Source: US FBI
Kinte Fisher of Charlotte has been sentenced to 20 years in prison for injecting large quantities of cocaine into the Wilmington area from early 2017 to July 2022.
Source: US FBI
Kinte Fisher of Charlotte has been sentenced to 20 years in prison for injecting large quantities of cocaine into the Wilmington area from early 2017 to July 2022.
Source: US FBI
CHARLOTTE, N.C. – Acting U.S. Attorney Lawrence J. Cameron announced today that Bikramjit Ahluwalia, 39, a dual citizen of the United Kingdom and the United Arab Emirates living in Dubai, was extradited from Spain and will appear in federal court in Charlotte later today. Ahluwalia, also known as “Biku,” “Internetteam5000,” “Don Bonsa,” and “Bobby,” is charged in a federal indictment with conspiracy to commit wire fraud, money laundering conspiracy, conspiracy to damage a protected computer, and wire fraud for his alleged role in an extensive “tech support fraud scheme.”
Generally, a tech support fraud scheme causes malicious pop-ups to appear on unsuspecting users’ computers, warning their devices have been infiltrated by a virus or another serious computer issue, convincing users to purchase unnecessary repair services or technical support using a telephone number or a link on the victims’ computer screens.
According to allegations in the indictment, Ahluwalia and his co-defendant, Andrew Brolese, owned Digital Marketing Support Services (DMSS), a Seychelles-based company that published and sold malicious pop-ups as a means of generating customer traffic for overseas call centers from victims of their tech support scheme. From April 2016 to March 2021, Ahluwalia and Brolese and their conspirators targeted victims throughout the United States, some of whom were 55 and older. It is alleged that the victims targeted in the scheme experienced computer pop-ups that mimicked fatal system-error screens, also known as “blue screens of death,” malicious pop-ups suggesting malware had been installed on their computers, or urgent warnings for technical issues related to the victims’ services, software, or devices. The indictment alleges that victims targeted by the malicious pop-ups were then instructed to call a number to receive technical services to help resolve their issues. As alleged in the indictment, the various overseas call centers, upon receipt of the victim call traffic, would use the misrepresentations in the pop-ups, false diagnoses of computer issues, and other deceptive sales techniques to trick the victims into paying hundreds and sometimes thousands of dollars to the call centers to receive unnecessary technical support for the non-existent computer issues.
The indictment alleges that Ahluwalia and Brolese conspired with others to sell incoming calls from targeted victims seeking purported tech support to companies around the world, including to an individual who owned companies in the Western District of North Carolina. It is further alleged that Ahluwalia and Brolese received over $31.2 million in illicit payments from the tech support scheme, through wire transfers made to DMSS’s bank accounts located overseas.
Ahluwalia is expected to appear for his initial hearing before U.S. Magistrate Judge David C. Keesler in Charlotte at 10:15 a.m.
Ahluwalia’s charges for conspiracy to commit wire fraud and wire fraud carry a maximum penalty of 30 years in prison. The maximum sentence for money laundering is 20 years in prison, and for the charge of conspiracy to damage a protected computer is five years in prison. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.
The charges in the indictment are allegations and the defendant is presumed innocent unless and until proven guilty beyond a reasonable doubt in a court of law.
The investigation was led by the Nashville Cyber Task Force which comprises the Knoxville Office of the FBI and the Knoxville Police Department. We thank the government of Spain for their substantial assistance arresting and extraditing Ahluwalia. The Justice Department’s Office of International Affairs provided significant assistance in securing the extradition of Ahluwalia from Spain.
Assistant U.S. Attorney Matthew Warren with the U.S. Attorney’s Office in Charlotte is prosecuting the case.
Source: US FBI
NEW YORK, NY—The FBI is offering a reward of up to $10,000 for information leading to the arrest of Carlos Martinez. Martinez, who is also known as “B-Way,” is wanted for his alleged connection with a racketeering investigation in New York.
On March 18, 2025, a federal arrest warrant was issued for Martinez in the United States District Court, Southern District of New York, White Plains, New York, after he was charged with Racketeering Conspiracy; Continuing Criminal Enterprise; Possession of Ammunition After a Felony Conviction; and Conspiracy to Distribute Controlled Substances. The public should consider Martinez to be armed and dangerous. Martinez is known to have connections to both New York and Pennsylvania.
