Defense News in Brief: Air Force stands up A6 for warfighter communications, cyber systems

Source: United States Airforce

The Department of the Air Force has created a new AF/A6 Deputy Chief of Staff office dedicated to warfighter communications and cyber systems.

 This structure is designed to address operational communications and cyber needs effectively throughout the force.

The creation of the AF/A6 office separates the responsibilities for communications and cyber systems from the previous A2/6 framework, marking one of the most significant reorganizations of the Air Staff in over 30 years.

According to Air Force leaders, the change is designed to improve readiness, resilience and operational effectiveness by aligning resources and risk management with mission requirements.

“We created the A6 to ensure communications and cyber systems are available, secure and aligned with warfighter priorities,” said Air Force Chief of Staff Gen. David W. Allvin. “This office will help us focus resources and oversight where it matters most — supporting the mission in contested environments.”

The AF/A6 aligns with broader Department of Defense efforts to advance command and control capabilities, including the DAF Battle Network and Combined Joint All-Domain Command and Control. The office is also expected to provide enterprise-level advocacy on requirements, architecture and funding decisions.

Service members stand and replace their patches with new ones.
Members of the new Deputy of the Chief of Staff Warfighter, Communications and Cyber Systems remove their old patches and replace them with new ones at the Pentagon, Arlington, Virginia, July 23, 2025. The creation of the AF/A6 office separates the responsibilities for communications and cyber systems from the previous A2/6 framework, marking one of the most significant reorganizations of the Air Staff in over 30 years. (U.S. Air Force photo by Staff Sgt. Stuart Bright)

A photo of the new patch
The new Deputy of the Air Force Warfighter, Communications and Cyber Systems patch is displayed at the Pentagon, Arlington, Va., July 23, 2025. The new Air Force A6 logo was designed by Master Sgt. Michael Williams, 85th Engineering Installation Squadron. The creation of the AF/A6 office separates the responsibilities for communications and cyber systems from the previous A2/6 framework, marking one of the most significant reorganizations of the Air Staff in over 30 years. (U.S. Air Force photo by Staff Sgt. Stuart Bright)

Lt. Gen. Leah Lauderback, former Deputy Chief of Staff for Intelligence, Surveillance, Reconnaissance and Cyber Effects Operations, said the A6 will serve as a critical link between operational feedback and strategic planning.

“Standing up the A6 allows us to manage risk, prioritize limited resources and advocate for warfighter needs using data from across the enterprise,” Lauderback said. “It’s a necessary step to treat communications and cyber as the operational enablers they are.”

Maj. Gen. Michelle Edmondson has been appointed to serve as the first standalone Deputy Chief of Staff for AF/A6. Her experience in operations, training and strategic planning is expected to help the office’s focus on delivering integrated, resilient communications capabilities across domains.

“Our mission is to ensure warfighters have the reliable, secure communications they need to succeed in a complex and contested environment,” Edmondson said. “We’re building an enterprise that connects people, systems and decisions at the speed required by today’s operational demands.”

The office will coordinate with various stakeholders, including the department’s chief information officer, the principal cyber advisor, major command A6 offices, acquisition program offices and other operational and functional communities.

Officials emphasized the AF/A6 will be organized around a warfighter-centric model, designed to support current capabilities while informing future investment decisions and force design initiatives.

 

Defense News in Brief: US-Philippine Airmen strengthen ties during Cope Thunder 25-2

Source: United States Airforce

PACAF participated in Cope Thunder 25-2, a unique platform that integrates U.S. and Philippine Air Forces and enhances interoperability through bilateral fighter training, subject matter expert exchanges and key leadership

engagements.

U.S. Pacific Air Forces and Philippine Air Force members participated in Cope Thunder 25-2, a bilateral training conducted across multiple locations in the Philippines. The exercise aimed to strengthen partnerships and support the Philippine Air Force’s modernization efforts, promoting regional and global stability.

Established in the Philippines in 1976, Cope Thunder provides a unique platform to integrate U.S. and Philippine Air Forces and enhance interoperability through bilateral fighter training, subject matter expert exchanges and key leadership engagements. Cope Thunder 25-2 also marked the first time a U.S. Air Force F-35A Lightning II squadron has deployed to the Philippines.

