United States Charges Dual Russian and Israeli National as Developer of LockBit Ransomware Group

Source: US FBI

Defendant Rostislav Panev in Custody Pending Extradition from Israel to the United States

Note: A copy of the superseding criminal complaint can be found here.

A superseding criminal complaint filed in the District of New Jersey was unsealed today charging a dual Russian and Israeli national for being a developer of the LockBit ransomware group.

In August, Rostislav Panev, 51, a dual Russian and Israeli national, was arrested in Israel pursuant to a U.S. provisional arrest request with a view towards extradition to the United States. Panev is currently in custody in Israel pending extradition on the charges in the superseding complaint.

“The Justice Department’s work going after the world’s most dangerous ransomware schemes includes not only dismantling networks, but also finding and bringing to justice the individuals responsible for building and running them,” said Attorney General Merrick B. Garland. “Three of the individuals who we allege are responsible for LockBit’s cyberattacks against thousands of victims are now in custody, and we will continue to work alongside our partners to hold accountable all those who lead and enable ransomware attacks.”

“The arrest of Mr. Panev reflects the Department’s commitment to using all its tools to combat the ransomware threat,” said Deputy Attorney General Lisa Monaco. “We started this year with a coordinated international disruption of LockBit — the most damaging ransomware group in the world. Fast forward to today and three LockBit actors are in custody thanks to the diligence of our investigators and our strong partnerships around the world. This case is a model for ransomware investigations in the years to come.”

“The arrest of alleged developer Rostislav Panev is part of the FBI’s ongoing efforts to disrupt and dismantle the LockBit ransomware group, one of the most prolific ransomware variants across the globe,” said FBI Director Christopher Wray. “The LockBit group has targeted both public and private sector victims around the world, including schools, hospitals, and critical infrastructure, as well as small businesses and multi-national corporations.  No matter how hidden or advanced the threat, the FBI remains committed to working with our interagency partners to safeguard the cyber ecosystem and hold accountable those who are responsible for these criminal activities.” 

“The criminal complaint alleges that Rostislav Panev developed malware and maintained the infrastructure for LockBit, which was once the world’s most destructive ransomware group and attacked thousands of victims, causing billions of dollars in damage,” said Principal Deputy Assistant Attorney General Nicole M. Argentieri, head of the Justice Department’s Criminal Division. “Along with our domestic and international law enforcement partner actions to dismantle LockBit’s infrastructure, the Criminal Division has disrupted LockBit’s operations by charging seven of its key members (including affiliates, developers, and its administrator) and arresting three of these defendants — including Panev. We are especially grateful for our partnerships with authorities in Europol, the United Kingdom, France, and Israel, which show that, when likeminded countries work together, cybercriminals will find it harder to escape justice.”

“As alleged by the complaint, Rostislav Panev for years built and maintained the digital weapons that enabled his LockBit coconspirators to wreak havoc and cause billions of dollars in damage around the world,” said U.S. Attorney Philip R. Sellinger for the District of New Jersey. “But just like the six other LockBit members previously identified and charged by this office and our FBI and Criminal Division partners, Panev could not remain anonymous and avoid justice indefinitely. He must now answer for his crimes. Today’s announcement represents another blow struck by the United States and our international partners against the LockBit organization, and our efforts will continue relentlessly until the group is fully dismantled and its members brought to justice.”

According to the superseding complaint, documents filed in this and related cases, and statements made in court, Panev acted as a developer of the LockBit ransomware group from its inception in or around 2019 through at least February 2024. During that time, Panev and his LockBit coconspirators grew LockBit into what was, at times, the most active and destructive ransomware group in the world. The LockBit group attacked more than 2,500 victims in at least 120 countries around the world, including 1,800 in the United States. Their victims ranged from individuals and small businesses to multinational corporations, including hospitals, schools, nonprofit organizations, critical infrastructure, and government and law-enforcement agencies. LockBit’s members extracted at least $500 million in ransom payments from their victims and caused billions of dollars in other losses, including lost revenue and costs from incident response and recovery.

LockBit’s members comprised “developers,” like Panev, who designed the LockBit malware code and maintained the infrastructure on which LockBit operated. LockBit’s other members, called “affiliates,” carried out LockBit attacks and extorted ransom payments from LockBit victims. LockBit’s developers and affiliates would then split ransom payments extorted from victims.

