Member of the 764 Criminal Enterprise Pleads Guilty to Racketeering Conspiracy and Other Charges

Source: US FBI

Jairo Jaime Tinajero, 25, pleaded guilty yesterday in the Western District of Kentucky to the following charges contained in the superseding information: racketeering conspiracy, online enticement, three counts of production of child sexual abuse material, three counts of distribution of child sexual abuse material (CSAM), five counts of interstate communications of threats, cyberstalking, and conspiracy to murder Jane Doe 1 in aid of racketeering. The terms of the plea agreement specify that both parties agree to the applicability of the terrorism sentencing enhancement (U.S.S.G. § 3A1.4 n. 4).

On Oct. 11, 2023, a grand jury in the Western District of Kentucky returned an indictment charging Tinajero with online enticement and production of child sexual abuse material. On Oct. 4, 2023, in the Eastern District of Arkansas, Tinajero was arrested on a criminal complaint that was filed in the Western District of Kentucky.

According to the court documents, Tinajero is a self-identified member of the 764 network. The 764 network’s accelerationist goals include social unrest and the downfall of the current world order, including the U.S. Government. Beginning in 2020, Tinajero started communicating with, and grooming, several minor victims to obtain sexually explicit content from them, including Jane Doe 1. In 2023, Tinajero began to threaten the safety of Jane Doe 1 and her family. Tinajero posted online in encrypted platforms associated with 764 and related groups a “Lorebook” – commonly used in 764 blackmail schemes — containing Jane Doe 1’s identifying information along with nude pictures of the minor.

Between July 2023 and September 2023, during multiple discussions over social media, Tinajero and a co-conspirator agreed that Tinajero should kill Jane Doe 1. Tinajero and the co-conspirator specifically discussed that Tinajero should murder Jane Doe 1 and dispose of Jane Doe 1’s body in a barrel of acid after the murder. Tinajero posted multiple messages on various social media websites stating that he planned to kill Jane Doe 1 with a firearm because Jane Doe 1 refused to provide additional child sexual abuse material.

On Aug. 26, 2023, Tinajero posted on Telegram, “Im determined to die” and “If I gotta kill her I can’t let her live and f**k with dudes and girls while I’m sick and miserable” and “Im gonna live stream it.” Tinajero also posted a picture of Jane Doe 1. On Sept. 2, 2023, Tinajero posted on Telegram, “I wanna kill them so bad just show up at their cribs and shoot 100 rounds in 5 seconds” and, on Sept. 3, 2023, posted “I didn’t wanna do anything bc I was scared of dying or prison but now I’m determined to die if I have to after getting rid of [Jane Doe 1] . . . .” Tinajero also began soliciting others to assist with attempting to kill Jane Doe 1.

The FBI is investigating the case.

Assistant U.S. Attorney Erwin Roberts for the Western District of Kentucky and Trial Attorneys Justin Sher and James Donnelly of the National Security Division’s Counterterrorism Section are prosecuting the case. The Violent Crime and Racketeering Section for the Criminal Division and the Eastern District of Arkansas provided assistance.

California Teenager Sentenced to 48 Months for Nationwide Swatting Spree

Source: US FBI

Orlando, Florida – United States District Judge Carlos E. Mendoza has sentenced Alan W. Filion (18, Lancaster, CA) to four years in federal prison for making interstate threats to injure the person of another.

According to the plea agreement, from approximately August 2022 to January 2024, Filion made over 375 swatting and threat calls, including calls in which he claimed to have planted bombs in the targeted locations or threatened to detonate bombs and/or conduct mass shootings at those locations. Filion targeted religious institutions, high schools, colleges and universities, government officials, and numerous individuals across the United States.

Filion intended his calls to cause large-scale deployment of police and emergency services units to the targeted locations. During these calls, he provided information to law enforcement and emergency services agencies that he knew to be false, such as false names, false claims that he and others had placed explosives in particular locations, false claims that he and others possessed dangerous weapons, including firearms and explosives, and false claims that he and/or other individuals had committed, or intended to imminently commit, violent crimes. 

