Norwich Man Sentenced for Unlawfully Possessing a Short-Barreled Rifle

Source: US FBI

SYRACUSE, NEW YORK – Benjamin Wheeler, age 20, of Norwich, New York was sentenced today to serve 8 months in federal prison for possessing an unregistered short-barreled rifle, announced United States Attorney Carla B. Freedman, Craig. L. Tremaroli, Special Agent in Charge of the Albany Field Office of the Federal Bureau of Investigation (FBI), and Bryan Miller, Special Agent in Charge of the New York Field Division of the Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF).

As part of his guilty plea, Wheeler admitted that on August 6, 2024, he knowingly possessed a Spikes Tactical AR-15 style rifle at his apartment in Norwich, New York, knowing that the firearm had a barrel length of less than sixteen inches. The firearm was not registered to Wheeler in the National Firearms Registration and Transfer Record.

Senior United States District Judge David N. Hurd also sentenced Wheeler to a 3-year term of supervised release, to begin after his imprisonment.

The case was investigated by the FBI’s Joint Terrorism Task Force, the United States Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF), New York Police Department (NYPD) and the New York State Police with assistance from the Chenango County Sheriff’s Department.  Assistant U.S. Attorney Geoffrey J. L. Brown prosecuted the case.

Church Rock Man Faces Federal Charges for Shooting Two Navajo-Nation Members

Source: US FBI

ALBUQUERQUE – An 18-year-old Gallup man is facing federal charges following a shooting that left one Navajo-Nation member dead and another seriously injured.

According to court records, in the early morning hours of April 6, 2025, a shooting occurred at a Church Rock, New Mexico residence. A resident of the home awoke to gunshots and, along with a second resident, entered 16-year-old Jane Doe’s bedroom, where the residents discovered 18-year-old John Doe deceased on the floor, Jane Doe suffering from multiple gunshot wounds, and the suspect, Mario Israel Barraza.

Barraza—identified by both residents as Jane Doe’s former boyfriend—fled the scene immediately after the shooting. Investigators found evidence of forced entry through Jane Doe’s bedroom window, shell casings inside and outside the bedroom, and spent rounds resembling a bullet later extracted from Jane Doe during surgery. Security footage corroborated witness accounts of Barraza fleeing the scene, while Jane Doe confirmed she heard Barraza and John Doe arguing prior to the shooting and that he had a history of entering her bedroom through her window.

Jane and John Doe are enrolled members of the Navajo Nation. Barraza is not an enrolled member of any federally recognized Tribe.

Barraza stands charged with murder and assault with a dangerous weapon. He will remain in custody pending trial, which has not been set. If convicted of the current charges, Barraza faces up to life in prison.

Acting U.S. Attorney Holland S. Kastrin and Raul Bujanda, Special Agent in Charge of the Federal Bureau of Investigation’s Albuquerque Field Office, made the announcement today.

The Gallup Resident Agency of the Federal Bureau of Investigation’s Albuquerque Field Office investigated this case with assistance from the Ramah-Navajo Police Department. Assistant U.S. Attorney Zachary C. Jones is prosecuting the case.

A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

Shiprock Man Guilty of Assault in Stabbing Case

Source: US FBI

ALBUQUERQUE – A Shiprock man pleaded guilty as charged in his federal indictment for assault with a dangerous weapon because he intentionally stabbed his ex-girlfriend and struck her with his vehicle during a violent altercation.

According to court records, on November 2, 2024, Jane Doe, and her sister were stopped at a road construction zone when her ex-boyfriend, Tyrell Lee Johnson, 29, an enrolled member of the Navajo Nation, approached their vehicle. Johnson physically attacked Jane Doe, striking her head, stabbing her abdomen with a knife, and striking her with his vehicle as he fled the scene. Jane Doe sustained injuries, including an abdominal wound, bruises, abrasions, and a concussion.

Navajo Police located Johnson’s vehicle in Cudei, New Mexico, identified by its damaged front bumper, and apprehended him after a brief pursuit. Officers recovered a black folding knife from Johnson’s possession and confirmed he had no alcohol in his system during processing.

At sentencing, Johnson faces up to 10 years in prison followed by three years of supervised release.

Acting U.S. Attorney Holland S. Kastrin and Raul Bujanda, Special Agent in Charge of the FBI Albuquerque Field Office, made the announcement today.

