Columbus Woman Sentenced to More Than 23 Years in Prison for Kidnapping Infant Twins

Source: US FBI

COLUMBUS, Ohio – A Columbus woman was sentenced in U.S. District Court today to 280 months in prison for two counts of kidnapping a minor.

Nalah T. Jackson, 26, kidnapped two infants in December 2022 and traveled interstate with one of them.

“Jackson left one five-month-old twin baby alone and strapped in a car seat in an airport parking lot in subzero temperatures. Then, she left the other twin baby strapped in his car seat in an abandoned vehicle in another state. Even if her crime had started as a crime of opportunity to steal a running vehicle, Jackson’s blatant disregard for the lives of two helpless infants is heinous,” said U.S. Attorney Kenneth L. Parker. “Today’s sentence represents the serious and significant nature of harm Jackson caused to these children and our community.”

According to court documents, close to 10pm on the night of Dec. 19, Jackson walked out of Donatos Pizza on North High Street in Columbus and drove away in a black Honda Accord that had been left running in the parking lot. Two twin five-month-old infants were buckled in the back seat. The infants’ mother was inside Donatos to pick up a delivery order at the time.

Over the next several hours, Jackson drove from Columbus to Dayton and to various other locations in central and western Ohio.

Jackson arrived at the Dayton International Airport close to 3am. She parked in an economy lot and left the infants in the car while she entered the airport. Jackson attempted to hire an Uber to find the stolen car in the economy lot, but could not pay, and ultimately found the stolen car on foot. After finding the vehicle, Jackson left one of the infants in the parking lot at approximately 4am. A passerby parking their vehicle saw the baby in his car seat wrapped in a quilt between two vehicles and alerted security.

After Jackson left the Dayton International Airport parking lot at high speeds, she traveled to Indianapolis with the second baby still in the vehicle.

She arrived at a Papa Johns Pizza on Indiana Avenue near the university district at approximately 8am on Dec. 20, and exited the stolen car on foot. She never returned to the vehicle, leaving the second baby strapped in his car seat in the back seat of the car.

The baby remained strapped in the car seat for the next two-and-a-half-days while family members, concerned citizens and law enforcement officers continued to search for him.

By happenstance, an Indianapolis woman encountered Jackson after she abandoned the stolen vehicle on Dec. 20. Jackson was selling stolen merchandise outside of a local gas station. The woman gave Jackson a ride to a nearby shopping plaza and gave Jackson her cell phone number in case Jackson came across any more holiday gifts for resale.

That night, the woman noticed several social media posts regarding the kidnapping and recognized Jackson as the alleged kidnapper. The woman called her cousin, and together they formulated a plan to meet up with Jackson to confirm her identity, recover the infant if possible and lead Jackson to law enforcement.

On Dec. 22, the women met up with Jackson, whom they traced to a local residence through a phone number Jackson had previously used to call one of them. The women confirmed that Jackson was the same person identified as the kidnapping suspect and drove her to several shopping centers in Indianapolis, all-the-while surreptitiously attempting to contact law enforcement in Columbus and Indianapolis.

Eventually, one of the women was able to route local law enforcement to their vehicle over the phone by pretending that she was speaking with her boyfriend and providing updates on her location. The women tried to signal to Indianapolis police that Jackson was the kidnapping suspect, and eventually told officers when they were removed from Jackson’s immediate presence.  Jackson provided a false name and another individual’s identification card to the officers. After some time, the officers confirmed Jackson’s identity and arrested her for kidnapping. After the arrest, they let the two women go without interviewing them about their time spent with Jackson.

The two women decided to continue searching for the missing infant. They discovered a bus schedule that Jackson left behind in the backseat of their vehicle and decided to focus their search on a bus route near the university district.

While driving around searching that area to no avail, and with driving conditions worsening quickly due to an impending snowstorm, the women decided to get something to eat before heading home. As they were pulling into a Blaze Pizza, they noticed a black Honda Accord at the nearby Papa Johns and noticed snow had already accumulated on the car.

They drove up to the stolen car and attempted to open the back door, which was locked. The driver’s door did open. Due to an overwhelming foul smell coming from the car, and the silence of the baby, one of the women screamed, assuming the baby was deceased. Upon hearing the scream, the baby alerted and began crying. One of the women removed the baby from his car seat and began comforting him.

The women then noticed an empty Indianapolis police cruiser parked nearby and began looking for officers, who they found on their lunch break inside the Blaze Pizza. Indianapolis police then relocated to Papa Johns Pizza and took custody of the baby, taking him to a local hospital. The infant was treated for dehydration, heart abnormalities due to the dehydration, extreme diaper rash and skin deterioration due to him being buckled in a car seat for three days while sitting in his own excrement.

Jackson was charged federally in January 2023.

U.S. Attorney Parker acknowledged the numerous law enforcement agencies who have assisted in this case, including FBI offices in Columbus, Dayton and Indianapolis; the Columbus, Dayton, Huber Heights, Riverside, Vandalia, Dayton International Airport and Indianapolis police departments; the Montgomery County Sheriff’s Office; Ohio State Highway Patrol and U.S. Marshals Service’s Southern Ohio Fugitive Apprehension Strike Team (SOFAST).

