Chinese National Pleads Guilty to Acting at the Direction of North Korea to Export Firearms, Ammo, and Technology to North Korea

Source: United States Department of Justice Criminal Division

An illegal alien from China pleaded guilty today to federal criminal charges for illegally exporting firearms, ammunition and other military items to North Korea by concealing them inside shipping containers that departed from the Port of Long Beach, California, and for committing this crime at the direction of North Korean government officials, who wired him approximately $2 million for his efforts.

Shenghua Wen, 42, of Ontario, California, pleaded guilty to one count of conspiracy to violate the International Emergency Economic Powers Act (IEEPA) and one count of acting as an illegal agent of a foreign government. Wen has been in federal custody since his arrest in December 2024.

According to his plea agreement, Wen is a citizen of the People’s Republic of China who entered the United States in 2012 on a student visa and remained in the U.S. illegally after his student visa expired in December 2013.

Prior to entering the United States, Wen met with officials from North Korea’s government at a North Korean embassy in China. These government officials directed Wen to procure goods on behalf of North Korea.

In 2022, two North Korean government officials contacted Wen through an online messaging platform and instructed him to buy and smuggle firearms and other goods – including sensitive technology – from the United States to North Korea via China.

In 2023, at the direction of North Korean government officials, Wen shipped at least three containers of firearms out of the Port of Long Beach to China en route to their ultimate destination in North Korea. Wen took steps to conceal that he was illegally shipping firearms to North Korea by, among other things, filing false export information regarding the contents of the containers.

In May 2023, Wen purchased a firearms business in Houston, paid for with money sent through intermediaries by one of Wen’s North Korean contacts. Wen purchased many of the firearms he sent to North Korea in Texas and drove the firearms from Texas to California, where he arranged for them to be shipped.

In December 2023, one of Wen’s weapons shipments – which falsely reported to U.S. officials that it contained a refrigerator – left the Port of Long Beach and arrived in Hong Kong in January 2024. This weapons shipment was later transported from Hong Kong to Nampo, North Korea.

In September 2024, Wen – once again acting at the direction of North Korean officials – bought approximately 60,000 rounds of 9mm ammunition that he intended to ship to North Korea.

In furtherance of the conspiracy and at the direction of North Korean officials, Wen also obtained sensitive technology that he intended to send to North Korea. This technology included a chemical threat identification device and a handheld broadband receiver that detects known, unknown, illegal, disruptive or interfering transmissions.

Wen also acquired or offered to acquire a civilian airplane engine and a thermal imaging system that could be mounted on a drone, helicopter, or other aircraft, and could be used for reconnaissance and target identification.

During the scheme, North Korean officials wired approximately $2 million to Wen to procure firearms and other goods for their government.

Wen admitted that at all relevant times he knew that it was illegal to ship firearms, ammunition, and sensitive technology to North Korea. He also admitted to never having the required licenses to export ammunition, firearms, and the above-described devices to North Korea. He further admitted to acting at the direction of North Korean government officials and that he had not provided notification to the Attorney General of the United States that he was acting in the United States at the direction and control of North Korea as required by law.

Wen faces a maximum penalty of 20 years in prison on the count of violating the IEEPA and a maximum penalty of 10 years in prison on the count of acting as an illegal agent of a foreign government. Sentencing is scheduled for Aug. 18. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

Assistant Attorney General for National Security John Eisenberg, U.S. Attorney Bilal A. Essayli for the Central District of California, and Assistant Director Roman Rozhavsky of the FBI Counterintelligence Division made the announcement.

The FBI, Homeland Security Investigations, Defense Criminal Investigative Service (DCIS), the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), and the Department of Commerce Bureau of Industry and Security (BIS) are investigating the case.

Assistant U.S. Attorney Sarah E. Gerdes for the Central District of California and Trial Attorney Ahmed Almudallal of the National Security Division’s Counterintelligence and Export Control Section are prosecuting the case.

