Albuquerque Man Sentenced for Sexual Exploitation of Minor and Child Pornography Production

Source: US FBI

ALBUQUERQUE – An Albuquerque man was sentenced to 25 years in prison for sexually exploiting a 13-year-old girl and producing child pornography.

There is no parole in the federal system.

According to court records, Kevin Vallo, 41, was on supervised released after serving a sentence for first degree murder when he used the social media app, Telegram, to communicate with Jane Doe, a 13-year-old girl, while falsely claiming to be 16 years old. On February 19, 2024, Vallo persuaded Jane Doe and two other minors to visit his Albuquerque apartment where he engaged in sexual acts with Jane Doe and another minor. Vallo also recorded explicit videos of him engaging in sexual acts with Jane Doe. Vallo later sent the explicit videos to Jane Doe via Telegram.

The investigation began when one of the other minors disclosed the abuse during a medical appointment. Law enforcement identified Vallo through witness accounts and executed a search warrant on May 9, 2024, recovering multiple videos of Vallo engaging in sexual acts with Jane Doe from Vallo‘s phone. During a subsequent interview, Vallo admitted to the sexual encounters and to recording the acts.

Vallo was sentenced to an additional 30 months in prison for violating his supervision terms related to the murder charge, for a total of 27 and a half years. Upon his release, Vallo will be subject to a 15-year term of supervised release and must register as a sex offender.

Acting U.S. Attorney Holland S. Kastrin and Raul Bujanda, Special Agent in Charge of the FBI Albuquerque Field Office, made the announcement today.

The FBI Albuquerque Field Office investigated this case with assistance from the Bernalillo County Sheriff’s Office. Assistant United States Attorney Jesse Pecoraro is prosecuting the case as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit Justice.gov/PSC.

Kentucky Man Sentenced to 25 Years in Prison Related to Sextortion Scheme

Source: US FBI

BIRMINGHAM, Ala. – A Kentucky man was sentenced today on a charge of sexual exploitation of children, announced U.S. Attorney Prim F. Escalona and Federal Bureau of Investigation Special Agent in Charge Carlton L. Peeples.

U.S. District Court Judge L. Scott Coogler sentenced Aden Willis Yeager, 22, of Louisville, Kentucky, to 300 months in prison, followed by a life term of supervised release.  As part of his sentence, Yeager was ordered to pay $92,620 in restitution to the victims and a $50,000 special assessment under the Amy, Vicky, and Andy Act. In March, Yeager pleaded guilty to one count of production of child pornography. 

According to the plea agreement, in November 2020, the West Alabama Human Trafficking Task Force received a CyberTipline report from the National Center for Missing and Exploited Children related to acts of sextortion committed by Yeager towards a minor female. Yeager coerced and enticed the minor to send him nude photos of herself, and then he sold the photos online.  When the minor would refuse to send more pictures, Yeager would threaten to send her nude photos to everyone in her contact list on social media. Further investigation revealed over 60 individual folders in Yeager’s Dropbox account that were labeled by female names and contained sexually explicit images and videos. FBI agents were able to positively identify and locate 19 minor females who had been contacted by Yeager to send pornographic photos.

FBI Birmingham’s Child Exploitation and Human Trafficking Task Force investigated the case along with FBI Louisville, Kentucky; the West Alabama Human Trafficking Task Force; and the University of Alabama Police Department. Assistant U.S. Attorney R. Leann White prosecuted the case.

The U.S. Attorney’s Office (USAO) and the National Children’s Advocacy Center (NCAC) have partnered and released a digital series to educate parents and caretakers about sextortion and how they can help prevent kids and teens from being victims. This series offers three-to-five-minute videos about current online safety topics and provides essential information about the true dangers of online activities.

The videos can be accessed from the following locations:

nationalcac.org/sextortion-prevention/

https://www.youtube.com/@nationalcac

If you suspect or become aware of possible sexual exploitation of a child, please contact law enforcement. To alert the FBI Birmingham Office, call 205-326-6166. Reports can also be filed with the National Center for Missing & Exploited Children (NCMEC) or online at www.cybertipline.org.

The case was brought as part of Project Safe Childhood, a nationwide initiative launched by the Department of Justice in May 2006 to combat the growing epidemic of child sexual exploitation and abuse.  Led by U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, and to identify and rescue victims.  For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov.

