Three Defendants Sentenced in Wide-Ranging Scheme to Monopolize International Transit Industry, Fix Prices, Extort Competitors, and Launder Money

Source: United States Department of Justice Criminal Division

The U.S. Department of Justice today announced that three additional defendants were sentenced in connection with a long-running and violent conspiracy to monopolize the transmigrante forwarding agency industry in the Los Indios, Texas, border region, located near Harlingen and Brownsville, Texas. The defendants controlled the transmigrate industry through fear, monopolization, and extortion of competitors, and laundered proceeds from the conspiracies.

Pedro Antonio Calvillo Hernandez, age 50 of McAllen, Texas, was sentenced to 37 months’ imprisonment, a three-year term of supervised release, and a $50,000 fine after pleading guilty to conspiracy to illegally fix prices and allocate the market for transmigrante forwarding agency services, conspiracy to monopolize the transmigrante market, and conspiracy to interfere with commerce by extortion.

Jose de Jesus Tapia Fernandez, age 47 of Brownsville, Texas was sentenced to time served, or 31 months in prison, and a three-year term of supervised release after pleading guilty to a money laundering conspiracy through which extortion proceeds were laundered.

Mireya Miranda, age 59 of San Antonio, Texas, was sentenced to 10 months of home detention, and a $75,000 fine after pleading guilty to conspiracy to illegally fix prices and allocate the market for transmigrante forwarding agency services; and conspiracy to monopolize the transmigrante market.

“The danger and the harm to the American people by the use of violence and extortion to fix prices and monopolize the market for an essential service in the Texas border region cannot be understated,” said Assistant Attorney General Abigail Slater of the Justice Department’s Antitrust Division. “Today’s sentences demonstrate the Antitrust Division’s commitment to pursuing incarceration for both white-collar and violent criminals who seek to exploit America’s free markets.”

“Price fixing is an attempt to distort the market in favor of the fixer and to the detriment of basically everyone else. Although such market manipulation is bad enough, it is even worse when brought about through threats and violence,” said U.S. Attorney Nicholas J. Ganjei for the Southern District of Texas. “The Southern District of Texas will work tirelessly to prosecute such criminal syndicates and to ensure markets along the Texas-Mexico border remain free, fair, and open.”

“The FBI is proud of the hard work and collaboration with partners that led to today’s sentencing,” said Assistant Director Joe Perez of the FBI’s Criminal Investigative Division. “We remain absolutely committed to thwarting criminal enterprises that function without regard for the rule of law and whose practices of market manipulation include the use of violence and intimidation.”

“These sentencings reaffirm our unwavering commitment to safeguarding economic integrity at our nation’s borders,” said Special Agent in Charge Craig Larrabee of ICE Homeland Security Investigations San Antonio. “By dismantling an enterprise that thrived on extortion and price fixing, we are ensuring that honest businesses can compete on a level playing field. This case exemplifies how corruption in niche industries can have far-reaching effects, and HSI will continue to pursue those who abuse the system for profit.”

Transmigrantes transport used vehicles and other goods from the United States through Mexico for resale in Central America. There are only a few locations where transmigrantes can legally cross from the United States into Mexico, one of those being the Los Indios Bridge in Texas. Transmigrante forwarding agencies are U.S.-based businesses that provide services to transmigrante clients, including helping those clients complete the customs paperwork required to export vehicles into Mexico.  

According to court documents and statements made in court, the co-defendants fixed prices for transmigrante forwarding agency services and created a centralized entity known as the “Pool” to collect and divide revenues among the conspirators, limit competition from other agencies, and increase prices for their services. Some co-defendants also conspired to force forwarding agencies to pay money to the Pool and to pay other extortion fees, including a “piso” for every transaction processed in the industry as well as a “fine” for operating in the market outside of Pool rules. The conspirators perpetrated acts of intimidation, coercion, and violence in furtherance of the antitrust and extortion conspiracies.  Co-defendants Carlos Martinez and Tapia also conspired to launder the extortion proceeds. 

Calvillo, Tapia, and Miranda must also pay restitution to the victims of the conspiracies. The Court will determine the final restitution amount owed to victims of the conspiracies at a hearing set for Sept. 3.   

Four co-defendants have previously been sentenced in this case. One other co-defendant has pleaded guilty and is awaiting sentencing. Three other defendants, Rigoberto Brown, Miguel Hipolito Caballero Aupart, and Diego Ceballos-Soto were also charged in the superseding indictment and remain fugitives. Anyone with information about their whereabouts is asked to contact the Antitrust Division’s Complaint Center at 888-647-3258, or visit  www.justice.gov/atr/report-violations.

