Former Craighead County Clerk Sentenced to 57 Months in Prison for Wire Fraud

Source: US FBI

      LITTLE ROCK—Former Craighead County Clerk Jacob Kade Holliday was sentenced to 57 months in federal prison today for taking more than $1.5 million in county money for his personal use.  Holliday, 34, of Jonesboro, was sentenced by United States District Court Judge James M. Moody, Jr., who also imposed three years of supervised release after Holliday completes his prison term.

      In June 2020, Craighead County officials reported that a theft had occurred from the Craighead County Clerk’s office. The bank that managed the Clerk’s office account had flagged suspicious activity, and auditors concluded that approximately $1,579,057.03 was missing and had been moved to Holliday’s personal banking accounts.

      Law enforcement interviewed Holliday, who admitted to taking the money to fund his businesses: Holliday Development and Management, LLC, and Total Healthcare, LLC, both of which operated restaurants and coffee shops in Jonesboro. Holliday told investigators he planned to pay the money back, but once the COVID-19 pandemic caused most of his businesses to close, he could not replace the money.

      Holliday was indicted in December 2020, when a grand jury charged him with 11 counts of wire fraud for each withdrawal he made from the county account. He pleaded guilty in February of this year and acknowledged that his method was to make a transfer from the county account to one of his personal accounts and then get a cashier’s check from his personal account for the same amount. He pleaded guilty to Count 1 of the indictment, which charged him with wire fraud for his first fraudulent transfer of $101,782.97 on January 29, 2020. In his plea agreement, Holliday agreed to pay $1,579,057.03 in restitution to Craighead County.

      Holliday is currently serving a 120-month sentence in a state case for forgery, and Judge Moody ordered that his federal sentence will not begin until the state sentence is completed. The FBI, Arkansas State Police, and Craighead County Sheriff’s Department conducted the investigation. Assistant United States Attorney Allison W. Bragg prosecuted the case.

# # #

This news release, as well as additional information about the office of the

United States Attorney for the Eastern District of Arkansas, is available online at

https://www.justice.gov/edar

Twitter:

@EDARNEWS

Charges and Seizures Brought in Fraud Scheme Aimed at Denying Revenue for Workers Associated with North Korea

Source: US FBI

IT Workers Infiltrated More than 300 U.S. Companies, Earning Millions

            WASHINGTON – The Justice Department unsealed charges, seizures, and other court-authorized actions to disrupt the illicit revenue generation efforts of the Democratic People’s Republic of Korea (DPRK or North Korea).

            The charges include prosecutions of an Arizona woman, Ukrainian man, and three unidentified foreign nationals who allegedly participated in schemes to place overseas information technology (IT) workers—posing as U.S. citizens and residents—in remote positions at U.S. companies. 

            As alleged in the court documents, DPRK has dispatched thousands of skilled IT workers around the world, who used stolen or borrowed U.S. persons’ identities to pose as domestic workers, infiltrate domestic companies’ networks, and raise revenue for North Korea. The schemes described in court documents involved defrauding over 300 U.S. companies using U.S. payment platforms and online job site accounts, proxy computers located in the United States, and witting and unwitting U.S. persons and entities. This announcement includes the largest case ever charged by the Justice Department involving this type of IT workers’ scheme.

            Two criminal prosecutions brought by the U.S. Attorney’s Office for the District of Columbia, one in partnership with the Computer Crime and Intellectual Property Section of the Justice Department’s Criminal Division, were unsealed today. As part of the prosecutions, two defendants have been arrested and related seizures and search warrants have been executed in Washington, D.C. and other jurisdictions. The investigations were led by the FBI Phoenix and New York Field Offices and IRS Criminal Investigations (IRS-CI), and coordinated with five other FBI field offices and four other U.S. Attorney’s Offices, producing arrests in the United States and Poland, the execution of five premises search warrants, and the seizure of illicitly obtained wages and a website domains.

            “As alleged in the indictment, Chapman and her co-conspirators committed fraud and stole the identities of American citizens to enable individuals based overseas to pose as domestic, remote IT workers,” said Principal Deputy Assistant Attorney General Nicole M. Argentieri, head of the Justice Department’s Criminal Division. “The charges in this case should be a wakeup call for American companies and government agencies that employ remote IT workers. These crimes are alleged to have benefitted the North Korean government. The Criminal Division remains firm in its commitment to prosecute complex criminal schemes like this one.”

            “Today’s announcement of charges and law enforcement action show our broad approach to attacking funding sources for North Korea across the United States,” said U.S. Attorney Matthew M. Graves for the District of Columbia. “We will continue to vigorously pursue cases against individuals, in the United States and abroad, that use U.S. financial systems to raise revenue for North Korea.” 

