2023 Cryptocurrency Fraud Report Released

Source: US FBI

Losses related to cryptocurrency fraud totaled over $5.6 billion in 2023, a 45% increase in losses since 2022, according to a report from FBI’s Internet Crime Complaint Center (IC3) published on September 9, 2024. The number of complaints from the public regarding cryptocurrency fraud continues to steadily increase, reaching 69,000 in 2023.

Cryptocurrency is a type of digital currency that you can use to buy goods or services or to invest. Examples of cryptocurrencies include bitcoin, ether, or tether.

As the use of cryptocurrency in the global financial system continues to grow, criminals are increasingly using cryptocurrency due to its decentralized nature, the speed of irreversible transactions, and the ability to transfer value around the world. Using cryptocurrency also makes it harder for victims to recover stolen funds. Once an individual sends a payment, the recipient owns the cryptocurrency. Recipients often quickly transfer that digital currency into an account overseas for cashout purposes.

Criminals can exploit cryptocurrencies in many types of criminal schemes. In 2023, most cryptocurrency complaints involved investment scams. These losses totaled $3.9 billion and accounted for almost 71% of all losses related to cryptocurrency in 2023. Other examples of scams associated with cryptocurrency include tech support, confidence and romance, and government impersonation scams.   

Cryptocurrency investment fraud is the most common type of cryptocurrency scam. In this type of fraud, criminals use various means of manipulation to convince victims to deposit increasing amounts of money into financial “investments” using cryptocurrency. In truth, these investments are fake; criminal actors who are usually located overseas control—and ultimately steal—all victim money. As a result, victims typically lose everything they invested.

Losses from cryptocurrency-related investment fraud schemes reported to the IC3 rose from $2.57 billion in 2022 to $3.96 billion in 2023‚a 53% increase. Many individuals have accumulated massive debt to cover losses from these fraudulent investments.

Individuals aged 30-39 and 40-49 filed the most complaints related to cryptocurrency investment fraud (approximately 5,200 reports in each age group). But complainants over the age of 60 reported the highest losses (over $1.24 billion).

Learn more about the process behind cryptocurrency investment fraud. 

The FBI, along with the Department of Justice, law enforcement, regulatory agencies, and financial institution partners, is dedicated to identifying the perpetrators of these schemes and bringing them to justice.

The FBI’s IC3 is the central intake hub for individuals in the U.S. or abroad to report fraud and cybercrime. The IC3 analyzes complaints and aggregates them to identify trends and help develop strategies to combat these schemes and protect scam victims from loss. IC3 also shares the complaints it receives with FBI field offices, other law enforcement agencies, and regulatory entities for further investigation or action, as appropriate.

In February 2022, the FBI formed the Virtual Assets Unit (VAU), a specialized team dedicated to investigating cryptocurrency-related crimes. The VAU centralizes the FBI’s cryptocurrency expertise into one nerve center, providing technological equipment, blockchain analysis, virtual asset seizure training, and other sophisticated training for FBI personnel. 

If you believe you or someone you know may be a victim of cryptocurrency fraud, immediately submit a report to the IC3 via ic3.gov or contact your local FBI field office and provide as much transaction information as possible. We encourage you to submit a complaint through ic3.gov, even if a financial loss did not occur.

When submitting a report to ic3.gov, include as much as you can of the following information: 

  • Financial transaction details, including: 
    • Cryptocurrency wallet addresses 
    • The amounts and types of cryptocurrencies involved 
    • Date and time of the transactions, and transaction IDs (hash)
  • Information about how you met the scammer(s)
  • What platforms you used to communicate with the scammer(s)
  • Any website address(es) involved in the scheme
  • Any phone numbers or other identifiers you might have about the scammer(s)

You can refer to IC3’s public service announcement, “FBI Guidance for Cryptocurrency Scam Victims,” for more information about what to report.

Individuals aged 60 or older can also contact the National Elder Fraud Hotline (833-372-8311) to assist with filing an IC3 complaint. 

Highlighting Safety Measures to Protect Nation’s Food Infrastructure

Source: US FBI

“Wherever in the country you may live—from California to Nebraska to Georgia to points in between—the cyber risk and the national security risk for farms and ranches and our food processing facilities is growing exponentially,” said Gene Kowel, special agent in charge of the FBI’s Omaha Field Office, which partnered with the Nebraska Farm Bureau to host the August 12 symposium. “The threats are evolving. They’re becoming more complex and more severe.”