As alleged in the superseding complaint, at the time of Panev’s arrest in Israel in August, law enforcement discovered on Panev’s computer administrator credentials for an online repository that was hosted on the dark web and stored source code for multiple versions of the LockBit builder, which allowed LockBit’s affiliates to generate custom builds of the LockBit ransomware malware for particular victims. On that repository, law enforcement also discovered source code for LockBit’s StealBit tool, which helped LockBit affiliates exfiltrate data stolen through LockBit attacks. Law enforcement also discovered access credentials for the LockBit control panel, an online dashboard maintained by LockBit developers for LockBit’s affiliates and hosted by those developers on the dark web.

The superseding complaint also alleges that Panev exchanged direct messages through a cybercriminal forum with LockBit’s primary administrator, who, in an indictment unsealed in the District of New Jersey in May, the United States alleged to be Dimitry Yuryevich Khoroshev (Дмитрий Юрьевич Хорошев), also known as LockBitSupp, LockBit, and putinkrab. In those messages, Panev and the LockBit primary administrator discussed work that needed to be done on the LockBit builder and control panel.

Court documents further indicate that, between June 2022 and February 2024, the primary LockBit administrator made a series of transfers of cryptocurrency, laundered through one or more illicit cryptocurrency mixing services, of approximately $10,000 per month to a cryptocurrency wallet owned by Panev. Those transfers amounted to over $230,000 during that period.

In interviews with Israeli authorities following his arrest in August, Panev admitted to having performed coding, development, and consulting work for the LockBit group and to having received regular payments in cryptocurrency for that work, consistent with the transfers identified by U.S. authorities. Among the work that Panev admitted to having completed for the LockBit group was the development of code to disable antivirus software; to deploy malware to multiple computers connected to a victim network; and to print the LockBit ransom note to all printers connected to a victim network. Panev also admitted to having written and maintained LockBit malware code and to having provided technical guidance to the LockBit group.

The LockBit Investigation

The superseding complaint against, and apprehension of, Panev follows a disruption of LockBit ransomware in February by the United Kingdom (U.K.)’s National Crime Agency (NCA)’s Cyber Division, which worked in cooperation with the Justice Department, FBI, and other international law enforcement partners. As previously announced by the Department, authorities disrupted LockBit by seizing numerous public-facing websites used by LockBit to connect to the organization’s infrastructure and by seizing control of servers used by LockBit administrators, thereby disrupting the ability of LockBit actors to attack and encrypt networks and extort victims by threatening to publish stolen data. That disruption succeeded in greatly diminishing LockBit’s reputation and its ability to attack further victims, as alleged by documents filed in this case.

The superseding complaint against Panev also follows charges brought in the District of New Jersey against other LockBit members, including its alleged primary creator, developer, and administrator, Dmitry Yuryevich Khoroshev. An indictment against Khoroshev unsealed in May alleges that Khoroshev began developing LockBit as early as September 2019, continued acting as the group’s administrator through 2024, a role in which Khoroshev recruited new affiliate members, spoke for the group publicly under the alias “LockBitSupp,” and developed and maintained the infrastructure used by affiliates to deploy LockBit attacks. Khoroshev is currently the subject of a reward of up to $10 million through the U.S. Department of State’s Transnational Organized Crime (TOC) Rewards Program, with information accepted through the FBI tip website at www.tips.fbi.gov/.

A total of seven LockBit members have now been charged in the District of New Jersey. Beyond Panev and Khoroshev, other previously charged LockBit defendants include:

  • In July, two LockBit affiliate members, Mikhail Vasiliev, also known as Ghostrider, Free, Digitalocean90, Digitalocean99, Digitalwaters99, and Newwave110, and Ruslan Astamirov, also known as BETTERPAY, offtitan, and Eastfarmer, pleaded guilty in the District of New Jersey for their participation in the LockBit ransomware group and admitted deploying multiple LockBit attacks against U.S. and foreign victims. Vasiliev and Astamirov are presently in custody awaiting sentencing.
  • In February, in parallel with the disruption operation described above, an indictment was unsealed in the District of New Jersey charging Russian nationals Artur Sungatov and Ivan Kondratyev, also known as Bassterlord, with deploying LockBit against numerous victims throughout the United States, including businesses nationwide in the manufacturing and other industries, as well as victims around the world in the semiconductor and other industries. Sungatov and Kondratyev remain at large.
  • In May 2023, two indictments were unsealed in Washington, D.C., and the District of New Jersey charging Mikhail Matveev, also known as Wazawaka, m1x, Boriselcin, and Uhodiransomwar, with using different ransomware variants, including LockBit, to attack numerous victims throughout the United States, including the Washington, D.C., Metropolitan Police Department. Matveev remains at large and is currently the subject of a reward of up to $10 million through the U.S. Department of State’s TOC Rewards Program, with information accepted through the FBI tip website at www.tips.fbi.gov/.

