United States Attorney David Metcalf announced that Willie Jordan, 68, of Upper Darby, Pennsylvania, was sentenced today to one year in prison, one year of supervised release, $142,991 in restitution, and forfeiture of $142,991 by United States District Judge Harvey Bartle III for two separate fraud schemes Jordan conducted.
The defendant was charged by information with two counts of wire fraud and pleaded guilty in July of this year.
As detailed in court filings and statements made in court, Jordan was a deacon and trustee for Religious Organization #1, located in Philadelphia, Pa. Jordan was responsible for managing and overseeing various financial matters involving Religious Organization #1, including collecting funds for the organization, depositing those funds in the organization’s bank accounts, and paying the organization’s expenses.
Religious Organization #1 placed Jordan in a position of trust and allowed him to exercise almost total control over its funds. The defendant did not receive a salary from Religious Organization #1. Rather, he received his salary from the Commonwealth of Pennsylvania, where he was a Director of Operations for a state senator.
From at least in or about January 2020 through at least in or about January 2024, Jordan exploited Religious Organization #1 for his personal financial benefit. On a regular basis, the defendant improperly issued checks to himself from Religious Organization #1’s business checking account, and made it appear that such checks were to reimburse him for expenses that he incurred on behalf of Religious Organization #1. In fact, Jordan did not incur those expenses and simply issued those checks for his personal benefit. The defendant engaged in this activity fraudulently and without the knowledge or permission of Religious Organization #1, its trustees, or members.
As part of this scheme, Jordan issued approximately 82 fraudulent checks to himself totaling approximately $57,384, resulting in significant losses to Religious Organization #1.
As presented in court filings and statements, Political Organization #1 was one of 66 wards in Philadelphia and a subdivision of Political Organization #2, which represented the interests of a political party in the City of Philadelphia.
From in or about 1996 through in or about April 2025, the defendant was the elected leader of Political Organization #1 and controlled and managed the organization’s finances. Jordan did not receive a salary from Political Organization #1.
From at least in or about January 2020, through at least in or about January 2024, Jordan exploited Political Organization #1 for his personal financial benefit. He opened two bank accounts in name of Political Organization #1, made himself the sole signatory on the accounts in the name of Political Organization #1, and obtained, for both accounts, debit cards that he controlled.
On a regular basis, the defendant improperly conducted financial transactions, through debit card charges, checks, and ATM cash withdrawals, using Political Organization #1’s bank accounts to transfer the funds of Political Organization #1 to himself or others, for his personal benefit.
Jordan used Political Organization #1’s funds for personal purchases at airlines, car dealerships, furniture stores, grocery stores, and other retail establishments. He also used those funds to pay his personal credit card bills, utility bills, and cellular telephone bills. In or about the summer of 2023, Jordan used the funds of Political Organization #1 to pay more than $12,500 in expenses for a family member’s funeral. The defendant engaged in these personal financial transactions without any benefit flowing to Political Organization #1 and without the knowledge or permission of any of its members.
As part of this scheme, Jordan defrauded Political Organization #1 and its members of at least $85,607.
This case was investigated by the FBI and the Pennsylvania Office of Attorney General and is being prosecuted by Assistant United States Attorney Louis D. Lappen and Special Assistant United States Attorney James E. Price.
MANHATTAN — New York Attorney General Letitia James’ Office of Special Investigation opened a probe Friday into the fatal police shooting of an armed man during a confrontation on Madison Avenue, authorities said. The incident unfolded around 7:20 p.m. Thursday after multiple 911 callers reported a man brandishing a gun; NYPD officers located a suspect matching the description holding a firearm, and when he opened fire, police returned shots, striking him. He was rushed to a nearby hospital but pronounced dead on arrival, with officers recovering a gun from the scene. Under state law, the OSI must review any death potentially caused by on- or off-duty officers, armed or not, and these early details remain preliminary as the full investigation proceeds.
Attorney General James’ Office of Special Investigation Opens Investigation into Civilian Death in Manhattan
– The New York Attorney General’s Office of Special Investigation (OSI) has opened an investigation into the death of a civilian who died on November 13, 2025 following an encounter with members of the New York City Police Department (NYPD) in Manhattan.
At approximately 7:20 p.m. on November 13, NYPD officers were canvassing an area after receiving multiple 911 calls reporting a man with a gun. Officers encountered a man matching the description with a gun in his hand at an address on Madison Avenue in Manhattan. The man fired the gun, and officers discharged their service weapons in response, striking the man. He was taken to a local hospital, where he was pronounced dead. Officers recovered a gun at the scene.
Pursuant to New York State Executive Law Section 70-b, OSI assesses every incident reported to it where a police officer or a peace officer, including a corrections officer, may have caused the death of a person by an act or omission. Under the law, the officer may be on-duty or off-duty, and the decedent may be armed or unarmed. Also, the decedent may or may not be in custody or incarcerated. If OSI’s assessment indicates an officer may have caused the death, OSI proceeds to conduct a full investigation of the incident.
These are preliminary facts and subject to change.
