FBI, DC3, and NPA Identification of North Korean Cyber Actors, Tracked as TraderTraitor, Responsible for Theft of $308 Million USD from Bitcoin.DMM.com

Source: US FBI

The Federal Bureau of Investigation, Department of Defense Cyber Crime Center, and National Police Agency of Japan are alerting the public to the theft of cryptocurrency worth $308 million U.S. dollars from the Japan-based cryptocurrency company DMM by North Korean cyber actors in May 2024. The theft is affiliated with TraderTraitor threat activity, which is also tracked as Jade Sleet, UNC4899, and Slow Pisces. TraderTraitor activity is often characterized by targeted social engineering directed at multiple employees of the same company simultaneously.

In late March 2024, a North Korean cyber actor, masquerading as a recruiter on LinkedIn, contacted an employee at Ginco, a Japan-based enterprise cryptocurrency wallet software company. The threat actor sent the target, who maintained access to Ginco’s wallet management system, a URL linked to a malicious Python script under the guise of a pre-employment test located on a GitHub page. The victim copied the Python code to their personal GitHub page and was subsequently compromised. 

After mid-May 2024, TraderTraitor actors exploited session cookie information to impersonate the compromised employee and successfully gained access to Ginco’s unencrypted communications system. In late-May 2024, the actors likely used this access to manipulate a legitimate transaction request by a DMM employee, resulting in the loss of 4,502.9 BTC, worth $308 million at the time of the attack. The stolen funds ultimately moved to TraderTraitor-controlled wallets.  

The FBI, National Police Agency of Japan, and other U.S. government and international partners will continue to expose and combat North Korea’s use of illicit activities—including cybercrime and cryptocurrency theft—to generate revenue for the regime. 

Director Wray Visits FBI Offices in Cheyenne and Denver

Source: US FBI

Earlier this week, FBI Director Christopher Wray visited the Denver Field Office and met with FBI employees and partners from across Colorado and Wyoming.

His trip to Wyoming included a productive discussion with law enforcement in the state about the importance of collaboration to fulfilling our shared mission, noting that “partnerships are more important now than they’ve ever been.” While in Wyoming, Director Wray also visited F.E. Warren AFB, where he met with military partners to discuss the many ways the FBI is working with the Department of Defense to protect against threats posed by hostile foreign nations.

In Denver, Director Wray sat down with partners from across law enforcement, the private sector, and academia in Colorado and Wyoming, thanking them for their partnership and emphasizing the need to continue working together to stay ahead of cyber, counterintelligence, and counterterrorism threats. The group also discussed the importance of continued collaboration to defend against threats to our critical infrastructure, and emerging challenges such as criminal use of artificial intelligence and cryptocurrency. While in Colorado, Director Wray also met with officials from the Bureau of Prisons at one of their facilities.

Director Wray pledged the FBI’s intent to try to continue to support law enforcement partners in Colorado and Wyoming through training, investigative services, and support, despite the increasingly limited budget environment. “There’s a force multiplier effect that comes from constant engagement and collaboration,” Director Wray said, “and you can count on us to keep focusing on how to be the best partner.”

FBI Denver serves all of Colorado and Wyoming. The office has nine resident agencies covering the two states. This trip marks Director Wray’s third visit to the Denver Field Office and his first visit to Wyoming as FBI Director.

United States Charges Dual Russian and Israeli National as Developer of LockBit Ransomware Group

Source: US FBI

Defendant Rostislav Panev in Custody Pending Extradition from Israel to the United States

Note: A copy of the superseding criminal complaint can be found here.

A superseding criminal complaint filed in the District of New Jersey was unsealed today charging a dual Russian and Israeli national for being a developer of the LockBit ransomware group.

In August, Rostislav Panev, 51, a dual Russian and Israeli national, was arrested in Israel pursuant to a U.S. provisional arrest request with a view towards extradition to the United States. Panev is currently in custody in Israel pending extradition on the charges in the superseding complaint.

“The Justice Department’s work going after the world’s most dangerous ransomware schemes includes not only dismantling networks, but also finding and bringing to justice the individuals responsible for building and running them,” said Attorney General Merrick B. Garland. “Three of the individuals who we allege are responsible for LockBit’s cyberattacks against thousands of victims are now in custody, and we will continue to work alongside our partners to hold accountable all those who lead and enable ransomware attacks.”

