Somerset County Man Admits Federal Hate Crime in Connection with Breaking Into Center for Islamic Life at Rutgers University and Destroying Property

Source: US FBI

Video Statement:

https://youtu.be/eBEn8v-pD10

NEWARK, N.J. – A Somerset County, New Jersey, man admitted committing a federal hate crime for breaking into the Center for Islamic Life (CILRU) at Rutgers University in New Brunswick and destroying property, U.S. Attorney Philip R. Sellinger for the District of New Jersey, Assistant Attorney General Kristen Clarke of the Justice Department’s Civil Rights Division, and New Jersey State Attorney General Matthew J. Platkin announced today.

Jacob Beacher, 24, of North Plainfield, New Jersey, pleaded guilty before U.S. District Judge Robert Kirsch in Trenton federal court on Oct. 9, 2024, to an information charging him with damage to religious property.

“The free exercise of religion is a fundamental right of all Americans. Jacob Beacher admitted he intentionally broke into the Center for Islamic Life during the holy Eid-al-Fitr holiday and damaged and destroyed religious artifacts because of the Islamic faith of those associated with the facility. This office will not tolerate the use of force or threats to intimidate people and put them in fear of worshipping as they see fit.”

U.S. Attorney Philip R. Sellinger

“This defendant is being held accountable for Islamophobic-fueled acts of hate, interfering with the religious freedom of university students and staff during a sacred holiday for those of the Islamic faith,” said Assistant Attorney General Kristen Clarke of the Justice Department’s Civil Rights Division. “The Justice Department stands ready, along with our state and local partners, to hold accountable people who use force, or threats of violence, in order to intimidate people from exercising their religious beliefs. Islamophobic hate crimes have no place in our society today. We will continue to enforce the laws that make it safe for people of all faiths to engage in religious observance, including at educational institutions.”

“When we learned of this vandalism back in April, we immediately engaged with our law enforcement partners and Rutgers University,” FBI Newark Acting Special Agent in Charge Nelson I. Delgado said. “Within days, we tracked down and arrested Beacher. We want our actions and the speed with which we responded to illustrate our commitment and resolve to protect houses of worship in New Jersey. We all have the right to practice whatever religion we choose, without fear of hate marring the physical and spiritual place where we do it.”

According to documents filed in this case and statements made in court:

On April 10, 2024, during the Eid-al-Fitr holiday, Beacher broke into the CILRU around 2:41 a.m., where he damaged the CILRU’s property, including several religious artifacts, such as Turbah prayer stones, which are clay stones on which Muslims prostrate during prayer, and numerous other items that contained holy language from the Qur’an, Islam’s sacred scripture. Beacher also stole a Palestinian flag and a charity box belonging to the CILRU. He caused damage and destruction of property in excess of $5,000.

The charge of damage to religious property carries a maximum potential penalty of three years in prison and a fine of up to $250,000 fine, or twice the gain or loss from the offense, whichever is greatest. Sentencing is scheduled for Feb. 11, 2025.

U.S. Attorney Sellinger credited special agents of the FBI, Branchburg Resident Agency, under the direction of Acting Special Agent in Charge Nelson I. Delgado in Newark; prosecutors and detectives from the New Jersey Attorney General’s Office, under the direction of Attorney General Matthew J. Platkin; detectives from the Middlesex County Prosecutor’s Office, under the direction of Prosecutor Yolanda Ciccone; the Rutgers University Police Department-New Brunswick Division, under the leadership of Chief of University Police Kenneth Cop; and the New Jersey Regional Computer Forensics Laboratory.

The government is represented by Assistant U.S. Attorney Benjamin Levin, Chief of the General Crimes Unit, and R. Joseph Gribko, Deputy Chief of the Civil Rights Division, with assistance from the National Security Unit for the District of New Jersey, as well by Trial Attorney Daniel Grunert of the Justice Department’s Civil Rights Division. 

Las Vegas Resident Sentenced to Prison for COVID Relief Fraud

Source: US FBI

LAS VEGAS – A Las Vegas man was sentenced yesterday by U.S. District Judge Gloria M. Navarro to 30 months in prison followed by one year of supervised release for submitting fraudulent Paycheck Protection Program (PPP) and Economic Injury Disaster Relief Loan (EIDL) loan applications seeking more than $1 million under the Coronavirus Aid, Relief, and Economic Security (CARES) Act.