Founder of Cryptocurrency Payment Company Charged with Evading Sanctions and Export Controls, Defrauding Financial Institutions, and Violating the Bank Secrecy Act

Source: United States Department of Justice

Defendant Allegedly Laundered More Than $500M Through the U.S. Financial System, Including by Facilitating Transactions with Sanctioned Russian Banks

A 22-count indictment was unsealed today charging Iurii Gugnin, also known as Iurii Mashukov and George Goognin, 38, a resident of New York and citizen of Russia, with various offenses related to using his cryptocurrency company Evita to funnel more than $500 million of overseas payments through U.S. banks and cryptocurrency exchanges while hiding the source and purpose of the transactions.

According to court documents, Gugnin is charged with wire and bank fraud, conspiracy to defraud the United States, violation of the International Emergency Economic Powers Act (IEEPA), operating an unlicensed money transmitting business, failing to implement an effective anti-money laundering compliance program, failing to file suspicious activity reports, money laundering, and related conspiracy charges. Gugnin was arrested and arraigned today in New York.

“The defendant is charged with turning a cryptocurrency company into a covert pipeline for dirty money, moving over half a billion dollars through the U.S. financial system to aid sanctioned Russian banks and help Russian end-users acquire sensitive U.S. technology,” said John A. Eisenberg, Assistant Attorney General for National Security. “The Department of Justice will not hesitate to bring to justice those who imperil our national security by enabling our foreign adversaries to sidestep sanctions and export controls.”

“As alleged, Gugnin came to the United States and set up a money laundering operation under the guise of a cryptocurrency start-up, which he then used to evade sanctions and export controls and defraud U.S. financial institutions,” said U.S. Attorney Joseph Nocella Jr. for the Eastern District of New York. “Today’s arrest demonstrates that this Office will vigorously prosecute those who abuse the U.S. financial system in furtherance of criminal activity, particularly when it undermines national security.”

“Gugnin’s cryptocurrency company allegedly served as a front to launder hundreds of millions of dollars for sanctioned Russian entities and to obtain export-controlled technology for the Russian government,” said Assistant Director Roman Rozhavsky of the FBI’s Counterintelligence Division. “Let this serve notice that using cryptocurrency to hide illegal conduct will not prevent the FBI and our partners from holding you accountable.”

As alleged in the indictment, Gugnin is the founder, President, Treasurer, and Compliance Officer of U.S-based Evita Investments Inc. (Evita Investments) and Evita Pay Inc. (Evita Pay) (collectively, Evita). Gugnin used both companies to enable foreign customers — many of whom held funds at sanctioned Russian banks — to provide him with cryptocurrency, which he then laundered through cryptocurrency wallets and U.S. bank accounts. Gugnin ultimately converted the funds into U.S. dollars or other fiat currencies and then made payments through bank accounts in Manhattan on behalf of his foreign customers. In the process, the sources of the funds were obscured, disguising the audit trail and hiding the true counterparties to the transactions. Between June 2023 and January 2025, Gugnin used Evita to facilitate the movement of approximately $530 million through the U.S. financial system, most of which he received in the form of a cryptocurrency stablecoin known as Tether, or “USDT.”

To effectuate the scheme, Gugnin defrauded various banks and cryptocurrency exchanges through which he converted funds and made wire transfers. Gugnin repeatedly lied to these banks and exchanges, telling them that Evita did not conduct business with entities in Russia and did not deal with sanctioned entities. In fact, many of Gugnin’s customers were located in Russia, and he facilitated payments in funds held at sanctioned Russian banks, including PJSC Sberbank, PJSC Sovcombank, PJSC VTB Bank, and JSC Tinkoff Bank. Gugnin maintained personal accounts at two sanctioned Russian banks, JSC Alfa-Bank and PJSC Sberbank, with which he transacted while residing in the United States. Gugnin also facilitated payments by foreign customers to procure sensitive electronics, including an export-controlled server designed by a U.S. technology company, and laundered funds from a Moscow-based supplier to purchase parts for Rosatom, Russia’s state-owned nuclear technology company. To conceal his activities, Gugnin regularly obfuscated invoices by digitally “whiting out” the names and addresses of his Russian customers.