“It’s obvious that this isn’t a relationship that’s simply on paper,” said Lt. Col. Bryan Mussler, 421st Mission Generation Force Element commander. “We’ve been integrating with them for a long time, and their mentality and approach to operations is very similar to ours.”

Subject matter expert exchanges during the exercise enabled U.S. and Philippine Airmen in similar career fields to share best practices and effective techniques aimed at improving day-to-day operations for both forces. These exchanges included maintenance, firefighting, airfield operations, electromagnetic warfare and basic fighter maneuvers, with U.S. and Philippine pilots flying side by side.

U.S. Air Force maintainers, assigned to the 421st Mission Generation Force Element, depart the flightline after conducting preflight operations on an F-35A Lightning II during Cope Thunder 25-2 at Clark Air Base, Philippines, July 7, 2025. The exercise enhances interoperability between the U.S. Air Force and the Philippine Air Force and supported the Armed Forces of the Philippines' modernization efforts. (U.S. Air Force photo by Airman 1st Class Aden Brown)
U.S. Air Force maintainers, assigned to the 421st Mission Generation Force Element, depart the flightline after conducting preflight operations on an F-35A Lightning II during Cope Thunder 25-2 at Clark Air Base, Philippines, July 7, 2025. The exercise enhances interoperability between the U.S. Air Force and the Philippine Air Force and supported the Armed Forces of the Philippines’ modernization efforts. (U.S. Air Force photo by Airman 1st Class Aden Brown)

U.S. Air Force Staff Sgt. Arnaldo Puente Mendez, 421st Mission Generation Force Element aerospace ground equipment maintainer, briefs Philippine Air Force airmen on a self generating nitrogen servicing cart during Cope Thunder 25-2 at Clark Air Base, Philippines, July 9, 2025. During the subject matter expert exchange, U.S. Airmen provided valuable insight into equipment used for aircraft maintenance, supporting Armed Forces of the Philippines’ modernization efforts. (U.S. Air Force photo by Airman 1st Class Aden Brown)
U.S. Air Force Staff Sgt. Arnaldo Puente Mendez, 421st Mission Generation Force Element aerospace ground equipment maintainer, briefs Philippine Air Force airmen on a self-generating nitrogen servicing cart during Cope Thunder 25-2 at Clark Air Base, Philippines, July 9, 2025. During the subject matter expert exchange, U.S. Airmen provided valuable insight into equipment used for aircraft maintenance, supporting Armed Forces of the Philippines’ modernization efforts. (U.S. Air Force photo by Airman 1st Class Aden Brown)

U.S. Air Force Capt. Tyler Rico (2nd left) and Capt. Toney Fisher (right), 421st Mission Generation Force Element F-35A pilots, coordinate flight plans with Philippine Air Force pilots during the Cope Thunder 25-2 exercise at Clark Air Base, Philippines, July 7, 2025. The training conducted between the U.S. and Philippine Air Force strengthens both the ability to respond together for potential future crises, contingencies and natural disasters. (U.S. Air Force photo by Airman 1st Class Aden Brown) (Image blurred for operational security)
U.S. Air Force Capt. Tyler Rico, second to the left, and Capt. Toney Fisher, right, 421st Mission Generation Force Element F-35A pilots, coordinate flight plans with Philippine Air Force pilots during the Cope Thunder 25-2 exercise at Clark Air Base, Philippines, July 7, 2025. The training conducted between the U.S. and Philippine Air Force strengthens both the ability to respond together for potential future crises, contingencies and natural disasters. (U.S. Air Force photo by Airman 1st Class Aden Brown) (Image blurred for operational security)

“We worked closely with the PAF pilots, and it was clear they are professional and highly capable aviators that employ their weapon systems with skill and precision,” said Capt. Tobey Fisher, 421st Mission Generation Force Element F-35A instructor pilot. “Additionally, this exercise afforded the 421st MGFE the opportunity to operate at a remote airfield with minimal support.”

The F-35A maintenance team supported Cope Thunder 25-2 with a lean, agile team, operating with roughly one-third of the personnel they typically have at their home station.

“It’s really cool to see such a small team come here and execute the mission,” said Maj. Clinton Bialcak, 421st Fighter Generation Squadron commander, referring to executing the F-35 maintenance mission. “I think everyone in the region, in the world and in the Department of Defense sees that we can do it and they can rely on us.”

The U.S. Air Force’s participation reflects ongoing efforts to strengthen coordination with regional allies and partners.