In some instances, armed law enforcement officers approached and entered a targeted residence with their weapons drawn and detained individuals that occupied the residence. Filion claimed in a post on January 20, 2023, that when he swats someone he “usually get[s] the cops to drag the victim and their families out of the house cuff them and search the house for dead bodies.” Additionally, Filion’s calls caused law enforcement officers and dispatchers to respond, and to be unavailable in response to other emergencies.

Filion became a serial swatter for both profit and recreation. He claimed in a January 19, 2023, online post that his “first” swatting was like “2 to 3 years ago” and that “6-9 months ago [he] decided to turn it into a business. . . .” On several occasions, Filion placed posts on social-media channels advertising his services and swatting-for-a-fee structure.

On January 18, 2024, Filion was arrested in California on Florida state charges arising from a May 2023 threat he made to a religious institution in Sanford, Florida. In that threat, he claimed to have an illegally modified AR-15, a Glock 17 pistol, pipe bombs, and Molotov cocktails. He said that he was going to imminently “commit a mass shooting” and “kill everyone” he saw. He pleaded guilty in federal court to making that threat.

Filion also pleaded guilty to making three other threatening calls: an October 2022 call to a public high school in the Western District of Washington, in which he threatened to commit a mass shooting and claimed to have planted bombs throughout the school; a May 2023 call to a Historically Black College & University in the Northern District of Florida, in which he claimed to have placed bombs in the walls and ceilings of campus housing that would detonate in about an hour; and a July 2023 call to a local police department dispatch number in the Western District of Texas, in which he falsely identified himself as a senior federal law enforcement officer, provided the federal law-enforcement officer’s residential address to the dispatcher, claimed to have killed his (the federal officer’s) mother, and threatened to kill any responding police officers.  

This case was investigated by the Federal Bureau of Investigation and the United States Secret Service. Valuable assistance was provided by the Seminole County (Florida) Sheriff’s Office; the Anacortes (Washington) Police Department; the Florida Department of Law Enforcement; the California Department of Justice; the Los Angeles County (California) Sheriff’s Office; and the Volusia County (Florida) Sheriff’s Office. The case is being prosecuted by Assistant United States Attorney Kara Wick, with valuable assistance from the State Attorney’s Office for Seminole County, Florida, 18th Judicial Circuit; the Counterterrorism Section of the United States Department of Justice; and the United States Attorneys’ Offices for the Western District of Washington, the Northern District of Florida, the Western District of Texas, and the District of Columbia. 

Phobos Ransomware Affiliates Arrested in Coordinated International Disruption

Source: US FBI

Note: View the superseding indictment here.

Phobos Ransomware Group Alleged to have Attacked Over 1,000 Victims Worldwide

The Justice Department today unsealed criminal charges against Roman Berezhnoy, 33, and Egor Nikolaevich Glebov, 39, both Russian nationals, who allegedly operated a cybercrime group using the Phobos ransomware that victimized more than 1,000 public and private entities in the United States and around the world and received over $16 million in ransom payments. Berezhnoy and Glebov were arrested this week as part of a coordinated international disruption of their organization, which includes additional arrests and the technical disruption of the group’s computer infrastructure.

From May 2019, through at least October 2024, Berezhnoy, Glebov, and others allegedly caused victims to suffer losses resulting from the loss of access to their data in addition to the financial losses associated with the ransomware payments. The victims included a children’s hospital, health care providers, and educational institutions.

8Base Seizure Banner

According to court documents, Berezhnoy, Glebov, and others operated a ransomware affiliate organization, including under the names “8Base” and “Affiliate 2803,” among others, that victimized public and private entities through the deployment of Phobos ransomware.

As part of the scheme, Berezhnoy, Glebov, and others allegedly hacked into victim computer networks, copied and stole files and programs on the victims’ network, and encrypted the original versions of the stolen data with Phobos ransomware. The conspirators then allegedly extorted the victims for ransom payments in exchange for the decryption keys to regain access to the encrypted data by, among other things, leaving a ransom note on compromised victim computers and separately reaching out to victims to initiate ransom payment negotiations.

