It is yet another example of how social media can be dangerous for young people. Recently, a Houston man was sentenced to 40 years in prison on child sex trafficking charges after identifying and ...
Sex Trafficker Receives 40-Year Sentence
It is yet another example of how social media can be dangerous for young people. Recently, a Houston man was sentenced to 40 years in prison on child sex trafficking charges after identifying and contacting young girls through social media platforms and then luring them into prostitution.
During National Cyber Security Awareness Month, we’d like to call your attention to the nearly 30 individuals currently featured on the Cyber’s Most Wanted section of the FBI’s public website in the ...
Cyber’s Most Wanted: We Need Your Help
They are wanted on a variety of charges—like installing insidious malware on unsuspecting victims’ computers, hacking into company networks and stealing trade secrets and user identity data, selling fraudulent computer security programs and other bogus software, manufacturing spyware to intercept private communications, and illegally accessing financial accounts and stealing the funds. But these individual criminals all have one thing in common—they are fugitives from justice who are currently featured on the Cyber’s Most Wanted section of the FBI’s public website.
And during National Cyber Security Awareness Month, we’d like to call your attention to these nearly 30 individuals in the hope that someone, somewhere, has information that could lead to their apprehension.
Among the FBI’s wanted cyber fugitives are:
- Five members of China’s People’s Liberation Army indicted on charges of illegally penetrating the networks of six U.S. companies and stealing proprietary information, including trade secrets;
- The Russian administrator and other co-conspirators wanted in connection with an alleged scheme to install the Zeus malware on unsuspecting victims’ computers and capture bank account numbers, passwords, personal identification numbers, and other information needed to log into online bank accounts and make unauthorized transfers;
- A New York-born man allegedly responsible for stealing the identities of 40,000 people and then using the stolen information to siphon funds from their brokerage or bank accounts and purchase expensive electronic items with their credit;
- Two Pakistani nationals wanted for their alleged involvement in an international telecommunications scheme that defrauded unsuspecting individuals, companies, and government entities in both the United States and abroad out of more than $50 million by compromising business telephone systems; and
- An El Salvadoran national allegedly involved in manufacturing spyware which was used to intercept the private communications of hundreds, if not thousands, of victims.
The FBI’s Most Wanted program is best known for its Ten Most Wanted Fugitives list, which was established more than 60 years ago and has become a symbol of the FBI’s crime-fighting ability around the world. But the Bureau highlights other wanted fugitives as well—terrorists, white-collar criminals, and increasingly, those who commit cyber crimes.
So take a look at our Cyber’s Most Wanted webpage, and if you have any information concerning any of these individuals—or any FBI wanted fugitive—please contact your nearest FBI office or nearest American Embassy or Consulate.
A new study for the FBI’s National Center for the Analysis of Violent Crime focuses on a key aspect of serial murder cases: how and where the victims’ bodies are discovered and what that says about ...
New Research Aims to Help Investigators Solve Serial Murder Cases
A new study for the FBI’s National Center for the Analysis of Violent Crime focuses on a key aspect of serial murder cases: how and where the victims’ bodies are discovered and what that says about the killers.
The study, Serial Murder: Pathways for Investigations, is an analysis of details from hundreds of serial murder cases to help investigators better understand these terrible crimes—and be better equipped to solve them.
“What we tried to do was give investigators working these cases a common place to start, which is the body,” said Bob Morton, a recently retired special agent formerly with our Behavioral Analysis Unit. “You work your way back from there to discern offender characteristics and narrow the suspect pool. The body is the only constant in the crime,” he explained. “Lots of other things can change, but how you find that victim is not going to change.”
If the victim was a prostitute, for example, and the body was left where the murder occurred, that may offer certain clues about the killer. If the body was hidden at a distance from the murder site, that may offer different clues. The study’s statistical data was drawn from 480 U.S. serial murder cases involving 92 offenders over a period of nearly five decades. Morton believes the study’s findings could be a “game changer” for investigators working unsolved cases.
It’s a historical moment that brings us back 80 years—the end of the manhunt for America’s so-called Public Enemy Number One, John Dillinger. It’s also the subject of this week’s Gotcha podcast, ...
The Brady Gang, Part 1
It’s a historical moment that brings us back 80 years—the end of the manhunt for America’s so-called Public Enemy Number One, John Dillinger. It’s also the subject of this week’s Gotcha podcast, which features closed FBI cases.
|Listen to Gotcha|
Dillinger and his gang made headlines in the Gangster Era for their murders, bank robberies, and other crimes. One fateful night in 1934, agents gunned down Dillinger outside of a Chicago movie theater as the outlaw reached for his gun.
