Chicago Woman Pleaded Guilty in Conspiracy to Commit Wire Fraud Targeting U.S. Service Men and Women

Source: US FBI

SPRINGFIELD, Mo. – A Chicago, Il., woman pleaded guilty in federal court today for her role in a wire fraud conspiracy that targeted United States Service men and women who had recently joined the military.

Jetauwn T. Griffin, 31, waived her right to a grand jury and pleaded guilty before U.S. Chief Magistrate Judge Willie Epps, Jr., to a federal information charging her with one count of conspiracy to commit wire fraud.

Griffin conspired with others that sought to defraud United States military service men and women through the use of social media.

According to the plea agreement, Griffin conspired with others that employed a scheme to defraud United States military service men and women. Service members who had recently joined the United States military were contacted through various social media platforms.  Upon communicating with each military member, a person within the conspiracy would use the information obtained from the social media platform and then contact the service member claiming to be a senior military official.  As a senior military member, they would tell each service member that they were receiving the wrong salary, and they were owed more money than they were being paid.  The perpetrators of the scheme who advise the service member that they needed to return their prior pay using a cash application and then they would receive the higher pay once the other money was returned.  If a service member followed these instructions, the members of this scheme would take the monies transferred and would never return any monies to the victim.  Griffin conspired with others in this scheme by taking the cash application transfers and conducted financial transactions that transferred the victim’s money to accounts that were accessed by all members of the scheme.

Under federal statutes, Griffin is subject to a sentence of up to 20 years in federal prison without parole. The maximum statutory sentence is prescribed by Congress and is provided here for informational purposes, as the sentencing of the defendant will be determined by the court based on the advisory sentencing guidelines and other statutory factors. A sentencing hearing will be scheduled after the completion of a presentence investigation by the United States Probation Office.

This case is being prosecuted by Assistant U.S. Attorney Patrick Carney. It was investigated by the Department of the Army Criminal Investigation Division and the Federal Bureau of Investigation.

Michigan Man Arrested and Charged with Attempting to Attack Military Base on Behalf of ISIS

Source: US FBI

A Melvindale man – and former member of the Michigan Army National Guard – was arrested today after he attempted to carry out a plan to conduct a mass-shooting at a U.S. military base in Warren, Michigan, on behalf of the Islamic State of Iraq and al-Sham (ISIS), a foreign terrorist organization.

Ammar Abdulmajid-Mohamed Said, 19, is charged in a criminal complaint with attempting to provide material support to a foreign terrorist organization and distributing information related to a destructive device.

“This defendant is charged with planning a deadly attack on a U.S. military base here at home for ISIS,” said Sue J. Bai, head of the Justice Department’s National Security Division. “Thanks to the tireless efforts of law enforcement, we foiled the attack before lives were lost. We will not hesitate to bring the full force of the Department to find and prosecute those who seek to harm our men and women in the military and to protect all Americans.”

“ISIS is a brutal terrorist organization which seeks to kill Americans. Helping ISIS or any other terrorist organization prepare or carry out acts of violence is not only a reprehensible crime – it is a threat to our entire nation and way of life,” said U.S. Attorney Jerome F. Gorgon Jr. for the Eastern District of Michigan. “Our office will not tolerate such crimes or threats, and we will use the full weight of the law against anyone who engages in terrorism.”

“The defendant allegedly tried to carry out an attack on a military facility in support of ISIS, which was disrupted thanks to the good work of the FBI and our partners,” said Assistant Director Donald M. Holstead of the FBI’s Counterterrorism Division. “The FBI is steadfast in our commitment to detect and stop terrorist plans aimed at the American homeland or at U.S. interests overseas.”

“The arrest of this former soldier is a sobering reminder of the importance of our counterintelligence efforts to identify and disrupt those who would seek to harm our nation,” said Brig. Gen. Rhett R. Cox, the commanding general of Army Counterintelligence Command. “I commend the tireless work of our special agents and FBI partners who worked together to investigate and apprehend this individual. We will continue to collaborate with our partners to prevent similar incidents in the future. We urge all soldiers to remain vigilant and report any suspicious activity to their chain of command, as the safety and security of our Army and our nation depends on our collective efforts to prevent insider threats.”