Alabama Man Pleads Guilty to Violating Iran Sanctions

Source: US FBI

BIRMINGHAM, Ala. – Ray Hunt, also known as Abdolrahman Hantoosh, Rahman Hantoosh and Rahman Natooshas, 70, of Owens Cross Roads, pleaded guilty today to conspiracy to export U.S.-origin goods to the Islamic Republic of Iran in violation of trade sanctions.

According to court documents, in May 2014, Hunt registered Vega Tools, LLC with the Alabama Secretary of State, listing the nature of the business as “the purchase/resale of equipment for the energy sector.” He operated Vega Tools, including purchasing, receiving, and shipping U.S.-origin goods, from locations in Madison County, Alabama. Beginning at least as early as 2015, Hunt conspired with two Iranian companies located in Tehran, Iran, to illegally export U.S.-manufactured industrial equipment for use in Iran’s oil, gas, and petrochemical industries.

Hunt engaged in a series of deceptive practices to avoid detection by U.S. authorities, including using third-party transshipment companies in Turkey and the United Arab Emirates (UAE) and routing payments through UAE banks, as well as lying to shipping companies about the value of his exports to prevent the filing of Electronic Export Information to U.S. authorities. Hunt lied to suppliers and shippers by claiming the items he purchased on behalf of the Iranian co-conspirators were destined for end-users in Turkey and UAE, while knowing the exports were ultimately destined for Iran. Hunt lied also to U.S. Customs and Border Patrol officers regarding the nature and existence of his business when questioned upon his return from a March 2020 trip to Iran.   

Hunt pleaded guilty to a conspiracy charge and faces a maximum penalty of five years in prison. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

The Department of Commerce Bureau of Industry and Security is investigating the case with valuable assistance provided by the FBI. 

Assistant U.S. Attorneys Jonathan “Jack” Harrington, Jonathan Cross, and Henry Cornelius and Trial Attorneys Emma Ellenrieder and Adam Barry of the National Security Division’s Counterintelligence and Export Control Section are prosecuting the case.

Trussville Man Sentenced in Multimillion-Dollar Health Care Fraud Case

Source: US FBI

BIRMINGHAM, Ala. – Another man has been sentenced in a series of cases involving multi-million-dollar health care fraud and kickback conspiracies, announced U.S. Attorney Prim F. Escalona; Federal Bureau of Investigation Special Agent in Charge Carlton L. Peeples; and U.S. Department of Health and Human Services, Office of Inspector General, Special Agent in Charge Tamala E. Miles. 

“This was a crime of greed and indifference to the consequences of the actions to the overall health system,” said U.S. Attorney Prim Escalona. “The crime cost insurers millions of dollars, and it exploited vulnerable patients trying to get appropriate medical care, not run up the tab on insurance. We will continue to fight hard to keep our community safe from serious crimes like this one.”

“Health care fraud is not a victimless crime. It costs U.S. taxpayers millions of dollars every year. It can raise health insurance premiums, expose patients to unnecessary medical procedures, and increase taxes,” said James DeLoatch, Acting Special Agent in Charge of the FBI Birmingham Division. “The FBI is committed to coordinating with our partners and aggressively pursuing those who take advantage of others for their personal gain. This sentencing should serve as a warning to others who might engage in these types of schemes.”

“Kickback arrangements can compromise medical decisions and threaten the integrity of federally funded health care programs,” said Tamala E. Miles, Special Agent in Charge at the U.S. Department of Health and Human Services Office of Inspector General. “Today’s sentence exemplifies our commitment to protecting taxpayer-funded health care programs and the patients they serve.”

Earlier this week, U.S. District Court Judge L. Scott Coogler sentenced John Alan Robson, 41, of Trussville, to 56 months in prison. Robson was also ordered to pay forfeiture of about $1.1 million, and restitution of about $5.3 million. In February 2024, Robson pleaded guilty to health care fraud conspiracy related to his work with Brian Bowman, James Ray, and others.

According to Robson’s plea agreement, Robson knew that insurers would not pay for items or services that had been ordered based on kickbacks or that were medically unnecessary for a patient. Yet Robson received kickbacks—from specialty pharmacies, a nerve conduction testing company, and brace suppliers—to generate medically unnecessary orders and prescriptions from doctors’ offices that would be billed to insurance and reimbursed at high rates.