The Justice Department’s Antitrust Division, the Criminal Division’s Violent Crime and Racketeering Section (VCRS), the U.S. Attorney’s Office for the Southern District of Texas, Department of Homeland Security – Homeland Security Investigations and the Federal Bureau of Investigation investigated the case. 

Trial Attorneys Anne Veldhuis, Brittany E. McClure, and Michael G. Lepage and Senior Litigation Counsel John Davis of the Antitrust Division; Trial Attorney Christina Taylor of the Criminal Division’s Violent Crime and Racketeering Section (VCRS); and Assistant U.S. Attorney Alexander L. Alum for the Southern District of Texas prosecuted the case. 

Anyone with information in connection with this investigation should contact the Antitrust Division’s Complaint Center at 888-647-3258, or visit www.justice.gov/atr/report-violations

Four Family Members Charged in Multimillion-Dollar Tax Refund Fraud Scheme

Source: United States Department of Justice Criminal Division

A federal grand jury in Fort Worth, Texas, returned an indictment on June 11, unsealed yesterday, charging four family members with conspiracy to defraud the United States by filing tax returns that sought millions of dollars in false refunds.

The following is according to the indictment: beginning in 2016, David Hunt, of Arlington, Texas, his twin sons Brandon Hunt and Baylon Hunt, also of Arlington, and Brandon and Baylon’s half-brother Corey Burt, of Mississippi, allegedly conspired to file false tax returns in the name of purported trusts that sought over $8.5 million in tax refunds that the trusts were not entitled to receive. Brandon Hunt also filed a false return in his own name. Collectively, the defendants allegedly received over $1 million from the IRS based on those false tax returns.

Brandon and Baylon Hunt also allegedly submitted additional fake documents to the IRS as part of their scheme, including falsified financial instruments and altered money orders. The indictment further alleges that they shared in the proceeds of their fraud by transferring money between themselves. The defendants also allegedly used the refunds to purchase luxury goods, cryptocurrency, and real estate.

Each defendant was charged with conspiracy as well as aiding and assisting in the preparation of tax returns. If convicted, each defendant faces a maximum penalty of five years in prison on the conspiracy charge and a maximum penalty of three years in prison for each count of aiding and assisting in the preparation of a false tax return. The defendants also face a period of supervised release, restitution, and monetary penalties. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

Acting Deputy Assistant Attorney General for Criminal Karen E. Kelly of the Justice Department’s Tax Division and Acting U.S. Attorney Nancy Larson of the Northern District of Texas made the announcement.

IRS Criminal Investigation is investigating the case.

Trial Attorneys Melissa Siskind and Daniel Lipkowitz of the Tax Division and Assistant U.S. Attorney Matthew Weybrecht for the Northern District of Texas are prosecuting the case.

An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

Defense News in Brief: Department of Navy Top Scientists, Engineers Recognized for Excellence

Source: United States Navy

WASHINGTON, DC – The Department of the Navy recognized the finest in Navy and Marine Corps science and engineering June 25 at the Assistant Secretary of the Navy for Research, Development, and Acquisition (ASN RD&A) Dr. Delores M. Etter Top Scientists and Engineers awards ceremony. Dr. Brett A. Seidle, Acting ASN(RD&A) and Mr. Peter C. Reddy, Deputy Assistant Secretary of the Navy for Research, Development, Test, and Engineering (DASN(RDT&E)), personally recognized top scientists and engineers from across the Department of the Navy (DON) and highlighted their incredible accomplishments.

Head of the Criminal Division Matthew R. Galeotti Announces Results of Health Care Fraud Takedown

Source: United States Department of Justice

Good morning.

Thank you all for joining us today as we announce the largest coordinated health care fraud takedown in the history of the Department of Justice.

Today marks a decisive moment in our fight to protect American taxpayers from fraudsters and to defend the integrity of our nation’s health care system.

We are announcing charges against 324 defendants for their alleged participation in health care fraud schemes involving approximately $14.6 billion in false claims submitted to Medicare, Medicaid, and other health care programs.

In a takedown this large, I can’t possibly describe all of the work that went into dismantling each scheme, but there are four key points that bear emphasizing.

First, let me be clear about what these health care fraud schemes mean for every hardworking American family: These criminals didn’t just steal someone else’s money — they stole from you.  Every fraudulent claim, every fake billing, every kickback scheme represents money taken directly from the pockets of American taxpayers, who fund these essential programs through their hard work and sacrifice. And when criminals defraud these programs, they’re not just committing theft — they’re driving up our national deficit and threatening the long-term viability of health care for seniors, disabled Americans, and our most vulnerable citizens.

This enforcement action involves the seizure of cash, as well as luxury vehicles and properties, returning real money to American taxpayers and to our government health care programs.