Possession of a Dangerous Weapon in a Federal Facility; Depredation of Federal Property
Keith Michael Lisa, 51, of New Jersey (with ties to Mahwah and New York City), is a fugitive wanted by the FBI as of November 2025 for allegedly vandalizing the office of Acting U.S. Attorney Alina Habba in Newark’s Peter W. Rodino Federal Building on November 13, 2025. According to authorities, Lisa entered the building with a baseball bat after being denied a meeting, causing damage to government property. He faces federal charges of possession of a dangerous weapon in a federal facility and depredation of federal property, with a U.S. District Court arrest warrant issued the same day. T he FBI describes him as 6’3″ tall, with brown and gray hair and brown eyes, and considers him dangerous. A reward of up to $25,000 is offered for information leading to his arrest and conviction; tips can be submitted to 1-800-CALL-FBI or tips.fbi.gov. He was previously booked in Bergen County, NJ, on October 26, 2025, on unrelated charges. The FBI took him into custody shortly after the incident, per reports
Date(s) of Birth Used
April 11, 1974
Place of Birth
California
Hair
Brown/Gray
Eyes
Brown
Height
6’3″
Weight
200 to 230 pounds
Sex
Male
Race
White
Nationality
American
Reward:
The FBI is offering a reward of up to $25,000 for information leading to the arrest and conviction of Keith Michael Lisa.
Remarks:
Lisa has ties to New York City, New York, and Mahwah, New Jersey.
Caution:
Keith Michael Lisa is wanted for allegedly entering the Peter W. Rodino Federal Building in Newark, New Jersey, on November 12, 2025, while in possession of a bat. After being denied entry, he discarded the bat and returned. Once inside the building, he proceeded to the U.S. Attorney’s Office where he damaged government property. A federal arrest warrant was issued for Lisa on November 13, 2025, in the United States District Court for the District of New Jersey, Newark, New Jersey after he was charged with Possession of a Dangerous Weapon in a Federal Facility and Depredation of Federal Property.
Two men from Texas and Florida were sentenced today to four years and two years in prison, respectively, for their roles as leaders of a marketing company that solicited Medicare beneficiaries for medically unnecessary genetic testing. The Florida man received an additional two years in prison, to be served concurrently, for his role in falsifying the ownership information in Medicare enrollment documentation for a clinical laboratory.
According to court documents, Paul Wexler, 56, of Spring, Texas, and Paul Bleignier, 64, of Seminole, Florida, operated a telemarketing company that recruited Medicare beneficiaries for cancer genetic (CGx) testing that was medically unnecessary. CGx testing uses DNA sequencing to detect mutations in genes that could indicate a higher risk of developing certain types of cancers in the future. It is not a method of diagnosing whether an individual presently has cancer, and Medicare covers CGx testing in limited circumstances. Further, Wexler, Bleignier and their co-conspirators solicited and received kickbacks in exchange for referring Medicare beneficiaries for CGx testing that was not eligible for Medicare reimbursement. Through the scheme, Wexler and Bleignier caused Medicare to be billed $17.3 million, and they were paid $5.2 million.
While the criminal case for genetic testing fraud was pending, Bleignier opened a clinical laboratory and enrolled it in Medicare. Medicare requires a certification listing anyone with 5% or more ownership interest, but Bleignier used other people’s identities to disguise his involvement. The claims related to that laboratory were further tainted by kickbacks. Bleignier and his co-conspirators billed Medicare for $3,012,156 in claims that were ineligible for reimbursement, and they were paid $916,106.
In April 2024, Wexler pleaded guilty to conspiracy to commit health care fraud and wire fraud. In November 2022, Bleignier pleaded guilty to conspiracy to defraud the United States and pay and receive kickbacks, and in November 2024, he pleaded guilty to making false statements related to health care matters. At sentencing the two were ordered to pay $1.2 million in forfeiture each and $5.2 million in restitution. Bleignier was ordered to pay an additional $916,106 in forfeiture for his role in falsifying the ownership information in Medicare enrollment documentation.
Acting Assistant Attorney General Matthew R. Galeotti of the Justice Department’s Criminal Division; U.S. Attorney Gregory W. Kehoe for the Middle District of Florida; and Deputy Inspector General for Investigations Christian J. Schrank of the U.S. Department of Health and Human Services, Office of Inspector General (HHS-OIG) made the announcement.
HHS-OIG and FBI investigated the case.
Trial Attorney Charles D. Strauss of the Criminal Division’s Fraud Section prosecuted the case.
The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Force Program. Since March 2007, this program, currently comprised of nine strike forces operating in 27 federal districts, has charged more than 5,800 defendants who collectively have billed federal health care programs and private insurers more than $30 billion. In addition, the Centers for Medicare & Medicaid Services, working in conjunction with the Office of the Inspector General for the Department of Health and Human Services, are taking steps to hold providers accountable for their involvement in health care fraud schemes. More information can be found at www.justice.gov/criminal-fraud/health-care-fraud-unit.
– Five members of the transnational criminal organization Mara Salvatrucha 13 (MS-13) were found guilty by a jury today of committing six murders to advance their standing in the gang – killings in which the victims varyingly were strangled, shot, stabbed with knives or a machete, beaten with a baseball bat, then, in some cases, had their bodies thrown off a cliff or down a hill in the Angeles National Forest.
At the conclusion of a nine-week trial, a jury found the following defendants guilty of one count of conspiracy to violate the Racketeer Influenced and Corrupt Organizations (RICO) Act:
Walter Chavez Larin, 26, of Panorama City;
Roberto Alejandro Corado Ortiz, 30, of Baldwin Park; and
Edwin Martinez, 28, of Cypress Park.
Chavez and Corado also were found guilty of two counts of violent crimes in aid of racketeering (VICAR) murder. Martinez was found guilty of three counts of VICAR murder. Bryan Alexander Rosales Arias, 28, of South Los Angeles, was found guilty of one count of VICAR murder. Erick Eduardo Rosales Arias, 27, also of South Los Angeles and who is Bryan Rosales’s brother, was found guilty of one count of VICAR murder.
