Justice Department Files Action to Protect National Security by Enforcing President’s Order of Chinese Company’s Divestment from U.S. Company

Source: United States Department of Justice

Yesterday, the United States filed a complaint under section 721 of the Defense Production Act of 1950 to enforce a presidential order prohibiting Suirui Group’s acquisition, through Suirui International, of California-based Jupiter Systems and compelling Suirui to divest from Jupiter Systems. On July 8, 2025, the President issued the Order based on his findings that the transaction “threatens to impair the national security of the United States.” This is the first such action ever filed in federal district court.

While foreign direct investment is important to the United States’ economy, foreign investment in certain companies and certain industries, particularly those involved in defense or critical infrastructure, can pose national security concerns. To address these concerns, the President has the authority to take such action for such time as the President considers appropriate to suspend or prohibit such a transaction that threatens to impair the national security of the United States. The Committee on Foreign Investment in the United States (CFIUS) is empowered to review and investigate such transactions.

According to the Complaint, in 2020, Suirui Group, a Chinese company, through its Hong Kong subsidiary Suirui International, acquired all of Jupiter Systems, which provides video communications hardware and software to commercial and U.S. Government customers. On July 8, 2025, the President issued an Order prohibiting the transaction and, among other things, requiring Suirui to divest all its interests in Jupiter Systems within 120 days. According to the Complaint, despite CFIUS granting two extensions of the divestment deadline, to Feb. 3, Suirui and Jupiter Systems have failed to comply with the Order. The United States thus filed this action to protect the country’s national security interests.

The Justice Department’s Civil Division, Federal Programs Branch is handling the matter.  The case is captioned United States v. Suirui Group Co., Ltd., et al., No. 26-cv-00369 (D.D.C.).

This case is being handled by Trial Attorney Sam Bean of the Justice Department’s Civil Division.

The claims asserted in the complaint are allegations only, and there has been no determination of liability.

Fraud Tourists Plead Guilty to Minneapolis Medicaid Fraud

Source: United States Department of Justice

Defendants Used AI to Fabricate Records and Marketed Themselves as “The Housing Guys” at Homeless Shelters

Two Pennsylvania men pleaded guilty yesterday to repeatedly traveling from Philadelphia to Minneapolis to defraud Minnesota’s Housing Stabilization Services (HSS) program of approximately $3.5 million and concealing the scheme by using artificial intelligence to create fake records when questioned by insurance companies.

This case is part of a collaboration between the U.S. Attorney’s Office for the District of Minnesota and the Criminal Division’s Fraud Section to combat prolific fraud on government programs in Minnesota. It also represents the first charges involving the use of artificial intelligence to further a fraud scheme targeting health care programs in Minnesota.

“Criminal fraud not only robs taxpayers — it shatters trust in our institutions. Under President Trump’s leadership, yesterday’s convictions are just the beginning,” said Attorney General Pamela Bondi. “Our prosecutors will work tirelessly to unravel criminal fraud schemes and charge their perpetrators in Minnesota and across the country.”

“Minnesota will no longer be a haven for fraud under our watch,” said Deputy Attorney General Todd Blanche. “The Justice Department has been investigating billions in taxpayer fraud across the country and has already successfully convicted 66 individuals and counting in Minnesota. The collaboration between the Criminal Division and the U.S. Attorney’s Office is a prime example of how we restore justice and public trust, while holding criminal fraudsters accountable.”

“Defrauding those who rely on government programs takes away critical resources, and the use of artificial intelligence to carry out these crimes is dangerous and will not be tolerated,” said FBI Director Kash Patel. “Yesterday’s convictions demonstrate the FBI’s dedication to investigating and holding accountable criminals that target and take advantage of vulnerable members of our communities.” 

“These defendants had no connection to Minnesota or its communities. They traveled across the country for one purpose: to prey upon and steal millions in taxpayer dollars meant for people struggling with homelessness, addiction and disabilities,” said Assistant Attorney General A. Tysen Duva of the Justice Department’s Criminal Division. “Although programs like HSS are run by the states, they are funded with federal tax dollars. The Criminal Division will not stand by while fraudsters put all Americans’ tax dollars at risk.”

