20 Years at the TSC

Source: US FBI

The TSC is the final arbiter of watchlisting decisions, and it keeps rigorous and continuing quality control measures over the terrorism watchlist to ensure that nominations continue to satisfy the criteria for inclusion and that information offered in support of the nomination is reliable and up to date. Quality control measures include regular reviews and evaluations by the nominating agency, NCTC, and the TSC to verify that each nomination meets the watchlist inclusion criteria.

In addition to maintaining and regularly reviewing the watchlist, the TSC responds to queries from federal, state, and local agencies—as well as certain foreign partners who have information sharing agreements with the United States—for a variety of screening purposes.

“We’re the unclassified system for sharing information,” said Glasheen. “The TSC has the authority to accept, maintain, and share identifying information on people who are on the watchlist.”

Around-the-Clock Response

The TSC operates 24 hours a day, 365 days a year. Call center staff, who work across three shifts, answer inquiries immediately as they come in. To ensure continuity of operations, a small room next to the call center houses a few bunk beds in case employees can’t travel home between their shifts for some reason, such as inclement weather.

Some inquiries are routine screening procedures. Others are triggered by live encounters, like a police officer calling to report a potential watchlist match of someone they’ve pulled over.

The TSC conducts identity resolution, looking at all available information to verify whether the name that triggered the inquiry is the same person on the watchlist.

“The call center tries to resolve identity resolutions within minutes,” said Glasheen.

The TSC then responds to the inquiry with one of three possible answers: positive match, negative match, or inconclusive.

“We don’t dictate what actions should be taken when a screening agency encounters an individual potentially on the watchlist,” said Glasheen. “We say only whether it’s positive, negative, or inconclusive. Then it’s up to the caller, within their own authorities, to determine what actions they take based on that information.”

FBI, HSI Investigation Leads to Historic War Crimes Indictment

Source: US FBI

The U.S. government on December 6 announced that it has brought its first-ever charges under the War Crimes Act of 1996 against four Russian-affiliated soldiers who allegedly violated the human rights of an American residing in Ukraine amid Russia’s full-scale invasion of the country.

FBI Underscores Commitment to Protecting American Jews, Muslims, Arabs Amid Israel-Hamas Conflict

Source: US FBI

In the wake of Hamas’ October 2023 terrorist attacks in Israel and the ensuing crisis in the Gaza region, the FBI has collaborated with our law enforcement partners to investigate potential threats against Jewish, Muslim, and Arab communities and institutions.

FBI executive leadership—and community outreach specialists in our 56 field offices across the country—have also reached out to civic and faith-based organizations to reiterate the Bureau’s mission; our dedication to protecting people’s rights to live, work, and worship freely; and the resources we offer the public to safeguard their circles from hate crimes and other threats.

Within the first 30 days of the current conflict, FBI Director Christopher Wray reached out to national-level partners and participated in a topical conference call. Deputy Director Paul Abbate and representatives from multiple HQ divisions attended a meeting with an interfaith council related to the crisis. And Office of Public Affairs Assistant Director Cathy Milhoan reached out to the FBI’s national partners and community leaders reiterating our commitment to partnering with and protecting them during this time.

“I understand this is an elevated time of concern for your communities, so I want to assure you: the FBI will not tolerate violence—especially violence motivated by hate and extremism,” wrote Milhoan in a recent letter to the Bureau’s national partners and community leaders. “We will continue to do everything in our power and use all our legal authorities to protect the American people and pursue justice for all victims, their families, and their communities.”

CRU directed all Bureau field offices to provide outreach to their Jewish and Muslim communities, Hoffman said. This outreach looked different for different field offices, depending on resources and the populations who call their areas of responsibility home, he explained. In Baltimore, for instance, field office personnel visited every mosque and synagogue within the office’s area of responsibility to directly communicate with their leadership.

CRU estimates that field offices undertook over 660 conflict-related engagements with community partners within the first 30 days of the conflict. In that same period, personnel from the Bureau’s 56 field offices had topical conversations with faith and civic groups in their areas of responsibility on a daily basis. Headquarters CRU staff also helped faith-based groups address threats they received in connection with the conflict.

“The reality is the better we know our communities, the better we can protect them,” Hoffman said. “At its highest level, engaging in collaborative FBI-community partnerships allows both groups to build meaningful relationships based on trust, break down barriers and stereotypes, increase transparency, and promote understanding. On a more granular level, partnering allows community and faith-based groups to have their voices heard and bring their unique knowledge to the table to work collaboratively with us to solve crime problems facing their community.”