            “On the surface, today’s allegations of wire fraud, identity theft, and money laundering may read like a typical white collar or economic crime scheme,” said Assistant Director Kevin Vorndran of the FBI’s Counterintelligence Division. “But what these allegations truly represent is a new high-tech campaign to evade U.S. sanctions, victimize U.S. businesses, and steal U.S. identities. The charges clearly demonstrate how the FBI and its partners will employ every resource at our disposal to bring to justice anyone who helps North Korea evade sanctions.”

            “The FBI has long-stated that cybersecurity is national security and this case is living proof of that,” said FBI Special Agent in Charge Akil Davis of the Phoenix Field Office. “That a woman living her quiet life in the outskirts of Phoenix can allegedly get so entangled in something like this clearly indicates our adversaries are getting more sophisticated and stealthier, so it’s critical that businesses and citizens be hyper-vigilant with their cyber activities.”

            “Today’s announcement exposes disturbing criminal ties to North Korea where fraudsters allegedly used stolen identities of U.S. citizens to infiltrate the U.S. job market as remote workers,” said IRS Criminal Investigation Acting Special Agent in Charge of the Phoenix Field Office Carissa Messick. “CI and our federal partners will remain vigilant in our efforts to expose criminal fraud schemes that jeopardize our national security.”

            “Oleksandr Didenko allegedly owned and operated U.S.-based online infrastructure as well as fraudulent and stolen U.S. persons’ identities for use by Information Technology workers in North Korea in an effort to evade sanctions,” said FBI Assistant Director Smith of the New York Field Office. “The arrest of Didenko demonstrates the FBI’s commitment to protecting the United States from threats posed by a hostile foreign actors, specifically the government of the  Democratic Peoples Republic of Korea. Didenko’s arrest also sends a clear message to anyone who supports this type of brazen illegal activity the FBI and our global law enforcement partners will hold you accountable wherever you may be.”

            An indictment was unsealed today in the District of Columbia against U.S. citizen Christina Marie Chapman, 49, of Litchfield Park, Arizona, related to her participation in a scheme to assist overseas IT workers—posing as U.S. citizens and residents—in working at more than 300 U.S. companies in remote IT positions. Chapman was arrested yesterday in Litchfield Park, Arizona.

            As alleged in the indictment, Chapman and her co-conspirators’ scheme defrauded U.S. companies across myriad industries, including multiple well-known Fortune 500 companies, U.S. banks, and other financial service providers. The identities of more than 60 U.S. persons were compromised and used by IT workers related to Chapman’s cell.

            In addition to Chapman, the indictment charged three foreign nationals with money laundering for their participation in the scheme. As alleged in the indictment, the department seized wages earned by more than 19 overseas IT workers and will seek forfeiture of the same.

            Additionally, a criminal complaint was unsealed today in the District of Columbia charging Ukrainian national Oleksandr Didenko, 27, of Kyiv, with a separate years-long scheme to create fake accounts at U.S. IT job search platforms and with U.S.-based money service transmitters.

            As alleged in the complaint, Didenko sold the accounts to overseas IT workers, some of whom he believed were North Korean, and the overseas IT workers used the false identities to apply for jobs with unsuspecting companies. Several U.S. persons had their identities used by IT workers related to Didenko’s cell, and evidence in the complaint showed that the overseas IT workers using Didenko’s services were also working with Chapman. Polish authorities arrested Didenko on May 6 at the request of the United States, which is seeking Didenko’s extradition from Poland.

            Didenko’s company’s online domain, upworksell.com, was also seized today by the Justice Department pursuant to a court order, and all traffic diverted to the FBI.

            Related to the above schemes, the FBI executed search warrants for U.S. based “laptop farms,” residences that hosted multiple laptops for overseas IT workers, wherein U.S.-based facilitators logged onto U.S. company computer networks and then allowed the overseas IT workers to remotely access those laptops through various software applications. The overseas IT workers used the laptop farms’ U.S. Internet Protocol addresses to make it appear as though they were operating inside the United States. Chapman’s residence was searched in October 2023 pursuant to a search warrant issued in the District of Arizona, resulting in evidence that is reflected in the indictment. Search warrants for four U.S. residences associated with laptop farms controlled by Didenko were issued in the Southern District of California, Eastern District of Tennessee, and Eastern District of Virginia, and executed between May 8 and May 10.

            Concurrent with today’s announcement, the U.S. Department of State announced a reward of up to $5 million for information related to Chapman’s coconspirators: John Doe 1, alias Jiho Han; John Doe 2, alias Haoran Xu; John Doe 3, alias Chunji Jin; and an unindicted coconspirator utilizing aliases “Zhonghua” and “Venechor S.”