“The defendants brazenly siphoned millions from a program created to provide vulnerable individuals with stable housing — a deliberate betrayal of public trust that will not be tolerated,” said Inspector General T. March Bell of the U.S. Department of Health and Human Services, Office of Inspector General (HHS-OIG). “This scheme diverted critical resources from those who need them most and eroded confidence in programs intended to support people with disabilities and mental health challenges. HHS-OIG remains steadfast in its commitment to protect taxpayer-funded programs and will continue working with our law enforcement partners to hold perpetrators fully accountable.”

“Anthony Jefferson and Lester Brown tried to hide fraud behind artificial intelligence, but technology doesn’t replace math — or accountability;” said IRS Criminal Investigation Chief Guy Ficco. “Our special agents followed the money, broke down the data, and exposed a scheme that siphoned public assistance dollars from a program meant to support vulnerable Minnesotans. When people steal from safety net programs, they don’t just take money — they weaken public trust. IRS-CI will continue to identify, unravel, and stop fraud, no matter how sophisticated the tools behind it.”

“Criminals who target the most vulnerable members of our communities will become the target of the U.S. Postal Inspection Service,” said Chief Postal Inspector Gary Barksdale of the U.S. Postal Inspection Service. “We pursue them without pause, making sure they are held accountable and feel the full weight of justice. Yesterday’s sentencing emphasizes our unwavering commitment to those we serve and protect.”

According to court documents, Anthony Waddell Jefferson, 37, and Lester Brown, 53, both of Philadelphia, set up businesses in Minneapolis and enrolled as HSS program providers, purportedly to help people with disabilities – including seniors and people with mental illnesses and substance use disorders – find and maintain housing.

Rather than provide those services, Jefferson and Brown – who marketed themselves as “The Housing Guys” – repeatedly traveled from Philadelphia to Minneapolis to recruit Medicaid beneficiaries at homeless shelters and Section 8 housing facilities. The defendants signed those individuals up for HSS and then billed the program for services that were not provided. When asked to provide supporting documentation for their claims, Jefferson and Brown fabricated e-mails discussing their purported “clients” and used ChatGPT to create fake client notes. In total, from February 2022 through June 2025, Jefferson and Brown stole approximately $3.5 million from HSS for services they fraudulently claimed to have provided to approximately 230 Medicaid beneficiaries.

Jefferson and Brown each pleaded guilty to one count of wire fraud, which carries a maximum penalty of 20 years in prison. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

The FBI, IRS-CI, HHS-OIG, Immigrations and Customs Enforcement Homeland Security Investigations, and the U.S. Postal Inspection Service are investigating the case.

Assistant Chief Shankar Ramamurthy of the Criminal Division’s Fraud Section and Assistant U.S. Attorneys for the District of Minnesota Rebecca Kline and Matthew Murphy are prosecuting the case.

The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Force Program. Since March 2007, this program, currently comprised of eight strike forces operating in federal districts across the country, has charged more than 6,200 defendants who collectively have billed federal health care programs and private insurers more than $45 billion. In addition, the Centers for Medicare & Medicaid Services, working in conjunction with the Office of the Inspector General for the Department of Health and Human Services, are taking steps to hold providers accountable for their involvement in health care fraud schemes. More information can be found at www.justice.gov/criminal-fraud/health-care-fraud-unit.

Defense News: Protecting the Force Through Science and Service

Source: United States Army

LANDSTUHL, GERMANY — Native of San Antonio, Texas, serves as the Entomology Chief for Public Health in Europe, where his work plays a critical role in protecting the health and readiness of U.S. service members.

As a subject matter expert supporting the United States European Command region, Capt. Jordan Cornell provides assistance through vector surveillance, arthropod identification, and mitigation strategies that reduce disease risk for the warfighter.

Entomology, the study of insects and related arthropods, is a field many people rarely consider until its absence is felt. From pest control and vector-borne disease prevention to agricultural and environmental support, Cornell’s expertise spans far beyond a single specialty.

“There are so many crossover applications,” he explains. “Entomology touches more areas than people realize and it can do a lot of good.”

