DoD to identify any instances of compromised VA benefits accounts,” said James Hutton, VA assistant secretary for public and intergovernmental affairs. “Just as importantly, VA has taken steps to protect Veterans’ data and are instituting additional protective measures.”
According to the indictment, the defendants’ identity-theft and fraud scheme began in 2014 when Brown, then a civilian employee at a U.S. Army installation, stole thousands of military members’ PII, including names, dates of birth, social security numbers, and Department of Defense identification numbers. Brown is alleged to have then provided the stolen information to Boling, who exploited the information in various ways together with his Philippines-based co-defendants Kerr and Seok.
As asserted in the indictment, Boling, Kerr, and Seok specifically used the stolen information to compromise a Department of Defense portal designed to enable military members to access benefits information online. Once through the portal, the defendants are alleged to have accessed benefits information. Access to these detailed records enabled the defendants to steal or attempt to steal millions of dollars from military members’ bank accounts. The defendants also stole veterans’ benefits payments. After the defendants had compromised military members’ bank accounts and veterans’ benefits payments, Boling allegedly worked with Crawford to recruit individuals who would accept the deposit of stolen funds into their bank accounts and then send the funds through international wire remittance services to the defendants and others. Evidence of the defendants’ scheme was detected earlier this year, advancing the investigation that led to the indictment.
The unsealed indictment was announced today in San Antonio by U.S. Attorney John Bash of the Western District of Texas, Deputy Assistant Attorney General David Morrell, and Director Gustav Eyler of the Department of Justice’s Consumer Protection Branch.
The Departments of Defense and Veterans Affairs are coordinating with the Department of Justice to notify and provide resources to the thousands of identified victims. Announcements also will follow regarding steps taken to secure military members’ information and benefits from theft and fraud.
An indictment merely alleges that crimes have been committed. All defendants are presumed innocent until proven guilty beyond a reasonable doubt.
The United States is represented by Trial Attorneys Ehren Reynolds and Yolanda McCray Jones of the Department of Justice’s Consumer Protection Branch and Assistant United States Attorney Joseph Blackwell of the U.S. Attorney’s Office for the Western District of Texas. The matter was investigated by agents of the Defense Criminal Investigative Service, and counsel Matthew Freund, along with substantial investigative support from the U.S. Postal Inspection Service, the U.S. Army Criminal Investigation Command, and the Veterans Benefits Administration’s Benefits Protection and Remediation Division. The U.S. Department of State’s Diplomatic Security Service, Philippine law enforcement partners, and the U.S. Attorneys’ Offices for the District of Nevada, the Southern District of California, and the Eastern District of Virginia also provided assistance. Resources from the Department of Justice’s Servicemembers and Veterans Initiative and its Transnational Elder Fraud Strike Force aided in the matter’s investigation and prosecution.
Since President Trump signed the bipartisan Elder Abuse Prevention and Prosecution Act (EAPPA) into law, the Department of Justice has participated in hundreds of enforcement actions in criminal and civil cases that targeted or disproportionately affected seniors. In particular, this past March, the Department announced the largest elder fraud enforcement action in American history, charging more than 260 defendants in a nationwide elder fraud sweep. The Department has likewise conducted hundreds of trainings and outreach sessions across the country since the passage of the Act.
Additional information about the Consumer Protection Branch and its enforcement efforts can be found at www.justice.gov/civil/consumer-protection-branch. For more information about the U.S. Attorney’s Office for the Western District of Texas, visit its website at https://www.justice.gov/usao-wdtx. Information about the Department of Justice’s Elder Fraud Initiative is available at www.justice.gov/elderjustice; information on the Servicemember and Veterans Initiative is at https://www.justice.gov/servicemembers.
In San Antonio, 38-year-old Fredrick Brown, a former civilian medical records administrator for the U.S. Army at the 65th Medical Brigade, Yongsan Garrison, South Korea, admitted his role in an identity-theft and fraud scheme that victimized thousands of U.S. servicemembers and veterans, announced U.S. Attorney John F. Bash, Deputy Assistant Attorney General David Morrell, and Director Gustav Eyler of the Department of Justice’s Consumer Protection Branch.
Appearing before U.S. Magistrate Judge Richard Farrer yesterday, Brown pleaded guilty to one count of conspiracy to commit wire fraud and one count of conspiracy to launder monetary instruments. By pleading guilty, Brown admitted that from July 2014 to September 2015, he stole personal identifying information (PII) of thousands of military members, including names, social security numbers, DOD ID numbers, dates of birth, and contact information. Brown admitted to capturing the PII by taking digital photographs of his computer screen while he was logged into the Armed Forces Health Longitudinal Technology Application. Brown further admitted that he subsequently provided that stolen data to co-defendant Robert Wayne Boling, Jr. so that Boling and others could exploit the information in various ways to access Department of Defense and Veterans Affairs benefits sites and steal millions of dollars.
Brown faces up to 20 years in federal prison for each conspiracy charge. He remains in federal custody awaiting sentencing scheduled for 10:30am on February 6, 2020, before Chief U.S. District Judge Orlando Garcia in San Antonio.
As asserted in the indictment, Boling (U.S. citizen), together with his Philippines-based co-defendants Allan Albert Kerr (Australian citizen) and Jongmin Seok (South Korean citizen), specifically used the stolen information to compromise a Department of Defense portal designed to enable military members to access benefits information online. Once through the portal, the defendants are alleged to have accessed benefits information. Access to these detailed records enabled the defendants to steal or attempt to steal millions of dollars from military members’ bank accounts. The defendants also stole veterans’ benefits payments. After the defendants had compromised military members’ bank accounts and veterans’ benefits payments, Boling allegedly worked with co-defendant Trorice Crawford to recruit individuals who would accept the deposit of stolen funds into their bank accounts and then send the funds through international wire remittance services to the defendants and others. Evidence of the defendants’ scheme was detected earlier this year, advancing the investigation that led to the indictment.
The Departments of Defense and Veterans Affairs are coordinating with the Department of Justice to notify and provide resources to the thousands of identified victims. Announcements also will follow regarding steps taken to secure military members’ information and benefits from theft and fraud.
Boling, Crawford, Kerr and Seok are charged with multiple counts of conspiracy, wire fraud, and aggravated identity theft. Crawford remains in federal custody pending resolution of this litigation. Boling, Kerr and Seok are in custody in the Philippines awaiting transfer to the Western District of Texas.
It is important to note that an indictment merely alleges that crimes have been committed. All defendants are presumed innocent until proven guilty beyond a reasonable doubt.
The United States is represented by Trial Attorneys Ehren Reynolds and Yolanda McCray Jones of the Department of Justice’s Consumer Protection Branch and Assistant U.S. Attorney Joseph Blackwell of the U.S. Attorney’s Office for the Western District of Texas. The matter was investigated by agents of the Defense Criminal Investigative Service, and counsel Matthew Freund, along with substantial investigative support from the U.S. Postal Inspection Service, the U.S. Army Criminal Investigation Command, and the Veterans Benefits Administration’s Benefits Protection and Remediation Division. The U.S. Department of State’s Diplomatic Security Service, Philippine law enforcement partners, and the U.S. Attorneys’ Offices for the District of Nevada, the Southern District of California, and the Eastern District of Virginia also provided assistance. Resources from the Department of Justice’s Servicemembers and Veterans Initiative and its Transnational Elder Fraud Strike Force aided in the matter’s investigation and prosecution.
Since President Trump signed the bipartisan Elder Abuse Prevention and Prosecution Act (EAPPA) into law, the Department of Justice has participated in hundreds of enforcement actions in criminal and civil cases that targeted or disproportionately affected seniors. In particular, this past March, the Department announced the largest elder fraud enforcement action in American history, charging more than 260 defendants in a nationwide elder fraud sweep. The Department has likewise conducted hundreds of trainings and outreach sessions across the country since the passage of the Act.
Additional information about the Consumer Protection Branch and its enforcement efforts can be found at www.justice.gov/civil/consumer-protection-branch. For more information about the U.S. Attorney’s Office for the Western District of Texas, visit its website at https://www.justice.gov/usao-wdtx. Information about the Department of Justice’s Elder Fraud Initiative is available at www.justice.gov/elderjustice; information on the Servicemember and Veterans Initiative is at https://www.justice.gov/servicemembers.
Description: The fiscal year of the data file obtained from the AOUSC
Format: YYYY
Description: The code of the federal judicial circuit where the case was located
Format: A2
Description: The code of the federal judicial district where the case was located
Format: A2
Description: The code of the district office where the case was located
Format: A2
Description: Docket number assigned by the district to the case
Format: A7
Description: A unique number assigned to each defendant in a case which cannot be modified by the court
Format: A3
Description: A unique number assigned to each defendant in a case which can be modified by the court
Format: A3
Description: A sequential number indicating whether a case is an original proceeding or a reopen
Format: N5
Description: Case type associated with the current defendant record
Format: A2
Description: A concatenation of district, office, docket number, case type, defendant number, and reopen sequence number
Format: A18
Description: A concatenation of district, office, docket number, case type, and reopen sequence number
Format: A15
Description: The status of the defendant as assigned by the AOUSC
Format: A2
Description: A code indicating the fugitive status of a defendant
Format: A1
Description: The date upon which a defendant became a fugitive
Format: YYYYMMDD
Description: The date upon which a fugitive defendant was taken into custody
Format: YYYYMMDD
Description: The date when a case was first docketed in the district court
Format: YYYYMMDD
Description: The date upon which proceedings in a case commenced on charges pending in the district court where the defendant appeared, or the date of the defendant’s felony-waiver of indictment
Format: YYYYMMDD
Description: A code used to identify the nature of the proceeding
Format: N2
Description: The date when a defendant first appeared before a judicial officer in the district court where a charge was pending
Format: YYYYMMDD
Description: A code indicating the type of legal counsel assigned to a defendant
Format: N2
Description: The title and section of the U.S. Code applicable to the offense committed which carried the highest severity
Format: A20
Description: A code indicating the level of offense associated with FTITLE1
Format: N2
Description: The four digit AO offense code associated with FTITLE1
Format: A4
Description: The four digit D2 offense code associated with FTITLE1
Format: A4
Description: A code indicating the severity associated with FTITLE1
Format: A3
Description: The title and section of the U.S. Code applicable to the offense committed which carried the second highest severity
Format: A20
Description: A code indicating the level of offense associated with FTITLE2
Format: N2
Description: The four digit AO offense code associated with FTITLE2
Format: A4
Description: The four digit D2 offense code associated with FTITLE2
Format: A4
Description: A code indicating the severity associated with FTITLE2
Format: A3
Description: The title and section of the U.S. Code applicable to the offense committed which carried the third highest severity
Format: A20
Description: A code indicating the level of offense associated with FTITLE3
Format: N2
Description: The four digit AO offense code associated with FTITLE3
Format: A4
Description: The four digit D2 offense code associated with FTITLE3
Format: A4
Description: A code indicating the severity associated with FTITLE3
Format: A3
Description: The title and section of the U.S. Code applicable to the offense committed which carried the fourth highest severity
Format: A20
Description: A code indicating the level of offense associated with FTITLE4
Format: N2
Description: The four digit AO offense code associated with FTITLE4
Format: A4
Description: The four digit D2 offense code associated with FTITLE4
Format: A4
Description: A code indicating the severity associated with FTITLE4
Format: A3
Description: The title and section of the U.S. Code applicable to the offense committed which carried the fifth highest severity
Format: A20
Description: A code indicating the level of offense associated with FTITLE5
Format: N2
Description: The four digit AO offense code associated with FTITLE5
Format: A4
Description: The four digit D2 offense code associated with FTITLE5
Format: A4
Description: A code indicating the severity associated with FTITLE5
Format: A3
Description: The FIPS code used to indicate the county or parish where an offense was committed
Format: A5
Description: The date of the last action taken on the record
Format: YYYYMMDD
Description: The date upon which judicial proceedings before the court concluded
Format: YYYYMMDD
Description: The date upon which the final sentence is recorded on the docket
Format: YYYYMMDD
Description: The date upon which the case was closed
Format: YYYYMMDD
Description: The total fine imposed at sentencing for all offenses of which the defendant was convicted and a fine was imposed
Format: N8
Description: A count of defendants filed including inter-district transfers
Format: N1
Description: A count of defendants filed excluding inter-district transfers
Format: N1
Description: A count of original proceedings commenced
Format: N1
Description: A count of defendants filed whose proceedings commenced by reopen, remand, appeal, or retrial
Format: N1
Description: A count of defendants terminated including interdistrict transfers
Format: N1
Description: A count of defendants terminated excluding interdistrict transfers
Format: N1
Description: A count of original proceedings terminated
Format: N1
Description: A count of defendants terminated whose proceedings commenced by reopen, remand, appeal, or retrial
Format: N1
Description: A count of defendants pending as of the last day of the period including long term fugitives
Format: N1
Description: A count of defendants pending as of the last day of the period excluding long term fugitives
Format: N1
Description: The source from which the data were loaded into the AOUSC’s NewSTATS database
Format: A10
Description: A sequential number indicating the iteration of the defendant record
Format: N2
Description: The date the record was loaded into the AOUSC’s NewSTATS database
Format: YYYYMMDD
Description: Statistical year ID label on data file obtained from the AOUSC which represents termination year
In San Antonio, 32-year-old Trorice Crawford of San Diego, California, admitted his role in an identity-theft and fraud scheme that victimized thousands of U.S. servicemembers and veterans, announced U.S. Attorney John F. Bash, Deputy Assistant Attorney General David Morrell, and Director Gustav Eyler of the Department of Justice’s Consumer Protection Branch.
Appearing before U.S. Magistrate Judge Richard Farrer yesterday afternoon, Crawford pleaded guilty to one count of conspiracy to launder monetary instruments. By pleading guilty, Crawford admitted that from May 2017 to July 2019, he conspired with Robert Wayne Boling, Jr. (a U.S. citizen), and others to steal money belonging to U.S. Servicemembers and veterans. By pleading guilty, Crawford admitted to recruiting at least 30 individuals (aka “money mules”) who provided their bank account information to receive funds stolen from military affiliated individuals. On average, each unauthorized transfer from a victim’s accounts ranged from between $8,000 to $13,000. Crawford kept a percentage of the withdrawn funds for himself and oversaw the transmission of the remaining amounts by means of international money remittance services to Boling and others in the Philippines.
Crawford faces up to 20 years in federal prison. He remains in federal custody awaiting sentencing scheduled for 10:30am on March 5, 2020, before Chief U.S. District Judge Orlando Garcia in San Antonio.
In October, co-defendant Frederick Brown, age 38 of Las Vegas, NV, pleaded guilty to federal charges in connection with this scheme. Brown, a former civilian medical records administrator for the U.S. Army at the 65th Medical Brigade, Yongsan Garrison, South Korea, admitted that while logged into the Armed Forces Health Longitudinal Technology Application, he illegally captured on his cell phone personal identifying information (PII) of thousands of military members, including names, social security numbers, DOD ID numbers, dates of birth, and contact information. Brown further admitted that he subsequently provided that stolen data to Boling so that Boling and others could exploit the information in various ways to access Department of Defense and Veterans Affairs benefits sites and steal millions of dollars.
As asserted in the federal grand jury indictment, Boling, together with his Philippines-based co-defendants Allan Albert Kerr (Australian citizen) and Jongmin Seok (South Korean citizen), specifically used the stolen information to compromise a Department of Defense portal designed to enable military members to access benefits information online. Once through the portal, the defendants are alleged to have accessed benefits information. Access to these detailed records enabled the defendants to steal or attempt to steal millions of dollars from military members’ bank accounts. The defendants also stole veterans’ benefits payments. Evidence of the defendants’ scheme was detected earlier this year, advancing the investigation that led to the indictment.
The Departments of Defense and Veterans Affairs are coordinating with the Department of Justice to notify and provide resources to the thousands of identified victims. Announcements also will follow regarding steps taken to secure military members’ information and benefits from theft and fraud.
Boling, Kerr and Seok are charged with multiple counts of conspiracy, wire fraud, and aggravated identity theft. Boling, Kerr and Seok are in custody in the Philippines awaiting transfer to the Western District of Texas. Brown remains in federal custody awaiting sentencing scheduled for 10:30am on February 6, 2020, before Chief U.S. District Judge Orlando Garcia in San Antonio.
It is important to note that an indictment merely alleges that crimes have been committed. All defendants are presumed innocent until proven guilty beyond a reasonable doubt.
The United States is represented by Trial Attorneys Ehren Reynolds and Yolanda McCray Jones of the Department of Justice’s Consumer Protection Branch and Assistant U.S. Attorney Joseph Blackwell of the U.S. Attorney’s Office for the Western District of Texas. The matter was investigated by agents of the Defense Criminal Investigative Service, and counsel Matthew Freund, along with substantial investigative support from the U.S. Postal Inspection Service, the U.S. Army Criminal Investigation Command, and the Veterans Benefits Administration’s Benefits Protection and Remediation Division. The U.S. Department of State’s Diplomatic Security Service, Philippine law enforcement partners, and the U.S. Attorneys’ Offices for the District of Nevada, the Southern District of California, and the Eastern District of Virginia also provided assistance. Resources from the Department of Justice’s Servicemembers and Veterans Initiative and its Transnational Elder Fraud Strike Force aided in the matter’s investigation and prosecution.
Since President Trump signed the bipartisan Elder Abuse Prevention and Prosecution Act (EAPPA) into law, the Department of Justice has participated in hundreds of enforcement actions in criminal and civil cases that targeted or disproportionately affected seniors. In particular, this past March, the Department announced the largest elder fraud enforcement action in American history, charging more than 260 defendants in a nationwide elder fraud sweep. The Department has likewise conducted hundreds of trainings and outreach sessions across the country since the passage of the Act.
Additional information about the Consumer Protection Branch and its enforcement efforts can be found at www.justice.gov/civil/consumer-protection-branch. For more information about the U.S. Attorney’s Office for the Western District of Texas, visit its website at https://www.justice.gov/usao-wdtx. Information about the Department of Justice’s Elder Fraud Initiative is available at www.justice.gov/elderjustice; information on the Servicemember and Veterans Initiative is at https://www.justice.gov/servicemembers.