“The arrest of Mr. Panev reflects the Department’s commitment to using all its tools to combat the ransomware threat,” said Deputy Attorney General Lisa Monaco. “We started this year with a coordinated international disruption of LockBit — the most damaging ransomware group in the world. Fast forward to today and three LockBit actors are in custody thanks to the diligence of our investigators and our strong partnerships around the world. This case is a model for ransomware investigations in the years to come.”

“The arrest of alleged developer Rostislav Panev is part of the FBI’s ongoing efforts to disrupt and dismantle the LockBit ransomware group, one of the most prolific ransomware variants across the globe,” said FBI Director Christopher Wray. “The LockBit group has targeted both public and private sector victims around the world, including schools, hospitals, and critical infrastructure, as well as small businesses and multi-national corporations.  No matter how hidden or advanced the threat, the FBI remains committed to working with our interagency partners to safeguard the cyber ecosystem and hold accountable those who are responsible for these criminal activities.” 

“The criminal complaint alleges that Rostislav Panev developed malware and maintained the infrastructure for LockBit, which was once the world’s most destructive ransomware group and attacked thousands of victims, causing billions of dollars in damage,” said Principal Deputy Assistant Attorney General Nicole M. Argentieri, head of the Justice Department’s Criminal Division. “Along with our domestic and international law enforcement partner actions to dismantle LockBit’s infrastructure, the Criminal Division has disrupted LockBit’s operations by charging seven of its key members (including affiliates, developers, and its administrator) and arresting three of these defendants — including Panev. We are especially grateful for our partnerships with authorities in Europol, the United Kingdom, France, and Israel, which show that, when likeminded countries work together, cybercriminals will find it harder to escape justice.”

“As alleged by the complaint, Rostislav Panev for years built and maintained the digital weapons that enabled his LockBit coconspirators to wreak havoc and cause billions of dollars in damage around the world,” said U.S. Attorney Philip R. Sellinger for the District of New Jersey. “But just like the six other LockBit members previously identified and charged by this office and our FBI and Criminal Division partners, Panev could not remain anonymous and avoid justice indefinitely. He must now answer for his crimes. Today’s announcement represents another blow struck by the United States and our international partners against the LockBit organization, and our efforts will continue relentlessly until the group is fully dismantled and its members brought to justice.”

According to the superseding complaint, documents filed in this and related cases, and statements made in court, Panev acted as a developer of the LockBit ransomware group from its inception in or around 2019 through at least February 2024. During that time, Panev and his LockBit coconspirators grew LockBit into what was, at times, the most active and destructive ransomware group in the world. The LockBit group attacked more than 2,500 victims in at least 120 countries around the world, including 1,800 in the United States. Their victims ranged from individuals and small businesses to multinational corporations, including hospitals, schools, nonprofit organizations, critical infrastructure, and government and law-enforcement agencies. LockBit’s members extracted at least $500 million in ransom payments from their victims and caused billions of dollars in other losses, including lost revenue and costs from incident response and recovery.

LockBit’s members comprised “developers,” like Panev, who designed the LockBit malware code and maintained the infrastructure on which LockBit operated. LockBit’s other members, called “affiliates,” carried out LockBit attacks and extorted ransom payments from LockBit victims. LockBit’s developers and affiliates would then split ransom payments extorted from victims.

As alleged in the superseding complaint, at the time of Panev’s arrest in Israel in August, law enforcement discovered on Panev’s computer administrator credentials for an online repository that was hosted on the dark web and stored source code for multiple versions of the LockBit builder, which allowed LockBit’s affiliates to generate custom builds of the LockBit ransomware malware for particular victims. On that repository, law enforcement also discovered source code for LockBit’s StealBit tool, which helped LockBit affiliates exfiltrate data stolen through LockBit attacks. Law enforcement also discovered access credentials for the LockBit control panel, an online dashboard maintained by LockBit developers for LockBit’s affiliates and hosted by those developers on the dark web.

The superseding complaint also alleges that Panev exchanged direct messages through a cybercriminal forum with LockBit’s primary administrator, who, in an indictment unsealed in the District of New Jersey in May, the United States alleged to be Dimitry Yuryevich Khoroshev (Дмитрий Юрьевич Хорошев), also known as LockBitSupp, LockBit, and putinkrab. In those messages, Panev and the LockBit primary administrator discussed work that needed to be done on the LockBit builder and control panel.

