Greene County Man Sentenced to Prison for Illegal Possession of Firearm Silencer, Missile Warning System

A former military subcontractor was sentenced in U.S. District Court today to 33 months in prison and three years of supervised release for illegally possessing a firearm silencer and equipment that was property of the United States.


A former military subcontractor was sentenced in U.S. District Court today to 33 months in prison and three years of supervised release for illegally possessing a firearm silencer and equipment that was property of the United States.

Joel Montgomery, 50, pleaded guilty to two counts in December 2019 with possession of a silencer not registered to him and retaining United States property with a value of more than $1,000.

According to court documents, in June 2015, Montgomery possessed at his home a firearm silencer that was not registered to him in the National Firearms Registration and Transfer Record.

While executing another search warrant at his home in October 2015, agents discovered an AN/AAR-47 Missile Warning System and a Control Countermeasures Set Display Unit that were property of the United States.

Montgomery had previously been employed as a subcontractor on a local military base, and during that time, had gained access to the property of the United States.

Soffe Men’s 3 Pack-USA Poly Cotton Military Tee

Upon the end of his employment contract, Montgomery did not return equipment valued at more than $1,000 and instead kept the equipment for his personal use.

David M. DeVillers, United States Attorney for the Southern District of Ohio; Chris Hoffman, Special Agent in Charge, Federal Bureau of Investigation (FBI), Cincinnati Division; and Jonathan McPherson, Special Agent in Charge, Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), announced the sentence imposed by Senior U.S. District Court Judge Thomas M. Rose. Assistant United States Attorneys Brent G. Tabacchi and Dwight Keller are representing the United States in this case.

ATF.gov (February, 2020) Greene County Man Sentenced to Prison for Illegal Possession of Firearm Silencer, Missile Warning System

Help a veteran in need by donating here.

Georgia man sentenced for transporting drugs disguised as children’s candy

A Georgia man was sentenced to 151 months in federal prison Tuesday, followed by five years of supervised release, for illegally transporting 41.97 kilograms of 100% pure methamphetamine and 4.5 kilograms of heroin that had been smuggled into the United States from Mexico.


A Georgia man was sentenced to 151 months in federal prison Tuesday, followed by five years of supervised release, for illegally transporting 41.97 kilograms of 100% pure methamphetamine and 4.5 kilograms of heroin that had been smuggled into the United States from Mexico.

The sentencing was announced by U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations (HSI) New Orleans Special Agent in Charge (SAC) Jere T. Miles and U.S. Attorney Mike Hurst.

“By concealing dangerous narcotics as children’s candy, the defendant targeted our most vulnerable population, our youth,” said HSI New Orleans SAC Jere T. Miles. “Thanks to HSI special agents, and our partners at the Mississippi Bureau of Narcotics and the Rankin County Sheriff’s Office, our communities will be safer with this criminal behind bars.”

Shop Amazon Gift Cards. Any Occasion. No Expiration.

“This criminal endangered not just our citizens but our children, stooping so low as to disguise this poison as candy just so he could make a quick buck, caring not that it would cause damage, destruction and death in our communities. Because of the great work of our federal, state and local law enforcement, as well as our prosecutors, this criminal will not be peddling these toxins to our kids or anyone else anymore,” said U.S. Attorney Hurst.

On April 16, 2018, Cleveland James McKinney, 30, of Atlanta, traveled to Brandon, Mississippi from Atlanta, to retrieve a drug shipment that originated in Mexico and entered the United States through Brownsville, Texas. The drugs were concealed in what appeared to be shrink-wrapped, bulk packaged children’s candy. McKinney was to transport the drugs to Atlanta and deliver them to his co-conspirator, Evelyn Michelle Hernandez.

Unbeknownst to McKinney, HSI already had intercepted the narcotics shipment and had replaced the drugs with a false substance in packaging almost identical to the children’s candy packaging that had concealed the illegal methamphetamine and heroin.

McKinney drove to the designated location and retrieved the packages that he believed contained the illegal drugs. He then began his return trip to Atlanta. He was arrested shortly thereafter. McKinney was charged in a federal criminal indictment and pled guilty Nov. 21, 2019.

At the Tuesday sentencing by Senior U.S. District Judge David Bramlette III, McKinney was also ordered to pay a $1,500 fine.

Hernandez was also indicted and sentenced Nov, 19, 2019 to 168 months in federal prison.

This case was investigated by HSI, the Mississippi Bureau of Narcotics, and the Rankin County Sheriff’s Office Interdiction Task Force. It was prosecuted by Assistant United States Attorney Carla J. Clark.

ICE.gov (February, 2020) Georgia man sentenced for transporting drugs disguised as children’s candy

Help a veteran in need by donating here.

Texas Couple Sentenced to a Combined 140 Years in Prison for Conspiracy to Produce Child Pornography and Other Crimes Against Children

A husband and wife from Big Spring, Texas, were sentenced today to a combined 140 years in prison for crimes against children.