Gugnin also failed to implement Evita’s own purported anti-money laundering program and failed to file suspicious activity reports, as required under the Bank Secrecy Act. Although Gugnin represented to banks and cryptocurrency exchanges that Evita followed rigorous anti-money laundering and know-your-customer requirements, in practice he flouted those requirements, as well as the requirement to file reports of suspicious activities with the Financial Crimes Enforcement Network (FinCEN). Gugnin ultimately registered Evita Pay as a money transmitter with FinCEN and the state of Florida but did so by making materially false statements to the state of Florida about Evita Pay’s business. Gugnin used that fraudulently obtained state license to induce a cryptocurrency exchange to process transactions on his behalf.

In the course of his scheme, Gugnin conducted web searches that confirmed his awareness that he was breaking the law, including searches for “how to know if there is an investigation against you”; “evita investments inc. criminal records search”; “Iurii Gugnin criminal records”; “money laundering penalties US”; and “penalties for sanctions violations EU luxury goods.” He also visited website pages titled, respectively “am I being investigated?”; “signs you may be under criminal investigation”; and “what are the best ways to find out if you’re being investigated and what can someone do when they think they might be under investigation.”

If convicted, Gugnin faces a maximum penalty of 30 years in prison for each count of bank fraud; a maximum penalty of 20 years in prison for each of the wire fraud, IEEPA, money laundering, and related conspiracy counts; a maximum penalty of 10 years in prison for failure to implement an effective anti-money laundering program and failure to file suspicious activity reports; and a maximum penalty of five years in prison for conspiracy to defraud the United States and operating an unlicensed money transmitting business.

Assistant U.S. Attorney Matthew Skurnik for the Eastern District of New York and Trial Attorney Dallas Kaplan of the National Security Division’s Counterintelligence and Export Control Section are prosecuting the case. Assistant U.S. Attorney Laura Mantell for the Eastern District of New York’s Asset Recovery Section is handling forfeiture matters.

Today’s actions were coordinated through the Justice and Commerce Departments’ Disruptive Technology Strike Force. The Disruptive Technology Strike Force is an interagency law enforcement strike force co-led by the Departments of Justice and Commerce designed to target illicit actors, protect supply chains, and prevent critical technology from being acquired by authoritarian regimes and hostile nation-states.

An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

Security News: Founder of Cryptocurrency Payment Company Charged with Evading Sanctions and Export Controls, Defrauding Financial Institutions, and Violating the Bank Secrecy Act

Source: United States Department of Justice

Defendant Allegedly Laundered More Than $500M Through the U.S. Financial System, Including by Facilitating Transactions with Sanctioned Russian Banks

A 22-count indictment was unsealed today charging Iurii Gugnin, also known as Iurii Mashukov and George Goognin, 38, a resident of New York and citizen of Russia, with various offenses related to using his cryptocurrency company Evita to funnel more than $500 million of overseas payments through U.S. banks and cryptocurrency exchanges while hiding the source and purpose of the transactions.

According to court documents, Gugnin is charged with wire and bank fraud, conspiracy to defraud the United States, violation of the International Emergency Economic Powers Act (IEEPA), operating an unlicensed money transmitting business, failing to implement an effective anti-money laundering compliance program, failing to file suspicious activity reports, money laundering, and related conspiracy charges. Gugnin was arrested and arraigned today in New York.