Julian P. Assange, 52, the founder of WikiLeaks, pleaded guilty today to conspiring with Chelsea Manning, at that time a U.S. Army intelligence analyst, to unlawfully obtain and disclose classified documents relating to the national defense. After obtaining classified national defense information from Manning, and aware of the harm that dissemination of such national defense information would cause, Assange disclosed this information on WikiLeaks.
The guilty plea concludes a criminal matter that dates back to March 2018, when Assange was first indicted in the Eastern District of Virginia. There, and in superseding indictments, Assange was charged with conspiring with Manning, then a “Top Secret” U.S. security clearance holder, to further Manning’s unlawful acquisition and transmission of bulk classified information, including Manning’s use of a government computer to illegally download hundreds of thousands of classified documents and transmit them without authorization to WikiLeaks.
Assange was detained in the United Kingdom based on the U.S. charges for the last 62 months, while he contested extradition. As part of the plea agreement, Assange was transported to the U.S. District Court for the Northern Mariana Islands to enter his felony guilty plea and be sentenced on the morning of June 26 (Saipan local time) in a U.S. courtroom, with the venue reflecting Assange’s opposition to traveling to the continental United States to enter his guilty plea and the proximity of this federal U.S. District Court to Assange’s country of citizenship, Australia, to which he will return. At today’s proceeding, Assange admitted to his role in the conspiracy to violate the Espionage Act and received a court-imposed 62-month time-served sentence, reflecting the time he served in U.K. prison as a result of the U.S. charges. Following the imposition of sentence, he will depart the United States for his native Australia. Pursuant to the plea agreement, Assange is prohibited from returning to the United States without permission.
Beginning in late 2009, Assange and WikiLeaks actively solicited United States classified information, including by publishing a list of “Most Wanted Leaks” that sought, among other things, bulk classified documents. As set forth in the public charging documents, Assange actively solicited and recruited people who had access, authorized or otherwise, to classified information and were willing to provide that information to him and WikiLeaks—and also solicited hackers who could obtain unauthorized access to classified information through computer network intrusions. Assange publicly encouraged his prospective recruits to obtain the information he desired by any means necessary, including hacking and theft, and to send that information to Assange at WikiLeaks.
Between January 2010 and May 2010, in the course of the conspiracy with Assange, Manning used U.S. government computer systems to download hundreds of thousands of documents and reports, many of them classified at the SECRET level and relating to the national defense, which signified that unauthorized disclosure could cause serious damage to United States national security. In total, Manning downloaded four nearly complete U.S. government databases that contained, among other things, approximately 90,000 Afghanistan war-related significant activity reports, 400,000 Iraq war-related significant activity reports, 800 Joint Task Force Guantanamo (JTF GTMO) detainee assessment briefs, and 250,000 U.S. Department of State cables. Manning also downloaded files regarding rules of engagement in the Iraq war, most of which were classified at the SECRET level and which delineated the circumstances and limitations under which United States forces would initiate or conduct combat engagement with other forces.
After downloading digital reams of classified documents and files, Manning electronically sent them to Assange to be publicly posted on WikiLeaks’s website. During Manning’s bulk exfiltration and passage of classified materials to WikiLeaks, Manning and Assange communicated regularly via online platforms about Manning’s progress and what classified information Assange wanted. For example, after sending the classified JTF GTMO detainee assessment briefs to Assange, Manning told Assange “thats [sic] all I really have got left.” To encourage Manning to continue to take classified documents from the United States and provide them to Assange and WikiLeaks without authorization, Assange replied, “curious eyes never run dry in my experience.”
In or about 2010 and 2011, Assange publicly disclosed via the WikiLeaks website hundreds of thousands of documents that Manning had taken without authorization and given to him, including approximately 75,000 Afghanistan war-related significant activity reports, classified up to the Secret level; 400,000 Iraq war-related significant activity reports, classified up to the Secret level; 800 JTF GTMO detainee assessment briefs, classified up to the Secret level; and over 100,000 State Department cables, some of which were classified up to the Secret level.
Unlike news organizations that published redacted versions of some of the classified documents that Assange obtained from Manning and then shared with those organizations, Assange and WikiLeaks disclosed many of the raw classified documents without removing any personally identifying information. Specifically, in many instances, the classified documents Manning unlawfully provided to Assange were later released publicly by Assange and WikiLeaks in a raw or unredacted form that placed individuals who had assisted the U.S. government at great personal risk. Assange’s decision to reveal the names of human sources illegally shared with him by Manning created a grave and imminent risk to human life. For example, the State Department cables that WikiLeaks disseminated included information from journalists, religious leaders, human rights advocates, and political dissidents who had chosen to provide information to the United States in confidence at significant risk to their own safety. By publicly releasing these documents without redacting the names of human sources or other identifying information, Assange subjected these individuals to serious harm and arbitrary detention. Assange even acknowledged in public statements that he knew that publicly disclosing unredacted classified documents containing the names and other identifying information of people who had shared information with the U.S. government in confidence could put those people at risk of harm.
The FBI Washington Field Office investigated the case. The Justice Department’s Office of International Affairs provided significant assistance in securing Assange’s arrest and in litigating Assange’s extradition. The United Kingdom’s Crown Prosecution Service, National Extradition Unit (and its predecessor in the Metropolitan Police Service), and Central Authority also provided significant assistance to the extradition proceedings over the past five years. Logistical support was also provided by the United Kingdom’s National Crime Agency’s Joint International Crime Centre, U.K. law enforcement agencies, and U.S. Department of Homeland Security, Homeland Security Investigations, and U.S. Customs and Border Protection.
The National Security Division’s Counterintelligence and Export Control Section (CES), U.S. Attorney’s Office for the District of Guam and the Northern Mariana Islands (NMI), and U.S. Attorney’s Office for the Eastern District of Virginia handled the case. U.S. Attorney Shawn N. Anderson for the District of Guam and NMI, CES Deputy Chief Matthew McKenzie, and National Security Cyber Section Trial Attorney Jacques Singer-Emery represented the United States in the NMI proceedings. CES Trial Attorneys Nicholas Hunter and Adam Small, and Trial Attorney Rachel Yasser and Legal Advisor/International Affairs Coordinator Amanda June Chadwick of the Justice Department’s Office of International Affairs also provided substantial assistance.
In Waco, a federal judge sentenced 43–year-old James Stevens to 200 months in federal prison for possession of child pornography, announced U.S. Attorney John F. Bash and Homeland Security Investigations (HSI) Special Agent in Charge Shane Folden, San Antonio Division.
During sentencing on June 10, 2020, U.S. District Judge Alan Albright also ordered that Stevens pay $5,000 in restitution and be placed on supervised release for a period of ten years after completing his prison term.
“I am thankful that we were able to put another predator behind bars. The sexual exploitation of children is one of the most critical problems facing our country, and it doesn’t get remotely enough attention,” stated U.S. Attorney Bash.
On February 11, 2020, Stevens pleaded guilty to one count of possession of child pornography. According to court records, information concerning child sexual exploitation material provided by the National Center for Missing and Exploited Children (NCMEC) and the South Australian Police led HSI investigators to the defendant. In June 2019, authorities executed a search warrant at the defendant’s residence in Temple and seized his cellular telephone. Stevens was arrested based on outstanding state warrants, but later bonded out of jail.
During a subsequent forensics review of the defendant’s cell phone, authorities discovered numerous images of child pornography as well as images of the defendant pant-less, lying down on a bed next to a minor victim. Information obtained from the images led investigators to a residence in Rockdale, TX, where the minor victim lived with his biological father. Inside the residence, investigators saw the defendant lying on a bed with the minor victim sitting next to him. During an interview, the biological father stated that the four-year-old victim is non-verbal, suffered from a cognitive disability and lacked specific skills that would be normally associated with a child of that age. The biological father also admitted that he and the defendant were in a relationship and that they used methamphetamine which was found in the residence. State authorities arrested both men for the methamphetamine and notified Child Protective Services.
During this investigation, agents discovered approximately 121 images and 24 videos of child pornography on the defendant’s cell phone, computer and online accounts.
“The significant sentence imposed on James Stevens sends a clear message that there are serious consequences for those who exploit children. Stevens will serve almost 17 years in federal prison for his incomprehensible acts,” stated HSI Special Agent in Charge Folden. “HSI remains committed to working with our law enforcement partners to aggressively pursue those who victimize the most vulnerable members of our society, our children.”
HSI investigated this case with assistance from the Bell County Sheriff’s Office and the Milam County Sheriff’s Office. Assistant U.S. Attorney Greg Gloff prosecuted this case on behalf of the government.
This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov.
#####
The year 2020 marks the 150th anniversary of the Department of Justice. Learn more about the history of our agency at www.Justice.gov/Celebrating150Years.
SAN ANTONIO – A San Antonio man was sentenced in federal court to 210 months in prison for distribution of child pornography.
According to court documents, Thomas Jeffrey McKissick V, 42, sent 18 images and four video files containing child pornography to an undercover police officer in Queensland, Australia on Feb. 6, 2022 and Feb. 7, 2022. Homeland Security Investigations executed a federal search warrant at McKissick’s San Antonio residence on March 10, 2022, seizing a cell phone that contained more than 10,000 images and nearly 800 video files of child sexual abuse material.
McKissick was arrested March 11, 2022 and has remained in federal custody. He pleaded guilty to one count March 5, 2024. In addition to the 210 month imprisonment, McKissick was ordered to serve lifetime supervised release and pay $15,000 restitution.
“This case demonstrates that our partnerships to combat criminal activity and prosecute child predators reach far beyond our state lines and our nation’s borders,” said U.S. Attorney Jaime Esparza for the Western District of Texas. “Thanks to this bilateral investigation and the collaboration between HSI San Antonio and the Queensland Police Service in Australia, this predator can no longer inflict harm on children.”
“While this significant sentence cannot repair the permanent damage done to the children depicted in these images, it should serve as a warning to those who engage in this behavior. HSI and our partners will be relentless in our pursuit of online predators," said Special Agent in Charge Craig Larrabee for HSI San Antonio. "The collaboration between HSI and our international partners is critical in our mission to protect vulnerable children and bring perpetrators to justice.”
“This arrest is an excellent outcome, made possible through the exceptional collaboration between the Queensland Police Service and Homeland Security Investigations,” said Detective Inspector Glen Donaldson for the Queensland Police Service child exploitation unit Argos. “This joint effort underscores the importance of interagency cooperation in our shared mission to target high-harm offenders, enhance community safety and remove children from harm.”
HSI takes a victim-centered approach to child exploitation investigations by working to identify, rescue and stabilize victims. HSI works in partnership with the National Center for Missing and Exploited Children, Internet Crimes Against Children partners, and other federal, state and local agencies to help solve cases and rescue sexually exploited children. You can report suspected child sexual exploitation or missing children to the National Center for Missing and Exploited Children’s toll-free, 24-hour hotline at 800-THE-LOST.
HSI is a founding member of the Virtual Global Taskforce, an international alliance of law enforcement agencies and private industry sector partners working together to prevent and deter online child sexual abuse.
HSI and the Queensland Police Service investigated the case.
Assistant U.S. Attorney Bettina Richardson prosecuted the case.
This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.
In San Antonio, a federal judge sentenced 33-year-old Trorice Crawford of San Diego, California, to 46 months in federal prison for his role in an identity-theft and fraud scheme that victimized thousands of U.S. servicemembers and veterans, announced U.S. Attorney John F. Bash and Director Gustav Eyler of the Department of Justice’s Consumer Protection Branch.
In addition to the prison term, Chief U.S. District Judge Orlando Garcia ordered that Crawford pay $103,700 in restitution and be placed on supervised release for a period of three years after completing his prison term.
“The Department of Justice will not tolerate fraud on America’s warfighters and veterans,” said Acting Assistant Attorney General Ethan P. Davis of the Department’s Civil Division. “Working with our partners and using all tools available, we are committed to protecting those who protect us.”
On December 5, 2019, Crawford pleaded guilty to one count of conspiracy to launder monetary instruments. By pleading guilty, Crawford admitted that from May 2017 to July 2019, he conspired with Robert Wayne Boling, Jr. (a U.S. citizen), and others to steal money belonging to U.S. Servicemembers and veterans. By pleading guilty, Crawford admitted to recruiting at least 30 individuals (aka “money mules”) who provided their bank account information to receive funds stolen from military affiliated individuals. On average, each unauthorized transfer from a victim’s accounts ranged from between $8,000 to $13,000. Crawford kept a percentage of the withdrawn funds for himself and oversaw the transmission of the remaining amounts by means of international money remittance services to Boling and others in the Philippines.
In October, co-defendant Frederick Brown, age 38 of Las Vegas, NV, pleaded guilty to federal charges in connection with this scheme. Brown, a former civilian medical records administrator for the U.S. Army at the 65th Medical Brigade, Yongsan Garrison, South Korea, admitted that while logged into the Armed Forces Health Longitudinal Technology Application, he illegally captured on his cell phone personal identifying information (PII) of thousands of military members, including names, social security numbers, DOD ID numbers, dates of birth, and contact information. Brown further admitted that he subsequently provided that stolen data to Boling so that Boling and others could exploit the information in various ways to access Department of Defense and Veterans Affairs benefits sites and steal millions of dollars.
As asserted in the federal grand jury indictment, Boling, together with his Philippines-based co-defendants Allan Albert Kerr (Australian citizen) and Jongmin Seok (South Korean citizen), specifically used the stolen information to compromise a Department of Defense portal designed to enable military members to access benefits information online. Once through the portal, the defendants are alleged to have accessed benefits information. Access to these detailed records enabled the defendants to steal or attempt to steal millions of dollars from military members’ bank accounts. The defendants also stole veterans’ benefits payments. Evidence of the defendants’ scheme was detected earlier this year, advancing the investigation that led to the indictment.
The Departments of Defense and Veterans Affairs are coordinating with the Department of Justice to notify and provide resources to the thousands of identified victims.
Boling, Kerr and Seok are charged with multiple counts of conspiracy, wire fraud, and aggravated identity theft. Boling, Kerr and Seok remain in the Philippines. Measures are being taken to effect their transfer to the Western District of Texas. Brown remains in federal custody awaiting sentencing scheduled for 10:30am on September 17, 2020, before Judge Garcia in San Antonio.
It is important to note that an indictment merely alleges that crimes have been committed. All defendants are presumed innocent until proven guilty beyond a reasonable doubt.
The United States is represented by Trial Attorneys Ehren Reynolds and Yolanda McCray Jones of the Department of Justice’s Consumer Protection Branch and Assistant U.S. Attorney Joseph Blackwell of the U.S. Attorney’s Office for the Western District of Texas. The matter was investigated by agents of the Defense Criminal Investigative Service, and counsel Matthew Freund, along with substantial investigative support from the U.S. Postal Inspection Service, the U.S. Army Criminal Investigation Command, and the Veterans Benefits Administration’s Benefits Protection and Remediation Division. The U.S. Department of State’s Diplomatic Security Service, Philippine law enforcement partners, and the U.S. Attorneys’ Offices for the District of Nevada, the Southern District of California, and the Eastern District of Virginia also provided assistance. Resources from the Department of Justice’s Servicemembers and Veterans Initiative and its Transnational Elder Fraud Strike Force aided in the matter’s investigation and prosecution.
Since President Trump signed the bipartisan Elder Abuse Prevention and Prosecution Act (EAPPA) into law, the Department of Justice has participated in hundreds of enforcement actions in criminal and civil cases that targeted or disproportionately affected seniors. In particular, in March 2020, the Department announced the largest elder fraud enforcement action in American history, charging more than 400 defendants in a nationwide elder fraud sweep. The Department has likewise conducted hundreds of trainings and outreach sessions across the country since the passage of the Act.
Additional information about the Consumer Protection Branch and its enforcement efforts can be found at www.justice.gov/civil/consumer-protection-branch. For more information about the U.S. Attorney’s Office for the Western District of Texas, visit its website at https://www.justice.gov/usao-wdtx. Information about the Department of Justice’s Elder Fraud Initiative is available at www.justice.gov/elderjustice; information on the Servicemember and Veterans Initiative is at https://www.justice.gov/servicemembers.
#####
The year 2020 marks the 150th anniversary of the Department of Justice. Learn more about the history of our agency at www.Justice.gov/Celebrating150Years.
PHOENIX, Ariz. – Donald Day, Jr., 58, of Heber, was arrested on Friday, on a federal arrest warrant after a federal grand jury indicted him on two counts of Interstate Threats.
From January 2022 to February 2023, Day used social media platforms to express a desire to incite violence and threaten a variety of groups and individuals, including law enforcement and government authorities. As to Count One, following the killing of two Queensland (Australia) Police Service officers in December 2022, Day posted a video on YouTube threatening any law enforcement official who came to his residence. Separately, as to Count Two, Day threatened to kill a victim (the Director General of the World Health Organization) in February 2023 on the video platform BitChute, calling on others to join him.
Each count carries a maximum sentence of five years in prison, a fine of up to $250,000, and up to three years of supervised release.
An indictment is simply a method by which a person is charged with criminal activity and raises no inference of guilt. An individual is presumed innocent until evidence is presented to a jury that establishes guilt beyond a reasonable doubt.
The Federal Bureau of Investigation conducted the investigation in this case. The United States Attorney’s Office, District of Arizona, is handling the prosecution.
CASE NUMBER: CR-23-8132-PCT-JJT
RELEASE NUMBER: 2023-196_Day
# # #
For more information on the U.S. Attorney’s Office, District of Arizona, visit http://www.justice.gov/usao/az/
Follow the U.S. Attorney’s Office, District of Arizona, on Twitter @USAO_AZ for the latest news.
PHOENIX, Ariz. – Last week, a federal jury found Todd Gehman Howard, 60, of Kingman, Arizona, guilty of being a convicted felon in possession of firearms and ammunition. Sentencing is scheduled for August 1, 2022, before U.S. District Judge Susan Brnovich.
