The FBI’s Counterterrorism Division Turns 25

Source: US FBI

A steadfast dedication to countering the threat

After the ISIS caliphate collapsed in the late 2010s, a perception arose that terrorist threats were on a decline. To some, the threat posed by foreign terrorist organizations had diminished to the point where counterterrorism didn’t need to be the Bureau’s top priority.

“And, I’ll admit, I even had my own doubts,” Scott said. “I was a JTTF [Joint Terrorism Task Force] squad supervisor at the time and then assistant special agent in charge at a field office, and I could see that downward trend myself. And it was very obvious. And, of course, I consider that a good thing. If we had helped to diminish the terrorist threat, that’s always a good thing.”

But, he said, the events of October 7, 2023, in the Middle East confirmed the Bureau’s threat calculus.

“Even before the October 7 Hamas attack on Israel, the FBI had been very public in saying that the terrorism threat was already elevated across the board, with international threats, domestic terrorism threats, and the state-sponsored threat,” he said. “And, as I talk to my counterparts now across the interagency—and even with international partners—everybody is saying the same thing: They’re seeing this across the globe. This is an issue that’s not just facing the U.S., but it’s facing everybody with these simultaneously elevated threats.” 

How CTD has evolved 

The Bureau’s bandwidth for handling counterterrorism-related tips has also grown exponentially in the past 25 years, with the creation of our National Threat Operations Center to triage and route tips from the public to investigators in the field.

The FBI’s use of partnerships to stem this threat has expanded in parallel fashion. 

In 1980, the FBI New York Field Office pioneered the Joint Terrorism Task Force partnership model—which brings together experts from local, state, and federal government agencies to leverage their collective range of skillsets to investigate and prevent acts of terror. Since then, these task forces have expanded throughout the field. 

“And, now, you’ve got 4,000 members from over 500 different state and local agencies, 50 federal agencies, all working nationwide on Joint Terrorism Task Forces, and they’re working to prevent any of these domestic attacks, any international terrorism attacks,” Scott said.

The Bureau has also established a Headquarters-level National Joint Terrorism Task Force, whose membership includes representatives from the Defense Department, the U.S. Intelligence Community, and other federal government agencies. The interagency corps coordinates field-level JTTF efforts and oversees personnel movement to ensure those squads have the proper mix of staffing from member agencies, Scott explained.

As for tactics, Scott said the increasing sophistication of terrorists’ techniques and use of communications has also demanded innovation on the part of CTD. For example, he said, these bad actors’ use of encrypted mobile apps to plot attacks against Americans on U.S. soil and around the world inspired the Bureau to form specialized teams, known as Terrorist Use of the Internet squads, to determine how to disrupt such efforts. 

Why the FBI investigates terrorism

Guidelines from the attorney general dictate when the FBI can start a terrorism investigation and authorize the FBI to collect information accordingly. 

This information serves two purposes:

  • First, it helps us build a case against people or groups who break the law to help us arrest them and to assist the U.S. Department of Justice in prosecuting them. Our investigations focus on the unlawful activity of the group, not the ideological orientation or First Amendment-protected activity of its members.
  • Next, it builds an intelligence base that we can analyze to prevent terrorist activity. 

The FBI’s approach to counterterrorism investigations is based on the need both to prevent incidents where possible and to react effectively after incidents occur.

The FBI is empowered to investigate terrorism both at home and overseas. “That goes back to 1983, when Attorney General William French Smith modified the guidelines for conducting intelligence investigations,” Scott said. “And then, the next year, Congress authorized the Bureau to pursue criminals who attacked Americans beyond our shores.”

These days, CTD has a global footprint to protect Americans the world over.

“Now, we have counterterrorism assistant legal attachés––or ALATs––forward-deployed in U.S. embassies across the globe,” Scott said. “We’ve got the fly team that can deploy both domestically and overseas at a moment’s notice. And then, we’ve got a significant portion of our division here at Headquarters that is dedicated to ensuring our U.S. citizens are protected overseas, just as they would be here within the borders of the U.S.” 

Online Platform Provides Current Data on Law Enforcement Suicides

Source: US FBI

Data includes circumstances surrounding law enforcement suicides and suicide attempts, general locations, demographics, occupations, and the methods used.