If you have any information concerning this person, please contact your local FBI office, submit a tip online at tips.fbi.gov, or contact the nearest American Embassy or Consulate.
Source: US FBI
CEO and Commercial Manager of Iranian Company Charged in Connection with Conspiracies to Provide Material Support, Violate Export Control Laws and Commit Money Laundering
BROOKLYN, NY – Earlier today, in federal court in Brooklyn, a complaint was unsealed charging Iranian nationals Hossein Akbari and Reza Amidi, and an Iran-based Rah Roshd Company (“Rah Roshd”), with conspiring to procure U.S. parts for Iranian Unmanned Aerial Vehicles (“UAVs”), also known as drones, conspiring to provide material support to the IRGC, a designated foreign terrorist organization, and conspiring to commit money laundering. Akbari is the Chief Executive Officer (“CEO”) of Rah Roshd. Amidi is the company’s commercial manager and was previously the commercial manager of Qods Aviation Industries (“QAI”), an Iranian state-owned aerospace company. They are both citizens of Iran and remain at large.
John J. Durham, United States Attorney for the Eastern District of New York, Sue Bai, head of the Justice Department’s National Security Division, and Christopher G. Raia, Assistant Director in Charge, Federal Bureau of Investigation, New York Field Office (FBI), announced the charges.
“As alleged in the complaint, the defendants conspired to obtain U.S.-origin parts needed to manufacture drones for military use in Iran and send those parts to Iran in violation of export control laws,” stated United States Attorney Durham. “The charges filed today demonstrate the commitment by my Office and our law enforcement partners to dismantle illicit supply chains and prosecute those who unlawfully procure U.S. technology in support of a foreign terrorist organization. The IRGC and Qods Aviation Industries have been core players in the Iranian military regime’s production of drones, which threaten the lives of civilians, U.S. personnel, and our country’s allies. These charges should serve as a warning to those who violate U.S. export control laws and who unlawfully seek to aid Iran’s drone program.”
Mr. Durham expressed his appreciation to the FBI and the Department of Treasury’s Office of Foreign Assets Control (“OFAC”) for their work on the case. Today, OFAC sanctioned Akbari, Rah Roshd, and other companies and individuals for their roles in the sanctions-evasion scheme described in the complaint. OFAC previously sanctioned Amidi.
“Today’s charges lay bare how U.S.-made technology ended up in the hands of the Iranian military to build attack drones,” stated Sue J. Bai, head of the Justice Department’s National Security Division. “The Justice Department will continue to put maximum pressure on the Iranian regime. We will relentlessly dismantle illicit supply chains funneling American technology into the hands of Iran’s military and terrorist organizations and pursue those complicit in operations that threaten our country.”
“Hossein Akbari and Reza Amidi allegedly engaged in a multi-year conspiracy to obtain U.S. technology for use in Iranian made drones in violation of export laws and to provide material support to the IRGC—a designated terrorist organization,” stated FBI Assistant Director in Charge Raia. “The Iranian government has repeatedly demonstrated they are willing to violate the laws of our nation—this time utilizing dishonest businessmen who deliberately misrepresented themselves—in order to further their treacherous goals. The FBI will continue to protect the national security and interests of the United States through vigorous enforcement of export control laws put in place to prevent sensitive U.S. technology from being obtained by hostile foreign governments.”
As set forth in the complaint, Akbari and Amidi operate Rah Roshd, which procures and supplies advanced electronic, electro-optical, and security systems to the Government of Iran and designs, builds, and manufactures ground support systems for UAVs. Akbari serves as the CEO and Managing Director of Rah Roshd, and Amidi serves as the Commercial Manager. Rah Roshd’s clients include the IRGC and several Iranian state-owned aerospace companies and drone manufacturers, including QAI, Iran’s Ministry of Defense and Armed Forces Logistics (“MODAFL”), Shahed Aviation Industries Research Center (“SAIRC”), and Shahid Bakeri Industrial Group (SBIG).
Between January 2020 and the present, Amidi and Akbari used Rah Roshd in furtherance of a scheme to evade U.S. sanctions and procure U.S.-origin parts for use in Iranian-manufactured UAVs, including the Mohajer-6 UAV. At least one of those parts was manufactured by a Brooklyn, New York-based company (“Company-1”). In September 2022, the Ukrainian Air Force shot down an Iranian-made Mohajer-6 drone used by the Russian military in Ukraine. The drone recovered by the Ukrainian Air Force contained parts made by several U.S. companies, including Company-1.