“The defendant is charged with turning a cryptocurrency company into a covert pipeline for dirty money, moving over half a billion dollars through the U.S. financial system to aid sanctioned Russian banks and help Russian end-users acquire sensitive U.S. technology,” said John A. Eisenberg, Assistant Attorney General for National Security. “The Department of Justice will not hesitate to bring to justice those who imperil our national security by enabling our foreign adversaries to sidestep sanctions and export controls.”

“As alleged, Gugnin came to the United States and set up a money laundering operation under the guise of a cryptocurrency start-up, which he then used to evade sanctions and export controls and defraud U.S. financial institutions,” said U.S. Attorney Joseph Nocella Jr. for the Eastern District of New York. “Today’s arrest demonstrates that this Office will vigorously prosecute those who abuse the U.S. financial system in furtherance of criminal activity, particularly when it undermines national security.”

“Gugnin’s cryptocurrency company allegedly served as a front to launder hundreds of millions of dollars for sanctioned Russian entities and to obtain export-controlled technology for the Russian government,” said Assistant Director Roman Rozhavsky of the FBI’s Counterintelligence Division. “Let this serve notice that using cryptocurrency to hide illegal conduct will not prevent the FBI and our partners from holding you accountable.”

As alleged in the indictment, Gugnin is the founder, President, Treasurer, and Compliance Officer of U.S-based Evita Investments Inc. (Evita Investments) and Evita Pay Inc. (Evita Pay) (collectively, Evita). Gugnin used both companies to enable foreign customers — many of whom held funds at sanctioned Russian banks — to provide him with cryptocurrency, which he then laundered through cryptocurrency wallets and U.S. bank accounts. Gugnin ultimately converted the funds into U.S. dollars or other fiat currencies and then made payments through bank accounts in Manhattan on behalf of his foreign customers. In the process, the sources of the funds were obscured, disguising the audit trail and hiding the true counterparties to the transactions. Between June 2023 and January 2025, Gugnin used Evita to facilitate the movement of approximately $530 million through the U.S. financial system, most of which he received in the form of a cryptocurrency stablecoin known as Tether, or “USDT.”

To effectuate the scheme, Gugnin defrauded various banks and cryptocurrency exchanges through which he converted funds and made wire transfers. Gugnin repeatedly lied to these banks and exchanges, telling them that Evita did not conduct business with entities in Russia and did not deal with sanctioned entities. In fact, many of Gugnin’s customers were located in Russia, and he facilitated payments in funds held at sanctioned Russian banks, including PJSC Sberbank, PJSC Sovcombank, PJSC VTB Bank, and JSC Tinkoff Bank. Gugnin maintained personal accounts at two sanctioned Russian banks, JSC Alfa-Bank and PJSC Sberbank, with which he transacted while residing in the United States. Gugnin also facilitated payments by foreign customers to procure sensitive electronics, including an export-controlled server designed by a U.S. technology company, and laundered funds from a Moscow-based supplier to purchase parts for Rosatom, Russia’s state-owned nuclear technology company. To conceal his activities, Gugnin regularly obfuscated invoices by digitally “whiting out” the names and addresses of his Russian customers.

Gugnin also failed to implement Evita’s own purported anti-money laundering program and failed to file suspicious activity reports, as required under the Bank Secrecy Act. Although Gugnin represented to banks and cryptocurrency exchanges that Evita followed rigorous anti-money laundering and know-your-customer requirements, in practice he flouted those requirements, as well as the requirement to file reports of suspicious activities with the Financial Crimes Enforcement Network (FinCEN). Gugnin ultimately registered Evita Pay as a money transmitter with FinCEN and the state of Florida but did so by making materially false statements to the state of Florida about Evita Pay’s business. Gugnin used that fraudulently obtained state license to induce a cryptocurrency exchange to process transactions on his behalf.

In the course of his scheme, Gugnin conducted web searches that confirmed his awareness that he was breaking the law, including searches for “how to know if there is an investigation against you”; “evita investments inc. criminal records search”; “Iurii Gugnin criminal records”; “money laundering penalties US”; and “penalties for sanctions violations EU luxury goods.” He also visited website pages titled, respectively “am I being investigated?”; “signs you may be under criminal investigation”; and “what are the best ways to find out if you’re being investigated and what can someone do when they think they might be under investigation.”

