SIM Card Swapping Fraudsters Sentenced in San Antonio

Source: United States Department of Justice News

SAN ANTONIO – A San Antonio man and woman were sentenced Wednesday in a federal court in San Antonio for their roles in a SIM card swapping fraud scheme.

According to court documents, Zena Elisa Dounson, 24, and Andrew Percy Trujillo, 22, conspired to access and transfer assets from victims’ cryptocurrency accounts via SIM swapping.  A mobile phone uses a SIM card to store information that identifies and authenticates the subscriber to that cellular phone.  A SIM swapping scheme allows a person to use other phones or devices as though they were the authorized subscriber.  In November 2021, Dounson, an employee at the AT&T store at Ingram Park Mall, assisted Trujillo in adding himself as an authorized user to the accounts of multiple victims.  Using his access as an apparent authorized user, Trujillo would add multiple devices to the accounts. Dounson would then transfer the victims’ SIM card credentials to the fraudulent SIM cards in Trujillo’s phones.  When the victims’ original devices were locked due to suspected fraud, Trujillo accessed and transferred at least $250,000 worth of cryptocurrency from the victims’ investment accounts to his own account.  Both defendants pleaded guilty in August 2022 to one count of conspiracy to commit computer fraud and abuse and wire fraud.

At the hearing, Trujillo was sentenced to 33 months in prison plus three years of supervised release.  Additionally, he was ordered to pay approximately $282,000 in restitution.  Dounson received a split sentence of two months in prison and five years of probation.  She was also ordered to pay $282,000 in restitution.

“SIM Swapping is a rapidly growing type of fraud scheme that everyone should be aware of,” said U.S. Attorney Jaime Esparza of the Western District of Texas.  “It’s particularly dangerous because it abuses access to two-factor authentication systems which are intended to provide additional security.  Anyone who uses two-factor authentication should be mindful that it is not foolproof, and to still be on the lookout for any suspicious activity involving their phones.”

“The defendants in this case callously devised a scheme to transfer more than $250,000 of cryptocurrency from multiple victims for their own personal gain,” said Special Agent in Charge Oliver E. Rich Jr. of the FBI San Antonio Division.  “This sentencing brings a measure of justice to victims and holds the defendants accountable for their actions.”

The FBI investigated the case.

Assistant U.S. Attorneys Michael Galdo and Justin Chung prosecuted the case.

###

Ecuadorian National Sentenced for Possession of Child Pornography

Source: United States Department of Justice News

DEL RIO, Texas – An Ecuadorian national was sentenced in federal court in Del Rio Wednesday to 84 months in prison and five years of supervised release for possession of child sexual abuse material.

According to court documents, Ramiro Helibuerto Cuenca-Campos, 27, of Cuenca Provincia, Azuay, Ecuador was apprehended by U.S. Border Patrol agents near Brackettville during a failed human smuggling attempt.  A forensic analysis of his cell phone revealed more than 2,000 images containing child sexual abuse material.

Chief U.S. District Judge Alia Moses found Cuenca-Campos guilty after a bench trial on July 27, 2021.  He has remained in federal custody since his arrest on March 10, 2020.  In addition to the prison sentence, Cuenca-Campos was ordered to pay $18,000 in restitution to the victims and $200 in special assessments.  Chief Judge Moses also ordered forfeiture of his phone.

“This defendant traveled from Ecuador and crossed the border into our country with a sickening amount of child sexual abuse material on his cell phone,” said U.S. Attorney Jaime Esparza of the Western District of Texas.  “Thankfully, our federal law enforcement partners at the border disrupted a human smuggling operation and conducted their routine procedures, searching this individual and his phone when they detained him.  This case reinforces the fact that, much like our policies against the drugs and firearms that noncitizens occasionally try to bring into the U.S., we will not tolerate anyone bringing in material that sexually exploits and harms children.”

“Individuals who receive and possess child pornography participate in the victimization of children whose innocence can never be restored,” said Acting Special Agent in Charge Craig S. Larrabee for the Homeland Security Investigations San Antonio Division. “These criminals also represent a public safety threat to our communities. For those reasons, child exploitation cases are a top priority for HSI, and we will continue to work closely with our federal partners to ensure they are arrested, prosecuted, and ultimately removed from the United States.”

HSI and USBP investigated the case.