Examples shared during the daylong event included ransomware attacks that cripple operations, network hacks that take control of systems, and the theft of seeds worth millions of dollars in intellectual property and research.

Kowel said the FBI is monitoring four major threats to the nation’s agriculture sector, which—like water, power, and transportation—is considered part of the nation’s critical infrastructure. The threats include ransomware attacks, malicious software (malware) from foreign adversaries, theft of data and intellectual property, and bioterrorism.

Foreign actors—most notably the People’s Republic of China—are actively seeking ways to disrupt the United States’ agriculture industry, Kowel said. He urged farmers, cattle ranchers, and others to add cyber hygiene to their long list of chores. Cyber hygiene includes basic steps like using multi-factor authentication to access networks and backing up critical data.

“We all know that in agriculture today, almost all of our data is stored in the cloud,” Kowel said. “Almost all of our complex machinery is connected to the internet, connected to the cloud, so protecting that control and protecting that data is critical.”

Ensuring Safety at Sea

Source: US FBI

In addition to reporting the incident to a cruise ship security officer as soon as possible, you can also report the incident to the FBI directly. Knowing your rights can help you speak up if something happens.

For investigators, a big challenge is delayed reporting.

Pagliarini stressed the importance of immediate reporting by victims and witnesses, especially considering the complexities of investigating crimes at sea.

Delays often occur because victims feel ashamed or uncertain and may only report the incident after discussing it with others once they return home, said Pagliarini.

“We get that a lot, or somebody has something stolen, and they don’t know until they got home and then report it,” said Pagliarini. “This delay complicates investigations, especially when victims are far from the location of the incident.”

Parker and Pagliarini suggest passengers avoid taking valuable jewelry—as it’s easy to lose or have stolen—be responsible when drinking, and go directly through the cruise line company when booking excursions.

They also explained that it is important to familiarize yourself with the guest services locations on the ship. And if you see an incident, do your best to be a helpful witness.

Behind every cruise ship crime incident is a human story of victims seeking justice and families grappling with loss. The FBI’s Victim Services Division offers support to those affected by crimes at sea.

“It’s very common if we have a juvenile involved, we make our best efforts to notify Victim Services ahead of time, and often they’ll accompany myself or whoever’s going out initially on the investigation,” said Pagliarini. From counseling referrals to support navigating the criminal justice process, their efforts extend to both victims and their families.

Additionally, the FBI conducts specialized training for industry partners, enhancing their ability to assist law enforcement with securing and documenting a crime scene at sea.

“We try to hold trainings with the cruise industry personnel, kind of a best practice as far as evidence preservation,” said Parker.

The collaborative approach to security at sea, along with passengers understanding how to mitigate risk, is vital to ensuring the FBI can work with partners at every level to investigate crimes on the high seas and keep Americans safe.

Students Get Inside Look at Life as an FBI Agent

Source: US FBI

The course is a lively mix of presentations and practical exercises. FBI personnel—including linguists, technical experts, forensic accountants, intelligence analysts, special agents, and bomb technicians—answered questions about their jobs and how they arrived at the FBI.

In a mock scenario on the first day, a special agent explained how investigators assemble the building blocks of a case by looking at the available facts and evidence and then asking the right questions. Then students separated into “squads” and practiced.

On day two, students learned best practices for dusting for fingerprints, sketching crime scenes, and interviewing subjects—all while dutifully documenting everything. For many, the rigors of tracking every photo, statement, and piece of evidence was illuminating.

“It was really eye-opening,” said Ryan, an FAIT participant. “It’s been very jarring to see, like, just how methodical that process is for any kind of crime scene like this.”

Photo Gallery

Select image to view gallery

“There’s a lot more that goes into examining a crime scene than people realize,” added Hannah, another FAIT participant. “There were multiple different things we needed to include, like the case number, the item number, description, location, time.”

The Cleveland Division borrowed the idea for Future Agents in Training from the FBI’s Washington Field Office in 2015, seeing it as a way to connect with students in the communities it serves. FBI field offices rely on outreach efforts like FAIT, Citizens Academies, Junior Special Agents, college Honors Internships, and Teen and Youth Academies to help strengthen relationships with communities.

Meet the Cyber Action Team

Source: US FBI

Across the globe, malicious cyber activity threatens public safety and national and economic security. Criminals target organizations such as schools, hospitals, power and utility companies, and other critical infrastructure entities that serve communities.

As the lead federal agency for investigating cyberattacks and intrusions, the FBI developed a specialty group—the Cyber Action Team, or CAT—that can deploy across the globe within hours to respond to major cyber threats and attacks against these critical services.