According to the complaint, Said informed two undercover law enforcement officers of a plan he had devised and formulated to conduct a mass-shooting at the U.S. Army’s Tank-Automotive & Armaments Command (TACOM) facility at the Detroit Arsenal in Warren, Michigan. In April 2025, the two undercover officers indicated they intended to carry out Said’s plan at the direction of ISIS. In response, Said provided material assistance to the attack plan, including providing armor-piercing ammunition and magazines for the attack, flying his drone over TACOM to conduct operational reconnaissance, training the undercover employees on firearms and the construction of Molotov cocktails for use during the attack, and planning numerous details of the attack including how to enter TACOM and which building to target.

On May 13 – the scheduled day of the attack – Said was arrested after he traveled to an area near TACOM and launched his drone in support of the attack plan. He will make his initial court appearance today in the Eastern District of Michigan. The U.S. Attorney’s Office will be asking the court to hold Said in pretrial detention because of his danger to the community and the risk that he will flee.         

Based on the charges in the complaint, Said faces a maximum penalty of 20 years in prison for each count if convicted.

The FBI’s Joint Terrorism Task Force is investigating the case.

Assistant U.S. Attorney Douglas Salzenstein for the Eastern District of Michigan and Trial Attorneys John Cella and Charles Kovats of the National Security Division’s Counterterrorism Section are prosecuting the case.

A complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

FBI Director Announces Chinese Botnet Disruption, Exposes Flax Typhoon Hacker Group’s True Identity at Aspen Cyber Summit

Source: US FBI

The FBI and our partners disrupted a Chinese botnet and freed thousands of impacted devices from its clutches, Director Christopher Wray announced September 18. 

The botnet, which was operated by a Chinese government-sponsored hacker group known as Flax Typhoon, targeted internet-connected devices such as storage devices, cameras, and video recorders to compromise victims’ systems and steal their confidential data, Director Wray said during a keynote at the 2024 Aspen Cyber Summit in Washington, D.C.

“Ultimately, as part of this operation, we were able to identify thousands of infected devices, and, then, with court authorization, issued commands to remove the malware from them, prying them from China’s grip,” Wray said.  

Approximately half of the devices under the botnet’s control were based in the United States, he noted. The hacker group’s targets included organizations in the public and private sectors, as well as academia and the media, he added. Wray also revealed the hacker group’s true identity to be an information security company known as the Integrity Technology Group. “But their chairman has publicly admitted that for years his company has collected intelligence and performed reconnaissance for Chinese government security agencies,” Wray added. 

Wray called the cyber disruption a success but cautioned that the effort was “just one round in a much longer fight.” 

“The Chinese government is going to continue to target your organizations and our critical infrastructure—either by their own hand or concealed through their proxies,” Wray said. “And we’ll continue to work with our partners to identify their malicious activity, disrupt their hacking campaigns, and bring them to light.” 

Saving victims time and money 

During his remarks, Wray also underscored the Bureau’s dedication to working with victims of cyber intrusions, whether they’re individuals or organizations. According to Wray, reporting ransomware attacks to the FBI can potentially help us: 

  • Recover ransomed data 
  • Negotiate-down ransoms demanded by cybercriminals—or spare victims from having to pay ransoms at all 
  • Help impacted organizations resume their normal operations in a speedy manner 

“I’m extremely proud to report that, in just the past two years, the FBI has handed out nearly 1,000 decryptors, and we’ve saved victims around the world something like $800 million in ransom payments,” Wray said. 

Decryptors—also known as decryption keys—function like passwords to unlock data that ransomware criminals hold captive. But, Wray explained, some of those keys require information about the victim to work.  

