Beebe Man Sentenced to 25 Years in Prison for Producing Child Pornography

Source: US FBI

LITTLE ROCK—A Beebe man was sentenced yesterday afternoon for production of child pornography. United States District Court Judge Lee P. Rudofsky sentenced Joshua Sweat, 30, to 25 years in federal prison.

In April 2019, police in Allen, Texas, notified the Little Rock Police Department that they had located messages between an individual they were investigating in Texas and Joshua Sweat, who lived in Arkansas. In the messages, Sweat stated he was caring for a “little boy” each day and began sending nude images of the child, who appeared to be approximately three years old. 

Law enforcement located and interviewed Sweat, who told them he babysat locally and had access to small children. Sweat confessed to law enforcement that he had images of child sexual abuse on his phone that included children under the age of 10 engaging in oral and anal intercourse. Sweat also admitted to taking photos of the victim and texting them to others.

            Sweat was indicted in May 2019 and pleaded guilty in May 2022. In addition to the prison term, Sweat was sentenced to a lifetime of supervised release following his imprisonment. The investigation was conducted by the FBI; the Allen, Texas Police Department; and the Little Rock Police Department. The case was prosecuted by Assistant United States Attorney Kristin Bryant.

# # # 

This news release, as well as additional information about the office of the

United States Attorney for the Eastern District of Arkansas, is available online at

https://www.justice.gov/edar 

Twitter:

@EDARNEWS

Texarkana Physician Found Guilty of Prescribing a Controlled Substance Without a Legitimate Medical Purpose

Source: US FBI

TEXARKANA, AR – A federal jury convicted a Texarkana Doctor yesterday on two counts of Distribution of a Schedule II Controlled Substance Without an Effective Prescription and two counts of Distribution of a Schedule V Controlled Substance Without an Effective Prescription.

According to court documents and evidence presented at trial, the Drug Enforcement Administration (DEA), Little Rock District Office (LRDO), Tactical Diversion and Diversion Groups initiated an investigation into Dr. Lonnie Joseph Parker, age 58, of Texarkana, Arkansas in 2018 after receiving complaints from local law enforcement about a suspected pill mill and possible overdose death of a patient.  Investigators analyzed prescription drug monitoring data attributed to Dr. Parker, and the investigation revealed Dr. Parker was an over-prescriber of controlled substances, to include opioids, benzodiazepines, and promethazine with codeine cough syrup in the Texarkana area.  In the two-year period analyzed, Dr. Parker prescribed approximately 1.2 million dosage units of opioid pain medications, including oxycodone, hydrocodone and fentanyl, to approximately 1,508 patients (approximately 847 dosage units per patient). Dr. Parker also prescribed approximately 16 gallons of Promethazine with Codeine cough syrup to approximately 29 patients during the same time frame. The prescriptions included narcotics written in combination with sedatives, creating a high risk of addiction and overdose to patients.

Parker is scheduled to be sentenced at a later date and faces a maximum penalty of 20 years in prison. He also faces a period of supervised release and monetary penalties. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

U.S. Attorney David Clay Fowlkes made the announcement.

The Drug Enforcement Administration (DEA), Little Rock District Office (LRDO), Tactical Diversion and Diversion Group, the Federal Bureau of Investigation (FBI), the Texarkana Police Department, and the United States Department of Health and Human Services Office of Inspector General (HHS).

Assistant United States Attorney Anne Gardner and Assistant United States Attorney Graham Jones prosecuted the case for the United States.

Lavaca Man Pleads Guilty to Conspiracy to Commit Health Care Fraud and Money Laundering

Source: US FBI

FORT SMITH – A Lavaca, Arkansas, man plead guilty today to one count of Conspiracy to Commit Healthcare Fraud and one count of Money Laundering. The Honorable Judge Mark E. Ford presided over the hearing in the United States District Court in Fort Smith.