On October 11, 2019, FBI agents executed a search warrant at Howard’s residence in Kingman, Arizona. Inside the residence, agents discovered 23 firearms, including 21 in a safe in Howard’s bedroom closet, and approximately 7,600 rounds of ammunition. Howard’s firearms included various types of revolvers, shotguns, and semi-automatic rifles. One of the guns in the safe was a Privately Made Firearm (PMF), FAL-type .308 caliber semiautomatic rifle, sometimes referred to as a “ghost gun.” Evidence presented at trial showed the receiver of that firearm was forged in Australia, and that the completed firearm had traveled from the State of Washington to Arizona.
“The Department of Justice takes seriously the prohibited possession of firearms. This Office will continue to prosecute such cases vigorously, especially cases such as this that involve federal felons possessing large quantities of firearms and ammunition,” said United States Attorney Gary Restaino.
The FBI conducted the investigation in this case, with assistance from the Bureau of Alcohol, Tobacco, Firearms and Explosives. Assistant U.S. Attorneys Joseph Koehler and William Rubens, District of Arizona, Phoenix, handled the prosecution.
CASE NUMBER: CR-21-8033-PCT-SMB
RELEASE NUMBER: 2022-077_Howard
# # #
For more information on the U.S. Attorney’s Office, District of Arizona, visit http://www.justice.gov/usao/az/Follow the U.S. Attorney’s Office, District of Arizona, on Twitter @USAO_AZ for the latest news.
PHOENIX, Ariz. – Last week, Todd Gehman Howard, 60, of Kingman, Arizona, was sentenced by United States District Judge Susan M. Brnovich to 63 months in prison, followed by three years of supervised release. Howard was previously found guilty of being a Convicted Felon in Possession of Firearms and Ammunition following a jury trial in May 2022.
On October 11, 2019, FBI agents executed a search warrant at Howard’s residence in Kingman, Arizona. Inside the residence, agents discovered 23 firearms, including 21 in a safe in Howard’s bedroom closet, and approximately 7,600 rounds of ammunition. Howard’s firearms included various types of revolvers, shotguns, and semi-automatic rifles. One of the guns in the safe was a Privately Made Firearm (PMF), FAL-type .308 caliber semiautomatic rifle, sometimes referred to as a “ghost gun.” Evidence presented at trial showed the receiver of that firearm was forged in Australia, and that the completed firearm had traveled from the State of Washington to Arizona.
The FBI conducted the investigation in this case, with assistance from the Bureau of Alcohol, Tobacco, Firearms and Explosives. Assistant U.S. Attorneys Joseph Koehler and William Rubens, District of Arizona, Phoenix, handled the prosecution.
CASE NUMBER: CR-21-8033-PHX-PCT-SMB
RELEASE NUMBER: 2022-145_HOWARD
# # #
For more information on the U.S. Attorney’s Office, District of Arizona, visit http://www.justice.gov/usao/az/Follow the U.S. Attorney’s Office, District of Arizona, on Twitter @USAO_AZ for the latest news.
SAN DIEGO – U.S. Marine Corps Colonel Enrico DeGuzman pleaded guilty to a bribery charge today, admitting that he accepted more than $67,000 in extravagant meals, drinks, entertainment and hotel stays in Hong Kong, Singapore, and Tokyo from foreign defense contractor Leonard Glenn Francis.
DeGuzman admitted that in return for this and other things of value, he corruptly used his official position to assist Francis, the owner and CEO of Singapore-based Glenn Defense Marine Asia, a ship husbanding company that serviced U.S. Navy ships in the Asia Pacific region. DeGuzman admitted that he endeavored to influence Navy ships into ports serviced by GDMA; he shared confidential Navy information with Francis in order to help GDMA; and he helped with evaluating and indoctrinating potential new Navy members into Francis’s cabal.
In one instance, DeGuzman joined Francis and others for a $40,000 meal that featured foie gras terrine, duck leg confit, ox-tail soup, and roasted Chilean sea bass, paired with expensive wine and champagne, followed by digestifs, cigars and overnights at the Shangri La - all at Francis’s expense.
DeGuzman was one of nine members of the U.S. Navy’s Seventh Fleet indicted by a federal grand jury in March 2017 for conspiring with Francis and for receiving bribes. DeGuzman is the second of the Seventh Fleet defendants to plead guilty. The trial of the remaining defendants was scheduled to begin November 1, 2021, but yesterday it was postponed until February 7, 2022. The remaining defendants - who are accused of trading military secrets and substantial influence for sex parties with prostitutes and luxurious dinners and travel - include U.S. Navy Rear Admiral Bruce Loveless; Captains David Newland, James Dolan, Donald Hornbeck and David Lausman; Commander Stephen Shedd; and Commander Mario Herrera.
The overarching fraud and bribery case has resulted in federal criminal charges against 34 U.S. Navy officials, defense contractors and the GDMA corporation. So far, 27 of those have pleaded guilty, admitting collectively that they accepted millions of dollars in luxury travel and accommodations, meals, or services of prostitutes, among many other things of value, from Francis in exchange for helping GDMA win and maintain contracts and overbill the Navy by over $35 million.
DeGuzman served on the Seventh Fleet Staff as the Fleet Marine Officer from July 2004 to July 2007. In this role, DeGuzman was responsible for coordinating the mission of the U.S. Marine Corps within the Seventh Fleet area of responsibility. From July 2007 to January 1, 2011, DeGuzman served as the Assistant Chief of Staff of Operations for U.S. Marine Corps Forces, Pacific, and thereafter, DeGuzman served in a civilian capacity as the Deputy Chief of Staff of Operations for U.S. Marine Corps Forces, Pacific.
The U.S. Navy’s Seventh Fleet represents a vital piece of the United States military’s projection of power as well as American foreign policy and national security. The largest numbered fleet in the U.S. Navy, the Seventh Fleet is comprised of 60-70 ships, 200-300 aircraft and approximately 40,000 Sailors and Marines. The Seventh Fleet is responsible for U.S. Navy ships and subordinate commands that operate in the Western Pacific throughout Southeast Asia, Pacific Islands, Australia, and Russia and the Indian Ocean territories, as well ships and personnel from other U.S. Navy Fleets that enter the Seventh Fleet’s area of responsibility.
“With every extravagant meal, Enrico DeGuzman violated his duty to serve the United States with honor and integrity,” said Acting U.S. Attorney Randy Grossman. “Today those choices have caught up to him, and he has been held accountable.” Grossman commended the federal prosecutors and agents who diligently pursued this case.
“Mr. DeGuzman knowingly misused his position of trust as a senior U.S. Marine Corps officer to actively work with, and advocate for, a corrupt U.S. Navy contractor, while expecting and receiving lavish gifts in return, all at the expense of the U.S. Navy and the national security interests of the United States,” said Kelly P. Mayo, the Director of the Department of Defense Office of Inspector General, Defense Criminal Investigative Service (DCIS). “As this case underscores, DCIS will work tirelessly with its partners to root out corruption within the Department of Defense and its components in order to maintain the trust, faith, and precious resources of the American taxpayer.”
“Colonel DeGuzman put his personal interests ahead of protecting the nation,” said NCIS Director Omar Lopez. “NCIS and our law enforcement partners will continue to aggressively pursue any act of bribery and corruption involving Mr. Francis and GDMA or otherwise as these reprehensible acts diminish the operational readiness of the fleet and warfighter superiority of the USMC and U.S. Navy.”
According to his plea agreement, DeGuzman admitted to receiving the following bribes from Francis:
On February 17, 2006, during the U.S.S. Blue Ridge's port visit to Hong Kong, DeGuzman and others dined and drank at Francis’s expense at the Petrus Restaurant at a cost of more than $20,000. To conceal and cover up their corrupt relationship, Francis created fraudulent receipts for the Petrus dinner that DeGuzman knew represented a small fraction of the actual cost of the dinner. While in Hong Kong, DeGuzman and others also stayed at the Shangri-La Hotel paid for, in part, by Francis.
On March 9, 2006, during the U.S.S. Blue Ridge’s port visit to Singapore, DeGuzman and others dined with Francis at the Jaan Restaurant in Singapore. Prior to dinner, DeGuzman and others enjoyed entertainment and cocktails on the exclusive rooftop helipad. At dinner, enjoyed foie gras terrine, duck leg confit, ox-tail soup, and roasted Chilean sea bass, paired with expensive wine and champagne, followed by digestifs and cigars. The estimated cost to Francis was $40,000.
On September 9, 2006, DeGuzman and others dined at Francis's expense at the New York Grill in Tokyo, Japan, and stayed at Francis's expense at the Park Hyatt Hotel, all at a total cost to Francis of approximately $30,000.
During the U.S.S. Blue Ridge's port visit to Singapore from about February 22-27, 2007, Francis paid for the hotel expenses for DeGuzman and others at the Shangri-La Hotel, Singapore at a total cost to Francis of approximately $50,000. As part of this port visit, DeGuzman and others dined with Francis at Francis's expense on multiple occasions, including at the Blu Restaurant within the Shangri-La Hotel, and at the Jaan Restaurant atop the Shangri-La Hotel.
On March 24, 2007, DeGuzman and others attended a multi-course dinner hosted by Francis at the Oak Door in Tokyo, Japan, during which was served, at Francis's expense, foie gras, Lobster Thermidor, and Sendai Tenderloin, and for dessert, “Liberté Sauvage,” the winning cake of the 10th Coupe du Monde de la Patisserie 2007, followed by cognac and cigars. During the event, the attendees posed for a photograph wearing custom-made GDMA neckties.
In a moment of candor encapsulating these corrupt relationships, just before DeGuzman departed Seventh Fleet assignment, he warned Francis in an email dated July 7 2007, “[U]nfortunately, I don't think I'll be able to influence people [in my next assignment] like I did there at 7th Fleet.”
DEFENDANT Case Number: 17-CR-0623-JLS
Enrico DeGuzman Age: 63 Las Vegas, Nevada
SUMMARY OF CHARGES
Bribery of a Public Official, in violation of 18 U.S.C. § 201(b)(2)
Maximum Penalty: Fifteen years in prison, $250,000 fine
Assistant U.S. Attorneys Mark W. Pletcher (619) 546-9714, Michelle Wasserman (619) 546-8431, Valerie Chu (619) 546-6750, and David Chu (619) 546-8266
NEWS RELEASE SUMMARY – June 29, 2022
SAN DIEGO – Former U.S. Navy Captains David Newland, James Dolan and David Lausman and former Commander Mario Herrera – all of whom once served in the Navy’s Seventh Fleet - were convicted on all counts by a federal jury today of accepting bribes from foreign defense contractor Leonard Francis. The jury did not reach a verdict on the charges against Rear Admiral Bruce Loveless.
Nine members of the U.S. Navy’s Seventh Fleet – including the four defendants convicted today - were indicted by a federal grand jury in March 2017. Four other defendants pleaded guilty before trial.
During the trial, three U.S. Navy officials – Commander Stephen Shedd, former Lieutenant Commander Edmond A. Aruffo, and U.S. Navy Captain Jesus Vasquez Cantu – and former Lieutenant Commander Alexander Bryan Gillett of the Royal Australian Navy, testified about the alleged bribery scheme.
This long-running fraud and bribery investigation has resulted in federal criminal charges against 34 U.S. Navy officials, defense contractors and the GDMA corporation. Twenty-nine previously pleaded guilty. With today’s four convictions, 33 defendants have now been convicted of various fraud and corruption offenses.
U.S. District Judge Janis L. Sammartino set a status hearing for July 21, 2022, at 2 p.m. A sentencing hearing is scheduled for October 11, 2022, at 9 a.m.
DEFENDANTS Case Number: 17CR0623-JLS
Captain David Newland Age 60 San Antonio, Texas
Chief of Staff to the Commander of the Seventh Fleet
Captain James Dolan Age 58 Gettysburg, Pennsylvania
Assistant Chief of Staff for Logistics for the Seventh Fleet
Captain David Lausman Age 62 The Villages, Florida
Commanding Officer of U.S.S. Blue Ridge; Commanding Officer of U.S.S. George Washington
Commander Mario Herrera Age 48 Helotes, Texas
Fleet Operations and Schedules Officer for the Seventh Fleet
SUMMARY OF CHARGES
Conspiracy to Commit Bribery, in violation of 18 U.S.C. § 371
Maximum Penalty: Five years in prison, a $250,000 fine, or twice the gross pecuniary gain or twice the gross pecuniary loss, whichever is greater
*All defendants
Bribery, in violation of 18 U.S.C. § 201
Maximum Penalty: Fifteen years in prison, a $250,000 fine or twice the gross pecuniary gain or gross pecuniary loss from the offense, or three times the monetary equivalent of the thing of value, whichever is greater
*All defendants
Obstruction of Justice, in violation of 18 U.S.C. § 1519
Maximum Penalty: Twenty years in prison, a $250,000 fine
*Lausman
Conspiracy to Commit Honest Services Wire Fraud, in violation of 18 U.S.C. §§ 1349, 1346, 1343
Maximum Penalty: Twenty years in prison, a $250,000 fine
For Further Information, Contact:Assistant U. S. Attorney Benjamin Katz (619) 546-9604
SAN DIEGO –Nathan Dulley and Andrew Dulley, brothers from Los Angeles, California, pleaded guilty today for their role in trafficking drugs for former USC football player Owen Hanson’s “ODOG” Enterprise, an international drug trafficking, money laundering and illegal gambling syndicate that operated in the United States, Central and South America, and Australia from 2012 to 2016.
According to court records, the ODOG Enterprise trafficked thousands of kilograms of cocaine, heroin, methamphetamine, MDMA (also known as “ecstasy”), and other drugs, routinely distributing controlled substances at wholesale and retail levels around the world. The Dulley brothers, who imported and exported fine chocolate, played an integral role in the ODOG Enterprise by shipping large quantities of cocaine from the United States to Australia. Upon receipt of cocaine from Hanson or his associates – usually in quantities of tens of kilograms or more – the Dulleys would intermix and package the cocaine with legitimate merchandise, so as to disguise the true contents from the shipper and customs authorities. Using their established import/export routes, the Dulleys would then send the cocaine to Australia, where it was distributed and sold by other members of the ODOG Enterprise.
“Transnational racketeering organizations represent a clear and present danger to the safety and security of our communities. Those who assist such criminal enterprises by allowing the corruption of their otherwise legitimate businesses will be held accountable for the harm wrought on our communities,” said U.S. Attorney Adam Braverman.
So far, all 22 other defendants charged in connection with this case have pleaded guilty, including:
Owen Hanson, the founder of the ODOG Enterprise. Hanson was sentenced to more than 21 years in prison and ordered to pay a criminal forfeiture in the amount of $5,000,000, including $100,000 in gold and silver coins, a Porsche Panamera, two Range Rovers, luxury watches, homes in Costa Rica, Peru, and Cabo San Lucas, a sailboat, and interests in several businesses.
Giovanni (“Tank”) Brandolino, Hanson’s second in command. Brandolino was sentenced in February 2018 to 87 months in prison, followed by three years of supervised release.
Luke Fairfield, a San Diego based Certified Public Accountant who assisted Hanson with laundering the proceeds of his various illegal endeavors by setting up shell corporations and advising members of the Enterprise on how to structure bank transactions to avoid law enforcement. On October 2, 2018, Fairfield was sentenced to 21 months in prison.
Derek Loville, a former professional football player, who pleaded guilty to distributing retail quantities of drugs for the ODOG Enterprise in Arizona. In July 2017, Loville was sentenced to 15 months in prison and a $5,000 fine.
Daniel Portley-Hanks, a Los Angeles-based private investigator who assisted Hanson with tracking down delinquent gamblers and other individuals who owed the enterprise money. Portley-Hanks pleaded guilty and was sentenced to 16 months in prison.
Jack Rissell, an “enforcer” who, in one instance, travelled from Southern California to Minneapolis to attack a delinquent gambler in front of his family was sentenced to 24 months in prison.
Sentencing for both Nathan Dulley and Andrew Dulley is set for January 22, 2019, before District Judge William Q. Hayes.
The case arose out of a joint investigation by FBI, DEA, and the New South Wales (Australia) Police Force in conjunction with the New South Wales Crime Commission. Assistant U.S. Attorneys Andrew P. Young, Benjamin Katz and Mark W. Pletcher are prosecuting the case.
DEFENDANT Case Number: 18CR4207-WQH
Nathan Dulley Age: 36
Andrew Dulley Age: 34
SUMMARY OF CHARGES
Count 1
Conspiracy to Distribute Cocaine, 21 U.S.C. § 846, 841(a)(1)
Maximum penalty: 20 years’ prison, $1,000,000 fine, lifetime of supervised release.