Assistant United States Attorneys Emily K. Czerniejewski and Noah R. Litton are representing the United States in this case.

# # #

Former Police Lieutenant and Son Sentenced to a Combined 14 Years in Prison for Drug Trafficking Crimes

Source: US FBI

RALEIGH, N.C. – Charles Page, age 52, and his son Treyvon Ladonte Page, age 29, were sentenced to 48 months and 120 months in prison, respectively, for their drug trafficking crimes in 2021 and 2022. At the time of Charles Page’s crimes, he was a law enforcement officer with the Ayden Police Department.

“This police lieutenant, a 13-year veteran of the force, used his official position to access confidential databases and share intelligence to advance his son’s drug trafficking,” said U.S. Attorney Michael F. Easley, Jr.  “We won’t tolerate public officials breaching the public’s trust to help criminals, whether they are family or not.  When law enforcement officers breach the public’s trust it undermines the rule of law and puts the entire community at risk.  Many thanks to the FBI and the countless other honest officers who worked tirelessly to bring this scheme to light.”

According to court documents and other information presented in court, in July of 2021, law enforcement received information that Treyvon Page was distributing cocaine, heroin, fentanyl, and marijuana in Pitt County. Law enforcement launched an investigation that included conducting 15 controlled purchases from Treyvon Page between November 2021 and August of 2022. The purchases consisted of varying amounts of heroin and fentanyl, cocaine, and methamphetamine.

In 2022, surveillance showed that Treyvon Page was visiting a residence in Grifton, close in time to the controlled purchases occurring. The residence belonged to his father, Charles Page, who was serving as a lieutenant with the Ayden Police Department at the time.

On September 20, 2022, law enforcement executed several search warrants across Pitt County in conjunction with the ongoing investigation. A search warrant was executed at Charles Page’s house and the following items were seized: 167 grams of pure methamphetamine; 72 grams of cocaine; 15 grams of cocaine base (crack); and three shotguns.

As part of the investigation, law enforcement conducted interviews with several cooperating sources and defendants. These interviews revealed that Charles Page was aware of Treyvon’s drug trafficking and that Treyvon would often contact his dad for confidential law enforcement information related to drug trafficking investigations.  A search of Charles Page’s phone corroborated this information. In several instances, Charles Page advised Treyvon Page whether Treyvon had active warrants and told Treyvon confidential information from investigations, such as the identity of victims.

Charles Page resigned from his law enforcement position shortly after the search warrant was executed. Additionally, continued investigation revealed that Charles Page repeatedly queried Treyvon’s name and Treyvon’s drug dealing associates across confidential law enforcement databases in violation of North Carolina law.

Michael F. Easley, Jr., U.S. Attorney for the Eastern District of North Carolina made the announcement after sentencing by U.S. District Judge Louise W. Flanagan. Agencies involved in the investigation include the Federal Bureau of Investigation, the N.C. State Bureau of Investigation, the N.C. State Highway Patrol, the Pitt, Jones and Onslow County Sheriff’s Offices, the Jacksonville and Greenville Police Departments, and the Greenville Regional Drug Taskforce.

Related court documents and information can be found on the website of the U.S. District Court for the Eastern District of North Carolina or on PACER by searching for case number: 4:22-CR-00050-FL.

Charlotte Jury Convicts Armed Bank Robber

Source: US FBI

CHARLOTTE, N.C. – A Charlotte jury returned a guilty verdict today against Kendall Charles Alexander, Sr., 60, of Baltimore, Maryland, for the armed robbery of a Bank of America branch, announced Dena J. King, U.S. Attorney for the Western District of North Carolina.

Robert M. DeWitt, Special Agent in Charge of the Federal Bureau of Investigation (FBI) in North Carolina, and Chief Johnny Jennings of the Charlotte Mecklenburg Police Department, join U.S. Attorney King in making today’s announcement.

According to filed court documents and evidence presented at trial, on October 15, 2021, at approximately 10 a.m., Alexander and his co-defendant, Derrius Fleming, robbed at gunpoint the Bank of America branch located at 212 Iverson Way in the Southend area of Charlotte. Trial evidence established that Alexander entered the bank holding a loaded semi-automatic rifle.  Fleming went directly to an unarmed security guard at the corner of the building and forced her inside at gunpoint with his loaded semi-automatic rifle. Once inside, Alexander and Fleming threatened to kill the employees and customers if they did not comply with their demands. The victims were ordered to the ground and Alexander ordered the manager to open the vault room and the vault. Alexander loaded a bag with the money from the vault while Fleming kept watch over the victims.

According to trial evidence, using GPS tracking, law enforcement tracked Alexander and Fleming who had met up with a third individual. Alexander and Fleming attempted to burn their getaway car and got into the car with the third man. Ultimately, the robbers crashed that vehicle, at which point Alexander and Fleming fled on foot across I-77. All of the stolen money was recovered from a bag dropped by Alexander.