That passion began early. Cornell knew from a young age that he wanted to be an entomologist, even when others assumed it was a phase he would eventually outgrow. He never did. Instead, he sought out opportunities to learn more, including programs in Texas that allowed him to work alongside entomology professionals. Asking questions in the field and seeing real-world risk mitigation solidified his decision to pursue the career.

Captain Jordan Cornell knew from a young age that he wanted to be an entomologist, even when others assumed it was a phase he would eventually outgrow. He never did. (Photo Credit: Michelle Thum) VIEW ORIGINAL

While he always knew he wanted to serve in the Army, it wasn’t until his freshman year of college that everything aligned. Hearing military entomologists speak about their role in public health and force protection made it clear that his two passions, science and service, could coexist.

“That’s when it clicked,” he said. “Entomology in the Army is preventative medicine. It directly impacts the lives of Soldiers.”

Cornell commissioned into the Army Medical Service Corps and later completed a master’s program at Texas A&M University. While academically challenging, he pushed through by focusing on the mission and the people his work would ultimately protect.

“School was hard,” he admits, “but I knew I had to do it. I wouldn’t be able to help to my full potential if I didn’t push through those tough moments.”

Education remains one of his greatest passions. He frequently volunteers with schools and Department of Defense programs, sharing his knowledge and helping others understand the importance of entomology.

“Entomology is intriguing because you can never know everything,” he said. “You’re always learning.”

Service also runs deep in his family. Cornell’s grandfather, a retired Army lieutenant colonel and Medical Service Corps officer, helped build and redesign Landstuhl Regional Medical Center. He, too, earned a master’s degree from Texas A&M and shared a deep love of learning.

During the COVID-19 pandemic, his grandfather a retired Army lieutenant colonel, had the honor of commissioning him, a moment Captain Jordan Cornell describes as profoundly meaningful. (Photo Credit: Michelle Thum) VIEW ORIGINAL

Their careers share striking parallels—from early assignments in the Washington, D.C. area to service in Germany. During the COVID-19 pandemic, his grandfather had the honor of commissioning him, a moment Cornell describes as profoundly meaningful.

Now continuing his Army career in Europe, Cornell looks forward to his grandfather visiting Germany so they can tour the old barracks where his grandfather once served.

Reflecting on his journey, the advice he would give his younger self is simple but powerful: be willing to show up, step up and continually work to better yourself and those around you.

Through dedication, expertise, and a passion for teaching, Cornell carries forward a vital mission and a proud family legacy.

Defense News: Maryland National Guard participates in Crossed Swords 25 with Estonian partners

Source: United States Army

TALLINN, Estonia – The Maryland National Guard participated in Crossed Swords, a comprehensive cyber defense exercise, with their Department of War National Guard Bureau State Partnership Program Estonian partners at the NATO Cooperative Cyber Defence Centre of Excellence, or CCDCOE, last fall.

The exercise, held Oct. 27 through Nov. 7, 2025, hosted 240 participants from about 45 countries, including Airmen from the 175th Cyberspace Operations Group. Participants shared tactics and procedures to contribute towards a cohesive collective-defense strategy.

CCDCOE’s Crossed Swords is an annual cyber warfare training exercise that centers on operational-level military command elements and the enhancement of offensive and defensive cyber capabilities through simulated operations and crisis response. The exercise also focuses on advancing multi-domain operational competencies, including information warfare operations, legal perspectives and cooperation with Special Operations Forces.

This year, participants focused on two cyber headquarters, simulating fictional nations for the scenario.

“The combination of strategic decisionmaking, tactical AI‑assisted execution and immediate coordination with critical infrastructure owners created a drill that felt less like a training scenario and more like an actual national defense operation, something no previous exercise that we have participated in had ever achieved,” said Maryland Air National Guard Lt. Col. Bob DeLuca, flight commander for the 175th Cyberspace Operations Squadron.

The exercise focused on five objectives related to simulating the life cycle of a modern cyber conflict. These included strategic‑level command and control, tactical cyber operations, multi‑domain integration, public‑private partnership testing and technology validation.

“Exercises like this continue to build upon and expand the partnership of over 30 years,” DeLuca said. “The Estonian Defense Force led the Command Headquarters and led many of the team leader positions as well as staffing many technical roles, while our Guardsmen were participants on their teams.”