FBI Update on Bourbon Street Terrorist Attack

Source: US FBI

The FBI continues investigating the horrific attack on innocent victims on Bourbon Street in New Orleans in the early morning hours of January 1, 2025. 

The subject has been identified as 42-year-old Shamsud-Din Jabbar, a U.S. citizen from Texas. Attached is a more recent photo of Jabbar.

FBI special agents and our law enforcement partners are currently conducting a number of court-authorized search warrants in New Orleans and other states. The FBI’s Evidence Response Team continues to process the crime scene to meticulously gather all relevant evidence. The FBI plans to turn over the Bourbon Street crime scene to local authorities by early tomorrow morning. Additional FBI resources, including victim specialists, are responding to assist victims and family members. 

Anyone with information, photos, or video should call the FBI at 1-800- CALL-FBI or visit www.fbi.gov/bourbonstreetattack.

FBI Statement on the Attack in New Orleans

Source: US FBI

Today, at approximately 3:15 a.m. CST, an individual drove a pickup truck into a crowd of people on Bourbon Street in New Orleans, killing at least 10 and injuring dozens of others. After hitting the crowd, he exited the vehicle and fired upon local law enforcement. Law enforcement returned fire, and the subject was pronounced deceased at the scene. Two law enforcement officers were injured and transported to a local hospital. 

The subject has been identified as 42-year-old Shamsud-Din Jabbar, a U.S. citizen from Texas. He was driving a Ford pickup truck, which appears to have been rented, and we are working to confirm how the subject came into possession of the vehicle.

An ISIS flag was located in the vehicle, and the FBI is working to determine the subject’s potential associations and affiliations with terrorist organizations. 

Weapons and a potential IED were located in the subject’s vehicle. Other potential IEDs were also located in the French Quarter. The FBI’s special agent bomb technicians are working with our law enforcement partners to determine if any of these devices are viable, and they will work to render those devices safe. 

The FBI is the lead investigative agency, and we are working with our partners to investigate this as an act of terrorism. We are aggressively running down all leads to identify any possible associates of the subject.

The FBI has set up a digital tip line, and we ask anyone with information or video of the incident to submit them to www.fbi.gov/bourbonstreetattack or call 1-800-CALL-FBI. 

FBI Offers Reward in Death of Minor on Ute Mountain Ute Reservation

Source: US FBI

The FBI is offering a $10,000 reward to anyone providing information that leads to the arrest and conviction of the man wanted in the shooting death of a minor on the Ute Mountain Ute Reservation in Colorado.

A federal arrest warrant has been issued for Jeremiah Hight, who is wanted in the death of the minor in Towaoc in the early morning hours of Dec. 11.

Hight, 23, is a Native American man with brown hair and brown eyes. He is 6’0” tall and weighs 400 pounds. He has tattoos on his right leg, left arm, right arm, right shoulder, neck, and left shoulder. He has a pierced left ear and a scar on his chest.

He has ties to Monument Valley in the Four Corners area.

He might be armed and has proven he can be dangerous. Anyone with information about the homicide or the whereabouts of Jeremiah Hight is urged to call 1.800.CALL.FBI (800-225-5324) or make a report at tips.fbi.gov.

FBI, DC3, and NPA Identification of North Korean Cyber Actors, Tracked as TraderTraitor, Responsible for Theft of $308 Million USD from Bitcoin.DMM.com

Source: US FBI

The Federal Bureau of Investigation, Department of Defense Cyber Crime Center, and National Police Agency of Japan are alerting the public to the theft of cryptocurrency worth $308 million U.S. dollars from the Japan-based cryptocurrency company DMM by North Korean cyber actors in May 2024. The theft is affiliated with TraderTraitor threat activity, which is also tracked as Jade Sleet, UNC4899, and Slow Pisces. TraderTraitor activity is often characterized by targeted social engineering directed at multiple employees of the same company simultaneously.

In late March 2024, a North Korean cyber actor, masquerading as a recruiter on LinkedIn, contacted an employee at Ginco, a Japan-based enterprise cryptocurrency wallet software company. The threat actor sent the target, who maintained access to Ginco’s wallet management system, a URL linked to a malicious Python script under the guise of a pre-employment test located on a GitHub page. The victim copied the Python code to their personal GitHub page and was subsequently compromised. 