As alleged, the conspirators also threatened to expose victims’ stolen files to the public or to the victims’ clients, customers, or constituents if the ransoms were not paid. The conspirators are further alleged to have established and operated a darknet website where they repeated their extortionate threats and ultimately published the stolen data if a victim failed to pay the ransom.

After a successful Phobos ransomware attack, criminal affiliates paid fees to Phobos administrators for a decryption key to regain access to the encrypted files. Each deployment of Phobos ransomware was assigned a unique alphanumeric string in order to match it to the corresponding decryption key, and each affiliate was directed to pay the decryption key fee to a cryptocurrency wallet unique to that affiliate.

The charges unsealed today against Berezhnoy and Glebov follow the recent arrest and extradition of Evgenii Ptitsyn, a Russian national, on charges relating to his alleged administration of the Phobos ransomware variant.

In parallel with this week’s arrests, Europol and German authorities have announced an international operation involving the FBI and other international law enforcement partners to disrupt over 100 servers associated with this criminal network.

Berezhnoy and Glebov are charged in an 11-count indictment with one count of wire fraud conspiracy, one count of wire fraud, one count of conspiracy to commit computer fraud and abuse, three counts of causing intentional damage to protected computers, three counts of extortion in relation to damage to a protected computer, one count of transmitting a threat to impair the confidentiality of stolen data, and one count of unauthorized access and obtaining information from a protected computer. If convicted, Berezhnoy and Glebov face a maximum penalty of 20 years in prison on each wire fraud-related count; 10 years in prison on each computer damage count; and five years in prison on each of the other counts. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

Supervisory Official Antoinette T. Bacon of the Justice Department’s Criminal Division, U.S. Attorney Erek L. Barron for the District of Maryland, Assistant Director Bryan Vorndran of the FBI’s Cyber Division, and Special Agent in Charge William J. DelBagno of the FBI Baltimore Field Office made the announcement.

The FBI Baltimore Field Office is investigating the case. The Justice Department extends its thanks to international judicial and law enforcement partners in the United Kingdom, Germany, Japan, Spain, Belgium, Poland, Czech Republic, France, Thailand, Finland, Switzerland, and Romania, as well as Europol and the U.S. Department of Defense Cyber Crime Center, for their cooperation and coordination with the Phobos ransomware investigation. The National Security Division’s National Security Cyber Section and the Justice Department’s Office of International Affairs also provided valuable assistance.

Senior Counsel Aarash A. Haghighat of the Criminal Division’s Computer Crime and Intellectual Property Section (CCIPS) and Assistant U.S. Attorney Thomas M. Sullivan for the District of Maryland are prosecuting the case. Former CCIPS Trial Attorney Riane Harper and former Assistant U.S. Attorneys Aaron S.J. Zelinsky and Jeffrey J. Izant for the District of Maryland provided substantial assistance.

Additional details on protecting networks against Phobos ransomware are available at StopRansomware.gov, including Cybersecurity and Infrastructure Security Agency Advisory AA24-060A.

An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

FBI Announces Nationwide Crackdown on South American Theft Groups

Source: US FBI

Through the coordinated efforts of the FBI Cincinnati, Newark and New York field offices, the FBI arrested Dimitriy “Russo” Nezhinskiy, owner and manager of Big Apple General Buyers, and Juan Villar, an employee, in Manhattan’s Diamond District. They are accused in the Eastern District of New York of running the largest east coast “fence”, which is a hub to resell stolen goods. Additionally, a federal grand jury in Cincinnati indicted three defendants believed to be operating as part of the organized group and charged them with transporting stolen goods interstate and falsifying records in a federal investigation. The three men allegedly committed a burglary at the home of an NFL player last year.

In addition to high-end residential burglaries, SATGs are known to target traveling jewelry salesmen as they transport their inventory from location to location. They usually use facilitators, known as “fences,” to liquidate stolen merchandise. A fence is an individual or business who knowingly purchases stolen property and then resells it to others. In some scenarios, they send the stolen goods to Chile or Colombia. This week, a Chilean man, believed to be part of the South American Theft Group, was also charged for his involvement in a conspiracy to break into a jewelry store in New Jersey and then cross state lines with the stolen property.

