Ketchikan man sentenced to 5 years for possessing a firearm as a felon during a domestic violence assault

Source: United States Department of Justice Criminal Division

JUNEAU, Alaska – A Ketchikan man was sentenced today to five years in prison and will serve three years of court mandated supervision upon release from prison for possessing a firearm as a felon during a domestic violence assault.

According to court documents, on Oct. 27, 2024, the Ketchikan Police Department (KPD) received a 911 phone call and heard a male and female arguing. The female was crying and begging the man to let her leave the residence. The man later referenced a loaded firearm present in the room. KPD immediately sent officers to respond to a residence in Ketchikan.

Law enforcement identified Michael McLoone, 57, as the man in the room with the female victim. McLoone was agitated when officers contacted him. The female victim said she and McLoone were arguing, and she was afraid he was going to harm her. Officers arrested McLoone for felony assault, and a criminal history check revealed that McLoone had two previous felony convictions for assault, prohibiting him from possessing firearms for life.

Law enforcement recovered three firearms, magazines, ammunition and body armor from McLoone’s residence following his arrest.

On June 17, 2025, McLoone pleaded guilty to one count of being a felon in possession of a firearm. 

“Mr. McLoone can only be categorized as a serial domestic violence offender, with multiple state assault convictions spanning 30 years. His lengthy record of violence against women poses a great risk to Alaskans,” said U.S. Attorney Michael J. Heyman for the District of Alaska. “This prison sentence will protect the Ketchikan community and its residents from Mr. McLoone for many years. My office will continue to prosecute and hold accountable offenders who illegally possess firearms and use them to inflict fear and harm.”

“Mr. McLoone’s utter disregard for the law coupled with his propensity for violence against women makes him a pressing and undeniable danger to society. ATF is proud to stand alongside our law enforcement partners and the U.S. Attorney’s Office to shield our community members from the threat of domestic violence,” said Acting Special Agent in Charge Eric Jackson of the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) Seattle Field Division.

“Based on the evidence gathered throughout this investigation, Michael McLoone has demonstrated a long pattern of violent behavior and repeated abuse. His conduct has escalated over time, creating an increasingly dangerous environment for his domestic partners. It is fortunate that those who have been involved with Mr. McLoone survived these incidents,” said Deputy Chief Derek McGarrigan of KPD. “The Ketchikan Police Department remains committed to working closely with our local, state, and federal partners to hold violent offenders accountable and to protect the safety of our community.”

The ATF Anchorage Field Office and KPD investigated the case.

Assistant U.S. Attorney Jack Schmidt prosecuted the case.

###

U.S. Attorney’s Office and Polyclinic resolve allegations it violated the Americans with Disabilities Act

Source: United States Department of Justice Criminal Division

Clinic allegedly failed to provide a tactile interpreter for patient who is deaf and blind

Seattle – The U.S. Attorney’s Office and the Polyclinic, d/b/a Optum Care Washington, has resolved allegations one of its medical facilities failed on multiple occasions to provide sign language interpreter services for a patient who is deaf and blind, in violation of the American with Disabilities Act (ADA). Under the terms of the settlement, the Polyclinic will pay $25,000 to the patient who had multiple appointments either cancelled or with inadequate interpreter services. The Polyclinic has also set up a fund of $350,000 to compensate any other patients who were impacted by the clinics’ failure to have appropriate interpreter services during the Claims Period between January 1, 2021, and September 30, 2025. In addition to the financial payments Polyclinic will take several steps to ensure compliance with the ADA.

The Polyclinic commits to having appropriate interpreter services available for all patients and will contract with no fewer than five companies to provide interpreter services. As part of its intake process for patients the Polyclinic will assess the need for appropriate aids or services. The Polyclinic will designate a point person to oversee assistive devices and services, and that person will have additional staffers who can arrange appropriate services. This group of employees will undergo mandatory training approved by the U.S. Attorney’s Office regarding the steps to identify communication needs and secure interpreter services. Training will also be provided to all staff who have patient contact.