With Dillinger dead, a new gang of bad guys looking to make a name for themselves came onto the scene.
"One urban legend has it that they said, 'We're going to make the Dillinger gang look like pikers.'" said FBI Historian Dr. John Fox.
Alfred Brady, James Dalhover, and Clarence Shaffer formed the Brady gang.
Their goal was to enrich themselves," Fox said. "They wanted money to live an easy life and didn't want to work at it and were happy to rob whoever they could.
Did the Brady gang give Dillinger’s gang a run for their stolen money? On the next Gotcha, hear more from the FBI historian.
The FBI is asking for the public’s help identifying individuals who have traveled—or are planning to travel—overseas to engage in combat alongside terrorist organizations. The FBI is also seeking ...
Help Identify Individuals Traveling Overseas for Combat
|Do you recognize this man? This segment of a 55-minute ISIL propaganda video features an English-speaking man with what is believed to be a North American accent. |
The FBI is asking for the public’s help identifying individuals who have traveled—or are planning to travel—overseas to engage in combat alongside terrorist organizations.
The FBI is also seeking information about the identity of an English-speaking individual and others seen in a propaganda video released last month by the group calling itself the Islamic State of Iraq and the Levant, or ISIL.
A form for submitting potential tips and leads has been established at www.fbi.gov/ISILtips.
During National Cyber Security Awareness Month, we’d like to take the opportunity to remind everyone that the best way to report Internet-related crimes—which often involve false or fraudulent claims ...
IC3: The Front Door for Reporting Internet Crime
During National Cyber Security Awareness Month, we’d like to take the opportunity to remind everyone that the best way to report Internet-related crimes—which often involve false or fraudulent claims to consumers—is to file a complaint with the Internet Crime Complaint Center (IC3).
IC3, now in its 15th year of operation, is a partnership between the FBI and the National White Collar Crime Center. Submissions to this central hub for Internet-related crime complaints can not only lead to culprits getting caught but also help identify regional, national, or international trends to educate the public about constantly evolving cyber threats and scams.
Once a complaint is filed, it goes into IC3’s extensive database, where it’s reviewed by analysts who use automated matching systems to identify links and commonalities with other complaints. These groups of similar complaints are then referred to the appropriate local, state, federal, tribal, or even international law enforcement agency for potential investigation.
All complaints filed through IC3 are helpful in identifying trends—posted publicly on IC3’s website at www.ic3.gov—and building statistical reports for law enforcement and regulatory agencies that substantiate criminal activity within those agencies’ area of jurisdiction.
So if you think you’ve been victimized online—whether or not you actually lost money—IC3 wants to hear from you.
Every October since 2004, National Cyber Security Awareness Month—administered by the Department of Homeland Security (DHS)—reminds us of the importance of protecting not only our individual ...
National Cyber Security Awareness Month
Every October since 2004, National Cyber Security Awareness Month—administered by the Department of Homeland Security (DHS)—reminds us of the importance of protecting not only our individual identities, finances, and privacy but also our country’s national security, critical infrastructure, and economy. Cyber security is a responsibility shared by all—the public sector, the private sector, and the general public.
A 44-year-old woman who allegedly kidnapped her 4-year-old daughter in Texas in 2002 was captured in Mexico City and deported last night to the U.S. The girl, now 17, was safely recovered in Mexico ...
12-Year Fugitive Wanted for Parental Kidnapping Captured in Mexico
|Dara Llorens was a fugitive for 12 years.
A 44-year-old woman who allegedly kidnapped her 4-year-old daughter in Texas in 2002 was captured in Mexico City and deported last night to the U.S. The girl, now 17, was safely recovered in Mexico and reunited today with her father in the U.S.
According to charges against her, Dara Marie Llorens failed to return the girl to her father, the girl’s primary guardian, following a scheduled weekend visit in April 2002 that was part of the estranged couple’s court-ordered custody agreement. Investigation revealed Llorens had likely fled the U.S., and in June 2002, a federal arrest warrant was filed charging her with unlawful flight to avoid prosecution.
The FBI and law enforcement agencies around the world investigated the case and followed up on hundreds of leads and tips. The case received extensive media coverage and was profiled by local and national media outlets, appearing twice on “America’s Most Wanted.” By assuming new identities and moving frequently throughout the years, Llorens was able to narrowly evade capture on more than one occasion.