“We aim to provide agencies with the means to understand and mitigate situations which could eventually lead to a death by suicide,” said Lora Klingensmith, a program manager in the FBI’s Criminal Justice Information Services (CJIS) Division, which manages the Bureau’s Uniform Crime Reporting (UCR) Program.

This year, according to the LESDC, seven law enforcement agencies have reported nine suicides and three attempted suicides. All the suicide victims were males—seven were white, one was Black, and one was Hispanic or Latino. Firearms were used in seven suicides; two were listed as “other.” The collection does not collect information that identifies individuals.

As with crime statistics, the ideal is to have more agencies report to the LESDC so that a more representative picture emerges. Law enforcement agencies are not required to submit suicide information to the FBI; it’s voluntary. But the Law Enforcement Suicide Data Collection Act, passed in 2020, requires the attorney general and the FBI to report the suicide data annually to Congress. The FBI, which has a nearly century-long history of collecting data from law enforcement agencies, began collecting the information from agencies on January 1, 2022.

One Hundred Eighty-Nine Arrested in Immigration Crackdown Under the ‘Make D.C. Safe and Beautiful’ Initiative

Source: US FBI

Authorities Made Arrests as Part of Coordinated Effort to Restore Order and Uphold Immigration Laws.

WASHINGTON – U.S. Attorney Ed Martin Jr. joined with other federal law enforcement leaders to announce today that as a result of a joint federal law enforcement initiative, authorities arrested 189 individuals following a joint federal immigration-related enforcement operation in the District of Columbia over the past week.

As part of the operation, authorities apprehended 189 illegal aliens during an enhanced targeted immigration enforcement operation focusing on egregious criminal alien offenders operating in and around Washington, D.C., May 6–9.

“Thanks to President Trump’s leadership and this administration’s focus on law and order, these arrests represent a major step forward in making Washington, D.C., safer for legal citizens and their families,” said U.S. Attorney Martin. “These arrests make clear that violating our nation’s immigration laws will not be ignored.”

“The District of Columbia is exponentially safer today because of countless hours of investigative work and dedication to duty displayed by ICE Washington, D.C., and our law enforcement partners,” said ICE Enforcement and Removal Operations Washington, D.C., Field Office Director Russell Hott. “Working with our partner agencies, ICE officers and agents arrested 189 illegal aliens and removed them from the streets of our Nation’s Capital. Throughout this enhanced enforcement operation, we targeted the most dangerous alien offenders in some of the most crime-infested neighborhoods in the city of Washington, D.C. Evil is powerless if the good are unafraid. I commend the efforts of everyone involved, as all were truly committed to the success of this operation. ICE Washington, D.C., remains dedicated to our mission of prioritizing public safety by arresting and removing criminal offenders from our Nation’s Capital and surrounding communities.”

Among those arrested during the enhanced targeted operation include the following:

• A 47-year-old illegally present Guatemalan alien whose criminal history includes drug possession, illegal reentry, aggravated assault, trespassing, disorderly conduct, and sexual assault. His current criminal charges include unlawful reentry of a previously deported alien, disorderly conduct, lewd acts, possession of a controlled substance, sex abuse, assault with a dangerous weapon, and possessing an open container. Additionally, he has numerous gang-affiliated tattoos on his arms, legs, and chest.

• A 25-year-old illegally present Guatemalan alien whose criminal history includes threat to kidnap, attempted possession of a prohibited weapon, threats to bodily harm, and simple assault. He is currently charged with alien present without admission or parole.

• A 30-year-old illegally present Salvadoran alien whose criminal history includes simple assault, driving while intoxicated, brandishing a machete, and unauthorized use of a vehicle. He is currently charged with alien present without admission or parole.

• A 36-year-old illegally present Mexican alien whose criminal history includes misdemeanor larceny, misdemeanor indecent exposure, possession of an open container, simple assault, theft, unlawful entry, and possession of a prohibited weapon (knife). He is currently charged with alien present without admission or parole.