If convicted, Gugnin faces a maximum penalty of 30 years in prison for each count of bank fraud; a maximum penalty of 20 years in prison for each of the wire fraud, IEEPA, money laundering, and related conspiracy counts; a maximum penalty of 10 years in prison for failure to implement an effective anti-money laundering program and failure to file suspicious activity reports; and a maximum penalty of five years in prison for conspiracy to defraud the United States and operating an unlicensed money transmitting business.

Assistant U.S. Attorney Matthew Skurnik for the Eastern District of New York and Trial Attorney Dallas Kaplan of the National Security Division’s Counterintelligence and Export Control Section are prosecuting the case. Assistant U.S. Attorney Laura Mantell for the Eastern District of New York’s Asset Recovery Section is handling forfeiture matters.

Today’s actions were coordinated through the Justice and Commerce Departments’ Disruptive Technology Strike Force. The Disruptive Technology Strike Force is an interagency law enforcement strike force co-led by the Departments of Justice and Commerce designed to target illicit actors, protect supply chains, and prevent critical technology from being acquired by authoritarian regimes and hostile nation-states.

An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

Justice Department Sues Coffee House for Refusal to Serve Jewish Customers

Source: United States Department of Justice Criminal Division

Note: View complaint here.

The Justice Department announced today that it filed a lawsuit against Fathi Abdulrahim Harara and Native Grounds LLC, the owners of the Jerusalem Coffee House in Oakland, California. The lawsuit alleges that the defendants discriminated against Jewish customers, in violation of Title II of the Civil Rights Act of 1964, which prohibits discrimination based on race, color, religion, or national origin in places of public accommodation.

“It is illegal, intolerable, and reprehensible for any American business open to the public to refuse to serve Jewish customers,” said Assistant Attorney General Harmeet K. Dhillon of the Justice Department’s Civil Rights Division. “Through our vigorous enforcement of Title II of the Civil Rights Act and other laws prohibiting race and religious discrimination, the Justice Department is committed to combatting anti-Semitism and discrimination and protecting the civil rights of all Americans.”

The lawsuit, filed today in the U.S. District Court for the Northern District of California, alleges that defendants discriminated against Jewish customers through policies and practices that denied them the full and equal enjoyment of the Jerusalem Coffee House’s services, accommodations, and privileges. Specifically, the lawsuit alleges that on two separate occasions, Harara ordered Jewish customers — identified because they were wearing baseball caps with Stars of David on them — to leave the coffee house. During one incident, an employee told a Jewish customer who was trying to make a purchase, “You’re the guy with the hat. You’re the Jew. You’re the Zionist.  We don’t want you in our coffee shop. Get out.” During another incident, Harara accused another Jewish customer who was with his five-year-old son of wearing a “Jewish star,” being a “Zionist,” and supporting “genocide.” Harara repeatedly demanded that the customer and his son leave and falsely accused them of “trespassing” to the Oakland police. Neither customer stated anything about their political views to Harara or any other employees while at the coffee house.

The lawsuit also alleges that, on the one-year anniversary of the Oct. 7, 2023, Hamas terrorist attacks on Israel, the Jerusalem Coffee House announced two new drinks: “Iced In Tea Fada,” an apparent reference to “intifada,” and “Sweet Sinwar,” an apparent reference to Yahya Sinwar, the former leader of Hamas who orchestrated the attacks on Israel. The lawsuit further alleges that the coffee house’s exterior side wall displays inverted red triangles, a symbol of violence against Jews that has been spraypainted on Jewish homes and synagogues in anti-Semitic attacks.