Chapman Indictment, Money Seizures, and Premises Warrant

            According to the indictment, the overseas IT workers associated with Chapman, many of whom were tied to North Korea, posed as U.S. citizens using the stolen, false, or borrowed identities of U.S. nationals, and applied for positions at U.S companies, causing the transmission of false documentation to the U.S. Department of Homeland Security (DHS). The overseas IT workers gained employment at U.S. companies, including at a top-five major television network, a Silicon Valley technology company, an aerospace manufacturer, an American car manufacturer, a luxury retail store, and a U.S.-hallmark media and entertainment company, all of which were Fortune 500 companies. Some of these companies were purposely targeted by a group of DPRK IT workers, who maintained postings for companies at which they wanted to insert IT workers.

            Chapman ran a “laptop farm,” hosting the overseas IT workers’ computers inside her home so it appeared that the computers were located in the United States, and also received and forged payroll checks and received direct deposits of the overseas IT workers’ wages from the U.S. companies into her U.S. financial accounts. The overseas IT workers also attempted to gain employment and access to information at two different U.S. government agencies on three different occasions, although these efforts were generally unsuccessful. The overseas IT workers associated with Chapman’s cell were paid millions for their work, much of which has been falsely reported to the IRS and the Social Security Administration in the name of the actual U.S. persons whose identities were stolen or borrowed. Chapman also allegedly conspired with the John Doe defendants to commit money laundering by conducting financial transactions under aliases to receive money generated by the scheme and transfer those funds outside of the United States, in an attempt to hide that these were proceeds of the IT workers’ fraud.

            Chapman and her co-conspirators allegedly compromised more than 60 identities of U.S. persons, impacted more than 300 U.S. companies, caused false information to be conveyed to DHS on more than 100 occasions, created false tax liabilities for more than 35 U.S. persons, and resulted in at least $6.8 million of revenue to be generated for the overseas IT workers. The department seized funds related to scheme from Chapman as well as wages and monies accrued by more than 19 overseas IT workers.

            “Using the stolen identities of U.S. citizens is a crime by itself, but when you use those identities to procure employment for foreign nationals with ties to North Korea at hundreds of U.S. companies, you have compromised the national security of an entire nation,” said Chief Guy Ficco of IRS-CI. “For more than 100 years, IRS Criminal Investigation special agents have been following the money, and their financial expertise has once again stopped criminals in their tracks.”

            Chapman is charged with conspiracy to defraud the United States, conspiracy to commit wire fraud, conspiracy to commit bank fraud, aggravated identity theft, conspiracy to commit identity fraud, conspiracy to launder monetary instruments, operating as an unlicensed money transmitting business, and unlawful employment of aliens. The John Does are charged with conspiracy to commit money laundering. If convicted, Chapman faces a maximum penalty of 97.5 years in prison, including a mandatory minimum of two years in prison on the aggravated identity theft count, and the John Does face a maximum penalty of 20 years in prison.

            The FBI Phoenix Field Office and IRS-CI Phoenix Field Office are investigating this case, with assistance from the FBI Chicago Field Office.

            Assistant U.S. Attorney Karen P. Seifert for the District of Columbia and Trial Attorney Ashley R. Pungello of the Criminal Division’s Computer Crime and Intellectual Property Section are prosecuting this case, with assistance from Paralegal Specialists Brian Rickers and Jorge Casillas. The U.S. Attorney’s Office for the District of Arizona and Trial Attorney Gregory Nicosia of the National Security Division’s National Security Cyber Section also provided valuable assistance.

Didenko Complaint, Domain Seizure, and Premises Warrants

            According to the criminal complaint, Didenko allegedly engaged in a multi-year scheme to create accounts at U.S.-based freelance IT job search platforms and with U.S. money service transmitters in the names of false identities, including identities of U.S. persons, and sold these accounts to overseas IT workers. Didenko ran a website, upworksell.com, which advertised creating, buying, and renting accounts at U.S. websites using false identities, and also advertised “Credit Card Rental” in the European Union and the United States and SIM card rental for cellular phones. Didenko allegedly offered a full array of services to allow an individual to pose under a false identity and market themselves for remote IT work with unsuspecting companies. As stated, Didenko’s domain was seized as part of the case.

            According to the affidavit in support of the complaint, Didenko is alleged to have managed as many as approximately 871 “proxy” identities, provided proxy accounts for three freelance U.S. IT hiring platforms, and provided proxy accounts for three different U.S.-based money service transmitters. In coordination with his co-conspirators, Didenko facilitated the operation of at least three U.S.-based laptop farms, at one point hosting approximately 79 computers. Didenko sent or received $920,000 in U.S. dollars payments since July 2018.