For example, Robson marketed nerve conduction testing to medical providers for a Huntsville-based company called QBR or Diagnostic Referral Community. QBR paid those providers a flat fee (for example, $50) for each test they ordered that insurance paid for. QBR paid Robson a flat fee for each of those tests, too. QBR paid one of Robson’s medical practices more than $100,000 in per-test kickbacks.

As another example, Robson marketed high-reimbursing topical creams—such as pain creams and scar creams—to providers on behalf of specialty pharmacies like Global Compounding Pharmacy and Watson Rx Solutions. Robson was paid lucrative commissions on the cream prescriptions that he and his team generated and insurance paid for. Robson got prescriptions for himself and family members regardless of whether those topical creams were medically necessary for the patients. Robson and other sales reps got blank pre-signed prescriptions from medical providers, filled out the prescriptions to make sure insurance would pay for them, and even selected the drugs or drug formulations to make sure insurance would pay for them. Robson admitted that federal insurance programs paid millions of dollars for medically unnecessary prescriptions for which Robson, Ray, and Bowman received commissions.

This case is the latest in a series of cases involving health care fraud and kickbacks through pain clinics, specialty pharmacies, and a nerve conduction company in north Alabama.

The FBI and HHS-OIG investigated this case.  Assistant U.S. Attorneys J.B. Ward and Don Long prosecuted the case. 

See related press here:

https://www.justice.gov/usao-ndal/pr/medical-sales-rep-and-former-pain-clinic-owner-sentenced-related-multi-million-dollar

https://www.justice.gov/usao-ndal/pr/pain-clinic-owners-sentenced-unlawfully-distributing-opioids-and-multimillion-dollar

https://www.justice.gov/usao-ndal/pr/etowah-pain-clinic-owner-pleads-guilty-multi-million-dollar-kickback-and-health-care

https://www.justice.gov/usao-ndal/pr/multiple-defendants-sentenced-major-compounding-pharmacy-fraud-conspiracy

https://www.justice.gov/usao-ndal/pr/new-hope-man-sentenced-his-role-multi-million-dollar-kickback-and-health-care-fraud

Convicted Felon Pleads Guilty to Federal Charges in Shooting Incident

Source: US FBI

ALBUQUERQUE – A Zuni man pleaded guilty to federal charges stemming from a violent shooting incident involving the illegal use of a firearm.

According to court records, on the night of September 19, 2024, Devin Wade Wyaco shot John Doe (who was riding a bicycle) from the passenger side of his girlfriend’s vehicle, striking John Doe in the abdomen. Doe was transported to Zuni Hospital and later to the University of New Mexico Hospital for treatment. During an interview with investigators, John Doe identified the vehicle as belonging to Wyaco’s girlfriend. Doe survived the shooting.

Police identified Wyaco, 34, an enrolled member of the Zuni Pueblo, as the shooter through statements from his girlfriend, who admitted being present during the incident and confirmed Wyaco’s involvement. A federal search warrant executed at her residence corroborated her account. In his plea agreement, Wyaco confessed that he fired at John Doe after becoming angry when one of the bicyclists threw a rock at the car. He also admitted that as a previously convicted felon—having prior convictions for possession of cocaine with intent to distribute and aggravated fleeing from a law-enforcement officer—he knowingly possessed a firearm and ammunition in violation of federal law.

Handgun recovered from Wyaco’s girlfriend’s home.

Wyaco pled guilty to all three charges contained in the indictment, including assault with a dangerous weapon, using and carrying a firearm during and in relation to a crime of violence, and being a felon in possession of a firearm.

At sentencing, Wyaco faces no less than 10 years and up to life in prison followed by up to five years of supervised release. Additionally, Wyaco faces up to $250,000 in fines.

Acting U.S. Attorney Holland S. Kastrin and Raul Bujanda, Special Agent in Charge of the FBI Albuquerque Field Office, made the announcement today.

The Gallup Resident Agency of the FBI’s Albuquerque Field Office investigated this case with assistance from the Zuni Police Department. Assistant United States Attorney Zachary C. Jones is prosecuting the case.

Birmingham Home Builder Sentenced for $1.2 Million-Dollar Fraud

Source: US FBI

BIRMINGHAM, Ala. – A Birmingham-area man has been sentenced for defrauding more than a dozen victims whose homes he had promised to build, announced U.S. Attorney Prim F. Escalona and Federal Bureau of Investigation Special Agent in Charge Carlton L. Peeples. 