Court documents further indicate that, between June 2022 and February 2024, the primary LockBit administrator made a series of transfers of cryptocurrency, laundered through one or more illicit cryptocurrency mixing services, of approximately $10,000 per month to a cryptocurrency wallet owned by Panev. Those transfers amounted to over $230,000 during that period.

In interviews with Israeli authorities following his arrest in August, Panev admitted to having performed coding, development, and consulting work for the LockBit group and to having received regular payments in cryptocurrency for that work, consistent with the transfers identified by U.S. authorities. Among the work that Panev admitted to having completed for the LockBit group was the development of code to disable antivirus software; to deploy malware to multiple computers connected to a victim network; and to print the LockBit ransom note to all printers connected to a victim network. Panev also admitted to having written and maintained LockBit malware code and to having provided technical guidance to the LockBit group.

The LockBit Investigation

The superseding complaint against, and apprehension of, Panev follows a disruption of LockBit ransomware in February by the United Kingdom (U.K.)’s National Crime Agency (NCA)’s Cyber Division, which worked in cooperation with the Justice Department, FBI, and other international law enforcement partners. As previously announced by the Department, authorities disrupted LockBit by seizing numerous public-facing websites used by LockBit to connect to the organization’s infrastructure and by seizing control of servers used by LockBit administrators, thereby disrupting the ability of LockBit actors to attack and encrypt networks and extort victims by threatening to publish stolen data. That disruption succeeded in greatly diminishing LockBit’s reputation and its ability to attack further victims, as alleged by documents filed in this case.

The superseding complaint against Panev also follows charges brought in the District of New Jersey against other LockBit members, including its alleged primary creator, developer, and administrator, Dmitry Yuryevich Khoroshev. An indictment against Khoroshev unsealed in May alleges that Khoroshev began developing LockBit as early as September 2019, continued acting as the group’s administrator through 2024, a role in which Khoroshev recruited new affiliate members, spoke for the group publicly under the alias “LockBitSupp,” and developed and maintained the infrastructure used by affiliates to deploy LockBit attacks. Khoroshev is currently the subject of a reward of up to $10 million through the U.S. Department of State’s Transnational Organized Crime (TOC) Rewards Program, with information accepted through the FBI tip website at www.tips.fbi.gov/.

A total of seven LockBit members have now been charged in the District of New Jersey. Beyond Panev and Khoroshev, other previously charged LockBit defendants include:

  • In July, two LockBit affiliate members, Mikhail Vasiliev, also known as Ghostrider, Free, Digitalocean90, Digitalocean99, Digitalwaters99, and Newwave110, and Ruslan Astamirov, also known as BETTERPAY, offtitan, and Eastfarmer, pleaded guilty in the District of New Jersey for their participation in the LockBit ransomware group and admitted deploying multiple LockBit attacks against U.S. and foreign victims. Vasiliev and Astamirov are presently in custody awaiting sentencing.
  • In February, in parallel with the disruption operation described above, an indictment was unsealed in the District of New Jersey charging Russian nationals Artur Sungatov and Ivan Kondratyev, also known as Bassterlord, with deploying LockBit against numerous victims throughout the United States, including businesses nationwide in the manufacturing and other industries, as well as victims around the world in the semiconductor and other industries. Sungatov and Kondratyev remain at large.
  • In May 2023, two indictments were unsealed in Washington, D.C., and the District of New Jersey charging Mikhail Matveev, also known as Wazawaka, m1x, Boriselcin, and Uhodiransomwar, with using different ransomware variants, including LockBit, to attack numerous victims throughout the United States, including the Washington, D.C., Metropolitan Police Department. Matveev remains at large and is currently the subject of a reward of up to $10 million through the U.S. Department of State’s TOC Rewards Program, with information accepted through the FBI tip website at www.tips.fbi.gov/.

The U.S. Department of State’s TOC Rewards Program is offering rewards of:

Information is accepted through the FBI tip website at tips.fbi.gov.

Khoroshev, Matveev, Sungatov, and Kondratyev have also been designated for sanctions by the Department of the Treasury’s Office of Foreign Assets Control for their roles in launching cyberattacks.