A husband and wife from Big Spring, Texas, were sentenced today to a combined 140 years in prison for crimes against multiple children. 

Assistant Attorney General Brian A. Benczkowski of the Justice Department’s Criminal Division, U.S Attorney Erin Nealy Cox of the Northern District of Texas and Special Agent in Charge Ryan L. Spradlin of U.S. Immigration and Customs Enforcement’s Homeland Security Investigations (HSI) made the announcement.

Christopher James Regan, 38, a former shipping logistics manager, was sentenced to 90 years in prison after pleading guilty in October 2019 to conspiracy to produce child pornography and two counts of producing child pornography.  Tanya Marie Regan, 35, was sentenced to 50 years in prison after her October 2019 guilty plea to conspiracy to produce child pornography and possession of prepubescent child pornography.  The sentences, which were imposed by U.S. District Judge Mark T. Pittman of the Northern District of Texas, also included lifetime terms of supervised release for both defendants.

According to court documents, Christopher and Tanya Regan sexually abused and produced child pornography of multiple children, and they possessed and distributed child pornography to one another as well.  The Regans also engaged in graphic discussions about the sexual abuse of children over several online platforms. 

In plea papers, the pair admitted that at Christopher Regan’s direction, Tanya Regan repeatedly videotaped herself sexually abusing children for Christopher Regan’s sexual gratification.

When law enforcement seized electronics from the home, several graphic videos had been deleted, but were still stored in the recycle bin or on unallotted space on various SD cards. Undeleted videos were stored in a computer folder titled “users\tanya_000\pictures\privatevids\minor.”

HSI’s San Angelo, Texas, office, the Howard County Sheriff’s Office and the High Technology Investigative Unit within the Criminal Division’s Child Exploitation and Obscenity Section (CEOS) investigated the case.  Substantial assistance was provide by the HSI offices in Lubbock and Tyler, Texas, Tom Green County Sheriff’s Office, Texas Department of Public Safety, and the National Center for Mission and Exploited Children.  Trial Attorney Kyle P. Reynolds of CEOS and Assistant U.S. Attorneys Ann Howey and Jeffrey R. Haag prosecuted the case along with former Assistant U.S. Attorney Russell H. Lorfing.

This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse.  Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims.

For more information about Project Safe Childhood, please visit www.justice.gov/psc.

FBI.gov (February, 2020) Texas Couple Sentenced to a Combined 140 Years in Prison

Help a veteran in need by donating here.

Romanian Hackers Sentenced

Bayrob Group members Bogdan Nicolescu and Radu Miclaus were both convicted on wire fraud, money laundering, and identity theft charges. In December 2019, Nicolescu was sentenced to 20 years and Miclaus to 18 years in prison.


Members of Bayrob Criminal Enterprise Infected Thousands of Computers with Malware, Stole Millions of Dollars

The hackers were like modern-day John Dillingers, brazenly committing their crimes and repeatedly escaping law enforcement’s grasp.

But like Dillinger and most other criminals, they eventually slipped up, and the FBI and its international partners were waiting for them after years of tracking their activities.

Auction Fraud Gets Law Enforcement’s Attention

In 2007, an Ohio woman wired thousands of dollars to an eBay seller thinking she was buying a used car. The car never arrived. When she went to her local police department, the listing did not appear on the officers’ computers.

That’s because the woman was on a fraudulent version of the online auction site that mimicked the real one—a result of having unknowingly downloaded malicious software, known as malware, to her computer.

And to thousands of other victims just like her, the website and transactions looked legitimate. But buyers who thought they were wiring money across town were, in fact, sending money to hackers halfway across the world.

Shop Amazon Gift Cards. Any Occasion. No Expiration.

The hackers, known as the Bayrob Group, laundered the money via money mules, making it difficult to track. (Money mules are criminal accomplices who, often unwittingly, move criminal money through their own bank accounts.) Additionally, if a user on an infected machine went to the “Help” section of the site, they were met with the hackers’—not eBay’s—customer service.

The Bayrob hackers also blocked websites like ic3.gov—the FBI’s Internet Crime Complaint Center—where a user might have gone for help. And before smartphones were so common, the infected computer may have been a victim’s only access to the Internet.

The would-be car buyer, along with many other victims, lost her money because wiring funds lacks the consumer protection of a credit card. Agents estimate each victim lost between $8,000 and $11,000.

“At the time, this was really cutting edge,” said Special Agent Ryan Macfarlane, who worked this case out of the FBI’s Cleveland Field Office. “These guys did a very good job of staying current with the technologies in the cyber-criminal underground.”

Following the Money and the Malware

The Bayrob hackers were frustratingly nimble and good at covering their tracks. They used multiple layers of proxy servers to hide their location. Those proxy servers communicated with the “command and control” servers that talked to the thousands of computers the malware had infected.

But as the hackers gained more victims, more partners joined the investigation. The FBI worked with numerous law enforcement agencies around the world on this case, as well as with companies such as AOL, eBay, and Symantec.