In the plea agreement, Billy Joe Taylor, 43, admitted that from approximately November 2017 through approximately May 2021, he and his co-conspirators submitted and received payment for thousands of Medicare claims totaling millions of dollars for lab tests that had never been ordered by the referring medical provider or performed for the benefit of the beneficiary listed on the claims. The fraudulent claims were submitted on behalf of five clinical labs during the time that they were owned or controlled by Taylor and his co-conspirators, namely, Vitas Laboratory LLC in Barling, Arkansas, Corrlabs LLC in Southern Pines, North Carolina, Nations Laboratory Services LLC in Tecumseh, Oklahoma, Beach Tox LLC in Torrance, California, and Imaginus Diagnostic Laboratory LLC in Spiro, Oklahoma. More than $130 million in Medicare claims were submitted by these labs during the time they were owned or controlled by Taylor and his co-conspirators and Medicare paid approximately $38 million on these claims.

Taylor’s sentencing is expected to take place in approximately four months. Taylor faces a maximum penalty of 20 years in prison for the crimes he plead guilty to. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

U.S. Attorney David Clay Fowlkes of the Western District of Arkansas made the announcement.

The FBI, Health and Human Services Office of Inspector General, and the Internal Revenue Service Criminal Investigation investigated the case.

First Assistant U.S. Attorney Kenneth Elser of the U.S. Attorney’s Office for the Western District of Arkansas, and Trial Attorney D. Keith Clouser of the Department of Justice National Rapid Response Strike Force are prosecuting the case.

This case was initiated in coordination with the Health Care Fraud Unit’s COVID-19 Interagency Working Group, which is chaired by the National Rapid Response Strike Force and organizes efforts to address illegal activity involving health care programs during the pandemic.

Little Rock Man Sentenced to Life in Prison for Sex Trafficking of a Minor

Source: US FBI

      LITTLE ROCK—A Little Rock man was sentenced to life in prison today for conspiracy to commit sex trafficking of a six-year-old child. DeMarcus George, 28, was sentenced today by United States District Judge Brian S. Miller.

      In February 2018, a 6-year-old child was taken to Arkansas Children’s Hospital due to symptoms that were later determined to be caused by several sexually transmitted diseases. The child was interviewed by an FBI forensic interviewer and disclosed that a man, later determined to be DeMarcus George, had raped her. The child also disclosed that another man, later determined to be Mario Waters, had also raped her. The child told interviewers that the rape occurred in a hotel room with a curtain in the middle of the room, and she described a picture hanging on the wall in the hotel room.

     Law enforcement was able to locate a hotel in Little Rock that matched the description provided by the minor, including the picture on the wall and the curtain in the room. Financial records from the hotel showed that the minor’s mother had rented a room at the hotel in March 2018 and paid with a credit card. The child has since been removed from the mother’s custody.

      Doctors at Arkansas Children’s Hospital determined that it was unlikely the child had obtained each sexually transmitted disease from the same offender and that there were likely multiple offenders. Officers obtained search warrants for George and Waters’ blood and urine. Results indicated that George and Waters tested positive for sexually transmitted diseases that the minor had contracted.

      Both George and Waters were indicted in September 2019, and both pleaded guilty in November 2021. Both defendants admitted in court that they had sexual contact with the minor and were involved in trafficking her with others. Waters is awaiting sentencing.

      The case was investigated by the FBI and the Little Rock Police Department. Assistant United States Attorneys Kristin Bryant and Allison Bragg are prosecuting the case.

# # #

This news release, as well as additional information about the office of the

United States Attorney for the Eastern District of Arkansas, is available online at

https://www.justice.gov/edar

 Twitter:

@EDARNEWS

El Dorado Arkansas Group Sentenced to 47 Years Combined in Federal Prison for Drug Trafficking

Source: US FBI

EL DORADO – The final member of a South Arkansas drug trafficking organization was sentenced yesterday to federal prison for the Distribution of Methamphetamine. The Honorable Chief Judge Susan O. Hickey presided over the sentencing hearings for the United States District Court in El Dorado.