Victim Assistance

LockBit victims are encouraged to contact the FBI and submit information at www.ic3.gov/. As announced by the Department in February, law enforcement, through its disruption efforts, has developed decryption capabilities that may enable hundreds of victims around the world to restore systems encrypted using the LockBit ransomware variant. Submitting information at the IC3 site will enable law enforcement to determine whether affected systems can be successfully decrypted.

LockBit victims are also encouraged to visit www.justice.gov/usao-nj/lockbit for case updates and information regarding their rights under U.S. law, including the right to submit victim impact statements and request restitution, in the criminal litigation against Panev, Astamirov, and Vasiliev.

The FBI Newark Field Office, under the supervision of Acting Special Agent in Charge Nelson I. Delgado, is investigating the LockBit ransomware variant. Israel’s Office of the State Attorney, Department of International Affairs, and Israel National Police; France’s Gendarmerie Nationale Cyberspace Command, Paris Prosecution Office — Cyber Division, and judicial authorities at the Tribunal Judiciare of Paris; Europol; Eurojust; the U.K.’s NCA; Germany’s Landeskriminalamt Schleswig-Holstein, Bundeskriminalamt, and the Central Cybercrime Department North Rhine-Westphalia; Switzerland’s Federal Office of Justice, Public Prosecutor’s Office of the Canton of Zurich, and Zurich Cantonal Police; Spain’s Policia Nacional and Guardia Civil; Japan’s National Police Agency; Australian Federal Police; Sweden’s Polismyndighetens; Canada’s Royal Canadian Mounted Police; Politie Dienst Regionale Recherche Oost-Brabant of the Netherlands; and Finland’s National Bureau of Investigation have provided significant assistance and coordination in these matters and in the LockBit investigation generally.

Trial Attorneys Debra Ireland and Jorge Gonzalez of the Criminal Division’s Computer Crime and Intellectual Property Section (CCIPS) and Assistant U.S. Attorneys Andrew M. Trombly, David E. Malagold, and Vinay Limbachia for the District of New Jersey are prosecuting the charges against Panev and the other previously charged LockBit defendants in the District of New Jersey.

The Justice Department’s Cybercrime Liaison Prosecutor to Eurojust, Office of International Affairs, and National Security Division also provided significant assistance.

Additional details on protecting networks against LockBit ransomware are available at StopRansomware.gov. These include Cybersecurity and Infrastructure Security Agency Advisories AA23-325A, AA23-165A, and AA23-075A. 

A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

New York Resident Pleads Guilty to Operating Secret Police Station of the Chinese Government in Lower Manhattan

Source: US FBI

Defendant Admitted That He Conspired to Act as an Illegal Agent of the Chinese Government

Chen Jinping, 60, of New York, New York, pleaded guilty today to conspiring to act as an illegal agent of the government of the People’s Republic of China (PRC), in connection with opening and operating an undeclared overseas police station, located in lower Manhattan, for the PRC’s Ministry of Public Security (MPS).

“Today’s guilty plea holds the defendant accountable for his brazen efforts to operate an undeclared overseas police station on behalf of the PRC’s national police force — a clear affront to American sovereignty and danger to our community that will not be tolerated,” said Assistant Attorney General Matthew G. Olsen of the Justice Department’s National Security Division. “The Department of Justice will continue to pursue anyone who attempts to aid the PRC’s efforts to extend their repressive reach into the United States.”

“Today’s acknowledgment of guilt is a stark reminder of the insidious efforts taken by the PRC government to threaten, harass, and intimidate those who speak against their Communist Party,” said Executive Assistant Director Robert Wells of the FBI’s National Security Branch. “These blatant violations will not be tolerated on U.S. soil. The FBI remains committed to preserving the rights and freedoms of all people in our country and will defend against transnational repression at every front.”

“A priority of my office has been to counteract the malign activities of foreign governments that violate our nation’s sovereignty by targeting local diaspora communities in the United States,” said U.S. Attorney Breon Peace for the Eastern District of New York. “Today, a participant in a transnational repression scheme who worked to establish a secret police station in the middle of New York City on behalf of the national police force of the People’s Republic of China has pleaded guilty to conspiracy to act as an illegal agent. We will continue our efforts to protect the rights of vulnerable persons who come to this country to escape the repressive activities of authoritarian regimes.”