The Polyclinic will maintain a log of patients or companions who need assistive services, and the services provided. If services are not provided the log will explain the circumstances. These logs will be part of the Compliance Report that the Polyclinic will periodically provide to the U.S. Attorney’s Office.

Polyclinic will post information in Braille as well printed signs about the Auxiliary Aids and Services it has available. The information will also be posted on the Polyclinic website about ways to request such services.

Every six months Polyclinic will prepare a compliance report for the U.S. Attorney’s Office. If there are any complaints about failing to provide appropriate auxiliary aids or services those complaints must be forwarded to the U.S. Attorney’s Office within 30 days.

The Polyclinic will pay the United States $25,000 to vindicate the public interest in enforcement of the ADA. The Polyclinic will name a Claims Administrator to review its records to determine if there are other patients who were harmed by the failure to provide appropriate assistive services during the Claims Period. The list of patients and the number of appointments cancelled or impacted will be provided to the U.S. Attorney’s Office. Those patients will be contacted by the Claims Administrator about a potential claim. There will also be a website where potentially eligible claimants can get more information. Eligible claimants may seek compensation from the $350,000 fund set up by Polyclinic. Any remaining funds after all legitimate claims have been processed will be returned to the Polyclinic.

The agreement between Polyclinic and the U.S. Attorney’s Office lasts for two years.

This is the fourth medical group to resolve allegations it violated the rights of patients who are deaf or deaf/blind. Over the past three years the U.S. Attorney’s Office has resolved cases with MultiCare Health systemsPeaceHealth Southwest Medical Center in Vancouver, Washington, and University of Washington Medical Center – Northwest (UWMC-NW).

The settlement was negotiated by Assistant United States Attorney Susan Kas, Civil Rights Coordinator in the Civil Division of the U.S. Attorney’s Office.

Copies of the settlement are available upon request.

Foreign National With Violent Felony Convictions Sentenced To 10 Years In Prison For Illegally Reentering The United States

Source: United States Department of Justice Criminal Division

LAS VEGAS – A Mexican national was sentenced today by United States District Judge Jennifer A. Dorsey to 120 months in prison followed by three years of supervised release for illegally reentering the United States after being removed from the country five times.

According to court documents and statements made during court proceedings, on September 18, 2022, Jose Alberto Santacruz-Benitez was found in the United States after he was previously deported on October 22, 2009; June 5, 2014; June 30, 2014; September 17, 2017; and November 30, 2021.

Prior to his first removal, Santacruz-Benitez was convicted of conspiracy to commit kidnapping. Santacruz-Benitez and his co-conspirators kidnapped two men they believed had stolen drugs from them, torturing these victims for hours with beatings, mock drownings, and threats to kill them and their families.

After his first removal, Santacruz-Benitez repeatedly returned to this country and violated the law. He was convicted in state court of two separate incidents of felony possession of a controlled substance, and he was twice convicted in federal court for unlawfully reentering the country in violation of 8 U.S.C. § 1326. This case is his third § 1326 conviction.

After his most recent removal, Santacruz-Benitez unlawfully returned to the United States for a fifth time. In September 2022, he was discovered by immigration officials after Las Vegas Metropolitan Police Department officers arrested him for shooting five people at a birthday party. Based on this conduct, Santacruz-Benitez was convicted of attempt murder with use of a deadly weapon in state court.

First Assistant United States Attorney Sigal Chattah for the District of Nevada and Deputy Special Agent in Charge Jonathan Sherwin for Homeland Security Investigations (HSI) Los Angeles made the announcement.

HSI Los Angeles investigated the case; and the United States Attorney’s Office for the District of Nevada prosecuted the case.

Members of the public can report crimes and suspicious activity by dialing 866-DHS-2-ICE (866-347-2423) or completing the online tip form.