Assistant U.S. Attorney Rex Beasley prosecuted the case.

This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit www.justice.gov/psc.

###

New York City Man Arrested on Felony Charges For Actions During Jan. 6 Capitol Breach

Source: United States Department of Justice News

Defendant Accused of Interfering with Law Enforcement Officers

            WASHINGTON — A New York City man has been arrested on felony charges, including assaulting a law enforcement officer, for his actions during the breach of the U.S. Capitol on Jan. 6, 2021. His actions and the actions of others disrupted a joint session of the U.S. Congress convened to ascertain and count the electoral votes related to the presidential election.

            Elliot Resnick, 39, of New York, New York, is charged in a criminal complaint filed in the District of Columbia with obstructing, impeding, or interfering with any law enforcement officer lawfully engaged in the lawful performance of his official duties incident to and during the commission of a civil disorder; assaulting, resisting, or impeding officers; entering and remaining in a restricted building or grounds; disorderly and disruptive conduct in a restricted building or on restricted grounds; and parading, picketing, or demonstrating in any of the Capitol buildings. He was arrested earlier today in the borough of Manhattan in the City of New York, New York. He is expected to make his initial appearance later today in the Southern District of New York.

            According to court documents, on Jan. 6, 2021, Resnick was among a mob illegally massed on the East Plaza of the U.S. Capitol and one of the many who rushed up the Central East Steps when the police line fell at that location. As the crowd surged forward toward the East Rotunda Doors, Resnick moved with the crowd and can be seen repeatedly gesturing for others to come up the stairs. While police officers were fighting to keep the mob away from the East Rotunda Doors, Resnick grabbed and held the arm of a USCP officer who was at the time deploying a chemical irritant in an effort to keep rioters from entering the U.S. Capitol. Resnick was one of the first to push their way inside the Capitol through the East Rotunda Doors, entering at approximately 2:26 p.m.

            When Resnick entered the Capitol, one door was open, and the other door was closed.  After Resnick failed to push open the southern door of the East Rotunda Doors, which was closed, he reached through the open northern door and, using his arms began grabbing and pulling other rioters into the U.S. Capitol. Resnick entered several other areas of the U.S. Capitol, including Statuary Hall, the Crypt, and the subterranean Capitol Visitor’s Center. Resnick returned to the East Rotunda Doors at approximately 2:45 p.m. Resnick then stood at the threshold of the East Rotunda Doors, both of which were now fully open, and gestured and beckoned rioters outside to come inside. Resnick clapped others on the back as he successfully helped them to enter. Resnick left the Capitol through the East Rotunda Doors at 3:14 p.m., having remained inside for approximately 50 minutes. Over an hour later, however, MPD body worn camera showed Resnick still walking around on restricted Capitol grounds.

            This case is being prosecuted by the U.S. Attorney’s Office for the District of Columbia and the Department of Justice National Security Division’s Counterterrorism Section. Valuable assistance was provided by the U.S. Attorney’s Office for the Southern District of New York.

            The case is being investigated by the FBI’s New York Field Office and the FBI’s Washington Field Office. Valuable assistance was provided by the U.S. Capitol Police and the Metropolitan Police Department.

            In the 26 months since Jan. 6, 2021, more than 999 individuals have been arrested in nearly all 50 states for crimes related to the breach of the U.S. Capitol, including more than 320  individuals charged with assaulting or impeding law enforcement. The investigation remains ongoing.

            Anyone with tips can call 1-800-CALL-FBI (800-225-5324) or visit tips.fbi.gov.

            A complaint is merely an allegation, and all defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

Minnesota Man Sentenced To Three Years In Prison For Scheme To Commit Computer Intrusion And To Illegally Stream Content From Four Major Professional Sports Leagues

Source: United States Department of Justice News

Damian Williams, the United States Attorney for the Southern District of New York, announced that JOSHUA STREIT, a/k/a Josh Brody,” was sentenced today in Manhattan federal court by United States District Judge Andrew L. Carter for conducting intrusions into Major League Baseball (“MLB”) computer systems and illegally streaming copyrighted content from MLB, the National Basketball Association (the “NBA”), the National Football League (the “NFL”), and the National Hockey League (the “NHL”) on a website that STREIT operated, which offered the illegally streamed content to the public for profit.   