Crimes committed by South American Theft Groups can victimize anyone, not just professional athletes. The FBI has an initiative targeting SATGs, which involves individuals from Chile and other South American countries exploiting illegal entry or tourist visas to travel in and out of the U.S. to facilitate theft and transportation of stolen goods internationally. This initiative dedicates resources through various active investigations and major theft task forces, which include our state and local partners, throughout the country and shares intelligence with law enforcement partners around the world.

You can visit tips.fbi.gov to report suspected South American Theft Group activity to the Bureau. Tips may be submitted anonymously.

Mehtab Syed Named Special Agent in Charge of the Salt Lake City Field Office

Source: US FBI

The Federal Bureau of Investigation has named Mehtab Syed as the special agent in charge of the Salt Lake City Field Office. Ms. Syed most recently served as special agent in charge of Cyber and Counterintelligence Division in the Los Angeles Field Office.

Ms. Syed entered on duty as an FBI special agent in August 2005. She was assigned to the New York Field Office, where she worked counterterrorism investigations and was a member of the crisis negotiation team and the rapid deployment team. 

In 2008, Ms. Syed deployed to Islamabad, Pakistan, and served as acting assistant legal attaché. She was responsible for conducting extensive coordination between law enforcement, intelligence, and security services of multiple governments. She then returned to the New York Field Office until 2012.

Ms. Syed was assigned to an 18-month temporary duty assignment (TDY) at the Counterterrorism Division at FBI Headquarters in 2012. She worked as the program manager for extraterritorial counterterrorism cases in the Pakistan/Afghanistan region. 

In April 2015, Ms. Syed reported to LEGAT Amman as the assistant legal attaché. Ms. Syed returned to the New York Field Office as a supervisor for the New York Joint Terrorism Task Force (NY JTTF) in 2017. Ms. Syed was promoted to acting assistant special agent in charge of the NY JTTF’s Extraterritorial Branch in 2020.

In November 2020, Ms. Syed was selected as the assistant special agent in charge of the cyber and counterintelligence branch of the Newark Field Office. In 2022, Ms. Syed was promoted to section chief of China Operations II Branch of the Counterintelligence Division at FBI Headquarters. In April of 2023, Ms. Syed served as special agent in charge of Cyber and Counterintelligence Division in the Los Angeles Field Office

Prior to her career as a special agent for the FBI, Ms. Syed served at the Bureau as a contract linguist from 2004-2005. She has also worked as a financial analyst at the corporate office of Cosi, a restaurant chain with locations throughout the U.S. Ms. Syed received a bachelor’s degree in finance from Adelphi University in 2001. 

Florida Man Pleads Guilty to Defrauding Bettors Through Gambling Websites

Source: US FBI

ALEXANDRIA, Va. – A Florida man pled guilty today to wire fraud in connection with his online betting scheme.

According to court documents, Phillip James Krnyaich, 43, of Clermont, is a professional gambler who operated as a “bookie,” using WAGERHUB888.COM and other websites to manage his customers’ bets. Krnyaich purchased “sales leads” spreadsheets from an entity named “CapperTek” that contained the names and contact information for thousands of individuals Krnyaich contacted to advertise his gambling business.

From April 2020 through April 2023, Krnyaich sought out individuals interested in online gambling, managed their bets, and then, on numerous occasions, failed to pay them after they attempted to withdraw their funds. When those individuals sought return of their funds, Krnyaich, using aliases and multiple email addresses, provided false reasons for failing to pay. In some cases, Krnyaich consistently solicited additional money under the false pretense that providing additional funds would allow him to return bettors’ previously provided funds. Krnyaich used bettor funds to make personal purchases.

In total, Krnyaich fraudulently obtained over $550,000 in connection with his various gambling websites.