According to court documents, beginning in February of 2019, investigators with the 13th Judicial District Drug Task Force, the Drug Enforcement Administration (DEA) and the Federal Bureau of Investigation (FBI) initiated an investigation into a drug trafficking organization operating out of the El Dorado Division of the Western District of Arkansas. During the course of that investigation, Pharell Jackson and his drug trafficking organization were identified by investigators to be responsible for distributing large quantities of methamphetamine from Magnolia, Arkansas, to other locales in the Western District of Arkansas and the Eastern District of Arkansas.

Those members of the drug trafficking organization indicted federally have been sentenced as follows:

Pharell Bronse Jackson:  age 32, El Dorado, Arkansas – Conspiracy to Distribute Methamphetamine – 168 months imprisonment and 3-year term of supervised release.

Michael Fitzgerald Williams Jr.:  age 31, North Little Rock, Arkansas – Conspiracy to Distribute Methamphetamine – 120 months imprisonment and 3-year term of supervised release.

Gary Bernard Green II: age 33, Camden, Arkansas – Distribution of Methamphetamine -168 months imprisonment and 3-year term of supervised release.

Jacovas Deonta Mitchell: age 32, El Dorado, Arkansas – Knowing and Intentionally Distributing Methamphetamine – 108 months imprisonment and 3-year term of supervised release.

U.S. Attorney David Clay Fowlkes of the Western District of Arkansas made the announcement.

The 13th Judicial District Drug Task Force, the Drug Enforcement Administration Little Rock, and the FBI investigated the case.

Assistant U.S. Attorneys Benjamin Wulff, Graham Jones, and Steven Mohlhenrich prosecuted the case for the United States.

This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.

Arkansas Mother and Daughter Sentenced to Seven Years Combined in Federal Prison for Bank Fraud, Identity Theft, and Theft of Government Funds

Source: US FBI

FORT SMITH – A Fort Smith mother and daughter were sentenced today to a combined sentencing of seven years in federal prison and ordered to pay $53,000.00 in restitution for Bank Fraud, Identity Theft and Theft of Government Funds. Amanda Komp, 39, was sentenced to 4 years in prison while Tammy McCullough, 58, was sentenced to 3 years in prison. The Honorable Judge P.K. Holmes, III presided over the sentencing hearing in the U.S. District Court in Fort Smith.

According to court documents and evidence presented at trial, Komp worked as Housing Manager at Fort Chaffee from approximately 2014 to September 2019. Komp’s duties included processing payments from funds belonging to the United States government held in the Fort Chaffee billeting fund checking account at Regions Bank. The approval process for expenditures from this account required Komp to obtain the signatures of two members of the Fort Chaffee Lodging Advisory Council on purchase requests and checks payable from the billeting fund account.   

From on or about December 26, 2017, to on or about September 3, 2019, sixty-eight checks totaling $53,000 were issued and paid from the Fort Chaffee billeting fund account at Regions Bank for furniture moving services claimed to have been provided to Fort Chaffee by Triple M Enterprises, a company owned by Komp’s mother, Tammy McCullough. Several of the checks and purchase orders contained forged signatures and the furniture moving services for which the checks were issued were not provided as claimed in invoices submitted by Triple M Enterprises. 

U.S. Attorney David Clay Fowlkes of the Western District of Arkansas made the announcement.

The FBI investigated the case.

Assistant U.S. Attorney’s Kenneth Elser and Bryan Achorn prosecuted the case.

Five ‘New Aryan Empire’ Associates Sentenced to Prison

Source: US FBI

      LITTLE ROCK—Five defendants were sentenced yesterday for their involvement in crimes carried out on behalf of a white supremacist gang. Each defendant previously pleaded guilty to various crimes associated with the New Aryan Empire (NAE), a white supremacist organization that began as a prison gang and functioned as a drug trafficking organization.