Second, we are seeing a disturbing trend of transnational criminal organizations engaging in increasingly sophisticated and complex criminal schemes that defraud the American health care system.

As part of this takedown, we’ve identified and charged defendants operating from Russia, Eastern Europe, Pakistan, and other foreign countries who have infiltrated our health care system to steal American taxpayer dollars.

As one example, we dismantled a scheme involving a sophisticated operation run from Russia and Eastern Europe that strategically bought dozens of medical supply companies in the United States and submitted more than 10 billion dollars in fraudulent health care claims to Medicare. To make matters worse, these perpetrators used the stolen identities of more than one million Americans, spanning all 50 states, to submit these false claims.

But I’m pleased to report that federal agents intercepted and arrested key members of that organization at U.S. airports and at the U.S.-Mexico border, cutting off their intended escape routes.

The days of transnational criminal organizations using American health care programs as their personal piggy banks are over.

Third, this takedown resulted in criminal charges against 74 defendants, including medical professionals, who fueled America’s deadly opioid epidemic for personal profit. These are not isolated instances of poor judgment. These are calculated schemes designed to exploit Americans struggling with addiction while enriching the very people who were duty-bound to help them heal.

We charged pill mill operators who prescribed unnecessary opioids.  We dismantled networks of corrupt pharmacies that existed solely to distribute drugs to addicts and dealers, feeding the addiction crisis that has devastated so many American communities.

This is not health care; it is a staggering breach of trust.  And under my leadership, the Criminal Division will prosecute these criminals as aggressively as we would prosecute any drug dealer — because that’s exactly what they are.

Fourth, many of the defendants charged as part of this takedown specifically targeted some of our most vulnerable citizens: elderly Americans in nursing homes, individuals with disabilities, those battling serious illnesses, and more.  For example, our prosecutors charged seven defendants, including five medical professionals, in connection with approximately $1 billion in fraudulent claims to Medicare and other health care benefit programs for performing medically unnecessary skin grafts on dying patients as they were seeking to spend their final days with dignity and grace.

That conduct is exactly as callous and disturbing as it sounds. Patients and their families trusted these providers with their lives.  Instead of receiving care, they became victims of elaborate criminal schemes.

Today’s takedown marks a historic day. In addition to the tireless work of our Fraud Section’s Health Care Fraud Unit, this extraordinary effort would not have been possible without the law enforcement agencies with me here today: Health and Human Services (HHS), Centers for Medicare & Medicaid Services (CMS), Federal Bureau of Investigation (FBI), Drug Enforcement Administration (DEA).

And of course, countless other partners across the federal, state, and local law enforcement community and dozens of United States Attorneys’ Offices. Thank you to all who made today possible.

Despite these historic achievements, we aren’t resting on our laurels. We’re making advancements to stay ahead of criminals and their illicit schemes.

That is why, today, I am also announcing that we are working with our partners at FBI, HHS-OIG, and other federal agencies to create a Health Care Fraud Data Fusion Center to revolutionize how we detect, investigate, and prosecute health care fraud.  These efforts will be led by the Criminal Division, specifically, the Fraud Section’s Health Care Fraud Unit and comprised of data specialists from the Unit’s Data Analytics Team. The Fusion Center will break down information silos, using coordinated data analysis to enable our investigative teams to quickly identify and dismantle emerging fraud schemes.

This takedown represents the largest health care fraud takedown in American history.

But it’s not the end—it’s the beginning of a new era of aggressive prosecution and data-driven prevention.

Thank you.

I will now turn it over to Acting Inspector General Juliet T. Hodgkins, Department of Health and Human Services Office of Inspector General.

Durable Medical Equipment Owner Sentenced to 12 Years for $61 Million Medicare Fraud Scheme

Source: United States Department of Justice Criminal Division

A Florida man was sentenced today to 12 years in prison and three years of supervised release for conspiring to defraud Medicare with false reimbursement claims for durable medical equipment (DME). He was also ordered to pay $21,195,540.18 in restitution and forfeiture in the amount of $2,514,040.

According to court documents, Peter Roussonicolos, 64, of Port Saint Lucie, Florida, owned and operated five DME suppliers as a silent partner. Roussonicolos hid his involvement in the companies from Medicare because he had one or more felony convictions, making him ineligible to enroll with the government program. To further conceal his involvement, he recruited and paid co-conspirators to serve as nominee owners of the DME suppliers and caused others to falsify Medicare enrollment forms, bank records, and other documents to conceal the true ownership and control of the DME suppliers. He also knew that a co-conspirator paid kickbacks and bribes to patient recruiters in exchange for beneficiary referrals. As part of the scheme, the DME companies submitted approximately $61.5 million in false and fraudulent claims to Medicare for medically unnecessary DME that was ineligible for reimbursement and were paid approximately $26.7 million of these claims.

