Man Arrested for Bomb Threats Against Collins Aerospace in Wilson, NC

The United States Attorney for the Eastern District of North Carolina, Robert J. Higdon, Jr., announces that KiDARRYL T. PHILLIPS faces federal charges for Threatened Use of a Weapon of Mass Destruction.


The United States Attorney for the Eastern District of North Carolina, Robert J. Higdon, Jr., announces that Kidarryl T. Phillips faces federal charges for Threatened Use of a Weapon of Mass Destruction.

According to publicly filed documents in federal court, Phillips is alleged to have made six bomb threats targeting Collins Aerospace in Wilson, North Carolina.  Phillips is a contract employee of Collins Aerospace and had his initial appearance today in front of United States Magistrate Judge James E. Gates.

Shop Amazon Gift Cards. Any Occasion. No Expiration.

If convicted, Phillips would face up to a maximum term of life imprisonment, a $250,000 fine as to each count, and a term of up to five years supervised release following any term of imprisonment.  

The charges and allegations contained in the criminal complaint are merely accusations. The defendant is presumed innocent unless and until proven guilty in a court of law.

The Wilson Police Department and the Federal Bureau of Investigation are conducting the investigation of this case. 

Assistant United States Attorney Gabriel Diaz is prosecuting this case for the government.

Justice.gov (March, 2020) Man Arrested for Bomb Threats Against Collins Aerospace in Wilson

Help a veteran in need by donating here.

U.S. Marshal’s Arrest International Murder Fugitive in Reading, PA

Members of the U.S. Marshal’s Fugitive Task Force arrested Felix Aldencis Peguero Mendez, 61, for homicide and related charges, at approximately 3:30 p.m. on February 13th in the 600 block of East Lancaster Avenue in Reading Pennsylvania.


Members of the U.S. Marshal’s Fugitive Task Force arrested Felix Aldencis Peguero Mendez, 61, for homicide and related charges, at approximately 3:30 p.m. on February 13th in the 600 block of East Lancaster Avenue in Reading Pennsylvania.

Peguero Mendez was wanted in the Dominican Republic for homicide since February 15, 2012. It is alleged that he shot his wife 6-8 times resulting in her death.

A Foreign Fugitive warrant was issued in the United States in February 2013, and Peguero Mendez had been on the run up and down the Northeast United States.

Soffe Men’s 3 Pack-USA Poly Cotton Military Tee

Early on February 13, 2020, U.S. Marshals from Massachusetts, New Jersey, and Eastern Pennsylvania developed information suggesting Peguero Mendez was currently hiding in Reading, PA.

Investigation determined he was in an unknown associate’s home in the 600 block of East Lancaster Avenue. Members of the Eastern Pennsylvania Fugitive Task Force searched the residence and Peguero Mendez was located and arrested without incident.

Peguero Mendez is currently being housed in federal custody pending an initial appearance before a U.S. Magistrate Judge where he will formally be charged as a foreign fugitive facing extradition back to the Dominican Republic.

Eric Gartner, U.S. Marshal for the Eastern District of Pennsylvania, said “Patience, persistence, and unfettered collaboration between our partner agencies has once again proven to be an unbeatable combination. Special thanks to our Task Force partners with the Berks County Sheriff’s Office, Pennsylvania State Police, New Jersey State Police, and Pennsylvania Board of Probation and Parole in concluding this long-term effort with the safe apprehension of this dangerous fugitive.”

The Eastern Pennsylvania Violent Crimes Fugitive Task Force is a team of law enforcement officers led by U.S. Marshals in Philadelphia and the surrounding counties.

The task force’s objective is to seek out and arrest violent crime fugitives.

USMarshals.gov (February, 2020) U.S. Marshals Arrest International Murder Fugitive in Reading, PA

Help a veteran in need by donating here.

Ohio Resident Charged with Operating Darknet-Based Bitcoin “Mixer,” which Laundered Over $300 Million

An Ohio man was arrested for his operation of Helix, a Darknet-based cryptocurrency laundering service.


“Helix” Laundered Bitcoin From Numerous Darknet Markets

An Ohio man was arrested for his operation of Helix, a Darknet-based cryptocurrency laundering service. 