U.S. District Judge Annemarie Carney Axon sentenced Cecil Wayne Sanford, 58, of Birmingham, to 58 months in prison. Sanford was also ordered to pay forfeiture and restitution of about $1.27 million.  In April 2024, Sanford pleaded guilty to wire fraud. 

According to the plea agreement, Sanford was a residential builder in Alabama who operated through his business, Stone Pointe Builders, LLC. Between 2020 and early 2022, more than a dozen victims in the Birmingham area contracted with Sanford to build their homes and paid Sanford substantial sums of money (tens of thousands of dollars or more). Yet the victims saw little or no work done despite Sanford’s representations, draws on their construction loans, and invoices for construction-related expenses. Sanford made statements to victims about how their funds would be used and then spent the money in other ways. In February 2022, days after closing with a family on a construction contract and collecting more than $27,000 from the family as a down payment, Sanford moved $10,000 into his personal bank account, withdrew it, abruptly closed the business, and left town.

The FBI investigated the case. . The Alabama Home Builders Licensure Board assisted in the investigation.  Assistant U.S. Attorney J. B. Ward prosecuted the case.  

Two Individuals Plead Guilty to Health Care Fraud Conspiracy

Source: US FBI

HUNTSVILLE, Ala. – A former doctor and her wife pleaded guilty today to crimes involving the medical practice they ran in north Alabama for many years.  United States Attorney Prim Escalona, FBI Special Agent in Charge Carlton Peeples, Drug Enforcement Administration Special Agent in Charge Steven L. Hofer, and Special Agent in Charge Tamela Miles of the Department of Health and Human Service Office of the Inspector General Atlanta Region made the announcement.

Francene Aretha Gayle, 50, of Apopka, Florida, pleaded guilty before U.S. District. Judge Liles Burke to five counts of unlawful drug distribution, one count of health care fraud conspiracy, and one count of wire fraud conspiracy. Gayle’s wife, Schara Monique Davis, 48, also of Apopka, pleaded guilty to one count of health care fraud conspiracy and one count of wire fraud conspiracy.

According to the defendants’ plea agreements, between about 2014 and early 2020, Gayle was a doctor who operated a multi-clinic practice in Huntsville, Athens, and Killen. Davis owned the practice and served as business manager. In 2019, the Killen clinic shut down. In March 2020, the Alabama Medical Licensure Commission revoked Gayle’s license, and the other two clinics closed shortly after that.

Gayle admitted that she had unlawfully distributed drugs, including oxycodone, hydrocodone, and methadone.

Gayle and Davis both admitted to having conspired to commit health care fraud for several years by billing insurers for office visits under Gayle’s name even when she did not see the patients, was not in the same building, and sometimes was not in the same town. The defendants knew that the billing scheme was fraudulent. In 2015, Blue Cross Blue Shield of Alabama audited the practice and discovered that Gayle was absent, other staff were seeing patients, and yet all office visits were being billed under Gayle’s name. Blue Cross flagged the issue, and Gayle promised it would stop. Instead, the practice continued fraudulently billing insurers for office visits for the next four years. In total, between 2015 and 2020, Medicare, Medicaid, and Blue Cross paid more than $2.3 million for office visits billed under Gayle’s name.

Gayle and Davis both also admitted to having conspired to commit wire fraud. In March 2020, based on concerns about her prescribing and billing practices, Gayle’s Alabama medical license was revoked.  Months later, Gayle and Davis applied for and obtained more than $450,000 in COVID-19 disaster relief funds through the Paycheck Protection Program (PPP) and Economic Injury Disaster Loan (EIDL) program. Those funds were designed to stabilize businesses struggling because of the pandemic. In their funding applications, Gayle and Davis certified that their medical practice needed the money because of economic uncertainty or injury caused by the pandemic. In reality, Gayle and Davis’s practice had closed, and they used COVID-19 funds they received on other things.

The maximum penalty for unlawful drug distribution is twenty years in prison. The maximum penalty for health care fraud conspiracy is ten years in prison. The maximum penalty for wire fraud conspiracy is twenty years in prison.

The FBI, DEA, and HHS-OIG investigated the case. The Medicaid Fraud Control Unit of the Alabama Attorney General’s Office provided exceptional investigative assistance after the Alabama Medicaid Agency’s Program Integrity Division initiated the case and referred it. Assistant U.S. Attorneys J.B. Ward and Ryan Rummage are prosecuting the case.