            Didenko acknowledged in messages that he believed he was assisting North Korean IT workers. One of Didenko’s overseas IT worker customers also requested that a laptop be sent from one of Didenko’s U.S. laptop farms to Chapman’s laptop farm, showing the interconnectivity of these cells within the DPRK overseas IT worker network. Search warrants of Didenko’s laptop farms were executed in early May 2024.

            If convicted, Didenko faces a maximum penalty of 67.5 years in prison, including a mandatory minimum of two years in prison on the aggravated identity theft count.

            The FBI New York Field Office is investigating this case. The FBI Norfolk and San Diego Field Offices and the Jefferson City, Tennessee, Resident Agency provided assistance in executing search warrants.

            Assistant U.S. Attorneys Karen P. Seifert and Steven Wasserman for the District of Columbia are prosecuting the case, with assistance from Paralegal Specialists Brian Rickers and Jorge Casillas and the U.S. Attorney’s Office for the District of Columbia. The U.S. Attorney’s Offices for the Southern District of California, Eastern District of Tennessee, and Eastern District of Virginia, Justice Department’s Office of International Affairs, and Trial Attorney Jacques Singer-Emery of the National Security Division’s National Security Cyber Section provided valuable assistance as well.

***

            The FBI, along with the Departments of State and Treasury, issued a May 2022 advisory to alert the international community, private sector, and public about the North Korea IT worker threat. Updated guidance was issued in October 2023 by the United States and the Republic of Korea (South Korea), which includes indicators to watch for that are consistent with North Korea IT worker fraud.

            An indictment and a criminal complaint are merely allegations. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

 

Chinle Man Sentenced to Life in Prison for Multiple Counts of Child Sex Abuse

Source: US FBI

PHOENIX, Ariz. – Kendall Anagal, 41, of Chinle, was sentenced last week by United States District Judge Diane J. Humetewa to life in prison for multiple counts of child sexual abuse. 

On February 9, 2024, a federal jury found Anagal guilty of three counts of Aggravated Sexual Abuse and one count of Abusive Sexual Contact of a Child. Anagal repeatedly and violently sexually abused a child who, at the time of the abuse, was between nine and 10 years old. The victim reported these offenses when she was 17 years old; she did not disclose them earlier because she feared for her life.

The Federal Bureau of Investigation conducted the investigation in this case. Assistant U.S. Attorneys Tracy Van Buskirk and Sharon K. Sexton, District of Arizona, Phoenix, handled the prosecution. 
 

CASE NUMBER:            CR-22-8113-PCT-DJH
RELEASE NUMBER:    2024-063_Anagal

# # #

For more information on the U.S. Attorney’s Office, District of Arizona, visit http://www.justice.gov/usao/az/
Follow the U.S. Attorney’s Office, District of Arizona, on X @USAO_AZ for the latest news.

Phoenix Police Officer Indicted and Ordered Detained for Child Pornography and Exploitation Offenses

Source: US FBI

PHOENIX, Ariz. – Alaa Robert Bartley, 41, of Gilbert, was indicted by a federal grand jury on Tuesday for a series of child pornography-related offenses, including Attempted Production of Child Pornography; Attempted Coercion and Enticement of a Minor; and multiple counts of Distributing, Receiving, and Possessing Child Pornography. Also on Tuesday, a federal Magistrate Judge ordered that Bartley be detained in custody pending trial.

The indictment alleges that between August 2020 and August 2023, Bartley repeatedly exchanged digital images of child pornography. The indictment also alleges that in 2019, Bartley attempted to take sexually explicit images of a 15-year-old girl in a bathroom, and from December 2023 to April 2024, he used facilities of interstate commerce while attempting to induce another minor to engage in criminal sexual activity.

Attempted Production of Child Pornography carries a potential sentence of 15-30 years in prison; Attempted Coercion and Enticement of a Minor carries a sentence of 10 years to life in prison; and each count of Distributing, Receiving, and Possessing Child Pornography carries a maximum sentence of 20 years in prison. All counts also carry a potential fine of up to $250,000 and up to a lifetime term of supervised release.

An indictment is simply a method by which a person is charged with criminal activity and raises no inference of guilt. An individual is presumed innocent until evidence is presented to a jury that establishes guilt beyond a reasonable doubt.

The Federal Bureau of Investigation is conducting the investigation in this case. The United States Attorney’s Office, District of Arizona, is handling the prosecution.

CASE NUMBER:           CR 24-0749-PHX-JJT
RELEASE NUMBER:    2024-057_Bartley

Phoenix Man Sentenced to 8.5 Years in Prison for Involvement in Murder-for-Hire Plot

Source: US FBI

PHOENIX, Ariz. – Ali Joseph, 44, of Phoenix, was sentenced on Monday by United States District Judge Diane J. Humetewa to 102 months in prison, followed by three years supervised release. Joseph pleaded guilty on December 12, 2023, to one count of Use of Interstate Commerce Facilities in the Commission of Murder for Hire.