After mid-May 2024, TraderTraitor actors exploited session cookie information to impersonate the compromised employee and successfully gained access to Ginco’s unencrypted communications system. In late-May 2024, the actors likely used this access to manipulate a legitimate transaction request by a DMM employee, resulting in the loss of 4,502.9 BTC, worth $308 million at the time of the attack. The stolen funds ultimately moved to TraderTraitor-controlled wallets.  

The FBI, National Police Agency of Japan, and other U.S. government and international partners will continue to expose and combat North Korea’s use of illicit activities—including cybercrime and cryptocurrency theft—to generate revenue for the regime. 

Director Wray Visits FBI Offices in Cheyenne and Denver

Source: US FBI

Earlier this week, FBI Director Christopher Wray visited the Denver Field Office and met with FBI employees and partners from across Colorado and Wyoming.

His trip to Wyoming included a productive discussion with law enforcement in the state about the importance of collaboration to fulfilling our shared mission, noting that “partnerships are more important now than they’ve ever been.” While in Wyoming, Director Wray also visited F.E. Warren AFB, where he met with military partners to discuss the many ways the FBI is working with the Department of Defense to protect against threats posed by hostile foreign nations.

In Denver, Director Wray sat down with partners from across law enforcement, the private sector, and academia in Colorado and Wyoming, thanking them for their partnership and emphasizing the need to continue working together to stay ahead of cyber, counterintelligence, and counterterrorism threats. The group also discussed the importance of continued collaboration to defend against threats to our critical infrastructure, and emerging challenges such as criminal use of artificial intelligence and cryptocurrency. While in Colorado, Director Wray also met with officials from the Bureau of Prisons at one of their facilities.

Director Wray pledged the FBI’s intent to try to continue to support law enforcement partners in Colorado and Wyoming through training, investigative services, and support, despite the increasingly limited budget environment. “There’s a force multiplier effect that comes from constant engagement and collaboration,” Director Wray said, “and you can count on us to keep focusing on how to be the best partner.”

FBI Denver serves all of Colorado and Wyoming. The office has nine resident agencies covering the two states. This trip marks Director Wray’s third visit to the Denver Field Office and his first visit to Wyoming as FBI Director.

United States Charges Dual Russian and Israeli National as Developer of LockBit Ransomware Group

Source: US FBI

Defendant Rostislav Panev in Custody Pending Extradition from Israel to the United States

Note: A copy of the superseding criminal complaint can be found here.

A superseding criminal complaint filed in the District of New Jersey was unsealed today charging a dual Russian and Israeli national for being a developer of the LockBit ransomware group.

In August, Rostislav Panev, 51, a dual Russian and Israeli national, was arrested in Israel pursuant to a U.S. provisional arrest request with a view towards extradition to the United States. Panev is currently in custody in Israel pending extradition on the charges in the superseding complaint.

“The Justice Department’s work going after the world’s most dangerous ransomware schemes includes not only dismantling networks, but also finding and bringing to justice the individuals responsible for building and running them,” said Attorney General Merrick B. Garland. “Three of the individuals who we allege are responsible for LockBit’s cyberattacks against thousands of victims are now in custody, and we will continue to work alongside our partners to hold accountable all those who lead and enable ransomware attacks.”

“The arrest of Mr. Panev reflects the Department’s commitment to using all its tools to combat the ransomware threat,” said Deputy Attorney General Lisa Monaco. “We started this year with a coordinated international disruption of LockBit — the most damaging ransomware group in the world. Fast forward to today and three LockBit actors are in custody thanks to the diligence of our investigators and our strong partnerships around the world. This case is a model for ransomware investigations in the years to come.”

“The arrest of alleged developer Rostislav Panev is part of the FBI’s ongoing efforts to disrupt and dismantle the LockBit ransomware group, one of the most prolific ransomware variants across the globe,” said FBI Director Christopher Wray. “The LockBit group has targeted both public and private sector victims around the world, including schools, hospitals, and critical infrastructure, as well as small businesses and multi-national corporations.  No matter how hidden or advanced the threat, the FBI remains committed to working with our interagency partners to safeguard the cyber ecosystem and hold accountable those who are responsible for these criminal activities.” 