Dual Russian and Israeli National Extradited to the United States for His Role in the LockBit Ransomware Conspiracy

Source: US FBI

NEWARK, N.J. – A dual Russian and Israeli national was extradited to the United States on charges that he was a developer of the LockBit ransomware group, United States Attorney John Giordano announced.

In August, Rostislav Panev, 51, was arrested in Israel pursuant to a U.S. provisional arrest request.  Today, Panev was extradited to the United States and had an initial appearance before U.S. Magistrate Judge André M. Espinosa where Panev was detained pending trial.

“Rostislav Panev’s extradition to the District of New Jersey makes it clear: if you are a member of the LockBit ransomware conspiracy, the United States will find you and bring you to justice,” said United States Attorney John Giordano. “Even as the means and methods of cybercriminals become more sophisticated, my Office and our FBI, Criminal Division, and international law enforcement partners are more committed than ever to prosecuting these criminals.”

“No one is safe from ransomware attacks, from individuals to institutions. Along with our international partners, the FBI continues to leave no stone unturned when it comes to following LockBit’s trail of destruction. We will continue to work tirelessly to prevent actors, such as Panev, from hacking their way to financial gain,” said Acting Special Agent in Charge of the FBI Newark Division Terence G. Reilly.

According to the superseding complaint, documents filed in this and related cases, and statements made in court, Panev acted as a developer of the LockBit ransomware group from its inception in or around 2019 through at least February 2024. During that time, Panev and his LockBit coconspirators grew LockBit into what was, at times, the most active and destructive ransomware group in the world. The LockBit group attacked more than 2,500 victims in at least 120 countries around the world, including 1,800 in the United States. Their victims ranged from individuals and small businesses to multinational corporations, including hospitals, schools, nonprofit organizations, critical infrastructure, and government and law-enforcement agencies. LockBit’s members extracted at least $500 million in ransom payments from their victims and caused billions of dollars in other losses, including lost revenue and costs from incident response and recovery.

LockBit’s members were comprised of “developers,” like Panev, who designed the LockBit malware code and maintained the infrastructure on which LockBit operated. LockBit’s other members, called “affiliates,” carried out LockBit attacks and extorted ransom payments from LockBit victims. LockBit’s developers and affiliates would then split the ransom payments which were extorted from victims.

As alleged in the superseding complaint, at the time of Panev’s arrest in Israel in August, law enforcement discovered on Panev’s computer administrator credentials for an online repository that was hosted on the dark web and stored source code for multiple versions of the LockBit builder, which allowed LockBit’s affiliates to generate custom builds of the LockBit ransomware malware for particular victims. On that repository, law enforcement also discovered source code for LockBit’s StealBit tool, which helped LockBit affiliates exfiltrate data stolen through LockBit attacks. Law enforcement also discovered access credentials for the LockBit control panel, an online dashboard maintained by LockBit developers for LockBit’s affiliates and hosted by those developers on the dark web.

The superseding complaint also alleges that Panev exchanged direct messages through a cybercriminal forum with LockBit’s primary administrator, who, in an indictment unsealed in the District of New Jersey in May, the United States alleged to be Dimitry Yuryevich Khoroshev (Дмитрий Юрьевич Хорошев), also known as LockBitSupp, LockBit, and putinkrab. In those messages, Panev and the LockBit primary administrator discussed work that needed to be done on the LockBit builder and control panel.

Court documents further indicate that, between June 2022 and February 2024, the primary LockBit administrator made a series of transfers of cryptocurrency, laundered through one or more illicit cryptocurrency mixing services, of approximately $10,000 per month to a cryptocurrency wallet owned by Panev. Those transfers amounted to over $230,000 during that period.

In interviews with Israeli authorities following his arrest in August, Panev admitted to having performed coding, development, and consulting work for the LockBit group and to having received regular payments in cryptocurrency for that work, consistent with the transfers identified by U.S. authorities. Among the work that Panev admitted to having completed for the LockBit group was the development of code to disable antivirus software; to deploy malware to multiple computers connected to a victim network; and to print the LockBit ransom note to all printers connected to a victim network. Panev also admitted to having written and maintained LockBit malware code and to having provided technical guidance to the LockBit group.