“The horrific violence in this case underscores the urgency of destroying MS-13 and putting its depraved members behind bars,” said United States Attorney General Pamela Bondi. “Under President Trump, MS-13 can no longer unleash terror on the American people with impunity: We will eradicate this foreign terrorist organization and secure justice for its victims.”
“We thank the jury for returning swift guilty verdicts against these MS-13 criminals who engaged in horrific acts of violence and murder,” said First Assistant United States Attorney Bill Essayli. “I thank and commend our law enforcement partners for their work in removing members of this terrorist organization from our streets. MS-13 is a violent brutal gang that must be eliminated from the United States, and we will not stop until we succeed in our mission.”
“Cases such as this one serve as a reminder that MS-13 has been designated as a foreign terrorist organization,” said Akil Davis, the Assistant Director in Charge of the FBI’s Los Angeles Field Office. “The defendants in this case carried out barbaric attacks on their victims to simply enhance their ranking within the gang. I’m proud of the hard work that went into this trial by agents and prosecutors which resulted in a guilty verdict and a measure of justice for the victims, and which will effectively remove murderers and terrorists from Los Angeles communities.”
“The brutality of these crimes is a stark reminder of the importance of our shared mission: to protect the people of Los Angeles from those who seek to do harm,” said Los Angeles Police Chief Jim McDonnell. “I thank every investigator, prosecutor, and law enforcement professional who contributed to this case. Their dedication has brought justice to the victims and sent a clear message — we will not tolerate this kind of violence in our city. Together, we are stronger, and together, we will continue to stand against gang violence in all its forms.”
“These convictions send a powerful message that criminal gang violence and intimidation have no place in Los Angeles County,” said Los Angeles County Sheriff Robert G. Luna. “These violent individuals terrorized our communities and tore families apart to further their criminal network. Through the tireless efforts of our local and federal partners, we have brought justice to the victims’ families and held these individuals accountable for their brutal crimes.”
“MS-13 has inflicted unimaginable suffering on victims and their families in our communities,” said Los Angeles County District Attorney Nathan J. Hochman. “These guilty verdicts for crimes related to murder, extortion and drug trafficking against five members of MS-13’s leadership demonstrate the relentless and fearless partnership between local and federal law enforcement and prosecutors to bring these dangerous criminals to justice.”
According to evidence presented at trial, the defendants murdered their victims who either were – or perceived to be – members of the 18th Street gang, a rival of MS-13, or had violated MS-13’s rules.
The trial focused on MS-13 Los Angeles cliques that implemented gang rules that required its members to use murder and extreme violence to rise within its ranks.
The charges relate to machete, knife, and baseball bat killings in the Angeles National Forest and several other areas in remote, mountainous locations in Los Angeles County. Those six murders – which included murders committed in the mountains near Malibu, in a remote area of the Santa Clarita Valley, and two in Van Nuys – are also charged as violent crimes committed in aid of racketeering (VICAR). Those six counts allege that the victims were killed “for the purpose of gaining entry to and maintaining and increasing position in MS-13 Los Angeles.”
In June 2017, one victim – who claimed he had a leadership role in MS-13– was taken to the Angeles National Forest then stabbed and hacked to death by his killers, including Chavez. Several of the assailants unsuccessfully tried to decapitate him then left his body behind.
In October 2017, another victim – rumored to be an 18th Street member – was lured to his death by two teenage girls. He was kidnapped, strangled, beaten with a baseball bat then fatally stabbed with a large hunting style knife. Before his body was thrown off a cliff in the Angeles National Forest. This victim’s assailants included Corado and Bryan Rosales.
In July 2018, a third victim – also rumored to be an 18th Street member – was lured to Malibu hills under the auspices of smoking marijuana and drinking beer with several other people. While the victim stood at a scenic overlook, Corado shot him in the back of the head. Corado gave the gun to Erick Rosales, who shot the victim before passing the gun to other MS-13 members who took turns shooting him. This victim’s body ultimately was thrown off the edge of a road down a hill.
Martinez murdered three victims – one of them was shot to death in December 2018 after returning from the gym and was mistaken for an 18th Street gang member, another was an MS-13 associate addicted to methamphetamine (a violation of MS-13 rules) who was shot to death on January 13, 2019, and the third was a homeless man who was fatally shot on January 14, 2019 for having a tattoo believed to be related to 18th Street. Chavez participated in the January 13 murder.
Sentencing hearings before United States District Judge Otis D. Wright II are scheduled for July 2026, at which time each of the defendants will face a mandatory sentence of life in federal prison.
Prosecutors have secured 25 convictions so far in this case. Several other MS-13 members and associates are scheduled to go to trial in April 2026 in connection with racketeering conspiracy and gang murders.
The FBI, the Los Angeles Police Department, and the Los Angeles County Sheriff’s Department investigated this matter.
Assistant United States Attorneys Catharine A. Richmond and Sara B. Vargas of the Major Crimes Section, Benedetto L. Balding of the Transnational Organized Crime Section, William Larsen of the Criminal Appeals Section, and Special Assistant United States Attorney Eric W. Siddall are prosecuting this case.
Updated November 10, 2025
Monday, November 10, 2025 Office of Public Affairs
– Five members of the transnational criminal organization Mara Salvatrucha 13 (MS-13) were found guilty by a jury today of committing six murders to advance their standing in the gang – killings in which the victims varyingly were strangled, shot, stabbed with knives or a machete, beaten with a baseball bat, then, in some cases, had their bodies thrown off a cliff or down a hill in the Angeles National Forest.