The Farmington Resident Agency of the FBI’s Albuquerque Field Office investigated this case with assistance from the Navajo Nation Department of Investigation and Department of Criminal Investigations. Assistant United States Attorney Mark A. Probasco is prosecuting the case.

Former UNM Football Player Convicted of Methamphetamine Trafficking in Cibola County Correctional Center

Source: US FBI

ALBUQUERQUE – A federal jury convicted a former University of New Mexico football player on charges of conspiracy and possession with intent to distribute methamphetamine while incarcerated at Cibola County Correctional Center. The verdict came after a five-day trial and approximately three-and-a-half hours of deliberation.

According to court documents and evidence presented at trial, while in custody awaiting trial for the 2022-armed robbery of a U.S. Postal Service employee, Rayshawn Boyce, 29, was implicated in a separate case involving drug trafficking within the Cibola County Correctional Center (CCCC). On May 17, 2022, CCCC personnel conducted a search of a unit and discovered a bag containing approximately one pound of methamphetamine in the shower area.

Photo of drugs in shower area

Review of surveillance footage revealed that on the evening of May 16, 2022, Correctional Officer Gabriella Torres smuggled a bundle of methamphetamine into the facility under her hoodie and dropped it in cell in an area that was not covered by a camera for Boyce to retrieve. A short time later, Boyce retrieved the bundle, concealed it in a blanket, and walked back to his cell. When he learned that the jail was being searched the next day, Boyce moved the bundle from his cell in the middle of the night, submerged it in water, and left it near the showers, where it was found that morning by CCCC personnel.

Federal investigators determined that Boyce and Torres were in a romantic relationship, during which Boyce persuaded Torres to smuggle drugs into the CCCC. On two separate occasions, Torres successfully smuggled marijuana into the facility for Boyce to distribute. Boyce instructed buyers to send payments through a CashApp account he had Torres established specifically for these transactions. On May 16, 2022, Boyce coordinated the delivery of a methamphetamine shipment to Torres for smuggling into CCCC.

Torres pled guilty to one count of conspiracy and remains on conditions of release pending sentencing, which is not currently scheduled. At sentencing, Torres could face 10 years to life in prison followed by three years of supervised release.

Following the verdict, the Court ordered that Boyce remain in custody pending sentencing, which has not been scheduled. At sentencing, Boyce faces a mandatory minimum term of ten years of imprisonment and up to life.

In April 2024, a federal jury convicted Boyce of robbing a postal carrier, stealing an arrow key belonging to the United States Postal Service, and being a prohibited person in possession of a firearm. At sentencing for this prior conviction, Boyce faces up to ten years in prison followed by three years of supervised release.

There is no parole in the federal system.

Acting U.S. Attorney Holland S. Kastrin and Raul Bujanda, Special Agent in Charge of the FBI Albuquerque Field Office, made the announcement today.

The FBI Albuquerque Field Office investigated this case with assistance from Cibola County Correctional Center and CoreCivic. Assistant United States Attorneys Letitia Carroll Simms and Joseph M. Spindle are prosecuting the case.

Albuquerque Man Sentenced for Sexual Exploitation of Minor and Child Pornography Production

Source: US FBI

ALBUQUERQUE – An Albuquerque man was sentenced to 25 years in prison for sexually exploiting a 13-year-old girl and producing child pornography.

There is no parole in the federal system.

According to court records, Kevin Vallo, 41, was on supervised released after serving a sentence for first degree murder when he used the social media app, Telegram, to communicate with Jane Doe, a 13-year-old girl, while falsely claiming to be 16 years old. On February 19, 2024, Vallo persuaded Jane Doe and two other minors to visit his Albuquerque apartment where he engaged in sexual acts with Jane Doe and another minor. Vallo also recorded explicit videos of him engaging in sexual acts with Jane Doe. Vallo later sent the explicit videos to Jane Doe via Telegram.

The investigation began when one of the other minors disclosed the abuse during a medical appointment. Law enforcement identified Vallo through witness accounts and executed a search warrant on May 9, 2024, recovering multiple videos of Vallo engaging in sexual acts with Jane Doe from Vallo‘s phone. During a subsequent interview, Vallo admitted to the sexual encounters and to recording the acts.