This law enforcement activity is part of President Donald Trump’s Make D.C. Safe and Beautiful Executive Order. The Executive Order directs a coordinated federal effort to reduce crime, enhance public safety, and restore pride in the nation’s capital through targeted enforcement, improved policing, and strategic partnerships. It also calls for the beautification of public spaces, stricter enforcement of quality-of-life laws, and the removal of graffiti and encampments on federal lands to ensure D.C. remains clean, secure, and reflective of America’s strength and heritage.

Participating agencies include U.S. Immigration and Customs Enforcement; Virginia Department of Corrections; the Federal Bureau of Investigation, Washington Field Office; Bureau of Alcohol, Tobacco, Firearms and Explosives; Drug Enforcement Administration; U.S. Marshals Service; and U.S. State Department Diplomatic Security Service.

Members of the public can report crimes and suspicious activity by dialing 866-DHS-2-ICE (866-347-2423) or completing the online tip form.

All charges are merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law. 

Help the FBI Identify John Doe 49

Source: US FBI

Story Update (December 2, 2024): John Doe 49 has been identified, located, and is in custody.

The FBI is seeking the public’s assistance to identify an unknown male, dubbed John Doe 49, who may possess critical information about a child victim in an ongoing sexual exploitation investigation. 

John Doe 49 is described as a bald, white male between the ages of 45 and 65 years old. He has a dark goatee and at least five visible tattoos: 

  • The word “Dabby” on the right side of his chest 
  • The number “197,” followed by possible additional unknown text, on his left bicep 
  • Additional tattoos on his left and right forearms and right bicep 

We’ve produced a poster featuring still images of John Doe 49 that were taken from a video file.

The source video, which was brought to our attention by our partners at the National Center for Missing and Exploited Children, was produced in July 2024 or earlier. The video file doesn’t include EXIF data. 

No charges have been filed in this case, and John Doe 49 is presumed innocent unless and until proven guilty in a court of law. 

We’re seeking John Doe 49 as part of two FBI initiatives: 

  • Operation Rescue Me, which focuses on using clues obtained through in-depth image analysis to identify child victims shown in child exploitation material 
  • The Endangered Child Alert Program, which seeks to amplify imagery of unknown adults (dubbed John or Jane Does) whose faces or other distinguishing characteristics appear in child sexual exploitation material 

If you recognize and/or have information about John Doe 49, you can submit a tip online at tips.fbi.gov or by calling 1-800-CALL-FBI (1-800-225-5324).

Former State Government Employee and Her Ex-Boyfriend Sentenced to Federal Prison for Fraudulently Obtaining COVID-19 Jobless Relief

Source: US FBI

LOS ANGELES – A former employee of the California Employment Development Department (EDD), which administers the state’s unemployment insurance (UI) program, and her former boyfriend were sentenced today to federal prison terms for fraudulently obtaining hundreds of thousands of dollars in COVID-19 pandemic-related jobless benefits.          

Phyllis Hope Stitt, 61, of Carson, was sentenced to 20 months in federal prison by United States District Judge André Birotte Jr., who also ordered her to pay $768,958 in restitution.

Judge Birotte today also sentenced Kenneth Earl Riley, 64, of South Los Angeles, to 20 months in federal prison and ordered him to pay $611,458 in restitution.

Stitt and Riley had been in a romantic relationship for more than 10 years at the beginning of the COVID-19 pandemic while Stitt was employed by the EDD as an employment program representative. Her job duties included determining claimant eligibility for UI benefits and performing claim processing activities.

From March 2020 to September 2021, while using the access and information available to her in her position with EDD, Stitt acquired the names, dates of birth, Social Security numbers, and other personal identifying information of victims that were used to submit fraudulent claims.

Stitt then filed fraudulent applications for UI benefits without the victims’ knowledge or consent, and then increased the amount of UI benefits paid out by backdating the fraudulent requests to maximize the claims.

Stitt certified the fraudulent applications alleging that the victims had submitted their employment history and driver’s license information, and she confirmed they were unemployed because of the pandemic and actively were searching for work.

Many of the victims were ineligible to receive these benefits because they were currently employed, not unemployed because of the pandemic, or were deceased at the time.

In filing the fraudulent applications, Stitt used mailing addresses to which Riley had access. Riley then used debit cards and accounts created because of these fraudulent applications. Riley then made cash withdrawals at ATMs, bank transfers and retail purchases.