“The criminal complaint alleges that Rostislav Panev developed malware and maintained the infrastructure for LockBit, which was once the world’s most destructive ransomware group and attacked thousands of victims, causing billions of dollars in damage,” said Principal Deputy Assistant Attorney General Nicole M. Argentieri, head of the Justice Department’s Criminal Division. “Along with our domestic and international law enforcement partner actions to dismantle LockBit’s infrastructure, the Criminal Division has disrupted LockBit’s operations by charging seven of its key members (including affiliates, developers, and its administrator) and arresting three of these defendants — including Panev. We are especially grateful for our partnerships with authorities in Europol, the United Kingdom, France, and Israel, which show that, when likeminded countries work together, cybercriminals will find it harder to escape justice.”

“As alleged by the complaint, Rostislav Panev for years built and maintained the digital weapons that enabled his LockBit coconspirators to wreak havoc and cause billions of dollars in damage around the world,” said U.S. Attorney Philip R. Sellinger for the District of New Jersey. “But just like the six other LockBit members previously identified and charged by this office and our FBI and Criminal Division partners, Panev could not remain anonymous and avoid justice indefinitely. He must now answer for his crimes. Today’s announcement represents another blow struck by the United States and our international partners against the LockBit organization, and our efforts will continue relentlessly until the group is fully dismantled and its members brought to justice.”

According to the superseding complaint, documents filed in this and related cases, and statements made in court, Panev acted as a developer of the LockBit ransomware group from its inception in or around 2019 through at least February 2024. During that time, Panev and his LockBit coconspirators grew LockBit into what was, at times, the most active and destructive ransomware group in the world. The LockBit group attacked more than 2,500 victims in at least 120 countries around the world, including 1,800 in the United States. Their victims ranged from individuals and small businesses to multinational corporations, including hospitals, schools, nonprofit organizations, critical infrastructure, and government and law-enforcement agencies. LockBit’s members extracted at least $500 million in ransom payments from their victims and caused billions of dollars in other losses, including lost revenue and costs from incident response and recovery.

LockBit’s members comprised “developers,” like Panev, who designed the LockBit malware code and maintained the infrastructure on which LockBit operated. LockBit’s other members, called “affiliates,” carried out LockBit attacks and extorted ransom payments from LockBit victims. LockBit’s developers and affiliates would then split ransom payments extorted from victims.

As alleged in the superseding complaint, at the time of Panev’s arrest in Israel in August, law enforcement discovered on Panev’s computer administrator credentials for an online repository that was hosted on the dark web and stored source code for multiple versions of the LockBit builder, which allowed LockBit’s affiliates to generate custom builds of the LockBit ransomware malware for particular victims. On that repository, law enforcement also discovered source code for LockBit’s StealBit tool, which helped LockBit affiliates exfiltrate data stolen through LockBit attacks. Law enforcement also discovered access credentials for the LockBit control panel, an online dashboard maintained by LockBit developers for LockBit’s affiliates and hosted by those developers on the dark web.

The superseding complaint also alleges that Panev exchanged direct messages through a cybercriminal forum with LockBit’s primary administrator, who, in an indictment unsealed in the District of New Jersey in May, the United States alleged to be Dimitry Yuryevich Khoroshev (Дмитрий Юрьевич Хорошев), also known as LockBitSupp, LockBit, and putinkrab. In those messages, Panev and the LockBit primary administrator discussed work that needed to be done on the LockBit builder and control panel.

Court documents further indicate that, between June 2022 and February 2024, the primary LockBit administrator made a series of transfers of cryptocurrency, laundered through one or more illicit cryptocurrency mixing services, of approximately $10,000 per month to a cryptocurrency wallet owned by Panev. Those transfers amounted to over $230,000 during that period.

In interviews with Israeli authorities following his arrest in August, Panev admitted to having performed coding, development, and consulting work for the LockBit group and to having received regular payments in cryptocurrency for that work, consistent with the transfers identified by U.S. authorities. Among the work that Panev admitted to having completed for the LockBit group was the development of code to disable antivirus software; to deploy malware to multiple computers connected to a victim network; and to print the LockBit ransom note to all printers connected to a victim network. Panev also admitted to having written and maintained LockBit malware code and to having provided technical guidance to the LockBit group.

The LockBit Investigation

The superseding complaint against, and apprehension of, Panev follows a disruption of LockBit ransomware in February by the United Kingdom (U.K.)’s National Crime Agency (NCA)’s Cyber Division, which worked in cooperation with the Justice Department, FBI, and other international law enforcement partners. As previously announced by the Department, authorities disrupted LockBit by seizing numerous public-facing websites used by LockBit to connect to the organization’s infrastructure and by seizing control of servers used by LockBit administrators, thereby disrupting the ability of LockBit actors to attack and encrypt networks and extort victims by threatening to publish stolen data. That disruption succeeded in greatly diminishing LockBit’s reputation and its ability to attack further victims, as alleged by documents filed in this case.