###

 

 

South Carolina Woman Admits to Multi-Year Ski/Snowboard Pass Scam in Utah

Source: United States Department of Justice Criminal Division

SALT LAKE CITY, Utah – A South Carolina woman pleaded guilty in federal court today to conspiracy to commit wire fraud after she fraudulently sold “discounted” ski and snowboard passes, including Ikon, Epic, and other passes used at various Utah mountain resorts. In return, she received money through electronic payments, which she shared with her coconspirators.

Jamilla Greene, 34, of Fort Mill, South Carolina, was charged by felony information on December 1, 2025.

According to court documents, beginning in November 2020 and continuing through May 2024, Greene worked with others to obtain money by fraudulently selling “discounted” Ikon and Epic ski and snowboard passes, as well as individual resort passes. Ikon passes are offered through Alterra Mountain Company and allow access to winter resorts worldwide, including the following Utah locations: Deer Valley, Solitude Mountain, Brighton, Alta Ski Area, Snowbird, and Snowbasin. Epic passes, offered through Vail Resorts, Inc. likewise offer access to resorts throughout the world, including Park City.  None of these resorts authorized Greene to sell “discounted” passes.  

As part of the scheme, Greene and her coconspirators advertised “discounted” passes through targeted online postings in locations where ski resorts are located, including Utah. When individuals would respond to the advertisements, Greene communicated with them online and via text to gather necessary information, including names and addresses, for the purchase of ski passes. Once personal information was collected, Greene would use different bank card information to purchase ski passes at full price, knowing that bank card information was stolen and did not belong to the individuals to whom she was selling the “discounted” ski passes.

Upon purchase of the full price ski passes with the stolen cards, Greene would communicate again with the “discounted” ski pass purchasers to secure and direct payment through electronic platforms such as Venmo, PayPal, Zelle, and Apple Pay. Greene then took the money and deposited it directly into her and her coconspirators’ accounts.

Greene is scheduled to be sentenced February 24, 2026 at 10:30 a.m. before a U.S. District Court Judge at the Orrin G. Hatch United States District Courthouse in downtown Salt Lake City.

“This multi-year, multimillion-dollar scheme not only victimized Utah ski resorts, skiers and snowboarders, and individuals whose bank card information was stolen, but could impact the trust of snow enthusiasts who seek passes annually to visit our resorts,” said U.S. Attorney Melissa Holyoak of the District of Utah. “Fraud in any form will not be tolerated, and it is my priority to continue to work with our law enforcement partners to investigate and prosecute the individuals involved and seek justice for the victims.”

“The U.S. Postal Inspection Service’s mission includes defending the nation’s mail system from illegal use.  Postal Inspectors investigate those who utilize the U.S. Mail to carry out fraud schemes for their own financial gain.  I thank the Salt Lake County Sheriff’s Office for their partnership in this case,” said Glen Henderson, Inspector in Charge of the Phoenix Division.

“The Salt Lake County Sheriff’s office is committed to working and partnering with our federal agencies to ensure cases of this magnitude are investigated and the accused are held accountable for the crimes they committed,” said Salt Lake County Sheriff Rosie Rivera. “This is the largest case of fraud that the Sheriff’s office has investigated since reinstating our Law Enforcement Bureau.”

This case is being investigated jointly by the U.S. Postal Inspection Service (USPIS) and the Salt Lake County Sheriff’s Office.

Assistant United States Attorneys Mark E. Woolf and Luisa Gough of the U.S. Attorney’s Office for the District of Utah are prosecuting the case. 
 

Multi-convicted Felon Sentenced to More Than 16 Years in Federal Prison for Bank Robbery

Source: United States Department of Justice Criminal Division

A multi-convicted felon was sentenced today to more than 16 years in federal prison for a violent bank robbery, announced United States Attorney for the Northern District of Texas Ryan Raybould.