In the three-count indictment unsealed Feb. 11 in the District of Columbia, Larry Harmon, 36, of Akron, Ohio, was charged with money laundering conspiracy, operating an unlicensed money transmitting business and conducting money transmission without a D.C. license.

According to the indictment, Harmon operated Helix from 2014 to 2017.  Helix functioned as a bitcoin “mixer” or “tumbler,” allowing customers, for a fee, to send bitcoin to designated recipients in a manner that was designed to conceal the source or owner of the bitcoin.  Helix was linked to and associated with “Grams,” a Darknet search engine also run by Harmon. 

Harmon advertised Helix to customers on the Darknet as a way to conceal transactions from law enforcement. 

Shop Amazon Gift Cards. Any Occasion. No Expiration.

“Helix allegedly laundered hundreds of millions of dollars of illicit narcotics proceeds and other criminal profits for Darknet users around the globe,” said Assistant Attorney General Brian A. Benczkowski of the Justice Department’s Criminal Division.  “This indictment underscores that seeking to obscure virtual currency transactions in this way is a crime, and that the Department can and will ensure that such crime doesn’t pay.”

“For those who seek to use Darknet-based cryptocurrency tumblers, these charges should serve as a reminder that law enforcement, through its partnerships and collaboration, will uncover illegal activity and charge those responsible for unlawful acts,” said U.S. Attorney Timothy J. Shea of the District of Columbia.

“The brazenness with which Helix operated should be the most appalling aspect of this operation to every day citizens.  There are bad actors and then there are criminals who facilitate hundreds of other crimes,” said Don Fort, Chief, IRS Criminal Investigation.  “The sole purpose of Harmon’s operation was to conceal criminal transactions from law enforcement on the Darknet, and because of our growing expertise in this area, he could not make good on that promise.  Working in tandem with other sites, he sought to be the ‘go-to’ money launderer on the Darknet, but our investigators once again played the role of criminal disrupters, unraveling the interlinked web from one tentacle to another.  We thank the Belizean authorities and other law enforcement agencies for their assistance on this case.”

Cell Phones and Accessories

“The perceived anonymity of cryptocurrency and the Darknet may appeal to criminals as a refuge to hide their illicit activity,” said Special Agent in Charge Timothy M. Dunham of the Criminal Division of the FBI Washington Field Office.  “However, as this arrest demonstrates, the FBI and our law enforcement partners are committed to bringing the illegal practices of money launderers and other financial criminals to light and to justice, regardless of whether they are using new technological means to carry out their schemes.”

The indictment alleges that Helix moved over 350,000 bitcoin – valued at over $300 million at the time of the transactions – on behalf of customers, with the largest volume coming from Darknet markets.  Helix partnered with the Darknet market AlphaBay to provide bitcoin laundering services for AlphaBay customers.  AlphaBay was one of the largest Darknet marketplaces in operation at the time that it was seized by law enforcement in July 2017.

The charges in the indictment are merely allegations, and all defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law. 

The investigation was led by the IRS-CI and the FBI’s Washington Field Office with assistance from the Financial Crimes Enforcement Network.  The Department of Justice’s Office of International Affairs of the Criminal Division, the U.S. Attorney’s Office for the Northern District of Ohio, IRS Field Offices of Washington, D.C.; Cincinnati, Ohio; and Oakland, California; and the FBI’s Criminal Investigative Division and Field Offices of Cleveland, Ohio — Akron Resident Agency; Newark, New Jersey; and San Francisco, California — San Jose Resident Agency and the Department of State’s Diplomatic Security Service provided essential support for the operation.   

Internationally, the Belize Ministry of the Attorney General and the Belize National Police Department simultaneously executed a search warrant of a residence allegedly leased by Harmon in Belize as U.S. authorities executed warrants in the United States.  U.S. law enforcement agencies, coordinated by U.S. Embassy Belmopan, assisted in the Belize action.  “These actions underscore the vital importance of working closely with our law enforcement partners in Belize to make both of our countries safer and secure,” said U.S. Chargé d’Affaires, a.i. Keith Gilges.