The superseding complaint against Panev also follows charges brought in the District of New Jersey against other LockBit members, including its alleged primary creator, developer, and administrator, Dmitry Yuryevich Khoroshev. An indictment against Khoroshev unsealed in May alleges that Khoroshev began developing LockBit as early as September 2019, continued acting as the group’s administrator through 2024, a role in which Khoroshev recruited new affiliate members, spoke for the group publicly under the alias “LockBitSupp,” and developed and maintained the infrastructure used by affiliates to deploy LockBit attacks. Khoroshev is currently the subject of a reward of up to $10 million through the U.S. Department of State’s Transnational Organized Crime (TOC) Rewards Program, with information accepted through the FBI tip website at www.tips.fbi.gov/.

A total of seven LockBit members have now been charged in the District of New Jersey. Beyond Panev and Khoroshev, other previously charged LockBit defendants include:

  • In July, two LockBit affiliate members, Mikhail Vasiliev, also known as Ghostrider, Free, Digitalocean90, Digitalocean99, Digitalwaters99, and Newwave110, and Ruslan Astamirov, also known as BETTERPAY, offtitan, and Eastfarmer, pleaded guilty in the District of New Jersey for their participation in the LockBit ransomware group and admitted deploying multiple LockBit attacks against U.S. and foreign victims. Vasiliev and Astamirov are presently in custody awaiting sentencing.
  • In February, in parallel with the disruption operation described above, an indictment was unsealed in the District of New Jersey charging Russian nationals Artur Sungatov and Ivan Kondratyev, also known as Bassterlord, with deploying LockBit against numerous victims throughout the United States, including businesses nationwide in the manufacturing and other industries, as well as victims around the world in the semiconductor and other industries. Sungatov and Kondratyev remain at large.
  • In May 2023, two indictments were unsealed in Washington, D.C., and the District of New Jersey charging Mikhail Matveev, also known as Wazawaka, m1x, Boriselcin, and Uhodiransomwar, with using different ransomware variants, including LockBit, to attack numerous victims throughout the United States, including the Washington, D.C., Metropolitan Police Department. Matveev remains at large and is currently the subject of a reward of up to $10 million through the U.S. Department of State’s TOC Rewards Program, with information accepted through the FBI tip website at www.tips.fbi.gov/.

The U.S. Department of State’s TOC Rewards Program is offering rewards of:

Information is accepted through the FBI tip website at tips.fbi.gov.

Khoroshev, Matveev, Sungatov, and Kondratyev have also been designated for sanctions by the Department of the Treasury’s Office of Foreign Assets Control for their roles in launching cyberattacks.

Victim Assistance

LockBit victims are encouraged to contact the FBI and submit information at www.ic3.gov/. As announced by the Department in February, law enforcement, through its disruption efforts, has developed decryption capabilities that may enable hundreds of victims around the world to restore systems encrypted using the LockBit ransomware variant. Submitting information at the IC3 site will enable law enforcement to determine whether affected systems can be successfully decrypted.

LockBit victims are also encouraged to visit www.justice.gov/usao-nj/lockbit for case updates and information regarding their rights under U.S. law, including the right to submit victim impact statements and request restitution, in the criminal litigation against Panev, Astamirov, and Vasiliev.

The FBI Newark Field Office, under the supervision of Acting Special Agent in Charge Nelson I. Delgado, is investigating the LockBit ransomware variant. Israel’s Office of the State Attorney, Department of International Affairs, and Israel National Police; France’s Gendarmerie Nationale Cyberspace Command, Paris Prosecution Office — Cyber Division, and judicial authorities at the Tribunal Judiciare of Paris; Europol; Eurojust; the U.K.’s NCA; Germany’s Landeskriminalamt Schleswig-Holstein, Bundeskriminalamt, and the Central Cybercrime Department North Rhine-Westphalia; Switzerland’s Federal Office of Justice, Public Prosecutor’s Office of the Canton of Zurich, and Zurich Cantonal Police; Spain’s Policia Nacional and Guardia Civil; Japan’s National Police Agency; Australian Federal Police; Sweden’s Polismyndighetens; Canada’s Royal Canadian Mounted Police; Politie Dienst Regionale Recherche Oost-Brabant of the Netherlands; and Finland’s National Bureau of Investigation have provided significant assistance and coordination in these matters and in the LockBit investigation generally.