So it’s paramount that organizations contact the FBI if they fall victim to ransomware attacks. Otherwise, he cautioned, the Bureau “might not be able to make that match—and we might not be able to save you that ransom payment.” 

Wray also discussed how information sharing between the Bureau and our public and private sector partners can help the FBI combat ongoing cyberattacks and lessen the impact of future cyber incidents.  

As an example, he pointed to a recent interagency effort to alert the private sector that a pro-Russian hacktivist group was targeting “operational technology networks.”  

“They had set their sights across our critical infrastructure—from dams and wastewater systems to the energy, food, and agriculture sectors,” Wray explained.  

But, he said, the FBI’s joint advisory about the cyber threat allowed private sector organizations to fix the vulnerability these bad actors were using to infiltrate networks, thereby protecting the companies and the American public, alike. 

“So, if there’s only one thing you take away from my time here today, I hope it’s this: The FBI needs and wants to work with you,” Wray said. “Let us save you money, save you time, and save you from future attacks so that you can keep your organization’s focus where it should be: on your operations, and—together—we can help keep our nation safe.” 

West Palm Beach investigation updates 

During his remarks, Wray also addressed the Bureau’s investigation into the September 15 assassination attempt on former President Donald Trump.  

“For the second time in just over two months, we’ve witnessed what appears to be an attempt to attack our democracy and our democratic process,” he said. “I’m relieved that former President Trump is safe, and I want the American people to know the men and women of the FBI are working tirelessly to get to the bottom of what happened.” 

Wray acknowledged that the ongoing nature of the investigation limited how much the Bureau could say about the matter. 

“What I can say is that we have dedicated the full force of the FBI to this investigation, and that runs the gamut from criminal to national security resources, from tactical support to Evidence Response Teams, from forensic scientists to operational technology personnel,” he said.“Together, we’re working around the clock to investigate this.” 

2023 Cryptocurrency Fraud Report Released

Source: US FBI

Losses related to cryptocurrency fraud totaled over $5.6 billion in 2023, a 45% increase in losses since 2022, according to a report from FBI’s Internet Crime Complaint Center (IC3) published on September 9, 2024. The number of complaints from the public regarding cryptocurrency fraud continues to steadily increase, reaching 69,000 in 2023.

Cryptocurrency is a type of digital currency that you can use to buy goods or services or to invest. Examples of cryptocurrencies include bitcoin, ether, or tether.

As the use of cryptocurrency in the global financial system continues to grow, criminals are increasingly using cryptocurrency due to its decentralized nature, the speed of irreversible transactions, and the ability to transfer value around the world. Using cryptocurrency also makes it harder for victims to recover stolen funds. Once an individual sends a payment, the recipient owns the cryptocurrency. Recipients often quickly transfer that digital currency into an account overseas for cashout purposes.

Criminals can exploit cryptocurrencies in many types of criminal schemes. In 2023, most cryptocurrency complaints involved investment scams. These losses totaled $3.9 billion and accounted for almost 71% of all losses related to cryptocurrency in 2023. Other examples of scams associated with cryptocurrency include tech support, confidence and romance, and government impersonation scams.   

Cryptocurrency investment fraud is the most common type of cryptocurrency scam. In this type of fraud, criminals use various means of manipulation to convince victims to deposit increasing amounts of money into financial “investments” using cryptocurrency. In truth, these investments are fake; criminal actors who are usually located overseas control—and ultimately steal—all victim money. As a result, victims typically lose everything they invested.

Losses from cryptocurrency-related investment fraud schemes reported to the IC3 rose from $2.57 billion in 2022 to $3.96 billion in 2023‚a 53% increase. Many individuals have accumulated massive debt to cover losses from these fraudulent investments.

Individuals aged 30-39 and 40-49 filed the most complaints related to cryptocurrency investment fraud (approximately 5,200 reports in each age group). But complainants over the age of 60 reported the highest losses (over $1.24 billion).

Learn more about the process behind cryptocurrency investment fraud. 