 

Former Kokomo Police Department Officer Charged with Sexually Assaulting 14-Year-old Girl

Source: United States Department of Justice Criminal Division

A federal grand jury in Indianapolis, Indiana, returned a two-count indictment, unsealed today, charging former Kokomo Police Department officer Sinmi Asomuyide with sexually assaulting a 14-year-old girl and with lying to state investigators to try to cover up the assault.

The first count of the indictment charges Asomuyide, who was 31 years old, with willfully depriving Minor #1, who was 14 years old, of her constitutional rights by sexually assaulting her.  The first count also charges that the defendant’s conduct included kidnapping.

The second count of the indictment charges Asomuyide with lying to the Indiana State Police to try to cover up the assault by, among other things, denying having sexual contact with Minor #1 and denying that there would be any reason for the presence of his semen in his squad car when, in fact, he ejaculated inside his squad car after causing Minor #1’s hand to touch his exposed penis.

If convicted, Asomuyide faces a maximum sentence of life in prison.

Assistant Attorney General Harmeet K. Dhillon of the Justice Department’s Civil Rights Division, Interim U.S. Attorney Thomas E. Wheeler for the Southern District of Indiana, and Special Agent in Charge Timothy O’Malley of the FBI Indianapolis Field Office made the announcement.

The FBI Indianapolis Field Office is investigating the case, with the cooperation of the Kokomo Police Department; Bloomington Police Department; and Indiana State Police.

Assistant U.S. Attorney Peter Blackett for the Southern District of Indiana and Senior Sex Crimes Counsel Tara Allison of the Justice Department’s Civil Rights Division are prosecuting the case.

This investigation is ongoing.  Anyone with additional information is encouraged to call the FBI at 1-800-CALL-FBI.

An indictment is merely an allegation. The defendant is presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

Arizona Woman Sentenced for $17M Information Technology Worker Fraud Scheme that Generated Revenue for North Korea

Source: United States Department of Justice

An Arizona woman was sentenced today to 102 months in prison for her role in a fraudulent scheme that assisted North Korean Information Technology (IT) workers posing as U.S. citizens and residents with obtaining remote IT positions at more than 300 U.S. companies. The scheme generated more than $17 million in illicit revenue for Chapman and for the Democratic People’s Republic of Korea (DPRK or North Korea).

Christina Marie Chapman, 50, of Litchfield Park, Arizona, pleaded guilty on Feb. 11 in the District of Columbia to conspiracy to commit wire fraud, aggravated identity theft, and conspiracy to launder monetary instruments. In addition to the 102-month prison term, U.S. District Court Judge Randolph D. Moss ordered Chapman to serve three years of supervised release, to forfeit $284,555.92 that was to be paid to the North Koreans, and to pay a judgment of $176,850.

“Christina Chapman perpetrated a years’ long scheme that resulted in millions of dollars raised for the DPRK regime, exploited more than 300 American companies and government agencies, and stole dozens of identities of American citizens,” said Acting Assistant Attorney General Matthew R. Galeotti of the Justice Department’s Criminal Division. “Chapman made the wrong calculation: short term personal gains that inflict harm on our citizens and support a foreign adversary will have severe long term consequences.  I encourage companies to remain vigilant of these cyber threats, and warn individuals who may be tempted by similar schemes to take heed of today’s sentence.”

“North Korea is not just a threat to the homeland from afar. It is an enemy within. It is perpetrating fraud on American citizens, American companies, and American banks. It is a threat to Main Street in every sense of the word,” said U.S. Attorney Jeanine Ferris Pirro for the District of Columbia. “The call is coming from inside the house. If this happened to these big banks, to these Fortune 500, brand name, quintessential American companies, it can or is happening at your company. Corporations failing to verify virtual employees pose a security risk for all. You are the first line of defense against the North Korean threat.”

“The North Korean regime has generated millions of dollars for its nuclear weapons program by victimizing American citizens, businesses, and financial institutions,” said Assistant Director Rozhavsky of the FBI’s Counterintelligence Division. “However, even an adversary as sophisticated as the North Korean government can’t succeed without the assistance of willing U.S. citizens like Christina Chapman, who was sentenced today for her role in an elaborate scheme to defraud more than 300 American companies by helping North Korean IT workers gain virtual employment and launder the money they earned. Today’s sentencing demonstrates that the FBI will work tirelessly with our partners to defend the homeland and hold those accountable who aid our adversaries.”