As alleged, Chen Jinping and co-defendant “Harry” Lu Jianwang conspired to act as illegal agents of the PRC government and also obstructed justice by destroying evidence of their communications with an MPS official. While acting under the direction and control of the MPS official, the defendants worked together to establish the first known overseas police station in the United States on behalf of the Fuzhou branch of the MPS. The police station — which closed in the fall of 2022 — occupied an entire floor in an office building in Manhattan’s Chinatown. Lu and Chen helped open and operate the clandestine police station. None of the participants in the scheme informed the U.S. government that they were helping the PRC government surreptitiously open and operate an undeclared MPS police station on U.S. soil.

In October 2022, the FBI conducted a judicially authorized search of the illegal police station. In connection with the search, FBI agents interviewed both defendants and seized their phones. In reviewing the contents of these phones, FBI agents observed that communications between the defendants and an MPS official appeared to have been deleted. In subsequent consensual interviews, the defendants admitted to the FBI that they had deleted their communications with the MPS official after learning about the ongoing FBI investigation, thus preventing the FBI from learning the full extent of the MPS’s directions for the overseas police station.

Chen faces a maximum penalty of five years in prison. Per Chen’s plea agreement, the government has agreed to dismiss the obstruction of justice charge against him. Lu has pleaded not guilty to both of the charges against him and is awaiting trial.

The FBI is investigating the case.

Assistant U.S. Attorneys Alexander A. Solomon and Antoinette N. Rangel for the Eastern District of New York and Trial Attorney Scott A. Claffee of the National Security Division’s Counterintelligence and Export Control Section are prosecuting the case.

The FBI has created a website for victims to report efforts by foreign governments to stalk, intimidate, or assault people in the United States. If you believe that you are or have been a victim of transnational repression, please visit www.fbi.gov/investigate/counterintelligence/transnational-repression.

W. Mike Herrington Named Special Agent in Charge of the Seattle Field Office

Source: US FBI

Director Christopher Wray has named W. Mike Herrington as the special agent in charge of the Seattle Field Office. Mr. Herrington most recently served as senior operations advisor to the Director.

Mr. Herrington first joined the FBI as a special agent in the San Francisco Field Office, where he investigated computer intrusions and served on the SWAT team as well as the Cyber Action Team, the FBI’s worldwide rapid cyber incident response team. He also served six months as the FBI’s assistant legal attaché for cyber matters in Canberra, Australia, covering Australia and New Zealand.

In 2015, Mr. Herrington moved to the Richmond Field Office as program coordinator for digital forensics and computer intrusion investigations, as well as for the SWAT and crisis negotiation teams. Mr. Herrington was promoted to assistant special agent in charge for the Los Angeles Field Office in 2018, where he oversaw counterintelligence and computer intrusion investigations.

In 2020, Mr. Herrington joined the Senior Executive Service as a section chief for the Cyber Division, where he oversaw investigations of computer intrusions originating from multiple high-priority threat countries.

Mr. Herrington is a recipient of the 2016 FBI Director’s Award for Excellence in Cyber Investigation.

Prior to joining the FBI, Mr. Herrington served as an infantry officer in the U.S. Army’s 75th Ranger Regiment. He holds a bachelor’s degree in electrical engineering from the United States Military Academy at West Point and a master’s degree in information technology management from Carnegie Mellon University.

DHS, FBI, FAA, and DoD Joint Statement on Ongoing Response to Reported Drone Sightings

Source: US FBI

There are more than one million drones lawfully registered with the FAA in the United States and there are thousands of commercial, hobbyist and law enforcement drones lawfully in the sky on any given day. With the technology landscape evolving, we expect that number to increase over time.

FBI has received tips of more than 5,000 reported drone sightings in the last few weeks with approximately 100 leads generated, and the federal government is supporting state and local officials in investigating these reports. Consistent with each of our unique missions and authorities, we are quickly working to prioritize and follow these leads. We have sent advanced detection technology to the region. And we have sent trained visual observers.

Having closely examined the technical data and tips from concerned citizens, we assess that the sightings to date include a combination of lawful commercial drones, hobbyist drones, and law enforcement drones, as well as manned fixed-wing aircraft, helicopters, and stars mistakenly reported as drones. We have not identified anything anomalous and do not assess the activity to date to present a national security or public safety risk over the civilian airspace in New Jersey or other states in the northeast.

That said, we recognize the concern among many communities. We continue to support state and local authorities with advanced detection technology and support of law enforcement. We urge Congress to enact counter-UAS legislation when it reconvenes that would extend and expand existing counter-drone authorities to identify and mitigate any threat that may emerge.