The U.S. Department of State’s TOC Rewards Program is offering rewards of:

Information is accepted through the FBI tip website at tips.fbi.gov.

Khoroshev, Matveev, Sungatov, and Kondratyev have also been designated for sanctions by the Department of the Treasury’s Office of Foreign Assets Control for their roles in launching cyberattacks.

Victim Assistance

LockBit victims are encouraged to contact the FBI and submit information at www.ic3.gov/. As announced by the Department in February, law enforcement, through its disruption efforts, has developed decryption capabilities that may enable hundreds of victims around the world to restore systems encrypted using the LockBit ransomware variant. Submitting information at the IC3 site will enable law enforcement to determine whether affected systems can be successfully decrypted.

LockBit victims are also encouraged to visit www.justice.gov/usao-nj/lockbit for case updates and information regarding their rights under U.S. law, including the right to submit victim impact statements and request restitution, in the criminal litigation against Panev, Astamirov, and Vasiliev.

The FBI Newark Field Office, under the supervision of Acting Special Agent in Charge Nelson I. Delgado, is investigating the LockBit ransomware variant. Israel’s Office of the State Attorney, Department of International Affairs, and Israel National Police; France’s Gendarmerie Nationale Cyberspace Command, Paris Prosecution Office — Cyber Division, and judicial authorities at the Tribunal Judiciare of Paris; Europol; Eurojust; the U.K.’s NCA; Germany’s Landeskriminalamt Schleswig-Holstein, Bundeskriminalamt, and the Central Cybercrime Department North Rhine-Westphalia; Switzerland’s Federal Office of Justice, Public Prosecutor’s Office of the Canton of Zurich, and Zurich Cantonal Police; Spain’s Policia Nacional and Guardia Civil; Japan’s National Police Agency; Australian Federal Police; Sweden’s Polismyndighetens; Canada’s Royal Canadian Mounted Police; Politie Dienst Regionale Recherche Oost-Brabant of the Netherlands; and Finland’s National Bureau of Investigation have provided significant assistance and coordination in these matters and in the LockBit investigation generally.

Trial Attorneys Debra Ireland and Jorge Gonzalez of the Criminal Division’s Computer Crime and Intellectual Property Section (CCIPS) and Assistant U.S. Attorneys Andrew M. Trombly, David E. Malagold, and Vinay Limbachia for the District of New Jersey are prosecuting the charges against Panev and the other previously charged LockBit defendants in the District of New Jersey.

The Justice Department’s Cybercrime Liaison Prosecutor to Eurojust, Office of International Affairs, and National Security Division also provided significant assistance.

Additional details on protecting networks against LockBit ransomware are available at StopRansomware.gov. These include Cybersecurity and Infrastructure Security Agency Advisories AA23-325A, AA23-165A, and AA23-075A. 

A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

New York Resident Pleads Guilty to Operating Secret Police Station of the Chinese Government in Lower Manhattan

Source: US FBI

Defendant Admitted That He Conspired to Act as an Illegal Agent of the Chinese Government

Chen Jinping, 60, of New York, New York, pleaded guilty today to conspiring to act as an illegal agent of the government of the People’s Republic of China (PRC), in connection with opening and operating an undeclared overseas police station, located in lower Manhattan, for the PRC’s Ministry of Public Security (MPS).

“Today’s guilty plea holds the defendant accountable for his brazen efforts to operate an undeclared overseas police station on behalf of the PRC’s national police force — a clear affront to American sovereignty and danger to our community that will not be tolerated,” said Assistant Attorney General Matthew G. Olsen of the Justice Department’s National Security Division. “The Department of Justice will continue to pursue anyone who attempts to aid the PRC’s efforts to extend their repressive reach into the United States.”

“Today’s acknowledgment of guilt is a stark reminder of the insidious efforts taken by the PRC government to threaten, harass, and intimidate those who speak against their Communist Party,” said Executive Assistant Director Robert Wells of the FBI’s National Security Branch. “These blatant violations will not be tolerated on U.S. soil. The FBI remains committed to preserving the rights and freedoms of all people in our country and will defend against transnational repression at every front.”

