Longtime Indian Country Special Agent Reflects on Essential FBI Mission

Source: Federal Bureau of Investigation FBI Crime News

For Davenport, arriving in the wooded highlands of Arizona 16 years ago was like a dream come true. He grew up in nearby Holcomb; in high school, he played football and wrestled with Native American classmates. He went to Mesa Community College in Phoenix and then Northern Arizona University in Flagstaff, where he studied law.

After a few years as a lawyer, he yearned for more adventure and joined the FBI in 1999. His first assignment was in the Dallas Field Office, where he worked on civil rights and public corruption cases when he wasn’t deployed on SWAT operations. He was then assigned to the resident agency in Pinetop-Lakeside where he was, for a brief period, the only special agent.

Davenport, who is retiring later this year, actively recruits others to experience working on Indian country cases. For many agents, it’s as close as you can get to frontline law enforcement—responding to active crime scenes, interviewing witness and victims and working closely with partners from other law enforcement agencies to build cases. Actively working those cases, Davenport says, helps illuminate why Indian country is as deserving of resources as anywhere else.

“Why should the reservation be overlooked simply because they’re a reservation, or because they don’t have all the amenities that Chicago or L.A. have?” Davenport said. “They’re still people, and they still deserve that same justice that everybody else does.”

FBI Seeks Public Assistance in Locating Missing Montana Child

Source: Federal Bureau of Investigation FBI Crime News

Montana – The FBI is seeking the public’s assistance in locating Sa’Wade Birdinground, a 13-year-old member of the Crow Tribe, who has been missing since October 6, 2024.

There have been no known contacts with her family or friends since she disappeared. Sa’Wade has been described as a quiet, kind and artistic child who likes to laugh. Sa’Wade is well liked by her peers and teachers. She has never run away from home or been in any serious trouble. Her disappearance from home is totally out of character for her, and her family is very concerned about her. A Missing Endangered Person Advisory (MEPA) has been issued by the Montana Department of Justice due to concerns for her safety.

“We are doing everything we can to bring Sa’Wade home safely. The community’s help is crucial at this time, and we urge anyone with information to come forward immediately,” said Jeramie Middlestead, Big Horn County Sheriff. “Sa’Wade’s family is deeply worried, and any information, no matter how small, can make a difference.”

“The FBI is working closely with local law enforcement to find Sa’Wade Birdinground,” said Rhys Williams, Acting Special Agent in Charge of the FBI’s Salt Lake City Division. “We are asking for the public’s assistance in locating her, and we won’t stop until we have answers. If you have any information, please contact us.”

Based on the investigation thus far and the length of time that she has been missing, we are taking this case very seriously and chasing down every lead. Investigators are searching, canvassing multiple neighborhoods, and interviewing members of our community. We urge anyone with information to please call 406-665-9798. Any details, no matter how small, could assist in bringing her home safely.

FBI Personnel Assist in Hurricane Helene Response

Source: Federal Bureau of Investigation FBI Crime News

Special Agents Durant and O’Hare relied heavily on the Mobile Biometrics Application (MBA) and Special Processing Center (SPC) teams to expedite the identification of victims. These specialized units, operating out of the FBI’s Criminal Justice Information Services Division in West Virginia, provided agents in the field with real-time support, often pulling fingerprints and running them through reference files within minutes. In some cases, results were returned in as little as 15 to 20 minutes, streamlining the identification process during critical moments.

The MBA team, in particular, played a vital role by swiftly processing prints, actively monitoring quality control, and troubleshooting more difficult cases. When automated systems didn’t yield a match, the SPC team took over, applying manual processes to assist with identification. This seamless coordination between field agents and the FBI’s lab-based experts highlights the Bureau’s ability to deploy advanced technology in disaster zones, ensuring that victims’ families receive answers as quickly as possible.

While working to bring closure to grieving families, the agents have also felt the storm’s personal impact. O’Hare’s daughter and grandchildren evacuated from North Carolina to stay with her in Upper East Tennessee after being displaced by power loss. “I joined the FBI to help people,” O’Hare said. “In situations like this, that’s why I am doing my very small part to try to provide some closure for the families of the victims.”

As the FBI and its partners work to support communities impacted by Hurricane Helene, the Bureau issued a warning about scammers looking to exploit survivors and mislead charitable donors. Learn to spot the red flags of disaster fraud at fbi.gov/DisasterFraud.

Director Wray’s Remarks at the 2024 Aspen Cyber Summit

Source: Federal Bureau of Investigation FBI Crime News

Together, we’re working around the clock to investigate this.

And now I’d like to get into those cyber issues I promised to discuss this morning.

For three-quarters of a century, the Aspen Institute has helped leaders throughout industry, academia, and government identify not just the greatest challenges we face, but opportunities we have to join forces to overcome them.