The FBI, along with the Department of Justice, law enforcement, regulatory agencies, and financial institution partners, is dedicated to identifying the perpetrators of these schemes and bringing them to justice.

The FBI’s IC3 is the central intake hub for individuals in the U.S. or abroad to report fraud and cybercrime. The IC3 analyzes complaints and aggregates them to identify trends and help develop strategies to combat these schemes and protect scam victims from loss. IC3 also shares the complaints it receives with FBI field offices, other law enforcement agencies, and regulatory entities for further investigation or action, as appropriate.

In February 2022, the FBI formed the Virtual Assets Unit (VAU), a specialized team dedicated to investigating cryptocurrency-related crimes. The VAU centralizes the FBI’s cryptocurrency expertise into one nerve center, providing technological equipment, blockchain analysis, virtual asset seizure training, and other sophisticated training for FBI personnel. 

If you believe you or someone you know may be a victim of cryptocurrency fraud, immediately submit a report to the IC3 via ic3.gov or contact your local FBI field office and provide as much transaction information as possible. We encourage you to submit a complaint through ic3.gov, even if a financial loss did not occur.

When submitting a report to ic3.gov, include as much as you can of the following information: 

  • Financial transaction details, including: 
    • Cryptocurrency wallet addresses 
    • The amounts and types of cryptocurrencies involved 
    • Date and time of the transactions, and transaction IDs (hash)
  • Information about how you met the scammer(s)
  • What platforms you used to communicate with the scammer(s)
  • Any website address(es) involved in the scheme
  • Any phone numbers or other identifiers you might have about the scammer(s)

You can refer to IC3’s public service announcement, “FBI Guidance for Cryptocurrency Scam Victims,” for more information about what to report.

Individuals aged 60 or older can also contact the National Elder Fraud Hotline (833-372-8311) to assist with filing an IC3 complaint. 

Highlighting Safety Measures to Protect Nation’s Food Infrastructure

Source: US FBI

“Wherever in the country you may live—from California to Nebraska to Georgia to points in between—the cyber risk and the national security risk for farms and ranches and our food processing facilities is growing exponentially,” said Gene Kowel, special agent in charge of the FBI’s Omaha Field Office, which partnered with the Nebraska Farm Bureau to host the August 12 symposium. “The threats are evolving. They’re becoming more complex and more severe.”

Examples shared during the daylong event included ransomware attacks that cripple operations, network hacks that take control of systems, and the theft of seeds worth millions of dollars in intellectual property and research.

Kowel said the FBI is monitoring four major threats to the nation’s agriculture sector, which—like water, power, and transportation—is considered part of the nation’s critical infrastructure. The threats include ransomware attacks, malicious software (malware) from foreign adversaries, theft of data and intellectual property, and bioterrorism.

Foreign actors—most notably the People’s Republic of China—are actively seeking ways to disrupt the United States’ agriculture industry, Kowel said. He urged farmers, cattle ranchers, and others to add cyber hygiene to their long list of chores. Cyber hygiene includes basic steps like using multi-factor authentication to access networks and backing up critical data.

“We all know that in agriculture today, almost all of our data is stored in the cloud,” Kowel said. “Almost all of our complex machinery is connected to the internet, connected to the cloud, so protecting that control and protecting that data is critical.”

Ensuring Safety at Sea

Source: US FBI

In addition to reporting the incident to a cruise ship security officer as soon as possible, you can also report the incident to the FBI directly. Knowing your rights can help you speak up if something happens.

For investigators, a big challenge is delayed reporting.

Pagliarini stressed the importance of immediate reporting by victims and witnesses, especially considering the complexities of investigating crimes at sea.

Delays often occur because victims feel ashamed or uncertain and may only report the incident after discussing it with others once they return home, said Pagliarini.

“We get that a lot, or somebody has something stolen, and they don’t know until they got home and then report it,” said Pagliarini. “This delay complicates investigations, especially when victims are far from the location of the incident.”