To facilitate their scheme, Amidi and Akbari falsely purported to represent companies other than Rah Roshd, including a company based in the United Arab Emirates (“Company-2”) and a company based in Belgium (“Company-3”). The defendants used a “spoofed” email address with a misspelled version of Company-2’s name to communicate regarding the procurement of parts, including parts manufactured by U.S. companies. The defendants also used various “front” or “shell” companies to pay for UAV parts and to obfuscate the true end destination and the true identities of the sanctioned end users, including QAI and the IRGC, which were acquiring U.S.-made parts through Rah Roshd. Amidi and Akbari also used aliases to obfuscate their true identities in furtherance of the scheme.
Additionally, the defendants conspired to provide material support to the IRGC by providing goods and services for the benefit of the IRGC’s military campaign. This included constructing military shelters, providing cameras and drone field hangers, and conspiring to procure drone parts as well as parts to operate drones, including “servo motors,” “pneumatic masts,” which are a component of the operation of the Mohajer-6 drone, and engines. The investigation uncovered correspondence from the IRGC, signed by the head of the UAV Command for the IRGC’s Aerospace Force, thanking Rah Roshd for its work on behalf of the IRGC and praising Rah Roshd’s achievements in designing and manufacturing servo motors for defense equipment. The letter included a quote from the Supreme Leader of Iran regarding the importance of self-sufficiency and domestic production to strengthen Iran’s economy and “disappoint the enemies of the Islamic Republic.” The letter also noted continued efforts of Rah Roshd “in strengthening the defensive capabilities of the Islamic Republic of Iran.” Both Amidi and Akbari possessed documents indicating that they had purchased servo motors for delivery to Iran, including a servo motor contained in the Mohajer-6 drone. Akbari also emailed supply companies located in China and noted that he was purchasing parts for drones to be shipped to Iran.
Finally, Amidi and Akbari conspired to commit money laundering. They used at least three shell companies, all based in the United Arab Emirates, to pay a China-based company that sent invoices to Rah Roshd for the sale of motors. Those payments were processed through U.S.-based correspondent bank accounts. The defendants also used two of these shell companies to pay a separate China-based company for the sale of pneumatic masts.
Today’s actions were coordinated through the Justice and Commerce Departments’ Disruptive Technology Strike Force. The Disruptive Technology Strike Force is an interagency law enforcement strike force co-led by the Departments of Justice and Commerce designed to target illicit actors, protect supply chains, and prevent critical technology from being acquired by authoritarian regimes and hostile nation states.
The charges in the complaint are allegations and the defendants are presumed innocent unless and until proven guilty.
The government’s case is being handled by the Office’s National Security and Cybercrime Section. Assistant United States Attorneys Nina C. Gupta and Lindsey R. Oken are in charge of the prosecution with the assistance of Paralegal Specialist Rebecca Roth, along with Trial Attorney Scott Claffee of the National Security Division’s Counterintelligence and Export Control Section and Trial Attorney Charles Kovats of the National Security Division’s Counterterrorism Section.
The Defendants:
HOSSEIN AKBARI (also known as “Danial Yousef” and “Danial White”)
Age: 63
Iran
REZA AMIDI (also known as “Ali Rahmani”)
Age: 62
Iran
RAH ROSHD COMPANY
Tehran, Iran
E.D.N.Y. Docket No. 25-MJ-114
Source: US FBI
Matthew Podolsky, the Acting United States Attorney for the Southern District of New York, announced today that BRIAN CORDASCO was sentenced to 20 months in prison for participating in a conspiracy to solicit and receive bribes in his role as a Chief of the New York City Fire Department (“FDNY”) Bureau of Fire Prevention (“BFP”). CORDASCO previously pled guilty on October 8, 2024, before U.S. District Judge Lewis J. Liman, who also imposed today’s sentence.
Acting U.S. Attorney Matthew Podolsky said: “As a chief of the Bureau of Fire Prevention, Brian Cordasco was entrusted to protect the people of New York City and to fairly represent their interests. Instead, he repeatedly abused his position of power by expediting fire inspection services for those who paid him thousands of dollars in bribes. The sentence imposed today sends a clear message that government officials who betray the public trust to line their own pockets will be met with just punishment.”