Trial Attorneys Debra Ireland and Jorge Gonzalez of the Criminal Division’s Computer Crime and Intellectual Property Section (CCIPS) and Assistant U.S. Attorneys Andrew M. Trombly, David E. Malagold, and Vinay Limbachia for the District of New Jersey are prosecuting the charges against Panev and the other previously charged LockBit defendants in the District of New Jersey.

The Justice Department’s Cybercrime Liaison Prosecutor to Eurojust, Office of International Affairs, and National Security Division also provided significant assistance.

Additional details on protecting networks against LockBit ransomware are available at StopRansomware.gov. These include Cybersecurity and Infrastructure Security Agency Advisories AA23-325A, AA23-165A, and AA23-075A. 

A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

New York Resident Pleads Guilty to Operating Secret Police Station of the Chinese Government in Lower Manhattan

Source: US FBI

Defendant Admitted That He Conspired to Act as an Illegal Agent of the Chinese Government

Chen Jinping, 60, of New York, New York, pleaded guilty today to conspiring to act as an illegal agent of the government of the People’s Republic of China (PRC), in connection with opening and operating an undeclared overseas police station, located in lower Manhattan, for the PRC’s Ministry of Public Security (MPS).

“Today’s guilty plea holds the defendant accountable for his brazen efforts to operate an undeclared overseas police station on behalf of the PRC’s national police force — a clear affront to American sovereignty and danger to our community that will not be tolerated,” said Assistant Attorney General Matthew G. Olsen of the Justice Department’s National Security Division. “The Department of Justice will continue to pursue anyone who attempts to aid the PRC’s efforts to extend their repressive reach into the United States.”

“Today’s acknowledgment of guilt is a stark reminder of the insidious efforts taken by the PRC government to threaten, harass, and intimidate those who speak against their Communist Party,” said Executive Assistant Director Robert Wells of the FBI’s National Security Branch. “These blatant violations will not be tolerated on U.S. soil. The FBI remains committed to preserving the rights and freedoms of all people in our country and will defend against transnational repression at every front.”

“A priority of my office has been to counteract the malign activities of foreign governments that violate our nation’s sovereignty by targeting local diaspora communities in the United States,” said U.S. Attorney Breon Peace for the Eastern District of New York. “Today, a participant in a transnational repression scheme who worked to establish a secret police station in the middle of New York City on behalf of the national police force of the People’s Republic of China has pleaded guilty to conspiracy to act as an illegal agent. We will continue our efforts to protect the rights of vulnerable persons who come to this country to escape the repressive activities of authoritarian regimes.”

As alleged, Chen Jinping and co-defendant “Harry” Lu Jianwang conspired to act as illegal agents of the PRC government and also obstructed justice by destroying evidence of their communications with an MPS official. While acting under the direction and control of the MPS official, the defendants worked together to establish the first known overseas police station in the United States on behalf of the Fuzhou branch of the MPS. The police station — which closed in the fall of 2022 — occupied an entire floor in an office building in Manhattan’s Chinatown. Lu and Chen helped open and operate the clandestine police station. None of the participants in the scheme informed the U.S. government that they were helping the PRC government surreptitiously open and operate an undeclared MPS police station on U.S. soil.

In October 2022, the FBI conducted a judicially authorized search of the illegal police station. In connection with the search, FBI agents interviewed both defendants and seized their phones. In reviewing the contents of these phones, FBI agents observed that communications between the defendants and an MPS official appeared to have been deleted. In subsequent consensual interviews, the defendants admitted to the FBI that they had deleted their communications with the MPS official after learning about the ongoing FBI investigation, thus preventing the FBI from learning the full extent of the MPS’s directions for the overseas police station.

Chen faces a maximum penalty of five years in prison. Per Chen’s plea agreement, the government has agreed to dismiss the obstruction of justice charge against him. Lu has pleaded not guilty to both of the charges against him and is awaiting trial.

The FBI is investigating the case.

Assistant U.S. Attorneys Alexander A. Solomon and Antoinette N. Rangel for the Eastern District of New York and Trial Attorney Scott A. Claffee of the National Security Division’s Counterintelligence and Export Control Section are prosecuting the case.

The FBI has created a website for victims to report efforts by foreign governments to stalk, intimidate, or assault people in the United States. If you believe that you are or have been a victim of transnational repression, please visit www.fbi.gov/investigate/counterintelligence/transnational-repression.