Parker and Pagliarini suggest passengers avoid taking valuable jewelry—as it’s easy to lose or have stolen—be responsible when drinking, and go directly through the cruise line company when booking excursions.

They also explained that it is important to familiarize yourself with the guest services locations on the ship. And if you see an incident, do your best to be a helpful witness.

Behind every cruise ship crime incident is a human story of victims seeking justice and families grappling with loss. The FBI’s Victim Services Division offers support to those affected by crimes at sea.

“It’s very common if we have a juvenile involved, we make our best efforts to notify Victim Services ahead of time, and often they’ll accompany myself or whoever’s going out initially on the investigation,” said Pagliarini. From counseling referrals to support navigating the criminal justice process, their efforts extend to both victims and their families.

Additionally, the FBI conducts specialized training for industry partners, enhancing their ability to assist law enforcement with securing and documenting a crime scene at sea.

“We try to hold trainings with the cruise industry personnel, kind of a best practice as far as evidence preservation,” said Parker.

The collaborative approach to security at sea, along with passengers understanding how to mitigate risk, is vital to ensuring the FBI can work with partners at every level to investigate crimes on the high seas and keep Americans safe.

Students Get Inside Look at Life as an FBI Agent

Source: US FBI

The course is a lively mix of presentations and practical exercises. FBI personnel—including linguists, technical experts, forensic accountants, intelligence analysts, special agents, and bomb technicians—answered questions about their jobs and how they arrived at the FBI.

In a mock scenario on the first day, a special agent explained how investigators assemble the building blocks of a case by looking at the available facts and evidence and then asking the right questions. Then students separated into “squads” and practiced.

On day two, students learned best practices for dusting for fingerprints, sketching crime scenes, and interviewing subjects—all while dutifully documenting everything. For many, the rigors of tracking every photo, statement, and piece of evidence was illuminating.

“It was really eye-opening,” said Ryan, an FAIT participant. “It’s been very jarring to see, like, just how methodical that process is for any kind of crime scene like this.”

Photo Gallery

Select image to view gallery

“There’s a lot more that goes into examining a crime scene than people realize,” added Hannah, another FAIT participant. “There were multiple different things we needed to include, like the case number, the item number, description, location, time.”

The Cleveland Division borrowed the idea for Future Agents in Training from the FBI’s Washington Field Office in 2015, seeing it as a way to connect with students in the communities it serves. FBI field offices rely on outreach efforts like FAIT, Citizens Academies, Junior Special Agents, college Honors Internships, and Teen and Youth Academies to help strengthen relationships with communities.

Meet the Cyber Action Team

Source: US FBI

Across the globe, malicious cyber activity threatens public safety and national and economic security. Criminals target organizations such as schools, hospitals, power and utility companies, and other critical infrastructure entities that serve communities.

As the lead federal agency for investigating cyberattacks and intrusions, the FBI developed a specialty group—the Cyber Action Team, or CAT—that can deploy across the globe within hours to respond to major cyber threats and attacks against these critical services.

Composed of about 65 members, CAT is an investigative rapid response fly team that leverages special agents, computer scientists, intelligence analysts, and information technology specialists from across FBI field offices and Headquarters.

“We respond onsite to victims who may include national government entities, private companies, or even sometimes foreign partner networks that have been compromised by an adversary,” said Scott Ledford, head of the Cyber Action Team and the Advanced Digital Forensics Team. “Our job is to help conduct the investigation—we collect digital evidence and locate, identify, and reverse engineer malware. We also help the victim understand when they were compromised and how, writing a timeline and a narrative of that intrusion with the ultimate goal of identifying who is responsible, attributing that attack.”

CAT was established in 2005 in response to an increase in the number and complexity of computer intrusion investigations in FBI field offices. At the time, not all field offices had personnel with the cyber expertise necessary to properly respond to and investigate sophisticated computer intrusions.

“There was this transition that was taking place between what investigations the FBI was responsible for and the types of crimes that we were starting to see,” explained Ledford. “Cyber was such a growing threat at the time, and so it became necessary that some field offices would reach out and say, ‘Hey, do you know of any cyber experts who can help me work through an investigation?”