Maryland Airmen, alongside their Estonian counterparts, had the chance to step outside their comfort zones by operating in two emerging domains: information operations and AI‑driven cyber tools.

“We have to adapt to the reality of today’s cyber threat landscape, where complex, multi-domain operations and hybrid tactics are the norm. It has become clear that in cyberspace, we need to adopt a wartime mentality, including strong offensive cyber capabilities,” said Tõnis Saar, director of NATO Cooperative Cyber Defence Centre of Excellence.

This year, teams had the opportunity to adapt in stressful scenarios where their capabilities were tested, ultimately elevating NATO’s alliance’s abilities from initial cyber threat detection to critical action and preserving crucial online services and functions.

“This exercise provided a means for our members to measurably improve their leadership, planning, detection, assessment and response to sophisticated cyber-attacks,” DeLuca said. “Participating in CrossedSwords2025 sharpened our unit’s mission‑readiness on every level, and the team performed amazingly.”

http://www.nationalguard.mil

https://www.facebook.com/TheNationalGuard

https://x.com/USNationalGuard

https://www.nationalguard.mil/Leadership/Joint-Staff/J-5/International-Affairs-Division/State-Partnership-Program/

Defense News: Wyoming National Guard Soldiers complete advanced wildfire behavior training

Source: United States Army

CHEYENNE, Wyo. — For Soldiers assigned to the Wyoming National Guard’s Training Center Command, understanding how a wildfire moves can mean the difference between a controlled response and a dangerous situation that shifts without warning.

That reality was at the center of the S-290 Intermediate Wildland Fire Behavior course held at the Southeast Wyoming Wildland Academy in Cheyenne, Wyoming, Feb. 7–8, 2026. The 40-hour course strengthened participants’ ability to safely evaluate and predict wildfire behavior during emergency operations, skills that directly support missions across the state.

Developed by the National Wildfire Coordinating Group, the course focuses on how weather, topography and fuels interact to influence fire behavior — factors that can change rapidly and place firefighters at risk if not properly understood.

“Understanding fire behavior is about keeping Soldiers safe while they accomplish the mission,” said Craig Heilig, spokesman for the Southeast Wyoming Wildland Academy. “This course gives our personnel the tools to make informed decisions in rapidly changing wildfire environments.”

Soldiers from Training Center Command operations and firefighting sections attended the training, building a shared understanding that strengthens coordination during real-world wildfire response efforts. Those skills are particularly critical at Camp Guernsey, where Guard personnel routinely support firefighting and emergency operations during wildfire season.

The S-290 course emphasizes recognizing early indicators of changing fire behavior, helping firefighters anticipate hazards before they escalate. This advanced level of situational awareness is a key factor in reducing risk on the fireline and preventing accidents during suppression operations.

Beyond immediate safety benefits, completion of S-290 also supports long-term professional development. The course is a prerequisite for leadership positions such as Firefighter Type 1, Crew Boss, Engine Boss, and Incident Commander Type 5, preparing Soldiers to assume greater responsibility during complex incidents.

As a nationally recognized qualification under the National Interagency Incident Management System, S-290 ensures Wyoming National Guard Soldiers can integrate seamlessly with local, state and federal partners during multi-agency wildfire responses.

Ultimately, the training supports a mission that extends beyond the fireline. By applying these skills during wildfire operations at Camp Guernsey and across Wyoming, trained Soldiers help protect lives, property and the natural landscapes communities depend on.

http://www.nationalguard.mil

https://www.facebook.com/TheNationalGuard

https://x.com/USNationalGuard

Man Sentenced to 20 Years in Prison for Role in $73 Million Global Cryptocurrency Investment Scam

Source: United States Department of Justice Criminal Division

A dual national of China and St. Kitts and Nevis was sentenced in absentia today in the Central District of California to the statutory maximum of 20 years in prison and three years of supervised release for his role in an international cryptocurrency investment conspiracy carried out from scam centers in the Kingdom of Cambodia. The defendant, Daren Li, 42, is a fugitive after cutting off his ankle electronic monitoring device and absconding in December 2025.