AGENCY
Federal Bureau of Investigation – San Diego Field Office
Description: The fiscal year of the data file obtained from the AOUSC
Format: YYYY
Description: The code of the federal judicial circuit where the case was located
Format: A2
Description: The code of the federal judicial district where the case was located
Format: A2
Description: The code of the district office where the case was located
Format: A2
Description: Docket number assigned by the district to the case
Format: A7
Description: A unique number assigned to each defendant in a case which cannot be modified by the court
Format: A3
Description: A unique number assigned to each defendant in a case which can be modified by the court
Format: A3
Description: A sequential number indicating whether a case is an original proceeding or a reopen
Format: N5
Description: Case type associated with the current defendant record
Format: A2
Description: A concatenation of district, office, docket number, case type, defendant number, and reopen sequence number
Format: A18
Description: A concatenation of district, office, docket number, case type, and reopen sequence number
Format: A15
Description: The status of the defendant as assigned by the AOUSC
Format: A2
Description: A code indicating the fugitive status of a defendant
Format: A1
Description: The date upon which a defendant became a fugitive
Format: YYYYMMDD
Description: The date upon which a fugitive defendant was taken into custody
Format: YYYYMMDD
Description: The date when a case was first docketed in the district court
Format: YYYYMMDD
Description: The date upon which proceedings in a case commenced on charges pending in the district court where the defendant appeared, or the date of the defendant’s felony-waiver of indictment
Format: YYYYMMDD
Description: A code used to identify the nature of the proceeding
Format: N2
Description: The date when a defendant first appeared before a judicial officer in the district court where a charge was pending
Format: YYYYMMDD
Description: A code indicating the event by which a defendant appeared before a judicial officer in the district court where a charge was pending
Format: A2
Description: A code indicating the type of legal counsel assigned to a defendant
Format: N2
Description: The title and section of the U.S. Code applicable to the offense committed which carried the highest severity
Format: A20
Description: A code indicating the level of offense associated with FTITLE1
Format: N2
Description: The four digit AO offense code associated with FTITLE1
Format: A4
Description: The four digit D2 offense code associated with FTITLE1
Format: A4
Description: A code indicating the severity associated with FTITLE1
Format: A3
Description: The FIPS code used to indicate the county or parish where an offense was committed
Format: A5
Description: The date of the last action taken on the record
Format: YYYYMMDD
Description: The date upon which judicial proceedings before the court concluded
Format: YYYYMMDD
Description: The date upon which the final sentence is recorded on the docket
Format: YYYYMMDD
Description: The date upon which the case was closed
Format: YYYYMMDD
Description: The number of days from the earlier of filing date or first appearance date to proceeding date
Format: N3
Description: The number of days from proceeding date to disposition date
Format: N3
Description: The number of days from disposition date to sentencing date
Format: N3
Description: The code of the district office where the case was terminated
Format: A2
Description: A code indicating the type of legal counsel assigned to a defendant at the time the case was closed
Format: N2
Description: The title and section of the U.S. Code applicable to the offense that carried the most severe disposition and penalty under which the defendant was disposed
Format: A20
Description: A code indicating the level of offense associated with TTITLE1
Format: N2
Description: The four digit AO offense code associated with TTITLE1
Format: A4
Description: The four digit D2 offense code associated with TTITLE1
Format: A4
Description: A code indicating the severity associated with TTITLE1
Format: A3
Description: The code indicating the nature or type of disposition associated with TTITLE1
Format: N2
Description: The number of months a defendant was sentenced to prison under TTITLE1
Format: N4
Description: A code indicating whether the prison sentence associated with TTITLE1 was concurrent or consecutive in relation to the other counts in the indictment or information or multiple counts of the same charge
Format: A4
Description: The number of months of probation imposed upon a defendant under TTITLE1
Format: N4
Description: A period of supervised release imposed upon a defendant under TTITLE1
Format: N3
Description: The fine imposed upon the defendant at sentencing under TTITLE1
Format: N8
Description: The total prison time for all offenses of which the defendant was convicted and prison time was imposed
Format: N4
Description: The total fine imposed at sentencing for all offenses of which the defendant was convicted and a fine was imposed
Format: N8
Description: A count of defendants filed including inter-district transfers
Format: N1
Description: A count of defendants filed excluding inter-district transfers
Format: N1
Description: A count of original proceedings commenced
Format: N1
Description: A count of defendants filed whose proceedings commenced by reopen, remand, appeal, or retrial
Format: N1
Description: A count of defendants terminated including interdistrict transfers
Format: N1
Description: A count of defendants terminated excluding interdistrict transfers
Format: N1
Description: A count of original proceedings terminated
Format: N1
Description: A count of defendants terminated whose proceedings commenced by reopen, remand, appeal, or retrial
Format: N1
Description: A count of defendants pending as of the last day of the period including long term fugitives
Format: N1
Description: A count of defendants pending as of the last day of the period excluding long term fugitives
Format: N1
Description: The source from which the data were loaded into the AOUSC’s NewSTATS database
Format: A10
Description: A sequential number indicating the iteration of the defendant record
Format: N2
Description: The date the record was loaded into the AOUSC’s NewSTATS database
Format: YYYYMMDD
Description: Statistical year ID label on data file obtained from the AOUSC which represents termination year
Assistant U. S. Attorneys Andrew Young (619) 546-7981, Benjamin J. Katz (619) 546-9604 and Mark W. Pletcher (619) 546-9714
NEWS RELEASE SUMMARY – October 2, 2018
SAN DIEGO – Luke Fairfield, a San Diego-based Certified Public Accountant, was sentenced today to 21 months in prison for his role in the criminal enterprise led by former USC football player Owen Hanson – an international drug trafficking, gambling, and money laundering organization known as “ODOG.”
Hanson operated ODOG in the United States, Central and South America, and Australia from 2012 to 2016, trafficking in thousands of kilograms of cocaine, heroin, methamphetamine, MDMA (also known as “ecstasy”), and other illegal drugs in wholesale and retail quantities. The ODOG enterprise also operated a vast illegal gambling network focused on high-stakes wagers placed on sporting events. To carry out its gambling operation, the ODOG enterprise employed numerous bookies and money runners, and in the event a customer did not pay his gambling debt, the ODOG enterprise employed enforcers to threaten, intimidate, and injure its own customers in order to force compliance.
As Fairfield admitted when pleading guilty in March of 2017, his role in the ODOG enterprise included laundering money, aiding in the creation of shell companies to hide ODOG’s criminal proceeds, and training ODOG money runners on methods and tactics to hide the enterprise’s activities from law enforcement and banks. On one occasion, Fairfield personally transferred proceeds of Hanson’s Australian drug trafficking to the United States using an alias and fake identification. Fairfield also worked with Hanson to track the collection of debts from bookies and gamblers who owed the ODOG enterprise hundreds of thousands of dollars from illegal bookmaking.
Because of this conviction, Fairfield is no longer licensed as a CPA. The defendant, who is free on bond, was ordered to surrender on November 9, 2018.
“Transnational racketeering organizations like Hanson’s are a threat to the safety and security of our communities, and we are committed to prosecuting the corrupt professionals, like Fairfield, who use their specialized skills to help criminal organizations,” said U.S. Attorney Adam Braverman.
“Money laundering is the grease that allows the wheels of Transnational Criminal Organizations to turn,” said John Brown, FBI Special Agent in Charge of the San Diego Field Office. “Today’s sentencing of Fairfield sends a clear message that business professionals who facilitate the finances of these organizations not only risk losing their professional licenses but also face the prospect of time in prison. This conviction would not have been possible without the significant contributions of the Internal Revenue Service and the New South Wales Police Force.”
Fairfield is the last of 22 defendants charged in the case to be sentenced. The case arose out of a joint investigation by FBI, DEA, and the New South Wales (Australia) Police Force in conjunction with the New South Wales Crime Commission. Assistant U.S. Attorneys Andrew P. Young, Benjamin Katz and Mark W. Pletcher are prosecuting the case, with assistance from DOJ’s Office of International Affairs.
Maximum penalty: 20 years in prison, fine of $250,000 or twice the gross gain or loss caused by the offense, forfeiture of any property obtained or operated by RICO enterprise, 3 years’ supervised release.
AGENCIES
Federal Bureau of Investigation – San Diego Field Office
Assistant U. S. Attorneys Andrew P. Young (619) 546-7981,Benjamin Katz (619) 546-9604 or Mark W. Pletcher (619) 546-9714
NEWS RELEASE SUMMARY – January 10, 2016
SAN DIEGO – Owen Hanson, leader of the violent “ODOG Enterprise,” pleaded guilty today to conspiring to operate an international drug trafficking, gambling and money laundering enterprise in the United States, Central and South America and Australia from 2012 to 2016.
According to his plea agreement, ODOG Enterprise trafficked hundreds of kilograms of cocaine, heroin, methamphetamine, MDMA (also known as “ecstasy”), anabolic steroids and Human Growth Hormone (“HGH”). As Hanson admitted, ODOG Enterprise’s drug operation routinely distributed controlled substances at wholesale and retail levels, including selling performance enhancing drugs to numerous professional athletes. The ODOG Enterprise also operated a vast illegal gambling operation focused on high-stakes wagers placed on sporting events. The Enterprise used threats and violence against its gambling and drug customers to force compliance.
Three of Hanson’s associates also pleaded guilty today: Giovanni Brandolino (aka “Tank”), Marlyn Villarreal and Jeff Bellandi.
In one instance discussed in court papers, an individual who owed the ODOG Enterprise more than $2 million received a DVD showing a beheading, and a photo of his desecrated family’s gravestone, in an effort to collect the alleged debt. Hanson pleaded guilty today to conspiring to operate the ODOG enterprise, in violation of the Racketeer Influenced and Corrupt Organization (“RICO”) statute, and to conspiring to distribute controlled substances.
Brandolino, the second-highest ranking member of the ODOG Enterprise, pleaded guilty to conspiracy to violate RICO and conspiracy to commit money laundering. As part of the plea agreement Brandolino admitted that he assisted Hanson with the importation and distribution of hundreds of kilograms of cocaine and heroin. Brandolino specifically admitted establishing a drug distribution network in New Jersey and New York. Villarreal and Bellandi also pleaded guilty to conspiracy to commit money laundering.
So far, 16 of the 22 defendants charged in connection with this case have pleaded guilty, including Daniel Portley-Hanks, Jack Rissell, Kenny Hilinski, and Rufus Rhone. Portley-Hanks, a Los Angeles based private investigator who assisted Hanson with tracking down delinquent gamblers and other individuals who owed the enterprise money, pleaded guilty to extortion on December 27, 2016. Jack Rissell, labeled as an “enforcer” in the Superseding Indictment, also pleaded guilty to extortion on December 17, 2016. Kenny Hilinski, Hanson’s associate, pleaded guilty to the RICO conspiracy on May 24, 2016. Hilinski operated much of the gambling apparatus from Peru where he maintained various gambling websites, coordinated the collection of payments from various bookies and gamblers, and directed the organization’s runners to distribute the proceeds to Hanson through shell companies and cash deliveries. Portley-Hanks, Rissell, and Hilinski are awaiting sentencing.
Rhone, who pleaded guilty to conspiracy to distribute methamphetamine and cocaine early last year, was sentenced on September 19, 2016 to 72 months in prison.
The remaining defendants are set for trial on February 14, 2017. Luke Fairfield, a San Diego based Certified Public Accountant is accused of assisting Hanson with laundering the proceeds of his various illegal endeavors by, in part, setting up shell corporations and advising members of the Enterprise on how to structure bank transactions to avoid detection by bank security and law enforcement. Derek Loville, a former professional football player, is accused of distributing retail quantities of drugs for the ODOG Enterprise in Arizona. Dylan Anderson and Khalid Petras, the other two remaining defendants, are accused of running an illegal gambling business. charges against these four defendants are merely accusations, and they are considered innocent unless and until proven guilty.
The case arose out of a joint investigation by FBI, IRS and the New South Wales (Australia) Police Force in conjunction with the New South Wales Crime Commission. Hanson was initially indicted and arrested on September 9, 2015 after arranging the delivery of five kilograms of cocaine and five kilograms of methamphetamine. Eight individuals in Australia have been arrested in connection with Hanson’s global organization. Assistant U. S. Attorneys Andrew P. Young, Benjamin Katz and Mark W. Pletcher are prosecuting the case.
Maximum penalty: Life in prison, fine of $250,000 or twice the gross gain or loss caused by the offense, forfeiture of any property obtained or operated by RICO enterprise, five years of supervised release.
Count II (Defendants Bellandi and Villarreal)
Illegal Gambling Business, 18 U.S.C. § 1955
Maximum penalty: Five years in prison, fine of $250,000 or twice the gross gain or loss caused by the offense, forfeiture of proceeds, three years of supervised release.
Count 3 (Defendants Brandolino, Villarreal and Bellandi)
Money Laundering Conspiracy, 18 U.S.C. § 1956(h)
Maximum penalty: Twenty years in prison, fine of $500,000 or twice the gross gain or loss caused by the offense, forfeiture of property involved in the offense, three years of supervised release.
Count 4 (Defendant Hanson)
Conspiracy to Distribute Narcotics, 21 U.S.C. § 841(a)(1) and 846
Maximum penalty: Life in prison, fine of $20 million or twice the gross gain or loss caused by the offense, forfeiture of any proceeds, 10 years of supervised release.
AGENCY
Federal Bureau of Investigation – San Diego Field Office
Case Name: USA v. Ramos et al (a/k/a Phantom Secure)
Press Releases:
Assistant U. S. Attorneys Andrew Young (619) 546-7981, Benjamin J. Katz (619) 546-9604, Mark W. Pletcher (619) 546-9714
NEWS RELEASE SUMMARY – May 28, 2019
SAN DIEGO – Vincent Ramos, the chief executive of Canada-based Phantom Secure, was sentenced to nine years in prison today for leading a criminal enterprise that facilitated the transnational importation and distribution of narcotics through the sale of encrypted communication devices and services. The Court also ordered Ramos to forfeit $80 million as proceeds of the crime, as well as specifically identified assets, including international bank accounts, real estate, cryptocurrency accounts, and gold coins.
This conviction marks the first time the United States targeted a company and convicted its chief executive for knowingly providing transnational criminal organizations with the encrypted infrastructure to conduct the international importation and distribution of narcotics.
“Vincent Ramos is going to prison because he provided violent, drug trafficking organizations with a high tech tool that enabled them to coordinate their crimes while staying in the shadows,” said U.S. Attorney Robert Brewer. “But Ramos’s system is down permanently, he has forfeited his wealth, and he is going to prison for nearly a decade. We will continue to investigate and prosecute these individuals, whether they are the ones transporting and selling drugs, or providing the tools to those who do.”
“I want to thank prosecutors Andrew Young, Ben Katz and Mark Pletcher, as well as the FBI, DEA, Customs and Border Protection, Homeland Security Investigations, U.S. Marshals Service, Washington State Police, the Bellingham and Blaine Police Departments, and all of our law enforcement partners around the world, including Australia, Canada, Panama, Hong Kong, and Thailand for their hard work on this case,” Brewer said.
“Striking at the heart of organized crime has always been a priority for the FBI,” said Scott Brunner, FBI Special Agent in Charge of the San Diego Field Office. “This case demonstrates that no matter the dangerous criminal activity or the advanced technology used by these sophisticated criminal enterprises, the FBI will keep pace to infiltrate and dismantle the organizations that, in today’s world, operate domestically and internationally. As a result, the FBI joins forces with exceptional law enforcement partners both in the U.S. and abroad, to ensure every tentacle of the global enterprise is severed and cannot operate its illegal and dangerous crimes.”
Ramos advertised Phantom Secure’s products as impervious to decryption, wiretapping or legal third-party records requests. Phantom Secure routinely deleted and destroyed evidence from devices that it knew had been seized by law enforcement. According to Court documents, Phantom Secure’s clients used email handles like the following to conduct criminal activities: leadslinger@freedomsecure.me; The.cartel@freedomsecure.me; The.killa@freedomsecure.me; Trigger-happy@lockedpgp.com; Knee_capper9@lockedpgp.com; Elchapo66@lockedpgp.com; Time4a187@freedomsecure.me.
According to court documents, one of Ramos’s customers, Owen Hanson (who was previously sentenced to 21 years in custody), used only six Phantom Secure devices to coordinate the transportation of more than a ton of cocaine from Mexico into the United States and on to Canada and Australia. The government conservatively estimates there were at least 7,000 Phantom Secure devices in use at the time Ramos was arrested--meaning that “the amount of drugs Phantom Secure aided and abetted in transporting by providing devices and services to criminals worldwide was too high calculate.”
Ramos’ customers used his products to devastating and sometimes deadly effect, and Ramos used this to market his encryption services to criminals across the world. According to court documents, in response to a March 5, 2014 news article that reported investigations of a gangland murder were stymied because the suspects used Phantom Secure devices to coordinate the killing, Ramos wrote, “this is the best verification on what we have been saying all along – proven and effective for now over nine years. It is the highest level of authority confirming our effectiveness. It can’t get better than that.”
The international operation to arrest Ramos and seize Phantom Secure’s infrastructure involved cooperation and efforts by law enforcement authorities in the United States, Australia, and Canada, with additional assistance from U.S. and foreign law enforcement in Panama, Hong Kong, and Thailand.
Ramos’s co-defendants - Kim Augustus Rodd, Younes Nasri, Michael Gamboa and Christopher Poquiz – remain international fugitives, charged with participating in and aiding and abetting a racketeering enterprise and conspiring to import and distribute controlled substances around the world. All have been charged with Conspiracy to Commit RICO in violation of 18 U.S.C. § 1962 and Conspiracy to Distribute Controlled Substances in violation of 21 U.S.C. § 841 and 846.
In addition to our foreign law enforcement partners, the U.S. Attorney’s Office further recognizes the support and assistance of the U.S. Drug Enforcement Administration; United States Marshals Service; U.S. Customs and Border Protection; the United States Department of Homeland Security; Seattle and Las Vegas field offices of the Federal Bureau of Investigation; the Washington State Police Department; the City of Bellingham, Washington Police Department; the City of Blaine, Washington Police Department; and the Canada Border Services Agency, among others, without whose help this prosecution could not have been possible.
This case is the result of ongoing efforts by the Organized Crime Drug Enforcement Task Force (OCDETF), a partnership that brings together the combined expertise of federal, state and local law enforcement. The principal mission of the OCDETF program is to identify, disrupt, dismantle and prosecute high-level members of drug trafficking, weapons trafficking, and money laundering organizations and enterprises.
DEFENDANT Case Number 18CR1404-WQH
Vincent Ramos (1) Richmond, British Columbia, Canada
aka “CEO”
aka “Business”
SUMMARY OF CHARGES
Racketeering Conspiracy (RICO Conspiracy), in violation of 18 U.S.C. § 1962(d)
Maximum Penalty: 20 years in prison
AGENCIES
Federal Bureau of Investigation
Drug Enforcement Administration
United States Marshals Service
Department of Justice, Office of International Affairs
Australian Federal Police
New South Wales Police (Australia)
New South Wales Crime Commission (Australia)
Australian Criminal Intelligence Commission
Royal Canadian Mounted Police
International Assistance Group, Department of Justice, Canada
Assistant U. S. Attorneys Andrew Young (619) 546-7981, Mark W. Pletcher (619) 546-9714 and Benjamin J. Katz (619) 546-9604
NEWS RELEASE SUMMARY – October 2, 2018
SAN DIEGO – Vincent Ramos, the chief executive of Canada-based Phantom Secure, pleaded guilty today to leading a criminal enterprise that facilitated the transnational importation and distribution of narcotics through the sale and service of encrypted communications devices.