At the conclusion of a nine-week trial, a jury found the following defendants guilty of one count of conspiracy to violate the Racketeer Influenced and Corrupt Organizations (RICO) Act:
Walter Chavez Larin, 26, of Panorama City;
Roberto Alejandro Corado Ortiz, 30, of Baldwin Park; and
Edwin Martinez, 28, of Cypress Park.
Chavez and Corado also were found guilty of two counts of violent crimes in aid of racketeering (VICAR) murder. Martinez was found guilty of three counts of VICAR murder. Bryan Alexander Rosales Arias, 28, of South Los Angeles, was found guilty of one count of VICAR murder. Erick Eduardo Rosales Arias, 27, also of South Los Angeles and who is Bryan Rosales’s brother, was found guilty of one count of VICAR murder.
“We thank the jury for returning swift guilty verdicts against these MS-13 criminals who engaged in horrific acts of violence and murder,” said First Assistant United States Attorney Bill Essayli. “I thank and commend our law enforcement partners for their work in removing members of this terrorist organization from our streets. MS-13 is a violent brutal gang that must be eliminated from the United States, and we will not stop until we succeed in our mission.”
“The horrific violence in this case underscores the urgency of destroying MS-13 and putting its depraved members behind bars,” said United States Attorney General Pamela Bondi. “Under President Trump, MS-13 can no longer unleash terror on the American people with impunity: We will eradicate this foreign terrorist organization and secure justice for its victims.”
“Cases such as this one serve as a reminder that MS-13 has been designated as a foreign terrorist organization,” said Akil Davis, the Assistant Director in Charge of the FBI’s Los Angeles Field Office. “The defendants in this case carried out barbaric attacks on their victims to simply enhance their ranking within the gang. I’m proud of the hard work that went into this trial by agents and prosecutors which resulted in a guilty verdict and a measure of justice for the victims, and which will effectively remove murderers and terrorists from Los Angeles communities.”
“The brutality of these crimes is a stark reminder of the importance of our shared mission: to protect the people of Los Angeles from those who seek to do harm,” said Los Angeles Police Chief Jim McDonnell. “I thank every investigator, prosecutor, and law enforcement professional who contributed to this case. Their dedication has brought justice to the victims and sent a clear message — we will not tolerate this kind of violence in our city. Together, we are stronger, and together, we will continue to stand against gang violence in all its forms.”
“These convictions send a powerful message that criminal gang violence and intimidation have no place in Los Angeles County,” said Los Angeles County Sheriff Robert G. Luna. “These violent individuals terrorized our communities and tore families apart to further their criminal network. Through the tireless efforts of our local and federal partners, we have brought justice to the victims’ families and held these individuals accountable for their brutal crimes.”
“MS-13 has inflicted unimaginable suffering on victims and their families in our communities,” said Los Angeles County District Attorney Nathan J. Hochman. “These guilty verdicts for crimes related to murder, extortion and drug trafficking against five members of MS-13’s leadership demonstrate the relentless and fearless partnership between local and federal law enforcement and prosecutors to bring these dangerous criminals to justice.”
According to evidence presented at trial, the defendants murdered their victims who either were – or perceived to be – members of the 18th Street gang, a rival of MS-13, or had violated MS-13’s rules.
The trial focused on MS-13 Los Angeles cliques that implemented gang rules that required its members to use murder and extreme violence to rise within its ranks.
The charges relate to machete, knife, and baseball bat killings in the Angeles National Forest and several other areas in remote, mountainous locations in Los Angeles County. Those six murders – which included murders committed in the mountains near Malibu, in a remote area of the Santa Clarita Valley, and two in Van Nuys – are also charged as violent crimes committed in aid of racketeering (VICAR). Those six counts allege that the victims were killed “for the purpose of gaining entry to and maintaining and increasing position in MS-13 Los Angeles.”
In June 2017, one victim – who claimed he had a leadership role in MS-13– was taken to the Angeles National Forest then stabbed and hacked to death by his killers, including Chavez. Several of the assailants unsuccessfully tried to decapitate him then left his body behind.
In October 2017, another victim – rumored to be an 18th Street member – was lured to his death by two teenage girls. He was kidnapped, strangled, beaten with a baseball bat then fatally stabbed with a large hunting style knife. Before his body was thrown off a cliff in the Angeles National Forest. This victim’s assailants included Corado and Bryan Rosales.
In July 2018, a third victim – also rumored to be an 18th Street member – was lured to Malibu hills under the auspices of smoking marijuana and drinking beer with several other people. While the victim stood at a scenic overlook, Corado shot him in the back of the head. Corado gave the gun to Erick Rosales, who shot the victim before passing the gun to other MS-13 members who took turns shooting him. This victim’s body ultimately was thrown off the edge of a road down a hill.
Martinez murdered three victims – one of them was shot to death in December 2018 after returning from the gym and was mistaken for an 18th Street gang member, another was an MS-13 associate addicted to methamphetamine (a violation of MS-13 rules) who was shot to death on January 13, 2019, and the third was a homeless man who was fatally shot on January 14, 2019 for having a tattoo believed to be related to 18th Street. Chavez participated in the January 13 murder.
Sentencing hearings before United States District Judge Otis D. Wright II are scheduled for July 2026, at which time each of the defendants will face a mandatory sentence of life in federal prison.