U.S. Attorney Damian Williams said:  “Joshua Streit intruded into MLB computer networks and illegally streamed sports content online from MLB, the NHL, the NBA, and the NFL for his own personal profit.  Today’s sentence shows that this crime is no game.  Those who compromise computer networks and steal copyrighted content will be held accountable.”

According to allegations in the Complaint, the Information, and statements made during court proceedings:

Beginning in or about 2017 to in or about August 2021, STREIT operated a website which streamed copyrighted content, primarily livestreamed games from major professional sports leagues, including MLB, the NBA, the NFL, and the NHL, which STREIT had no authorization to stream.  STREIT obtained the copyrighted content by gaining unauthorized access to the websites for those sports leagues via misappropriated login credentials from legitimate users of those websites.  One of the victim sports leagues sustained losses of approximately $3 million due to STREIT’s conduct.

In addition, at the same time STREIT was illicitly streaming copyrighted content from MLB, STREIT engaged in an attempt to extort approximately $150,000 from MLB via a threat from STREIT to publicize unrelated vulnerabilities in MLB’s internet infrastructure.  Specifically, in multiple communications with MLB employees, STREIT claimed that he knew MLB reporters who were “interested in the story,” and stated that it would be bad if the vulnerability were exposed and MLB was embarrassed.

*                *                *

In addition to the prison sentence, STREIT, 31, of St. Louis Park, Minnesota, was sentenced to three years of supervised release and ordered to pay $2,995,272.64 in restitution and $500,000 in forfeiture.

Mr. Williams praised the outstanding work of the Federal Bureau of Investigation.  He also thanked MLB, the NBA, the NFL, and the NHL for their ongoing support and assistance with the case.

The case is being handled by the Office’s Complex Frauds and Cybercrime Unit, and Assistant U.S. Attorney Dina McLeod is in charge of the prosecution.

Defense News: MQ-4C Triton Concludes U.S. 7th Fleet Deployment, Looks to the Future

Source: United States Navy

ANDERSON AIR FORCE BASE, Guam – Operated by Unmanned Patrol Squadron (VUP) 19, the MQ-4C is a high-altitude, long-endurance maritime intelligence, surveillance, reconnaissance and targeting (MISR&T) platform that complements the P-8A Poseidon’s capabilities.
 

“Triton helps bolster our Intelligence, Surveillance, and Reconnaissance (ISR) operations on a global stage” said Lt. Christopher Lee, a Triton naval flight officer. “The communication and safety nets Triton brings to our friendly units is a game-changer.”

The MQ-4C began operating in the 7th Fleet area of operations (AOO) in 2020 to commence developing tactics, techniques, and procedures for unmanned aircraft operations. The two aircraft in the baseline configuration known as Integrated Functional Capability (IFC) 3 were forward deployed supporting Commander, Task Force 72 tasking. During this time, Triton conducted ISR operations using its multi-sensor mission payload.

While Andersen Air Force Base on Guam served as the primary location for VUP-19, MQ-4C aircraft also deployed to Misawa Air Base and Marine Corps Air Station (MCAS) Iwakuni, both in Japan, to refine the concept of operations for expeditionary basing. The ability to flexibly deploy to multiple sites within the 7th Fleet AOO was a successful outcome during the EOC period.

VUP-19 will return to 7th Fleet in 2023 to start the MQ-4C’s initial operational capability (IOC). The IOC period will utilize multiple Triton aircraft in the upgraded IFC-4 configuration to conduct enhanced MISR&T operations with an upgraded sensor suite.
Lee provided insight into the IFC-4 transition and discussed the new capabilities replacing aspects of the EP-3.

“From various locations around the world, Triton will execute its mission 24 hours per day, with little threat to Navy personnel,” said Lee.

These round-the-clock operations will bring enhanced MISR&T capabilities to 7th Fleet. VUP-19 plans to introduce this capability to more fleet areas around the globe, paving the way for future Navy unmanned systems.

VUP-19, based out of Naval Air Station Jacksonville, is currently operating from MCAS Iwakuni, Japan. The squadron conducts Maritime Patrol and Reconnaissance as well as theater outreach operations as part of a rotational deployment to the U.S. 7th Fleet AOO.
7th Fleet is the U.S. Navy’s largest forward-deployed numbered fleet, and routinely interacts and operates with Allies and partners in preserving a free and open Indo-Pacific region.