“A priority of my office has been to counteract the malign activities of foreign governments that violate our nation’s sovereignty by targeting local diaspora communities in the United States,” said U.S. Attorney Breon Peace for the Eastern District of New York. “Today, a participant in a transnational repression scheme who worked to establish a secret police station in the middle of New York City on behalf of the national police force of the People’s Republic of China has pleaded guilty to conspiracy to act as an illegal agent. We will continue our efforts to protect the rights of vulnerable persons who come to this country to escape the repressive activities of authoritarian regimes.”

As alleged, Chen Jinping and co-defendant “Harry” Lu Jianwang conspired to act as illegal agents of the PRC government and also obstructed justice by destroying evidence of their communications with an MPS official. While acting under the direction and control of the MPS official, the defendants worked together to establish the first known overseas police station in the United States on behalf of the Fuzhou branch of the MPS. The police station — which closed in the fall of 2022 — occupied an entire floor in an office building in Manhattan’s Chinatown. Lu and Chen helped open and operate the clandestine police station. None of the participants in the scheme informed the U.S. government that they were helping the PRC government surreptitiously open and operate an undeclared MPS police station on U.S. soil.

In October 2022, the FBI conducted a judicially authorized search of the illegal police station. In connection with the search, FBI agents interviewed both defendants and seized their phones. In reviewing the contents of these phones, FBI agents observed that communications between the defendants and an MPS official appeared to have been deleted. In subsequent consensual interviews, the defendants admitted to the FBI that they had deleted their communications with the MPS official after learning about the ongoing FBI investigation, thus preventing the FBI from learning the full extent of the MPS’s directions for the overseas police station.

Chen faces a maximum penalty of five years in prison. Per Chen’s plea agreement, the government has agreed to dismiss the obstruction of justice charge against him. Lu has pleaded not guilty to both of the charges against him and is awaiting trial.

The FBI is investigating the case.

Assistant U.S. Attorneys Alexander A. Solomon and Antoinette N. Rangel for the Eastern District of New York and Trial Attorney Scott A. Claffee of the National Security Division’s Counterintelligence and Export Control Section are prosecuting the case.

The FBI has created a website for victims to report efforts by foreign governments to stalk, intimidate, or assault people in the United States. If you believe that you are or have been a victim of transnational repression, please visit www.fbi.gov/investigate/counterintelligence/transnational-repression.

W. Mike Herrington Named Special Agent in Charge of the Seattle Field Office

Source: US FBI

Director Christopher Wray has named W. Mike Herrington as the special agent in charge of the Seattle Field Office. Mr. Herrington most recently served as senior operations advisor to the Director.

Mr. Herrington first joined the FBI as a special agent in the San Francisco Field Office, where he investigated computer intrusions and served on the SWAT team as well as the Cyber Action Team, the FBI’s worldwide rapid cyber incident response team. He also served six months as the FBI’s assistant legal attaché for cyber matters in Canberra, Australia, covering Australia and New Zealand.

In 2015, Mr. Herrington moved to the Richmond Field Office as program coordinator for digital forensics and computer intrusion investigations, as well as for the SWAT and crisis negotiation teams. Mr. Herrington was promoted to assistant special agent in charge for the Los Angeles Field Office in 2018, where he oversaw counterintelligence and computer intrusion investigations.

In 2020, Mr. Herrington joined the Senior Executive Service as a section chief for the Cyber Division, where he oversaw investigations of computer intrusions originating from multiple high-priority threat countries.

Mr. Herrington is a recipient of the 2016 FBI Director’s Award for Excellence in Cyber Investigation.

Prior to joining the FBI, Mr. Herrington served as an infantry officer in the U.S. Army’s 75th Ranger Regiment. He holds a bachelor’s degree in electrical engineering from the United States Military Academy at West Point and a master’s degree in information technology management from Carnegie Mellon University.

DHS, FBI, FAA, and DoD Joint Statement on Ongoing Response to Reported Drone Sightings

Source: US FBI

There are more than one million drones lawfully registered with the FAA in the United States and there are thousands of commercial, hobbyist and law enforcement drones lawfully in the sky on any given day. With the technology landscape evolving, we expect that number to increase over time.