And while the cyber threats I want to discuss here weren’t even the stuff of science fiction 75 years ago, ultimately, today’s threats still boil down to an age-old conflict: the conflict between good and evil, between the rule of law and the criminals and foreign adversaries who seek to harm our people, our organizations, and our businesses.

And, unfortunately, then and now, there’s no shortage of bad guys out there looking for ways to hurt us.

So, where does that leave us?  

It’s almost inevitable that your organization will be the victim of a cyberattack. And, when that happens, working with the FBI can help you navigate what otherwise might be an incredibly costly ordeal.

And to be clear—in many cases that may even mean saving your organization money—just how much I’ll get into in a few minutes.

Working with us can also save you precious time, helping you reconstitute your operations faster, and may keep not just your organization—but the American people themselves—safe from future attacks 
 
Focusing on victims 

It’s no secret that the volume of cyber incidents has increased exponentially.

Cybercriminals and nation-state hackers, alike, have demonstrated they’re not only willing, but more and more able, to hit the services people really cannot live without: things like hospitals and schools, utility companies and transportation providers.

Between 2021 and 2024, 15 of our country’s 16 critical infrastructure sectors—sectors like telecommunications, energy, emergency services—fell victim to ransomware, and that’s just ransomware.

Because those services are so essential, criminals and hackers backed by nation-states know they can score big by: 

  1. Locking up your data until you pay an outrageous ransom;
  2. Conducting what we call double extortion: stealing your data and threatening to release it—or sell it to the highest bidder; and
  3. Conducting triple extortion by preventing access to your website through denial-of-service attacks—or by harassing or threatening your organization’s employees and executives.

So, given the ubiquity and the severity of the cyber threat, more and more, it can sometimes seem like the odds are stacked against us.

Mindful of this evolving landscape, four years ago, I announced a new strategy to drive the FBI’s cyber work.

The cornerstone of that strategy is our unwavering support for victims—everyone from private citizens targeted by fraudsters to billion-dollar corporations suffering data breaches.

That means our mission revolves around you: using every piece of intelligence available to us to help keep your organizations—and others like them—safe from future attacks, and working with you when a cyberattack does occur to help you minimize your losses and get up and running again.

Now, depending on the circumstances, the work we do can vary from victim to victim.

And we believe in using every tool we’ve got to make life harder for our adversaries.

For example, when an attack happens, we can deploy one of our FBI Cyber Action Teams. These are elite specialty groups that can deploy around the world in a matter of hours to respond to cyberattacks onsite.

That’s what we did last year, for instance, when a telecommunications company found suspicious behavior on their network and asked for our help.

Our team was able to identify malicious activity associated with Volt Typhoon—a group of hackers sponsored by the Government of China. They’d been hiding inside the network, lying in wait. Fortunately, our Cyber Action Team gave the company the information they needed to mitigate the compromise across their system. And when we discovered Volt Typhoon was also using a botnet made up of hundreds of compromised, privately owned routers to conceal their activity—and the fact that it was being directed by China—we conducted a court-authorized operation that not only severed their connection to the botnet, but also prevented re-infection of those victim devices.

Volt Typhoon is just one facet of a broader campaign by the Chinese government to infiltrate U.S. infrastructure, co-opt devices in your organizations—and, frankly, a whole lot of homes—and use them to target us and our allies.

Today, for the first time, we’re able to publicly speak about a second joint, sequenced operation that we conducted last week as part of our ongoing efforts to take China’s botnets offline. This botnet was run by a different group of hackers, again working at the direction of the Chinese government.

Known as Flax Typhoon, they represent themselves as an information security company—the Integrity Technology Group. But their chairman has publicly admitted that for years his company has collected intelligence and performed reconnaissance for Chinese government security agencies.

Flax Typhoon was targeting critical infrastructure across the U.S. and overseas, everyone from corporations and media organizations to universities and government agencies.

And, like Volt Typhoon, they used internet-connected devices—this time hundreds of thousands of them—to create a botnet that helped them compromise systems and exfiltrate confidential data. But, unlike Volt Typhoon, they targeted more than just routers. Flax Typhoon hijacked Internet of Things devices like cameras, video recorders, and storage devices—things typically found across big and small organizations—and about half of those hijacked devices were located here in the U.S. 

Flax Typhoon’s actions caused real harm to its victims, who had to devote precious time to clean up the mess when they discovered the malware. One organization in California, for instance, suffered an all-hands-on-deck cybersecurity incident, and IT [information technology] staff needed to work long hours to remediate the threats and replace hardware—all of which took swaths of the organization offline and caused a significant financial loss.

But, working in collaboration with our partners, we executed court-authorized operations to take control of the botnet’s infrastructure. When the bad guys realized what was happening, they tried to migrate their bots to new servers and even conducted a DDOS [distributed denial-of-service] attack against us. Working with our partners, we were able to not only mitigate their attack, but also identify their new infrastructure in a matter of hours. At that point, as we began pivoting to their new servers, we think the bad guys realized that it was the FBI and our partners that they were up against. And, with that realization, they burned down their new infrastructure and abandoned their botnet.