The jury convicted Alexander of armed bank robbery with forced accompaniment, brandishing a rifle, including a short-barreled rifle, in furtherance of a crime of violence, and possession of a firearm by a convicted felon. Alexander has prior convictions for attempted murder of a federal officer, use of a firearm in commission of a felony, possession and discharge of a firearm during a crime of violence, and armed bank robbery. He was also on federal supervised release for committing a bank robbery in Maryland. Because of his violent criminal history, Alexander faces a mandatory sentence of life in prison.

Alexander will remain in federal custody pending sentencing. A sentencing date has not been set.

Fleming has pleaded guilty to brandishing a short-barreled rifle in furtherance of a crime of violence and been sentenced to ten years in prison.

In making today’s announcement, U.S. Attorney King thanked the FBI and CMPD for their investigation of the case.

Assistant U.S. Attorneys Erik Lindahl and David Kelly are prosecuting the case.

This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.

Second Whiteville Man Sentenced to Nearly Six Years in Prison for Gunfire That Injured Pregnant Woman

Source: US FBI

RALEIGH, N.C. – A Whiteville man was sentenced to 71 months in prison for possessing a firearm by a felon.  On October 17, 2024, Robert Jamar Avant pled guilty to the charges.

“This reckless shootout, adjacent to t-ball fields where hundreds of kids and parents were playing, left a pregnant woman shot and enduring an emergency c-section to save her baby.  It is a miracle the baby survived, and the Whiteville Police Department deserves credit for their swift action on this case,” said U.S. Attorney Michael F. Easley, Jr.  “We’ve cemented firm partnerships with local law enforcement throughout Eastern North Carolina to shut down senseless violence that degrades communities and puts innocent lives at risk.  Those partnerships led to a statutory maximum sentence against one of the shooters.  We won’t stop fighting for our communities until every kid lives free from gun violence.”

According to court records and evidence presented to the court, Robert Avant, 33, and his co-defendant, Dashaud Maultsby, opened fire on a group of men at the Sandy Ridge Apartment Complex in Whiteville on May 13, 2021. The incident began when Maultsby got into an argument with his girlfriend while at the apartment complex. After leaving the area, he returned with Avant and they began firing AR-15 rifles at an unidentified group of men, who then returned fire. Avant retreated to his vehicle while Maultsby continued shooting as he also moved towards the vehicle. In the process, Maultsby attempted to shoot with one hand as he got into the vehicle, but his rifle fell and discharged accidentally, hitting Avant in the head.

The Whiteville Police Department (WPD) responded swiftly to the scene and found Avant injured from the gunshot wound while sitting in his vehicle. As officers tended to Avant, they noticed and secured his AR-15 rifle and a pistol that were located near his leg. Avant was a convicted felon and prohibited from possessing firearms.  Avant was taken to a local hospital for treatment. Additionally, a pregnant woman was shot in the torso during the incident, which necessitated an emergency cesarean section to save her child’s life. Following the events, WPD officers apprehended Maultsby and Avant.

On June 6, 2024, Maultsby was sentenced to 10 years, the maximum sentence allowed by statute. His criminal history includes a prior conviction for attempted trafficking of opium.

This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.

Michael F. Easley, Jr., U.S. Attorney for the Eastern District of North Carolina made the announcement after sentencing by U.S. District Judge Louise W. Flanagan. The Federal Bureau of Investigation (FBI) and Whiteville Police Department investigated the case and Assistant U.S. Attorney Jaren E. Kelly is prosecuted the case.

Related court documents and information can be found on the website of the U.S. District Court for the Eastern District of North Carolina or on PACER by searching for the case number 7:23-cr-00087.

Armed Robber From New York Sentenced to 10 Years

Source: US FBI

RALEIGH, N.C. – A New York man was sentenced to 120 months in prison for robbing Lowest Price Tobacco and Vape in Knightdale.  On September 19, 2024, Mekhi Marquise Hooi pled guilty to Hobbs Act Robbery and brandishing a firearm in furtherance of a crime of violence.

According to court documents and other information presented in court, Mekhi Hooi, 20, entered the Lowest Price Tobacco and Vape in Knightdale. Hooi then charged the clerk while brandishing a 9mm firearm, and demanding the clerk put money and tobacco products in a bag.  During the robbery, Hooi threatened to shoot the clerk if he did not move faster. Hooi fled the scene and was ultimately apprehended in New York City and extradited to North Carolina to face his charges here.

Michael F. Easley, Jr., U.S. Attorney for the Eastern District of North Carolina made the announcement after sentencing by U.S. District Judge James C. Dever III. The Federal Bureau of Investigation and the Knightdale Police Department investigated the case and Assistant U.S. Attorney Charles E. Loeser prosecuted the case.

Related court documents and information can be found on the website of the U.S. District Court for the Eastern District of North Carolina or on PACER by searching for Case No. 5:24-CR-62-D-RN.

Man Arrested After Threats to ‘Hunt Down’ Corporate Executives and Their Families

Source: US FBI

RALEIGH, N.C. – A Wendell man was arrested on a criminal complaint for the interstate communication of threats toward executives at Advanced Auto Parts.