Krnyaich is scheduled to be sentenced on July 29 and faces up to 20 years in prison. Actual sentences for federal crimes are typically less than the maximum penalties. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

Erik S. Siebert, U.S. Attorney for the Eastern District of Virginia, and Sean Ryan, Special Agent in Charge of the FBI Washington Field Office’s Criminal and Cyber Division, made the announcement after U.S. District Judge Leonie M. Brinkema accepted the plea.

Assistant U.S. Attorney Zachary Ray is prosecuting the case.

A copy of this press release is located on the website of the U.S. Attorney’s Office for the Eastern District of Virginia. Related court documents and information are located on the website of the District Court for the Eastern District of Virginia or on PACER by searching for Case No. 1:25-cr-57.

Maryland Man Sentenced to 96 Months for Traveling to the District of Columbia for Sex with Child

Source: US FBI

WASHINGTON – Nathaniel Lamar Nelson Scott, 36, of Bowie, Maryland, was sentenced today in U.S. District Court to 96-months in federal prison in connection with traveling to sexually abuse a six-year-old girl in the District of Columbia.

The sentence was announced by U.S. Attorney Edward R. Martin Jr., FBI Special Agent in Charge Sean Ryan of the Washington Field Office Criminal and Cyber Division, and Chief Pamela Smith of the Metropolitan Police Department.

Scott pleaded guilty October 16, 2024, to one count of travel with intent to engage in illicit sexual conduct. In addition to the prison term, the Honorable Dabney L. Friedrich ordered Scott to serve a lifetime term of supervised release and to register as a sex offender.

According to the government’s evidence, in May 2024 Scott began communicating via an encrypted messaging application with a man he met on a fetish website. Scott believed the man to be a pedophile who was sexually abusing his six-year-old daughter. The man actually was an undercover officer with the MPD–FBI Child Exploitation and Human Trafficking Task Force. Over the next several days, Scott engaged in graphic conversations with the undercover officer about sexually abusing the purported child. On June 5, 2024, Scott arranged to meet for the purpose of engaging in sexual acts with the child. He traveled from Maryland to a pre-arranged meeting place in the District where he was arrested.

This case is being brought as part of Project Safe Childhood, a nationwide initiative to combat the epidemic of child sexual exploitation and abuse, launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend and prosecute individuals who exploit children via the internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

This case was investigated by the FBI Washington Field Office and MPD’s Child Exploitation and Human Trafficking Task Force. The task force is composed of FBI agents, along with other federal agents and detectives from northern Virginia and the District of Columbia. The task force is charged with investigating and bringing federal charges against individuals engaged in the exploitation of children and those engaged in human trafficking.

The case is being prosecuted by Assistant U.S. Attorneys Jocelyn Bond and Paul V. Courtney.

24cr287

San Diego Fentanyl Supplier Sentenced in the District for Role in Nationwide Drug Trafficking Conspiracy

Source: US FBI

WASHINGTON – Edgar Balderas, 27, of San Diego, California, was sentenced today in U.S. District Court to 148 months in prison for participating in a massive fentanyl trafficking conspiracy that distributed hundreds of thousands of fentanyl-laced counterfeit oxycodone pills from Southern California to destinations throughout the United States, including the District. Balderas was one of more than two dozen co-defendants arrested over the course of 2023 in D.C., Virginia, Maryland, San Diego, and Los Angeles and charged in the conspiracy.

The sentencing was announced by U.S. Attorney Edward R. Martin Jr., DEA Special Agent in Charge Ibrar A. Mian of the Drug Enforcement Administration Washington Division, and Inspector in Charge Damon E. Wood of the U.S. Postal Inspection Service Washington Division.

Balderas, aka “Nano,” pleaded guilty on Dec. 19, 2024, to conspiracy to distribute 400 grams or more of fentanyl. In addition to the 148-month prison term, U.S. District Court Judge Colleen Kollar-Kotelly ordered Balderas to serve five years of supervised release.

The impetus for this investigation was the overdose death of Diamond Lynch, a young mother in Southeast D.C. In addition to investigating and prosecuting the death-resulting case, law enforcement followed the evidence and uncovered a vast network of traffickers who transported fentanyl from Mexico to Los Angeles to the District of Columbia. Since then, investigators have seized more than 450,000 fentanyl pills, 1.5 kilograms of fentanyl powder, and 30 firearms. 