According to court documents, from May 2020 to June 2020, Jeremy Lee Attebery (42) submitted two false PPP loan applications and one false EIDL application. Attebery provided false information on his loan applications, such as number of employees, amount of monthly payroll, and gross revenues. In total, he applied for approximately $1,043,000 in fraudulent loans. Furthermore, he falsely stated on each application that he had not been convicted of a felony within the past five years.

Attebery pleaded guilty in August 2022 to three counts of wire fraud.

United States Attorney Jason M. Frierson for the District of Nevada and Special Agent in Charge Spencer L. Evans for the FBI made the announcement.

The FBI investigated the case; and Assistant U.S. Attorney Jessica Oliva prosecuted the case.

In May 2021, the Attorney General established the COVID-19 Fraud Enforcement Task Force to marshal the resources of the Department of Justice in partnership with agencies across government to enhance efforts to combat and prevent pandemic-related fraud. The Task Force bolsters efforts to investigate and prosecute the most culpable domestic and international criminal actors and assists agencies tasked with administering relief programs to prevent fraud by augmenting and incorporating existing coordination mechanisms, identifying resources and techniques to uncover fraudulent actors and their schemes, and sharing and harnessing information and insights gained from prior enforcement efforts. For more information on the department’s response to the pandemic, please visit https://www.justice.gov/coronavirus.

Anyone with information about allegations of attempted fraud involving COVID-19 can report it by calling the Department of Justice’s National Center for Disaster Fraud (NCDF) Hotline via the NCDF Web Complaint Form at https://www.justice.gov/disaster-fraud/ncdf-disaster-complaint-form.

###

Las Vegas Woman Pleads Guilty to Committing COVID Relief Fraud While on Federal Probation

Source: US FBI

LAS VEGAS – A Las Vegas woman pleaded guilty yesterday before U.S. District Judge Cristina D. Silva to filing fraudulent applications seeking thousands of dollars in loans guaranteed by the Small Business Administration under the Coronavirus Aid, Relief, and Economic Security Act.

According to court documents, Mikaela Marie Cuevas (24) — while on probation for assaulting a federal law enforcement officer — submitted at least two fraudulent loan applications and received thousands of dollars of Paycheck Protection Program (PPP) funding she was not eligible to receive. As part of the scheme, Cuevas submitted PPP loan applications in the name of a fake management consulting business, falsely claiming gross annual revenues of $106,000 from the non-existent business. Shortly after receiving the PPP funds, she filed fraudulent loan forgiveness applications, seeking to have her responsibility to re-pay the stolen loans absolved. In total, Cuevas caused a loss of about $47,000.

Cuevas pleaded guilty to one count of wire fraud. She is scheduled to be sentenced on May 25, 2023, and faces a maximum statutory sentence of up to 20 years in prison. In addition to time in prison, Cuevas faces a period of supervised release, restitution, and monetary penalties. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

United States Attorney Jason M. Frierson for the District of Nevada; Special Agent in Charge Spencer L. Evans for the FBI; Special Agent in Charge Weston King for the Small Business Administration Office of the Inspector General’s (SBA OIG) Western Region Office; Special Agent in Charge Albert Childress for the IRS Criminal Investigation (IRS CI); Acting Special Agent in Charge Cory Nootnagel for the Western Region, Office of Inspector General for the Board of Governors of the Federal Reserve System and the Bureau of Consumer Financial Protection (FRB-OIG) made the announcement.

The FBI, SBA OIG, IRS CI, FRB-OIG, and the Las Vegas Metropolitan Police Department investigated the case. Assistant U.S. Attorney Kimberly Frayn prosecuted the case.

In May 2021, the Attorney General established the COVID-19 Fraud Enforcement Task Force to marshal the resources of the Department of Justice in partnership with agencies across government to enhance efforts to combat and prevent pandemic-related fraud. The Task Force bolsters efforts to investigate and prosecute the most culpable domestic and international criminal actors and assists agencies tasked with administering relief programs to prevent fraud by, among other methods, augmenting and incorporating existing coordination mechanisms, identifying resources and techniques to uncover fraudulent actors and their schemes, and sharing and harnessing information and insights gained from prior enforcement efforts. For more information on the department’s response to the pandemic, please visit https://www.justice.gov/coronavirus.