“Through lies and deceit, the defendant and his co-conspirators orchestrated a $61 million fraud on Medicare,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “The defendant’s fraud drained critical government resources that could have been used to help vulnerable Americans. Today’s sentencing demonstrates the Department’s steadfast commitment to protecting taxpayer dollars and ensuring accountability for those who seek to defraud our health care programs.”

“Today’s sentence underscores HHS-OIG’s firm commitment to thoroughly investigating individuals who engage in illegal kickback schemes to prescribe medically unnecessary durable medical equipment for their own personal financial gain,” said Deputy Inspector General for Investigations Christian J. Schrank with the U.S. Department of Health and Human Services Office of Inspector General (HHS-OIG). “We remain steadfast in our mission to protect the integrity of Medicare and other federal healthcare programs as well as the people served by those programs.”

“This defendant and his co-conspirators orchestrated an elaborate scheme to steal millions from Medicare through kickbacks and sham billing,” said Assistant Director Jose A. Perez of the FBI Criminal Investigative Division. “Today’s sentencing demonstrates that those who exploit our healthcare system for personal gain will be held accountable. The FBI is committed to working with our partners to protect taxpayer dollars and ensure the integrity of healthcare programs.”

In November 2024, Roussonicolos pleaded guilty to conspiracy to commit health care fraud and wire fraud.

The FBI and HHS-OIG investigated the case.

Trial Attorney Jennifer Burns and Assistant Chiefs Jamie de Boer and Emily Gurskis of the Criminal Division’s Fraud Section prosecuted the case. Trial Attorneys Joanna Bowman and Lindita Ciko Torza of the Special Matters Unit assisted in the prosecution.

The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Force Program. Since March 2007, this program, currently comprised of 9 strike forces operating in 27 federal districts, has charged more than 5,800 defendants who collectively have billed federal health care programs and private insurers more than $30 billion. In addition, the Centers for Medicare & Medicaid Services, working in conjunction with the Office of the Inspector General for the Department of Health and Human Services, are taking steps to hold providers accountable for their involvement in health care fraud schemes. More information can be found at www. justice. gov/criminal-fraud/health-care-fraud-unit.

Canadian Man Arrested and Detained for Role in Deadly Alien Smuggling Conspiracy at the U.S.’s Northern Border

Source: United States Department of Justice Criminal Division

Note: View the indictment here and detention letter here.

WASHINGTON — A dual Canadian American citizen was arrested on Sunday, June 15, for his role in a deadly human smuggling conspiracy that left a family of four, including two children under the age of three, dead in the St. Lawrence River. Oakes was arrested as he attempted to enter the United States via the Massena, New York, Port of Entry.

Timothy Oakes, 34, from the Akwesasne Mohawk Indian Reservation (AMIR), Canada, was previously arraigned on numerous human smuggling offenses in the Northern District of New York District Court and had his detention hearing earlier today and will remain detained. Oakes was indicted on April 9 for conspiring with others to engage in alien smuggling, four counts of alien smuggling for profit, and four counts of alien smuggling resulting in death. United States based co-conspirators Dakota Montour, 31, and Kawisiiostha Celecia Sharrow, 43, both of Akwesasne-Mohawk, New York, and Janet Terrance, 45, of Hogansburg, New York, entered guilty pleas on Jan. 23, Oct. 8, 2024, and March 6, respectively.

“As alleged, Oakes and his co-conspirators profited from a human smuggling operation with a singular, cold-hearted aim: making money by bringing illegal aliens into the United States, regardless of the danger to human life involved,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “Their greed resulted in the deaths of a mother, a father, and two small children, as well as one of the defendants’ own brothers. The Criminal Division will continue to disrupt and dismantle these organizations and bring justice to smugglers whose actions result in senseless deaths.”

“This case shows the terrible perils of illegally crossing the border,” said U.S. Attorney John A. Sarcone III for the Northern District of New York. “Four family members died because a smuggling network put them in harm’s way. My office is proud to partner with Joint Task Force Alpha to continue to combat dangerous human smuggling and trafficking organizations that operate on our northern border.”

“Oakes’ arrest comes as part of our nearly two-year long investigation into a transnational criminal organization responsible for the large-scale smuggling of aliens from Canada into the United States,” said U.S. Immigration and Customs Enforcement Homeland Security Investigations (ICE HSI) Buffalo Special Agent in Charge Erin Keegan. “ICE HSI leverages its full range of authorities to combat and dismantle the heinous networks of greedy criminals who illicitly sell dangerous, sometimes fatal, passage through our nation’s northern border. We are extremely grateful for a multitude of law enforcement agency partners on the Border Enforcement Security Taskforce who join us in this fight to bring smugglers to justice.”