According to court documents, Balderas conspired with a Los Angeles-based fentanyl trafficker to supply him with fentanyl-laced counterfeit oxycodone pills, which the trafficker would, in turn, supply to his D.C.-based customers. He began supplying the trafficker with fentanyl-laced counterfeit oxycodone pills in Fall 2022 and continued until the L.A.-based trafficker’s arrest in late-February 2023.

After the Los Angeles-based trafficker’s arrest in late-February 2023, Balderas attempted to begin dealing fentanyl directly to D.C.-based fentanyl distributors. For example, Balderas began communicating via Instagram with a D.C.-based co-defendant in this case the month after the Los Angeles-based trafficker’s arrest. The purpose of these communications was to arrange for the direct sale of fentanyl pills to the D.C.-based co-conspirator, along with other D.C.-based clients of the Los Angeles-based fentanyl trafficker.

DEFENDANT AGE LOCATION CHARGES/SENTENCE

Hector David Valdez,

aka “Curl”

27

Santa Fe Springs, California

Conspiracy to distribute and possess with intent to distribute 400 grams or more of fentanyl;

Conspiracy to commit international money laundering.

Craig Eastman

21

Washington, D.C. Sentenced Feb. 6, 2025, to 165 months for conspiracy to distribute more than 400 grams of fentanyl.
Charles Jeffrey Taylor 21 Washington, D.C. Pleaded guilty Feb. 28, 2025, to conspiracy to distribute and possess with intent to distribute 40 grams or more of fentanyl.
Raymond Nava, Jr. 20

Bell Gardens,

California

Sentenced Sept. 17, 2024, to 14 years for conspiracy to distribute and possess with intent to distribute 400 grams or more of fentanyl.
Ulises Aldaz 28

Bell Gardens,

California

Sentenced June 28, 2024, to 95 months in prison for conspiracy to distribute and possess with intent to distribute 400 grams or more of fentanyl.
Max Alexander Carias Torres 27

Bell Gardens,

California

Conspiracy to distribute and possess with intent to distribute 400 grams or more of fentanyl;

Conspiracy to commit international money laundering

Teron Deandre McNeil, aka “Wild Boy” 34 Washington, D.C.

Conspiracy to distribute and possess with intent to distribute 400 grams or more of fentanyl;

Conspiracy to commit wire fraud

Marvin Anthony Bussie,

aka “Money Marr”

22 Washington, D.C. Sentenced June 28, 2024, to 120 months in prison for conspiracy to distribute and possess with intent to distribute 400 grams or more of fentanyl.
Marcus Orlando Brown 29 Washington, D.C. Sentenced Oct. 3, 2024, to 108 months in prison for conspiracy to distribute and possess with intent to distribute 40 grams or more of fentanyl.
Columbian Thomas, aka “Cruddy Murda” 27 Washington, D.C. Sentenced Oct. 22, 2024, to 160 months in prison for conspiracy to distribute and possess with intent to distribute 400 grams or more of fentanyl.
Wayne Rodell Carr-Maiden 30 Washington, D.C. Sentenced April 29, 2024, to 45 months in prison for conspiracy to distribute and possess with intent to distribute 40 grams or more of fentanyl.

Andre Malik Edmond,

aka “Draco”

23 Temple Hills, Maryland Sentenced July 22, 2024, to 130 months in prison for conspiracy to distribute and possess with intent to distribute 400 grams or more of fentanyl.

Treyveon James Johnson,

aka “Treyski”

20 Alexandria, Virginia Sentenced Sept. 5, 2024, to 108 months in prison for conspiracy to distribute and possess with intent to distribute 40 grams or more of fentanyl.