Damon Johnson, 51, was indicted in December 2024 for robbing the PNC Bank on North Glenbrook Drive in Garland, Texas on November 14, 2024. He pled guilty in May 2025 to bank robbery.  Today, U.S. District Judge Jane Boyle sentenced Johnson to 200 months in federal prison.

According to court documents, as a customer was conducting business at a teller station inside the bank, Johnson grabbed her from behind and held her hostage.  Johnson then pointed a firearm at the teller and demanded money.  After the teller gave him $3,900 from the register, Johnson fled on foot.  He was arrested in December 2024 shortly after indictment.

Court records reflect that Johnson was previously convicted of possession with intent to distribute cocaine, for which he was sentenced to 130 months in federal prison.  He had also served a 10-year federal imprisonment sentence for possessing a firearm as a convicted felon.  At the time he committed the bank robbery in November 2024, he was on federal supervised release for these two offenses.  During the sentencing hearing, Judge Boyle pointed to Johnson’s lengthy criminal record, including his 1991 Michigan state conviction of assault with intent to do great bodily harm less than murder—which involved Johnson raping a woman and setting her on fire—as well as his other convictions for drug and firearm offenses, when imposing the 200-month sentence.  

“The swift actions of FBI Dallas Violent Crime Task Force agents took this violent repeat offender off the streets,” said U.S. Attorney Ryan Raybould.  “We will continue to pursue lengthy federal prison sentences for those like him to deter these types of crime sprees and restore safety in the Northern District of Texas.”

“The sentence received by the defendant is a result of the efforts of the Dallas Violent Crimes Task Force to hold accountable a felon with a violent criminal history,” said FBI Dallas Special Agent in Charge R. Joseph Rothrock.  “The FBI will continue to work alongside our local, state, and federal law enforcement partners to fight violent crime in our communities across North Texas.”

This case was investigated by the Federal Bureau of Investigation Dallas Violent Crimes Task Force.  Assistant U.S. Attorney Marissa Aulbaugh prosecuted the case.
 

Federal grand jury indicts former Jamestown man on narcotics conspiracy and fentanyl charges

Source: United States Department of Justice Criminal Division

BUFFALO, N.Y.-U.S. Attorney Michael DiGiacomo announced today that a federal grand jury has returned an indictment charging Charles Washington, 41, formerly of Jamestown, NY, now living in North Carolina, with narcotics conspiracy and possession with intent to distribute fentanyl, which carry a mandatory minimum penalty of 10 years in prison and a maximum of life. 

Assistant U.S. Attorney Joshua A. Violanti, who is handling the case, stated that between July 2016, and March 2021, Washington conspired with Joseph S. Zaso, and others, to sell heroin, fentanyl, methamphetamine, cocaine, crack cocaine, and marijuana in the Olean area. Zaso was previously convicted and is awaiting sentencing.

Washington was arraigned in the Western District of North Carolina and is being held pending a detention hearing in the Western District of New York.

This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations (TCOs), and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces (OCDETFs) and Project Safe Neighborhood (PSN).

The indictment is the result of an investigation by the Jamestown Police Department, under the direction of Chief Timothy Jackson and the Drug Enforcement Administration, under the direction of Special Agent-in-Charge Frank Tarentino, New York Field Division.

The fact that a defendant has been charged with a crime is merely an accusation and the defendant is presumed innocent until and unless proven guilty.

# # # #

Dansville woman arrested, charged with threatening to murder law enforcement and impeding arrest with a deadly weapon

Source: United States Department of Justice Criminal Division

ROCHESTER, N.Y. –U.S. Attorney Michael DiGiacomo announced today that Jennifer E. Curran, 40, of Dansville, NY, was arrested and charged by criminal complaint with assaulting, resisting, or impeding a federal law enforcement officer engaged in the performance of official duties, with a deadly or dangerous weapon. The charge carries a maximum penalty of 20 years in prison and a $250,000 fine.