Between May and August 2022, while Joseph was involved in contentious child-custody proceedings with the victim, Joseph had multiple in-person and electronic communications with an individual who was a Confidential Human Source (CHS) for the FBI. In these communications with the CHS, Joseph revealed that he was unwilling to share custody of his children with the victim because he believed her to be an “apostate” who would not raise his children on “the right path,” and he expressed his desire to have her murdered. Thereafter, the CHS introduced Joseph to an undercover FBI employee who Joseph believed was a hitman. Joseph offered to pay the “hitman” $3,000 to disguise himself as a homeless person who would attempt to rob and violently attack the victim as she left her workplace. Joseph provided the CHS with a $1,000 down payment along with a piece of paper containing photographs of the victim and her identifying information. Joseph told the CHS that he wanted the “hitman” to stab the victim in the neck to ensure she would not survive the attack, and asked the CHS to notify him when the murder was completed by sending him a funny photo or short video.

The Federal Bureau of Investigation conducted the investigation in this case. The United States Attorney’s Office, District of Arizona, handled the prosecution.
 

CASE NUMBER:           CR-22-01070-PHX-DJH
RELEASE NUMBER:    2024-056_Joseph

# # #

For more information on the U.S. Attorney’s Office, District of Arizona, visit http://www.justice.gov/usao/az/
Follow the U.S. Attorney’s Office, District of Arizona, on X @USAO_AZ for the latest news.

FBI Honors Arizona Community Leader with National Award

Source: US FBI

WASHINGTON, DC—On Friday, April 19, FBI Director Christopher Wray presented Paul Rockower, Executive Director of the Jewish Community Relations Council (JCRC) of Greater Phoenix with the FBI Director’s Community Leadership Award (DCLA) for his service to the Jewish community. Mr. Rockower also uses a keen sense of diplomacy to develop and foster relationships with other faith and ethnic communities, builds coalitions with law enforcement, and fights extremism to ensure that no community faces hate alone.

The FBI established the DCLA in 1990 to publicly acknowledge achievements of people working to make a difference in their communities through the promotion of education and the prevention of crime and violence. Each year, one person or organization from each of the FBI’s 56 field offices is chosen to receive this prestigious award.

“Our success as both a law enforcement and an intelligence agency hinges on our ability to foster and maintain genuine partnerships with people in all communities,” said FBI Director Christopher Wray. “People like this year’s Leadership Award recipients not only identify what others need, but they are willing to roll up their sleeves and provide services. They are building bridges and relationships while putting in the work to have hard conversations and find common purpose. They do it out of kindness and compassion with a sincere belief that justice – in its many forms – requires all of us to do the right thing in the right way.”

Mr. Rockower manages all external relations, as well as advocacy, interfaith outreach, and community bridge-building for the Jewish community in Greater Phoenix. Mr. Rockower led the effort to pass the Holocaust Education Bill in the Arizona Legislature, paving the way for the passage of Arizona’s historic Holocaust education mandate. Additionally, he spearheaded the JCRC’s efforts urging the Arizona Legislature to pass a historic state-based nonprofit security grant program that provides $5 million in security funding over the next five years to vulnerable houses of worship. Mr. Rockower also serves on the Phoenix police department’s Jewish Advisory Board and partners with FBI Phoenix to address concerns and helps facilitate communication across the state.

“Paul has a lot of empathy and emotional intelligence,” said Akil Davis, special agent in charge of the FBI’s Phoenix field office. “He understands that when we say, ‘We can’t talk to you about that,’ it’s because we really can’t. Some people might assume ill intent on our part, but Paul trusts us and understands that I will share what I can when I can, and I frequently do share information with him,” Davis said.

Director Wray hosted the 2023 DCLA winners in a special ceremony at FBI Headquarters today, emphasizing the importance of community partnerships in keeping communities safe. These partnerships – as exemplified by the breadth of the work by the DCLA recipients – have led to many crime prevention programs that protect the most vulnerable in our communities, educate families and businesses about cyber threats, and work to reduce violent crime in our neighborhoods. Learn more about the Director’s Community Leadership Award program https://www.fbi.gov/how-we-can-help-you/outreach/dcla, the FBI’s general outreach efforts, and the Phoenix Field Office online https://www.fbi.gov/contact-us/field-offices/phoenix/community-outreach.

Tucson Man Pleads Guilty to Second Degree Murder of a Child

Source: US FBI

TUCSON, Ariz. – Pablo Martinez, Jr., 36, of Tucson, pleaded guilty on Monday to Second Degree Murder for the killing of a child. Sentencing is scheduled for July 5, 2024, before United States District Judge Scott H. Rash.