Prosecutors have secured 25 convictions so far in this case. Several other MS-13 members and associates are scheduled to go to trial in April 2026 in connection with racketeering conspiracy and gang murders.
The FBI, the Los Angeles Police Department, and the Los Angeles County Sheriff’s Department investigated this matter.
Assistant United States Attorneys Catharine A. Richmond and Sara B. Vargas of the Major Crimes Section, Benedetto L. Balding of the Transnational Organized Crime Section, William Larsen of the Criminal Appeals Section, and Special Assistant United States Attorney Eric W. Siddall are prosecuting this case.
Monday, November 10, 2025
For Immediate Release
U.S. Attorney’s Office, Central District of California
Ashley Tellis, 64, a U.S. citizen residing in Vienna, Virginia, was arrested on Oct. 11 in connection with his alleged unlawful retention of classified national defense information. Tellis appeared today in the Eastern District of Virginia for a detention hearing.
“Safeguarding our country’s national defense information is a top priority,” said Principal Deputy Assistant Attorney General Sue J. Bai of the Justice Department’s National Security Division. “For those entrusted with our country’s most sensitive information, protecting it is a privilege and solemn responsibility. With the hard work and dedication of our prosecutors and agents, we will hold this defendant accountable for breaching that trust and exploiting his security clearance to unlawfully retain classified information detailing our military capabilities.”
“The FBI arrested Ashley Tellis, a senior advisor at the Department of State and a contractor within the Department of Defense, for allegedly removing over a thousand pages of classified national defense information from government facilities and storing them in his home,” said Assistant Director Roman Rozhavsky of the FBI’s Counterintelligence Division. “This arrest should serve as a stark warning to anyone thinking about undermining national security. The FBI and our partners will do everything within our power to find you and hold you accountable.”
“We are fully focused on protecting the American people from all threats, foreign and domestic. The charges as alleged in this case represent a grave risk to the safety and security of our citizens,” said U.S. Attorney Halligan for the Eastern District of Virginia. “The facts and the law in this case are clear, and we will continue following them to ensure that justice is served.”
“U.S. government security clearance holders are entrusted to keep our nation’s most sensitive secrets safe,” said Assistant Director in Charge Darren B. Cox of the FBI Washington Field Office. “By allegedly removing classified documents from government facilities and storing them in his basement, Mr. Tellis betrayed that trust. The FBI and our federal partners acted quickly to execute a court-authorized search warrant and arrest Tellis to protect our national security and prevent highly classified defense information from falling into the wrong hands.”
According to court documents, Tellis held a Top Secret security clearance with Sensitive Compartmented Information (SCI) access. He has worked for the U.S. Department of State since 2001 and currently serves in addition as a contractor for the Department of Defense’s Office of Net Assessment. He also serves as a Senior Fellow at the Carnegie Endowment for International Peace.
As alleged, Tellis accessed classified documents on multiple occasions from secured facilities, including a Sensitive Compartmented Information Facility (SCIF) at the Department of Defense and a secure computer system at the Department of State. In one instance, Tellis altered the filename of a classified document, printed portions of it under the altered title, and then deleted the re-named file. In another incident, he was observed placing classified materials into a notepad and concealing them within his personal briefcase before leaving a secured government facility.
During a court-authorized search of Tellis’s residence, investigators recovered over 1,000 pages of documents with classification markings, including materials labeled SECRET and/or TOP SECRET. These documents were found in locked filing cabinets, in a basement home office, and in trash bags stored in a basement utility area.
The FBI Washington Field Office is investigating the case, with valuable assistance from the Air Force Office of Special Investigations and the Department of State’s Diplomatic Security Service.
Assistant U.S. Attorney Seth Schlessinger for the Eastern District of Virginia and Trial Attorney Leslie Esbrook of the National Security Division’s Counterintelligence and Export Control Section are prosecuting the case.
A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.
Department of Justice Files Largest Ever Forfeiture Action Against Approximately $15B in Bitcoin Currently in U.S. Custody
An indictment was unsealed today in federal court in Brooklyn, New York, charging UK and Cambodian national Chen Zhi, also known as Vincent, 37, the founder and chairman of Prince Holding Group (Prince Group), a multinational business conglomerate based in Cambodia, with wire fraud conspiracy and money laundering conspiracy for directing Prince Group’s operation of forced-labor scam compounds across Cambodia. Individuals held against their will in the compounds engaged in cryptocurrency investment fraud schemes, known as “pig butchering” scams, that stole billions of dollars from victims in the United States and around the world. The defendant is at large.
The U.S. Attorney’s Office for the Eastern District of New York and the Justice Department’s National Security Division also filed today a civil forfeiture complaint against approximately 127,271 Bitcoin, currently worth approximately $15 billion, that are proceeds and instrumentalities of the defendant’s fraud and money laundering schemes, and were previously stored in unhosted cryptocurrency wallets whose private keys the defendant had in his possession. Those funds (the Defendant Cryptocurrency) are presently in the custody of the U.S. government. The complaint is the largest forfeiture action in the history of the Department of Justice.
“Today’s action represents one of the most significant strikes ever against the global scourge of human trafficking and cyber-enabled financial fraud,” said Attorney General Pamela Bondi and Deputy Attorney General Todd Blanche. “By dismantling a criminal empire built on forced labor and deception, we are sending a clear message that the United States will use every tool at its disposal to defend victims, recover stolen assets, and bring to justice those who exploit the vulnerable for profit. We are grateful for the hard work of Director Patel and the men and women of the FBI.”