      Russell Robinson, 35, of Dover, Arkansas, was sentenced to 204 months imprisonment for kidnapping in aid of racketeering, assault with a dangerous weapon in aid of racketeering, and maiming in aid of racketeering. The remaining four defendants were sentenced for conspiracy to distribute and possess with intent to distribute methamphetamine: Jeffrey Howell, 38, of Russellville, was sentenced to 188 months imprisonment, Richard Hampton, 42, of Pottsville, and Tiffany Parker, 42, of Russellville, were both sentenced to 96 months imprisonment, and April Teeter, 40, of Russellville, was sentenced to 90 months imprisonment. In addition to prison time, United States District Judge Brian S. Miller also sentenced each defendant to five years of supervised release following their terms of imprisonment.

      The investigation began in 2016, when local and federal agencies initiated a joint investigation to identify, infiltrate, and dismantle drug trafficking organizations in Russellville. Agents identified multiple individuals who were trafficking methamphetamine in the Pope County area. 

      In June 2017, NAE members and associates kidnapped two individuals that they suspected of cooperating with law enforcement, which violated the rules of NAE. One victim was held against their will and subsequently beaten and stabbed multiple times. While the victim was held to the ground, another NAE member heated a knife with a torch and burned the victim’s cheek, leading to permanent disfigurement. Another victim was kidnapped at the same time and restrained and repeatedly beaten.

      The overall indictment in this case charged more than 50 people from the Pope County area with violations of the Racketeer Influenced and Corrupt Organizations Act, Violent Crimes in Aid of Racketeering, and numerous gun and drug violations. The case is named “To The Dirt,” a reference to the NAE slogan referring to the rule that members must remain in the NAE until they die. The charges allege acts involving attempted murder, kidnapping, maiming, and conspiracy to distribute methamphetamine. Of the 55 total defendants charged in “Operation ‘To The Dirt,’” 53 defendants have pleaded guilty, 1 defendant was found guilty at trial, and 35 of those defendants have already been sentenced to prison terms: Courtney Talley 94 months; Corey A. Ford 45 months, Henri T. Keener, II 84 months, Jared Dale, 84 months; Britanny Conner, 120 months; Keith Savage, 120 months; Joseph Pridmore, 150 months; Daniel Adame, 262 months; Justin Howell, 155 months; James George, 70 months; Amos Adame, 121 months; and Skippy Don Sanders, 262 months; Andrew Syverson 151 months; Amanda Rapp 262 months; Jayme Short 90 months; Cory S. Donnelly 188 months; Wesley Pierson 120 months; Ralph Ross 36 months; Jeffrey L. Knox 180 months; Robert Chandler 65 months; Timothy Ferguson 180 months; Paula S. Enos 180 months; Heath Kizer 96 months; Christopher S. Helms 102 months; David D. Singleton 131 months; Kathrine R. Ross 60 months BOP; Courtney Talley 94 months; Corey A. Ford 45 months; Henri T. Keener, II 84 months; April Howell 198 months; Kevin M. Long 369 months; James Scott Oliver 327 months; and Wesley S. Gullett 420 months. The remaining defendant, Troy L. Loadholt, remains a fugitive.

      The investigation was conducted by ATF, DEA, the United States Postal Inspection Service, the Pope County Sheriff’s Office, Fifth Judicial Drug Task Force, and the Russellville Police Department, with assistance from the FBI.

# # #

This news release, as well as additional information about the office of the

United States Attorney for the Eastern District of Arkansas, is available online at

https://www.justice.gov/edar

Twitter:

@EDARNEWS

Former Craighead County Clerk Sentenced to 57 Months in Prison for Wire Fraud

Source: US FBI

      LITTLE ROCK—Former Craighead County Clerk Jacob Kade Holliday was sentenced to 57 months in federal prison today for taking more than $1.5 million in county money for his personal use.  Holliday, 34, of Jonesboro, was sentenced by United States District Court Judge James M. Moody, Jr., who also imposed three years of supervised release after Holliday completes his prison term.

      In June 2020, Craighead County officials reported that a theft had occurred from the Craighead County Clerk’s office. The bank that managed the Clerk’s office account had flagged suspicious activity, and auditors concluded that approximately $1,579,057.03 was missing and had been moved to Holliday’s personal banking accounts.