“Whether targeting a kid in a classroom or a boss in a boardroom, we won’t normalize violent threats meant to intimidate workers or strike fear in families.  Threats to kill are not how we resolve differences in America, and it’s a federal crime,” said U.S. Attorney Michael F. Easley, Jr.  “We’ll take swift action against anyone threatening an American anywhere in the world for what they believe, how they pray, or where they work.  Period.”  

According to court documents, on December 6, 2024, the Federal Bureau of Investigation (FBI) was contacted by Advance Auto Parts about threatening messages sent through the company’s website demanding the company change the “moron who administrates your app and webpage” and provided a deadline of December 25. If the company did not comply, the customer stated threats such as: 

“I live in Raleigh and am an expert sniper…I vow that I will hunt down your entire executive board and put bullets in their FAMILIES…there will be no stopping me from punishing your executives by murdering their families for refusing to improve the accuracy of your website search function.”

The complaint alleges that, through investigative means, law enforcement determined that Edward Scott Huffman, 46 of Wendell, sent the messages.  The complaint alleges that Huffman was interviewed and admitted to sending the messages. The complaint further alleges that, during a search of Huffman’s cellphone, law enforcement found a picture of a rifle mounted with a scope and a text message conversation in which Huffman stated he would have murdered UnitedHealthcare CEO, Brian Thompson, if he was given $50,000 and a rifle that couldn’t be traced back to him.

Huffman is charged with one count of transmitting a threat in interstate commerce. If convicted, he faces a maximum penalty of five years in prison.

Michael F. Easley, Jr., U.S. Attorney for the Eastern District of North Carolina made the announcement. The FBI and Wendell Police Department are investigating the case and Assistant U.S. Attorney Leonard Champaign is prosecuting the case.

A copy of this press release is located on our website.

A criminal complaint is merely an accusation. The defendant is presumed innocent until proven guilty.

Six Defendants Sentenced to Prison for Corruption at Rikers Island

Source: US FBI

Matthew Podolsky, the Acting United States Attorney for the Southern District of New York, announced the sentences imposed on former Rikers Island corrections officers JASON SKEET, CHANTAL DE LOS SANTOS, and STEPHANIE DAVILA; former Rikers Island program counselor SHANEQUA WASHINGTON; former Rikers Island contractor KENNETH WEBSTER; and former Rikers Island inmate KRISTOPHER FRANCISCO, each for conspiring to commit honest services wire fraud in connection with their involvement in corruption at Rikers Island.  The last of the defendants to be sentenced, DAVILA, was sentenced to 12 months and a day in prison today by U.S. District Judge Lorna G. Schofield.  The remaining five defendants were previously sentenced to terms of prison ranging from 12 months to 40 months. 

Acting U.S. Attorney Matthew Podolsky said: “The defendants—former Rikers Island employees, a Rikers Island contractor, and an inmate—engaged in corruption on Rikers Island by agreeing to have contraband smuggled into the Rikers Island jail facilities in exchange for tens of thousands of dollars in bribes.  The defendants’ crimes contributed to a dangerous contraband market within Rikers Island, making Rikers Island less safe for inmates and officers alike.  The sentences imposed in this case demonstrate this Office’s commitment to hold accountable those who criminally abuse their positions of public trust and undermine the security of jails for their own benefit.”

According to the Complaints, Informations, public court filings, and statements made in court:

SKEET, DE LOS SANTOS, DAVILA, WASHINGTON, WEBSTER, and FRANCISCO engaged in conspiracies to smuggle contraband, including, among other things, controlled substances—such as fentanyl, marijuana, and synthetic cannabinoids, commonly known as “K2”—cellphones, and cigarettes, into Rikers Island in exchange for thousands of dollars in bribe payments.  Each of the charged conspiracies involved a Rikers Island insider—either a corrections officer, program counselor, or contractor—who was responsible for smuggling contraband into the facility; a co-conspirator outside of Rikers Island who provided the contraband and/or bribe payments to the insider; and an inmate co-conspirator who received the contraband smuggled by the insider.  The inmate who received the contraband from the insider typically sold at least part of the contraband to other inmates inside Rikers Island, in exchange for thousands of dollars in payments to the inmate or the inmate’s co-conspirators. In particular:

From at least January 2020 through June 2022, SKEET, who was then a corrections officer assigned to the Northern Infirmary Command on Rikers Island, smuggled contraband into Rikers Island approximately 100 times in exchange for more than $45,000.

From at least March 2022 through April 2022, WASHINGTON, who was then a program counselor assigned to the Robert N. Davoren Center on Rikers Island, smuggled contraband into Rikers Island in exchange for approximately $13,000.

From at least May 2022 through September 2022, WEBSTER, who was then an employee of a Rikers Island contractor and a former Rikers Island inmate , smuggled contraband into Rikers Island in exchange for more than $64,000.

From at least March 2022 through June 2022, DE LOS SANTOS, who was then a former Rikers Island corrections officer, passed contraband and made bribe payments to WASHINGTON and WEBSTER, so that they would smuggle the contraband to inmates inside Rikers Island.

From at least July 2021 through August 2021, DAVILA, who was then a former Rikers Island corrections officer, passed contraband and made bribe payments to a Rikers Island corrections officer (“CC-1”), so that CC-1 would smuggle the contraband to FRANCISCO inside Rikers Island.