On May 17, 2021, the Attorney General established the COVID-19 Fraud Enforcement Task Force to marshal the resources of the Department of Justice in partnership with agencies across government to enhance efforts to combat and prevent pandemic-related fraud. The Task Force bolster efforts to investigate and prosecute the most culpable domestic and international criminal actors and assists agencies tasked with administering relief programs to prevent fraud by, among other methods, augmenting and incorporating existing coordination mechanisms, identifying resources and techniques to uncover fraudulent actors and their schemes, and sharing and harnessing information and insights gained from prior enforcement efforts. For more information on the department’s response to the pandemic, please visit https://www.justice.gov/coronavirus.

On September 15, 2022, the Attorney General selected the U.S. Attorney’s Offices for the Central and Eastern Districts of California to jointly head one of the three national COVID-19 Fraud Strike Force Teams. The Department of Justice established the Strike Force to enhance existing efforts to combat and prevent COVID-19 related financial fraud. The Strike Force combines law enforcement and prosecutorial resources and focuses on large-scale, multistate pandemic relief fraud perpetrated by criminal organizations and transnational actors, as well as those who committed instances of pandemic relief fraud. The Strike Force uses prosecutor-led and data analyst-driven teams to identify and bring to justice those who stole pandemic relief funds. Additional information regarding the Strike Force may be found at https://www.justice.gov/opa/pr/justice-department-announces-covid-19-fraud-strike-force-teams.

Anyone with information about allegations of attempted fraud involving COVID-19 can report it by calling the Department of Justice’s National Center for Disaster Fraud (NCDF) Hotline at (866) 720-5721 or via the NCDF Web Complaint Form at https://www.justice.gov/disaster-fraud/ncdf-disaster-complaint-form.

The United States Department of Labor Office of Inspector General, the FBI, and the California Employment Development Department Investigation Division investigated this matter.

Assistant United States Attorney Steven M. Arkow of the Major Frauds Section prosecuted case.

Two South Gate Men Charged with Over a Dozen Highway Robberies Following Gamblers Targeted for Their Casino Winnings

Source: US FBI

LOS ANGELES – Two South Gate men have been charged in a federal indictment unsealed today for allegedly committing more than a dozen armed robberies, stealing gambling winnings from individuals leaving local casinos.

Juan Gabriel Gonzalez, 22, was arrested and will make his initial appearance in federal court today. Dereck Nathan Lopez, 21, is currently in state custody and expected to appear in federal court in the coming weeks.

Both defendants are charged with multiple counts of interference and attempted interference with commerce by robbery (Hobbs Act), one count of Hobbs Act conspiracy, and multiple counts of using firearms during a crime of violence. Lopez is also charged with one count of being a felon in possession of firearms and ammunition. 

According to the 10-count indictment, Lopez and Gonzalez entered local casinos under false names to hunt gamblers appearing to win or cash-in a large number of chips. Lopez, Gonzalez and other co-conspirators then followed the victims’ vehicles from the casino, ambushed them on the highway, brandished firearms, smashed the vehicle’s windows, demanded money or chips, and fled. Lopez, Gonzalez, and other conspirators allegedly robbed and attempted to rob individuals leaving casinos in this manner on at least 15 different occasions, including three on a single night. 

Before one incident, Lopez is seen on casino surveillance video celebrating a gambling victory with a victim he was scouting, including high-fiving the victim after the win, according to court documents. Within an hour, Lopez’s co-conspirators had blocked in her vehicle, brandished firearms, and stolen $21,000 in cash. In a separate incident, Lopez, Gonzalez and their co-conspirators stole at least $130,000 in casino winnings.

Lopez is also charged with being a felon in possession of three firearms and over 30 rounds of ammunition found at his home in December 2023. Lopez is not legally permitted to possess a firearm or ammunition because his criminal history includes a conviction in San Bernardino Superior Court for grand theft in November 2023 during the pendency of the indicted robbery spree.

An indictment contains allegations that a defendant has committed a crime. Every defendant is presumed to be innocent until and unless proven guilty in court.