      Law enforcement interviewed Holliday, who admitted to taking the money to fund his businesses: Holliday Development and Management, LLC, and Total Healthcare, LLC, both of which operated restaurants and coffee shops in Jonesboro. Holliday told investigators he planned to pay the money back, but once the COVID-19 pandemic caused most of his businesses to close, he could not replace the money.

      Holliday was indicted in December 2020, when a grand jury charged him with 11 counts of wire fraud for each withdrawal he made from the county account. He pleaded guilty in February of this year and acknowledged that his method was to make a transfer from the county account to one of his personal accounts and then get a cashier’s check from his personal account for the same amount. He pleaded guilty to Count 1 of the indictment, which charged him with wire fraud for his first fraudulent transfer of $101,782.97 on January 29, 2020. In his plea agreement, Holliday agreed to pay $1,579,057.03 in restitution to Craighead County.

      Holliday is currently serving a 120-month sentence in a state case for forgery, and Judge Moody ordered that his federal sentence will not begin until the state sentence is completed. The FBI, Arkansas State Police, and Craighead County Sheriff’s Department conducted the investigation. Assistant United States Attorney Allison W. Bragg prosecuted the case.

# # #

This news release, as well as additional information about the office of the

United States Attorney for the Eastern District of Arkansas, is available online at

https://www.justice.gov/edar

Twitter:

@EDARNEWS

Charges and Seizures Brought in Fraud Scheme Aimed at Denying Revenue for Workers Associated with North Korea

Source: US FBI

IT Workers Infiltrated More than 300 U.S. Companies, Earning Millions

            WASHINGTON – The Justice Department unsealed charges, seizures, and other court-authorized actions to disrupt the illicit revenue generation efforts of the Democratic People’s Republic of Korea (DPRK or North Korea).

            The charges include prosecutions of an Arizona woman, Ukrainian man, and three unidentified foreign nationals who allegedly participated in schemes to place overseas information technology (IT) workers—posing as U.S. citizens and residents—in remote positions at U.S. companies. 

            As alleged in the court documents, DPRK has dispatched thousands of skilled IT workers around the world, who used stolen or borrowed U.S. persons’ identities to pose as domestic workers, infiltrate domestic companies’ networks, and raise revenue for North Korea. The schemes described in court documents involved defrauding over 300 U.S. companies using U.S. payment platforms and online job site accounts, proxy computers located in the United States, and witting and unwitting U.S. persons and entities. This announcement includes the largest case ever charged by the Justice Department involving this type of IT workers’ scheme.

            Two criminal prosecutions brought by the U.S. Attorney’s Office for the District of Columbia, one in partnership with the Computer Crime and Intellectual Property Section of the Justice Department’s Criminal Division, were unsealed today. As part of the prosecutions, two defendants have been arrested and related seizures and search warrants have been executed in Washington, D.C. and other jurisdictions. The investigations were led by the FBI Phoenix and New York Field Offices and IRS Criminal Investigations (IRS-CI), and coordinated with five other FBI field offices and four other U.S. Attorney’s Offices, producing arrests in the United States and Poland, the execution of five premises search warrants, and the seizure of illicitly obtained wages and a website domains.

            “As alleged in the indictment, Chapman and her co-conspirators committed fraud and stole the identities of American citizens to enable individuals based overseas to pose as domestic, remote IT workers,” said Principal Deputy Assistant Attorney General Nicole M. Argentieri, head of the Justice Department’s Criminal Division. “The charges in this case should be a wakeup call for American companies and government agencies that employ remote IT workers. These crimes are alleged to have benefitted the North Korean government. The Criminal Division remains firm in its commitment to prosecute complex criminal schemes like this one.”

            “Today’s announcement of charges and law enforcement action show our broad approach to attacking funding sources for North Korea across the United States,” said U.S. Attorney Matthew M. Graves for the District of Columbia. “We will continue to vigorously pursue cases against individuals, in the United States and abroad, that use U.S. financial systems to raise revenue for North Korea.” 