From at least July 2021 through August 2021, FRANCISCO, who was then an inmate incarcerated in the Anna M. Kross Center on Rikers Island, directed DAVILA to provide bribe payments and contraband to CC-1, so that CC-1 would smuggle contraband to FRANCISCO inside Rikers Island.

*                      *                      *

Each of the defendants pled guilty to one count of conspiracy to commit honest services wire fraud.  A chart containing the sentences that the defendants received is set forth below.

Mr. Podolsky praised the outstanding work of the Federal Bureau of Investigation and the New York City Department of Investigation.

The case is being handled by the Office’s Public Corruption Unit.  Assistant U.S. Attorneys Adam Z. Margulies and Jonathan Rebold are in charge of the prosecution.         

Defendant

Age

Sentence of Imprisonment
Stephanie Davila

31

12 months and a day
Chantal De Los Santos

31

15 months
Kristopher Francisco

29

37 months
Jason Skeet

47

37 months
Shanequa Washington

40

12 months and a day
Kenneth Webster

43

41 months

Irish and U.K. Nationals Charged with Multi-State Construction Fraud That Targeted Vulnerable Homeowners

Source: US FBI

Matthew Podolsky, the Acting United States Attorney for the Southern District of New York, and Leslie R. Backschies, the Acting Assistant Director in Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced today the unsealing of a Complaint in Manhattan federal court charging JAMES DINNIGAN, a/k/a “Charlie Ward,” and MARTIN MAUGHAN, a/k/a “Lawrence Rogers,” with conspiracy to commit wire fraud for their participation in a multi-year, multi-state organized construction fraud scheme that targeted at least 24 victims, including numerous elderly and vulnerable victims. MAUGHAN was transferred from state custody to federal custody this afternoon and will be presented today before U.S. Magistrate Robyn Tarnofsky.  DINNIGAN is in federal immigration custody and will be transferred to the Southern District of New York.  

Acting U.S. Attorney Matthew Podolsky said: “As alleged, these defendants and their co-conspirators carried out a brazen scheme to defraud vulnerable members of our community by posing as legitimate home repair contractors and tricking homeowners into paying for thousands of dollars in unnecessary and unwanted home repairs.  Today’s charges should serve as a reminder that this Office and its law enforcement partners are committed to investigating and bringing to justice those who seek to enrich themselves by victimizing vulnerable members of our community.”

Acting Assistant Director in Charge Leslie R. Backschies said: “James Dinnigan and Martin Maughan allegedly enticed prospective consumers with illegitimate home improvement advertisements before intentionally destroying their property to extort unanticipated additional costs. These illegal foreign nationals allegedly laid the foundation to prey upon a vulnerable population across the northeast, ultimately stealing a significant sum from elderly victims. The FBI remains committed to protecting our citizens from any fraudulent company attempting to cement false promises to garner illicit profits.”

As alleged in the Complaint unsealed today in Manhattan federal court:[1]

Between at least in or around October 2023 through at least in or about February 2025, DINNIGAN and MAUGHAN participated in a construction fraud scheme involving dozens of victims in New York, New Jersey, Connecticut, Pennsylvania, and several other states.  Participants in the scheme were usually foreign nationals from Ireland and the United Kingdom who were illegally in the U.S. and falsely posed as legitimate home repair contractors.

The scheme generally proceeded as follows: To get hired by the victims, members of the scheme made false statements to victims about their operation of legitimate home repair businesses, their occupation as contractors or engineers, and about home improvement and construction projects the victims needed to obtain. After being hired, members of the scheme tricked victims into paying for additional unwanted or unnecessary home repairs and other construction, including by purposefully damaging or destroying the victims’ property. The perpetrators of the scheme then forced victims, including through threats, into paying them tens or even hundreds of thousands of dollars. 

DINNIGAN, MAUGHAN, and other perpetrators of the scheme communicated with victims using cellphones and email.  The victims frequently wrote checks and transferred money to bank accounts controlled by members of the scheme, including into an account at a particular financial institution in Manhattan, New York.  The perpetrators of the scheme also operated websites in the names of at least two purported construction companies:  Local Masonry and Construction and Pine Valley Home Improvements, Inc.  Below are screenshots from websites that the perpetrators used to lure victims into the scheme:

The FBI has identified more than two dozen victims—many who are elderly individuals—who have lost at least $1 million as a result of this scheme. 

DINNIGAN entered the U.S. on or about April 4, 2023, using a tourist visa.  A review of relevant records has revealed no known documentation showing that DINNIGAN departed the U.S. as required, or that DINNIGAN applied for and received authorization to legally remain in the U.S.  On or about February 25, 2025, DINNIGAN was encountered by U.S. Customs and Border Protection (“CBP”) in Champlain, New York.

On or about August 9, 2023, MAUGHAN was encountered by CBP officers in the vicinity of Laredo, Texas.  MAUGHAN was subsequently ordered removed from the U.S. to the United Kingdom on or about October 30, 2023.  According to MAUGHAN’s order of removal, he was prohibited from reentering or attempting to reenter the U.S. for a period of five years.  On or about February 7, 2025, MAUGHAN was found inside the U.S. when he was arrested at the Boston Logan International Airport moments before departing on a flight to Dublin, Ireland. 