The LockBit Investigation

The superseding complaint against, and apprehension of, Panev follows a disruption of LockBit ransomware in February 2024 by the U.K. National Crime Agency (NCA)’s Cyber Division, which worked in cooperation with the Justice Department, FBI, and other international law enforcement partners. As previously announced by the Department, authorities disrupted LockBit by seizing numerous public-facing websites used by LockBit to connect to the organization’s infrastructure and by seizing control of servers used by LockBit administrators, thereby disrupting the ability of LockBit actors to attack and encrypt networks and extort victims by threatening to publish stolen data. That disruption succeeded in greatly diminishing LockBit’s reputation and its ability to attack further victims, as alleged by documents filed in this case.

The superseding complaint against Panev also follows charges brought in the District of New Jersey against other LockBit members, including its alleged primary creator, developer, and administrator, Dmitry Yuryevich Khoroshev. An indictment against Khoroshev unsealed in May alleges that Khoroshev began developing LockBit as early as September 2019, continued acting as the group’s administrator through 2024, a role in which Khoroshev recruited new affiliate members, spoke for the group publicly under the alias “LockBitSupp,” and developed and maintained the infrastructure used by affiliates to deploy LockBit attacks. Khoroshev is currently the subject of a reward of up to $10 million through the U.S. Department of State’s Transnational Organized Crime (TOC) Rewards Program, with information accepted through the FBI tip website at www.tips.fbi.gov/.

A total of seven LockBit members have now been charged in the District of New Jersey. Beyond Panev and Khoroshev, other previously charged LockBit defendants include:

  • In July, two LockBit affiliate members, Mikhail Vasiliev, also known as Ghostrider, Free, Digitalocean90, Digitalocean99, Digitalwaters99, and Newwave110, and Ruslan Astamirov, also known as BETTERPAY, offtitan, and Eastfarmer, pleaded guilty in the District of New Jersey for their participation in the LockBit ransomware group and admitted deploying multiple LockBit attacks against U.S. and foreign victims. Vasiliev and Astamirov are presently in custody awaiting sentencing.
  • In February 2024, in parallel with the disruption operation described above, an indictment was unsealed in the District of New Jersey charging Russian nationals Artur Sungatov and Ivan Kondratyev, also known as Bassterlord, with deploying LockBit against numerous victims throughout the United States, including businesses nationwide in the manufacturing and other industries, as well as victims around the world in the semiconductor and other industries. Sungatov and Kondratyev remain at large.
  • In May 2023, two indictments were unsealed in Washington, D.C., and the District of New Jersey charging Mikhail Matveev, also known as Wazawaka, m1x, Boriselcin, and Uhodiransomwar, with using different ransomware variants, including LockBit, to attack numerous victims throughout the United States, including the Washington, D.C., Metropolitan Police Department. Matveev remains at large and is currently the subject of a reward of up to $10 million through the U.S. Department of State’s TOC Rewards Program, with information accepted through the FBI tip website at www.tips.fbi.gov/.

The U.S. Department of State’s Transnational Organized Crime (TOC) Rewards Program is offering rewards of:

Information is accepted through the FBI tip website at tips.fbi.gov.

Khoroshev, Matveev, Sungatov, and Kondratyev have also been designated for sanctions by the Department of the Treasury’s Office of Foreign Assets Control for their roles in launching cyberattacks.

Victim Assistance

LockBit victims are encouraged to contact the FBI and submit information at www.ic3.gov. As announced by the Department in February, law enforcement, through its disruption efforts, has developed decryption capabilities that may enable hundreds of victims around the world to restore systems encrypted using the LockBit ransomware variant. Submitting information at the IC3 site will enable law enforcement to determine whether affected systems can be successfully decrypted.

LockBit victims are also encouraged to visit www.justice.gov/usao-nj/lockbit for case updates and information regarding their rights under U.S. law, including the right to submit victim impact statements and request restitution, in the criminal litigation against Panev, Astamirov, and Vasiliev.

The FBI Newark Field Office, under the supervision of Acting Special Agent in Charge Terence G. Reilly, is investigating the LockBit ransomware variant. Israel’s Office of the State Attorney, Department of International Affairs, and Israel National Police; France’s Gendarmerie Nationale Cyberspace Command, Paris Prosecution Office — Cyber Division, and judicial authorities at the Tribunal Judiciare of Paris; Europol; Eurojust; the United Kingdom’s National Crime Agency; Germany’s Landeskriminalamt Schleswig-Holstein, Bundeskriminalamt, and the Central Cybercrime Department North Rhine-Westphalia; Switzerland’s Federal Office of Justice, Public Prosecutor’s Office of the Canton of Zurich, and Zurich Cantonal Police; Spain’s Policia Nacional and Guardia Civil; authorities in Japan; Australian Federal Police; Sweden’s Polismyndighetens; Canada’s Royal Canadian Mounted Police; Politie Dienst Regionale Recherche Oost-Brabant of the Netherlands; and Finland’s National Bureau of Investigation have provided significant assistance and coordination in these matters and in the LockBit investigation generally.