As the team formalized its processes and expanded, in 2016, the Presidential Policy Directive 41, “United States Cyber Incident Coordination” was signed, setting forth principles for the federal government’s response to cyber incidents involving government or private sector entities. The FBI was appointed the lead federal agency for cyber threat response activities.

“From an investigative standpoint, the FBI is unique. We’re one of the few agencies in the U.S. government that has both law enforcement and counterintelligence authorities,” said Ledford. “And those authorities, and the American people’s trust in us, help us to deliver a unique blend of national security and criminal investigative skills, expertise, and resources to implement that blended response and help facilitate an investigation, regardless of whether it leads us overseas or to a courtroom here in the U.S.”

The bulk of CAT’s cases usually involve the FBI identifying an organization with a particular intrusion that’s either so complex or large-scale that the local field office requests additional assistance.

In one case, CAT deployed to a health care company that a separate intrusion investigation had identified as compromised. CAT’s response helped lead to the identification of several compromised systems and accounts on their network. While working alongside the company, CAT disrupted the threat—and prevented further exploitation across their network.

CAT also receives requests from FBI legal attachés, the State Department, the National Security Council, and the White House to assist other countries when they face cyberattacks.

“It could be a country that doesn’t have the resources or the expertise that the U.S. government has, and they’ve reached out and asked for help,” said Ledford. “There can be a NATO or a non-NATO ally country that says, ‘We’ve been hit hard by this adversary, and we don’t have the localized personnel, we don’t have the resources, we don’t have the expertise to respond to this. Can you help us with it?”

In another case, CAT deployed overseas to provide incident response support to a NATO ally that had been targeted by a destructive cyberattack. CAT responded and worked together with U.S. partners to determine the initial intrusion vector, identify other networks that were impacted, collect and analyze digital evidence, and ultimately attribute the intrusion to a foreign government. The NATO ally severed diplomatic ties with the foreign government, closed the foreign government’s in-country embassy, and evicted them from the country.

“We have some talented people, and they work hard every single day,” said Ledford. “It’s an honor to sit alongside them.”

Key Tactic: Strong Communication Skills

In addition to excellent technical skills, CAT members are closely vetted for strong communication skills. Ledford explained that part of the CAT applicant selection process entails a multi-day live technical exercise that’s designed and curated by CAT:

“We design a network environment. We may mimic an industry, for example, an electric utility. And then we compromise that environment, and we litter it with artifacts, digital evidence, and malware. Then we task applicants to investigate this cyber incident and present their findings.

At the end of the five days, applicants present their findings, and we identify who has the technical capability and expertise to find digital evidence of a crime hidden within this mountain of data that we’ve thrown at them.

If the applicant passes that phase of that selection exercise, we invite them to participate in a panel presentation. Our CAT members will play the roles of the victims we’re trying to help and their own resource teams, for example, a company CEO, a U.S. attorney, a third-party legal counsel, or IT administrator.

You’re essentially giving us the narrative of the cyber intrusion. You’re telling us a story about what happened. While some of the panel questions will be very technical in nature, some will be more basic questions—the applicant will need to be able to explain to a CEO, for example, who might not have technical expertise, what the problem was and how to fix it. We’re looking to see whether you can take something that’s exceptionally technically complex and explain it in such a way that everyone in the room understands it.

We’re also looking for interpersonal ability. For example, in the case of a company CEO, at that moment during a cyberattack, they may be going through one of the most stressful times of their company’s existence—there may be data leaked that can make or break that company’s future and their profits, as well as their ability to employ people and their ability to deliver services to their customers. You need the communications skills to interact with them during a difficult time and gain trust.”

Operation Clean House: New Orleans

Source: US FBI

Operation Clean House was implemented in two phases. 
 