            “On the surface, today’s allegations of wire fraud, identity theft, and money laundering may read like a typical white collar or economic crime scheme,” said Assistant Director Kevin Vorndran of the FBI’s Counterintelligence Division. “But what these allegations truly represent is a new high-tech campaign to evade U.S. sanctions, victimize U.S. businesses, and steal U.S. identities. The charges clearly demonstrate how the FBI and its partners will employ every resource at our disposal to bring to justice anyone who helps North Korea evade sanctions.”

            “The FBI has long-stated that cybersecurity is national security and this case is living proof of that,” said FBI Special Agent in Charge Akil Davis of the Phoenix Field Office. “That a woman living her quiet life in the outskirts of Phoenix can allegedly get so entangled in something like this clearly indicates our adversaries are getting more sophisticated and stealthier, so it’s critical that businesses and citizens be hyper-vigilant with their cyber activities.”

            “Today’s announcement exposes disturbing criminal ties to North Korea where fraudsters allegedly used stolen identities of U.S. citizens to infiltrate the U.S. job market as remote workers,” said IRS Criminal Investigation Acting Special Agent in Charge of the Phoenix Field Office Carissa Messick. “CI and our federal partners will remain vigilant in our efforts to expose criminal fraud schemes that jeopardize our national security.”

            “Oleksandr Didenko allegedly owned and operated U.S.-based online infrastructure as well as fraudulent and stolen U.S. persons’ identities for use by Information Technology workers in North Korea in an effort to evade sanctions,” said FBI Assistant Director Smith of the New York Field Office. “The arrest of Didenko demonstrates the FBI’s commitment to protecting the United States from threats posed by a hostile foreign actors, specifically the government of the  Democratic Peoples Republic of Korea. Didenko’s arrest also sends a clear message to anyone who supports this type of brazen illegal activity the FBI and our global law enforcement partners will hold you accountable wherever you may be.”

            An indictment was unsealed today in the District of Columbia against U.S. citizen Christina Marie Chapman, 49, of Litchfield Park, Arizona, related to her participation in a scheme to assist overseas IT workers—posing as U.S. citizens and residents—in working at more than 300 U.S. companies in remote IT positions. Chapman was arrested yesterday in Litchfield Park, Arizona.

            As alleged in the indictment, Chapman and her co-conspirators’ scheme defrauded U.S. companies across myriad industries, including multiple well-known Fortune 500 companies, U.S. banks, and other financial service providers. The identities of more than 60 U.S. persons were compromised and used by IT workers related to Chapman’s cell.

            In addition to Chapman, the indictment charged three foreign nationals with money laundering for their participation in the scheme. As alleged in the indictment, the department seized wages earned by more than 19 overseas IT workers and will seek forfeiture of the same.

            Additionally, a criminal complaint was unsealed today in the District of Columbia charging Ukrainian national Oleksandr Didenko, 27, of Kyiv, with a separate years-long scheme to create fake accounts at U.S. IT job search platforms and with U.S.-based money service transmitters.

            As alleged in the complaint, Didenko sold the accounts to overseas IT workers, some of whom he believed were North Korean, and the overseas IT workers used the false identities to apply for jobs with unsuspecting companies. Several U.S. persons had their identities used by IT workers related to Didenko’s cell, and evidence in the complaint showed that the overseas IT workers using Didenko’s services were also working with Chapman. Polish authorities arrested Didenko on May 6 at the request of the United States, which is seeking Didenko’s extradition from Poland.

            Didenko’s company’s online domain, upworksell.com, was also seized today by the Justice Department pursuant to a court order, and all traffic diverted to the FBI.

            Related to the above schemes, the FBI executed search warrants for U.S. based “laptop farms,” residences that hosted multiple laptops for overseas IT workers, wherein U.S.-based facilitators logged onto U.S. company computer networks and then allowed the overseas IT workers to remotely access those laptops through various software applications. The overseas IT workers used the laptop farms’ U.S. Internet Protocol addresses to make it appear as though they were operating inside the United States. Chapman’s residence was searched in October 2023 pursuant to a search warrant issued in the District of Arizona, resulting in evidence that is reflected in the indictment. Search warrants for four U.S. residences associated with laptop farms controlled by Didenko were issued in the Southern District of California, Eastern District of Tennessee, and Eastern District of Virginia, and executed between May 8 and May 10.