“Today the FBI and partners executed one of the largest financial fraud takedowns in history,” said FBI Director Kash Patel. “This is an individual who allegedly operated a vast criminal network across multiple continents involving forced labor, money laundering, investment schemes, and stolen assets — targeting millions of innocent victims in the process. Justice will be done and I’m proud of the men and women of the FBI who executed the mission faithfully.”
“As alleged, the defendant was the mastermind behind a sprawling cyber-fraud empire operating under the Prince Group umbrella, a criminal enterprise built on human suffering. Trafficked workers were confined in prison-like compounds and forced to carry out online scams on an industrial scale, preying on thousands worldwide, including many here in the United States,” said Assistant Attorney General for National Security John A. Eisenberg. “This indictment and historic forfeiture, the largest in Department history, reflect our commitment to using every tool at our disposal to ensure such crimes do not pay.”
“As alleged, the defendant directed one of the largest investment fraud operations in history, fueling an illicit industry that is reaching epidemic proportions,” said U.S. Attorney Joseph Nocella Jr. for the Eastern District of New York. “Prince Group’s investment scams have caused billions of dollars in losses and untold misery to victims around the world, including here in New York, on the backs of individuals who have been trafficked and forced to work against their will. This historic indictment and forfeiture complaint send a strong message to fraudsters everywhere that we will pursue you no matter where you are, no matter who you are, and no matter your insidious methods, and we will never stop fighting for victims.”
As alleged in the indictment and forfeiture complaint, since approximately 2015, the defendant has been the founder and chairman of Prince Group, a Cambodian corporate conglomerate that operates dozens of business entities in more than 30 countries. Prince Group is ostensibly focused on real estate development, financial services, and consumer services. However, in secret, the defendant and his top executives grew Prince Group into one of Asia’s largest transnational criminal organizations. Under the defendant’s direction, Prince Group made enormous profits operating scam compounds across Cambodia that perpetrated fraudulent cryptocurrency investment schemes.
To perpetrate these schemes, malicious actors contacted unwitting victims through messaging or social media applications and convinced them to transfer cryptocurrency to specified accounts based on false promises that the funds would be invested and generate profits. In reality, the funds were stolen from the victims and laundered for the benefit of the perpetrators. The scam perpetrators often built relationships with their victims over time, earning their trust before stealing their funds.
Prince Group’s schemes targeted victims around the world, including in the United States, with assistance from local networks working on Prince Group’s behalf. One such network operated in Brooklyn, New York, and facilitated the fraudulent transfer and laundering of millions of dollars on behalf of Prince Group from over 250 victims in New York and across the country.
Prince Group carried out these schemes by trafficking hundreds of workers and forcing them to work in compounds in Cambodia and execute the scams, often under the threat of violence. The compounds housed vast dormitories surrounded by high walls and barbed wire, and functioned as violent forced labor camps. The defendant was directly involved in managing the scam compounds and maintained records associated with each one, including ledgers tracking profits and which fraudulent schemes were run out of which rooms. The defendant also maintained documents describing and depicting “phone farms” at the compounds: automated call centers that used thousands of phones and millions of mobile telephone numbers to facilitate the various fraudulent schemes. The defendant was directly involved in using violence against the individuals within the forced labor camps and possessed images of Prince Group’s violent methods, including photographs depicting beatings and other methods of torture. The defendant communicated directly with his subordinates about beating individuals who “caused trouble,” in one case specifying that the victims should not be “beaten to death.”
In furtherance of these schemes, the defendant and a close network of Prince Group’s top executives used their political influence in multiple foreign countries to protect their criminal enterprise and paid bribes to public officials to avoid disruption by law enforcement. They subsequently laundered the proceeds of the fraudulent schemes through professional money laundering operations and through Prince Group’s own network of ostensibly legal business enterprises, including its online gambling and cryptocurrency mining operations.
At the defendant’s direction, Prince Group associates used sophisticated cryptocurrency laundering techniques to obscure the source of fraudulent Prince Group profits, including “spraying” and “funneling” techniques in which large volumes of cryptocurrency were repeatedly disaggregated across scores of virtual currency addresses and then re-consolidated into fewer addresses to obscure the source of the funds. Some of these criminal proceeds were ultimately held in wallets at cryptocurrency exchanges or exchanged for traditional currency and stored in traditional bank accounts. Other criminal proceeds included the Defendant Cryptocurrency, which was stored in unhosted cryptocurrency wallets whose private keys the defendant personally held. The defendant maintained diagrams recording the process by which some of the Defendant Cryptocurrency was laundered. The defendant boasted to others of Prince Group’s mining businesses that “the profit is considerable because there is no cost” — that is, unlike legitimate enterprises, the operating capital for the cryptocurrency mining businesses comprised money stolen from Prince Group’s many victims.
The defendant and his co-conspirators subsequently used some of the criminal proceeds for luxury travel and entertainment and to make extravagant purchases such as watches, yachts, private jets, vacation homes, high-end collectables, and rare artwork, including a Picasso painting purchased through an auction house in New York City.
If convicted, the defendant faces a maximum penalty of 40 years in prison.
In parallel with today’s actions by the Department of Justice, the Department of the Treasury today designated Prince Group as a transnational criminal organization and announced sanctions against the defendant and multiple associated individuals and entities, for their roles in illicit activity. The United Kingdom’s Foreign, Commonwealth and Development Office also announced sanctions.
The FBI New York Joint Asian Criminal Enterprise Task Force is investigating the case, with assistance from the FBI’s Virtual Asset Unit.