Karon Olufemi Blalock,

aka “Fat Bags”

30 Alexandria, Virginia

Conspiracy to distribute and possess with intent to distribute 400 grams or more of fentanyl;

Conspiracy to commit wire fraud;

Conspiracy to commit money laundering

Ronte Ricardo Greene,

aka “Cardiddy”

29 Washington, D.C. Pleaded guilty Feb. 27, 2025, to conspiracy to distribute and possess with intent to distribute 40 grams or more of fentanyl.
Melvin Edward Allen, Jr., aka “21” 39 Washington, D.C. Pleaded guilty on Dec. 18, 2024, to conspiracy to distribute and possess with intent to distribute 40 grams or more of fentanyl.

Darius Quincy Hodges,

aka “Brick”

34 Glen Allen, Virginia Conspiracy to distribute and possess with intent to distribute 400 grams or more of fentanyl.

Lamin Sesay,

aka “Rock Star”

28 Alexandria, Virginia Pleaded guilty Feb. 7, 2025, to conspiracy to distribute and possess with intent to distribute 40 grams or more of fentanyl.
Paul Alejandro Felix 26

Glendale,

California

Sentenced Nov. 12, 2024, to 164 months in prison for conspiracy to distribute and possess with intent to distribute 400 grams or more of fentanyl.

Omar Arana,

aka “Frogs”

27

Cudahy,

California

Sentenced May 2, 2025, to 93 months for conspiracy to distribute and possess with intent to distribute 400 grams or more of fentanyl.
Edgar Balderas, Jr., aka “Nano” 27

San Diego,

California

Sentenced May 8, 2025, to 148 months for conspiracy to distribute and possess with intent to distribute 400 grams or more of fentanyl.
Raul Pacheco Ramirez 30

Long Beach,

California

Sentenced Nov. 26, 2024, to 95 months for conspiracy to distribute and possess with intent to distribute 400 grams or more of fentanyl.
Giovani Alejandro Briones 30 Victorville, California Sentenced Feb. 20, 2025, to 90 months for conspiracy to distribute and possess with intent to distribute 400 grams or more of fentanyl.
Alfredo Rodriguez Gonzalez 26 Rosarito, Mexico

Conspiracy to distribute and possess with intent to distribute 400 grams or more of fentanyl;

Conspiracy to commit international money laundering.

The prosecutions followed a joint investigation by the DEA Washington Division and the U.S. Postal Inspection Service Washington Division, in partnership with the Metropolitan Police Department and the Bureau of Alcohol, Tobacco, Firearms and Explosives, with additional support from the DEA Los Angeles, San Diego, and Riverside Field Offices, the Federal Bureau of Investigation’s Washington Field Office, and the Charles County, Maryland Sheriff’s Office. Valuable assistance was provided by the U.S. Attorney’s Offices in the Central and Southern Districts of California, the Eastern District of Virginia, and the District of Maryland.

The case is being prosecuted by Assistant U.S. Attorneys Matthew W. Kinskey, Solomon S. Eppel, and Iris Y. McCranie of the Violence Reduction and Trafficking Offenses Section.

23cr73

Woodbridge, Connecticut, Man Admits $2.3 Million Pandemic Relief Program Scheme

Source: US FBI

Marc H. Silverman, Acting United States Attorney for the District of Connecticut, today announced that on May 9, 2025, YASIR G. HAMED, 60, of Woodbridge, waived his right to be indicted and pleaded guilty before U.S. District Judge Stefan R. Underhill in Bridgeport to offenses stemming from a scheme to defraud a COVID-19 pandemic relief program of more than $2.3 million.

In March 2020, the Coronavirus Aid, Relief, and Economic Security (“CARES”) Act provided emergency financial assistance to Americans suffering the economic effects caused by the COVID-19 pandemic.  One source of relief provided by the CARES Act was the authorization of forgivable loans to small businesses for job retention and certain other expenses through the Paycheck Protection Program (“PPP”).  The PPP was overseen by the U.S. Small Business Administration (“SBA”), and individual PPP loans were issued by private lenders, which received and processed PPP applications and supporting documentation, and then made loans using the lenders’ own funds, which were guaranteed by the SBA.