FBI has received tips of more than 5,000 reported drone sightings in the last few weeks with approximately 100 leads generated, and the federal government is supporting state and local officials in investigating these reports. Consistent with each of our unique missions and authorities, we are quickly working to prioritize and follow these leads. We have sent advanced detection technology to the region. And we have sent trained visual observers.

Having closely examined the technical data and tips from concerned citizens, we assess that the sightings to date include a combination of lawful commercial drones, hobbyist drones, and law enforcement drones, as well as manned fixed-wing aircraft, helicopters, and stars mistakenly reported as drones. We have not identified anything anomalous and do not assess the activity to date to present a national security or public safety risk over the civilian airspace in New Jersey or other states in the northeast.

That said, we recognize the concern among many communities. We continue to support state and local authorities with advanced detection technology and support of law enforcement. We urge Congress to enact counter-UAS legislation when it reconvenes that would extend and expand existing counter-drone authorities to identify and mitigate any threat that may emerge.

Additionally, there have been a limited number of visual sightings of drones over military facilities in New Jersey and elsewhere, including within restricted air space. Such sightings near or over DoD installations are not new. DoD takes unauthorized access over its airspace seriously and coordinates closely with federal, state, and local law enforcement authorities, as appropriate. Local commanders are actively engaged to ensure there are appropriate detection and mitigation measures in place.

Darknet Drug Trafficker From Pennsylvania Sentenced in D.C. for Selling Mass Quantities of Fentanyl Online

Source: US FBI

WASHINGTON – Jacob Blair, 27, of Aliquippa, Pa., was sentenced today in U.S. District Court to 180 months in federal prison for his role in a drug conspiracy that distributed a wide variety of narcotics, including large amounts of counterfeit oxycodone pills containing fentanyl and counterfeit Adderall pills containing methamphetamine. Blair sold and distributed the narcotics on the darknet marketplace Tor2Door and other darknet markets.

The sentence was announced by U.S. Attorney Edward R. Martin Jr.; Acting U.S. Attorney Troy Rivetti of the Western District of Pennsylvania; Special Agent in Charge Sean Ryan of the FBI Washington Field Office Criminal and Cyber Division, Special Agent in Charge Kevin P. Rojek of the FBI Pittsburgh Field Office; Special Agent in Charge Ibrar A. Mian of the Drug Enforcement Administration (DEA) Washington Division; Inspector in Charge Damon E. Wood of the U.S. Postal Inspection Service Washington Division; Inspector in Charge Lesley Allison of the US Postal Inspection Service Pittsburgh Division for; and Acting Special Agent in Charge Christopher Heck of the U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations (HSI) Washington, D.C.

Blair pleaded guilty on Dec. 17, 2024, before U.S. District Court Judge Amy Berman Jackson, to a charge of conspiracy to distribute more than 400 grams of fentanyl and 50 grams of methamphetamine, and to a charge of possessing a firearm in furtherance of a drug trafficking offense. Blair also pleaded guilty in the District of Columbia to a charge, originally filed in the Western District of Pennsylvania, of distributing 40 grams or more of fentanyl and 50 grams or more of methamphetamine.

In addition to the 180-month prison term, Judge Berman Jackson ordered Blair to serve five years of supervised release.

According to court documents, Blair was responsible for distributing more than 1.2 kilograms but less than 4 kilograms of fentanyl, and at least 50 grams but less than 200 grams of methamphetamine. He also admitted to mass-marketing the narcotics by means of an interactive computer service.

Blair’s co-defendant Dyani Pezzelle pleaded guilty March 5, 2025, to conspiracy to distribute more than 40 grams of fentanyl and 50 grams of methamphetamine. Pezzelle is scheduled to be sentenced on Sept. 18, 2025.

Between August 1, 2022, and Feb. 24, 2023, Blair and Pezzelle operated vendor accounts on various darknet marketplaces. On the marketplace Tor2Door, Blair and Pezzelle advertised their controlled substances using the monikers “YVS” and “YVendor Supplier” which they touted as “a syndicate of professionals that specialize in making the best products the markets have to offer. We focus on quality, consistency, stealth, and speed.” The conspiracy completed at least 459 sales of illegal narcotics.