“The sentencing today demonstrates the great lengths to which the North Korean government will go in its efforts and resources to fund its illicit activities. The FBI continues to pursue these threat actors to disrupt their network and hold those accountable wherever they may be,” said Special Agent in Charge Heith Janke of the FBI Phoenix Field Office.

“Today’s sentencing brings justice to the victims whose identities were stolen for this international fraud scheme,” said Special Agent in Charge Carissa Messick of the IRS Criminal Investigation (IRS-CI) Phoenix Field Office. “The scheme was elaborate. If this sentencing proves anything, it’s that no amount of obfuscation will prevent IRS-CI and our law enforcement partners from tracking down those that wish to steal the identities of U.S. nationals, launder money, or engage in criminality that jeopardizes national security.”

The case involved one of the largest North Korean IT worker fraud schemes charged by the Department of Justice, with 68 identities stolen from victims in the United States and 309 U.S. businesses and two international businesses defrauded.

According to court documents, North Korea has deployed thousands of highly skilled IT workers around the world, including to the United States, to obtain remote employment using false, stolen, or borrowed identities of U.S. persons. To circumvent controls employed by U.S. companies to prevent the hiring of illicit overseas IT workers, the North Korean IT workers obtain assistance from U.S.-based collaborators.

Chapman helped North Korean IT workers obtain jobs at 309 U.S. companies, including Fortune 500 corporations. The impacted companies included a top-five major television network, a Silicon Valley technology company, an aerospace manufacturer, an American car maker, a luxury retail store, and a U.S media and entertainment company. Some of the companies were targeted by the IT workers, who maintained a repository of postings for companies that they wanted to employ them. The IT workers also attempted to obtain employment at two different U.S. government agencies, although these efforts were generally unsuccessful.

Chapman operated a “laptop farm” where she received and hosted computers from the U.S. companies at her home, deceiving the companies into believing that the work was being performed in the United States. Chapman also shipped 49 laptops and other devices supplied by U.S. companies to locations overseas, including multiple shipments to a city in China on the border with North Korea. More than 90 laptops were seized from Chapman’s home following the execution of a search warrant in October 2023.

Christina Chapman organized and stored U.S. company laptops in her home, and included notes identifying the U.S. company and identity associated with each laptop.

Much of the millions of dollars in income generated by the scheme was falsely reported to the IRS and Social Security Administration in the names of actual U.S. individuals whose identities had been stolen or borrowed. Additionally, Chapman received and forged payroll checks in the names of the stolen identities used by the IT workers and received IT workers’ wages through direct deposit from U.S. companies into her U.S. financial accounts. Chapman further transferred the proceeds from the scheme to individuals overseas.

This case was investigated by the FBI Phoenix Field Office, and the IRS-CI Phoenix Field Office. Assistance was provided by the FBI Chicago Field Office.

Trial Attorney Ashley R. Pungello of the Criminal Division’s Computer Crime and Intellectual Property Section and Assistant U.S. Attorney Karen P. Seifert for the District of Columbia prosecuted the case, with assistance from Paralegal Specialist Jorge Casillas. Assistant U.S. Attorney Joshua Rothstein for the District of Columbia, the Victim Witness Unit, the U.S. Attorney’s Office for the District of Arizona, and the National Security Division’s National Security Cyber Section also provided assistance.

***

In a coordinated effort, FBI Phoenix also issued guidance for HR professionals on detecting North Korean IT workers, and the Department of State issued guidance on the North Korean IT worker threat.

Prior guidance was issued by the FBI, State Department, and the Department of the Treasury on this threat in a May 2022 advisory, and by the United States and the Republic of Korea (South Korea) in October 2023. The FBI issued updated guidance in May 2024 regarding the use of U.S. persons acting as facilitators by providing a U.S.-based location for U.S. companies to send devices and a U.S.-based internet connection for access to U.S. company networks and in January 2025 concerning the extortion and theft of sensitive company data by North Korean IT workers, along with recommended mitigations.