Composed of about 65 members, CAT is an investigative rapid response fly team that leverages special agents, computer scientists, intelligence analysts, and information technology specialists from across FBI field offices and Headquarters.

“We respond onsite to victims who may include national government entities, private companies, or even sometimes foreign partner networks that have been compromised by an adversary,” said Scott Ledford, head of the Cyber Action Team and the Advanced Digital Forensics Team. “Our job is to help conduct the investigation—we collect digital evidence and locate, identify, and reverse engineer malware. We also help the victim understand when they were compromised and how, writing a timeline and a narrative of that intrusion with the ultimate goal of identifying who is responsible, attributing that attack.”

CAT was established in 2005 in response to an increase in the number and complexity of computer intrusion investigations in FBI field offices. At the time, not all field offices had personnel with the cyber expertise necessary to properly respond to and investigate sophisticated computer intrusions.

“There was this transition that was taking place between what investigations the FBI was responsible for and the types of crimes that we were starting to see,” explained Ledford. “Cyber was such a growing threat at the time, and so it became necessary that some field offices would reach out and say, ‘Hey, do you know of any cyber experts who can help me work through an investigation?”

As the team formalized its processes and expanded, in 2016, the Presidential Policy Directive 41, “United States Cyber Incident Coordination” was signed, setting forth principles for the federal government’s response to cyber incidents involving government or private sector entities. The FBI was appointed the lead federal agency for cyber threat response activities.

“From an investigative standpoint, the FBI is unique. We’re one of the few agencies in the U.S. government that has both law enforcement and counterintelligence authorities,” said Ledford. “And those authorities, and the American people’s trust in us, help us to deliver a unique blend of national security and criminal investigative skills, expertise, and resources to implement that blended response and help facilitate an investigation, regardless of whether it leads us overseas or to a courtroom here in the U.S.”

The bulk of CAT’s cases usually involve the FBI identifying an organization with a particular intrusion that’s either so complex or large-scale that the local field office requests additional assistance.

In one case, CAT deployed to a health care company that a separate intrusion investigation had identified as compromised. CAT’s response helped lead to the identification of several compromised systems and accounts on their network. While working alongside the company, CAT disrupted the threat—and prevented further exploitation across their network.

CAT also receives requests from FBI legal attachés, the State Department, the National Security Council, and the White House to assist other countries when they face cyberattacks.

“It could be a country that doesn’t have the resources or the expertise that the U.S. government has, and they’ve reached out and asked for help,” said Ledford. “There can be a NATO or a non-NATO ally country that says, ‘We’ve been hit hard by this adversary, and we don’t have the localized personnel, we don’t have the resources, we don’t have the expertise to respond to this. Can you help us with it?”

In another case, CAT deployed overseas to provide incident response support to a NATO ally that had been targeted by a destructive cyberattack. CAT responded and worked together with U.S. partners to determine the initial intrusion vector, identify other networks that were impacted, collect and analyze digital evidence, and ultimately attribute the intrusion to a foreign government. The NATO ally severed diplomatic ties with the foreign government, closed the foreign government’s in-country embassy, and evicted them from the country.

“We have some talented people, and they work hard every single day,” said Ledford. “It’s an honor to sit alongside them.”

Key Tactic: Strong Communication Skills

In addition to excellent technical skills, CAT members are closely vetted for strong communication skills. Ledford explained that part of the CAT applicant selection process entails a multi-day live technical exercise that’s designed and curated by CAT:

“We design a network environment. We may mimic an industry, for example, an electric utility. And then we compromise that environment, and we litter it with artifacts, digital evidence, and malware. Then we task applicants to investigate this cyber incident and present their findings.

At the end of the five days, applicants present their findings, and we identify who has the technical capability and expertise to find digital evidence of a crime hidden within this mountain of data that we’ve thrown at them.

If the applicant passes that phase of that selection exercise, we invite them to participate in a panel presentation. Our CAT members will play the roles of the victims we’re trying to help and their own resource teams, for example, a company CEO, a U.S. attorney, a third-party legal counsel, or IT administrator.

You’re essentially giving us the narrative of the cyber intrusion. You’re telling us a story about what happened. While some of the panel questions will be very technical in nature, some will be more basic questions—the applicant will need to be able to explain to a CEO, for example, who might not have technical expertise, what the problem was and how to fix it. We’re looking to see whether you can take something that’s exceptionally technically complex and explain it in such a way that everyone in the room understands it.