Additionally, there have been a limited number of visual sightings of drones over military facilities in New Jersey and elsewhere, including within restricted air space. Such sightings near or over DoD installations are not new. DoD takes unauthorized access over its airspace seriously and coordinates closely with federal, state, and local law enforcement authorities, as appropriate. Local commanders are actively engaged to ensure there are appropriate detection and mitigation measures in place.

Darknet Drug Trafficker From Pennsylvania Sentenced in D.C. for Selling Mass Quantities of Fentanyl Online

Source: US FBI

WASHINGTON – Jacob Blair, 27, of Aliquippa, Pa., was sentenced today in U.S. District Court to 180 months in federal prison for his role in a drug conspiracy that distributed a wide variety of narcotics, including large amounts of counterfeit oxycodone pills containing fentanyl and counterfeit Adderall pills containing methamphetamine. Blair sold and distributed the narcotics on the darknet marketplace Tor2Door and other darknet markets.

The sentence was announced by U.S. Attorney Edward R. Martin Jr.; Acting U.S. Attorney Troy Rivetti of the Western District of Pennsylvania; Special Agent in Charge Sean Ryan of the FBI Washington Field Office Criminal and Cyber Division, Special Agent in Charge Kevin P. Rojek of the FBI Pittsburgh Field Office; Special Agent in Charge Ibrar A. Mian of the Drug Enforcement Administration (DEA) Washington Division; Inspector in Charge Damon E. Wood of the U.S. Postal Inspection Service Washington Division; Inspector in Charge Lesley Allison of the US Postal Inspection Service Pittsburgh Division for; and Acting Special Agent in Charge Christopher Heck of the U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations (HSI) Washington, D.C.

Blair pleaded guilty on Dec. 17, 2024, before U.S. District Court Judge Amy Berman Jackson, to a charge of conspiracy to distribute more than 400 grams of fentanyl and 50 grams of methamphetamine, and to a charge of possessing a firearm in furtherance of a drug trafficking offense. Blair also pleaded guilty in the District of Columbia to a charge, originally filed in the Western District of Pennsylvania, of distributing 40 grams or more of fentanyl and 50 grams or more of methamphetamine.

In addition to the 180-month prison term, Judge Berman Jackson ordered Blair to serve five years of supervised release.

According to court documents, Blair was responsible for distributing more than 1.2 kilograms but less than 4 kilograms of fentanyl, and at least 50 grams but less than 200 grams of methamphetamine. He also admitted to mass-marketing the narcotics by means of an interactive computer service.

Blair’s co-defendant Dyani Pezzelle pleaded guilty March 5, 2025, to conspiracy to distribute more than 40 grams of fentanyl and 50 grams of methamphetamine. Pezzelle is scheduled to be sentenced on Sept. 18, 2025.

Between August 1, 2022, and Feb. 24, 2023, Blair and Pezzelle operated vendor accounts on various darknet marketplaces. On the marketplace Tor2Door, Blair and Pezzelle advertised their controlled substances using the monikers “YVS” and “YVendor Supplier” which they touted as “a syndicate of professionals that specialize in making the best products the markets have to offer. We focus on quality, consistency, stealth, and speed.” The conspiracy completed at least 459 sales of illegal narcotics.

Blair manufactured and obtained counterfeit Oxycodone, Adderall, and Xanax pills for sale. Blair posted advertisements for the controlled substances on Tor2Door and four other marketplaces and accepted payment in cyrptocurrency. During the conspiracy, Blair shipped counterfeit oxycodone pills to the District of Columbia at least six times. These pills contained fentanyl, a Schedule II controlled substance, and metonitazene, a Schedule I controlled substance. In addition, they also shipped counterfeit Xanax and Adderall pills to the District multiple times.

On February 22, 2023, law enforcement executed search warrants at Blair’s residence in Aliquippa, Pennsylvania, and other locations. During the searches, law enforcement recovered 10 firearms, over 20,000 counterfeit oxycodone pills that contained fentanyl, an industrial pill press, and other manufacturing and distribution supplies.

This case was investigated by the FBI’s Field Offices in Washington D.C. and Pittsburgh, the DEA, the U.S. Postal Inspection Service, and Homeland Security Investigations. Valuable assistance was provided by the Pittsburgh Bureau of Police and the Moon Township Police Department.