Anyone with information about allegations of attempted fraud involving COVID-19 can report it by calling the Department of Justice’s National Center for Disaster Fraud (NCDF) Hotline at 866-720-5721 or via the NCDF Web Complaint Form at https://www.justice.gov/disaster-fraud/ncdf-disaster-complaint-form.

###

Las Vegas Man Sentenced to Prison for $12 Million Advance Fee Telemarketing Scheme Targeting Small Business Owners

Source: US FBI

LAS VEGAS – A Las Vegas resident was sentenced yesterday by U.S. District Judge Kent J. Dawson to 78 months in prison followed by five years of supervised release for defrauding hundreds of small business owners – many of them elderly – of about $12 million.

Michael Jones (43) pleaded guilty to two counts of conspiracy to commit mail fraud and wire fraud and 10 counts of wire fraud. In addition to the prison term, Jones was ordered to pay restitution in the total amount of $11,509,087.67 to the victims, and a forfeiture money judgment in the total amount of $7,934,095.32.

According to court documents, from October 2009 to February 2014, Jones and his co-defendants convinced more than 2,100 small business owners to pay nearly $12 million for what Jones and his co-defendants described as advance fees to fund expenses to apply for supposed government, private and charitable grants for the victims’ businesses. Following a script, Jones and others would falsely tell the victims that government, private and charitable organizations would provide grants to them regardless of the type of business they operated, but the victim first needed to pay thousands of dollars in fees to access those grants. Jones and his co-defendants induced the small business owners to give them money in exchange for services that were never provided. The scheme functioned solely to enrich Jones and his co-defendants.

United States Attorney Jason M. Frierson for the District of Nevada and Special Agent in Charge Spencer L. Evans for the FBI made the announcement.

The FBI investigated the case. Assistant U.S. Attorney Dan Cowhig prosecuted the case.

###

Man Pleads Guilty to $55 Million Investment Fraud Scheme

Source: US FBI

A Florida man pleaded guilty today to orchestrating an investment fraud scheme that defrauded more than 10,000 victims of over $55 million.

According to court documents, Michael Glaspie, 72, of Palm City, marketed an investment opportunity under the name “CoinDeal” or “Coin Deal.” Glaspie claimed that CoinDeal would yield extremely high returns on the premise that one or more technology companies – operated under the banner of “ViRSE” and allegedly owned by Neil Suresh Chandran – was about to be acquired by a consortium of wealthy buyers. To entice investors to put money into CoinDeal, Glaspie falsely promised that in the event the returns from CoinDeal failed to materialize, he would repay investors their money with seven percent annual interest over three years. In fact, Glaspie knew he had no means of making such repayments.

“For his brazen and repeated lies that defrauded more than 10,000 victims out of more than $55 million, the defendant now justifiably faces a lengthy prison term,” said Assistant Attorney General Kenneth A. Polite, Jr. of the Justice Department’s Criminal Division.  “The Department of Justice is committed to rooting out investment fraud and holding wrongdoers accountable to protect the financial security of all Americans.”

To support his false repayment promise, Glaspie deceptively claimed that he had an exclusive and lucrative contract with AT&T to distribute government‑funded phones, and that an app that he developed was being distributed by the Better Business Bureau and would yield over $400 million in revenue, when he had no such contract or distribution agreement. Furthermore, when the promised sale of CoinDeal did not close, Glaspie transmitted investor funds to Chandran after falsely representing to CoinDeal investors that he would not do so. Glaspie also falsely claimed that he never paid himself with CoinDeal investor funds, when in truth, he misappropriated nearly $2.5 million of victim investments for personal purposes, including trading cryptocurrency, paying his employees’ salaries, and buying a life insurance policy for a family member. 

“Michael Glaspie admitted today to his involvement in a widespread scheme to defraud investors for his personal benefit,” said U.S. Attorney Steven A. Russell for the District of Nebraska. “Thanks to the tireless efforts of our law enforcement partners to untangle this fraud, Glaspie will now be held accountable for this serious crime.”