Martinez admitted that on September 29, 2019, he murdered the six-year-old victim by holding the victim’s face under a running bathtub faucet for between five to ten minutes, while giving the victim a bath. The victim inhaled water that caused liquid thermal burns, resulting in his death. The victim was an enrolled member of the Pascua Yaqui Indian Tribe.

A conviction for second degree murder carries a maximum penalty of up to life in prison, a fine of $250,000.00, and a term of five years of supervised release.

The Federal Bureau of Investigation and the Pascua Yaqui Police Department conducted the investigation in this case. Assistant U.S. Attorneys Frances M. Kreamer Hope and Matthew C. Cassell, District of Arizona, Tucson, are handling the prosecution.
 

CASE NUMBER:           CR-19-2617-TUC-SHR
RELEASE NUMBER:    2024-052_Martinez, Jr.

# # #

For more information on the U.S. Attorney’s Office, District of Arizona, visit http://www.justice.gov/usao/az/
Follow the U.S. Attorney’s Office, District of Arizona, on X @USAO_AZ for the latest news.

2024-052_Martinez, Jr.

Former Border Patrol Agent Sentenced to 18 Years in Prison for Drug Smuggling and Bribery

Source: US FBI

TUCSON, Ariz. – Carlos Victor Passapera Pinott, 56, of Buckeye, was sentenced last week by United States District Judge Jennifer G. Zipps to 18 years in prison, followed by five years of supervised release. Passapera pleaded guilty to Bribery of a Public Official and Conspiracy to Possess with Intent to Distribute Cocaine, Fentanyl, and Heroin on June 23, 2023. 

On August 9, 2020, while working as a United States Border Patrol Agent, Passapera drove his Border Patrol vehicle into the desert, west of the Lukeville Port of Entry, and retrieved two large duffel bags. Passapera then changed vehicles and transported the duffel bags to the Phoenix Sky Harbor International Airport, where he parked and loaded the bags into the vehicle of a co-conspirator. The co-conspirator was stopped by law enforcement shortly after leaving the airport parking lot. A search of the two duffel bags revealed multiple packages of cocaine, fentanyl, and heroin. Approximately 21 kilograms of cocaine, one kilogram of fentanyl, and one kilogram of heroin were seized. An additional $311,100 in U.S. currency was seized from Passapera’s safe deposit box. Passapera admitted to accepting large cash payments in exchange for using his position to smuggle drugs.

“Defendant Passapera has betrayed his Border Patrol colleagues,” said United States Attorney Gary Restaino. “The Border Patrol has earned the trust of a grateful nation for its exemplary efforts to protect the border and to humanely process the migrants who come to America for a better life. Defendant’s actions threaten that trust, and violated his oath to faithfully discharge his duties as a law enforcement officer.”

“The citizens of Arizona are the true victims of this crime. Passapera was a trusted agent who took an oath to protect our border and keep drugs out. He broke that oath when he chose money over honor to transport and distribute drugs in this country,” said FBI Phoenix Special Agent in Charge Akil Davis. “We hope this sentence demonstrates that corruption does not pay, and the FBI will continue to investigate and pursue those who abuse their positions.”

“A Border Patrol agent using his position to smuggle fentanyl and heroin into the United States is unconscionable” said DHS Inspector General, Dr. Joseph V. Cuffari. “Today’s sentencing sends a clear message that government officials who betray the people they are meant to protect are held accountable.”

Two individuals pleaded guilty in 2022 and were sentenced for Bribery of a Public Official charges related to this case. Omar Natalio Martinez Fontes pleaded guilty to Conspiracy to Commit Bribery and Alien Smuggling. Fontes received time served after serving over two years in custody (CR-21-00792-TUC-JGZ). Luis Alfredo Quintero-Gonzalez also pleaded guilty to Conspiracy to Commit Bribery and Alien Smuggling. Quintero-Gonzalez received time served after serving over 22 months in custody (CR-21-01529-TUC-JGZ).

The investigation was conducted primarily by the Southern Arizona Border Corruption Task Force (composed of the Federal Bureau of Investigation, Department of Homeland Security Office of Inspector General, Immigration and Customs Enforcement Office of Professional Responsibility, Customs and Border Protection Office of Professional Responsibility, and Tucson Police Department), Drug Enforcement Administration, Native Task Force, Maricopa County Sheriff’s Office, and Surprise Police Department.  The United States Attorney’s Office, District of Arizona, Tucson, handled the prosecution.
 

CASE NUMBER:           CR-20-01706-TUC-JGZ
RELEASE NUMBER:    2024-050_Passapera

# # #

For more information on the U.S. Attorney’s Office, District of Arizona, visit http://www.justice.gov/usao/az/
Follow the U.S. Attorney’s Office, District of Arizona, on X @USAO_AZ for the latest news.