Under Title II, the Justice Department’s Civil Rights Division can obtain injunctive relief that changes policies and practices to remedy the discriminatory conduct. Title II does not authorize the division to obtain monetary damages for customers who are victims of discrimination.

More information about the Civil Rights Division and the laws it enforces is available at http://www.justice.gov/crt. Individuals may report discrimination in places of public accommodation that violates Title II by calling the Justice Department at 1-833-591-0291, or submitting a report online.

Ohio Company Sentenced for Violating OSHA Rule Leading to Worker’s Death

Source: United States Department of Justice Criminal Division

A Delaware corporation with a manufacturing facility in Ohio was sentenced today to pay a $500,000 fine, the statutory maximum, after pleading guilty to willfully violating an Occupational Safety and Health Administration (OSHA) rule. In addition to the fine, Fabcon will serve two years of organizational probation and comply with a Safety Compliance Plan. The criminal charge is related to an incident where an employee was killed when a pneumatic door closed on his head.

Fabcon Precast LLC makes precast concrete panels at its facility in Grove City, Ohio. Batch operators were employees responsible for operating and cleaning the facility’s only concrete mixer, which discharged concrete from its bottom through a pneumatic door. The mixer had an exhaust valve that, by design, released the pneumatic energy which powered the discharge door to make it inoperable.

The valve’s handle broke off, and was not replaced, prior to June 6, 2020. On that day, batch operator Zachary Ledbetter was injured trying to close the discharge door due to the broken valve. Ledbetter was eventually freed from the door, but he died at a hospital five days later.

“Today’s sentencing reflects Fabcon’s willful failure to implement measures to protect its workers,” said Acting Assistant Attorney General Adam Gustafson of the Justice Department’s Environment and Natural Resources Division (ENRD). “Sadly, this led to Zachary’s death. This tragedy shows the importance of following safety standards.”

“Fabcon Precast LLC willfully failed to adhere to OSHA safety regulations which resulted in the tragic and preventable loss of a worker’s life. This sentencing highlights our steadfast commitment to continue working with OSHA and our law enforcement partners to hold accountable those who jeopardize workers’ safety,” said Special Agent in Charge Megan Howell of the U.S. Department of Labor Office of Inspector General, Great Lakes Region.

Federal law makes it a class B misdemeanor to willfully fail to follow an OSHA safety standard, where the failure causes the death of an employee. The class B misdemeanor is the only federal criminal charge covering such workplace safety violations.

The Department of Labor’s Office of Inspector General investigated the case.

Senior Trial Attorney and Special Assistant U.S. Attorney Adam Cullman, of ENRD’s Environmental Crimes Section and for the Southern District of Ohio respectively, prosecuted the case.

Major Mexican Narcotrafficker Sentenced to Nearly 20 Years in Prison

Source: United States Department of Justice Criminal Division

A Mexican national who operated as a high-level cocaine trafficker was sentenced today to 232 months in prison for directing an international drug trafficking conspiracy.

According to court documents, Jorge Humberto Perez Cazares, also known as Cadete, 41, of Sinaloa, Mexico, was a leader and organizer of a transnational drug trafficking organization that was responsible for shipping multiple tons of cocaine from Central America into Mexico for further distribution into the United States, specifically Los Angeles. Perez Cazares used violence to protect his narcotics shipments and worked with a close affiliate of the co-leader of the Sinaloa Cartel.

“Jorge Humberto Perez Cazares was a major Mexican narcotrafficker responsible for shipping multiple tons of cocaine from Central America into Mexico for distribution in Los Angeles,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “Drug traffickers like Perez Cazares use violence to profit off bringing poisonous drugs into the United States with no regard for the welfare of our citizens. Today’s sentence demonstrates that the Department of Justice will not rest in bringing drug trafficking leaders to justice.”

“This sentence marks the downfall of a trafficker who fueled violence and addiction on both sides of the border,” said Assistant Director Jose A. Perez of the FBI’s Criminal Investigative Division. “The FBI and our law enforcement partners will continue to target the command structure of these cartels and dismantle their operations.”