Assistant U.S. Attorney Brett A. Harvey, who is handling the case, stated on December 4, 2025, various threats were posted online, including a threat to kill the President, Dr. Anthony Fauci, and to commit a mass shooting. The threats were posted on the social media platform GETTR by a user identified as @Word_Smith. Subsequent investigation tracked the post to Jennifer Curran.

The following day, investigators from the FBI and New York State Police went to Curran’s residence. Investigators made contact with Curran, who was holding a hammer in her hand.   Curran admitted to posting the threats, stating that she was “very upset” and that there were some “social workers” and “police officers” that she wanted to “hurt.” Curran also stated that she can post whatever she wants, while waving the hammer in a threatening manner. Curran told investigators that if she had to kill someone on her property to get her point across, she would. Curran refused to drop the hammer stating, “get away from me before I assault you.” Curran was subsequently taken into custody.

“The safety and protection of law enforcement, at every level, is paramount to law enforcement being able to do their jobs and protecting our communities,” stated U.S. Attorney DiGiacomo. “Any individual who threatens to commit violence against any member of law enforcement will be held accountable for their actions.”

“When someone chooses violence instead of compliance, it risks the safety of those who serve and protect our communities,” Special Agent-in-Charge Philip Tejera of the FBI’s Buffalo Field Office stated. “The FBI appreciates the extraordinary vigilance of our agents and swift coordination with our law enforcement partners.”

The complaint is the result of an investigation by the New York State Police, under the direction of Major Kevin Sucher and the Federal Bureau of Investigation, under the direction of Special Agent-in-Charge Philip Tejera.

The fact that a defendant has been charged with a crime is merely an accusation and the defendant is presumed innocent until and unless proven guilty.  

# # # #

Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups

Source: United States Department of Justice Criminal Division

Ukrainian National Indicted and Rewards Announced for Co-Conspirators Relating to Destructive Cyberattacks Worldwide

LOS ANGELES – A Ukrainian national has been federally charged with participating in dozens of cyberattacks and computer intrusions against critical infrastructure and other victims around the world, in support of Russia’s geopolitical interests, the Justice Department announced today.

The two indictments against Victoria Eduardovna Dubranova, 33, a.k.a. “Vika,” a.k.a. “Tory,” a.k.a. “SovaSonya,” were unsealed today in United States District Court in Los Angeles. Dubranova was extradited to the United States earlier this year on an indictment charging her for her actions supporting CyberArmyofRussia_Reborn (CARR).

Dubranova was arraigned today on a second indictment charging her for her actions supporting NoName057(16) (NoName). Dubranova has pleaded not guilty in both cases. Dubranova pleaded not guilty today at her arraignment and a February 3, 2026 trial date was scheduled in that case.

As described in the indictments, the Russian government backed CARR and NoName by providing, among other things, financial support. CARR used this financial support to access various cybercriminal services, including subscriptions to distributed denial of service-for-hire services. NoName was a state-sanctioned project administered   in part by an information technology organization established by order of the President of Russia in October 2018 that developed, along with other co-conspirators, NoName’s proprietary distributed denial of service (DDoS) program.

“Politically motivated hacktivist groups, whether state-sponsored like CARR or state-sanctioned like NoName, pose a serious threat to our national security, particularly when foreign intelligence services use civilians to obfuscate their malicious cyber activity targeting American critical infrastructure as well as attacking proponents of NATO and U.S. interests abroad,” said First Assistant United States Attorney Bill Essayli. “The charges announced today demonstrate our commitment to eradicating global threats to cybersecurity and pursuing malicious cyber actors working on behalf of adversarial foreign interests.”

“Today’s actions demonstrate the Department’s commitment to disrupting malicious Russian cyber activity — whether conducted directly by state actors or their criminal proxies — aimed at furthering Russia’s geopolitical interests,” said Assistant Attorney General for National Security John A. Eisenberg. “We remain steadfast in defending essential services, including food and water systems Americans rely on each day, and holding accountable those who seek to undermine them.”