According to the Indictment, plea agreement, and statements made in court:
From 2021 to 2023, CORDASCO repeatedly abused his position as a Chief of the BFP by participating in a scheme to solicit and receive $190,000 in total bribe payments from a former FDNY firefighter named Henry Santiago, Jr. In exchange for those bribe payments, CORDASCO used his authority within the BFP to improperly “expedite” BFP inspections and plan reviews for Santiago’s customers. CORDASCO personally profited $57,000 as part of this scheme. To carry out this conspiracy, CORDASCO lied to his BFP subordinates to justify otherwise improper expediting requests. CORDASCO also lied to law enforcement when interviewed about his involvement in the scheme.
If you believe you have information related to bribery, fraud, or any other illegal conduct by FDNY or BFP employees, please contact squad6complaint@doi.nyc.gov or (212) 825-2402. If you were involved in such conduct, please consider self-disclosing through the SDNY Whistleblower Pilot Program at USANYS.WBP@usdoj.gov.
* * *
In addition to the prison term, CORDASCO, 49, of Staten Island, New York, was sentenced to two years of supervised release and ordered to pay forfeiture of $57,000 and a fine of $100,000.
Mr. Podolsky praised the outstanding work of the Federal Bureau of Investigation and the New York City Department of Investigation.
The prosecution of this case is being handled by the Office’s Public Corruption Unit. Assistant U.S. Attorneys Jessica Greenwood, Matthew King, and Daniel H. Wolf are in charge of the prosecution.
Source: US FBI
Defendant Created Phony Merchant Accounts to Obtain Credit Card Processing for Fraudulent Telemarketing Scheme
Matthew Podolsky, the Acting United States Attorney for the Southern District of New York, announced that BRANDON BECKER, the former CEO of CardReady, LLC (“CardReady”), was sentenced today to seven years in prison for operating a credit card laundering scheme in which BECKER and his co-conspirators stole over $19 million based on false promises that they could reduce thousands of customers’ debt burdens. As part of this scheme, BECKER and his co-conspirators created dozens of sham merchant accounts and false merchant applications, defrauding a credit card processing company and federally insured bank into processing victim payments. BECKER previously pled guilty before U.S. District Judge Loretta A. Preska, who also imposed today’s sentence.
Acting U.S. Attorney Matthew Podolsky said: “Over a two-year period, Brandon Becker and his co-conspirators preyed on nearly 20,000 victims who were trying to reduce their debt burdens. Becker tasked co-conspirators at CardReady to recruit straw owners for shell companies, and deceived credit card payment processors into fraudulently processing more than $19 million in stolen funds. With today’s sentence, Becker faces the consequences of this massive fraud, sending the clear message that corporate executives who facilitate fraud will be held accountable for their crimes.”
According to the Superseding Indictment, court filings, and statements made in Court:
BECKER was the CEO of CardReady, a Los-Angeles based company acting as a sales agent in the credit card processing industry. As part of its business as a sales agent, CardReady found merchants who wanted credit card processing services, and submitted merchant applications on behalf of those merchants to an Independent Sales Organization (“ISO”), referred to in the Indictment as the “New York ISO.” The New York ISO then evaluated the merchant applications, and referred acceptable merchant accounts for processing up the chain to Payment Processor-1 and to Bank-1. Bank-1 and Payment Processor-1, in turn, processed payments to merchants for purchases by customers who had used credit cards.
In or about 2012, BECKER negotiated a deal with co-defendant STEVEN SHORT, the former head of Florida-based E.M. Systems & Services LLC and affiliated companies (collectively, “E.M. Systems”). Under this deal, CardReady would retain approximately one-third of E.M. Systems’ credit card sale transactions in exchange for providing E.M. Systems access to the credit card processing network. For roughly the next two years, SHORT and telemarketers working in boiler rooms for E.M. Systems cold-called customers and offered services, including debt consolidation and interest-rate reduction, which were prohibited by the applicable guidelines from Bank-1 and other associated processing entities (the “Guidelines”), and which – as BECKER knew – would produce chargebacks from dissatisfied customers far in excess of the number and rate of chargebacks permitted under the Guidelines.