We’re also looking for interpersonal ability. For example, in the case of a company CEO, at that moment during a cyberattack, they may be going through one of the most stressful times of their company’s existence—there may be data leaked that can make or break that company’s future and their profits, as well as their ability to employ people and their ability to deliver services to their customers. You need the communications skills to interact with them during a difficult time and gain trust.”

Operation Clean House: New Orleans

Source: US FBI

Operation Clean House was implemented in two phases. 
 
Phase One focused on a proactive strategy. Law enforcement teams were deployed in every district of New Orleans, engaging in real-time, intelligence-driven actions. Uniformed and unmarked units from multiple agencies received live analytical support as they moved into targeted areas. 

Phase One resulted in 74 arrests; multiple dangerous drugs seized, including fentanyl, heroin, crack cocaine, and oxycodone; and 46 firearms and ammunition taken into evidence, including AK-47s, AR-15s, Glock switches, and multiple types of handguns.

“Each weapon and each bullet confiscated is potentially one less person potentially injured or killed,” said Myrthil. 

Phase Two focused on fugitive apprehension. During the planning phase, partner agencies submitted more than 400 outstanding arrest warrants for FBI intelligence analysts to review and determine whether to include as part of Operation Clean House. Analysts vetted warrants for consideration, checking to see which ones were still active, whether the subject was already incarcerated, or, in some cases, whether the subject was deceased. The analysts narrowed the list of warrants to 76 of the most violent offenses, including attempted murder, assault by drive-by shooting, and aggravated battery or aggravated assault. The warrants were then divided among multi-agency teams to make arrests. 

Phase Two resulted in 77 arrests, including 100% execution of all warrants, and the seizure of 11 firearms and additional ammunition. 

“We saw significant results immediately, including the arrest of a 31-year-old man from Pennsylvania on gun and drug charges who was also wanted in Vermont for first-degree murder,” said Myrthil. “At the time we arrested him, this suspected killer had two guns in his possession, including one with an extended magazine.”

The operation led to one suspect being taken into custody within minutes of a shooting near a New Orleans neighborhood where agents, officers, and troopers were already working. In another incident, state troopers and Homeland Security Investigation agents provided life-saving support to a subject who had shot himself in the leg while fleeing from law enforcement. 
 
Ultimately, Operation Clean House’s successful results came down to the integration between intelligence and operational components, which ensured a smooth flow of validated information, and partnerships between law enforcement and local communities. 

“The research and analysis conducted by the intelligence analysts were crucial to this operation and contributed to the likelihood of safe apprehensions,” said Myrthil. “The tremendous partnerships the FBI enjoys with external federal, state, and local law enforcement agencies were key to success. We are proud to also recognize the support of the New Orleans community and its active interest in combatting violent crime.”

Myrthil emphasized that though Operation Clean House has ended, the FBI and law enforcement will continue to fight violent crime in New Orleans and across Louisiana. 

“We will work tirelessly with our partners to keep Louisiana safe. We are here, we are listening, and we care.”

Hogan’s Alley Adds New Venues Reflecting Focus on Active Shooter Training

Source: US FBI

“We get multiple entities using the venues at the same time, and it creates opportunities to have more realistic training without stepping on each other,” said Fisher of the Tactical Training Unit.

Still, a casual observer driving through Hogan’s Alley (not open to the public) might not notice anything unusual, even as training is underway. All the buildings are specially designed for training, with a warren of hidden passages and corridors for instructors, observers, and would-be criminals to navigate. Walls, which can be easily moved, are made of material that can withstand live-fire exercises with simulated bullets. Even the upholstery for the movie theater seats was designed to withstand repeated tactical assaults.

“From the outside, you don’t realize the versatility that the space gives us,” said Assistant Director Maguire. “The addition of real-world-based tactical venues provides our agents yet another opportunity for learning the skills necessary to protect the community.”

The term Hogan’s Alley dates back to a 19th century comic strip set in a crime-ridden New York tenement called Hogan’s Alley. In the 1950s, the FBI developed a Hogan’s Alley range that was essentially a 120-foot-long façade where targets would pop up and agents had to quickly determine whether to shoot or not. While less sophisticated than today’s techniques, the premise was largely the same: to put trainees in high-stress situations to prepare them for what may come.

“The more realistic and lifelike we can make these training venues, the better prepared our students are when they encounter the real world,” Fisher said. “We have to introduce information-rich, lifelike environments very early. Everything builds on everything else. And in the environment that we’re working in and with the consequences of the job, we have to give people complexity pretty quick.”