In his plea agreement, Ramos admitted that he and his co-conspirators facilitated the distribution of cocaine, heroin, and methamphetamine to locations around the world including in the United States, Australia, Mexico, Canada, Thailand and Europe by supplying narcotics traffickers with Phantom Secure encrypted communications devices designed to thwart law enforcement. To keep the communications out of the reach of law enforcement, Ramos and others maintained Phantom Secure servers in Panama and Hong Kong, used virtual proxy servers to disguise the physical location of its servers, and remotely deleted or “wiped” devices seized by law enforcement. Ramos and his co-conspirators required a personal reference from an existing client to obtain a Phantom Secure device. And Ramos used digital currencies, including Bitcoin, to facilitate financial transactions for Phantom Secure to protect users’ anonymity and launder proceeds from Phantom Secure. Ramos admitted that at least 450 kilograms of cocaine were distributed using Phantom Secure devices.
As part of his guilty plea, Ramos agreed to an $80 million forfeiture money judgment as well as the forfeiture of tens of millions of dollars in identified assets, ranging from bank accounts worldwide, to houses, to a Lamborghini, to cryptocurrency accounts, to gold coins. In addition, Ramos agreed to forfeit the server licenses and over 150 domains which were being used to operate the infrastructure of the Phantom Secure network, enabling it to send and receive encrypted messages for criminals.
“The Phantom Secure encrypted communication service was designed with one purpose – to provide drug traffickers and other violent criminals with a secure means by which to communicate openly about criminal activity without fear of detection by law enforcement,” said U.S. Attorney Adam Braverman. “As a result of this investigation, Phantom Secure has been dismantled and its CEO Vincent Ramos now faces a significant prison sentence. The United States will investigate and prosecute anyone who provides support, in any form, to criminal organizations, including those who try to help criminal organizations ‘go dark’ on law enforcement.”
“Today’s guilty plea of Phantom Secure’s CEO, Vincent Ramos, is a significant strike against transnational organized crime,” said John Brown, FBI Special Agent in Charge of the San Diego Field Office. “The FBI and our international law enforcement partners have demonstrated that we will not be deterred by those who exploit encryption to benefit criminal organizations and assist in evading law enforcement. With this case, we have successfully shut down the communication network of dangerous criminals who operated across the globe.”
Ramos’s co-defendants - Kim Augustus Rodd, Younes Nasri, Michael Gamboa and Christopher Poquiz – remain international fugitives, charged with participating in and aiding and abetting a racketeering enterprise and conspiring to import and distribute controlled substances around the world. All have been charged with Conspiracy to Commit Racketeering in violation of 18 U.S.C. § 1962 and Conspiracy to Distribute Controlled Substances in violation of 21 U.S.C. § 841 and 846.
Ramos is scheduled to be sentenced on December 17, 2018 before U.S. District Judge Sentencing was set for December 17 before Judge Hayes
This case was investigated by FBI San Diego. In addition to our foreign law enforcement partners, the U.S. Attorney’s Office further recognizes the support and assistance of the U.S. Drug Enforcement Administration; Customs and Border Protection; the Department of Homeland Security; Seattle and Las Vegas field offices of the Federal Bureau of Investigation; the Washington State Police Department; the City of Bellingham, Washington Police Department; the City of Blaine, Washington Police Department; and the Canada Border Services Agency, among others, without whose help this prosecution could not have been possible.
This case is the result of ongoing efforts by the Organized Crime Drug Enforcement Task Force (OCDETF), a partnership that brings together the combined expertise of federal, state and local law enforcement. The principal mission of the OCDETF program is to identify, disrupt, dismantle and prosecute high-level members of drug trafficking, weapons trafficking, and money laundering organizations and enterprises.
DEFENDANT Case Number 18CR1404-WQH
Vincent Ramos (1) Richmond, British Columbia, Canada
aka “CEO”
aka “Business”
SUMMARY OF CHARGES
Racketeering Conspiracy (RICO Conspiracy), in violation of 18 U.S.C. § 1962(d)
Maximum Penalty: 20 years prison
AGENCIES
Federal Bureau of Investigation
Drug Enforcement Administration
Department of Justice, Office of International Affairs
Australian Federal Police
New South Wales Police (Australia)
New South Wales Crime Commission (Australia)
Australian Criminal Intelligence Commission
Royal Canadian Mounted Police
International Assistance Group, Department of Justice, Canada
Assistant U. S. Attorneys Andrew P. Young (619) 546-7981, Mark W. Pletcher (619) 546-9714 and Benjamin J. Katz (619) 546-9604
NEWS RELEASE SUMMARY – March 15, 2018
SAN DIEGO – Vincent Ramos, the chief executive of Canada-based Phantom Secure, and four of his associates were indicted by a federal grand jury today on charges that they knowingly and intentionally participated in a criminal enterprise that facilitated the transnational importation and distribution of narcotics through the sale and service of encrypted communications.
This is the first time the U.S. government has targeted a company and its principals for knowingly and intentionally conspiring with criminal organizations by providing them with the technological tools to evade law enforcement and obstruct justice while committing transnational drug trafficking.
“With one American dying of a drug overdose every nine minutes, our great nation is suffering the deadliest drug epidemic in our history,” Attorney General Jeff Sessions said. “Incredibly, some have sought to profit off of this crisis, including by specifically taking advantage of encryption technologies to further criminal activity, and to obstruct, impede, and evade law enforcement, as this case illustrates. The Department of Justice will aggressively prosecute not just drug traffickers, but those who help them spread addiction and death in our communities. I want to thank the FBI, DEA, Customs and Border Protection, Homeland Security Investigations, Washington State Police, the Bellingham and Blaine Police Departments, and all of our law enforcement partners around the world, including Australia, Canada, Panama, Hong Kong, and Thailand for their hard work on this case. Today's indictment sends a clear message that drug traffickers and criminals cannot hide, because we will hunt them down and find them wherever they are.”
“When criminals go dark, and law enforcement cannot monitor their phones or access evidence, crimes cannot be solved, criminals cannot be stopped and lives can be lost,” said U.S. Attorney Adam Braverman. “As a result of this groundbreaking prosecution, we will disable the communication infrastructure provided by a criminal enterprise to drug traffickers and other violent criminals. Phantom Secure was designed to profit off of criminal activity committed by transnational criminal organizations around the world. We are committed to shutting these criminals down.”
“The indictment of Vincent Ramos and his associates is a milestone against transnational crime,” said FBI Director Christopher Wray. “Phantom Secure allegedly provided a service designed to allow criminals the world over to evade law enforcement to traffic drugs and commit acts of violent crime without detection. Ramos and his company made millions off this criminal activity, and our takedown sends a serious message to those who exploit encryption to go dark on law enforcement. I want to thank our partners at the Department of Justice, as well as our Australian and Canadian law enforcement partners, for their incredible work on this case.”
“Hidden or undetected communication is key for any transnational organized crime network,” said John A. Brown, FBI Special Agent in Charge of the San Diego Field Office. “This case highlights how criminal enterprises, like Phantom Secure, knowingly provided advanced technology and encrypted private networks to transnational criminal operations in order to evade law enforcement. This break-through investigation has undoubtedly disrupted countless criminal organizations from operating their illegal and dangerous operations in the United States and abroad because their communications mechanism has been shut down. This indictment shows the impact law enforcement, working together across the globe, can have on transnational organized criminal groups. The San Diego Division of the FBI would like to recognize and thank our international law enforcement partners, who built this international case with exceptional and dedicated collaboration.”
Ramos was taken into custody in Bellingham, Washington, on March 7. Ramos made his first appearance in the Western District of Washington and will face charges in San Diego. The remaining four defendants are fugitives.
According to court documents, Phantom Secure advertised its products as impervious to decryption, wiretapping or legal third-party records requests. Phantom Secure also guaranteed the destruction of evidence contained within a device if it was compromised, either by an informant or because it fell into the hands of law enforcement. According to court documents, Phantom Secure’s clients used email handles like the following to conduct criminal activities:
leadslinger@freedomsecure.me
The.cartel@freedomsecure.me
The.killa@freedomsecure.me
narco@lockedpgp.com
Trigger-happy@lockedpgp.com
Knee_capper9@lockedpgp.com
Elchapo66@lockedpgp.com
Time4a187@freedomsecure.me
The indictment alleges that as a result of its efforts to facilitate international crime, Phantom Secure has generated approximately $80 million in annual revenue since 2008 and facilitated drug trafficking, obstruction of justice, and violent crime around the world.
The international operation to arrest the company’s chief executive and seize Phantom Secure’s infrastructure involved cooperation and efforts by law enforcement authorities in the United States, Australia, Canada, with additional assistance from U.S. and foreign law enforcement in Panama, Hong Kong, and Thailand.
Over the past two weeks, in cooperation with Australian Federal Police and Royal Canadian Mounted Police, more than 250 agents around the globe conducted approximately 25 searches of houses and offices of Phantom Secure associates in Los Angeles, Las Vegas, Miami, and in Australia and Canada, seizing Phantom Secure devices, assets, and evidence of the charged crimes. The coordinated effort led to the seizure of servers, computers, cell phones, and Phantom Secure devices used to operate the Phantom Secure network, as well as drugs and weapons.
Ramos and the others - Kim Augustus Rodd, Younes Nasri, Michael Gamboa and Christopher Poquiz - are charged with participating in and aiding and abetting a racketeering enterprise and conspiring to import and distribute controlled substances around the world. The defendants have been charged with Conspiracy to Commit RICO in violation of 18 U.S.C. § 1962 and Conspiracy to Aid and Abet the Distribution of Controlled Substances in violation of 21 U.S.C. § 841 and 846.
Authorities have seized Phantom Secure’s property, including more than 150 domains and licenses which were being used by transnational criminal organizations to send and receive encrypted messages. Authorities also seized bank accounts and property in Los Angeles, California and Las Vegas, Nevada.
This case stems from an investigation in the Southern District of California of a Phantom Secure client who used Phantom devices to coordinate shipments of thousands of kilograms of cocaine and other drugs throughout the globe. According to court documents, there were an estimated 10,000 to 20,000 Phantom devices in use worldwide before the authorities dismantled the company. This coordinated action means Phantom Secure’s clients can no longer use these devices to commit crimes.
According to Timothy O’Connor, Executive Director of the Criminal Investigations Division New South Wales Crime Commission, “The disruption of the Phantom Secure platform has been one of the most significant blows to organized crime in Australia.”
In addition to our foreign law enforcement partners, the U.S. Attorney’s Office further recognizes the support and assistance of the U.S. Drug Enforcement Administration; Customs and Border Protection; the Department of Homeland Security; Seattle and Las Vegas field office of the Federal Bureau of Investigation; the Washington State Police Department; the City of Bellingham, Washington Police Department; the City of Blaine, Washington Police Department; and the Canada Border Services Agency, among others, without whose help this prosecution could not have been possible.
Speaking on behalf of Australian law enforcement authorities, Australian Federal Police (AFP) Assistant Commissioner Organised Crime, Neil Gaughan said today Australia’s role in this complex and unique investigation began in early 2017 following an exchange of intelligence with the FBI and Royal Canadian Mounted Police (RCMP).
As a result, Australian authorities executed 19 search warrants across four states last week as part of the international action, where more than 1,000 encrypted mobile devices were seized.
“The action taken in the U.S. directly impacts the upper echelons of organized crime both here in Australia and offshore, who until now have been able to confidently control and direct illicit activity like drug importations, money laundering and associated serious criminal offending,” said Assistant Commissioner Gaughan.
“Our thanks go to our international partners – the FBI and RCMP – who have been outstanding in working methodically around the clock together with us on this unique investigation. Without their cooperation, commitment and shared singular drive, Australian law enforcement agencies would not be announcing this significant result today.”
Australian agencies involved in this investigation include the Australian Criminal Intelligence Commission, the New South Wales Crime Commission, state police from New South Wales, Victoria, Queensland, South Australia and Western Australia, the Australian Tax Office and financial intelligence agency AUSTRAC.
“This investigation is a prime example of law enforcement agencies from around the world working together to identify, investigate and charge people involved in transnational criminal activity,” says Assistant Commissioner Jim Gresham, RCMP Criminal Operations Officer, Investigative Services and Organized Crime. “We remain committed to investigating and disrupting these illegal activities that adversely affect each of our communities.”
This case is the result of ongoing efforts by the Organized Crime Drug Enforcement Task Force (OCDETF), a partnership that brings together the combined expertise and unique abilities of federal, state and local law enforcement agencies. The principal mission of the OCDETF program is to identify, disrupt, dismantle and prosecute high-level members of drug trafficking, weapons trafficking and money laundering organizations and enterprises.
DEFENDANTS
Vincent Ramos (1) Richmond, British Columbia Canada
aka “CEO”
aka “Business”
Kim Augustus Rodd (2) Phuket, Thailand
aka Visith Vongthai
aka “Snowstar”
aka “Global”
Younes Nasri (3) Dubai, United Arab Emirates
aka “Maestro”
aka “Jesse”
Michael Gamboa (4) Los Angeles, CA
aka “Chino”
Christopher Poquiz (5) Los Angeles, CA
aka “Caddy”
aka “Cad”
SUMMARY OF CHARGES
Racketeering Conspiracy to Conduct Enterprise Affairs (RICO Conspiracy), in violation of 18 USC §1962(d)
Maximum Penalty: Life in prison
Conspiracy to Aid and Abet the Distribution of Narcotics, in violation of 21 USC §841 and 846; Title 18 USC §2
Maximum Penalty: Life in prison
AGENCIES
Federal Bureau of Investigation
Drug Enforcement Administration
Department of Justice, Office of International Affairs
Australian Federal Police
New South Wales Police (Australia)
New South Wales Crime Commission (Australia)
Australian Criminal Intelligence Commission
Royal Canadian Mounted Police
International Assistance Group, Department of Justice, Canada
*The charges and allegations contained in an indictment or complaint are merely accusations, and the defendants are considered innocent unless and until proven guilty.
Description: The fiscal year of the data file obtained from the AOUSC
Format: YYYY
Description: The code of the federal judicial circuit where the case was located
Format: A2
Description: The code of the federal judicial district where the case was located
Format: A2
Description: The code of the district office where the case was located
Format: A2
Description: Docket number assigned by the district to the case
Format: A7
Description: A unique number assigned to each defendant in a case which cannot be modified by the court
Format: A3
Description: A unique number assigned to each defendant in a case which can be modified by the court
Format: A3
Description: A sequential number indicating whether a case is an original proceeding or a reopen
Format: N5
Description: Case type associated with the current defendant record
Format: A2
Description: A concatenation of district, office, docket number, case type, defendant number, and reopen sequence number
Format: A18
Description: A concatenation of district, office, docket number, case type, and reopen sequence number
Format: A15
Description: The status of the defendant as assigned by the AOUSC
Format: A2
Description: A code indicating the fugitive status of a defendant
Format: A1
Description: The date upon which a defendant became a fugitive
Format: YYYYMMDD
Description: The date upon which a fugitive defendant was taken into custody
Format: YYYYMMDD
Description: The date when a case was first docketed in the district court
Format: YYYYMMDD
Description: The date upon which proceedings in a case commenced on charges pending in the district court where the defendant appeared, or the date of the defendant’s felony-waiver of indictment
Format: YYYYMMDD
Description: A code used to identify the nature of the proceeding
Format: N2
Description: The date when a defendant first appeared before a judicial officer in the district court where a charge was pending
Format: YYYYMMDD
Description: A code indicating the event by which a defendant appeared before a judicial officer in the district court where a charge was pending
Format: A2
Description: A code indicating the type of legal counsel assigned to a defendant
Format: N2
Description: The title and section of the U.S. Code applicable to the offense committed which carried the highest severity
Format: A20
Description: A code indicating the level of offense associated with FTITLE1
Format: N2
Description: The four digit AO offense code associated with FTITLE1
Format: A4
Description: The four digit D2 offense code associated with FTITLE1
Format: A4
Description: A code indicating the severity associated with FTITLE1
Format: A3
Description: The title and section of the U.S. Code applicable to the offense committed which carried the second highest severity
Format: A20
Description: A code indicating the level of offense associated with FTITLE2
Format: N2
Description: The four digit AO offense code associated with FTITLE2
Format: A4
Description: The four digit D2 offense code associated with FTITLE2
Format: A4
Description: A code indicating the severity associated with FTITLE2
Format: A3
Description: The FIPS code used to indicate the county or parish where an offense was committed
Format: A5
Description: The date of the last action taken on the record
Format: YYYYMMDD
Description: The date upon which judicial proceedings before the court concluded
Format: YYYYMMDD
Description: The date upon which the final sentence is recorded on the docket
Format: YYYYMMDD
Description: The date upon which the case was closed
Format: YYYYMMDD
Description: The total fine imposed at sentencing for all offenses of which the defendant was convicted and a fine was imposed
Format: N8
Description: A count of defendants filed including inter-district transfers
Format: N1
Description: A count of defendants filed excluding inter-district transfers
Format: N1
Description: A count of original proceedings commenced
Format: N1
Description: A count of defendants filed whose proceedings commenced by reopen, remand, appeal, or retrial
Format: N1
Description: A count of defendants terminated including interdistrict transfers
Format: N1
Description: A count of defendants terminated excluding interdistrict transfers
Format: N1
Description: A count of original proceedings terminated
Format: N1
Description: A count of defendants terminated whose proceedings commenced by reopen, remand, appeal, or retrial
Format: N1
Description: A count of defendants pending as of the last day of the period including long term fugitives
Format: N1
Description: A count of defendants pending as of the last day of the period excluding long term fugitives
Format: N1
Description: The source from which the data were loaded into the AOUSC’s NewSTATS database
Format: A10
Description: A sequential number indicating the iteration of the defendant record
Format: N2
Description: The date the record was loaded into the AOUSC’s NewSTATS database
Format: YYYYMMDD
Description: Statistical year ID label on data file obtained from the AOUSC which represents termination year
SAN DIEGO – The Department of Justice announced today a series of measures to target and dismantle the Cartel Jalisco Nueva Generacion (CJNG) – one of the largest, most dangerous drug cartels currently operating in Mexico. As part of those measures, the U.S. Attorney’s Office for the Southern District of California, announces the indictment of CJNG leader, Juan Perez-Vargas, aka Piolin.