            Concurrent with today’s announcement, the U.S. Department of State announced a reward of up to $5 million for information related to Chapman’s coconspirators: John Doe 1, alias Jiho Han; John Doe 2, alias Haoran Xu; John Doe 3, alias Chunji Jin; and an unindicted coconspirator utilizing aliases “Zhonghua” and “Venechor S.”

Chapman Indictment, Money Seizures, and Premises Warrant

            According to the indictment, the overseas IT workers associated with Chapman, many of whom were tied to North Korea, posed as U.S. citizens using the stolen, false, or borrowed identities of U.S. nationals, and applied for positions at U.S companies, causing the transmission of false documentation to the U.S. Department of Homeland Security (DHS). The overseas IT workers gained employment at U.S. companies, including at a top-five major television network, a Silicon Valley technology company, an aerospace manufacturer, an American car manufacturer, a luxury retail store, and a U.S.-hallmark media and entertainment company, all of which were Fortune 500 companies. Some of these companies were purposely targeted by a group of DPRK IT workers, who maintained postings for companies at which they wanted to insert IT workers.

            Chapman ran a “laptop farm,” hosting the overseas IT workers’ computers inside her home so it appeared that the computers were located in the United States, and also received and forged payroll checks and received direct deposits of the overseas IT workers’ wages from the U.S. companies into her U.S. financial accounts. The overseas IT workers also attempted to gain employment and access to information at two different U.S. government agencies on three different occasions, although these efforts were generally unsuccessful. The overseas IT workers associated with Chapman’s cell were paid millions for their work, much of which has been falsely reported to the IRS and the Social Security Administration in the name of the actual U.S. persons whose identities were stolen or borrowed. Chapman also allegedly conspired with the John Doe defendants to commit money laundering by conducting financial transactions under aliases to receive money generated by the scheme and transfer those funds outside of the United States, in an attempt to hide that these were proceeds of the IT workers’ fraud.

            Chapman and her co-conspirators allegedly compromised more than 60 identities of U.S. persons, impacted more than 300 U.S. companies, caused false information to be conveyed to DHS on more than 100 occasions, created false tax liabilities for more than 35 U.S. persons, and resulted in at least $6.8 million of revenue to be generated for the overseas IT workers. The department seized funds related to scheme from Chapman as well as wages and monies accrued by more than 19 overseas IT workers.

            “Using the stolen identities of U.S. citizens is a crime by itself, but when you use those identities to procure employment for foreign nationals with ties to North Korea at hundreds of U.S. companies, you have compromised the national security of an entire nation,” said Chief Guy Ficco of IRS-CI. “For more than 100 years, IRS Criminal Investigation special agents have been following the money, and their financial expertise has once again stopped criminals in their tracks.”

            Chapman is charged with conspiracy to defraud the United States, conspiracy to commit wire fraud, conspiracy to commit bank fraud, aggravated identity theft, conspiracy to commit identity fraud, conspiracy to launder monetary instruments, operating as an unlicensed money transmitting business, and unlawful employment of aliens. The John Does are charged with conspiracy to commit money laundering. If convicted, Chapman faces a maximum penalty of 97.5 years in prison, including a mandatory minimum of two years in prison on the aggravated identity theft count, and the John Does face a maximum penalty of 20 years in prison.

            The FBI Phoenix Field Office and IRS-CI Phoenix Field Office are investigating this case, with assistance from the FBI Chicago Field Office.

            Assistant U.S. Attorney Karen P. Seifert for the District of Columbia and Trial Attorney Ashley R. Pungello of the Criminal Division’s Computer Crime and Intellectual Property Section are prosecuting this case, with assistance from Paralegal Specialists Brian Rickers and Jorge Casillas. The U.S. Attorney’s Office for the District of Arizona and Trial Attorney Gregory Nicosia of the National Security Division’s National Security Cyber Section also provided valuable assistance.