If you have information about Chen Zhi or Prince Group, please contact the FBI at PrinceGroupTips@fbi.gov. According to the FBI Internet Crime Complaint Center’s 2024 Internet Crime Report, cryptocurrency investment fraud caused more than $5.8 billion in reported losses in 2024 alone. You can learn more about cryptocurrency investment fraud here. Members of the public who believe they are victims of cryptocurrency investment fraud and other cyber-enabled crime should contact the FBI Internet Crime Complaint Center at www.ic3.gov.
Assistant U.S. Attorneys Alexander F. Mindlin, Andrew D. Reich, Benjamin Weintraub and Rebecca M. Schuman for the Eastern District of New York are prosecuting the case in partnership with Deputy Chief Christopher B. Brown of the National Security Division’s NatSec Cyber Section, and Assistant U.S. Attorney Tanisha Payne for the Eastern District of New York’s Asset Recovery Section is handling forfeiture matters.
The Department of Justice’s Office of International Affairs provided valuable assistance duringthe investigation. The Government also thanks the United Kingdom’s National Crime Agency, the Isle of Man Constabulary’s Proactive International Money-Laundering Investigations Team and the United Kingdom’s Foreign, Commonwealth & Development Office, which also announced sanctions today against entities related to Prince Group.
An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.
New York Attorney General Letitia James announced on October 14, 2025 that eight car insurance companies will pay $14.2 million and strengthen their cybersecurity after hackers exploited “pre-fill” quote tools and exposed driver’s license numbers and other data for more than 825,000 New Yorkers—information later used in some fraudulent unemployment claims. The settlements—with American Family/Midvale, Farmers, Hagerty, The Hartford, Infinity, Liberty Mutual, Metromile, and State Auto—require better authentication, monitoring, logging, data inventories, and incident response; affected New Yorkers were offered one year of free credit monitoring. Combined with earlier actions against four other insurers, AG James has now secured $20.79 million from 10 auto insurance companies for data security failures.
– New York Attorney General Letitia James today secured $14.2 million from eight car insurance companies for failing to protect the private information of more than 825,000 New Yorkers. The data breaches were part of a hacking campaign that targeted car insurance companies’ quoting tools and stole people’s personal information, including driver’s license numbers and dates of birth. The hackers later used some of the stolen driver’s license information to file fraudulent unemployment claims at the height of the COVID-19 pandemic.
An investigation by the Office of the Attorney General (OAG) and the New York State Department of Financial Services (DFS) concluded that the car insurance companies did not implement reasonable data security controls to protect consumers’ private information. Today’s settlements require all eight companies to pay penalties and significantly improve their data security. Affected New Yorkers were offered free credit report monitoring for one year. Attorney General James previously secured $6.5 million from four other car insurance companies for also failing to protect New Yorkers’ data. To date, Attorney General James has secured a total of $20.79 million from 10 auto insurance companies. Attorney General James encourages companies to follow guidance provided by her office to protect consumers’ personal data.
“New Yorkers pay hundreds of dollars in car insurance each month. When they go searching for a cheaper option, they should not have to worry that their private information could be stolen,” said Attorney General James. “These eight car insurance companies had poor cybersecurity that allowed hackers to easily steal New Yorkers’ personal information and use some of the information for fraud. I thank the Department of Financial Services and the Department of Labor for their partnership and continued work to hold companies accountable when they fail to protect consumers.”
These companiesallowed people to obtain a car insurance price quote using an online tool. Some of the companies also provided password protected tools to insurance agents to generate quotes for customers.
The OAG’s investigation found that data thieves were able to exploit a “pre-fill” function in the companies’ online quoting tools. After limited private information about an individual was entered through an online quoting tool, the company would “pre-fill” the form with private information purchased from data brokers. The purpose of “pre-fill” was to insert information the user might not have on hand and make filling out the form easier. For example, by entering limited information into the tool, such as a person’s full name and date of birth, the other fields on the tool were pre-populated, such as an individual’s driver’s license numbers and similar information about other drivers in their household. The OAG found that the car insurance companies did not take reasonable steps to protect pre-fill private information. The attacks on these eight companies exposed the private information of over 825,000 New Yorkers. Some of the exposed data was later used to file unemployment claims during the COVID-19 pandemic.
The OAG’s investigation revealed that several companies suffered more than one attack, did not have common security tools in place to prevent and detect attacks, and/or did not use multifactor authentication to protect agent account credentials. Key findings from the investigations include:
Farmers Insurance experienced three different attacks, exposing the private information of approximately 45,000 New Yorkers. After the first attack, Farmers did not identify similar vulnerabilities in additional tools that were also exploited.
American Family Mutual Insurance Company / Midvale Indemnity Company each exposed the private information of approximately 100,000 New Yorkers. The companies mistakenly exposed the majority of these records after a transition between two security systems. The companies did not create a comprehensive protected data inventory before that transition and did not reasonably test the attacked tools after that transition.
State Auto Mutual Insurance Company exposed the private information of over 100,000 New Yorkers. State Auto’s quote tools were not protected by common security tools that monitor and detect suspicious patterns, such as excessive requests from the same user or multiple requests by the same user from different IP addresses.
Metromile exposed the private information of approximately 90,000 New Yorkers in a single attack that was not detected for two months. Metromile did not use common security tools to prevent and detect attacks.
Liberty Mutual Insurance experienced attacks on three different consumer quote tools, exposing the data of approximately 50,000 New Yorkers. The attacked tools had not been subject to a privacy assessment and they were not protected by common security tools.