“When pro-Russia hacktivist groups target our infrastructure, the FBI will use all available tools to expose their activity and hold them accountable,” said Assistant Director Brett Leatherman of FBI’s Cyber Division. “Today’s announcement demonstrates the FBI’s commitment to disrupt Russian state-sponsored cyber threats, including reckless criminal groups supported by the GRU. The FBI doesn’t just track cyber adversaries—we work with global partners to bring them to justice.”

“EPA is unwavering in its commitment to clean, safe water for all Americans. The defendant’s illegal actions to tamper with the nation’s public water systems put communities and the nation’s drinking water resources at risk,” said U.S. Environmental Protection Agency Acting Assistant Administrator Craig Pritzlaff. “These criminal charges serve as an unequivocal warning to malicious cyber actors in the U.S. and abroad: EPA’s Criminal Investigation Division and our law enforcement partners will not tolerate threats to our nation’s water infrastructure and will pursue justice against those who endanger the American public.”

“The FBI continues to relentlessly pursue cybercriminal groups,” said Akil Davis, the Assistant Director in Charge of the FBI’s Los Angeles Field Office. “Pro-Russia cybercriminal groups such as CARR and NoName057(16) have been emboldened to target the critical infrastructure of the United States and NATO allies, including U.S. elections, public water systems, and other government and financial institutions. Today’s announcement underscores the FBI’s priorities and capabilities in countering cyber threats and demonstrates the FBI’s dedication to working with foreign partners to protect victims worldwide.”

          Cyber Army of Russia Reborn

According to the indictment, CARR, also known as Z-Pentest, was founded, funded, and directed by the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU). CARR claimed credit for hundreds of cyberattacks against victims worldwide, including attacks against critical infrastructure in the United States, in support of Russia’s geopolitical interests.

CARR regularly posted on Telegram claiming credit for its attacks and published photos and videos depicting its attacks. CARR primarily hacked industrial control facilities and conducted DDoS attacks. CARR’s victims included public drinking water systems across several states in the U.S., resulting in damage to controls and the spilling of hundreds of thousands of gallons of drinking water.

CARR also attacked a meat processing facility in Los Angeles in November 2024, spoiling thousands of pounds of meat and triggering an ammonia leak in the facility. CARR has attacked U.S. election infrastructure during U.S. elections, and websites for U.S. nuclear regulatory entities, among other sensitive targets.

An individual operating as “Cyber_1ce_Killer,” a moniker associated with at least one GRU officer instructed CARR leadership on what kinds of victims CARR should target, and his organization financed CARR’s access to various cybercriminal services, including subscriptions to DDoS-for-hire services. At times, CARR had more than 100 members, including juveniles, and more than 75,000 followers on Telegram.

The CARR indictment charges Dubranova with one count of conspiracy to damage protected computers and tamper with public water systems, one count of damaging protected computers, one count of access device fraud, and one count of aggravated identity theft. If convicted of these charges, Dubranova would face a statutory maximum sentence of 27 years in federal prison. She is scheduled to go to trial on April 7, 2026 in this case.

          NoName057(16)

NoName was covert project whose membership included multiple employees of The Center for the Study and Network Monitoring of the Youth Environment (CISM), among other cyber actors. CISM was an information technology organization established by order of the President of Russia in October 2018 that purported to, among other things, monitor the safety of the internet for Russian youth.

According to the indictment, NoName claimed credit for hundreds of cyberattacks against victims worldwide in support of Russia’s geopolitical interests. NoName regularly posted on Telegram claiming credit for its attacks and published proof of victim websites being taken offline. The group primarily conducted DDoS cyberattacks using their own proprietary DDoS tool, DDoSia, which relied on network infrastructure around the world created by employees of CISM.

NoName’s victims included government agencies, financial institutions, and critical infrastructure, such as public railways and ports. NoName recruited volunteers from around the world to download DDoSia and used their computers to launch DDoS attacks on the victims that NoName leaders selected. NoName also published a daily leaderboard of volunteers who launched the most DDoS attacks on its Telegram channel and paid top-ranking volunteers in cryptocurrency for their attacks.