“This case identified a fraudulent online investment scheme that defrauded over 10,000 victims,” said Assistant Director Luis Quesada of the FBI’s Criminal Investigative Division. “The subject promised investors high rates of returns then misused investor funds for personal use. The FBI and our law enforcement partners will continue to work diligently to identify and pursue those who seek to deceive and defraud the American public.”

“This elaborate investment fraud scheme defrauded more than 10,000 victims of over $55 million,” said Assistant Director in Charge David Sundberg of the FBI Washington Field Office. “Investment fraud schemes of any type will not be tolerated. The FBI will continue to do what we have done for over 100 years and investigate those who attempt to defraud unsuspecting Americans of their hard-earned money. I would like to thank our partners at FBI offices across the country and the Department of Justice for their work and collaboration to bring justice on behalf of these victims.”

Glaspie pleaded guilty to one count of wire fraud. He is scheduled to be sentenced on June 16 and faces a maximum penalty of 20 years in prison. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

Separately, on June 14, 2022, a federal grand jury in the District of Nebraska returned an indictment charging Chandran with three counts of wire fraud and two counts of engaging in monetary transactions in criminally derived property for his role in the scheme. If convicted, he faces up to 20 years in prison for each of the wire fraud counts and up to 10 years in prison for each count of engaging in unlawful monetary transactions.  An indictment is merely an allegation.  All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

The FBI Washington, Omaha, Las Vegas, and Los Angeles Field Offices are investigating the cases.

Assistant Chief William E. Johnston and Trial Attorney Tian Huang of the Criminal Division’s Fraud Section and Assistant U.S. Attorney Donald J. Kleine for the District of Nebraska are prosecuting the cases.

All potential investor victims of this fraud are encouraged to visit the webpage https://www.justice.gov/criminal-vns/united-states-v-chandran to identify themselves and obtain more information on their rights, including the opportunity to submit a victim impact statement.

Two Men Plead Guilty to COVID-19 Unemployment Insurance Benefits Fraud Conspiracy

Source: US FBI

LAS VEGAS – Two men pleaded guilty yesterday for their involvement in a conspiracy to apply for and use Nevada and California unemployment insurance benefits debit cards that were issued in other peoples’ names.

Luigi J. Montes (42), of Sugar Land, Texas, and Peter Alexander Stincer (34), of Sylmar, California, each pleaded guilty to conspiracy to commit mail fraud. U.S. District Judge Richard F. Boulware scheduled sentencing for June 5, 2023.

According to court documents and admissions made in court, from at least March 2020 to January 2021, Montes, Stincer, and co-defendant Alexander Hoyos Rivera, of Marion, Ohio, conspired to submit fraudulent unemployment insurance claims with the Nevada Department of Employment, Training, and Rehabilitation (DETR) and the California Employment Development Department (EDD). As part of the scheme, they used stolen personal identifying information – such as victim names, dates of birth, and social security numbers – to defraud DETR and EDD. Once the claims were approved, unemployment insurance debit cards were sent to mailing addresses to which the defendants had access. After receiving the debit cards, they withdrew the funds at various ATMs located in several states, including Nevada, California, and Texas. In total, DETR, EDD, and other state agencies approved at least $934,129 in benefits for these fraudulent claims. During the conspiracy, the defendants fraudulently obtained at least $698,655 in benefits for their personal use.

At sentencing, Montes and Stincer each face a statutory maximum penalty of 20 years in prison, a term of supervised release, restitution, and monetary penalties.

United States Attorney Jason M. Frierson for the District of Nevada and Special Agent in Charge Spencer L. Evans for the FBI made the announcement.

The FBI investigated the case. Assistant U.S. Attorney Jim Fang is prosecuting the case.

On May 17, 2021, the Attorney General established the COVID-19 Fraud Enforcement Task Force to marshal the resources of the Department of Justice in partnership with agencies across government to enhance efforts to combat and prevent pandemic-related fraud. The Task Force bolsters efforts to investigate and prosecute the most culpable domestic and international criminal actors and assists agencies tasked with administering relief programs to prevent fraud by, among other methods, augmenting and incorporating existing coordination mechanisms, identifying resources and techniques to uncover fraudulent actors and their schemes, and sharing and harnessing information and insights gained from prior enforcement efforts. For more information on the Department’s response to the pandemic, please visit https://www.justice.gov/coronavirus.