If you believe that you have additional information about this scheme or if you believe you have been a victim of the defendants or their co-conspirators, please contact the FBI at tips.fbi.gov, and reference this case.

*               *                *

DINNIGAN, 27, of Ireland, and MAUGHAN, 31, of the United Kingdom, are each charged with one count of conspiracy to commit wire fraud, which carries a maximum term of 20 years in prison. 

The maximum potential sentences in this case are prescribed by Congress and provided here for informational purposes only, as any sentencing of the defendants will be determined by a judge. 

Mr. Podolsky praised the outstanding investigative work of the FBI’s New York and Philadelphia field offices.  Mr. Podolsky also thanked CBP; U.S. Immigration and Customs Enforcement, Enforcement and Removal Operations; Lower Merion Police Department; Cheltenham Police Department; Bernards Township Police Department; and Lambertville Police Department for their assistance in the investigation. 

The case is being prosecuted by the Office’s Violent and Organized Crime Unit. Assistant U.S. Attorney Brandon D. Harper is in charge of the prosecution, with assistance from paralegal specialist William A. Coleman IV.

The charges contained in the Complaint are merely accusations, and the defendants are presumed innocent unless and until proven guilty.


[1] As the introductory phrase signifies, the entirety of the text of the Complaint and the description of the Complaint set forth herein constitute only allegations, and every fact descried therein should be treated as an allegation. 

Ten Chinese Nationals Charged with Large-Scale Hacking of U.S. and International Victims on Behalf of the Chinese Government

Source: US FBI

Eight Defendants Were Employees of i-Soon, a Chinese Company Hacking at the Direction of the Chinese Government, and Two Defendants are Chinese Officials Who Directed the Hacks

Matthew Podolsky, the Acting United States Attorney for the Southern District of New York; Sue J. Bai, the Head of the U.S. Department of Justice’s National Security Division; and Leslie R. Backschies, the Acting Assistant Director in Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced the unsealing of a two-count criminal Indictment charging 10 defendants with a years-long hacking scheme committed through the Chinese company i-Soon.  At the direction of the People’s Republic of China (“PRC”) government, i-Soon employees hacked and attempted to hack victims across the globe, including a large religious organization in the U.S., critics and dissidents of the PRC government, a state legislative body, U.S. government agencies, the ministries of foreign affairs of multiple governments in Asia, and news organizations. i-Soon’s victims were of interest to the PRC government because, among other reasons, they were prominent overseas critics of the PRC government or because the PRC government considered them threatening to the rule of the Chinese Communist Party.  The 10 defendants remain at large.

Acting U.S. Attorney Matthew Podolsky said: “State-sponsored hacking is an acute threat to our community and national security. For years, these 10 defendants—two of whom we allege are PRC officials—used sophisticated hacking techniques to target religious organizations, journalists, and Government agencies, all to gather sensitive information for the use of the PRC. These charges will help stop these state-sponsored hackers and protect our national security. The career prosecutors of this Office and our law enforcement partners will continue to uncover alleged state-sponsored hacking schemes, disrupt them, and bring those responsible to justice.”

National Security Division Head Sue J. Bai said: “The Department of Justice will relentlessly pursue those who threaten our cybersecurity by stealing from our government and our people. Today, we are exposing the Chinese government agents directing and fostering indiscriminate and reckless attacks against computers and networks worldwide, as well as the enabling companies and individual hackers that they have unleashed. We will continue to fight to dismantle this ecosystem of cyber mercenaries and protect our national security.”  

Acting Assistant Director in Charge Leslie R. Backschies said: “The charges announced today expose the PRC’s continued attempts to spy on and silence anyone it deems threatening to the Chinese Communist Party. As alleged in the indictment, the Chinese government tried to conceal its efforts by working through a private company, but their actions amount to years of state-sponsored hacking of religious and media organizations, numerous government agencies in multiple countries, and dissidents around the world who dared criticize the regime. The FBI will continue to work tirelessly to disrupt our adversaries’ use of emerging technology to silence dissent and undermine the rule of law across the globe.”

As alleged in the Indictment:[1]

The PRC’s Ministry of State Security (“MSS”) had responsibility for the PRC’s domestic counterintelligence, non-military foreign intelligence, and aspects of the PRC’s political and domestic security. The PRC’s Ministry of Public Security (“MPS”) had responsibility for the PRC’s public and political security, including responsibility for law enforcement. To acquire information of interest to the PRC government in a manner that obscured their involvement, the PRC’s MSS and MPS used an extensive network of private companies and contractors in China to conduct unauthorized computer intrusions (“hacks”) in the U.S. and elsewhere.

One of those private companies was i-Soon.  From approximately 2016 through 2023, i-Soon and its personnel engaged in the numerous and widespread hacking of email accounts, cell phones, servers, and websites at the direction of, and in close coordination with, the PRC’s MSS and MPS. i-Soon generated tens of millions of dollars in revenue and at times had over 100 employees.

i-Soon’s primary customers were PRC government agencies.  It worked with at least 43 different MSS or MPS bureaus and charged the MSS and MPS between approximately $10,000 and $75,000 for each email inbox it successfully hacked.