Blair manufactured and obtained counterfeit Oxycodone, Adderall, and Xanax pills for sale. Blair posted advertisements for the controlled substances on Tor2Door and four other marketplaces and accepted payment in cyrptocurrency. During the conspiracy, Blair shipped counterfeit oxycodone pills to the District of Columbia at least six times. These pills contained fentanyl, a Schedule II controlled substance, and metonitazene, a Schedule I controlled substance. In addition, they also shipped counterfeit Xanax and Adderall pills to the District multiple times.

On February 22, 2023, law enforcement executed search warrants at Blair’s residence in Aliquippa, Pennsylvania, and other locations. During the searches, law enforcement recovered 10 firearms, over 20,000 counterfeit oxycodone pills that contained fentanyl, an industrial pill press, and other manufacturing and distribution supplies.

This case was investigated by the FBI’s Field Offices in Washington D.C. and Pittsburgh, the DEA, the U.S. Postal Inspection Service, and Homeland Security Investigations. Valuable assistance was provided by the Pittsburgh Bureau of Police and the Moon Township Police Department.

The matter is being prosecuted by Assistant U.S. Attorneys Thomas Strong and Peter Roman of the District of Columbia’s Violence Reduction and Trafficking Offenses (VRTO) section and Assistant U.S. Attorney DeMarr Moulton of the Western District of Pennsylvania.  The case was initially investigated and indicted by Assistant U.S. Attorney Kevin Rosenberg.

24cr560

Detroit Man Sentenced for Role in Drug Trafficking Operation

Source: US FBI

CLARKSBURG, WEST VIRGINIA – Jovonne Haynes, age 30, of Detroit, Michigan, was sentenced today to 135 months in federal prison for his role in a drug trafficking organization selling controlled substances that spanned from Michigan to Monongalia County.

According to court documents and statements made in court, Haynes was allowing his apartment in Morgantown to be used for the drug trafficking operation. Haynes pled guilty to a methamphetamine distribution charge in December 2024.

Haynes will serve three years of supervised release following his sentence.

Assistant U.S. Attorney Zelda Wesley prosecuted the case on behalf of the government.

The case was investigated the Drug Enforcement Administration (DEA) Clarksburg; the FBI Clarksburg; the Mon Metro Drug Task Force, a HIDTA-funded initiative; the West Virginia State Police; the Monongalia County Sheriff’s Office; the Morgantown Police Department; WVU Police Department; the DEA Cincinnati District Office; the DEA Detroit Field Division; and the FBI Detroit.

Chief U.S. District Judge Thomas S. Kleeh presided.

Ellwood City Resident Sentenced to 21 Years in Prison for Coercing Minor to Produce and Send Child Sexual Abuse Material

Source: US FBI

PITTSBURGH, Pa. – A former resident of Ellwood City, Pennsylvania, was sentenced in federal court on April 22, 2025, to 252 months of incarceration, to be followed by 15 years of supervised release, on his conviction of coercion and enticement of a minor, and production and receipt of material depicting the sexual exploitation of a minor, Acting United States Attorney Troy Rivetti announced today.

United States District Judge William S. Stickman IV imposed the sentence on Shayne A. Clapper, 31.

According to information presented to the Court, in January 2023 through February 2023, Clapper initiated a sexual relationship with a minor known to him. Clapper provided the minor with a cell phone that he used to communicate with the minor, including requesting and receiving nude images from the minor. Clapper also induced the minor to engage in sexually explicit conduct for the purpose of producing a visual depiction of the conduct.

Assistant United States Attorney Heidi M. Grogan prosecuted this case on behalf of the government.

Acting United States Attorney Rivetti commended the Federal Bureau of Investigation and Ellwood City Police Department for the investigation leading to the successful prosecution of Clapper.

This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

New Jersey Man Sentenced for Prescription Opioid Conspiracy

Source: US FBI

A New Jersey man was sentenced today to 16 months in prison for conspiracy to distribute and possess with intent to distribute oxycodone, a highly addictive controlled substance.  

According to court documents, between November 2022 and March 2023, Chris Ruediger, 61, of Pennsauken, purchased prescription oxycodone pills from a relative and sold them to another relative involved in unlawfully distributing oxycodone. Ruediger admitted to distributing between 100 and 400 kilograms of opioids by converted drug weight. Ruediger also admitted that he attempted to obstruct the investigation by attempting to persuade one of his co-conspirators not to talk with law enforcement.

In November 2024, Ruediger pleaded guilty to conspiracy to distribute and possess with intent to distribute controlled substances.  