Phase One focused on a proactive strategy. Law enforcement teams were deployed in every district of New Orleans, engaging in real-time, intelligence-driven actions. Uniformed and unmarked units from multiple agencies received live analytical support as they moved into targeted areas. 

Phase One resulted in 74 arrests; multiple dangerous drugs seized, including fentanyl, heroin, crack cocaine, and oxycodone; and 46 firearms and ammunition taken into evidence, including AK-47s, AR-15s, Glock switches, and multiple types of handguns.

“Each weapon and each bullet confiscated is potentially one less person potentially injured or killed,” said Myrthil. 

Phase Two focused on fugitive apprehension. During the planning phase, partner agencies submitted more than 400 outstanding arrest warrants for FBI intelligence analysts to review and determine whether to include as part of Operation Clean House. Analysts vetted warrants for consideration, checking to see which ones were still active, whether the subject was already incarcerated, or, in some cases, whether the subject was deceased. The analysts narrowed the list of warrants to 76 of the most violent offenses, including attempted murder, assault by drive-by shooting, and aggravated battery or aggravated assault. The warrants were then divided among multi-agency teams to make arrests. 

Phase Two resulted in 77 arrests, including 100% execution of all warrants, and the seizure of 11 firearms and additional ammunition. 

“We saw significant results immediately, including the arrest of a 31-year-old man from Pennsylvania on gun and drug charges who was also wanted in Vermont for first-degree murder,” said Myrthil. “At the time we arrested him, this suspected killer had two guns in his possession, including one with an extended magazine.”

The operation led to one suspect being taken into custody within minutes of a shooting near a New Orleans neighborhood where agents, officers, and troopers were already working. In another incident, state troopers and Homeland Security Investigation agents provided life-saving support to a subject who had shot himself in the leg while fleeing from law enforcement. 
 
Ultimately, Operation Clean House’s successful results came down to the integration between intelligence and operational components, which ensured a smooth flow of validated information, and partnerships between law enforcement and local communities. 

“The research and analysis conducted by the intelligence analysts were crucial to this operation and contributed to the likelihood of safe apprehensions,” said Myrthil. “The tremendous partnerships the FBI enjoys with external federal, state, and local law enforcement agencies were key to success. We are proud to also recognize the support of the New Orleans community and its active interest in combatting violent crime.”

Myrthil emphasized that though Operation Clean House has ended, the FBI and law enforcement will continue to fight violent crime in New Orleans and across Louisiana. 

“We will work tirelessly with our partners to keep Louisiana safe. We are here, we are listening, and we care.”

FBI Marks 100 Years of Fingerprints and Criminal History Records

Source: US FBI

Director Wray joined past and present CJIS leaders, lawmakers, FBI staff, and dozens of retired fingerprint examiners at the July 10 event, which celebrated 100 years since the Bureau established its Identification Division on July 1, 1924. The new division consolidated 810,000 fingerprint files from the United States Penitentiary in Leavenworth, Kansas, and the National Bureau of Criminal Identification, which had been the keeper of crime data for the International Association of Chiefs of Police since 1896.

Wray described the history of fingerprint technology in investigations spanning a century.

“I’m proud that we’ve maintained that focus on growing our capabilities, because there’s simply no other way to remain as effective as a law enforcement and intelligence agency when the threats are as dynamic and evolving as they are today,” Wray said. He also highlighted the introduction of new biometric modalities—like facial recognition, palm prints, and iris scans—as innovations that will help the FBI and its partners better carry out their missions into the future. NGI’s National Iris Service, for example, allows users like police and prison staff to enroll iris images without physical contact, linking a subject’s irises to their respective fingerprint records. “You want to talk about the textbook illustration of innovation,” Wray said. 

To help mark the occasion, artifacts spanning the fingerprint repository’s century-long history were on display for visitors. Items included vintage fingerprint cards, magnifiers, and the colored pencils that fingerprint examiners have used for generations. And a gallery of images illustrated the progression of fingerprint technology—from taking impressions with ink rollers and paper cards to the digital mobile devices that many agencies use today.