The matter is being prosecuted by Assistant U.S. Attorneys Thomas Strong and Peter Roman of the District of Columbia’s Violence Reduction and Trafficking Offenses (VRTO) section and Assistant U.S. Attorney DeMarr Moulton of the Western District of Pennsylvania.  The case was initially investigated and indicted by Assistant U.S. Attorney Kevin Rosenberg.

24cr560

Detroit Man Sentenced for Role in Drug Trafficking Operation

Source: US FBI

CLARKSBURG, WEST VIRGINIA – Jovonne Haynes, age 30, of Detroit, Michigan, was sentenced today to 135 months in federal prison for his role in a drug trafficking organization selling controlled substances that spanned from Michigan to Monongalia County.

According to court documents and statements made in court, Haynes was allowing his apartment in Morgantown to be used for the drug trafficking operation. Haynes pled guilty to a methamphetamine distribution charge in December 2024.

Haynes will serve three years of supervised release following his sentence.

Assistant U.S. Attorney Zelda Wesley prosecuted the case on behalf of the government.

The case was investigated the Drug Enforcement Administration (DEA) Clarksburg; the FBI Clarksburg; the Mon Metro Drug Task Force, a HIDTA-funded initiative; the West Virginia State Police; the Monongalia County Sheriff’s Office; the Morgantown Police Department; WVU Police Department; the DEA Cincinnati District Office; the DEA Detroit Field Division; and the FBI Detroit.

Chief U.S. District Judge Thomas S. Kleeh presided.

Ellwood City Resident Sentenced to 21 Years in Prison for Coercing Minor to Produce and Send Child Sexual Abuse Material

Source: US FBI

PITTSBURGH, Pa. – A former resident of Ellwood City, Pennsylvania, was sentenced in federal court on April 22, 2025, to 252 months of incarceration, to be followed by 15 years of supervised release, on his conviction of coercion and enticement of a minor, and production and receipt of material depicting the sexual exploitation of a minor, Acting United States Attorney Troy Rivetti announced today.

United States District Judge William S. Stickman IV imposed the sentence on Shayne A. Clapper, 31.

According to information presented to the Court, in January 2023 through February 2023, Clapper initiated a sexual relationship with a minor known to him. Clapper provided the minor with a cell phone that he used to communicate with the minor, including requesting and receiving nude images from the minor. Clapper also induced the minor to engage in sexually explicit conduct for the purpose of producing a visual depiction of the conduct.

Assistant United States Attorney Heidi M. Grogan prosecuted this case on behalf of the government.

Acting United States Attorney Rivetti commended the Federal Bureau of Investigation and Ellwood City Police Department for the investigation leading to the successful prosecution of Clapper.

This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

New Jersey Man Sentenced for Prescription Opioid Conspiracy

Source: US FBI

A New Jersey man was sentenced today to 16 months in prison for conspiracy to distribute and possess with intent to distribute oxycodone, a highly addictive controlled substance.  

According to court documents, between November 2022 and March 2023, Chris Ruediger, 61, of Pennsauken, purchased prescription oxycodone pills from a relative and sold them to another relative involved in unlawfully distributing oxycodone. Ruediger admitted to distributing between 100 and 400 kilograms of opioids by converted drug weight. Ruediger also admitted that he attempted to obstruct the investigation by attempting to persuade one of his co-conspirators not to talk with law enforcement.

In November 2024, Ruediger pleaded guilty to conspiracy to distribute and possess with intent to distribute controlled substances.  

Matthew R. Galeotti, Head of the Justice Department’s Criminal Division and Special Agent in Charge Wayne A. Jacobs of the FBI Philadelphia Field Office made the announcement.

The FBI’s South Jersey Resident Agency investigated the case with assistance from the Drug Enforcement Administration, New Jersey Division.

Trial Attorneys Paul J. Koob and Nicholas K. Peone of the Criminal Division’s Fraud Section are prosecuting the case.

The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Force Program. Since March 2007, this program, currently comprised of nine strike forces operating in 27 federal districts, has charged more than 5,800 defendants who collectively have billed federal health care programs and private insurers more than $30 billion. In addition, the Centers for Medicare & Medicaid Services, working in conjunction with HHS-OIG, are taking steps to hold providers accountable for their involvement in health care fraud schemes. More information can be found at www.justice.gov/criminal-fraud/health-care-fraud-unit.