The victims of i-Soon’s hacking included:

  • A newspaper based in New York, New York, that publishes news related to China and is opposed to the Chinese Communist Party.
  • An additional newspaper based in New York, New York.
  • The U.S. Defense Intelligence Agency, an agency within the Department of Defense that specializes in defense and military intelligence.
  • The U.S. Department of Commerce and the International Trade Administration, an agency within the Department of Commerce that promotes U.S. exports and defends against unfair trade practices.
  • A religious organization based in the U.S. that has thousands of churches and congregations and millions of members.
  • A Texas-based organization founded by a prominent critic of the PRC government focused on promoting human rights and religious freedom in China.
  • A news service funded by the U.S. government that delivers uncensored domestic news to audiences in Asian countries, including China, and is headquartered in Washington, D.C.
  • A state research university in the U.S.
  • The New York State Assembly, a part of the legislature of the state of New York.
  • A religious leader who lived outside of China and the U.S.
  • A newspaper based in Hong Kong, China, that has actively covered the politics of Hong Kong and continues to do so today.
  • The foreign ministry of Taiwan.
  • The foreign ministry of India.
  • The foreign ministry of South Korea.
  • The foreign ministry of Indonesia.

In many instances, the PRC government was particularly interested in these victims because they had criticized the PRC government.  In other instances, the PRC government was particularly interested in foreign ministries because those foreign ministries were in communication with the U.S.

In some instances, i-Soon conducted its hacking at the direct request of the MSS or MPS. In other instances, i-Soon conducted hacks on its own initiative and then sold, or attempted to sell, the stolen data to different bureaus of the MSS or MPS.

i-Soon also trained MPS employees how to hack independently of i-Soon and offered a variety of hacking methods for sale to its customers.  i-Soon touted what it called a “industry-leading offensive and defensive technology” and a “zero-day vulnerability arsenal” used to successfully hack computer systems.  One of i-Soon’s products was software called the “Automated Penetration Testing Platform.” i-Soon advertised the platform’s ability to send email phishing attacks, to create files with malware that could provide access to victims’ computers if opened, and to clone websites of victims in order to induce them to submit personal information. An image of the interface for the Automated Penetration Testing Platform is below:

Another of i-Soon’s products was software that allowed the user to gain unauthorized access to online accounts or computer systems by deciphering passwords—also called “password cracking.” This platform was called the “Divine Mathematician Password Cracking Platform.” An image of the interface for the Divine Mathematician Password Cracking Platform is below:

i-Soon also sold software specifically designed to target victim accounts on a variety of computer systems and applications, including Microsoft Outlook; Gmail, the email service provided by Google LLC; the social media network X, formerly known as Twitter; the cellphone operating system Android; and the computer operating systems Windows, Macintosh, and Linux. i-Soon advertised its bespoke software as being able to overcome the unique defenses of these systems.

For example, with respect to Twitter, i-Soon sold software with the capability to send a victim a spear phishing link and then to obtain access to and control over the victim’s Twitter account. The software had the ability to access Twitter even without the victim’s password and to bypass multi-factor authentication. After a victim’s Twitter was compromised, the software could send tweets, delete tweets, forward tweets, make comments, and like tweets. The purpose of this software was to help i-Soon’s customers, including the PRC government, use hacked Twitter accounts to understand public opinion outside of China. For example, the software could be set to keep track of keywords appearing in tweets or messages. i-Soon referred to this software as its “Public Opinion Guidance and Control Platform (Overseas).” An image from the “Public Opinion Guidance and Control Platform (Overseas)” is below:

The 10 defendants charged are WU HAIBO, a/k/a “shutd0wn,” a/k/a “Boss Wu,” a/k/a “吴海波,” the Chief Executive Officer, and leader, of i-Soon; CHEN CHENG, a/k/a “lengmo,” a/k/a “Chief C,” a/k/a “Jesse Chen,” a/k/a “陈诚,” the Chief Operating Officer of i-Soon; WANG YAN, a/k/a “crysolo,” a/k/a “王堰,” the leader of one of i-Soon’s “penetration testing” teams; WANG ZHE, a/k/a “ken73224,” a/k/a “王哲,” the Sales Director of i-Soon; ZHOU WEIWEI, a/k/a “nullroot,” a/k/a “周伟伟,” the leader of i-Soon’s “Technology Research and Development Center”; WANG LIYU, a/k/a “PICNIC350116,” a/k/a “王立宇,” an MPS officer based in Chengdu, China; and SHENG JING, a/k/a “sjbible,” “盛晶,” the defendant, an MPS officer based in Shenzhen, China.

If you have information leading to the identification or location of these 10 defendants, please reach out to the Department of State at rewardsforjustice.net.

*               *                *

HAIBO, 43; CHENG, 40; GUODONG, 32; LI, 31; YAN, 35; ZHE, 44; WEIWEI, 37; LIANG, 28; LIYU, 36; and JING, 36, all nationals of China, are charged with conspiracy to commit computer intrusions, which carries a maximum sentence of five years in prison, and conspiracy to commit wire fraud, which carries a maximum sentence of 20 years in prison. 