Didenko Complaint, Domain Seizure, and Premises Warrants

            According to the criminal complaint, Didenko allegedly engaged in a multi-year scheme to create accounts at U.S.-based freelance IT job search platforms and with U.S. money service transmitters in the names of false identities, including identities of U.S. persons, and sold these accounts to overseas IT workers. Didenko ran a website, upworksell.com, which advertised creating, buying, and renting accounts at U.S. websites using false identities, and also advertised “Credit Card Rental” in the European Union and the United States and SIM card rental for cellular phones. Didenko allegedly offered a full array of services to allow an individual to pose under a false identity and market themselves for remote IT work with unsuspecting companies. As stated, Didenko’s domain was seized as part of the case.

            According to the affidavit in support of the complaint, Didenko is alleged to have managed as many as approximately 871 “proxy” identities, provided proxy accounts for three freelance U.S. IT hiring platforms, and provided proxy accounts for three different U.S.-based money service transmitters. In coordination with his co-conspirators, Didenko facilitated the operation of at least three U.S.-based laptop farms, at one point hosting approximately 79 computers. Didenko sent or received $920,000 in U.S. dollars payments since July 2018.

            Didenko acknowledged in messages that he believed he was assisting North Korean IT workers. One of Didenko’s overseas IT worker customers also requested that a laptop be sent from one of Didenko’s U.S. laptop farms to Chapman’s laptop farm, showing the interconnectivity of these cells within the DPRK overseas IT worker network. Search warrants of Didenko’s laptop farms were executed in early May 2024.

            If convicted, Didenko faces a maximum penalty of 67.5 years in prison, including a mandatory minimum of two years in prison on the aggravated identity theft count.

            The FBI New York Field Office is investigating this case. The FBI Norfolk and San Diego Field Offices and the Jefferson City, Tennessee, Resident Agency provided assistance in executing search warrants.

            Assistant U.S. Attorneys Karen P. Seifert and Steven Wasserman for the District of Columbia are prosecuting the case, with assistance from Paralegal Specialists Brian Rickers and Jorge Casillas and the U.S. Attorney’s Office for the District of Columbia. The U.S. Attorney’s Offices for the Southern District of California, Eastern District of Tennessee, and Eastern District of Virginia, Justice Department’s Office of International Affairs, and Trial Attorney Jacques Singer-Emery of the National Security Division’s National Security Cyber Section provided valuable assistance as well.

***

            The FBI, along with the Departments of State and Treasury, issued a May 2022 advisory to alert the international community, private sector, and public about the North Korea IT worker threat. Updated guidance was issued in October 2023 by the United States and the Republic of Korea (South Korea), which includes indicators to watch for that are consistent with North Korea IT worker fraud.

            An indictment and a criminal complaint are merely allegations. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

 

Chinle Man Sentenced to Life in Prison for Multiple Counts of Child Sex Abuse

Source: US FBI

PHOENIX, Ariz. – Kendall Anagal, 41, of Chinle, was sentenced last week by United States District Judge Diane J. Humetewa to life in prison for multiple counts of child sexual abuse. 

On February 9, 2024, a federal jury found Anagal guilty of three counts of Aggravated Sexual Abuse and one count of Abusive Sexual Contact of a Child. Anagal repeatedly and violently sexually abused a child who, at the time of the abuse, was between nine and 10 years old. The victim reported these offenses when she was 17 years old; she did not disclose them earlier because she feared for her life.

The Federal Bureau of Investigation conducted the investigation in this case. Assistant U.S. Attorneys Tracy Van Buskirk and Sharon K. Sexton, District of Arizona, Phoenix, handled the prosecution. 
 

CASE NUMBER:            CR-22-8113-PCT-DJH
RELEASE NUMBER:    2024-063_Anagal

# # #

For more information on the U.S. Attorney’s Office, District of Arizona, visit http://www.justice.gov/usao/az/
Follow the U.S. Attorney’s Office, District of Arizona, on X @USAO_AZ for the latest news.