If convicted of all charges, each defendant would face a statutory maximum sentence of life in federal prison.

Operation Safe Cities establishes strategic enforcement priorities with an emphasis on prosecuting the most significant drivers of violent crime. Across this region, the most damaging and horrific crimes are committed by a relatively small number of particularly violent individuals. This strategic enforcement approach is expected to increase the number of arrests, prosecutions and convictions of recidivists engaged in the most dangerous conduct. It is designed to improve public safety across the region by targeting crimes involving illicit guns, prohibited persons possessing firearms, or robbery crews that cause havoc and extensive losses to retail establishments.

The FBI, the Los Angeles County Sheriff’s Department, the Los Angeles Police Department, the California Highway Patrol, the California Department of Justice Bureau of Gambling Control, and the Montebello Police Department are investigating this matter.

Assistant United States Attorneys Kevin J. Butler and Jena A. MacCabe of the Violent and Organized Crime Section are prosecuting this case.

Inland Empire Man Sentenced for Possessing Trade Secrets Belonging to U.S. Employer to Build Business with China Company

Source: US FBI

A San Bernardino County man was sentenced Thursday for illegally possessing sensitive technologies that he downloaded from his Southern California-based employers and used to market his own competing company to a China-based company.

Liming Li, 66, of Rancho Cucamonga, was sentenced to 12 months in prison by United States District Judge John A. Kronstadt, who also fined Li approximately $14,000 and ordered him to pay an additional $17,000 in restitution. LI was ordered to self-surrender by August 12, 2025.

Li pleaded guilty to one count of possession of trade secrets in February.

According to his plea agreement, from 1996 to 2013, Li worked for a Southern California-based business identified in court documents as “U.S. Company #1,” which specialized in precision measuring instruments and metrological technology and equipment. The company designed and sold a range of products such as micrometers, calipers, coordinate measuring machines (CMMs), and optical measurement systems.

Li worked at U.S. Company #1 as a senior software engineer, then as a program manager. From 2013 to 2018, Li worked as chief technologist at a wholly owned subsidiary of U.S. Company #1. During his employment at U.S. Company #1 and its subsidiary, Li worked on the development of the source code for one of the company’s software programs, which was considered its proprietary information.

In July 2013, Li signed an employee handbook and confidentiality agreement with U.S. Company #1 that required him to turn over all writings, records, files, technology, trade secrets or data containing any proprietary information belonging to the company. The agreement also prohibited Li from copying the company’s proprietary information without written permission.

Li admitted in his plea agreement that he occasionally downloaded the company’s proprietary information onto his personal devices without permission. Li failed to return all the proprietary information belonging to U.S. Company #1 after its subsidiary terminated him in January 2018.

In February 2018, Li operated a consulting company named JSL Innovations Inc. and in March 2020, he signed an employment agreement with Suzhou Universal Group Technology Co. Ltd., a China-based chain-and-bearing manufacturer. Li continued to work for Suzhou Universal until his arrest in May 2023. During this period, Li continued to knowingly possess U.S. Company #1’s proprietary information and – more than once – accessed this information without that company’s authorization.

Li admitted that he used the proprietary information for his own economic benefit and that it would injure U.S. Company #1’s interests.

The FBI investigated this matter with substantial assistance from the Department of Commerce, Office of Export Enforcement, Bureau of Industry and Security.

The case against Li was brought under the auspices of the Disruptive Technology Strike Force, which is co-led by the Departments of Justice and Commerce. The Strike Force seeks to counter efforts by hostile nation-states to illicitly acquire sensitive U.S. technology to advance their authoritarian regimes and facilitate human rights abuses.

Assistant United States Attorney Aaron B. Frumkin of the Cyber and Intellectual Property Crimes Section, Solomon D. Kim of the Major Frauds Section, and David T. Ryan, Chief of the National Security Division are prosecuting this case.

Alabama Man Sentenced in Hack of SEC X Account that Spiked the Value of Bitcoin

Source: US FBI

WASHINGTON – Eric Council Jr., 26 of Athens, Alabama, was sentenced today to 14 months in prison for his role in a conspiracy that hacked into the X account of the U.S. Securities and Exchange Commission (SEC) and published fraudulent posts in the name of the then-SEC Chairman, all to manipulate the value of Bitcoin.