A federal grand jury in San Diego returned a sealed indictment on January 27, 2017, charging Perez-Vargas, with Conspiracy to Distribute Controlled Substances Intended for Importation, and Conspiracy to Import Controlled Substances. On January 30, 2017, the Clerk of the Court issued a sealed warrant for his arrest. On September 20, 2017, Perez-Vargas was arrested in Guadalajara, Mexico pursuant to these charges in the United States and is currently awaiting extradition to San Diego.
CJNG is one of the most powerful cartels in Mexico and the Department of Justice considers it to be one of the five most dangerous transnational criminal organizations in the world, responsible for trafficking numerous tons of cocaine, methamphetamine and fentanyl-laced heroin into the United States. Founded in 2011, CJNG has grown in size and strength rapidly since its inception. Today, the DEA estimates the CJNG exerts influence in 23 of 31 (75 percent) of Mexican states, including key drug production and transportation corridors. CJNG is also responsible for significant amounts of violence and loss of life in Mexico. CJNG gained its power in Mexico as a result of the organization’s disciplined command and control, sophisticated money laundering techniques, efficient drug transportation routes, and extreme violence. The cartel has also expanded globally, with significant presence and illicit business not only throughout the United States and Mexico, but also Europe, Asia, and Australia.
The unsealed indictment marks the conclusion of the initial phase of a multi-year OCDETF investigation. This joint Homeland Security Investigations (HSI) and Drug Enforcement Administration (DEA) investigation targeted the leadership elements, lieutenants, associates, and money launderers connected with CJNG, the Rafael Caro-Quintero (RCQ) DTO and Beltran Leyva Organization (BLO).
“With today’s announcement, the Attorney General has made clear the Department’s focus on dismantling transnational criminal organizations,” said U.S. Attorney Adam L. Braverman. “This indictment proves yet again that the Southern District of California will take the lead to relentlessly target and bring to justice the most significant drug kingpins no matter where they operate.”
U.S. Attorney Braverman also praised the outstanding work of the federal team from HSI Calexico / DEA Imperial County in the culmination of this investigation. U.S. Attorney Braverman also thanked Customs and Border Protection, the U.S. Marshals Service, the U.S. Department of Justice’s Office of Enforcement Operations and the Office of International Affairs for their ongoing assistance in this investigation.
“Today’s Indictment is an example of the dedicated and collaborative efforts by HSI Calexico and DEA Special Agents,” said David Shaw, Special Agent in Charge for HSI San Diego. “This joint effort allowed for the opportunity to narrow the investigation, identify more high level targets and significantly impact the cartel leadership structure. HSI agents remain committed to working with our partners and prosecutors in bringing additional members of this transnational criminal organization to justice.”
“Together with our law enforcement partners, DEA continues to target and take down some of the highest-level drug traffickers in the world,” said DEA San Diego Special Agent in Charge Karen Flowers. “CJNG is in our crosshairs and this indictment reflects that we will ensure that drug traffickers pay a very high price for their crimes.”
This case is also the result of the ongoing efforts by the Organized Crime Drug Enforcement Task Force (OCDETF) a partnership that brings together the combined expertise and unique abilities of federal, state and local law enforcement agencies. The principal mission of the OCDETF program is to identify, disrupt, dismantle and prosecute high-level members of drug trafficking, weapons trafficking and money laundering organizations and enterprises.
DEFENDANT Case Number 17CR219-CAB
Juan Perez-Vargas, aka Piolin Age: 37 Guadalajara, Mexico
SUMMARY OF CHARGES
Conspiracy to Distribute Controlled Substances for Purpose of Unlawful Importation, in violation of Title 21 U.S.C. §§ 959, 960 and 963; Term of custody including a mandatory minimum 10 years and up to life imprisonment, $10,000,000 fine and 5 years supervised release.
Conspiracy to Import Controlled Substances, in violation of Title 21 U.S.C. §§ 952, 960 and 963. Term of custody including a mandatory minimum 10 years and up to life imprisonment, $10,000,000 fine and 5 years supervised release.
AGENCIES
Homeland Security Investigations
Drug Enforcement Administration
Customs and Border Protection, Office of Field Operations
United States Marshals Service
Department of Justice, Organized Crime Drug Enforcement Task Forces
Department of Justice, Office of Enforcement Operations
Department of Justice, Office of International Affairs
Customs and Border Protection, Office of Border Patrol
Immigration and Customs Enforcement, Enforcement and Removal Operations
El Centro Police Department
Brawley Police Department
Imperial County District Attorney’s Office
Imperial Valley, Law Enforcement Coordination Center
*An indictment or complaint is not evidence that the defendant committed the crimes charged. The defendant is presumed innocent until the Government meets its burden in court of proving guilt beyond a reasonable doubt.
Assistant U.S. Attorneys Mark W. Pletcher (619) 546-9714 and Patrick Hovakimian (619) 546-9718
NEWS RELEASE SUMMARY – August 18, 2017
SAN DIEGO – U.S. Navy Captain Jesus Vasquez Cantu admitted in federal court today that he accepted bribes in the form of parties and prostitutes while sneaking proprietary information to foreign defense contractor Leonard Glenn Francis and his Singapore-based firm, Glenn Defense Marine Asia.
Twenty-eight individuals, including 21 current and former Navy officials and five civilian defendants, plus GDMA, the corporation, have been charged so far as part of the massive fraud and bribery investigation. Nineteen of these defendants have pleaded guilty. Nine defendants await trial.
Cantu, 59, of Silverdale, Washington, pleaded guilty to one count of conspiracy to commit bribery and is scheduled to be sentenced on November 9, 2017 before U.S. District Judge Janis L. Sammartino.
In his plea agreement, Cantu acknowledged that Francis took him and others out for drinks and dinners at posh restaurants, nightclubs and karaoke bars and paid for lavish hotel rooms and the services of prostitutes on numerous occasions in 2012 and 2013. Cantu admitted that he provided proprietary U.S. Navy information to Francis, and that he used his power and influence to help Francis and GDMA with their business.
“The number of U.S. Navy officials who participated in this conspiracy is astounding,” said Acting U.S. Attorney Alana W. Robinson. “Like so many others, this defendant sold out the Navy and his country for cocktails and karaoke. We are pressing forward in this investigation until we are certain that all involved have been held accountable.”
“The guilty plea of Jesus Cantu is another sad chapter in the largest fraud and corruption scandal in the U.S. Navy's history,” said Dermot O'Reilly, Deputy Inspector General for Investigations, Office of Inspector General, Department of Defense. “While the conduct of the vast majority of U.S. Navy personnel is beyond reproach, the unfortunate truth is that for years Leonard Francis and Glenn Defense Marine Asia, compromised the integrity of numerous members of the U.S. Navy. This investigation continues, and the Defense Criminal Investigative Service and its law enforcement partners will relentlessly pursue those individuals involved in this massive corruption scandal.”
NCIS Director Andrew Traver said of today’s events, “Captain Cantu, like others caught up in the GDMA scandal, dishonored his sworn oath of office. NCIS, in concert with our partner agencies, remains resolved to following the evidence wherever it may lead, to help hold accountable those who choose personal gratification over duty and professional responsibility.”
According to his plea agreement, Cantu served in the Navy until 2014. During the time he was accepting bribes from Francis in 2012 and 2013, Cantu was the deputy commander, Military Sealift Command (MSC) Far East in Singapore. He oversaw the MSC ships that provided logistical sustainment to Navy ships operating in the Seventh Fleet.
Cantu also admitted in his plea agreement that, in 2007, when he was the Assistant Chief of Staff for Logistics for the Commander of the U.S. Navy’s Seventh Fleet aboard the USS Blue Ridge, he and others participated in a bribery conspiracy with Francis. Cantu and other members of the conspiracy accepted more than $135,000 in meals, entertainment, travel and hotel expenses, and the services of prostitutes from Francis; in exchange, they worked together to help Francis as issues important to his business arose.
Cantu’s 2007 conduct described in the plea agreement is related to the March 2017 indictment of nine high-ranking Seventh Fleet U.S. Navy officers. Retired U.S. Navy Rear Admiral Bruce Loveless and others are accused of conspiring with Francis, trading military secrets and substantial influence for sex parties with prostitutes, extravagant dinners and luxury travel. The others include Captains David Newland, James Dolan, Donald Hornbeck and David Lausman; Colonel Enrico DeGuzman; Lt. Commander Stephen Shedd; Commander Mario Herrera and Chief Warrant Officer Robert Gorsuch. Their cases are pending.
The U.S. Navy’s Seventh Fleet represents a vital piece of the United States military’s projection of power as well as American foreign policy and national security. The largest numbered fleet in the U.S. Navy, the Seventh Fleet comprises 60-70 ships, 200-300 aircraft and approximately 40,000 Sailors and Marines. The Seventh Fleet is responsible for U.S. Navy ships and subordinate commands that operate in the Western Pacific throughout Southeast Asia, Pacific Islands, Australia, and Russia and the Indian Ocean territories, as well ships and personnel from other U.S. Navy Fleets that enter the Seventh Fleet’s area of responsibility. The USS Blue Ridge is the command ship of the Seventh Fleet and houses at-sea facilities for Seventh Fleet senior officials.
The other current or retired Navy officials charged so far in the fraud and bribery investigation are U.S. Navy Admiral Robert Gilbeau; Captain Michael Brooks; Captain Daniel Dusek; Commander Michael Misiewicz; Commander Jose Luis Sanchez; Commander Bobby Pitts; Commander David Kapaun; Lt. Commander Gentry Debord; Lt. Commander Todd Malaki; Petty Officer First Class Daniel Layug; NCIS Supervisory Special Agent John Beliveau; and Paul Simpkins, a former DoD civilian, who oversaw contracting in Singapore.
All have pleaded guilty. On Jan. 21, 2016, Layug was sentenced to 27 months in prison and a $15,000 fine; on Jan. 29, 2016, Malaki was sentenced to 40 months in prison and to pay $15,000 in restitution to the Navy and a $15,000 fine. On March 25, 2016, Dusek was sentenced to 46 months in prison and to pay $30,000 in restitution to the Navy and a $70,000 fine; and on April 29, 2016, Misiewicz was sentenced to 78 months in prison and to pay a fine of $100,000 and to pay $95,000 in restitution to the Navy. Beliveau was sentenced on October 14, 2016 to 12 years in prison and to pay $20 million in restitution; Simpkins was sentenced on December 2, 2016 to 72 months in prison and ordered to pay a fine of $50,000, to forfeit $450,000 of the proceeds of the criminal activity, and to pay $450,000 in restitution to the U.S. Navy; Gilbeau was sentenced on May 17 to 18 months in prison and ordered to pay a $100,000 fine and $50,000 in restitution to the Navy; and Brooks was sentenced on June 16 to 41 months in prison and ordered to pay a $41,000 fine and $31,000 in restitution to the Navy. Sanchez, Pitts and Kapaun await sentencing.
Also charged are five GDMA executives – Francis, Alex Wisidagama, Ed Aruffo, Neil Peterson and Linda Raja. All have pleaded guilty; Wisidagama was sentenced on March 18, 2016 to 63 months and $34.8 million in restitution to the Navy; Peterson and Raja were extradited from Singapore in 2016 and sentenced on August 11 to 70 months and 46 months in prison, respectively. Francis and Aruffo await sentencing.
Assistant U.S. Attorneys Mark W. Pletcher and Patrick Hovakimian of the Southern District of California and Assistant Chief Brian R. Young of the Criminal Division’s Fraud Section are prosecuting the case.
Anyone with information relating to fraud or corruption should contact the NCIS anonymous tip line at www.ncis.navy.mil or the DOD Hotline at www.dodig.mil/hotline, or call (800) 424-9098.
DEFENDANT Case Number: 17CR2376-JLS
U.S. Navy Captain Jesus Vasquez Cantu Age 59 S ilverdale, Washington
SUMMARY OF CHARGES
Conspiracy to Commit Bribery, in violation of 18 U.S.C. § 371
Maximum Penalty: 5 years in prison, a $250,000 fine,
INVESTIGATING AGENCIES
Defense Criminal Investigative Service
Naval Criminal Investigative Service
Defense Contract Audit Agency
*The charges and allegations contained in an indictment or complaint are merely accusations, and the defendants are considered innocent unless and until proven guilty.
Assistant U.S. Attorneys Mark W. Pletcher (619) 546-9714 and Patrick Hovakimian (619) 546-9718
NEWS RELEASE SUMMARY – March 14, 2017
SAN DIEGO – Retired U.S. Navy Rear Admiral Bruce Loveless and David Newland, chief of staff to the Commander of the Navy’s Seventh Fleet, along with seven other high-ranking Navy officers are charged in a federal grand jury indictment with acting as a team of moles for a foreign defense contractor, trading military secrets and substantial influence for sex parties with prostitutes, extravagant dinners and luxury travel.
According to a federal grand jury indictment unsealed today, the Navy officers worked together to help Singapore-based defense contractor Leonard Glenn Francis and his company, Glenn Defense Marine Asia, pull off a colossal fraud that ultimately cost the Navy – and U.S. taxpayers – tens of millions of dollars.
Navy officers were arrested early this morning in California, Texas, Florida, Colorado and Virginia. The United States will seek their removal to face charges in San Diego. Admiral Loveless was taken into custody at his home in Coronado and was expected to make his first appearance in federal court in San Diego at 2 p.m. before U.S. Magistrate Judge Mitchell D. Dembin. The other defendants are Captains David Newland, James Dolan, Donald Hornbeck and David Lausman; Marine Corps Colonel Enrico DeGuzman; Commander Mario Herrera; Lt. Commander Stephen Shedd and Chief Warrant Officer Robert Gorsuch. DeGuzman is also scheduled to appear before Judge Dembin today at 2 p.m.
The defendants face various charges including bribery, conspiracy to commit bribery, honest services fraud and obstruction of justice and making false statements to federal investigators when confronted about their actions. Two defendants – Shedd and Herrera - are active duty; the others are recently retired.
The indictment is a veritable 78-page list of allegations in which Francis spent tens of thousands of dollars on bribing the defendants and the actions the officers took to reciprocate. Francis plied the officers with things like foie gras terrine, duck leg confit, ox-tail soup, $2,000 boxes of cigars and $2,000 bottles of rare cognac, plus wild sex parties in fancy hotels.
For their part, the defendants allegedly worked in concert to help Francis and GDMA win and keep defense contracts to provide port services to U.S. Navy ships; to redirect ships to ports controlled by Francis in Southeast Asia so he could overbill the Navy for supplies and services such as food, water, fuel, tugboats, and sewage removal; to sabotage competing defense contractors; to recruit new members for the conspiracy by spreading the “Glenn Gospel” to incoming Seventh Fleet leaders; and to keep the conspiracy secret by using fake names and foreign email service providers.
Including today’s defendants, a total of 25 named individuals have been charged in connection with the GDMA corruption and fraud investigation. Of those, 20 are current or former U.S. Navy officials; five are GDMA executives. Thirteen have pleaded guilty; other cases are pending.
“This is a fleecing and betrayal of the United States Navy in epic proportions, and it was allegedly carried out by the Navy’s highest-ranking officers,” said Acting U.S. Attorney Alana W. Robinson. “The alleged conduct amounts to a staggering degree of corruption by the most prominent leaders of the Seventh Fleet – the largest fleet in the U.S. Navy - actively worked together as a team to trade secrets for sex, serving the interests of a greedy foreign defense contractor, and not those of their own country.”
“The defendants in this indictment were entrusted with the honor and responsibility of administering the operations of the U.S. Navy’s Seventh Fleet, which is tasked with protecting our nation by guarding an area of responsibility that spanned from Russia to Southeast Asia and the Indian Ocean,” said Acting Assistant Attorney General Kenneth A. Blanco. “With this honor and awesome responsibility came a duty to make decisions based on the best interests of the Navy and the 40,000 Sailors and Marines under their care who put their lives at risk every day to keep us secure and free. Unfortunately, however, these defendants are alleged to have sold their honor and responsibility in exchange for personal enrichment.”
“The allegations contained in today’s indictment expose flagrant corruption among several senior officers previously assigned to the U.S. Navy's Seventh Fleet. The charges and subsequent arrests are yet another deplorable example of those who place their own greed above their responsibility to serve this nation with honor,” said Dermot F. O'Reilly, Director, Defense Criminal Investigative Service.
“Naval Criminal Investigative Service, in concert with our partner agencies, remains resolved to follow the evidence wherever it leads, and to help hold accountable those who make personal gain a higher priority than professional responsibility,” Special Agent Andrew L. Traver, NCIS Director. “It's unconscionable that some individuals choose to enrich themselves at the expense of military security.”
Here’s a sampling of bribes alleged in the indictment:
-During the U.S.S. Blue Ridge’s port visit to Sydney Australia on June 17, 2007, Francis hosted and paid for a dinner event at the Altitude Restaurant within the Shangri-La Hotel. Some of the defendants dined on saute of scallops, foie gras, and beef loin for a cost of $11,898. During dinner, defendant Gorsuch handed Francis two floppy disks containing classified port visit information for many U.S. Navy ships, according to the indictment.
-In March 2007, Francis hosted and paid for a multi-course dinner for several of the defendants at the Oak Door in Tokyo, Japan. The menu included foie gras, Lobster Thermidor, Sendai Tenderloin, and for dessert, Liberte Sauvage, the winning cake of the 10th Coupe du Monde de la Patisserie 2007, followed by cognac and cigars. Each course was paired with fine champagne or wine. Attendees posed for photographs wearing custom-made GDMA neckties that Francis had given them as gifts.