Security News: Arizona Woman Sentenced for $17M Information Technology Worker Fraud Scheme that Generated Revenue for North Korea

Source: United States Department of Justice

An Arizona woman was sentenced today to 102 months in prison for her role in a fraudulent scheme that assisted North Korean Information Technology (IT) workers posing as U.S. citizens and residents with obtaining remote IT positions at more than 300 U.S. companies. The scheme generated more than $17 million in illicit revenue for Chapman and for the Democratic People’s Republic of Korea (DPRK or North Korea).

Christina Marie Chapman, 50, of Litchfield Park, Arizona, pleaded guilty on Feb. 11 in the District of Columbia to conspiracy to commit wire fraud, aggravated identity theft, and conspiracy to launder monetary instruments. In addition to the 102-month prison term, U.S. District Court Judge Randolph D. Moss ordered Chapman to serve three years of supervised release, to forfeit $284,555.92 that was to be paid to the North Koreans, and to pay a judgment of $176,850.

“Christina Chapman perpetrated a years’ long scheme that resulted in millions of dollars raised for the DPRK regime, exploited more than 300 American companies and government agencies, and stole dozens of identities of American citizens,” said Acting Assistant Attorney General Matthew R. Galeotti of the Justice Department’s Criminal Division. “Chapman made the wrong calculation: short term personal gains that inflict harm on our citizens and support a foreign adversary will have severe long term consequences.  I encourage companies to remain vigilant of these cyber threats, and warn individuals who may be tempted by similar schemes to take heed of today’s sentence.”

“North Korea is not just a threat to the homeland from afar. It is an enemy within. It is perpetrating fraud on American citizens, American companies, and American banks. It is a threat to Main Street in every sense of the word,” said U.S. Attorney Jeanine Ferris Pirro for the District of Columbia. “The call is coming from inside the house. If this happened to these big banks, to these Fortune 500, brand name, quintessential American companies, it can or is happening at your company. Corporations failing to verify virtual employees pose a security risk for all. You are the first line of defense against the North Korean threat.”

“The North Korean regime has generated millions of dollars for its nuclear weapons program by victimizing American citizens, businesses, and financial institutions,” said Assistant Director Rozhavsky of the FBI’s Counterintelligence Division. “However, even an adversary as sophisticated as the North Korean government can’t succeed without the assistance of willing U.S. citizens like Christina Chapman, who was sentenced today for her role in an elaborate scheme to defraud more than 300 American companies by helping North Korean IT workers gain virtual employment and launder the money they earned. Today’s sentencing demonstrates that the FBI will work tirelessly with our partners to defend the homeland and hold those accountable who aid our adversaries.”

“The sentencing today demonstrates the great lengths to which the North Korean government will go in its efforts and resources to fund its illicit activities. The FBI continues to pursue these threat actors to disrupt their network and hold those accountable wherever they may be,” said Special Agent in Charge Heith Janke of the FBI Phoenix Field Office.

“Today’s sentencing brings justice to the victims whose identities were stolen for this international fraud scheme,” said Special Agent in Charge Carissa Messick of the IRS Criminal Investigation (IRS-CI) Phoenix Field Office. “The scheme was elaborate. If this sentencing proves anything, it’s that no amount of obfuscation will prevent IRS-CI and our law enforcement partners from tracking down those that wish to steal the identities of U.S. nationals, launder money, or engage in criminality that jeopardizes national security.”

The case involved one of the largest North Korean IT worker fraud schemes charged by the Department of Justice, with 68 identities stolen from victims in the United States and 309 U.S. businesses and two international businesses defrauded.

According to court documents, North Korea has deployed thousands of highly skilled IT workers around the world, including to the United States, to obtain remote employment using false, stolen, or borrowed identities of U.S. persons. To circumvent controls employed by U.S. companies to prevent the hiring of illicit overseas IT workers, the North Korean IT workers obtain assistance from U.S.-based collaborators.

Chapman helped North Korean IT workers obtain jobs at 309 U.S. companies, including Fortune 500 corporations. The impacted companies included a top-five major television network, a Silicon Valley technology company, an aerospace manufacturer, an American car maker, a luxury retail store, and a U.S media and entertainment company. Some of the companies were targeted by the IT workers, who maintained a repository of postings for companies that they wanted to employ them. The IT workers also attempted to obtain employment at two different U.S. government agencies, although these efforts were generally unsuccessful.

Chapman operated a “laptop farm” where she received and hosted computers from the U.S. companies at her home, deceiving the companies into believing that the work was being performed in the United States. Chapman also shipped 49 laptops and other devices supplied by U.S. companies to locations overseas, including multiple shipments to a city in China on the border with North Korea. More than 90 laptops were seized from Chapman’s home following the execution of a search warrant in October 2023.