The sentence was announced by U.S. Attorney Jeanine Ferris Pirro, Head of the Justice Department’s Criminal Division Matthew R. Galeotti, SEC Inspector General Deborah Jeffrey, and FBI Assistant Director in Charge Steven J. Jensen of the Washington Field Office.

According to court documents, from at least January 2024, Council conspired with others to carry out Subscriber Identity Model (SIM) attacks, commonly referred to as “SIM swaps,” in exchange for money.

On or about Jan. 9, 2024, Council, and others, executed a SIM swap of the mobile phone account associated with the @SECgov X account, the official account of the SEC. The purpose was to gain unauthorized access to this government account in order to make fraudulent posts.

Council used his portable ID card printer to create a physical ID which he used to impersonate the victim at an AT&T store in Huntsville, Alabama. Council provided false information to the AT&T store employee to explain why he needed a replacement SIM card. Council obtained the SIM card linked to the victim’s phone line and walked to a nearby Apple store where he purchased a new iPhone. He inserted the SIM card to activate the phone, received the @SECGov X password reset codes on this new phone linked to the victim’s SIM card and used his personal cell phone to take a photo of the @SECgov X account reset code to share with his co-conspirators. After passing along the password reset codes, Council returned the iPhone for cash.  

A member of the conspiracy used the reset code to gain access to the @SECGov X account and issue a fraudulent post in the name of the then-SEC Chairman, falsely announcing SEC approval of Bitcoin (BTC) Exchange Traded Funds (ETFs). The price of BTC increased by more than $1,000 following the post. Shortly after, the SEC regained control over their X account and confirmed that the announcement was unauthorized and the result of a security breach, which caused the value of BTC to decrease by more than $2,000.

“Schemes of this nature threaten the health and integrity of our market system,” said U.S. Attorney Pirro. “SIM swap schemes threaten the financial security of average citizens, financial institutions, and government agencies.  Don’t fool yourself into thinking you can’t be caught. You will be caught, prosecuted, and will pay the price for the damage your actions create.”

“Council and his co-conspirators used sophisticated cyber means to compromise the SEC’s X account and posted a false announcement that distorted important financial markets,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “Prosecuting those who seek to enrich themselves by threatening the integrity of digital assets through fraud is critical to protecting U.S. interests. The Department of Justice is committed to holding accountable individuals who commit cyber fraud and harm investors.”

“Council brazenly used SIM-swapping and identity theft to manipulate the bitcoin market in an attempt to line his and his co-conspirators’ pockets,” said FBI Washington Field Office Assistant Director in Charge Jensen. “Today’s sentencing shows that those who use the perceived anonymity of digital fraud to exploit public markets will be unmasked and brought to justice by the FBI.”

“Today’s sentencing exemplifies SEC OIG’s commitment to holding bad actors accountable and maintaining the integrity of SEC programs and operations through thorough investigative oversight,” said SEC OIG Special Agent in Charge Amanda James. “We are committed to working with the SEC and other law enforcement partners to help the SEC effectively and efficiently deliver on its critical mission.”

Council admitted to attempting to perform additional SIM swaps in June 2024 in Alabama. In June 2024, the FBI executed a search warrant at an Athens, Alabama, apartment where he resided. Agents recovered a fake identification card and a portable ID card printer. They also recovered a laptop computer. 

Pursuant to the search warrant, agents searched the laptop and discovered templates for additional fake IDs along with internet searches for “SECGOV hack,” “telegram sim swap,” “how can I know for sure if I am being investigated by the FBI,” “What are the signs that you are under investigation by law enforcement or the FBI even if you have not been contacted by them,” “what are some signs that the FBI is after you,” “Verizon store list,” “federal identity theft statute,” and “how long does it take to delete telegram account.”

Council, aka “Ronin” and “Agiantschnauzer,” was arrested Oct. 17, 2024, and admitted to receiving about $50,000 to perform SIM swap. He pleaded guilty Feb. 10, 2025, in the District of Columbia to conspiracy to commit aggravated identity theft. In addition to the prison term, U.S. District Court Judge Amy Berman Jackson ordered forfeiture of $50,000 and three years of supervised release with the condition that he not use computers to access the dark web or commit further identity fraud.