According to court documents and statements made in court, Hamed, an accountant, had an ownership interest or representative relationship with several New Haven-based businesses, including Access Consulting and Professional Services Inc.; Connecticut Medical Transportation Inc.; Arabic Language Learning Program Inc.; Institute for Global Educational Exchange Inc.; Access Medical Transport Inc.; Ikea Car & Limo Inc.; Center of the World Tours, North America LLC.; and Sudanese American Friendship Association Inc.  Between June 2020 and September 2021, Hamed submitted fraudulent PPP loan applications on behalf of these companies, overstating employee numbers and average monthly payroll, and making other fraudulent representations.  As part of the applications, he submitted false tax filings that had never been filed with the IRS.

Hamed also submitted PPP loan applications on behalf of companies owned by his clients.  In at least one instance, Hamed convinced the owner of a business, which he knew was not active and had no employees, to seek PPP funding.  Hamed prepared the paperwork for the PPP application and then took a significant portion of the loan proceeds.

Through this scheme, Hamed obtained than $2.3 million in PPP loans for his businesses and for his clients, receiving more than $1 million in loan proceeds for himself and his family, and significant kickbacks from his clients.  Hamed used the funds for personal expenses, including education expenses for a family member, and for a downpayment on a $880,000 house in Woodbridge that he purchased in October 2020.

Hamed has agreed to pay $2,384,772 in restitution.

Hamed pleaded guilty to bank fraud, which carries a maximum term of imprisonment of 30 years, and engaging in illegal monetary transactions, which carries a maximum term of imprisonment of 10 years.  Judge Underhill scheduled sentencing for August 8.

Hamed was arrested on November 13, 2024.  He is released on a $500,000 bond pending sentencing.

This investigation has been conducted by the Federal Bureau of Investigation and the Internal Revenue Service – Criminal Investigation Division.  The case is being prosecuted by Assistant U.S. Attorney Christopher W. Schmeisser.

Individuals with information about allegations of fraud involving COVID-19 are encouraged to report it by calling the Department of Justice’s National Center for Disaster Fraud Hotline at 866-720-5721, or via the NCDF Web Complaint Form at: https://www.justice.gov/disaster-fraud/ncdf-disaster-complaint-form.

Trumbull Man Charged with Defrauding Amazon of More Than $3 Million

Source: US FBI

Marc H. Silverman, Acting United States Attorney for the District of Connecticut, and Anish Shukla, Acting Special Agent in Charge of the New Haven Division of the Federal Bureau of Investigation (FBI), today announced that a federal grand jury in New Haven has returned a 13-count indictment charging AMEER NASIR, 24, of Trumbull, with offenses stemming from a fraud scheme against Amazon.com, Inc. (“Amazon”).

The indictment was returned on May 7, 2025.  Nasir was arrested yesterday, appeared before U.S. Magistrate Judge S. Dave Vatti in Bridgeport, and was released on a $300,000 bond.

As alleged in the indictment, Amazon Logistics, an Amazon subsidiary, contracts with various interstate trucking businesses to transport both empty trailers and trailers containing heavy loads of freight between cities and between warehouses and fulfillment centers operated by Amazon.  Nasir registered 23 trucking businesses with Amazon Logistics.  One of the accounts was created in the name of Nasir’s business, Pak Express Transport, LLC, and others were created fraudulently using the names and identifying information of other trucking or transportation companies without the knowledge of the operators of those companies.  Between approximately December 2019 and February 2021, Nasir used these accounts to sign up for more than 1,000 transportation assignments with Amazon Logistics, manipulated information in Amazon Logistics’ transportation management system to misrepresent that he had completed trailer movements when he had not, and submitted fraudulent invoices to Amazon Logistics that were subsequently paid.  Through this scheme, Nasir defrauded Amazon of more than $3 million.

The indictment charges Nasir with 13 counts of wire fraud, an offense that carries a maximum term of imprisonment of 20 years on each count.

Acting U.S. Attorney Silverman stressed that an indictment is not evidence of guilt.  Charges are only allegations, and a defendant is presumed innocent unless and until proven guilty beyond a reasonable doubt.

This matter is being investigated by the Federal Bureau of Investigation with assistance from Amazon.  The case is being prosecuted by Assistant U.S. Attorney Elena L. Coronado.