“As part of an international cryptocurrency investment scam, Daren Li and his co-conspirators laundered over $73 million dollars stolen from American victims,” said Assistant Attorney General A. Tysen Duva of the Justice Department’s Criminal Division. “The Court’s sentence reflects the gravity of Li’s conduct, which caused devastating losses to victims throughout our country. The Criminal Division will work with our law enforcement partners around the world to ensure that Li is returned to the United States to serve his full sentence.”

“While technology has made it possible for people to quickly communicate with others who live oceans away, it also has made it easier for criminals to prey on innocent victims,” said First Assistant U.S. Attorney Bill Essayli for the Central District of California. “I urge the investing public to use caution and to not talk to strangers…especially ones who solicit money online.”

On Nov. 12, 2024, Li pleaded guilty in the Central District of California to conspiring with others to launder funds obtained from victims through cryptocurrency scams and related fraud. As part of his plea agreement, Li admitted that unindicted members of the conspiracy would contact victims directly through unsolicited social-media interactions, telephone calls and messages, and online dating services. The unindicted co-conspirators would gain the trust of victims by establishing either professional or romantic relationships with them, often communicating by electronic messages sent via end-to-end encrypted applications. These co-conspirators established spoofed domains and websites that resembled legitimate cryptocurrency trading platforms and promote fraudulent cryptocurrency investments to the victims after gaining the victims’ trust.

In some instances, the co-conspirators would induce victims into investing in cryptocurrency through the fraudulent and spoofed investment platforms. In other iterations of the scam, Li’s unindicted co-conspirators misrepresented to victims that they were from a customer service or technology support company and induced victims to send funds via wire transfer or cryptocurrency trading platforms to purportedly remediate a non-existent virus or other false computer-related problem.

As part of his plea agreement, Li admitted that he and his co-conspirators caused at least $73.6 million in victim funds be directly deposited into bank accounts associated with defendant and his co-conspirators, including at least $59.8 million from U.S. shell companies that laundered victim proceeds.

Li further confessed that, to conceal or disguise the nature of the crime, location, source, ownership, and control of the victim funds, he would direct co-conspirators to open U.S. bank accounts established on behalf of shell companies and would monitor the receipt of interstate and international wire transfers of victim funds. Li and other co-conspirators would receive victim funds in financial accounts that they controlled and then monitor the conversion of victim funds to virtual currency,

Eight co-conspirators have pleaded guilty so far. Li is the first defendant to be sentenced who was directly involved in the ultimate receipt of victim funds.

The U.S Secret Service (USSS) Global Investigative Operations Center is investigating the case. The Homeland Security Investigations’ El Camino Real Financial Crimes Task Force, Customs and Border Protection’s National Targeting Center, U.S. Department of State’s Diplomatic Security Service, Dominican National Police, and U.S. Marshals Service provided valuable assistance.

Trial Attorney Stefanie Schwartz of the Criminal Division’s Computer Crime and Intellectual Property Section (CCIPS), Trial Attorney Tamara Livshiz of the Criminal Division’s Fraud Section, and Assistant U.S. Attorneys Maxwell Coll, Alexander Gorin, and Nisha Chandran for the Central District of California, prosecuted the case.

The sentencing is the latest outcome of the Criminal Division’s continuing work to investigate, disrupt, and bring to justice individuals facilitating scam center operations worldwide, in partnership with U.S. Attorneys’ Offices across the country. In combating scam centers, the Criminal Division draws on its expertise in countering cybercrime, cryptocurrency fraud, money laundering, human trafficking, and transnational organized crime. By seizing and forfeiting crime-linked cryptocurrency, dismantling digital infrastructure used by the scammers to target U.S. citizens, and disrupting domestic and international money laundering networks, the Criminal Division and its partners will cut off access to victim proceeds and tools that enable the fraud. As international relationships are critical to address this growing threat, the Criminal Division will draw on its network of International Computer Hacking and Intellectual Property prosecutors (ICHIPs) who are strategically posted throughout the world to coordinate with foreign law enforcement partners.

CCIPS investigates and prosecutes cybercrime in coordination with domestic and international law enforcement agencies, often with assistance from the private sector. Since 2020, CCIPS has secured the conviction of over 180 cybercriminals and court orders for the return of over $350 million in victim funds.

If you or someone you know is a victim of a digital asset investment fraud, report it to IC3.gov