Christina Chapman organized and stored U.S. company laptops in her home, and included notes identifying the U.S. company and identity associated with each laptop.

Much of the millions of dollars in income generated by the scheme was falsely reported to the IRS and Social Security Administration in the names of actual U.S. individuals whose identities had been stolen or borrowed. Additionally, Chapman received and forged payroll checks in the names of the stolen identities used by the IT workers and received IT workers’ wages through direct deposit from U.S. companies into her U.S. financial accounts. Chapman further transferred the proceeds from the scheme to individuals overseas.

This case was investigated by the FBI Phoenix Field Office, and the IRS-CI Phoenix Field Office. Assistance was provided by the FBI Chicago Field Office.

Trial Attorney Ashley R. Pungello of the Criminal Division’s Computer Crime and Intellectual Property Section and Assistant U.S. Attorney Karen P. Seifert for the District of Columbia prosecuted the case, with assistance from Paralegal Specialist Jorge Casillas. Assistant U.S. Attorney Joshua Rothstein for the District of Columbia, the Victim Witness Unit, the U.S. Attorney’s Office for the District of Arizona, and the National Security Division’s National Security Cyber Section also provided assistance.

***

In a coordinated effort, FBI Phoenix also issued guidance for HR professionals on detecting North Korean IT workers, and the Department of State issued guidance on the North Korean IT worker threat.

Prior guidance was issued by the FBI, State Department, and the Department of the Treasury on this threat in a May 2022 advisory, and by the United States and the Republic of Korea (South Korea) in October 2023. The FBI issued updated guidance in May 2024 regarding the use of U.S. persons acting as facilitators by providing a U.S.-based location for U.S. companies to send devices and a U.S.-based internet connection for access to U.S. company networks and in January 2025 concerning the extortion and theft of sensitive company data by North Korean IT workers, along with recommended mitigations.

Justice Department Sues New York City Over Sanctuary Policies

Source: United States Department of Justice

WASHINGTON – Today, the Justice Department filed a lawsuit against New York City, Mayor Eric Adams, and several other city officials to challenge New York’s sanctuary city laws.

As detailed in the complaint, New York’s sanctuary policies have allowed dangerous criminals to roam the streets and commit heinous crimes within the community. These policies reflect an intentional effort to obstruct federal law enforcement and thus are preempted under the Supremacy Clause of the U.S. Constitution.

“New York City has released thousands of criminals on the streets to commit violent crimes against law-abiding citizens due to sanctuary city policies,” said Attorney General Pamela Bondi. “If New York City won’t stand up for the safety of its citizens, we will.”

“For too long, New York City has been at the vanguard of interfering with enforcing our immigration laws,” said Assistant Attorney General Brett Shumate. “Its efforts to thwart federal immigration enforcement end now.”

The case, filed in the Eastern District of New York, is the latest action from the Justice Department fighting back against unlawful obstruction of enforcement of federal immigration laws. In the past three months, the Department has filed lawsuits against Los Angeles, New York State, Colorado, Illinois, the city of Rochester, New York, and several New Jersey cities to invalidate unconstitutional sanctuary policies. Recently, the Mayor of Louisville revoked the city’s sanctuary policy after the Justice Department threatened legal action.

Read the full complaint here.

Former Missionary Charged with Sexually Abusing Minors Abroad

Source: United States Department of Justice

A former missionary was arrested today in Pittsburgh, Pennsylvania, for sexually abusing minors abroad. William James Purdy, 28, of West Valley, Utah, was indicted by a federal grand jury on July 16 on charges related to the exploitation of minors outside the United States.

“The defendant in this case chose to travel abroad under the guise of good intentions and then sexually exploited and abused children who had been trusted to his care,” said Acting Assistant Attorney General Matthew Galeotti of the Justice Department’s Criminal Division. “When foreign authorities sought to hold him accountable, he fled back to the United States. The United States will not export child exploitation. The Justice Department is committed to securing justice for children exploited overseas when these heinous acts are committed by Americans.”