Trial Attorneys S. Riane Harper and C. Alden Pelker of the Criminal Division’s Computer Crime and Intellectual Property Section (CCIPS) and Assistant U.S. Attorney Christopher B. Brown of the U.S. Attorney’s Office for the District of Columbia are prosecuting the case.  Additional assistance has been provided by Trial Attorneys Emily Siedell and Brian Nicholson of the Criminal Division’s Office of International Affairs, former CCIPS Trial Attorney W. Joss Nichols and Assistant U.S. Attorney Daniel Riedl of the Northern District of Ohio. 

Justice.gov (February, 2020) Ohio Resident Charged with Operating Darknet-Based Bitcoin “Mixer,” which Laundered Over $300 Million

Child Predators Arrested as a Result of “Operation Broken Arrow” Online Undercover Investigation

As a result of a proactive online undercover investigation coordinated by the Georgia Internet Crimes Against Children (ICAC) Task Force, the Georgia Bureau of Investigation’s Child Exploitation and Computer Crimes Unit (CEACC), the Lowndes County Sheriff’s Office, and the Southern Judicial Circuit District Attorney’s Office, fourteen (14) people were arrested over a four-day period beginning Thursday, February 6, 2020.


“Operation Broken Arrow” was a four-day proactive effort centered in Valdosta, GA. 

As a result of a proactive online undercover investigation coordinated by the Georgia Internet Crimes Against Children (ICAC) Task Force, the Georgia Bureau of Investigation’s Child Exploitation and Computer Crimes Unit (CEACC), the Lowndes County Sheriff’s Office, and the Southern Judicial Circuit District Attorney’s Office, fourteen (14) people were arrested over a four-day period beginning Thursday, February 6, 2020. 

Those arrested were charged with O.C.G.A. 16-12-100.2, Computer or Electronic Pornography and Child Exploitation Prevention Act of 2007 and/or O.C.G.A 16-5-46, Trafficking of Persons for Labor or Sexual Servitude.

Additional charges and arrests may be forthcoming.

“Operation Broken Arrow” was a four-day proactive effort centered in Valdosta, GA. 

The operation took several months of planning.  The arrestees, ranging in age from 24 to 57, traveled from areas around South Georgia with the intent to meet a child for sex.  Every individual arrested during the operation believed they were going to a location to meet with a child and engage in prearranged sex acts.

The Georgia Internet Crimes Against Children Task Force had previously received information from the National Center for Missing and Exploited Children on at least one person who was arrested during Operation Broken Arrow. That same person had been previously arrested on peeping tom charges. 

Two persons were arrested in possession of a firearm and two persons were arrested in possession of illegal narcotics. At least two other arrestees were investigated for sex related crimes in the past. Nineteen (19) mobile devices and several additional electronic devices were seized as evidence during the operation. 

The goal of “Operation Broken Arrow” was to arrest persons who communicate with children on-line and then travel to meet them for the purpose of having sex.  Additionally, the operation targeted those that are willing to exploit children by purchasing sex with a minor. On-line child predators visit chat rooms and websites on the internet, find children, begin conversations with them, introduce sexual content and arrange a meeting with the children for the purpose of having sex.  The children these predators target are both boys and girls. 

Since 2014, the Georgia ICAC Task Force has arrested over 150 people in similar operations. 

Over the course of the operation, investigators had more than 120 exchanges with persons on various social media or internet platforms. During many of these exchanges, the subjects directed conversations towards sex with persons they believed to be minors. Over 40 cases were established that met the threshold for arrest.

Fourteen (14) of those cases were concluded with arrests. In some of these cases, the subject introduced obscene or lude content, often exposing the minor (UC) to pornography or requesting the child take nude or pornographic images for them. About half of the exchanges involved websites used for dating, socializing, or even websites used for classified advertisements. 

Although some websites promote themselves as being for “adults-only” it is not uncommon for law enforcement to work cases in which children access these sites, establish profiles claiming to be older, and then find themselves vulnerable to victimization, harassment, blackmail, or assault.