Beginning in 2012, the Bayrob Group began to diversify its criminal business as technology advanced. They continued to spread their malware via spam and social media, but they also got into cryptocurrency mining and selling credit card numbers on the Darknet.

“They had all of these infected systems, and they tried to use as many ways as possible to make money from them,” Macfarlane said.

Mistake Yields a Break in the Case

A break finally came when a Bayrob participant accidentally logged into his personal email instead of his criminal one. AOL, who was investigating his abuse of their network, connected the two accounts. That personal account led to online profiles in Romania and on social media—essentially the first action tying one of the suspects to the crimes.

That small mistake helped set investigators, in partnership with the Romanian National Police, on a path toward discovering the identities of all three hackers. And after much further investigation, including undercover buys from the group on Darknet marketplace Alphabay, the FBI had enough evidence to work with Romanian authorities on the arrests.

By the time the hackers were arrested in 2016, the Bayrob Group had become one of the top senders of malicious email.

“We were essentially taking down this entire infrastructure and arresting the three individuals at one time,” Macfarlane said. “And the Romanian National Police were key partners in this effort. They stuck with us year after year. We couldn’t have done this without them.”

Bayrob Group members Bogdan Nicolescu and Radu Miclaus were both convicted on wire fraud, money laundering, and identity theft charges. In December 2019, Nicolescu was sentenced to 20 years and Miclaus to 18 years in prison.

A third member of the group, Tiberiu Danet, pleaded guilty to similar charges. He was sentenced in January to 10 years in prison.

While it was years in the making, putting a stop to these prolific thieves was worth the time and effort for the investigators—even when the hackers were as elusive as a gangster on the run.

“We stuck with it because these guys weren’t stopping,” Macfarlane said. “They continued to evolve, and they were becoming a bigger and bigger threat.”

Protecting Yourself Online

Although many of the victims had no way of knowing their computers were compromised, there are steps you can take to protect yourself and your devices, such as making sure your antivirus and operating systems are always up to date. Also be careful of what you click on, even if it’s coming from someone you know.

“A lot of people don’t think that someone they know will be compromised,” said FBI Special Agent Stacy Diaz, who also worked on the case. “These hackers know how social networks work, and they use those relationships to grow their network.”

FBI.gov (February, 2020) Romanian Hackers Sentenced

Help a veteran in need by donating here.

Government Contractor Sentenced to 57 Months in Prison for $3.7 Million Procurement Fraud Scheme

A former government contractor was sentenced to 57 months in prison for his role in carrying out a $3.7 million scheme to defraud at least 35 subcontractors located across the United States.


A former government contractor was sentenced to 57 months in prison for his role in carrying out a $3.7 million scheme to defraud at least 35 subcontractors located across the United States.

Chester L. Neal Jr., 45, of Bourbon Oak, Missouri, was sentenced by U.S. District Judge Dale A. Drozd of the Eastern District of California.  Judge Drozd also ordered Neal to pay restitution in the amount of $3,734,927.50.

Neal pleaded guilty on Aug. 19, 2019, to one count of mail fraud.  According to admissions made in connection with his plea, Neal established and controlled several companies through which he bid on and won at least 105 government contracts to provide goods and services to federal agencies including the Department of Interior, U.S. Army and U.S. Air Force. 

Soffe Men’s 3 Pack-USA Poly Cotton Military Tee

The contracts required Neal to purchase and transport rock, gravel, and other raw materials to military bases and national parks. After winning these contracts, Neal fraudulently induced subcontractors to perform the required work. 

But when Neal was paid by the government for his subcontractors’ work, he did not pay his subcontractors. Instead, Neal kept the money and spent it at places like casinos, nightclubs, restaurants and hotels. 

In total, between July 2008 and December 2017, Neal defrauded his subcontractors out of approximately $3.7 million.

Assistant Attorney General Brian A. Benczkowski of the Justice Department’s Criminal Division, U.S. Attorney McGregor W. Scott of the Eastern District of California, Special Agent in Charge David A. House of the Department of Interior Office of Inspector General’s (DOI-OIG) Western Region Office of Investigations, Special Agent in Charge Ray Park of the U.S. Army Criminal Investigation Command’s (Army CID) Major Procurement Fraud Unit, Pacific Fraud Field Office, Special Agent in Charge Sean Ragan of the FBI’s Sacramento Division, Special Agent in Charge Jason Hein of the Air Force Office of Special Investigations’ (Air Force OSI) Office of Procurement Fraud Unit, and Special Agent in Charge Brian Denny of the Defense Criminal Investigative Service’s (DCIS) Western Field Office made the announcement.

Cell Phones and Accessories

DOI-OIG, Army CID, the FBI, Air Force OSI and DCIS investigated this matter.

Trial Attorney Kyle W. Maurer of the Criminal Division’s Fraud Section and Assistant U.S. Attorney Grant B. Rabenn of the Eastern District of California prosecuted the case.

DODIG.mil; Justice.gov (February, 2020) Government Contractor Sentenced to 57 Months in Prison for $3.7 Million Procurement Fraud Scheme