New Autopsy Determines Death of Alonzo Brooks was a Homicide

Source: Federal Bureau of Investigation (FBI) State Crime News

KANSAS CITY, KS—The death of a Kansas man whose body was found in a creek in La Cygne, Kansas, in 2004 was a homicide, according to a new report by a federal forensic examiner.

As part of a continuing federal investigation of Alonzo Brooks’ death, his body was exhumed and transported to Dover Air Force Base for examination by the Armed Forces Medical Examiner. The examiner’s report concludes that the cause of death was homicide.

“We knew that Alonzo Brooks died under very suspicious circumstances,” said Acting U.S. Attorney Duston Slinkard. “This new examination by a team of the world’s best forensic pathologists and experts establishes it was no accident. Alonzo Brooks was killed. We are doing everything we can, and will spare no resources, to bring those responsible to justice.”

“The FBI’s commitment to justice remains at the forefront of each and every investigation,” said FBI Special Agent in Charge Timothy Langan. “Our reach is broad, and the strength of our investigative tools are exceptional. We remain dedicated to uncovering the truth surrounding the murder of Alonzo Brooks and ensuring those responsible are held accountable for their actions.”

The new autopsy focuses on injuries to parts of Brooks’ body that the examiner concluded are inconsistent with normal patterns of decomposition. Details of the examination are being withheld for investigative purposes.

In 2019, the U.S. Attorney’s Office for the District of Kansas and the FBI reopened the investigation of Brooks’ death, which had been dormant for years. As part of the new investigation, the FBI is offering a $100,000 reward for information leading to the arrest and conviction of anyone responsible for Brooks’ death.

In the initial investigation, a coroner in Linn County said he was unable to determine a cause of death and witnesses’ interviews failed to produce any arrests. The new investigation is focused on determining whether Brooks, an African-American who was 23 years old when he died, was the victim of a racially motivated killing. Brooks was last seen alive in April 2004 during a party at a house on the outskirts of La Cygne. He was one of only three African-American men at the party, which 100 or more people attended. Brooks, who lived in Gardner, Kansas, rode to the party with friends. They left before him and he wound up with no ride home.

When Brooks failed to come home the next day, his family and friends contacted the Linn County Sheriff’s Department.

According to reports at the time, the Sheriff’s Department and other law enforcement agencies searched areas around the farmhouse, including parts of nearby Middle Creek, but did not find Alonzo.

After Alonzo had been missing for almost a month, a group of his family and friends organized a search. They began on the road near the farmhouse and walked the two branches of Middle Creek. In just under an hour, they found Alonzo’s body, partially on top of a pile of brush and branches in the creek.

Anyone with information is encouraged to call the FBI at 816-512-8200 or 816-474-TIPS or submit a tip online at tips.fbi.gov.

FBI Little Rock Seeks to Educate Community and Law Enforcement Partners on Hate Crimes

Source: Federal Bureau of Investigation (FBI) State Crime News

LITTLE ROCK, AR—As Americans become more aware of violent crimes against Asian Americans and Pacific Islanders, the FBI Little Rock Field Office is urging Arkansas community groups and law enforcement agencies to sign up for an FBI course on hate crimes. This course, developed by the FBI and the Department of Justice’s Civil Rights Division, clearly defines the criteria for hate crimes and provides insight into FBI hate crimes investigations. There is no charge for this class, and our previous trainings hosted throughout Arkansas are consistently well-received by course participants. Our presentation seeks to reduce civil rights abuses and promote cooperation between law enforcement agencies and the communities they serve.

The FBI is the primary federal agency responsible for investigating allegations regarding violations of federal civil rights statutes. These laws are designed to protect the civil rights of all persons—citizens and non-citizens alike—within U.S. territory. Using cutting-edge investigative and intelligence capabilities, the FBI works closely with its partners to prevent and address hate crimes, color of law violations, and other civil rights offenses.

If you are a community leader or law enforcement executive, we urge you to contact the FBI and schedule a hate crimes presentation for your organization. Our presentation typically runs for two hours and is conducted by veteran FBI agents who are skilled investigators of federal civil rights violations. This training is interactive and encourages audience members to share thoughts and perspectives about real-world case studies. To schedule a training, please call the FBI Little Rock Field Office at 501-221-9100 and ask for the Community Outreach Specialist.

FBI Releases 2020 Internet Crime Report

Source: Federal Bureau of Investigation (FBI) State Crime News

Alaska Report Shows Increase in Reported Scams; FBI Urges Online Safety Habits

ANCHORAGE, AK—The FBI’s Internet Crime Complaint Center (IC3) has released its annual report, which includes information from 791,790 complaints of suspected Internet crime—an increase of more than 300,000 complaints from 2019—and reported losses exceeding $4.2 billion. Notably, 2020 saw the emergence of scams exploiting the COVID-19 pandemic. The IC3 received over 28,500 complaints related to COVID-19, with fraudsters targeting both businesses and individuals.