In securing payment card processing for E.M. Systems, BECKER concealed that E.M. Systems was the true underlying merchant. Instead, BECKER and his subordinates and co-conspirators, created approximately 26 sham merchant companies, each headed by a “signer” (the “Sham Merchants” and the “Sham Merchant Accounts”). The 26 signers for the 26 Sham Merchants typically had no business of their own, and lacked knowledge of E.M. Systems’ business. In return for signing the paperwork provided to them, the signers were paid a nominal fee from CardReady.
BECKER and his co-conspirators prepared and coordinated fraudulent merchant applications for each of the Sham Merchants, through merchant applications that falsely described the Sham Merchants to make them look like legitimate independent businesses and to make it more likely that the associated Sham Merchant Account would be approved for processing by the New York ISO, Payment Processor-1, and Bank-1. The merchant application for each Sham Merchant also concealed the Sham Merchant’s true association with E.M. Systems.
By steering E.M. Systems’s payment processing through these Sham Merchant Accounts, BECKER accomplished a number of fraudulent purposes. First, the use of these Sham Merchant Accounts made it possible for E.M. Systems and other high-risk merchants to conceal their identities from Payment Processor-1 and Bank-1 and to maintain payment card processing. This was particularly relevant, as Payment Processor-1 repeatedly required CardReady to close individual Sham Merchant Accounts because of excessive chargebacks and reports of sales of prohibited services. BECKER then caused CardReady to quickly replace the closed Sham Merchant Accounts with new Sham Merchant Accounts, precluding Payment Processor-1 from shutting down its processing of E.M. Systems and other high-risk merchants. Second, the fraudulent processing scheme enabled E.M. Systems and other high-risk merchants to spread out their charges, refunds, and chargebacks across multiple Sham Merchant Accounts. This enabled them to evade chargeback monitoring programs operated by Bank-1, Payment Processor-1, and the New York ISO.
BECKER’s use of signers to deceive payment processors was not limited to the E.M. Systems scheme. BECKER and his agents and employees at CardReady systematized the recruitment of over 270 signers and the creation of over 800 Sham Merchant Accounts to be used by more than 30 high risk clients other than E.M. Systems between approximately 2012 and 2016, both before and after the E.M. Systems scheme.
* * *
BECKER, 53, of Los Angeles, California, pled guilty on August 30, 2024, to one count of conspiracy to commit wire fraud and bank fraud. In addition to the prison sentence, BECKER was sentenced to three years of supervised release and ordered to pay restitution in the amount of $1,910,600.05, and forfeiture of $11,405,964.00.
STEVEN SHORT, 48, of Tampa, Florida, pled guilty on August 16, 2022, to one count of conspiracy to commit wire fraud and bank fraud. On May 2, 2023, SHORT was sentenced to 78 months in prison and three years of supervised release and ordered to pay restitution in the amount of $1,910,600.05 and forfeiture of $8,833,889.69.
Mr. Podolsky praised the work of the Federal Bureau of Investigation and thanked the Federal Trade Commission for its assistance.
This case is being handled by the Office’s Complex Frauds and Cybercrime Unit. Assistant U.S. Attorneys Vladislav Vainberg and Timothy Capozzi are in charge of the prosecution.
Source: US FBI
Former Chairman and CEO Raised More Than $280 Million Using Forged Documents and Fake Revenue Projections
Matthew Podolsky, the Acting United States Attorney for the Southern District of New York, and Christopher G. Raia, the Assistant Director in Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced today the unsealing of an Indictment charging RANDY MILLER, former Chairman and President of Legacy Sports, and his son, CHAD MILLER, former CEO of Legacy Sports, with engaging in a scheme to defraud investors of more than $280 million in two municipal bond offerings. RANDY MILLER and CHAD MILLER were arrested today and will be presented tomorrow in the U.S. District Court for the District of Arizona. The case has been assigned to U.S. District Judge Lewis A. Kaplan.
Acting U.S. Attorney Matthew Podolsky said: “As alleged, Randy Miller and Chad Miller swindled investors out of over a quarter of a billion dollars by selling municipal bonds they knew were backed by forgeries and lies. Municipal bonds fund critical public projects and investors rely on accurate financial disclosures to make informed decisions. This Office is committed to protecting the integrity of the public finance system. When individuals abuse that system and investors’ trust, we will hold them accountable.”