“Two toddler aged children and their parents were the tragic victims of an alien smuggling attempt gone horribly wrong,” said Chief Patrol Agent Robert Garcia of the U.S. Border Patrol’s Swanton Sector. “Their deaths were a direct result of callous smugglers who exploited the vulnerable. Due to unrelenting perseverance and investigative efforts by multiple law enforcement agencies, those responsible will be held accountable. Our pursuit of justice persists until justice is served.”

According to court documents, Oakes was a key facilitator in a human smuggling organization (HSO) that smuggled aliens from Canada into northern New York. Oakes, working with the HSO, routinely smuggled aliens into the United States by piloting boats across the St. Lawrence River. Additionally, Oakes used his home as a staging area for aliens before the HSO smuggled them into the United States. Oakes earned approximately $1,000 for every alien whom he smuggled across the St. Lawrence River into the United States.

In March 2023, Oakes housed a Romanian family of four, together with other aliens, for about 24 hours. He then transported the family and a boat to a public boat launch. His brother, Casey Oakes, attempted to use the boat to smuggle the Romanian family into the United States, but the boat capsized, killing all four members of the family, as well as Casey Oakes.    

Terrance, Montour, and Sharrow admitted in their plea agreements that in late March 2023, they were employed to illegally transport a Romanian family of four — a mother, father, one-year-old boy, and two-year-old girl — from Canada into New York. Specifically, Montour admitted that he was aware of the dangerous weather conditions on the day of the tragedy — high winds, freezing temperatures, and limited visibility — yet another co-conspirator still loaded the family of four into the small boat to attempt to cross the St. Lawrence River.

HSI Massena engaged in an extensive years-long investigation of the case, with assistance from the U.S. Border Patrol, U.S. Customs and Border Protection (CBP), HSI’s Human Smuggling Unit in Washington, D.C., CBP’s National Targeting Center International Interdiction Task Force, New York State Police, Canada Border Services Agency, Akwesasne Mohawk Police Service, St. Regis Mohawk Tribal Police Department, Ontario Provincial Police, Sûreté du Québec, St. Lawrence County Sheriff’s Department, Royal Canadian Mounted Police, and the Cornwall Police Service. The Justice Department’s Office of International Affairs provided significant support with foreign legal assistance requests.

The defendant’s vehicle with light blue boat in tow on March 29, 2023, at 9:29 p.m., consistent with the boat found in the river during recovery efforts.

The investigation is a result of the coordinated efforts of Joint Task Force Alpha (JTFA). JTFA, a partnership with the Department of Homeland Security (DHS), has been elevated and expanded by the Attorney General with a mandate to target cartels and other transnational criminal organizations and eliminate human smuggling and trafficking networks operating within the Americas that impact public safety and the security of our borders. JTFA currently comprises detailees from U.S. Attorneys’ Offices along the border, including the Northern District of New York. Dedicated support is provided by numerous components of the Justice Department’s Criminal Division, led by the Human Rights and Special Prosecutions Section (HRSP) and supported by the Money Laundering and Asset Recovery Section, the Office of Enforcement Operations and the Office of International Affairs, among others. JTFA also relies on substantial law enforcement investment from DHS, FBI, and the Drug Enforcement Administration, and other partners. To date, JTFA’s work has resulted in more than 380 domestic and international arrests of leaders, organizers, and significant facilitators of alien smuggling; more than 340 U.S. convictions; more than 290 significant jail sentences imposed; and forfeitures of substantial assets.

The investigation is being conducted under the Extraterritorial Criminal Travel Strike Force (ECT) program, a joint partnership between the Justice Department’s Criminal Division and HSI. The ECT program focuses on human smuggling networks that may present particular national security or public safety risks, or present grave humanitarian concerns. ECT has dedicated investigative, intelligence and prosecutorial resources. ECT coordinates and receives assistance from other U.S. government agencies and foreign law enforcement authorities.

Trial Attorney Jenna E. Reed of the Criminal Division’s HRSP and Assistant U.S. Attorney Jeffrey Stitt for the Northern District of New York are prosecuting the case.

This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces and Project Safe Neighborhoods.

Department of Justice Announces the Opening of Nominations to Honor the Honorable: The Attorney General’s Award for Distinguished Service in Policing

Source: United States Department of Justice Criminal Division

WASHINGTON – United States Attorney General Pamela Bondi announced today that the Department of Justice is now accepting nominations to Honor the Honorable: The Attorney General’s Award for Distinguished Service in Policing. This award represents the Department of Justice’s reaffirmed commitment to uplifting the valor and exceptional contributions to policing of our great nation’s law enforcement personnel. It is the mission of the Department of Justice to recognize individuals in law enforcement who exhibit remarkable courage, innovation, and outstanding performance in making America safe again.