A SIM card is a chip that stores information identifying and authenticating a cell phone subscriber and connects a physical cell phone to a mobile carrier’s cellular and data network. A SIM swap attack fraudulently induces a mobile carrier to reassign a mobile phone number from a victim’s SIM card to a SIM card and telephone controlled by a criminal actor attempting to access valuable information associated with the victim’s telephone. SIM swapping groups conduct SIM swaps for the purpose of defeating multifactor authentication and/or two-step verification security features for social media and virtual currency accounts.

After convincing a mobile carrier to reassign a phone number to a new SIM card, members of the conspiracy generated password reset security authentication codes for online accounts and those codes were in turn sent to the telephone in the control of the criminal actor. Members of the SIM swap groups shared the security reset codes with one another to unlawfully access a victim’s internet connected accounts and complete the fraud.

This case was investigated by the FBI Washington Field Office Criminal and Cyber Division, the SEC-Office of Inspector General, the U.S. Attorney’s Office for the District of Columbia, and the Computer Crime and Intellectual Property Section (CCIPS) and Fraud Section’s Market Integrity and Major Frauds Unit of the Justice Department’s Criminal Division. Significant assistance was provided by the FBI’s Birmingham Field Office.

The case was prosecuted by Assistant U.S. Attorney Kevin Rosenberg, CCIPS Trial Attorney Ashley Pungello, and Fraud Section Trial Attorney Lauren Archer. Valuable assistance was provided by Assistant U.S. Attorney John Hundscheid from the Northern District of Alabama. Substantial assistance was provided by Cyber Fellow Paul M. Zebb III.

For more information on SIM swapping, go to: https://www.ic3.gov/PSA/2024/PSA240411

24cr457           

Member of ‘21st and Vietnam’ Drug Trafficking Organization Sentenced to More than 12 Years in Prison

Source: US FBI

Defendant Admitted that He Was Accountable for 1.2 to 3.9 Kilos of Fentanyl, as well as Cocaine, Boot, and PCP

WASHINGTON – Damien Jenkins, 35, of the District of Columbia, was sentenced today in U.S. District Court to 151 months in federal prison for his role in a drug trafficking organization known as the “21st and Vietnam” crew.

The sentence was announced by U.S. Attorney Jeanine Ferris Pirro, FBI Special Agent in Charge Sean Ryan of the Washington Field Office’s Criminal and Cyber Division, DEA Special Agent in Charge Ibrar A. Mian of the Drug Enforcement Administration Washington Division, and Chief Pamela Smith of the Metropolitan Police Department.

Jenkins pleaded guilty on Feb. 11, 2025, to conspiracy to distribute 400 grams or more of fentanyl, as well as cocaine, N-n-dimethylpentalone, also known as “boot,” and phencyclidine, aka PCP. In addition to the prison term, U.S. District Court Judge Beryl A. Howell ordered Jenkins to serve five years of supervised release.

According to court documents, Jenkins is a member of the “21st and Vietnam” crew, an organization that distributed narcotics – primarily fentanyl and cocaine – in an open-air market and apartment building in the area of the 1900 block of I Street, NE.

Among other things, the crew took over a vacant apartment for use as a base of operations and used it to process, prepare, and package the drugs for redistribution. Sales occurred at the front of the building, in the apartment, and in a parking lot at the rear of the apartment.

Law enforcement identified Jenkins as being involved in the manufacture, packaging, and sale of drugs. Jenkins has admitted that he was accountable for 1.2 to 3.9 kilos of fentanyl, as well as cocaine, boot, and PCP.

Additionally, on March 7, 2024, several crew members engaged in a verbal altercation with an individual. Co-defendant Charles Manson went into the vacant apartment and Jenkins handed Manson a ski mask. Manson, who was in possession of a firearm, put on the mask. Manson

then went outside of 1919 I Street, NE, and opened fire in the direction of the indivIdual.