Anyone with information about allegations of attempted fraud involving COVID-19 can report it by calling the Department of Justice’s National Center for Disaster Fraud (NCDF) Hotline at 866-720-5721 or via the NCDF Web Complaint Form at: https://www.justice.gov/disaster-fraud/ncdf-disaster-complaint-form.

###

Hugo Resident Pleads Guilty to Possessing Child Sexual Exploitation Material

Source: US FBI

MUSKOGEE, OKLAHOMA – The United States Attorney’s Office for the Eastern District of Oklahoma announced that Steven Mark McAnally, age 65, of Hugo, Oklahoma, entered a guilty plea to one count of possessing certain material involving the sexual exploitation of a minor.

The Indictment alleged that in July 2023, McAnally knowingly possessed visual depictions from the internet of minors engaging in sexually explicit conduct, which McAnally accessed with intent to view.

The charges arose from an investigation by the Choctaw Nation Lighthorse Police and the Federal Bureau of Investigation.

The Honorable Gerald L. Jackson, U.S. Magistrate Judge in the United States District Court for the Eastern District of Oklahoma, accepted the plea and ordered the completion of a presentence investigation report.  McAnally was remanded into the custody of the United States Marshals Service pending sentencing.

Assistant U.S. Attorney Caila M. Cleary represented the United States.

Choctaw County Resident Pleads Guilty to Murder

Source: US FBI

MUSKOGEE, OKLAHOMA – The United States Attorney’s Office for the Eastern District of Oklahoma announced that Bryson Noel Miller, age 19, of Fort Towson, Oklahoma, entered a guilty plea to one count of Murder in Indian Country.

The Indictment against Miller alleged that on December 23, 2020, Miller killed the victim willfully, deliberately, maliciously, with premeditation and malice aforethought.

According to investigators, on the afternoon of December 22, 2020, Miller, Ashlie Nicole Rose Martin, and Chad Jon’Dale Voyles planned the murders of Martin’s parents, then set their plan into motion.  As part of that plan, Miller participated in bludgeoning Martin’s father to death.  The crimes occurred in Choctaw County, within the boundaries of the Choctaw Nation Reservation, in the Eastern District of Oklahoma.

The charge arose from an investigation by the Federal Bureau of Investigation, the Oklahoma State Bureau of Investigation, the Oklahoma Highway Patrol, and the Choctaw County Sheriff’s Office.

The Honorable Gerald L. Jackson, U.S. Magistrate Judge in the United States District Court for the Eastern District of Oklahoma in Muskogee, Oklahoma, accepted Miller’s plea, ordered the completion of a presentence investigation report, and remanded Miller to the custody of the U.S. Marshals pending sentencing.

Assistant U.S. Attorney Benjamin D. Traster represented the United States.

Muskogee Resident Sentenced for Attempted Robbery

Source: US FBI

MUSKOGEE, OKLAHOMA – The United States Attorney’s Office for the Eastern District of Oklahoma announced that Jacob Matthew Staton, age 29, of Muskogee, Oklahoma, was sentenced to 105 months in prison for one count of Attempted Robbery in Indian Country.

The charge arose from an investigation by the Federal Bureau of Investigation and the Muskogee Police Department.

On July 11, 2024, Staton pleaded guilty to the charge.  According to investigators, on January 4, 2020, Staton attempted to rob a shopper at gunpoint in a Muskogee parking lot.  When Staton’s target refused, Staton pistol whipped the shopper, then fired off two rounds in the shopper’s direction as the shopper fled.  The crime occurred in Muskogee County, within the boundaries of the Muscogee (Creek) Nation Reservation, in the Eastern District of Oklahoma.

The Honorable Ronald A. White, Chief U.S. District Judge in the United States District Court for the Eastern District of Oklahoma, presided over the hearing.  Staton will remain in the custody of the U.S. Marshals Service pending transportation to a designated United States Bureau of Prisons facility to serve a non-paroleable sentence of incarceration.

Assistant U.S. Attorney Jordan Howanitz represented the United States.