Matthew R. Galeotti, Head of the Justice Department’s Criminal Division and Special Agent in Charge Wayne A. Jacobs of the FBI Philadelphia Field Office made the announcement.

The FBI’s South Jersey Resident Agency investigated the case with assistance from the Drug Enforcement Administration, New Jersey Division.

Trial Attorneys Paul J. Koob and Nicholas K. Peone of the Criminal Division’s Fraud Section are prosecuting the case.

The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Force Program. Since March 2007, this program, currently comprised of nine strike forces operating in 27 federal districts, has charged more than 5,800 defendants who collectively have billed federal health care programs and private insurers more than $30 billion. In addition, the Centers for Medicare & Medicaid Services, working in conjunction with HHS-OIG, are taking steps to hold providers accountable for their involvement in health care fraud schemes. More information can be found at www.justice.gov/criminal-fraud/health-care-fraud-unit.

Two Millbourne Borough Officials and One Former Official Plead Guilty to Election Fraud Offenses

Source: US FBI

PHILADELPHIA – United States Attorney David Metcalf announced that MD Nurul Hasan, 48, MD Munsur Ali, 48, and MD Rafikul Islam, 52, all of Millbourne, Pennsylvania, pleaded guilty today to election fraud offenses, at separate hearings before United States District Judge Harvey Bartle III.

In February, the defendants were charged in a 33-count indictment with conspiracy to commit voter fraud, giving false information in registering to vote, and fraudulent voter registration, arising from their scheme, ultimately unsuccessful, to steal Millbourne Borough’s 2021 mayoral election for Hasan.

Hasan, the vice president of the Millbourne Borough Council, pleaded guilty to all 33 charges against him — one count of conspiracy, 16 counts of giving false information in registering to vote, and 16 counts of fraudulent voter registration.

Ali, a member of the Millbourne Borough Council, pleaded guilty to all 25 charges against him — one count of conspiracy, 12 counts of giving false information in registering to vote, and 12 counts of fraudulent voter registration.

Islam, a former member of the Millbourne Borough Council, pleaded guilty to all seven charges against him — one count of conspiracy, three counts of giving false information in registering to vote, and three counts of fraudulent voter registration.

As set forth in court filings, in 2021, Millbourne held elections for mayor, three seats on its borough council, and tax collector. Defendant Hasan entered the majority party’s primary election for mayor.

The primary election was held on May 20, 2021, and Hasan was defeated in the primary by a vote count of approximately 138 to 120. In the same primary, Ali was one of three majority party candidates for borough council to advance to the general election, while Islam lost his bid for reelection to the council.

After the primary, Hasan decided that he would run as a write-in candidate for mayor in the general election, which was scheduled for November 2, 2021. Ali and Islam agreed to support Hasan in his write-in campaign.

As detailed in court documents and admitted by the defendants, in or about 2021, defendants Hasan, Ali, and Islam conspired and agreed with one another, and other persons known and unknown to the U.S. Attorney, to steal the 2021 general election for Mayor of Millbourne for defendant Hasan through a multi-step process, which included:

(a) obtaining personal identification information of non-Millbourne residents, such as their names, addresses, and dates of birth;

(b) using the personal identifying information to access the Commonwealth of Pennsylvania’s online voter registration (PAOVR) website and change the voter registration addresses for those non-Millbourne residents to locations within Millbourne;

(c) using the PAOVR website to request that mail-in or absentee ballots for those non-Millbourne residents be sent to addresses accessible by one or more of the defendants;

(d) retrieving the ballots from the Millbourne mailboxes;

(e) impersonating the voters and fraudulently casting write-in votes for defendant Hasan to be mayor;

(f) enclosing the fraudulently completed ballots in envelopes and forging the voters’ signatures on the envelopes; and

(g) submitting the ballots in their envelopes to the Delaware County Board of Elections.

The defendants admitted that, to further this conspiracy, they contacted friends and acquaintances whom Hasan and Ali knew did not live in Millbourne, told these non-Millbourne residents that Hasan was running for mayor in Millbourne, asked if they could register the non-Millbourne residents to vote in Millbourne, and then cast mail-in ballots for Hasan to be mayor.

Hasan and Ali persuaded many of their non-Millbourne friends and acquaintances to provide them with personal identification information so that defendants Hasan and Ali could register them to vote in Millbourne. During many of these conversations, Hasan and Ali told their non-Millbourne friends and acquaintances that they would not get in trouble, as long as they did not vote in another election in November 2021.