Several subjects were identified as communicating simultaneously with multiple investigators posing as minors. Such activity confirms what investigators uncover conducting these types of investigations: that many predators specifically seek out minors on such websites to groom them as potential victims for sexual contact.

Along with those agencies who participated in the planning and coordinating of the operation, sixteen (16) additional law enforcement agencies participated in “Operation Broken Arrow” as members of the Georgia ICAC Task Force.

These agencies were:

  1. Alpharetta Police Department
  2. Atlanta Police Department
  3. Floyd County Police Department
  4. Forsyth County Sheriff’s Office
  5. GBI-Georgia Information Sharing and Analysis Center (GISAC)
  6. Glynn County Police Department
  7. Gwinnett County Police Department
  8. Hall County Sheriff’s Office
  9. Homeland Security Investigations
  10. Johns Creek Police Department
  11. Lilburn Police Department
  12. Marietta Police Department
  13. Polk County Police Department
  14. Savannah Police Department
  15. United States Air Force – Office of Special Investigations
  16. Woodstock Police Department

The proactive on-line investigation was a coordinated effort among the participating law enforcement agencies to combat this activity. Lowndes County Sheriff Ashley Paulk stated, “The Lowndes County Sheriff’s Office is proud to partner with the GBI and other federal, state, and local area law enforcement agencies in these continuing efforts to identify and apprehend those who prey on our most vulnerable victims. Thanks to this coordinated four-day effort, multiple predators have been removed from our streets and are no longer free to victimize our children.”

GBI Special Agent in Charge, and Commander of the Georgia Internet Crimes Against Children (ICAC) Task Force, Debbie Garner remarked “The Lowndes County Sheriff’s Office is one of our most active member agencies.  We appreciate their daily efforts to combat child exploitation.  This type of cooperation and collaboration is invaluable in the effort to keep our children safe from predators who seek to harm them.  This successful operation was a true partnership between all the agencies involved. We will continue to aggressively work together to protect our children.” 
 
The following were arrested and charged in Lowndes County as part of “Operation Broken Arrow”:
 

  1. Dave Vincent Almon, W/M, 43, retail manager
  2. Billy Stephen Carter, W/M, 57, truck driver
  3. Eric Bernard Copeland, B/M, press operator
  4. Walter Lee Curry, B/M, 33, laborer
  5. Jamian Hogan, B/M, 34, retail associate
  6. John Henry Hursey, W/M, 45, carpenter
  7. Eugene Andega Mainah, B/M, 35, unemployed
  8. Keith Morrison, B/M, 43, truck driver
  9. Wyman Rene Phillips, W/M, 36, electrician
  10. Wilford Sermons, B/M, 28, customer service representative
  11. Josue Trejo, H/M, 31, forklift driver
  12. Bronson Jamari D. Tripp, B/M, 24, retail associate
  13. Keith Walters, W/M, 44, university Dean
  14. Justin Na’eem Warren, B/M, 24, student
     
    The Georgia ICAC Task Force is comprised of 240+ local, state, and federal law enforcement agencies, other related criminal justice agencies and prosecutor’s offices.  The mission of the ICAC Task Force, created by the U. S. Department of Justice and managed and operated by the GBI in Georgia, is to assist state and local law enforcement agencies in developing an effective response to cyber enticement and child pornography cases. This support encompasses forensic and investigative components, training and technical assistance, victim services, prevention and community education. The ICAC Program was developed in response to the increasing number of children and teenagers using the internet, the proliferation of child pornography, and the heightened online activity by predators searching for unsupervised contact with underage victims. By helping state and local law enforcement agencies develop effective and sustainable responses to online child victimization and child pornography, the ICAC program delivers national resources at the local level.  Arrests made by the Georgia ICAC Task Force have been steadily increasing over the last 3 years.  In 2017, The Georgia ICAC Task Force made 350 arrests.  In 2018, The Georgia ICAC Task Force made 307 arrests.  In 2019, the Georgia ICAC Task Force made 474 arrests. The Georgia ICAC Task Force has made over 2,000 arrests since its inception in 2002. 

GBI.Georgia.gov (February, 2020) “Operation Broken Arrow” Targets On-line Child Predators