Vallo was sentenced to an additional 30 months in prison for violating his supervision terms related to the murder charge, for a total of 27 and a half years. Upon his release, Vallo will be subject to a 15-year term of supervised release and must register as a sex offender.

Acting U.S. Attorney Holland S. Kastrin and Raul Bujanda, Special Agent in Charge of the FBI Albuquerque Field Office, made the announcement today.

The FBI Albuquerque Field Office investigated this case with assistance from the Bernalillo County Sheriff’s Office. Assistant United States Attorney Jesse Pecoraro is prosecuting the case as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit Justice.gov/PSC.

Convicted Felon Pleads Guilty to Federal Charges in Shooting Incident

Source: US FBI

ALBUQUERQUE – A Zuni man pleaded guilty to federal charges stemming from a violent shooting incident involving the illegal use of a firearm.

According to court records, on the night of September 19, 2024, Devin Wade Wyaco shot John Doe (who was riding a bicycle) from the passenger side of his girlfriend’s vehicle, striking John Doe in the abdomen. Doe was transported to Zuni Hospital and later to the University of New Mexico Hospital for treatment. During an interview with investigators, John Doe identified the vehicle as belonging to Wyaco’s girlfriend. Doe survived the shooting.

Police identified Wyaco, 34, an enrolled member of the Zuni Pueblo, as the shooter through statements from his girlfriend, who admitted being present during the incident and confirmed Wyaco’s involvement. A federal search warrant executed at her residence corroborated her account. In his plea agreement, Wyaco confessed that he fired at John Doe after becoming angry when one of the bicyclists threw a rock at the car. He also admitted that as a previously convicted felon—having prior convictions for possession of cocaine with intent to distribute and aggravated fleeing from a law-enforcement officer—he knowingly possessed a firearm and ammunition in violation of federal law.

Handgun recovered from Wyaco’s girlfriend’s home.

Wyaco pled guilty to all three charges contained in the indictment, including assault with a dangerous weapon, using and carrying a firearm during and in relation to a crime of violence, and being a felon in possession of a firearm.

At sentencing, Wyaco faces no less than 10 years and up to life in prison followed by up to five years of supervised release. Additionally, Wyaco faces up to $250,000 in fines.

Acting U.S. Attorney Holland S. Kastrin and Raul Bujanda, Special Agent in Charge of the FBI Albuquerque Field Office, made the announcement today.

The Gallup Resident Agency of the FBI’s Albuquerque Field Office investigated this case with assistance from the Zuni Police Department. Assistant United States Attorney Zachary C. Jones is prosecuting the case.

Dual Russian and Israeli National Extradited to the United States for His Role in the LockBit Ransomware Conspiracy

Source: US FBI

NEWARK, N.J. – A dual Russian and Israeli national was extradited to the United States on charges that he was a developer of the LockBit ransomware group, United States Attorney John Giordano announced.

In August, Rostislav Panev, 51, was arrested in Israel pursuant to a U.S. provisional arrest request.  Today, Panev was extradited to the United States and had an initial appearance before U.S. Magistrate Judge André M. Espinosa where Panev was detained pending trial.

“Rostislav Panev’s extradition to the District of New Jersey makes it clear: if you are a member of the LockBit ransomware conspiracy, the United States will find you and bring you to justice,” said United States Attorney John Giordano. “Even as the means and methods of cybercriminals become more sophisticated, my Office and our FBI, Criminal Division, and international law enforcement partners are more committed than ever to prosecuting these criminals.”

“No one is safe from ransomware attacks, from individuals to institutions. Along with our international partners, the FBI continues to leave no stone unturned when it comes to following LockBit’s trail of destruction. We will continue to work tirelessly to prevent actors, such as Panev, from hacking their way to financial gain,” said Acting Special Agent in Charge of the FBI Newark Division Terence G. Reilly.

According to the superseding complaint, documents filed in this and related cases, and statements made in court, Panev acted as a developer of the LockBit ransomware group from its inception in or around 2019 through at least February 2024. During that time, Panev and his LockBit coconspirators grew LockBit into what was, at times, the most active and destructive ransomware group in the world. The LockBit group attacked more than 2,500 victims in at least 120 countries around the world, including 1,800 in the United States. Their victims ranged from individuals and small businesses to multinational corporations, including hospitals, schools, nonprofit organizations, critical infrastructure, and government and law-enforcement agencies. LockBit’s members extracted at least $500 million in ransom payments from their victims and caused billions of dollars in other losses, including lost revenue and costs from incident response and recovery.