The indictment charges Dubranova with one count of conspiracy to damage protected computers. If convicted of this charge, Dubranova would face a statutory maximum sentence of five years in federal prison.

The law enforcement takedown against NoName is part of Operation Red Circus, and has been executed in coordination with a Europol operation, Operation Eastwood, which is aimed at disrupting NoName. As part of these ongoing operations, law enforcement in 19 countries, including Germany’s Bundeskriminalamt (BKA), the Netherlands National Police, the Spanish National Police, the Swiss Federal Police, the Swedish Polismyndigheten, and the French Gendarmerie Nationale, alongside the FBI, disrupted more than 100 servers around the world, including virtual servers hosted in the United States, in July 2025. Resulting from their own independent investigations, foreign law enforcement also publicly announced charges against five NoName actors, arrested two NoName actors outside of Russia, and executed searches of 22 NoName members and 2 service providers worldwide. The FBI also suspended NoName’s main X account, which played a key role in the group’s public messaging campaign.

Concurrent with today’s actions, the U.S. Department of State has offered potential rewards for up to $2 million for information on individuals associated with CARR and up to $10 million for information on individuals associated with NoName. Additionally, today the FBI, CISA, NSA, DOE, EPA, and DC3 issued a Joint Cybersecurity Advisory assessing that pro-Russia hacktivist groups, like CARR and NoName, target minimally secured, internet-facing virtual network computing connections to infiltrate (or gain access to) operational technology control devices within critical infrastructure systems to execute attacks against critical infrastructure, resulting in varying degrees of impact, including physical damage.

On July 19, 2024, U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC) announced sanctions targeting two CARR members, Yuliya Vladimirovna Pankratova and Denis Olegovich Degtyarenko, for their roles in cyber operations against U.S. critical infrastructure. These two individuals were the group’s leader and a primary hacker, respectively. 

The FBI Los Angeles Field Office investigated the CARR and NoName cases as part of FBI’s Operation Red Circus, an ongoing operation to disrupt Russian state-sponsored cyberthreats to U.S. critical infrastructure and interests abroad.

Assistant United States Attorneys Angela Makabali and Alexander Gorin of the National Security Division, and Trial Attorney Greg Nicosia of the Justice Department’s National Security Cyber Section are prosecuting these cases. Assistant United States Attorney James E. Dochterman of the Asset Forfeiture and Recovery Section is handling the forfeiture cases.

An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

Crack Dealer with a Semi-Automatic Pistol Sentenced to 45 Months

Source: United States Department of Justice Criminal Division

            WASHINGTON – Cevin Andre Belton, 40, a previously convicted felon residing in the District of Columbia, was sentenced today in U.S. District Court to 45 months in prison for trafficking crack cocaine and for illegally possessing a semi-automatic pistol, announced U.S. Attorney Jeanine Ferris Pirro.

            Belton pleaded guilty on September 5 before Judge Trevor N. McFadden to possession with intent to distribute cocaine base and to unlawful possession of a firearm and ammunition by a felon. In addition to the 45-month prison term, Judge McFadden ordered Belton to serve three years of supervised release.

            Joining in the announcement were ATF Special Agent in Charge Anthony Spotswood of the Washington Field Division of the Bureau of Alcohol, Tobacco, Firearms and Explosives and Chief Pamela A. Smith of the Metropolitan Police Department (MPD).

            According to court documents, MPD officers were on patrol about 1:25 p.m. on March 22 when they spotted Belton standing in an alleyway behind the 4000 block of 9th Street. Belton saw the officers patrol car and began walking towards an entrance to a nearby building. Officers exited their vehicle to conduct a foot patrol. Belton looked over his shoulder, saw the officers, and ran at a full sprint away while holding his front waistband.