On May 15, 2024, about 6 a.m., law enforcement executed a search warrant at Jenkins’s residence. Law enforcement recovered an AK pattern firearm, a Ruger .380 caliber handgun, a Sterling Arms .22 caliber handgun, weapon magazines, dozens of rounds of ammunition, and $3,342 in cash.

This case was investigated by the MPD, the DEA Washington Division, and FBI Washington Field Offce. It is being prosecuted by Assistant U.S. Attorneys Andrea Duvall and Solomon Eppel.

24cr226

Retired U.S. Navy Admiral Found Guilty in Bribery Scheme

Source: US FBI

            WASHINGTON – Admiral Robert Burke (USN-Ret.), 62, of Coconut Creek, Florida, was found guilty of bribery today in connection with accepting future employment at a government vendor in exchange for awarding that company a government contract.   

          Following a five-day trial, a federal jury found Burke guilty of conspiracy to commit bribery, bribery, performing acts affecting a personal financial interest, and concealing material facts from the United States. U.S. District Court Judge Trevor N. McFadden scheduled sentencing for August 22, 2025. 

          The verdict was announced by U.S. Attorney Jeanine Ferris Pirro, Matthew R. Galeotti Head of the Justice Department’s Criminal Division, Special Agent in Charge Greg Gross of the Naval Criminal Investigative Service (NCIS) Economic Crimes Field Office, Assistant Director in Charge Steven J. Jensen of the FBI Washington Field Office, and Special Agent in Charge Stanley Newell of the Department of Defense Office of Inspector General’s (DoD OIG) Defense Criminal Investigative Service (DCIS) Transnational Field Office.   

      “When you abuse your position and betray the public trust to line your own pockets, it undermines the confidence in the government you represent,” said U.S. Attorney Pirro. “Our office, with our law enforcement partners, will root out corruption – be it bribes or illegal contracts – and hold accountable the perpetrators, no matter what title or rank they hold.”

            “Burke tarnished his reputation and position as a four-star admiral by steering a lucrative contract toward a government vendor in exchange for future employment,” said Steven J. Jensen, Assistant Director in Charge of the FBI Washington Field Office. “Today’s verdict shows that no one is above the law. The FBI and our federal law enforcement partners remain committed to exposing fraud in the government and bringing corrupt officials to justice for abusing their positions of power.”          

            According to court documents and as the evidence proved at trial, from 2020 to 2022, Burke was a four-star Admiral who oversaw U.S. naval operations in Europe, Russia, and most of Africa, and commanded thousands of civilian and military personnel. The two co-defendants Kim and Messenger were the co-CEOs of a company (Company A) and provided a workforce training pilot program to a small component of the Navy from August 2018 through July 2019. The Navy terminated a contract with Company A in late 2019 and directed Company A not to contact Burke. 

          Despite the Navy’s instructions, the co-defendants met with Burke in Washington, D.C., in July 2021, to reestablish Company A’s business relationship with the Navy. At the meeting, the charged defendants agreed that Burke would use his position as a Navy Admiral to steer a contract to Company A in exchange for future employment at the company. They further agreed that Burke would use his official position to influence other Navy officers to award another contract to Company A to train a large portion of the Navy with a value one of the co-defendants allegedly estimated to be “triple digit millions.” 

          In December 2021, Burke ordered his staff to award a $355,000 contract to Company A to train personnel under Burke’s command in Italy and Spain. Company A performed the training in January 2022. Thereafter, Burke promoted Company A in a failed effort to convince another senior Navy Admiral to award another contract to Company A. To conceal the scheme, Burke made several false and misleading statements to the Navy, including by falsely implying that Company A’s employment discussions with Burke only began months after the contract was awarded and omitting the truth on his required government ethics disclosure forms. 

          In October 2022, Burke began working at Company A at a yearly starting salary of $500,000 and a grant of 100,000 stock options. 

          This case was investigated by the Defense Criminal Investigative Service, Naval Criminal Investigative Service, and the FBI’s Washington Field Office. It is being prosecuted by Assistant U.S. Attorney Rebecca G. Ross for the District of Columbia and Trial Attorneys Trevor Wilmot and Kathryn E. Fifield of the Criminal Division’s Public Integrity Section. It was investigated and indicted by Assistant U.S. Attorney Joshua Rothstein.

24cr265