Assistant U.S. Attorneys Andrew M. Trombly, David E. Malagold, and Vinay Limbachia for the District of New Jersey and Trial Attorneys Debra Ireland and Jorge Gonzalez of the Criminal Division’s Computer Crime and Intellectual Property Section (CCIPS) are prosecuting the charges against Panev and the other previously charged LockBit defendants in the District of New Jersey.

The Justice Department’s former Cybercrime Liaison Prosecutor to Eurojust, Office of International Affairs, and National Security Division also provided significant assistance.

Additional details on protecting networks against LockBit ransomware are available at StopRansomware.gov. These include Cybersecurity and Infrastructure Security Agency Advisories AA23-325A, AA23-165A, and AA23-075A. 

The charges and allegations contained in the superseding complaint and above-named Indictments are merely accusations, and the defendants are presumed innocent unless and until proven guilty.

###

Defense counsel: Frank Arleo, Esq.

Man Arraigned in Federal Court on Multiple Charges of Sexual Exploitation of Children

Source: US FBI

HUNTSVILLE, Ala. – A Lawrence County man was arraigned in federal court last week on multiple child sexual exploitation charges, announced U.S. Attorney Prim F. Escalona and FBI Special Agent in Charge Carlton Peeples.

A 13-count indictment filed in U.S. District Court charges David Edward Collier, 46, with four counts of sexual exploitation of children, eight counts of transportation of child pornography, and one count of possession of child pornography.

According to the indictment, between January 2017 and August 2022, Collier used, induced, or coerced minor children to engage in sexually explicit conduct for the purpose of producing any visual depiction of that conduct.  Between October 2022 and September 2023, Collier transported the child pornography.  Collier was also charged with possession of child pornography.  

FBI North Alabama Violent Crime Task Force and Cybercrime Squad investigated the case along with the assistance of the Lawrence County Sheriff’s Office, Moulton Police Department, Madison County Sheriff’s Office, Huntsville Police Department, and Limestone County Sheriff’s Office. Assistant United States Attorney R. Leann White is prosecuting the case.

The U.S. Attorney’s Office (USAO) and the National Children’s Advocacy Center (NCAC) have partnered and released a digital series to educate parents and caretakers about sextortion and how they can help prevent kids and teens from being victims. This series offers three-to-five-minute videos about current online safety topics and provides essential information about the true dangers of online activities.

The videos can be accessed from the following locations:

nationalcac.org/sextortion-prevention/

https://www.youtube.com/@nationalcac

The case was brought as part of Project Safe Childhood, a nationwide initiative launched by the Department of Justice in May 2006 to combat the growing epidemic of child sexual exploitation and abuse.  Led by U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, and to identify and rescue victims.  For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov.

Owner of Marketing Companies and DME Company Convicted for Role in $100 Million Scheme to Defraud Medicare and Other Insurers and to Violate the Anti-Kickback Statute

Source: US FBI

NEWARK, N.J.  A Florida man was convicted by a federal jury for his role in a durable medical equipment (DME) kickback scheme that caused millions of dollars in losses to Medicare and other insurance providers, United States Attorney John Giordano announced.

Following a month-long jury trial before U.S. District Judge Michael E. Farbiarz, Raheel Naviwala, 36, of Coral Springs, Florida, was convicted on Feb. 28, 2025, of conspiracy to commit health care fraud and wire fraud, one count of health care fraud, conspiracy to violate the Anti-Kickback Statute, and three counts of violating the Anti-Kickback Statute. He was also acquitted of two counts of health care fraud.

“This Office is committed to prosecuting those like the defendant who seek to profit by defrauding and corrupting our nation’s medical systems,” United States Attorney John Giordano said. “When people siphon millions from Medicare to line their own pockets, regular citizens pay the price. This case demonstrates that serious consequences will follow for such conduct.”