LockBit’s members were comprised of “developers,” like Panev, who designed the LockBit malware code and maintained the infrastructure on which LockBit operated. LockBit’s other members, called “affiliates,” carried out LockBit attacks and extorted ransom payments from LockBit victims. LockBit’s developers and affiliates would then split the ransom payments which were extorted from victims.

As alleged in the superseding complaint, at the time of Panev’s arrest in Israel in August, law enforcement discovered on Panev’s computer administrator credentials for an online repository that was hosted on the dark web and stored source code for multiple versions of the LockBit builder, which allowed LockBit’s affiliates to generate custom builds of the LockBit ransomware malware for particular victims. On that repository, law enforcement also discovered source code for LockBit’s StealBit tool, which helped LockBit affiliates exfiltrate data stolen through LockBit attacks. Law enforcement also discovered access credentials for the LockBit control panel, an online dashboard maintained by LockBit developers for LockBit’s affiliates and hosted by those developers on the dark web.

The superseding complaint also alleges that Panev exchanged direct messages through a cybercriminal forum with LockBit’s primary administrator, who, in an indictment unsealed in the District of New Jersey in May, the United States alleged to be Dimitry Yuryevich Khoroshev (Дмитрий Юрьевич Хорошев), also known as LockBitSupp, LockBit, and putinkrab. In those messages, Panev and the LockBit primary administrator discussed work that needed to be done on the LockBit builder and control panel.

Court documents further indicate that, between June 2022 and February 2024, the primary LockBit administrator made a series of transfers of cryptocurrency, laundered through one or more illicit cryptocurrency mixing services, of approximately $10,000 per month to a cryptocurrency wallet owned by Panev. Those transfers amounted to over $230,000 during that period.

In interviews with Israeli authorities following his arrest in August, Panev admitted to having performed coding, development, and consulting work for the LockBit group and to having received regular payments in cryptocurrency for that work, consistent with the transfers identified by U.S. authorities. Among the work that Panev admitted to having completed for the LockBit group was the development of code to disable antivirus software; to deploy malware to multiple computers connected to a victim network; and to print the LockBit ransom note to all printers connected to a victim network. Panev also admitted to having written and maintained LockBit malware code and to having provided technical guidance to the LockBit group.

The LockBit Investigation

The superseding complaint against, and apprehension of, Panev follows a disruption of LockBit ransomware in February 2024 by the U.K. National Crime Agency (NCA)’s Cyber Division, which worked in cooperation with the Justice Department, FBI, and other international law enforcement partners. As previously announced by the Department, authorities disrupted LockBit by seizing numerous public-facing websites used by LockBit to connect to the organization’s infrastructure and by seizing control of servers used by LockBit administrators, thereby disrupting the ability of LockBit actors to attack and encrypt networks and extort victims by threatening to publish stolen data. That disruption succeeded in greatly diminishing LockBit’s reputation and its ability to attack further victims, as alleged by documents filed in this case.

The superseding complaint against Panev also follows charges brought in the District of New Jersey against other LockBit members, including its alleged primary creator, developer, and administrator, Dmitry Yuryevich Khoroshev. An indictment against Khoroshev unsealed in May alleges that Khoroshev began developing LockBit as early as September 2019, continued acting as the group’s administrator through 2024, a role in which Khoroshev recruited new affiliate members, spoke for the group publicly under the alias “LockBitSupp,” and developed and maintained the infrastructure used by affiliates to deploy LockBit attacks. Khoroshev is currently the subject of a reward of up to $10 million through the U.S. Department of State’s Transnational Organized Crime (TOC) Rewards Program, with information accepted through the FBI tip website at www.tips.fbi.gov/.