FBI Marks 100 Years of Fingerprints and Criminal History Records

Source: US FBI

Director Wray joined past and present CJIS leaders, lawmakers, FBI staff, and dozens of retired fingerprint examiners at the July 10 event, which celebrated 100 years since the Bureau established its Identification Division on July 1, 1924. The new division consolidated 810,000 fingerprint files from the United States Penitentiary in Leavenworth, Kansas, and the National Bureau of Criminal Identification, which had been the keeper of crime data for the International Association of Chiefs of Police since 1896.

Wray described the history of fingerprint technology in investigations spanning a century.

“I’m proud that we’ve maintained that focus on growing our capabilities, because there’s simply no other way to remain as effective as a law enforcement and intelligence agency when the threats are as dynamic and evolving as they are today,” Wray said. He also highlighted the introduction of new biometric modalities—like facial recognition, palm prints, and iris scans—as innovations that will help the FBI and its partners better carry out their missions into the future. NGI’s National Iris Service, for example, allows users like police and prison staff to enroll iris images without physical contact, linking a subject’s irises to their respective fingerprint records. “You want to talk about the textbook illustration of innovation,” Wray said. 

To help mark the occasion, artifacts spanning the fingerprint repository’s century-long history were on display for visitors. Items included vintage fingerprint cards, magnifiers, and the colored pencils that fingerprint examiners have used for generations. And a gallery of images illustrated the progression of fingerprint technology—from taking impressions with ink rollers and paper cards to the digital mobile devices that many agencies use today.

FBI Helps Return Missing Musket to Museum of the American Revolution

Source: US FBI

Now, investigators had to determine what these items were and where they had been stolen from.  

Some of these answers came from Scott Corbett, AUSA Newton said. “He had a very good memory and could tell us where Michael had stolen some of the firearms,” she noted. 

The investigative team also traveled to Cody, Wyoming, to attend a national museum curator’s meeting to see if any experts could help identify these mystery items. 

“It turns out Michael stole these items from museums from Massachusetts to as far south as Mississippi,” Newton said. “A lot of them were stolen from Pennsylvania. We believe he was responsible for two of the thefts at Valley Forge. He was also responsible for a theft at the U.S. Army War College Museum in Carlisle, Pennsylvania. So, we were able to identify some of these firearms.” 

Based on the evidence at hand, AUSA Newton explained, “We couldn’t charge him with the thefts, but what we could charge him with was possession of stolen property that had been transported interstate because he’s in Delaware.”  

Michael Corbett was indicted and pleaded guilty. As part of his plea, he agreed to help recover some of the items that the investigators were initially looking for when they searched his Delaware residence.  

“Leads in the Corbett case took the FBI Art Crime Team as far west as San Francisco,” Archer added. 

Coincidentally, during the investigation, a concerned collector called Dr. Stephenson because he believed he might’ve accidentally purchased a stolen rifle. 

The collector initially purchased the gun from a man named Thomas Gavin, believing it to be a copy of a famous rifle built by Moravian gunsmith John Christian Oerter. But the more he researched, the more he suspected he had the genuine article. The collector turned the rifle over to the authorities. 

Thomas Gavin turned out to be “a significant museum thief” in his own right, having robbed items from the Valley Forge Park, the Philadelphia Museum of Art, the Academy of Natural Sciences of Drexel University, and additional museums in the greater Philadelphia area. “But he too cooperated and told us what he had stolen,” AUSA Newton said. 

“We had to then stop, solve that case in order to figure out who stole what from where, in order to then pick the Corbett case back up and bring it home,” Archer recalled of the Gavin section of the overall investigation. “So, it was staggeringly complex across space and time and material.” 

But just like in Corbett’s case, investigators are still searching for items that Gavin stole, including a rifle that was once owned by naturalist John James Audubon. 

Even though the investigators’ work is ongoing, the impact of the partnership and the recovery of the artifacts cannot be overstated. 

“With the 250th anniversary of the American Revolution coming up,” said James Taub, an associate curator at the museum, “the teamwork and partnership between local police and the FBI have given us in Philadelphia and the historical community at large a really strong opportunity to reach people in ways that we haven’t before, through objects that people of my generation haven’t seen and that previous generations might not have seen since before the 200th anniversary of the American Revolution.” 

Dr. Stephenson echoed that sentiment, noting that “for us, as educator- and preservation-oriented institutions, these objects are irreplaceable.” 