“The scheme Naviwala and his co-conspirators created to steal money from the government was complex and expansive,” FBI Acting Special Agent in Charge Terence G. Reilly said. “However, FBI Newark and our law enforcement partners have the expertise and grit to dig through mountains of data and find the fraudsters. We want this case to serve as a warning to anyone hoping to capitalize on hiding under the red tape – we are still here, and you will eventually get caught.”

“The defendant convicted in this case prioritized greed over the provision of appropriate health care services to patients, bilking the federal government for medically unnecessary durable medical equipment,” stated Special Agent in Charge Naomi Gruchacz with the U.S. Department of Health and Human Services Office of Inspector General (HHS-OIG). “HHS-OIG will continue to work with our law enforcement partners to ensure the integrity of the federal health care system and hold accountable owners and providers engaging in fraud that targets its programs.”

“Investigating corrupt schemes that undermine the integrity of TRICARE, the healthcare system for military members and their families, is a top priority for the Department of Defense Office of Inspector General’s Defense Criminal Investigative Service (DCIS),” stated Special Agent in Charge Patrick J. Hegarty, DCIS Northeast Field Office. “Mr. Naviwala’s illegal schemes put the TRICARE program and its beneficiaries at risk. We are committed to working with our partner agencies and the Department of Justice to pursue those individuals who selfishly place personal gain over the safety and care of TRICARE beneficiaries.”

“Schemes such as these compromise the integrity of VA’s programs and services and divert funds from our nation’s deserving veterans,” said Special Agent in Charge Christopher F. Algieri with the Department of Veterans Affairs Office of Inspector General’s Northeast Field Office. “The VA OIG will continue to work with our law enforcement partners to root out fraudsters and hold them accountable.”

According to the evidence at trial:

Naviwala and his coconspirators purchased lists of Medicare patients’ names, addresses, and phone numbers, and hired telemarketers to convince the patients to get DME (orthotic braces). These telemarketers pre-filled prescriptions and picked the highest-paying braces to bill to insurers. Naviwala then paid telemedicine doctors to sign the pre-filled prescriptions for braces, regardless of whether the patients needed or wanted braces. Generally, the telemedicine doctor did not even speak to the patients before signing the pre-filled prescriptions.

Naviwala then sold the signed prescriptions to DME supply companies that could bill Medicare, TRICARE, and other insurers for the braces. To conceal the fraud, Naviwala and his coconspirators signed sham contracts and used sham invoices that falsely represented that Naviwala was billing DME supply companies for marketing or consulting.

Naviwala also owned and operated a DME supply company that was used to bill Medicare, and which submitted claims to Medicare for up to nine braces for a single patient.

To further conceal his illegal conduct, Naviwala put multiple of his businesses in the names of nominee owners. The nominee owners generally performed no legitimate work for any company and were paid to hide Naviwala’s involvement.

Medicare and other insurers paid hundreds of millions of dollars to members of the conspiracy and paid at least approximately $100 million for DME associated with Naviwala’s companies. Naviwala personally pocketed more than $10 million in fraud proceeds.

Conspiracy to commit health care fraud and wire fraud is punishable by a maximum potential penalty of 20 years in prison. Health care fraud is punishable by a maximum potential penalty of 10 years in prison. Conspiracy to violate the federal Anti-Kickback Statute is punishable by a maximum potential penalty of five years in prison. Each count of illegal kickbacks is punishable by a maximum potential penalty of 10 years in prison. Each count is also punishable by a fine. Sentencing is scheduled for 10 a.m. on July 29, 2025, before Judge Farbiarz in Newark.

United States Attorney John Giordano credited special agents of the FBI, under the direction of Acting Special Agent in Charge Terence G. Reilly in Newark; HHS-OIG, under the direction of Special Agent in Charge Naomi Gruchacz; DCIS, under the direction of Special Agent in Charge Patrick J. Hegarty; and the U.S. Department of Veterans Affairs Office of Inspector General, under the direction of Special Agent in Charge Christopher F. Algieri with the investigation leading to the conviction.

The government is represented by Assistant U.S. Attorneys Elaine K. Lou, Deputy Chief of the Criminal Division, Matthew Specht of the Special Prosecutions Division, and Aaron L. Webman of the Economic Crimes Unit in Newark.

                                                           ###

Defense counsel:

Jamie Hoxie Solano, Esq. New York, New York

Amy C. Brown, Esq. New York, New York

Bryan W. McCracken, Esq. New York, New York

Ifedapo Benjamin, Esq. New York, New York