A total of seven LockBit members have now been charged in the District of New Jersey. Beyond Panev and Khoroshev, other previously charged LockBit defendants include:

  • In July, two LockBit affiliate members, Mikhail Vasiliev, also known as Ghostrider, Free, Digitalocean90, Digitalocean99, Digitalwaters99, and Newwave110, and Ruslan Astamirov, also known as BETTERPAY, offtitan, and Eastfarmer, pleaded guilty in the District of New Jersey for their participation in the LockBit ransomware group and admitted deploying multiple LockBit attacks against U.S. and foreign victims. Vasiliev and Astamirov are presently in custody awaiting sentencing.
  • In February 2024, in parallel with the disruption operation described above, an indictment was unsealed in the District of New Jersey charging Russian nationals Artur Sungatov and Ivan Kondratyev, also known as Bassterlord, with deploying LockBit against numerous victims throughout the United States, including businesses nationwide in the manufacturing and other industries, as well as victims around the world in the semiconductor and other industries. Sungatov and Kondratyev remain at large.
  • In May 2023, two indictments were unsealed in Washington, D.C., and the District of New Jersey charging Mikhail Matveev, also known as Wazawaka, m1x, Boriselcin, and Uhodiransomwar, with using different ransomware variants, including LockBit, to attack numerous victims throughout the United States, including the Washington, D.C., Metropolitan Police Department. Matveev remains at large and is currently the subject of a reward of up to $10 million through the U.S. Department of State’s TOC Rewards Program, with information accepted through the FBI tip website at www.tips.fbi.gov/.

The U.S. Department of State’s Transnational Organized Crime (TOC) Rewards Program is offering rewards of:

Information is accepted through the FBI tip website at tips.fbi.gov.

Khoroshev, Matveev, Sungatov, and Kondratyev have also been designated for sanctions by the Department of the Treasury’s Office of Foreign Assets Control for their roles in launching cyberattacks.

Victim Assistance

LockBit victims are encouraged to contact the FBI and submit information at www.ic3.gov. As announced by the Department in February, law enforcement, through its disruption efforts, has developed decryption capabilities that may enable hundreds of victims around the world to restore systems encrypted using the LockBit ransomware variant. Submitting information at the IC3 site will enable law enforcement to determine whether affected systems can be successfully decrypted.

LockBit victims are also encouraged to visit www.justice.gov/usao-nj/lockbit for case updates and information regarding their rights under U.S. law, including the right to submit victim impact statements and request restitution, in the criminal litigation against Panev, Astamirov, and Vasiliev.

The FBI Newark Field Office, under the supervision of Acting Special Agent in Charge Terence G. Reilly, is investigating the LockBit ransomware variant. Israel’s Office of the State Attorney, Department of International Affairs, and Israel National Police; France’s Gendarmerie Nationale Cyberspace Command, Paris Prosecution Office — Cyber Division, and judicial authorities at the Tribunal Judiciare of Paris; Europol; Eurojust; the United Kingdom’s National Crime Agency; Germany’s Landeskriminalamt Schleswig-Holstein, Bundeskriminalamt, and the Central Cybercrime Department North Rhine-Westphalia; Switzerland’s Federal Office of Justice, Public Prosecutor’s Office of the Canton of Zurich, and Zurich Cantonal Police; Spain’s Policia Nacional and Guardia Civil; authorities in Japan; Australian Federal Police; Sweden’s Polismyndighetens; Canada’s Royal Canadian Mounted Police; Politie Dienst Regionale Recherche Oost-Brabant of the Netherlands; and Finland’s National Bureau of Investigation have provided significant assistance and coordination in these matters and in the LockBit investigation generally.

Assistant U.S. Attorneys Andrew M. Trombly, David E. Malagold, and Vinay Limbachia for the District of New Jersey and Trial Attorneys Debra Ireland and Jorge Gonzalez of the Criminal Division’s Computer Crime and Intellectual Property Section (CCIPS) are prosecuting the charges against Panev and the other previously charged LockBit defendants in the District of New Jersey.

The Justice Department’s former Cybercrime Liaison Prosecutor to Eurojust, Office of International Affairs, and National Security Division also provided significant assistance.

Additional details on protecting networks against LockBit ransomware are available at StopRansomware.gov. These include Cybersecurity and Infrastructure Security Agency Advisories AA23-325A, AA23-165A, and AA23-075A. 

The charges and allegations contained in the superseding complaint and above-named Indictments are merely accusations, and the defendants are presumed innocent unless and until proven guilty.

###

Defense counsel: Frank Arleo, Esq.