-During one port visit in Singapore on March 9, 2006, Francis seduced the leaders of the Seventh Fleet with foie gras terrine, duck leg confit, ox-tail soup, roasted Chilean sea bass, paired with expensive wine and champagne, followed by digestifs and cigars. The extravagance included $600-a-bottle Hennessy Private Reserve, $2,000-a-bottle Paradis Extra and $2,000-a-box Cohiba Cigars.
According to the indictment, the group of officers referred to themselves using various terms, such as “the Cool Kids,” “the Band of Brothers,” “the Brotherhood,” “the Wolfpack,” “the familia,” and “the Lion King’s Harem.” The officers tried to conceal their corrupt relationships by using fictitious names to create email addresses using foreign-based email services.
This is the first time multiple officers are charged as working all together in a multi-layered conspiracy, pooling their individual and collective resources and influence on behalf of Francis.
In addition to performing various official acts in return for Francis’s booty, these officers are also accused of violating many of the sworn official duties required of them as Navy officers, including duties related to the handling of classified information and duties related to the identification and reporting of foreign intelligence threats.
The U.S. Navy’s Seventh Fleet represents a vital piece of the United States military’s projection of power as well as American foreign policy and national security. The largest numbered fleet in the U.S. Navy, the Seventh Fleet comprises 60-70 ships, 200-300 aircraft and approximately 40,000 Sailors and Marines. The Seventh Fleet is responsible for U.S. Navy ships and subordinate commands which operate in the Western Pacific Ocean throughout Southeast Asia, Pacific Islands, Australia, and Russia as well as the Indian Ocean territories, as well ships and personnel from other U.S. Navy Fleets that enter the Seventh Fleet’s area of responsibility. The U.S.S. Blue Ridge is the command-and-control ship of the Seventh Fleet and housed at-sea facilities for Seventh Fleet senior officials.
The Seventh Fleet’s motto: Ready Power for Peace.
In addition to the nine defendants charged today, the 11 Navy officials charged so far in the fraud and bribery investigation are: Admiral Robert Gilbeau; Captain Michael Brooks; Captain Daniel Dusek; Commander Jose Luis Sanchez; Commander Michael Misiewicz; Commander Bobby Pitts; Lt. Commander Gentry Debord; Lt. Commander Todd Malaki; Petty Officer First Class Daniel Layug; Naval Criminal Investigative Service Supervisory Special Agent John Beliveau; and Paul Simpkins, a former DoD civilian employee, who oversaw contracting in Singapore.
Gilbeau, Brooks, Dusek, Misiewicz, Sanchez, Debord, Malaki, Layug, Beliveau, and Simpkins have pleaded guilty. On Jan. 21, 2016, Layug was sentenced to 27 months in prison and a $15,000 fine; on Jan. 29, 2016, Malaki was sentenced to 40 months in prison and to pay $15,000 in restitution to the Navy and a $15,000 fine. On March 25, 2016, Dusek was sentenced to 46 months in prison and to pay $30,000 in restitution to the Navy and a $70,000 fine; and on April 29, 2016, Misiewicz was sentenced to 78 months in prison and to pay a fine of $100,000 and to pay $95,000 in restitution to the Navy. Beliveau was sentenced on October 14, 2016 to 12 years in prison and to pay $20 million in restitution; Simpkins was sentenced on December 2, 2016 to 72 months in prison; Gilbeau, Brooks, and Sanchez await sentencing. Pitts was charged in May 2016 and his case is pending.
Also charged are five GDMA executives – Francis, Alex Wisidagama, Edmund Aruffo, Neil Peterson and Linda Raja. Three have pleaded guilty; Wisidagama was sentenced on March 18, 2016 to 63 months in prison and $34.8 million in restitution to the U.S. Navy. Francis and Aruffo await sentencing. Peterson and Raja were extradited to the United States from Singapore in September 2016 and their cases remain pending.
The Defense Criminal Investigative Service, Naval Criminal Investigative Service, and the Defense Contract Audit Agency are investigating. Assistant U.S. Attorneys Mark W. Pletcher and Patrick Hovakimian of the Southern District of California and Assistant Chief Brian R. Young of the Criminal Division’s Fraud Section are prosecuting the case.
Anyone with information relating to fraud or corruption should contact the NCIS anonymous tip line at www.ncis.navy.mil or the DOD Hotline at www.dodig.mil/hotline, or call (800) 424-9098.
Indictment Document (click here)
DEFENDANTS Case Number: 17CR0623-JLS
Captain David Newland Age 60 San Antonio, Texas
Chief of Staff to the Commander of the Seventh Fleet
Colonel Enrico DeGuzman Age 58 Honolulu, Hawaii
Fleet Marine Office of the Seventh Fleet, responsible for coordinating the missions of the U.S. Marine Corps with the Seventh Fleet; and Assistant Chief of Staff of Operations for U.S. Marine Corps Forces, Pacific
Captain James Dolan Age 58 Gettysburg, Pennsylvania
Assistant Chief of Staff for Logistics for the Seventh Fleet, responsible for meeting the logistical needs of every ship within the Seventh Fleet’s area of responsibility
Captain Donald Hornbeck Age 56 United Kingdom
Deputy Chief of Staff for Operations for the Seventh Fleet, responsible for directing the operations of all combatant ships in the Seventh Fleet area of responsibility
Rear Admiral, Retired, Bruce Loveless Age 53 Coronado, CA
Previously a Captain and Assistant Chief of Staff for Intelligence for the Seventh Fleet, responsible for assessing and counteracting foreign intelligence threats within the Seventh Fleet’s area of responsibility
Captain David Lausman Age 62 The Villages, Florida
Executive Officer of the aircraft carrier U.S.S. Abraham Lincoln; Commanding Officer of U.S.S. Blue Ridge; Commanding Officer of U.S.S. George Washington
Lt. Commander Stephen Shedd Age 43 Colorado Springs, CO
Seventh Fleet’s South Asia Policy and Planning Officer, responsible for identifying ports that U.S. Navy ships would visit; and once promoted to Commander, served as Executive Officer and Commanding Officer of the U.S.S. Milius
Commander Mario Herrera Age 48 Helotes, Texas
Fleet Operations and Schedules Officer for the Seventh Fleet, responsible for scheduling the port visits for ships and submarines in the Seventh Fleet’s area of responsibility (Herrera was previously charged in February 2017 via complaint)
Chief Warrant Officer Robert Gorsuch Age 49 Virginia Beach, Virginia
Seventh Fleet’s Flag Administration Officer, responsible for providing administrative support to the Seventh Fleet Commander and other senior officers on the Seventh Fleet staff
SUMMARY OF CHARGES
Conspiracy to Commit Bribery, in violation of 18 U.S.C. § 371
Maximum Penalty: 5 years in prison, a $250,000 fine, or twice the gross pecuniary gain or twice the gross pecuniary loss, whichever is greater
Bribery, in violation of 18 U.S.C. § 201
Maximum Penalty: 15 years in prison, a $250,000 fine or twice the gross pecuniary gain or gross pecuniary loss from the offense, or three times the monetary equivalent of the thing of value, whichever is greater
False Statements, in violation of 18 U.S.C. § 1001
Maximum Penalty: 5 years in prison, a $250,000 fine
Obstruction of Justice, in violation of 18 U.S.C. § 1519
Maximum Penalty: 20 years in prison, a $250,000 fine
Conspiracy to Commit Honest Services Wire Fraud, in violation of 18 U.S.C. §§ 1349, 1346, 1343
Maximum Penalty: 20 years in prison, a $250,000 fine
INVESTIGATING AGENCIES
Defense Criminal Investigative Service
Naval Criminal Investigative Service
Defense Contract Audit Agency
*The charges and allegations contained in an indictment or complaint are merely accusations, and the defendants are considered innocent unless and until proven guilty.
BREAKDOWN OF COUNTS
Counts
Code
Description
Defendant(s)
1
18 U.S.C. § 371
Conspiracy to Commit Bribery
All
2
18 U.S.C § 201(b)(2)(A) and (C)
Bribery
Newland
3
18 U.S.C § 201(b)(2)(A) and (C)
Bribery
DeGuzman
4
18 U.S.C § 201(b)(2)(A) and (C)
Bribery
Hornbeck
5
18 U.S.C § 201(b)(2)(A) and (C)
Bribery
Dolan
6
18 U.S.C § 201(b)(2)(C)
Bribery
Loveless
7
18 U.S.C § 201(b)(2)(A) and (C)
Bribery
Lausman
8
18 U.S.C § 201(b)(2)(A) and (C)
Bribery
Herrera
9
18 U.S.C § 201(b)(2)(A) and (C)
Bribery
Shedd
10
18 U.S.C § 201(b)(2)(A) and (C)
Bribery
Gorsuch
11
18 U.S.C. § 1001(a)(2)
False Statements
Lausman
12
18 U.S.C. § 1519
Obstruction
Lausman
13
18 U.S.C. §§ 1349, 1346, and 1343
Conspiracy to Commit Honest Services Wire Fraud
All
Assistant U.S. Attorneys Mark W. Pletcher (619) 546-9714 and Patrick Hovakimian (619) 546-9718
NEWS RELEASE SUMMARY – February 16, 2017
SAN DIEGO – U.S. Navy Commander Mario Herrera was charged in a complaint unsealed today with accepting prostitutes, luxury travel, elaborate dinners and $1,800 steaks from foreign defense contractor Leonard Glenn Francis in exchange for classified and internal U.S. Navy information.
Herrera, the 12th U.S. Navy official to be charged so far, was arrested in San Antonio, Texas this morning and is scheduled to make his initial appearance in federal court in the Western District of Texas. The United States will seek removal of Herrera to San Diego to face charges.
According to the complaint, Herrera received bribes in return for sending U.S. Navy ship schedules and other proprietary information to Francis, sometimes through U.S. Navy Commander Jose Luis Sanchez, who was among the first officers charged in the massive bribery and fraud case in 2013. Sanchez pleaded guilty to bribery charges in January 2015 and awaits sentencing.
Hererra, Sanchez and other U.S. Navy 7th Fleet officers who were committed to doing the bidding of Francis in exchange for prostitutes and other perks called themselves the “Band of Brothers” and the “Wolf Pack,” the complaint said. In one email, Sanchez asked Francis to send pictures of prostitutes, saying “the brothers are ready to indulge.” A few days later in another email, Sanchez thanked Francis for the prostitutes and hotel accommodations during a port stop in Manila, Philippines: “A warm thank you from the brotherhood…we thoroughly enjoyed ourselves and had a great time.”
The complaint also alleges that Herrera made recommendations within the Navy to benefit Francis’ company, Glenn Defense Marine Asia, including on several occasions manipulating the movement of U.S. Navy ships and diverting them to ports financially lucrative to Francis. GDMA is a multinational corporation and longtime government contractor based in Singapore, which provides hundreds of millions of dollars of “husbanding” services for the U.S. Navy in at least a dozen countries throughout the Pacific. Husbanding involves supplying food, water, fuel, tugboats and fenders, security, transportation, trash and liquid waste removal, and other goods and services to ships and submarines in foreign ports.
So far, a total of 17 named individual defendants have been charged in connection with the GDMA corruption and fraud investigation. Of those, 12 are current or former U.S. Navy officials, including Herrera, Sanchez, Admiral Robert Gilbeau, believed to be the first active-duty U.S. Navy flag officer charged in a federal criminal case; Captain (ret.) Michael Brooks; Captain Daniel Dusek; Commander Michael Misiewicz; Commander Bobby Pitts; Lt. Commander Gentry Debord; Lt. Commander Todd Malaki; Petty Officer First Class Daniel Layug; Naval Criminal Investigative Service Supervisory Special Agent John Beliveau; and Paul Simpkins, a former DoD civilian employee, who oversaw contracting in Singapore.
Gilbeau, Brooks, Dusek, Misiewicz, Sanchez, Debord, Malaki, Layug, Beliveau, and Simpkins have pleaded guilty. On Jan. 21, 2016, Layug was sentenced to 27 months in prison and a $15,000 fine; on Jan. 29, 2016, Malaki was sentenced to 40 months in prison and to pay $15,000 in restitution to the Navy and a $15,000 fine. On March 25, 2016, Dusek was sentenced to 46 months in prison and to pay $30,000 in restitution to the Navy and a $70,000 fine; and on April 29, 2016, Misiewicz was sentenced to 78 months in prison and to pay a fine of $100,000 and to pay $95,000 in restitution to the Navy. Beliveau was sentenced on October 14, 2016 to 12 years in prison and to pay $20 million in restitution; Simpkins was sentenced on December 2, 2016 to 72 months in prison; Gilbeau, Brooks, and Sanchez await sentencing.
Pitts was charged in May 2016 and his case is pending.
Also charged are five GDMA executives – Francis, Alex Wisidagama, Ed Aruffo, Neil Peterson and Linda Raja. Three have pleaded guilty; Wisidagama was sentenced on March 18, 2016 to 63 months and $34.8 million in restitution to the Navy. Francis and Aruffo await sentencing; Peterson and Raja were extradited from Singapore in September 2016 and their cases are pending.
The Defense Criminal Investigative Service, Naval Criminal Investigative Service, and the Defense Contract Audit Agency are investigating. Assistant U.S. Attorneys Mark W. Pletcher and Patrick Hovakimian of the Southern District of California and Assistant Chief Brian R. Young of the Criminal Division’s Fraud Section are prosecuting the case.
Anyone with information relating to fraud or corruption should contact the NCIS anonymous tip line at www.ncis.navy.mil or the DOD Hotline at www.dodig.mil/hotline, or call (800) 424-9098.
DEFENDANT Case Number: 17mj0424
Lieutenant Commander Mario Herrera Age 48 Helotes, Texas
SUMMARY OF CHARGES
Conspiracy to Commit Bribery, in violation of 18 U.S.C. § 371
Maximum Penalty: 5 years in prison, a $250,000 fine,
INVESTIGATING AGENCIES
Defense Criminal Investigative Service
Naval Criminal Investigative Service
Defense Contract Audit Agency
Assistant U.S. Attorneys Mark W. Pletcher (619) 546-9714 and Patrick Hovakimian (619) 546-9718
NEWS RELEASE SUMMARY – January 12, 2017
SAN DIEGO – U.S. Navy Lieutenant Commander Gentry Debord, who was named U.S. Navy Supply Officer of the Year while he was secretly accepting bribes and prostitutes from a foreign defense contractor in exchange for confidential information, was sentenced in federal court today to 30 months in prison.
Debord, 41, who pleaded guilty in October 2016 to a bribery charge, was also ordered to pay a $15,000 fine and $37,000 in restitution to the Navy. Debord has admitted that he accepted cash, luxury hotels and prostitutes from foreign defense contractor Leonard Glenn Francis between 2007 and 2013. In return he provided proprietary Navy information that benefitted Francis’ company, Singapore-based Glenn Defense Marine Asia.
During today’s hearing, U.S. District Judge Janis L. Sammartino told the defendant that he picked the wrong side. “You were clearly on their team and not the Navy’s team.”
Acting U.S. Attorney Alana Robinson said: “This is a fitting sentence for a man who sullied his stripes with such despicable behavior. We will continue to move forward in this investigation until all involved are held accountable.”
According to his plea agreement, from November 2007 to January 2013, Debord provided Francis and others with internal, proprietary U.S. Navy information; directed Francis and GDMA to inflate invoices to reflect services not rendered; advocated for the U.S. Navy to procure items from GDMA under its husbanding contracts; and otherwise used his position and influence in the U.S. Navy to advocate for and advance GDMA’s interests, as opportunities arose.
During the conspiracy, Debord was a supply officer aboard the U.S.S. Essex and later became a logistics officer for the Pacific Fleet. As a supply officer, Debord was responsible for procuring goods and services to meet the ship’s logistical and supply needs and for confirming that the U.S. Navy’s contractors provided these services. As logistics officer, he helped direct ship movements and port visits in the Western Pacific region.
As part of this conspiracy, Debord, Francis and others attempted to conceal the nature and extent of their relationship, by, among other things, using fictitious email accounts to communicate and using coded language and other means designed to obfuscate the true nature of their corrupt relationship, including referring to prostitutes as “cheesecakes” and “bodyguards.”
For example, on or about February 26, 2008, Debord emailed a GDMA executive to ask him to provide the services of prostitutes during the U.S.S. Essex’s upcoming port visit to Manila, Philippines: “[D]ouble checking to see if I will have my security for the 2nd and the 4th. I however do not want anyone to know I have a bodyguard.” The executive responded: “Bodyguards are standing by.”
About eight months later, around October 30, 2008, Debord emailed GDMA executives advising them that the U.S. Navy’s ship husbanding contract in the Philippines was “coming up for renew[al],” and asking that GDMA provide him with an apartment in conjunction with an upcoming port visit by the U.S.S. Essex to Hong Kong. Debord noted that he and another GDMA employee “had fun up [near Clark Air Force Base,] ate lots of cheesecake, even ate some in a group session.”
From May 2010 until December 2011, Debord was specially selected to attend the Naval Postgraduate School in Monterey, California, during which time he was not in direct contact with GDMA.
In December 2011, however, Debord accepted a position in Singapore, putting him again in close proximity to GDMA. On or about May 26, 2012, after recognizing Debord’s name on an email chain regarding fuel issues, GDMA’s Vice President of Global Operations Neil Peterson executive emailed another GDMA employee, “Look at who's the replenishment officer for ctf73, you remember sex crazy LT Debord from Essex!” Peterson emailed Debord on May 28, 2012 and invited him out for “cheesecake…just like the good ol days.”
So far, a total of 16 named individual defendants have been charged in connection with the GDMA corruption and fraud investigation. Of those, 11 are current or former U.S. Navy officials, including Debord, Admiral Robert Gilbeau, believed to be the first active-duty U.S. Navy flag officer charged in a federal criminal case; Captain (ret.) Michael Brooks; Commander Bobby Pitts; Captain Daniel Dusek; Commander Michael Misiewicz; Lt. Commander Todd Malaki; Commander Jose Luis Sanchez; Petty Officer First Class Daniel Layug; Naval Criminal Investigative Service Supervisory Special Agent John Beliveau; and Paul Simpkins, a former DoD civilian employee, who oversaw contracting in Singapore.