The accompanying state report for Alaska showed nearly 2,300 victims in Alaska filed complaints of suspected Internet crime to IC3, and reported losses exceeding $6 million, which disproportionately affected Alaska’s senior population. In Alaska, the top three crimes reported by victims were IPR/copyright and counterfeit, extortion, and non-payment/non-delivery scams; however, victims lost the most money to business email compromise scams, romance scams, and tech support scams. These scams are described as:

  • IPR / Copyright and Counterfeit: Fraud involving the theft of trade secrets and counterfeit goods that threaten public health and safety.
  • Extortion: Unlawful extraction of money or property through intimidation or undue exercise of authority. It may include threats of physical harm, criminal prosecution, or public exposure.
  • Non-Payment / Non-Delivery: In non-payment situations, goods and services are shipped, but payment is never rendered. In non-delivery situations, payment is sent, but goods and services are never received.
  • Business Email Compromise / e-mail Account Compromise: BEC is a scam targeting businesses (not individuals) working with foreign suppliers and/or businesses regularly performing wire transfer payments. EAC is a similar scam that targets individuals. These sophisticated scams are carried out by fraudsters compromising email accounts through social engineering or computer intrusion techniques to conduct unauthorized transfer of funds.
  • Romance Scams: Most often through social media or dating sites, a victim believes they are in a relationship (family, friendly, or romantic) and are tricked into sending money, personal, and financial information, or items of value to the perpetrator or to launder money or items to assist the perpetrator.
  • Tech Support Scams: Criminals pose as technology support representatives and offer to fix non-existent computer issues. The scammers gain remote access to victims’ devices and sensitive information.

To protect yourself from falling victim to common fraud schemes, be wary of answering phone calls from numbers you do not recognize. Do not send money or gift cards to anybody that you do not personally know and trust. Never give out your personally identifiable information over the phone or to individuals you do not know.

In some schemes, like government impersonation scams, criminals pose as government employees calling from a spoofed number and will threaten to arrest or prosecute victims unless they agree to provide funds, gift cards, or obtain personal identifiable information. These calls are fraudulent; no legitimate law enforcement officer will make unsolicited calls demanding payment, gift cards, or personally identifiable information from a member of the public.

The FBI wants to remind the public to immediately report suspected criminal Internet activity to the IC3 at ic3.gov. By reporting Internet crime, victims are not only alerting law enforcement to the activity, but also aiding in the overall fight against cyber crime.

Additional Resources:

Stopping Public Corruption

Source: Federal Bureau of Investigation FBI Crime News

“The exact thing he was getting paid to prevent by the taxpayers of Philadelphia, he was doing himself,” said Special Agent Brian Coughlin, who investigated this case out of the FBI’s Philadelphia Field Office.

But in 2015, one of Blackwell’s bribery “customers” was actually an FBI confidential source. The source captured Blackwell on tape promising a city permit for a dumpster in exchange for $3,000. The source gave Blackwell $1,700 upfront. He followed up with texts to the source demanding the remaining money—which provided additional evidence in the case.

He never actually provided any service to those who paid him, but simply the offer of a benefit in exchange for a bribe is a crime, Coughlin explained.

“Blackwell took people’s money with the promise of doing things and didn’t do them,” Coughlin said.

InfraGard Marks 25 Years of Protecting the Country’s Critical Infrastructure

Source: Federal Bureau of Investigation FBI Crime News

In 1996, a small group of private sector and government officials began working with the FBI’s Cleveland Field Office to help identify cyber threats to the country. The FBI passed along what we knew about cyber intrusions and crime trends to our partners to help them secure their facilities and computer networks. And our partners, in turn, shared their information technology expertise and information they had on possible cyber crimes.

The group became known as InfraGard because of its focus on protecting critical infrastructure components—like utility companies, transportation systems, telecommunication networks, water and food suppliers, public health, and financial services.

The original program proved so successful that we replicated it nationally. And just as the cyber threat has evolved over the last 25 years, so has InfraGard.

Today, InfraGard—managed by the FBI’s Office of Private Sector—has grown to more than 75,000 members representing the private sector, government, and academia. InfraGard has expanded its initial focus on cyber crime to include terrorism, intelligence, criminal, and security matters.

So while the threat is more complex today, the mission remains the same. InfraGard helps the FBI protect the country’s critical infrastructure sectors through partnerships.

InfraGard participants share information, intelligence, training, best practices, and more through a member website and through more than 70 regional chapters, each having a relationship with a local FBI field office.