The Attorney General’s Honor the Honorable Award recognizes individual or teams of rank-and-file officers from state, local, Tribal or territorial law enforcement agencies for exceptional efforts in policing. The awarded officers, deputies and troopers will have demonstrated exceptional service in one of three areas: criminal investigations, field operations or exemplary community involvement. Within each category, an award will be given to law enforcement agencies serving small, medium and large jurisdictions. Those agency sizes are defined as:

  • Small: agencies serving populations of fewer than 50,000;
  • Medium: agencies serving populations of 50,000 to 250,000;
  • Large: agencies serving populations of more than 250,000.

By acknowledging and rewarding these efforts, the Department strives to advance and reaffirm its dedication to policing and to promote proactive law enforcement methods that support public safety within our nation’s communities. Through this Award, the Attorney General recognizes that the nation’s law enforcement agencies, officers, deputies and troopers continue to work tirelessly to make American communities safe places to live and work again.

The deadline for nominations is July 14, 2025, at 8:00 p.m. EDT. More information and the application for nominees can be found at: https://www.justice.gov/ag/policing-award

Justice Department Announces Coordinated, Nationwide Actions to Combat North Korean Remote Information Technology Workers’ Illicit Revenue Generation Schemes

Source: United States Department of Justice Criminal Division

Law Enforcement Actions Across 16 States Result in Charges, Arrest, and Seizures of 29 Financial Accounts, 21 Fraudulent Websites, and Approximately 200 Computers

The Justice Department announced today coordinated actions against the Democratic People’s Republic of North Korea (DPRK) government’s schemes to fund its regime through remote information technology (IT) work for U.S. companies. These actions include two indictments, an arrest, searches of 29 known or suspected “laptop farms” across 16 states, and the seizure of 29 financial accounts used to launder illicit funds and 21 fraudulent websites.

According to court documents, the schemes involve North Korean individuals fraudulently obtaining employment with U.S. companies as remote IT workers, using stolen and fake identities. The North Korean actors were assisted by individuals in the United States, China, United Arab Emirates, and Taiwan, and successfully obtained employment with more than 100 U.S. companies.

As alleged in court documents, certain U.S.-based individuals enabled one of the schemes by creating front companies and fraudulent websites to promote the bona fides of the remote IT workers, and hosted laptop farms where the remote North Korean IT workers could remote access into U.S. victim company-provided laptop computers. Once employed, the North Korean IT workers received regular salary payments, and they gained access to, and in some cases stole, sensitive employer information such as export controlled U.S. military technology and virtual currency. In another scheme, North Korean IT workers used false or fraudulently obtained identities to gain employment with an Atlanta, Georgia-based blockchain research and development company and stole virtual currency worth approximately over $900,000.

“These schemes target and steal from U.S. companies and are designed to evade sanctions and fund the North Korean regime’s illicit programs, including its weapons programs,” said Assistant Attorney General John A. Eisenberg of the Department’s National Security Division. “The Justice Department, along with our law enforcement, private sector, and international partners, will persistently pursue and dismantle these cyber-enabled revenue generation networks.”

“North Korean IT workers defraud American companies and steal the identities of private citizens, all in support of the North Korean regime,” said Assistant Director Brett Leatherman of FBI’s Cyber Division. “That is why the FBI and our partners continue to work together to disrupt infrastructure, seize revenue, indict overseas IT workers, and arrest their enablers in the United States. Let the actions announced today serve as a warning: if you host laptop farms for the benefit of North Korean actors, law enforcement will be waiting for you.”

“North Korea remains intent on funding its weapons programs by defrauding U.S. companies and exploiting American victims of identity theft, but the FBI is equally intent on disrupting this massive campaign and bringing its perpetrators to justice,” said Assistant Director Roman Rozhavsky of the FBI Counterintelligence Division. “North Korean IT workers posing as U.S. citizens fraudulently obtained employment with American businesses so they could funnel hundreds of millions of dollars to North Korea’s authoritarian regime. The FBI will do everything in our power to defend the homeland and protect Americans from being victimized by the North Korean government, and we ask all U.S. companies that employ remote workers to remain vigilant to this sophisticated threat.”

Zhenxing Wang, et al. Indictment, Seizure Warrants, and Arrest – District of Massachusetts

Today, the United States Attorney’s Office for the District of Massachusetts and the National Security Division announced the arrest of U.S. national Zhenxing “Danny” Wang of New Jersey pursuant to a five-count indictment. The indictment describes a multi-year fraud scheme by Wang and his co-conspirators to obtain remote IT work with U.S. companies that generated more than $5 million in revenue. The indictment also charges Chinese nationals Jing Bin Huang (靖斌 黄), Baoyu Zhou (周宝玉), Tong Yuze (佟雨泽), Yongzhe Xu (徐勇哲 andيونجزهي أكسو), Ziyou Yuan (زيو) and Zhenbang Zhou (周震邦), and Taiwanese nationals Mengting Liu (劉 孟婷) and Enchia Liu (刘恩) for their roles in the scheme. 