Owner of Marketing Companies and DME Company Convicted for Role in $100 Million Scheme to Defraud Medicare and Other Insurers and to Violate the Anti-Kickback Statute

Source: US FBI

NEWARK, N.J.  A Florida man was convicted by a federal jury for his role in a durable medical equipment (DME) kickback scheme that caused millions of dollars in losses to Medicare and other insurance providers, United States Attorney John Giordano announced.

Following a month-long jury trial before U.S. District Judge Michael E. Farbiarz, Raheel Naviwala, 36, of Coral Springs, Florida, was convicted on Feb. 28, 2025, of conspiracy to commit health care fraud and wire fraud, one count of health care fraud, conspiracy to violate the Anti-Kickback Statute, and three counts of violating the Anti-Kickback Statute. He was also acquitted of two counts of health care fraud.

“This Office is committed to prosecuting those like the defendant who seek to profit by defrauding and corrupting our nation’s medical systems,” United States Attorney John Giordano said. “When people siphon millions from Medicare to line their own pockets, regular citizens pay the price. This case demonstrates that serious consequences will follow for such conduct.”

“The scheme Naviwala and his co-conspirators created to steal money from the government was complex and expansive,” FBI Acting Special Agent in Charge Terence G. Reilly said. “However, FBI Newark and our law enforcement partners have the expertise and grit to dig through mountains of data and find the fraudsters. We want this case to serve as a warning to anyone hoping to capitalize on hiding under the red tape – we are still here, and you will eventually get caught.”

“The defendant convicted in this case prioritized greed over the provision of appropriate health care services to patients, bilking the federal government for medically unnecessary durable medical equipment,” stated Special Agent in Charge Naomi Gruchacz with the U.S. Department of Health and Human Services Office of Inspector General (HHS-OIG). “HHS-OIG will continue to work with our law enforcement partners to ensure the integrity of the federal health care system and hold accountable owners and providers engaging in fraud that targets its programs.”

“Investigating corrupt schemes that undermine the integrity of TRICARE, the healthcare system for military members and their families, is a top priority for the Department of Defense Office of Inspector General’s Defense Criminal Investigative Service (DCIS),” stated Special Agent in Charge Patrick J. Hegarty, DCIS Northeast Field Office. “Mr. Naviwala’s illegal schemes put the TRICARE program and its beneficiaries at risk. We are committed to working with our partner agencies and the Department of Justice to pursue those individuals who selfishly place personal gain over the safety and care of TRICARE beneficiaries.”

“Schemes such as these compromise the integrity of VA’s programs and services and divert funds from our nation’s deserving veterans,” said Special Agent in Charge Christopher F. Algieri with the Department of Veterans Affairs Office of Inspector General’s Northeast Field Office. “The VA OIG will continue to work with our law enforcement partners to root out fraudsters and hold them accountable.”

According to the evidence at trial:

Naviwala and his coconspirators purchased lists of Medicare patients’ names, addresses, and phone numbers, and hired telemarketers to convince the patients to get DME (orthotic braces). These telemarketers pre-filled prescriptions and picked the highest-paying braces to bill to insurers. Naviwala then paid telemedicine doctors to sign the pre-filled prescriptions for braces, regardless of whether the patients needed or wanted braces. Generally, the telemedicine doctor did not even speak to the patients before signing the pre-filled prescriptions.

Naviwala then sold the signed prescriptions to DME supply companies that could bill Medicare, TRICARE, and other insurers for the braces. To conceal the fraud, Naviwala and his coconspirators signed sham contracts and used sham invoices that falsely represented that Naviwala was billing DME supply companies for marketing or consulting.

Naviwala also owned and operated a DME supply company that was used to bill Medicare, and which submitted claims to Medicare for up to nine braces for a single patient.

To further conceal his illegal conduct, Naviwala put multiple of his businesses in the names of nominee owners. The nominee owners generally performed no legitimate work for any company and were paid to hide Naviwala’s involvement.

Medicare and other insurers paid hundreds of millions of dollars to members of the conspiracy and paid at least approximately $100 million for DME associated with Naviwala’s companies. Naviwala personally pocketed more than $10 million in fraud proceeds.

Conspiracy to commit health care fraud and wire fraud is punishable by a maximum potential penalty of 20 years in prison. Health care fraud is punishable by a maximum potential penalty of 10 years in prison. Conspiracy to violate the federal Anti-Kickback Statute is punishable by a maximum potential penalty of five years in prison. Each count of illegal kickbacks is punishable by a maximum potential penalty of 10 years in prison. Each count is also punishable by a fine. Sentencing is scheduled for 10 a.m. on July 29, 2025, before Judge Farbiarz in Newark.