FBI Assistant Director in Charge Christopher G. Raia said: “Fathers and sons have found shared bonds in sports for generation. Randy and Chad Miller allegedly chose to use a planned sports complex as a means to exploit and defraud investors. The Millers allegedly executed the scheme using fraudulent documents to lie about the status of the proposed project in order to raise hundreds of millions of dollars which they used to enrich themselves. The FBI will continue to ensure a level playing field by holding fraudsters accountable in the criminal justice system.”
According to the allegations contained in the Indictment:[1]
From November 2019 through May 2023, RANDY MILLER and CHAD MILLER engaged in a scheme to defraud investors in municipal bonds used to fund the development of a major sports complex in Mesa, Arizona called Legacy Park. The defendants worked together and with others to lie to potential bond investors about the interest sports organizations and other potential customers had in using or relocating to Legacy Park. The defendants and their associates forged and altered purported “binding” letters of intent and other documents from those potential customers to make it appear that the customers were committing to holding many events at Legacy Park, with a significant number of spectators, and agreeing to pay large fees – all far beyond what the organizations were considering, if they were considering Legacy Park at all. In some instances, RANDY MILLER and CHAD MILLER signed and directed others to sign customers’ names without the customers’ knowledge or permission. At other times the defendants copied and directed others to copy the signatures of other customers onto the fabricated letters, again without the customers’ knowledge or permission. As part of their scheme, the defendants forged documents on behalf of numerous persons and organizations, including an organization that promotes sports for disabled athletes.
RANDY MILLER and CHAD MILLER presented the fraudulent documents to prospective bond investors and incorporated them into their solicitation materials by claiming that Legacy Park would be 100% occupied at opening and would generate nearly $100 million in revenue in its first year of operations, more than enough to cover the bond payments.
After the Legacy Park bonds were sold to investors, RANDY MILLER and CHAD MILLER used some of the proceeds to pay for personal expenses such as a home and SUVs. The defendants also paid themselves inflated salaries and withdrew hundreds of thousands of dollars in addition to their salaries.
While the defendants enriched themselves, Legacy Park struggled to survive. The park opened in 2022, but within months failed to generate enough revenue to make the monthly bond payments, and by October 2022 it was in default. On May 1, 2023, the project filed for bankruptcy and was later sold for less than $26 million. Of those proceeds, less than $2.5 million went to repay the approximately $284 million owed to Legacy Park bondholders. Accordingly, because of the defendants’ fraud, bondholders were left with near total losses.
* * *
RANDY MILLER, 70, and CHAD MILLER, 41, both of Phoenix, Arizona, were both charged in the Indictment with one count of conspiracy to commit wire fraud and securities fraud, which carries a maximum term of five years in prison; one count of securities fraud and one count of wire fraud, each of which carries a maximum term of 20 years in prison; and one count of aggravated identity theft, which carries a mandatory minimum sentence of two years in prison.
The mandatory minimum and maximum potential sentences in this case are prescribed by Congress and provided here for informational purposes only, as any sentencing of the defendants will be determined by a judge.
Mr. Podolsky praised the outstanding work of the FBI. Mr. Podolsky also thanked the U.S. Securities and Exchange Commission, which has filed a parallel civil action.
The case is being handled by the Office’s Securities and Commodities Fraud Task Force. Assistant U.S. Attorneys Courtney L. Heavey and Matthew R. Shahabian are in charge of the prosecution.
[1] As the introductory phrase signifies, the entirety of the text of the Indictment and the descriptions of the Indictment constitute only allegations, and every fact described should be treated as an allegation.
Source: US FBI
ROCHESTER, N.Y.-U.S. Attorney Michael DiGiacomo announced today that Daniel P. Walsh, 58, of Rochester, NY, was arrested and charged by criminal complaint with receipt and possession of child pornography. The charges carry a maximum penalty of 20 years in prison, and a $250,000 fine.