“The threat posed by DPRK operatives is both real and immediate. Thousands of North Korean cyber operatives have been trained and deployed by the regime to blend into the global digital workforce and systematically target U.S. companies,” said U.S. Attorney Leah B. Foley for the District of Massachusetts. “We will continue to work relentlessly to protect U.S. businesses and ensure they are not inadvertently fueling the DPRK’s unlawful and dangerous ambitions.”

According to the indictment, from approximately 2021 until October 2024, the defendants and other co-conspirators compromised the identities of more than 80 U.S. persons to obtain remote jobs at more than 100 U.S. companies, including many Fortune 500 companies, and caused U.S. victim companies to incur legal fees, computer network remediation costs, and other damages and losses of at least $3 million. Overseas IT workers were assisted by Kejia Wang, Zhenxing Wang, and at least four other identified U.S. facilitators. Kejia Wang, for example, communicated with overseas co-conspirators and IT workers, and traveled to Shenyang and Dandong, China, including in 2023, to meet with them about the scheme. To deceive U.S. companies into believing the IT workers were located in the United States, Kejia Wang, Zhenxing Wang, and the other U.S. facilitators received and/or hosted laptops belonging to U.S. companies at their residences, and enabled overseas IT workers to access the laptops remotely by, among other things, connecting the laptops to hardware devices designed to allow for remote access (referred to as keyboard-video-mouse or “KVM” switches).

Kejia Wang and Zhenxing Wang also created shell companies with corresponding websites and financial accounts, including Hopana Tech LLC, Tony WKJ LLC, and Independent Lab LLC, to make it appear as though the overseas IT workers were affiliated with legitimate U.S. businesses. Kejia Wang and Zhenxing Wang established these and other financial accounts to receive money from victimized U.S. companies, much of which was subsequently transferred to overseas co‑conspirators. In exchange for their services, Kejia Wang, Zhenxing Wang, and the four other U.S. facilitators received a total of at least $696,000 from the IT workers.

IT workers employed under this scheme also gained access to sensitive employer data and source code, including International Traffic in Arms Regulations (ITAR) data from a California-based defense contractor that develops artificial intelligence-powered equipment and technologies. Specifically, between on or about Jan. 19, 2024, and on or about April 2, 2024, an overseas co-conspirator remotely accessed without authorization the company’s laptop and computer files  containing technical data and other information. The stolen data included information marked as being controlled under the ITAR.

Simultaneously with today’s announcement, the FBI and Defense Criminal Investigative Service (DCIS) seized 17 web domains used in furtherance of the charged scheme and further seized 29 financial accounts, holding tens of thousands of dollars in funds, used to launder revenue for the North Korean regime through the remote IT work scheme.

Previously, in October 2024, as part of this investigation, federal law enforcement executed searches at eight locations across three states that resulted in the recovery of more than 70 laptops and remote access devices, such as KVMs. Simultaneously with that action, the FBI seized four web domains associated with Kejia Wang’s and Zhenxing Wang’s shell companies used to facilitate North Korean IT work.

The FBI Las Vegas Field Office, DCIS San Diego Resident Agency, and Homeland Security Investigations San Diego Field Office are investigating the case.

Assistant U.S. Attorney Jason Casey for the District of Massachusetts and Trial Attorney Gregory J. Nicosia, Jr. of the National Security Division’s National Security Cyber Section are prosecuting the case, with significant assistance from Legal Assistants Daniel Boucher and Margaret Coppes. Valuable assistance was also provided by Mark A. Murphy of the National Security Division’s Counterintelligence and Export Control Section and the U.S. Attorneys’ Offices for the District of New Jersey, Eastern District of New York, and Southern District of California.

Kim Kwang Jin et al. Indictment – Northern District of Georgia

Today, the Northern District of Georgia unsealed a five-count wire fraud and money laundering indictment charging four North Korean nationals, Kim Kwang Jin (김관진), Kang Tae Bok (강태복), Jong Pong Ju (정봉주) and Chang Nam Il (창남일), with a scheme to steal virtual currency from two companies, valued at over $900,000 at the time of the thefts, and to launder proceeds of those thefts. The defendants remain at large and wanted by the FBI.