“William James Purdy’s actions represent a profound betrayal of trust and have caused immeasurable harm to the young lives he was supposed to protect and nurture,” said Special Agent in Charge Edward V. Owens of Homeland Security Investigations (HSI) Philadelphia. “HSI’s global reach and partnerships are crucial in our relentless fight against child predators, ensuring that those who exploit and abuse children, no matter where they are, are brought to justice. We remain steadfast in our commitment to protecting the most vulnerable members of our society and will continue to work tirelessly to prevent such heinous crimes.”

“This is a perfect illustration of the DSS global reach and our ability to partner with U.S. and foreign law enforcement agencies on international cases,” said Acting Assistant Director of Domestic Operations Adrian Diaz of the U.S. Department of State’s Diplomatic Security Service (DSS). “DSS and our counterparts are conducting investigations like these on a daily basis around the world.”

According to court documents, Purdy, a U.S. Citizen, traveled to Tonga in 2017 for his mission with The Church of Jesus Christ of Latter-day Saints. While there, he allegedly sexually abused multiple minor boys. Purdy returned to Tonga in late 2019 to teach at a school in Nuku’alofa, Tonga. For years, Purdy allegedly groomed and sexually abused numerous male students, some of whom lived with him. Purdy allegedly provided gifts, including electronic devices and access to the internet, food, toys, and money, in exchange for the performance of sexual acts. Purdy is also alleged to have surreptitiously recorded minor males in his bathroom at his various Tonga apartments.

Purdy was arrested by Tonga police in October 2022, when an eight‑year‑old boy disclosed that Purdy sexually assaulted him during their tutoring sessions. When Purdy was released from jail, he allegedly continued to sexually abuse children. In March 2023, just prior to his scheduled trial, Purdy fled Tonga using an assumed identity and returned to Utah. The investigation thus far has identified 14 minor victims throughout Tonga.

Homeland Security Investigations (HSI) and the Diplomatic Security Service (DSS) are investigating the case, with the substantial assistance of the Tonga Police and the Tongan Department of Public Prosecutions.

Trial Attorney Rachel L. Rothberg of the Criminal Division’s Child Exploitation and Obscenity Section (CEOS) and Assistant U.S. Joey L. Blanch for the District of Utah are prosecuting the case.

This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the epidemic of child sexual exploitation and abuse. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend, and prosecute individuals who exploit children via the internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, visit www.justice.gov/psc.

California Certified Public Accountant Indicted for Filing False Tax Returns and Mail Fraud Scheme

Source: United States Department of Justice Criminal Division

A federal grand jury in San Francisco returned a superseding indictment yesterday charging a California man with filing false tax returns, mail fraud, and money laundering. Gilbert was previously charged with filing false tax returns earlier this year.

The following is according to the superseding indictment: Michael M. Gilbert, of San Rafael, filed false tax returns for himself and two business entities he controlled. Gilbert, a certified public accountant since 1985, allegedly underreported the total income his accounting and tax return preparation business, M.M. Gilbert & Company Inc., received during the years 2017 through 2020.

The superseding indictment further alleges that Gilbert solicited payments from clients of M.M. Gilbert for “tax strategies” and “donations,” among other things, which the clients paid to White Mountain Properties Inc., another entity Gilbert controlled. Gilbert allegedly did not report these payments as income on the company’s 2017 through 2021 business tax returns. These payments to White Mountain were allegedly proceeds from Gilbert’s scheme to defraud his clients through the promise of some tax benefit. In fact, the White Mountain funds did not create a tax benefit for Gilbert’s clients, and Gilbert allegedly instead diverted the payments for his own personal enrichment. In 2020-2021, Gilbert is alleged to have transferred more than $5 million from White Mountain to himself and then failed to report that income on his individual tax returns.

If convicted, Gilbert faces a maximum penalty of 20 years in prison for each count of mail fraud, a maximum penalty of 10 years in prison for each count money laundering, and a maximum penalty of three years in prison for each count of filing a false tax return. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

Acting Deputy Assistant Attorney General Karen Kelly of the Justice Department’s Tax Division and U.S. Attorney Craig H. Missakian for the Northern District of California made the announcement.

IRS Criminal Investigation is investigating the case.

Trial Attorneys Julia M. Rugg and Patrick Burns of the Tax Division and Assistant U.S. Attorney Sara E. Henderson for the Northern District of California are prosecuting the case.