“This case demonstrates the FBI’s undying commitment to work international parental abductions,” said Christopher Combs, special agent in charge of the San Antonio FBI. “If a case remains for two years, or 20 years, we will never give up.”
Combs said the girl was deprived of a relationship with her father and the carefree, happy life of a child. “While we can never get the years back that she and her father lost, we hope that they can start building a future together now,” Combs said.
The arrest and recovery were announced by the San Antonio FBI, the U.S. Marshals Service, and the Austin Police Department. Also involved were the FBI’s legal attaché in Mexico City, the Mexican Federal Police (Policía Federal), and the National Institute of Immigration, Mexico (Instituto Nacional de Migración).
The maker of a smartphone app that could surreptitiously monitor calls, texts, and videos on mobile phones was indicted in Virginia for allegedly conspiring to advertise and sell the spyware ...
FBI Arrests StealthGenie Mobile Spyware App Maker, Disables Website
The maker of a smartphone app that could surreptitiously monitor calls, texts, and videos on mobile phones was indicted in Virginia for allegedly conspiring to advertise and sell the spyware application.
Hammad Akbar, the chief executive officer of Pakistan-based InvoCode Pvt Ltd, the company that advertised and sold StealthGenie online, was arrested in Los Angeles Saturday, September 27. The 31-year-old Pakistani man was charged with conspiracy and sale of a surreptitious interception device. StealthGenie spyware could intercept communications to and from mobile phones and was marketed as largely undetectable and untraceable.
In announcing the charges, officials said the spyware technology could be employed to invade the privacy of unwitting victims. Purchasers of the app would need only a few minutes to download and install it on a victim’s mobile phone for full access to the phone’s communication functions.
“This application allegedly equips potential stalkers and criminals with a means to invade an individual’s confidential communications,” said Andrew McCabe, assistant director of the FBI’s Washington Field Office, which is investigating the case. “They do this not by breaking into their homes or offices, but by physically installing spyware on unwitting victims’ phones and illegally tracking an individual’s every move.”
StealthGenie’s capabilities included recording and intercepting calls and monitoring e-mails, text messages, voicemails, photos, videos, and calendar appointments. The software could also activate a victim’s phone to eavesdrop on conversations within a 15-foot radius. All the communications could be viewed on a web-based dashboard.
The spyware technology was hosted at a data center in Ashburn, Virginia. The FBI temporarily disabled StealthGenie’s website following a federal restraining order issued Friday, September 26.
This is the first-ever criminal case concerning the advertisement and sale of a mobile device spyware app. Marketing for the app targeted people suspicious that their spouses or romantic partners might be cheating on them.
“Apps like StealthGenie are expressly designed for use by stalkers and domestic abusers who want to know every detail of a victim’s life—all without the victim’s knowledge,” said Leslie Caldwell, assistant attorney general of the Justice Department’s Criminal Division.
Determining if your phone contains the spyware can be difficult—the spyware app could be installed to look like another app or file. Possible options include enlisting other apps—or private computer forensics companies—to scan your mobile device for malicious software. In a public service announcement about StealthGenie, the FBI’s Internet Crime Complain Center (IC3) said the best option for people concerned that their mobile phones contain the spyware would be to conduct a “factory reset” of the device, which removes all data and apps and restores the mobile phone to its original condition. Be sure to first back-up the data you want to save.
A reward of up to $100,000 is being offered in exchange for information leading to the arrest and conviction of a suspect who shot and wounded a California police officer after robbing a bank in 2012 ...
Help Us Catch the AK-47 Bandit
|The AK-47 Bandit, who shot and seriously wounded a police officer after his first robbery, has been linked to six banks in four states. Story | Poster|
During what authorities believe was his first bank robbery nearly three years ago in Chino, California, the AK-47 Bandit—so named because he carries an assault rifle during takeover-style robberies—shot and seriously wounded a police officer while making his escape. Since then, he has robbed or attempted to rob five more banks, most recently in August, when he hit a rural bank in Nebraska.
“He has shown he is not afraid to shoot someone, and experience tells us he is not going to stop robbing banks until we catch him,” said Special Agent Kevin Boles, who is working the case out of our Los Angeles Field Office. “We feel like we are racing the clock on this guy,” Boles said. “If we don’t get him soon, things could end badly and someone else might get hurt.”
That’s why we are asking for the public’s help and renewing our publicity campaign regarding this violent criminal. There is a reward of up to $100,000 for information leading to the arrest and conviction of the AK-47 Bandit.