Tucson Man Pleads Guilty to Mass Shooting Threat at University of Arizona

Source: US FBI

TUCSON, Ariz. – Michael Pengchung Lee, 27, of Tucson, pleaded guilty on Wednesday to Interstate Threats for transmitting threats through interstate communications to commit a mass shooting at the University of Arizona. Sentencing is scheduled for July 3, 2024, before United States District Judge Rosemary Márquez.

The complaint alleged that on October 23, 2023, Lee made threats to commit a mass shooting at the University of Arizona in a group chat on Snapchat. Lee is not a student at the university, but expressed a desire to get revenge on “all the chads and stacies!!” “Chads” and “stacies” are commonly used terms by self-described involuntary celibates (incels). Lee made further reference to incel ideology and finished the conversation by stating “im gonna do it guys, my mind is made up and there’s nothing u can do or say to stop me.”

On Wednesday, Lee admitted that on October 22, 2023, he sent multiple Snapchat messages to a group chat threatening to commit a mass shooting at the University of Arizona. Lee further admitted that in those messages he referenced incel ideology, language, and motivations, including referring to a well-known, self-identified incel and mass shooter, amongst other incel references. Lee also admitted that in at least two other Snapchat conversations, he threatened to commit a mass shooting at the university, citing the same incel ideology and motivations.

A conviction for Interstate Threats carries a maximum penalty of five years in prison, a fine of $250,000, or both, and a maximum term of three years of supervised release.

“We must protect the intellectual rigor, diversity and safety of our universities,” said United States Attorney Gary Restaino.  “Robust intervention and prosecution of misogynists who threaten young students is critical to public safety.  Our thanks to the community members who reported the threats and to our law enforcement partners at the University of Arizona Police Department and the Federal Bureau of Investigation for their quick and decisive response to social media intimidation.”

“All students deserve to feel safe at their schools, and threats like these deprive students of that right. We are extremely grateful for the brave members of the community who spoke up with their concerns and reported this to law enforcement,” said FBI Phoenix Special Agent in Charge Akil Davis. “We would like to thank our partners at the University of Arizona and the FBI’s Southern Arizona Violent Crime and Gang Task Force (SAVCGTF) for their collective efforts to ensure our college campuses remain a safe space for students to continue their education free of fear and hate.”

“This case is a wonderful example of our strong partnership with the Federal Bureau of Investigation and the U.S. Attorney’s Office,” said University of Arizona Police Chief Chris Olson. “It also illustrates the sense of urgency in which the University of Arizona Police Department, the UA Office of Public Safety, and our federal partners will act when our community is threatened.”

The Federal Bureau of Investigation and the University of Arizona Police Department, as part of the FBI’s Southern Arizona Violent Crime and Gang Task Force, conducted the investigation in this case. Assistant U.S. Attorney Adam Rossi, District of Arizona, Tucson, is handling the prosecution.
 

CASE NUMBER:           CR-23-01694-TUC-RM
RELEASE NUMBER:    2024-049_Lee

# # #

For more information on the U.S. Attorney’s Office, District of Arizona, visit http://www.justice.gov/usao/az/
Follow the U.S. Attorney’s Office, District of Arizona, on X @USAO_AZ for the latest news.

Russian Nationals Admit to Illegally Sending Controlled Aviation Technology to Russia

Source: US FBI

Defendants Orchestrated More Than $4.5 Million in Unlawful Transactions, Sold Sensitive Aircraft Parts to Russian Companies

Two Russian nationals pleaded guilty this week to conspiracy to violate the Export Control Reform Act (ECRA) in connection with a scheme to acquire and unlawfully export controlled aviation technology to Russian end users. One of the defendants, Oleg Sergeyevhich Patsulya, also pleaded guilty to conspiracy to commit international money laundering.

According to court documents, Patsulya and Vasilii Sergeyevich Besedin, both of whom reside in Miami-Dade County, Florida, conspired with each other and several others to evade U.S. export laws and regulations to send aircraft technology from the United States to Russia. According to court documents, the unlawful scheme began in or about May 2022, in the wake of Russia’s most recent invasion of Ukraine and enhanced U.S. sanctions on Russia.

“These defendants smuggled sensitive aircraft technology into Russia following its unprovoked invasion of Ukraine and did so in violation of laws designed to protect America’s national security,” said Attorney General Merrick B. Garland. “Today’s guilty pleas reflect the seriousness with which the Justice Department approaches violations of the law that endanger the United States and benefit our adversaries.”