An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

Louisiana Nurse Practitioner Convicted of $12M Medicare Fraud Scheme

Source: United States Department of Justice Criminal Division

A federal jury convicted a Louisiana nurse practitioner today for her role in an over $12.1 million health care fraud scheme to defraud Medicare by ordering medically unnecessary cancer genetic tests for hundreds of patients she never met or examined.

According to court documents and evidence presented at trial, Scharmaine Lawson Baker, 58, of Richmond, Texas, served as a nurse practitioner and was an enrolled Medicare provider. She held herself out as an expert in Medicare regulations – authoring publications on medical necessity and patient-provider relationships – while actively violating those very standards.

“Scharmaine Lawson Baker shamelessly exploited her medical license and the trust of vulnerable patients to enrich herself through a multimillion-dollar genetic testing fraud,” said Acting Assistant Attorney General Matthew R. Galeotti of the Justice Department’s Criminal Division. “The defendant peddled false promises of free cancer screenings while pocketing kickbacks for medically unnecessary tests. The Criminal Division remains relentless in uncovering and prosecuting fraud against government programs and those who prey on victims for personal gain.”

“This conviction signals the end of a challenging and labor-intensive prosecution,” said Acting U.S. Attorney Michael M. Simpson for the Eastern District of Louisiana. “Medicare fraud schemes such as these, profoundly impact our society, not only because of the monetary loss sustained by our Medicare program, and the damages suffered by those who were victimized by the fraud, but also by the erosion of public trust in our institutions. The successful prosecution of this case exemplifies our commitment to seek justice for all victims of fraud as well as to preserve taxpayer confidence in our nation’s medical institutions as a whole.”

“This defendant brazenly exploited the federal health care system for personal profit. Her scheme to peddle millions of dollars of medically unnecessary genetic tests was not a mistake — it was a calculated crime. She preyed on vulnerable patients, siphoned taxpayer dollars, and turned health care into a tool for fraud. Her actions represent a deliberate betrayal of public trust and a flagrant abuse of those she was entrusted to serve,” said Deputy Inspector General for Investigations Christian J. Schrank of the U.S. Department of Health and Human Services Office of Inspector General (HHS-OIG). “HHS-OIG, in coordination with our federal and state partners, will continue to apply every available resource to detect and disrupt fraud schemes that seek to abuse the Medicare program and enrollees.”

From 2018 to 2019, Lawson Baker worked as an independent contractor for a company that claimed to provide telehealth services. In her role, the defendant signed hundreds of orders for medically unnecessary cancer genetic testing after brief phone calls – typically lasting less than 60 seconds – and without conducting any physical exams of patients. Lawson Baker falsely diagnosed patients to justify the unnecessary tests, such as diagnosing male patients with cervical cancer that they did not have. Lawson Baker never reviewed any of the test results, including when the results showed that patients actually had variants predisposing them to certain cancers.

In furtherance of the scheme, Lawson Baker participated in phone calls misleading patients into believing they were being screened for cancer at no cost, despite the tests ordered not actually diagnosing patients with existing cancer. In doing so, she exploited the trust placed in licensed health care professionals and manipulated vulnerable patients.

In total, Lawson Baker caused over $12.1 million in fraudulent Medicare claims and the labs involved in the scheme received over $1.5 million in reimbursements for unnecessary testing. In exchange for signing these orders, Lawson Baker accepted kickbacks and bribes from the telehealth company – payments she later failed to disclose in her bankruptcy petition.

Lawson Baker was convicted of six counts of health care fraud. She is scheduled to be sentenced on Nov. 19 and faces a maximum penalty of 10 years in prison on each count. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

HHS-OIG and FBI investigated the case.

Trial Attorneys Samantha Usher and Gary A. Crosby II of the Criminal Division’s Fraud Section and Assistant U.S. Attorney Nicholas D. Moses for the Eastern District of Louisiana are prosecuting the case. Trial Attorney Kelly Z. Walters of the Criminal Division’s Fraud Section assisted in the prosecution.

The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Force Program. Since March 2007, this program, currently comprised of 9 strike forces operating in 27 federal districts, has charged more than 5,800 defendants who collectively have billed federal health care programs and private insurers more than $30 billion. In addition, the Centers for Medicare & Medicaid Services, working in conjunction with HHS-OIG, are taking steps to hold providers accountable for their involvement in health care fraud schemes. More information can be found at www.justice.gov/criminal-fraud/health-care-fraud-unit.