“Jorge ‘Cadete’ Perez Cazares wasn’t just moving multi-ton quantities of cocaine — he was fueling a criminal empire. Perez Cazares funneled substantial amounts of narcotics into the United States and profited off the pain of addiction,” said Acting Administrator Robert Murphy of the Drug Enforcement Administration (DEA). “The government proved he was no middleman — he was a leader. And now, justice is delivering a sentence worthy of the destruction he caused.”

In February 2014, U.S. law enforcement targeted Perez Cazares’s Los Angeles-based distribution network, raiding three stash houses and seizing $1.4 million in cash and more than 70 kilograms of cocaine. Around the same time, Perez Cazares personally negotiated a deal with a Guatemalan drug trafficker for over $23 million in cocaine. Days later, he was arrested by Guatemalan authorities while traveling in a truck with 514 kilograms of cocaine. In June 2016, he was arrested again in Mexico pursuant to a U.S. provisional arrest warrant and extradited to the United States on July 30, 2021.

In April 2024, shortly before trial, Perez Cazares pleaded guilty to the sole count of conspiracy to import five kilograms or more of cocaine into the United States.

The FBI Washington Field Office investigated the case. The DEA Miami Office and DEA Guatemala Country Office provided critical assistance. Perez Cazares’s capture and extradition were made possible thanks to key international coordination between the Government of Guatemala, the U.S. Marshals Service, and the Justice Department’s Office of International Affairs.

Trial Attorney Douglas Meisel of the Criminal Division’s Narcotic and Dangerous Drug Section is prosecuting the case.

This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and other transnational criminal organizations and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces and Project Safe Neighborhoods. 

Defense News: The History and Legacy of Camp Mitchell: A Pillar of Seabee Excellence in Rota, Spain

Source: United States Navy

NAVAL STATION ROTA, Spain – Nestled within Naval Station Rota, Spain, Camp Mitchell stands as a testament to the unwavering commitment and operational excellence of the U.S. Navy Seabees. Named in honor of Capt. Thomas J. Mitchell, a distinguished Civil Engineer Corps (CEC) officer who was killed in action in 1974, the camp has served as a forward-deployed hub for Naval Construction Forces in the European and African theaters for decades.

Former Franklin County Jail Deputy Pleads Guilty to Civil Rights Violation

Source: United States Department of Justice Criminal Division

A former Franklin County sheriff’s deputy pleaded guilty in federal court in Columbus, Ohio, today to depriving an inmate of his civil rights. Matthew Carey, 28, of Grove City, admitted to depriving an individual of their right to be free from a deputy’s deliberate indifference to a substantial risk of serious harm, while acting under color of law.

According to court documents, in March 2022, Carey intentionally disclosed a pretrial detainee’s pending charge of rape of a minor to Gmier McCall, another pretrial detainee. Carey knew that disclosing the victim’s charges created a substantial risk that he would be assaulted by others in the jail, and in fact inmates did assault the victim.

Carey faces a maximum penalty of 10 years in prison. McCall previously pleaded guilty to conspiring to deprive the victim of his civil rights and also faces a maximum penalty of 10 years in prison. Sentencing of the defendants will be determined by the Court based on the advisory sentencing guidelines and other statutory factors at future hearings.

Acting U.S. Attorney Kelly A. Norris for the Southern District of Ohio, Assistant Attorney General Harmeet K. Dhillon of the Justice Department’s Civil Rights Division and Special Agent in Charge Elena Iatarola of the FBI Cincinnati Field Office announced the plea entered today before U.S. District Judge Algenon L. Marbley. Assistant United States Attorney Peter K. Glenn-Applegate for the Southern District of Ohio and Trial Attorney Cameron A. Bell of the Civil Rights Division’s Criminal Section are prosecuting the case.