United States Attorney John Giordano credited special agents of the FBI, under the direction of Acting Special Agent in Charge Terence G. Reilly in Newark; HHS-OIG, under the direction of Special Agent in Charge Naomi Gruchacz; DCIS, under the direction of Special Agent in Charge Patrick J. Hegarty; and the U.S. Department of Veterans Affairs Office of Inspector General, under the direction of Special Agent in Charge Christopher F. Algieri with the investigation leading to the conviction.

The government is represented by Assistant U.S. Attorneys Elaine K. Lou, Deputy Chief of the Criminal Division, Matthew Specht of the Special Prosecutions Division, and Aaron L. Webman of the Economic Crimes Unit in Newark.

                                                           ###

Defense counsel:

Jamie Hoxie Solano, Esq. New York, New York

Amy C. Brown, Esq. New York, New York

Bryan W. McCracken, Esq. New York, New York

Ifedapo Benjamin, Esq. New York, New York

FBI Newark Searching for Fugitive in Stabbing Death

Source: US FBI

FBI Newark, Pennsylvania State Police Fugitive Unit, Stroud Regional Police Department, and the U.S. Marshals Service are asking for the public’s help finding Ricky ‘Angel’ Vargas (36), who was charged in federal court with unlawful flight to avoid prosecution after being indicted in Bergen County on first degree murder charges. FBI Newark is offering a reward of up to $15,000 for information leading to his arrest.

Detectives with the Bergen County Prosecutor’s Office say Vargas stabbed a man on February 4, 2024, at the JoJo’s Bar and Grill in Garfield, NJ. They say Vargas, a member of the Latin Kings gang, stabbed Richard Franceschi, who later died from his injuries.

Vargas’ last known residence was in East Stroudsburg, Pennsylvania. He also has connections to Chicago, Illinois, and Winter Park, Florida. He does not have a valid driver’s license and is known to use ride share apps and mass transit to get around. He is around 5’5, 200lbs, with numerous tattoos on his arms and hands. He typically has facial hair and wears glasses. 

Vargas is considered armed and dangerous. Anyone with information regarding his whereabouts is asked to call the FBI at 1-800-CALL-FBI, the FBI Newark Field Office at 973-792-3000, or submit a tip online at tips.fbi.gov. They could receive a reward of up to $15,000 for information leading to his arrest.

New Jersey Man Admits to Concealing Material Support and Resources to ISIS

Source: US FBI

Kyse S. Abushanab, 27, of Budd Lake, New Jersey, pleaded guilty today to a one-count information charging him with concealing material support and resources to a designated foreign terrorist organization.

According to court documents, between in or around March 2021 and in or around January 2022, Abushanab compiled resources, including information pertaining to the manufacture and use of weapons of mass destruction, with the aim of providing members of the Islamic State of Iraq and Syria (ISIS or the Islamic State), a designated foreign terrorist organization, and its supporters with a repository of information and resources to help carry out ISIS’s mission. This material included, among other things, videos and documents showing step-by-step instructions on how to make suicide belts or vests, detonators and timers, improvised bombs, and other explosives and incendiary devices. In an effort to evade detection by law enforcement, Abushanab took steps to conceal his efforts to assist ISIS by, among other things, using encrypted applications, untraceable email accounts, and a secured cloud storage space to gather and store information on how to make a variety of weapons of mass destruction.

The charge of concealment of provision of material support carries a maximum penalty of 10 years in prison and a fine of up to $250,000. Sentencing is scheduled for Sept. 24.

Sue Bai, head of the Justice Department’s National Security Division; Acting U.S. Attorney Vikas Khanna for the District of New Jersey; Assistant Director David J. Scott of the FBI’s Counterterrorism Division; and Acting Special Agent in Charge Terence G. Reilly of the FBI Newark Field Office made the announcement.

The FBI is investigating the case, with valuable assistance provided by the Morris County Sheriff’s Office.

Assistant U.S. Attorney Sammi Malek for the District of New Jersey and Trial Attorney Ryan White of the National Security Division’s Counterterrorism Section are prosecuting the case.