The Hartford Insurance Group experienced two attacks that impacted approximately 30,000 New York consumers. While The Hartford maintained information security policies to protect consumer data, these policies were not implemented effectively.
The Hagerty Insurance Agency experienced two attacks that exposed the private information of approximately 66,000 New Yorkers. While Hagerty detected unusual activity on its consumer quote tool website, Hagerty did not immediately identify it as an attack on exposed private information.
The Infinity Insurance Company experienced three attacks. Data thieves accessed approximately 65,000 New Yorkers’ private information through a consumer quote tool and the information of approximately 180,000 New Yorkers through two password protected agent quoting tools. Infinity did not use multifactor authentication to protect its agent tool credentials at the time of the attacks.
Today’s settlements require these companies to significantly enhance their data security and pay penalties, in the following amounts:
American Family Mutual Insurance Company/Midvale Indemnity Company will pay $2.8 million;
Farmers Insurance will pay $1.3 million;
Hagerty Insurance Agency will pay $1.3 million;
Infinity Insurance Company will pay $2 million;
The Hartford Insurance Group will pay $815,000;
Liberty Mutual Insurance will pay $2 million;
Metromile will pay $2 million; and
State Auto Insurance will pay $2 million.
In addition to the penalties, the companies are required to adopt a series of measures to strengthen their cybersecurity practices, including:
Maintaining a comprehensive information security program designed to protect the security, confidentiality, and integrity of private information;
Developing and maintaining a data inventory of private information and ensuring the information is protected;
Maintaining reasonable authentication procedures for access to private information;
Maintaining a logging and monitoring system as well as reasonable policies and procedures designed to properly configure systems to alert on suspicious activity; and
This matter was led by Assistant Attorneys General Gena Feist and Laura Mumm, and former Assistant Attorneys General Hanna Baek and Ezra Sternstein, Data Security Analyst Nishaant Goswamy, and former Internet and Technology Analyst Joe Graham, under the supervision of Deputy Bureau Chief Clark Russell and Bureau Chief Kim Berger of the Bureau of Internet and Technology. Data analysis was provided by Data Analyst Casey Marescot and Data Scientist Blythe Davis, under the supervision of Deputy Director Gautam Sisodia, Director Victoria Khan, former Deputy Director Megan Thorsfeldt, and former Director Jonathan Werberg of the Research and Analytics Department. The Bureau of Internet and Technology is a part of the Division for Economic Justice, which is led by Chief Deputy Attorney General Chris D’Angelo and overseen by First Deputy Attorney General Jennifer Levy.
Roger Ver, an early bitcoin investor known as “Bitcoin Jesus,” entered into a deferred prosecution agreement with the Justice Department to resolve federal tax charges brought against him. Under the agreement, Ver has paid the IRS nearly $50 million in back taxes, penalties, and interest stemming from his willful failure to properly report his bitcoin holdings on tax returns when he expatriated from the United States in 2014. Today, the government has moved to dismiss the indictment against him.
The following is according to the deferred prosecution agreement: Starting in 2011, Ver began acquiring bitcoins. Over the years, he avidly promoted them, even obtaining the moniker “Bitcoin Jesus.” In March 2014, Ver renounced his U.S. citizenship after obtaining citizenship in St. Kitts and Nevis, a process known as expatriation. Due to his net worth, Ver was required to file certain expatriation-related tax returns and to pay taxes on the capital gains on his world-wide assets, including his bitcoins.
In the agreement, Ver admitted that when he filed these returns in May 2016, he did not report all his bitcoins and pay the required capital gains tax on their constructive sale. Ver admitted that his failure to report capital gains from all these bitcoins caused a loss to the United States of $16,864,105. Ver admitted that the understatement of tax caused by his failure to report ownership of all his bitcoins was willful, which is legally defined as the intentional violation of a known legal duty. Accordingly, Ver admitted he owed the maximum penalty available under 26 U.S.C. § 6663 of more than $12 million, as well as interest on the taxes and penalties.
Associate Deputy Attorney General Ketan D. Bhirud of the Justice Department’s Office of the Deputy Attorney General; Acting United States Attorney Bilal A. Essayli for the Central District of California; and Kareem Carter, Executive Special Agent in Charge of the Internal Revenue Service – Criminal Investigation, Washington, D.C. Field Office made the announcement.
“We are pleased that Mr. Ver has taken responsibility for his past misconduct and satisfied his obligations to the American public. This resolution sends a clear message: whether you deal in dollars or digital assets, you must file accurate tax returns and pay what you owe,” said Associate Deputy Attorney General Ketan D. Bhirud.
“Mr. Ver is accepting responsibility for his actions and has agreed to pay a substantial penalty,” said Acting United States Attorney Bill Essayli of the Central District of California. “Every person, whether you’re a millionaire or not, is required by law to pay taxes and we will not hesitate to hold anyone accountable.”
“Today’s resolution demonstrates that there are consequences for those who intentionally conceal their assets and evade their tax obligations,” said Kareem Carter, Executive Special Agent in Charge. “No matter how sophisticated the technology or the asset, IRS-CI will continue to follow the money, ensure compliance, and protect the integrity of our tax system.”
The Cyber Crimes Unit of IRS Criminal Investigation’s Washington, D.C. Field Office investigated the case.
Assistant Chief Matthew J. Kluge and Trial Attorney Peter J. Anthony of the Tax Division, and Assistant U.S. Attorney James. C. Hughes of the Central District of California prosecuted the case.