“The defendants used fake and stolen personal identities to conceal their North Korean nationality, pose as remote IT workers, and exploit their victims’ trust to steal hundreds of thousands of dollars,” said U.S. Attorney Theodore S. Hertzberg for the Northern District of Georgia. “This indictment highlights the unique threat North Korea poses to companies that hire remote IT workers and underscores our resolve to prosecute any actor, in the United States or abroad, who steals from Georgia businesses.”

According to the indictment, the defendants traveled to the United Arab Emirates on North Korean travel documents and worked as a co-located team. In approximately December 2020 and May 2021, respectively, Kim Kwang Jin (using victim P.S.’s stolen identity) and Jong Pong Ju (using the alias “Bryan Cho”) were hired by a blockchain research and development company headquartered in Atlanta, Georgia, and a virtual token company based in Serbia. Both defendants concealed their North Korean identities from their employers by providing false identification documents containing a mix of stolen and fraudulent identity information. Neither company would have hired Kim Kwang Jin and Jong Pong Ju had they known that they were North Korean citizens. Later, on a recommendation from Jong Pong Ju, the Serbian company hired “Peter Xiao,” who in fact was Chang Nam Il.

After gaining their employers’ trust, Kim Kwang Jin and Jong Pong Ju were assigned projects that provided them access to their employers’ virtual currency assets. In February 2022, Jong Pong Ju used that access to steal virtual currency worth approximately $175,000 at the time of the theft, sending it to a virtual currency address he controlled. In March 2022, Kim Kwang Jin stole virtual currency worth approximately $740,000 at the time of theft by modifying the source code of two of his employer’s smart contracts, then sending it to a virtual currency address he controlled.

To launder the funds after the thefts, Kim Kwang Jin and Jong Pong Ju “mixed” the stolen funds using the virtual currency mixer Tornado Cash and then transferred the funds to virtual currency exchange accounts controlled by defendants Kang Tae Bok and Chang Nam Il but held in the name of aliases. These accounts were opened using fraudulent Malaysian identification documents.

The FBI Atlanta Field Office is investigating the case.

Assistant U.S. Attorneys Samir Kaushal and Alex Sistla for the Northern District of Georgia and Trial Attorney Jacques Singer-Emery of the National Security Division’s National Security Cyber Section are prosecuting the case.

21 Searches of Known or Suspected U.S.-based Laptop Farms – Multi-District

Between June 10 and June 17, 2025, the FBI executed searches of 21 premises across 14 states hosting known and suspected laptop farms. These actions, coordinated by the FBI Denver Field Office, related to investigations of North Korean remote IT worker schemes being conducted by the U.S. Attorneys’ Offices of the District of Colorado, Eastern District of Missouri, and Northern District of Texas. In total, the FBI seized approximately 137 laptops.

Valuable assistance was provided by the U.S. Attorney’s Offices for the District of Connecticut, the Eastern District of Michigan, the Eastern District of Wisconsin, the Middle District of Florida, the Northern District of Georgia, the Northern District of Illinois, the Northern District of Indiana, the District of Oregon, the Southern District of Florida, the Southern District of Ohio, the Western District of New York, and the Western District of Pennsylvania.

***

The Department’s actions to combat these schemes are the latest in a series of law enforcement actions under a joint National Security Division and FBI Cyber and Counterintelligence Divisions effort, the DPRK RevGen: Domestic Enabler Initiative. This effort prioritizes targeting and disrupting the DPRK’s illicit revenue generation schemes and its U.S.-based enablers. The Department previously announced other actions pursuant to the initiative, including in January 2025 and prior, as well as the filing of a civil forfeiture complaint in early June 2025 for over $7.74 million tied to an illegal employment scheme.

As the FBI has described in Public Service Announcements published in May 2024 and January 2025, North Korean remote IT workers posing as legitimate remote IT workers have committed data extortion and exfiltrated the proprietary and sensitive data from U.S. companies. DPRK IT worker schemes typically involve the use of stolen identities, alias emails, social media, online cross-border payment platforms, and online job site accounts, as well as false websites, proxy computers, and witting and unwitting third parties located in the U.S. and elsewhere.

Other public advisories about the threats, red flag indicators, and potential mitigation measures for these schemes include a May 2022 advisory released by the FBI, Department of the Treasury, and Department of State; a July 2023 advisory from the Office of the Director of National Intelligence; and guidance issued in October 2023 by the United States and the Republic of Korea (South Korea). As described the May 2022 advisory, North Korean IT workers have been known individually to earn up to $300,000 annually, generating hundreds of millions of dollars collectively each year, on behalf of designated entities, such as the North Korean Ministry of Defense and others directly involved in the DPRK’s weapons programs.

The U.S. Department of State has offered potential rewards for up to $5 million in support of international efforts to disrupt the DPRK’s illicit financial activities, including for cybercrimes, money laundering, and sanctions evasion.

The details in the above-described court documents are merely allegations. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.