Hasan and Ali also conspired and agreed to use personal identifying information for other non-Millbourne residents, which the two defendants had obtained from other sources, such as Hasan’s business, to register those nonresidents as Millbourne voters without the knowledge of those non-residents.

Hasan personally did almost all of the fraudulent voter registrations himself, using a computer at his place of business to access the PAOVR website and change the voting addresses for non-Millbourne residents to locations within Millbourne. Every time that Hasan accessed the PAOVR website to change a voter registration address, he provided an email address for the voter. Many times, Hasan provided one of four email addresses that he used and accessed.

To divert suspicion from himself, however, Hasan sometimes provided email addresses belonging to other people, who knowingly and willfully permitted Hasan to use their email addresses to cover up Hasan’s actions. One of those people was Islam, who allowed Hasan to use two of Islam’s email addresses when Hasan fraudulently changed the voter registration addresses for six individuals. Islam also permitted Hasan to use two of Islam’s email addresses when requesting mail-in ballots for five non-Millbourne residents.

In total, the defendants conspired to falsely register nearly three dozen non-Millbourne residents as Millbourne voters and cast ballots for those non-Millbourne residents in the 2021 general election for mayor of Millbourne Borough. Hasan went on to lose the election by a vote of approximately 165 to 138.

“Protecting the integrity of our elections is crucial to ensuring a fair result, as well as the public’s continued trust in the process,” said U.S. Attorney Metcalf. “That’s why these cases are a priority for my office and the FBI. Election fraud will not be tolerated in the Eastern District of Pennsylvania.”

“Trust in the electoral process is the cornerstone of our democracy. When public officials betray that trust through fraud, they don’t just break the law — they erode confidence in the very institutions that uphold our system,” said Wayne A. Jacobs, Special Agent in Charge of FBI Philadelphia. “The FBI is proud to stand with our partners in safeguarding the integrity of elections at every level of government.”

“This investigation exposed public officials who forgot that their role in a democracy is limited to accepting the voters’ choice. I applaud the hard work and partnership of the United States Attorney’s Office, the FBI and my Special Investigations Unit led by Deputy DA Doug Rhoads. This investigation serves as a reminder that my Office remains committed to election integrity, ensuring that everyone’s vote is counted equally,” said Delaware County District Attorney Jack Stollsteimer.

The defendants are scheduled to be sentenced on June 18 and face maximum possible sentences of five years in prison for each of the charges to which they have pleaded guilty.

The case was investigated by the FBI and the Delaware County District Attorney’s Office and is being prosecuted by Assistant United States Attorney Mark B. Dubnoff.

Chester County Man Indicted on Multiple Child Pornography Offenses

Source: US FBI

Defendant Allegedly Engaged in Disturbing, Violent Online Conversations With Victim He Knew Was a Minor

PHILADELPHIA – United States Attorney David Metcalf announced that Aniruth Kuppusamy, 25, of Chesterbrook, Pennsylvania, was charged by indictment with one count each of manufacturing child pornography, receiving child pornography, possessing child pornography, and the use of an interstate commerce facility to entice a minor to engage in sexually explicit conduct.

As detailed in court filings, the defendant, who has been in custody since his arrest last month pursuant to a federal complaint and warrant, allegedly engaged in disturbing and violent conversations with Minor #1, who he knew was under the age of 18, and elicited sexually explicit videos of her.

In addition, the indictment alleges that the defendant knowingly received those visual depictions of Minor #1 engaged in sexually explicit conduct, and that he possessed images constituting child pornography on an iPhone 15 that had been shipped and transported using any means and facility of interstate and foreign commerce.

The indictment further alleges that Kuppusamy used a facility and means of interstate and foreign commerce, namely the internet and cellular telephone service, to persuade, induce, entice, and coerce Minor #1 to engage in sexual activity for which any person could be charged with a criminal offense, that is, the manufacture and receipt of child pornography.

If convicted, the defendant faces a mandatory minimum sentence of 15 years’ imprisonment and a maximum possible sentence of life in prison.

This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by United States Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend, and prosecute individuals who exploit children via the internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit projectsafechildhood.gov.

The case was investigated by the FBI and is being prosecuted by Assistant United States Attorney Danielle Bateman.

An indictment, information, or criminal complaint is an accusation. A defendant is presumed innocent unless and until proven guilty.