Stephenson says the museum’s work isn’t done. “It may be that the person who stole an object say 50 years ago may have passed away long ago. In many cases, families may have things that they don’t realize where they came from, how they came into that collection, or things that were sold and passed around.”  

For this reason, he said, the museum is reexamining how it describes the missing objects, to highlight any valuable details that might spark someone’s memory. The museum is also spreading the word about the stolen items to antique enthusiasts and collectors. 

“The fact is, the vast majority of people want to do the right thing,” he said. 

But the FBI stands ready to investigate anyone who knowingly holds onto looted artifacts. 

“Ultimately,” said Special Agent Archer, “people who know that they are in possession of these stolen items and do the wrong thing, we certainly are prepared to investigate.” 

Former Military Contractor Pleads Guilty for Deleting Text Messages in Antitrust Division Investigation

Source: US FBI

Today, a Federal Judge accepted a guilty plea to destruction of records in a federal investigation from a former employee of a contractor that provided operation and maintenance services to the U.S. Army Corps of Engineers for U.S. military installations in South Korea.

According to the information filed in the Western District of Texas, in or about July 2021, David Cruz, 37, deleted text messages with Hyuk Jin Kwon and Hyun Ki Shin. Kwon and Shin were separately charged ‌for fraud and conspiring to rig bids and fix prices on millions of dollars in maintenance and repair subcontracting work provided to the U.S. Army Corps of Engineers in South Korea and remain fugitives. At Kwon’s suggestion, Cruz deleted text messages after receiving a litigation hold notice from his employer requiring him not to destroy or delete communications. Cruz then covered up the deletion of those text messages after being specifically advised by his employer that there was an ongoing federal investigation.

In the deleted text messages, Cruz discussed with Kwon and Shin the need to get additional bids from their competitor to satisfy the U.S. Army Corps of Engineer’s competitive bidding requirements for subcontract work. Kwon had previously told Cruz that Cruz should contact him instead of requesting bids directly from Kwon’s competitors.

“The Procurement Collusion Strike Force’s commitment to safeguard taxpayer dollars from collusion and fraud is unwavering,” said Director Daniel Glad of the Justice Department’s Procurement Collusion Strike Force (PCSF). “The Antitrust Division will not hesitate to prosecute individuals who unlawfully impede our investigations by destroying or covering up evidence.”

“Bid rigging and other acts of fraud against the U.S. Army not only undermine the integrity of critical procurement efforts but also put our Soldiers at risk by providing them capabilities and services which do not meet the high standards necessary to maintain peak lethality,” said Special Agent in Charge Michael DeFamio of the Department of the Army Criminal Investigation Division (Army CID), Far East Field Office. “Army CID is grateful for the collaborative efforts of our federal partners at the FBI and the Department of Justice, and we will continue to identify, investigate, and hold accountable those who attempts to defraud the U.S. Government, regardless of where they are in the world.”

“The Department of Defense Office of Inspector General’s Defense Criminal Investigative Service (DCIS) is steadfast in its mission to protect taxpayer funds from fraud and collusion,” said Special Agent in Charge Stanley Newell of DCIS’ Transnational Field Office. “We are equally committed to relentlessly pursuing those who attempt to obstruct our investigations through the destruction or concealment of evidence.”

“Mr. Cruz knowingly destroyed records that were part of an ongoing criminal investigation and has now acknowledged his crime” said Assistant Director in Charge Akil Davis of the FBI Los Angeles Field Office. “The FBI is committed to holding accountable military contractors who flout the bidding process and intentionally destroy evidence of their guilt.”

Destruction of records in a federal investigation carries a maximum penalty of 20 years in prison and a $250,000 fine. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other relevant factors.

The Antitrust Division’s Washington Criminal Section, Army CID, DCIS, and the FBI investigated the case.

Assistant Chief Daniel E. Lipton and Trial Attorney Daniel P. Chung of the Antitrust Division prosecuted the case with assistance from Assistant U.S. Attorney Matthew B. Devlin for the Western District of Texas.

In November 2019, the Justice Department created the PCSF, a joint law enforcement effort to combat antitrust crimes and related fraudulent schemes that impact government procurement, grant and program funding at all levels of government — federal, state and local. To learn more about the PCSF, or to report information on bid rigging, price fixing, market allocation and other anticompetitive conduct related to government spending, go to www.justice.gov/procurement-collusion-strike-force. Anyone with information in connection with this investigation can contact the PCSF at the link listed above.