Debord, Brooks, Gilbeau, Dusek, Misiewicz, Malaki, Beliveau, Sanchez, Layug, and Simpkins have pleaded guilty. On Jan. 21, 2016, Layug was sentenced to 27 months in prison and a $15,000 fine; on Jan. 29, 2016, Malaki was sentenced to 40 months in prison and to pay $15,000 in restitution to the Navy and a $15,000 fine. On March 25, 2016, Dusek was sentenced to 46 months in prison and to pay $30,000 in restitution to the Navy and a $70,000 fine; and on April 29, 2016, Misiewicz was sentenced to 78 months in prison and to pay a fine of $100,000 and to pay $95,000 in restitution to the Navy. Beliveau was sentenced on October 14, 2016 to 12 years in prison and to pay $20 million in restitution; Simpkins was sentenced on December 2, 2016 to 72 months in prison; Brooks, Gilbeau and Sanchez await sentencing.
Pitts were charged in May 2016 and his case are pending.
Also charged are five GDMA executives – Francis, Alex Wisidagama, Ed Aruffo and Neil Peterson and Linda Raja. Three have pleaded guilty; Wisidagama was sentenced on March 18, 2016 to 63 months and $34.8 million in restitution to the Navy. Francis and Aruffo await sentencing; Peterson and Raja were extradited from Singapore in September 2016 and their cases are pending.
In the government’s sentencing memorandum, Assistant U.S. Attorney Mark Pletcher wrote that Debord’s conduct was particularly galling considering he received a prestigious award while he was in cahoots with Francis. “Ultimately, that Debord was effectively working for GDMA and against the U.S. Navy in dereliction of his official duties at the same time as being awarded the Supply Officer of the Year Award is an unparalleled example of duplicity, even considering the high bar set by the industrious cast of defendants in this investigation.”
The Defense Criminal Investigative Service, Naval Criminal Investigative Service, and the Defense Contract Audit Agency are investigating. Assistant U.S. Attorneys Mark W. Pletcher and Patrick Hovakimian of the Southern District of California and Assistant Chief Brian R. Young of the Criminal Division’s Fraud Section are prosecuting the case.
Anyone with information relating to fraud or corruption should contact the NCIS anonymous tip line at www.ncis.navy.mil or the DOD Hotline at www.dodig.mil/hotline, or call (800) 424-9098.
DEFENDANT Case Number: 16cr1457-JLS
Lieutenant Commander Gentry Debord Age 41 San Diego
SUMMARY OF CHARGES
Conspiracy to Commit Bribery, in violation of 18 U.S.C. § 371
Maximum Penalty: 5 years in prison, a $250,000 fine,
Description: The fiscal year of the data file obtained from the AOUSC
Format: YYYY
Description: The code of the federal judicial circuit where the case was located
Format: A2
Description: The code of the federal judicial district where the case was located
Format: A2
Description: The code of the district office where the case was located
Format: A2
Description: Docket number assigned by the district to the case
Format: A7
Description: A unique number assigned to each defendant in a case which cannot be modified by the court
Format: A3
Description: A unique number assigned to each defendant in a case which can be modified by the court
Format: A3
Description: A sequential number indicating whether a case is an original proceeding or a reopen
Format: N5
Description: Case type associated with the current defendant record
Format: A2
Description: A concatenation of district, office, docket number, case type, defendant number, and reopen sequence number
Format: A18
Description: A concatenation of district, office, docket number, case type, and reopen sequence number
Format: A15
Description: The status of the defendant as assigned by the AOUSC
Format: A2
Description: A code indicating the fugitive status of a defendant
Format: A1
Description: The date upon which a defendant became a fugitive
Format: YYYYMMDD
Description: The date upon which a fugitive defendant was taken into custody
Format: YYYYMMDD
Description: The date when a case was first docketed in the district court
Format: YYYYMMDD
Description: The date upon which proceedings in a case commenced on charges pending in the district court where the defendant appeared, or the date of the defendant’s felony-waiver of indictment
Format: YYYYMMDD
Description: A code used to identify the nature of the proceeding
Format: N2
Description: The date when a defendant first appeared before a judicial officer in the district court where a charge was pending
Format: YYYYMMDD
Description: A code indicating the event by which a defendant appeared before a judicial officer in the district court where a charge was pending
Format: A2
Description: A code indicating the type of legal counsel assigned to a defendant
Format: N2
Description: The title and section of the U.S. Code applicable to the offense committed which carried the highest severity
Format: A20
Description: A code indicating the level of offense associated with FTITLE1
Format: N2
Description: The four digit AO offense code associated with FTITLE1
Format: A4
Description: The four digit D2 offense code associated with FTITLE1
Format: A4
Description: A code indicating the severity associated with FTITLE1
Format: A3
Description: The title and section of the U.S. Code applicable to the offense committed which carried the second highest severity
Format: A20
Description: A code indicating the level of offense associated with FTITLE2
Format: N2
Description: The four digit AO offense code associated with FTITLE2
Format: A4
Description: The four digit D2 offense code associated with FTITLE2
Format: A4
Description: A code indicating the severity associated with FTITLE2
Format: A3
Description: The FIPS code used to indicate the county or parish where an offense was committed
Format: A5
Description: The date of the last action taken on the record
Format: YYYYMMDD
Description: The date upon which judicial proceedings before the court concluded
Format: YYYYMMDD
Description: The date upon which the final sentence is recorded on the docket
Format: YYYYMMDD
Description: The date upon which the case was closed
Format: YYYYMMDD
Description: The number of days from the earlier of filing date or first appearance date to proceeding date
Format: N3
Description: The number of days from proceeding date to disposition date
Format: N3
Description: The number of days from disposition date to sentencing date
Format: N3
Description: The code of the district office where the case was terminated
Format: A2
Description: A code indicating the type of legal counsel assigned to a defendant at the time the case was closed
Format: N2
Description: The title and section of the U.S. Code applicable to the offense that carried the most severe disposition and penalty under which the defendant was disposed
Format: A20
Description: A code indicating the level of offense associated with TTITLE1
Format: N2
Description: The four digit AO offense code associated with TTITLE1
Format: A4
Description: The four digit D2 offense code associated with TTITLE1
Format: A4
Description: A code indicating the severity associated with TTITLE1
Format: A3
Description: The code indicating the nature or type of disposition associated with TTITLE1
Format: N2
Description: The number of months a defendant was sentenced to prison under TTITLE1
Format: N4
Description: The number of months of probation imposed upon a defendant under TTITLE1
Format: N4
Description: A code indicating whether the probation sentence associated with TTITLE1 was concurrent or consecutive in relation to the other counts in the indictment or information or multiple counts of the same charge
Format: A4
Description: A period of supervised release imposed upon a defendant under TTITLE1
Format: N3
Description: The fine imposed upon the defendant at sentencing under TTITLE1
Format: N8
Description: The title and section of the U.S. Code applicable to the offense under which the defendant was disposed that carried the second most severe disposition and penalty
Format: A20
Description: A code indicating the level of offense associated with TTITLE2
Format: N2
Description: The four digit AO offense code associated with TTITLE2
Format: A4
Description: The four digit D2 offense code associated with TTITLE2
Format: A4
Description: A code indicating the severity associated with TTITLE2
Format: A3
Description: The code indicating the nature or type of disposition associated with TTITLE2
Format: N2
Description: The number of months a defendant was sentenced to prison under TTITLE2
Format: N4
Description: The number of months of probation imposed upon a defendant under TTITLE2
Format: N4
Description: A period of supervised release imposed upon a defendant under TTITLE2
Format: N3
Description: The fine imposed upon the defendant at sentencing under TTITLE2
Format: N8
Description: The total prison time for all offenses of which the defendant was convicted and prison time was imposed
Format: N4
Description: The total probation time for all offenses of which the defendant was convicted and probation was imposed
Format: N4
Description: The total fine imposed at sentencing for all offenses of which the defendant was convicted and a fine was imposed
Format: N8
Description: A count of defendants filed including inter-district transfers
Format: N1
Description: A count of defendants filed excluding inter-district transfers
Format: N1
Description: A count of original proceedings commenced
Format: N1
Description: A count of defendants filed whose proceedings commenced by reopen, remand, appeal, or retrial
Format: N1
Description: A count of defendants terminated including interdistrict transfers
Format: N1
Description: A count of defendants terminated excluding interdistrict transfers
Format: N1
Description: A count of original proceedings terminated
Format: N1
Description: A count of defendants terminated whose proceedings commenced by reopen, remand, appeal, or retrial
Format: N1
Description: A count of defendants pending as of the last day of the period including long term fugitives
Format: N1
Description: A count of defendants pending as of the last day of the period excluding long term fugitives
Format: N1
Description: The source from which the data were loaded into the AOUSC’s NewSTATS database
Format: A10
Description: A sequential number indicating the iteration of the defendant record
Format: N2
Description: The date the record was loaded into the AOUSC’s NewSTATS database
Format: YYYYMMDD
Description: Statistical year ID label on data file obtained from the AOUSC which represents termination year
Assistant U.S. Attorneys Meghan E. Heesch (619) 546-9442 and Joshua C. Mellor (619) 546-9733
NEWS RELEASE SUMMARY – March 12, 2021
SAN DIEGO – A federal grand jury today returned an indictment against the Chief Executive Officer and an associate of the Canada-based firm Sky Global on charges that they knowingly and intentionally participated in a criminal enterprise that facilitated the transnational importation and distribution of narcotics through the sale and service of encrypted communications devices.
Jean-Francois Eap, Sky Global’s Chief Executive Officer, and Thomas Herdman, a former high-level distributor of Sky Global devices, are charged with a conspiracy to violate the federal Racketeer Influenced and Corrupt Organizations Act (RICO). Warrants were issued for their arrests today.
According to the indictment, Sky Global’s devices are specifically designed to prevent law enforcement from actively monitoring the communications between members of transnational criminal organizations involved in drug trafficking and money laundering. As part of its services, Sky Global guarantees that messages stored on its devices can and will be remotely deleted by the company if the device is seized by law enforcement or otherwise compromised.
The indictment alleges that Sky Global installs sophisticated encryption software in iPhone, Google Pixel, Blackberry, and Nokia handsets. Sky Global device users communicate with each other in a closed network, and Sky Global routes these communications through encrypted servers located in Canada and France.
There are at least 70,000 Sky Global devices in use worldwide, including in the United States. The indictment alleges that for more than a decade, Sky Global has generated hundreds of millions of dollars in profit by facilitating the criminal activity of transnational criminal organizations and protecting these organizations from law enforcement.
According to the indictment, Sky Global’s purpose was to create, maintain, and control a method of secure communication to facilitate the importation, exportation, and distribution of heroin, cocaine and methamphetamine into Australia, Asia, Europe, and North America, including the United States and Canada; to launder the proceeds of such drug trafficking conduct; and to obstruct investigations of drug trafficking and money laundering organizations by creating, maintaining, and controlling a system whereby Sky Global would remotely delete evidence of such activities.
The indictment alleges that Sky Global employees used digital currencies, including Bitcoin, to facilitate illegal transactions on the firm’s website, to protect its customers’ anonymity, and to facilitate the laundering of the customers’ ill-gotten gains. According to the indictment, Sky Global employees also set up and maintained shell companies to hide the proceeds generated by selling its encryption services and devices.
In 2018, the principals of another communications encryption company, Phantom Secure, were indicted in the Southern District of California for their roles in providing encrypted devices to criminal groups. Phantom Secure’s chief executive, Vincent Ramos, pleaded guilty and admitted that he and his co-conspirators facilitated the distribution of narcotics around the world by supplying encrypted communications devices designed to thwart law enforcement.
As alleged in today’s indictment, Sky Global instituted an “ask nothing/do nothing” approach toward its clients shortly after the takedown of Phantom Secure. This policy allowed for Sky Global to claim plausible deniability from the activities of their clients that they knew or had reason to know participated in illegal activities, including international drug trafficking.
“The indictment alleges that Sky Global generated hundreds of millions of dollars providing a service that allowed criminal networks around the world to hide their international drug trafficking activity from law enforcement,” said Acting U.S. Attorney Randy Grossman. “Companies who do this are perpetuating the deadliest drug epidemic in our nation’s history. This groundbreaking investigation should send a serious message to companies who think they can aid criminals in their unlawful activities. I want to thank the prosecutors on this case, Meghan Heesch and Joshua Mellor, as well as our federal law enforcement partners at the FBI, DEA, IRS and the U.S. Marshals Service, for their excellent work on this case.”
“The indictment of Sky Global’s CEO and main distributor is another major strike against transnational crime,” said Suzanne Turner, FBI Special Agent in Charge of the San Diego Field Office. “Eap and Herdman allegedly provided a service designed to allow criminals to evade law enforcement to traffic drugs and commit acts of violent crime without detection. Similar to our 2018 investigation of encrypted service provider Phantom Secure, the San Diego FBI targeted this Canadian company who also exploited encryption to go dark on law enforcement around the globe. With these highly impactful cases, we have shown that the FBI focuses on investigating international criminal organizations from the top so we can shut down entire illicit operations—and the associated technological infrastructure. Today, the FBI has removed what we allege to be another illicit secret communications network used by criminals in the US, Canada, and worldwide.” SAC Turner added, “I want to thank our partners at the Department of Justice, as well as our Canadian law enforcement partners, for their incredible work on this case.”
“DEA maintains an evolving global reach and combined with strong foreign law enforcement partnerships, is committed to searching out the most significant organized criminal groups facilitating sophisticated narcotics trafficking networks,” said DEA Los Angeles Field Division Special Agent in Charge Bill Bodner. “The joint effort to pursue these individuals who hide behind encrypted communication platforms shows that even the use of advanced technology will not enable suspects to conceal their criminal activities from law enforcement.”
“This case is another example of IRS-CI working closely with our international partners to follow the money and bring significant criminal activity to light,” said Special Agent in Charge Ryan Korner of the IRS-Criminal Investigation (IRS-CI) Los Angeles Field Office. “The indictment alleges that Sky Global’s network facilitated international crime across the world, but just as criminals know no borders, neither does federal law enforcement. The combined efforts of the Joint Chiefs of Global Tax Enforcement (J5) ensure that these types of illicit behavior are identified, tracked, and ultimately prosecuted on a global-scale.”
The international operation to seize Sky Global’s infrastructure involved cooperation and efforts by law enforcement authorities in the United States and Canada. In addition, on March 10, 2021, Europol announced that judicial and law enforcement authorities in Belgium, France and the Netherlands had wiretapped Sky Global’s servers and monitored hundreds of millions of messages by Sky Global’s users. The European investigation resulted in hundreds of arrests, the seizure of thousands of kilograms of cocaine and methamphetamine, hundreds of firearms, and millions of Euros.
“With technological advancement comes increased levels of criminal sophistication, but also new tools for police to combat crime,” says Assistant Commissioner Dwayne McDonald, BC RCMP Criminal Operations Officer for Federal, Investigative Services and Organized Crime. “The RCMP will continue to adopt new technologies and strategies to keep our communities safe. Collaboration with our international policing partners, such as in this case with the FBI and DEA, has become an integral part in the ever-evolving fight against organized crime.”
This case is the result of ongoing efforts by the Organized Crime Drug Enforcement Task Force (OCDETF), a partnership that brings together the combined expertise and unique abilities of federal, state and local law enforcement agencies. The principal mission of the OCDETF program is to identify, disrupt, dismantle and prosecute high-level members of drug trafficking, weapons trafficking and money laundering organizations and enterprises.
DEFENDANTS 21-CR-822GPC
Jean-Francois Eap Vancouver, British Columbia, Canada aka “888888”
Thomas Herdman Vancouver, British Columbia, Canada
SUMMARY OF CHARGES
Count 1: Racketeering Conspiracy, in violation of Title 18, U.S.C., Section 1962(d). Maximum Penalty: Life in prison
Count 2: Conspiracy to Distribute Controlled Substances, in violation of Title 21, United States Code, Sections 841(a)(1) and 846, and Title 18, United States Code, Section 2. Maximum Penalty: Life in prison
AGENCIES
Federal Bureau of Investigation
Drug Enforcement Administration
Internal Revenue Service-Criminal Investigations
United States Marshals Service
Department of Justice, Office of International Affairs
Royal Canadian Mounted Police
International Assistance Group, Canadian Department of Justice
Organized Crime Drug Enforcement Task Force
*The charges and allegations contained in an indictment are merely accusations, and the defendants are considered innocent unless and until proven guilty.
Assistant U. S. Attorneys Benjamin Katz (619) 546-9604, Andrew Young (619) 546-7981 and Mark W. Pletcher (619) 546-9714
SAN DIEGO – Jack Rissell was sentenced today to 24 months in prison for his role as an enforcer in the gambling organization run by former USC football player Owen Hanson.
Rissell entered a guilty plea to Hobbs Act extortion on December 15, 2016. According to the plea agreement, Owen Hanson hired to travel from California to Minnesota to collect a gambling debt from an individual living in Minneapolis. The agreement between and Hanson included a “contact fee” – a premium or bonus for assaulting the victim. Once located the victim at his Minneapolis apartment, he carried out this assault by striking the victim in the face and demanding that the victim repay the gambling debt he owed to Hanson. During the confrontation, the victim’s son was present in the apartment. In a subsequent email to Hanson, described the attack saying, “he went down like a bag of potatoes.”
Before sentencing Rissell to 24 months imprisonment, Judge Hayes described the premium payment as “cold blooded” and called Rissell’s involvement with Hanson as “egregious conduct” that left the victim in terror.
In total, 21 of 22 defendants charged in relation to Hanson’s enterprise have entered guilty pleas. The remaining defendant, Khalid Petras, is set for trial on August 29, 2017. He is accused of money laundering and running an illegal gambling business. The charges against this defendant are merely accusations, and he is considered innocent until proven guilty.
The case arose out of a joint investigation by FBI and the New South Wales (Australia) Police Force in conjunction with the New South Wales Crime Commission. Hanson was initially indicted and arrested on September 9, 2015, after arranging the delivery of five kilograms of cocaine and five kilograms of methamphetamine.