Assistant U.S. Attorney, Kyle P. Rossi, who is handling the case, stated that the according to the complaint, in November 2024, the National Center for Missing and Exploited Children received a report from Google that an individual using an account registered in Walsh’s name, from Walsh’s IP address, uploaded multiple images of child pornography to Google’s platforms. Rochester Police and the FBI executed a search warrant at Walsh’s residence, during which they seized multiple computers and other digital devices. A forensic examination of those devices revealed that Walsh had received and possessed hundreds of images of child pornography, to include child pornography depicting prepubescent minors engaged in sexual conduct with adults. In many instances, Walsh had superimposed the faces of minors that he knew onto the images.
The defendant made an initial appearance before U.S. Magistrate Judge Mark W. Pedersen and was released on conditions.
The criminal complaint is the result of an investigation by the Rochester Police Department, under the direction of Chief David Smith and the Federal Bureau of Investigation Child Exploitation Task Force, under the direction of Special Agent-in-Charge Matthew Miraglia.
The fact that a defendant has been charged with a crime is merely an accusation and the defendant is presumed innocent until and unless proven guilty.
# # # #
Source: US FBI
BUFFALO, N.Y.-U.S. Attorney Michael DiGiacomo announced today that Edward Rollie, 49, of Niagara Falls, NY, pleaded guilty before U.S. Magistrate Judge Michael J. Roemer to possession with intent to distribute 400 grams or more of fentanyl, and being a felon in possession of a firearm, which carry a mandatory minimum penalty of 10 years in prison and a maximum of life.
Assistant U.S. Attorney Timothy C. Lynch, who is handling the case, stated that on August 28, 2024, investigators executed search warrants associated with Rollie at a Spruce Avenue residence in Niagara Falls, where Rollie’s son resides. They recovered approximately 594 grams of fentanyl, approximately 683 grams of cocaine, and a 9mm semi-automatic handgun. In July 2002, Rollie was convicted of a federal felony drug charge in the Western District of Pennsylvania, and is legally prohibited from possessing a firearm. The investigation also included controlled purchases of fentanyl from Rollie.
This effort is part of an Organized Crime Drug Enforcement Task Forces (OCDETF) operation. OCDETF identifies, disrupts, and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach. Additional information about the OCDETF Program can be found at https://www.justice.gov/OCDETF.
The plea is the result of an investigation by the Federal Bureau of Investigation, under the direction of Special Agent-in-Charge Matthew Miraglia, the Niagara Falls Police Department, under the direction of Commissioner Nick Ligammari, the Niagara County Sheriff’s Department, under the direction of Sheriff Michael Filicetti, the North Tonawanda Police Department, under the direction of Chief Keith Glass, the New York State Police, under the direction of Major Amie Feroleto, and the Erie County Sheriff’s Department, under the direction of Sheriff John Garcia.
Sentencing will be scheduled at a later date.
# # # #
Source: US FBI
BUFFALO, N.Y.-U.S. Attorney Michael DiGiacomo announced today that Arkan Fadhel, 30, of Buffalo, NY, who was convicted of conspiracy to commit health care fraud, was sentenced to serve three years supervised release to include 12 months home incarceration by U.S. District Judge Lawrence J. Vilardo. In addition, Fadhel was also ordered to perform 400 hours of community service. Fadhel will also forfeit $781,186.80 and pay restitution totaling $250,000.
Assistant U.S. Attorneys Franz M. Wright and Mary Clare Kane, who handled the case, stated that Fadhel is the owner of Queen City Transportation, Inc., which has been providing non-emergency Medicaid transportation rides since August 2018. Fadhel and several dozen other individuals drove Queen City beneficiaries to appointments, primarily at methadone clinics. Prior to operating Queen City, Fadhel was a driver for Great Lakes Transportation, another non-emergency Medicaid transportation company. Between August 6, 2018, and December 31, 2020, Fadhel submitted false and fraudulent attestation records to Medical Answering Service, a non-emergency Medicaid transportation management company. The attestation records included claims that rides were provided but never actually took place as well as billing group rides as if the rides had been separate, individual rides. The total loss amount to Medicaid was greater than $250,000.
The sentencing is the result of an investigation by Western New York Health Care Fraud Task Force, which includes Federal Bureau of Investigation, under the direction of Special Agent-in-Charge Matthew Miraglia, the New York State Department of Financial Services, under the direction of Superintendent Adrienne A. Harris, the New York State Police, under the direction of Major Amie Feroleto, and Health and Human Services, Office of Inspector General, under the direction of Special Agent-in-Charge Naomi Gruchacz.
# # # #