            As officers chased Belton on foot, Belton reached into the front of his waistband, produced a black firearm, and threw it onto a patch of grass. Officers caught Belton near the intersection of 9th and Bellevue Streets, Southeast. Investigators canvassed Belton’s flight path along the 4200 block of 9th Street, SE, and recovered a Springfield Armory Hellcat 9mm semi-automatic pistol.

            During a search of Belton, officers recovered 15.5 grams of crack cocaine and $157 in cash. Belton later admitted that he had intended to distribute the crack cocaine.

            Belton has a previous conviction for robbery with a dangerous weapon out of Prince George’s County for which he served eight years in prison.  

            This case was investigated by the Metropolitan Police Department and the Bureau of Alcohol, Tobacco, Firearms and Explosives. It was prosecuted by Assistant U.S. Attorney James B. Nelson.

 Photo: Along the 4200 block of 9th Street, SE, police recovered a Springfield Armory Hellcat 9mm semi-automatic pistol

Photo: During a search of Belton, officers recovered 15.5 grams of crack cocaine and $157 in cash. Belton later admitted that he had intended to distribute the coke.

25cr0168

Convicted Felon Sentenced to 40 Months for Possessing Explosive Powder

Source: United States Department of Justice Criminal Division

HONOLULU – United States Attorney Ken Sorenson announced that Jess Kiesel Lee, 43, of Kula, Maui, was sentenced last week by U.S. District Judge Jill A. Otake to 40 months of imprisonment followed by 3 years of supervised release for possessing, as a convicted felon, explosive powder.

According to court records, Lee set off an improvised explosive device (“IED”)—a homemade firework—near Kaamana Street in Kula, on or before August 7, 2024. Officers with the Maui Police Department (“MPD”) later encountered multiple IEDs near that location. The Federal Bureau of Investigation (“FBI”) seized those IEDs and found Lee’s fingerprint on one device. The FBI determined that at least one of the devices contained a mixture of compounds consistent with the remnants of explosive firework powder. A month later, the FBI searched Lee’s residence in Kula and located user amounts of methamphetamine, firearms, ammunition, and IEDs containing flash powder, a common explosive firework powder. Lee admitted to knowingly possessing that explosive powder after he sustained multiple felony convictions in the State of Hawaii.

Judge Otake sentenced Lee to 40 months of imprisonment, followed by 3 years of supervised release, observing that fireworks are a danger to both individual operators and the general public. Judge Otake specifically noted that Lee’s functioning his homemade firework near a wooded area on Kaamana Street placed the surrounding community in danger considering Maui’s susceptibility to wildfires.

“The protection and safety of our community is our highest priority,” said U.S. Attorney Ken Sorenson. “We have witnessed the serious harm and life-threatening danger presented by the possession and use of illegal explosives in our local communities, including illegal fireworks. We pledge to aggressively investigate, charge, and convict those who unlawfully construct, possess, or detonate explosives and explosive materials. We credit our steadfast partners at the FBI for their outstanding investigative efforts in this case.”

“Homemade explosive devices present a significant danger to our island communities,” said FBI Honolulu Special Agent in Charge David Porter. “The FBI—in coordination with our law enforcement partners—is committed to using every tool available to hold criminals accountable when they threaten public safety.” 

Federal law prohibits convicted felons from possessing any “explosive” shipped or transported in interstate or foreign commerce. 18 U.S.C. § 842(i)(1). “Explosives” include gunpowder, dynamite, blasting agents, fuzes (other than electric circuit breakers), detonators, smokeless powders, flash powder, and bulk salutes. 18 U.S.C. § 844(j); 27 C.F.R. § 555.202.

This case was investigated by MPD and FBI, with substantial assistance from the FBI’s Laboratory Division and the Bureau of Alcohol, Tobacco, Firearms and Explosives. Assistant U.S. Attorneys Jonathan D. Slack and Wayne A. Myers prosecuted the case.