“Make no mistake, threats to U.S. economic security are threats to our national security,” said FBI Director Christopher Wray. “When adversaries steal our technology to strengthen their economies, American industry suffers. The FBI and our Disruptive Technology Strike Force partners remain steadfast in our commitment to protect U.S. jobs and innovation by preventing the illegal export of sensitive technology.”

“By their own admission, the defendants fraudulently procured millions of dollars’ worth of U.S.-origin aircraft equipment to smuggle  to Russian airline companies,” said Assistant Attorney General Matthew G. Olsen of the Justice Department’s National Security Division. “These pleas are the latest example of the Department’s commitment to bringing to justice those whose crimes enrich the Russian regime.”

“Disrupting the illegal export of sensitive American goods and technologies to sanctioned foreign actors is a critical priority requiring a whole-of-government approach,” said U.S. Attorney Gary Restaino for the District of Arizona. “This case has been a textbook example of how a collaborative strike force can work together effectively and nimbly to dismantle a sanctions-evading scheme and to prosecute those individuals who profit from it.”

“These guilty pleas are just the latest demonstration of our unwavering commitment to supporting the people of Ukraine and stopping those who attempt to prop up the Russian aviation sector,” said Assistant Secretary for Export Enforcement Matthew S. Axelrod. “We continue to take aggressive enforcement against those who violate our Russia controls, including those who lie about the identities of their customers in attempts to conceal Russia as the true destination for their goods.”

Beginning in or about May 2022 through on or about May 11, 2023, Patsulya and Besedin conspired with each other and several others to obtain orders for various aircraft parts and components from Russian buyers – primarily commercial airline companies – and then fulfill those requests by acquiring the parts from the United States suppliers, including a supplier based in Arizona, and unlawfully exporting the parts to Russia. The defendants admitted to knowing the items were controlled and required a license from the Department of Commerce to export.

For example, the defendants conspired to export multiple shipments of a carbon disc brake system used on Boeing 737 aircraft. When they contacted various U.S. suppliers in efforts to obtain the brake system, Besedin and Patsulya provided false information that the parts were intended for countries other than Russia. The United States was able to detain, prior to export, multiple shipments made by the defendants containing units of the brake assembly technology.

Besedin and Patsulya further admitted that they attempted to conceal the illegal exports and avoid detection by law enforcement, including by making false representations about the identities of their true customers and using straw buyer-companies located overseas to obscure the origin of revenue. For example, on Sept. 8, 2022, Besedin and Patsulya traveled to Arizona to close a deal with a U.S. company, in which the defendants sought to purchase units of the brake assembly technology. During their discussions with the company, the defendants misrepresented that the aircraft parts were going to be exported to Turkey, when they were in fact destined for Russia. The defendants made false statements both orally to the company and in the export compliance forms. In connection with this transaction, the defendants received money from a Russian airline company to make the purchase. The funds were transferred to Patsulya’s American bank account from a Turkish bank account which had previously received the money from Russia.

In total, throughout the conspiracy, American bank accounts associated with MIC P&I LLC, a company controlled by Patsulya, received at least $4,582,288 sent from Russian airline companies through Turkish bank accounts to purchase aircraft parts and components intended for unlawful export. As part of Patsulya’s plea, he agreed to forfeit, among other assets, a sum of money equal to $4,582,288.

Both Besedin and Patsulya pleaded guilty to conspiracy to export items from the United States without a license in violation of the Export Control Reform Act, which carries a maximum penalty of 20 years in prison. Patsulya additionally pleaded guilty to one count of conspiracy to commit international money laundering, which carries a maximum penalty of 20 years in prison. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors. Sentencing is scheduled for June 17.

The BIS Phoenix Field Office and the FBI Phoenix Field Office are conducting the joint investigation. The BIS Boston Field Office, FBI Miami Field Office, HSI Phoenix Field Office, Customs and Border Protection-Phoenix Field Office, and the U.S. Marshals Office in Miami provided valuable assistance.

Assistant U.S. Attorneys Todd M. Allison and William G. Voit for the District of Arizona and Trial Attorney Christopher M. Rigali of the National Security Division’s Counterintelligence and Export Control Section are prosecuting the case. The U.S. Attorney’s Office for the Southern District of Florida provided valuable assistance.

Today’s actions were coordinated through the Justice and Commerce Departments’ Disruptive Technology Strike Force and the Justice Department’s Task Force KleptoCapture. The Disruptive Technology Strike Force is an interagency law enforcement strike force co-led by the Departments of Justice and Commerce designed to target illicit actors, protect supply chains, and prevent critical technology from being acquired by authoritarian regimes and hostile nation states. Task Force KleptoCapture is an interagency law enforcement task force dedicated to enforcing the sweeping sanctions, export restrictions and economic countermeasures that the United States has imposed, along with its allies and partners, in response to Russia’s unprovoked military invasion of Ukraine.