The maximum potential sentences are prescribed by Congress and are provided here for informational purposes only, as any sentencing of the defendants will be determined by a judge.

Mr. Podolsky praised the outstanding work of the FBI.

The case is being prosecuted by the Office’s Complex Frauds and Cybercrime Unit. Assistant U.S. Attorneys Ryan B. Finkel, Steven J. Kochevar, and Kevin Mead are in charge of the prosecution.  Trial Attorney Gregory J. Nicosia Jr. of the National Security Division’s National Security Cyber Section provided valuable assistance.

The charges contained in the Indictment are merely accusations, and the defendants are presumed innocent unless and until proven guilty.


[1] As the introductory phrase signifies, the entirety of the text of the Indictment, and the description of the Indictment set forth herein, constitutes only allegations, and every fact described therein should be treated as an allegation.

Former Nassau County Police Detective Convicted of Lying to the FBI to Cover Up His Work for the Bonanno Crime Family

Source: US FBI

The Bonanno Crime Family Paid Hector Rosario to Protect Their Illegal Gambling Parlors and Shut Down Rival Locations on Long Island Operated by Other Crime Families

Hector Rosario, a former detective with the Nassau County Police Department (NCPD), was found guilty today by a federal jury in Brooklyn of making false statements to Federal Bureau of Investigation agents about his work for the Bonanno crime family.  The verdict followed a seven-day trial before United States District Judge Eric N. Vitaliano.  Rosario was fired by the NCPD after he was indicted in August 2022.  When sentenced, Rosario faces up to five years in prison.

John J. Durham, United States Attorney for the Eastern District of New York, Leslie R. Backschies, Acting Assistant Director in Charge, Federal Bureau of Investigation, New York Field Office (FBI) and Anne T. Donnelly, District Attorney, Nassau County District Attorney’s Office, announced the verdict.

“This corrupt detective chose to prove his loyalty to an organized crime family over the public he was sworn to protect,” stated United States Attorney Durham. “When police officers exploit their positions for personal gain, it erodes public trust in law enforcement. My Office has zero tolerance for corruption by any public officials, and will continue to work with our law enforcement partners to ensure that it is punished to the fullest extent of the law.”

“Hector Rosario, a former Nassau County detective, allowed himself to be bought by the mob to blatantly lie during a federal investigation into the Bonanno family’s illegal gambling operations,” stated FBI Acting Assistant Director in Charge Backschies. “Rosario’s lies not only protected an organized criminal enterprise, but also eroded the public’s trust in law enforcement and is a disservice to all who wear the badge honoring their oath to protect and serve. The FBI remains committed to disrupting any corrupt officer who prioritizes personal wealth over integrity to the shield.”

“Hector Rosario cared more about lining his pockets with Bonanno family money and protecting his own interests than his fidelity to the law,” stated Nassau County District Attorney Donnelly.  “He disgracefully compromised the investigative work of his fellow detectives by tipping off a target and lied to federal agents as the walls were closing in on him. Together with our law enforcement partners, we will uncover and vigorously prosecute corruption in our law enforcement ranks in Nassau County, because no one is above the law.”

As proven at trial, Rosario was paid by the Bonanno crime family to protect its illegal gambling operations. For over a decade, the Bonanno crime family operated illegal gambling businesses inside various coffee shops and sports clubs throughout Queens and on Long Island.  During the same period, the Genovese organized crime family operated illegal gambling businesses out of their own locations in Queens and Long Island, including Sal’s Shoe Repair in Merrick, New York, and the Centro Calcio Italiano Club in West Babylon, New York.

The Bonanno organized crime family paid Rosario to attempt to shut down rival gambling parlors, including by conducting a fake police “raid” on the Genovese-run gambling spot located inside Sal’s Shoe Repair.  Rosario also provided a tip about a rival gambling spot to another detective in an attempt to get the location shut down.  He warned a Bonanno crime family associate that he was under investigation and not to speak on the phone because law enforcement might be listening, and Rosario also looked up the home address of a possible witness Rosario believed was cooperating against the Bonanno crime family.

In January 2020, during the course of a federal grand jury investigation into the racketeering activities of the Bonanno and Genovese organized crime families, Rosario was interviewed by FBI agents. Rosario falsely stated that he had no information about the Mafia or illegal gambling spots.  He denied knowing the identity of the crime family associate he had warned, and he further falsely stated that he was not familiar with the gambling business inside Sal’s Shoe Repair.

Rosario was acquitted by the jury of obstruction of justice.

The government’s case is being handled by the Office’s Organized Crime and Gangs Section.  Assistant United States Attorneys Anna L. Karamigios, Sophia M. Suarez and Sean M. Sherman are in charge of the prosecution, with the assistance of Paralegal Specialist Eleanor Jaffe-Pachuilo.

The Defendant:

HECTOR ROSARIO
Age:  51
Mineola, Long Island

E.D.N.Y. Docket No. 22-CR-355 (ENV)