FBI Cleveland Reminds the Public About Scams Targeting Americans During National Consumer Protection Week

Source: US FBI

CLEVELAND, OH—With the FBI release of the 2023 Internet Crime Report and National Consumer Protection Week upon us, FBI Cleveland Special Agent in Charge Greg Nelsen reminds the public about scams and frauds originating from across the globe that target Americans, leaving a trail of victims from coast to coast, including right here in Northern Ohio.

In 2023, phishing, which is the use of unsolicited email, text messages, and telephone calls purportedly from a legitimate company requesting personal, financial, and/or login credentials, was one of the most active Internet-based crimes according to the FBI IC3.gov report. According to the report, over 298,000 people reported phishing-based crimes in 2023. Simply, phishing is just like fishing; the criminal casts a “line” via email, text, or pop-up message to see if there are any nibbles and bites. Eventually, someone ends up taking the bait, consequently, getting reeled in as the catch of the day. As a result, the victim’s computer or device has been compromised and open to hackers, malware, ransomware, and other damaging tools that steal passwords, bank account information, or shut down ones access to their own computer system.

“In 2023, The FBI’s Internet Crime Complaint Center received 880,418 complaints with potential losses exceeding $12.5 billion. This is almost a 10% increase in complaints from 2022 (800,944 complaints received) and a 22% increase in losses from 2022 ($10.3 billion). That’s more than 2,400 complaints every single day,” said FBI Cleveland Special Agent in Charge Greg Nelsen. “Ohio ranked number five in the top 10 states of complaints, and number 17 in victim losses at over $197 million. And while we don’t like to see that number grow, we want to remind everyone to step up and report the crime or attempted scam. That is the only way we can identify criminals, investigate their actions, and dismantle their network.”

As scams continue to increase in scope and sophistication, it’s important that law enforcement and the public work together to stay ahead of the risks. If you have been a victim of an Internet-based financial crime, there is some optimism for recovery. The FBI IC3 Recovery Asset Team (RAT), established in February 2018, streamlines communication with financial institutions and assists FBI field offices with the freezing of funds for victims who made transfers to domestic accounts under fraudulent pretenses. The RAT has about a 71% success rate, with $538MM in losses frozen of the $758MM total losses. This greatly reduced the amount of money that would have been “paid” to bad actors by unsuspecting victims.

Protection Against Phishing Campaigns

  • The FBI recommends network defenders apply the following mitigations to reduce the risk of compromise:
    • At work: Educate employees on how to identify phishing, spear-phishing, social engineering, and spoofing attempts.
      • Advise employees to be cautious when providing sensitive information—such as login credentials—electronically or over the phone, particularly if unsolicited or anomalous. Employees should confirm, if possible, requests for sensitive information through secondary channels.
      • Create protocols for employees to send suspicious emails to IT departments for confirmation.
      • Mark external emails with a banner denoting the email is from an external source to assist users in detecting spoofed e-mails.
      • Enable strong spam filters to prevent phishing emails from reaching end users. Filter emails containing executable files from reaching end users.
      • Advise training personnel not to open email attachments from senders they do not recognize.
    • At home: Never accept a pop-up request or open a link that asks you to give control of your computer to another person or perceived entity.
    • Do not give our personal identifying information or provide information as a “correction” if the other person is close.
    • Require all accounts with password logins (e.g., service accounts, admin accounts, and domain admin accounts) to have strong, unique passphrases. Passphrases should not be reused across multiple accounts or stored on the system where an adversary may have access. (Note: Devices with local administrative accounts should implement a password policy that requires strong, unique passwords for each administrative account.)
    • Require multi-factor authentication for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems.
    • If there is evidence of system or network compromise, implement mandatory passphrase changes for all affected accounts.
    • Keep all operating systems and software up to date. Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats.
    • Advise family members not to open email attachments from senders they do not recognize and learn how to check carefully for “look-alike” emails and attachments.
    • Enable strong spam filters to prevent phishing emails from reaching end users. Filter emails containing executable files from reaching end users.

Since its inception, IC3 has received over 8 million complaints. To learn more about these and other scams targeting Americans visit FBI.gov, and if you believe you are the victim of a scam, take action by reporting it to the FBI’s Internet Crime Complaint Center at IC3.gov or by contacting your local law enforcement agency.