Ultimately, as part of this operation, we were able to identify thousands of infected devices, and, then, with court authorization, issued commands to remove the malware from them, prying them from China’s grip.

Now, this was another successful disruption, but make no mistake: It’s just one round in a much longer fight.

The Chinese government is going to continue to target your organizations and our critical infrastructure—either by their own hand or concealed through their proxies. And we’ll continue to work with our partners to identify their malicious activity, disrupt their hacking campaigns, and bring them to light.

Of course, we’re also working hard to provide your organizations with information to proactively build resilience and defend yourselves before an attack even happens.

That was the case earlier this year, when we joined our partners to warn the private sector about a group of pro-Russian hacktivists, cybercriminals using a particular known vulnerability to compromise operational technology networks. They had set their sights across our critical infrastructure—from dams and wastewater systems to the energy, food, and agriculture sectors. And, after we sounded the alarm, we heard from our partners throughout industry. Because of the advisory we’d issued, they were able to prioritize fixing that specific vulnerability, keeping their companies—and the American public—safe.

When we learn of a potential attack—through our intelligence collection or our global partnerships—we’re focused on working with you to stop criminals and foreign adversaries before they can cripple your networks, like we did in 2022 to protect a major American political party’s networks. Through information collected using our FISA Section 702 authorities, we learned hostile nation-state actors were just days away from conducting a cyberattack. So, working together with the targeted organization, we denied that adversary’s access and prevented any damage.

And, as you saw from our announcement last month regarding Iran, foreign targeting of our political parties remains a serious concern.

Saving organizations money 

Now, hardening systems, fixing vulnerabilities, mitigating network compromise—that’s all essential.

But, what happens if—or, maybe, when—your organization finds itself the victim of a ransomware attack you cannot defend against, and you’re faced with the prospect of shelling out millions of dollars—or even hundreds of millions—to unlock your network and free your data? 

Well, the Bureau can help there, too.

And, in fact, the kind of help we provide sets us apart from every other agency on the planet.

Because victims are our highest priority, we’re constantly hard at work developing decryption capabilities to combat known ransomware variants. And when we’ve got them, we put them to very good use.

I’m extremely proud to report that in just the past two years, the FBI has handed out nearly 1,000 decryptors, and we’ve saved victims around the world something like $800 million dollars in ransom payments.

Let me repeat that: Partnering with the FBI saved ransomware victims around $800 million in the span of just two years, and that’s just the money saved in ransoms not paid. It does not include the almost incalculable savings by organizations not paralyzed by an attack, operations not suspended with systems and data taken offline.

And that $800 million saved? That could have been even more. 

What do I mean by that? 

Before we can use many decryptors, we need to know who the victims actually are—whose data each of these unique keys unlocks.

So, if your organization gets hit by ransomware and tries to go it alone? We might not be able to make that match—and we might not be able to save you that ransom payment.

Now, it’s been more than seven years since I was working in the private sector, but I think I still understand the importance of profit to a business, so let me say this as plainly as I can: If you’re a victim of ransomware, call the FBI right away, because together, we can try to save your money.

Saving organizations time 

But money’s not the only thing the Bureau can help you save.

When you’re the victim of a cyberattack, every second counts, and involving the FBI right from the outset can save your organization precious time when it matters most.

In fact, an IBM study last year proved exactly that.

The lifecycle of the average data breach is 33 days longer when the victim organization does not involve law enforcement in their response.

Can you afford an extra 33 days of downtime after a cyberattack? 

Consider, for example, the case of the Los Angeles Unified School District. It’s the nation’s second-largest school district, with 600,000 students and 100,000 employees. Two years ago, they were hit by a ransomware attack over Labor Day weekend and immediately called the FBI. We had our experts onsite within an hour, and, by the end of the weekend, we’d helped them halt the ransomware, turn their network back on, and restore priority systems—all without paying the hackers a cent and without losing a single day of operations.

Or what about the U.S. cancer treatment center that was the target of a ransomware attack last summer? Hackers had encrypted the center’s systems and data, leaving scores of patients without access to critical medical care. It’s hard to think of a case when the criminals were more callous—or when getting back online fast mattered more. Fortunately, the center engaged with the FBI fully, right from the start. And, in addition to investigators and technical experts, we also deployed crisis negotiators.

So, while we were busy working with our partners to provide indicators of compromise and share information about the hackers’ tactics and procedures, we were also helping the center negotiate the ransom payment, getting it from $450,000 down to $50,000. Using the decryption key the hackers then provided, the center was able to resume operations—just four days after the attack. In that instance, not only was it time-saving to work with the Bureau. According to the victim cancer center, it was also life-saving.

Saving organizations from becoming victims in the future  

But the value you’ll find in working with the FBI is more than just time and money.

The FBI has a suite of unique authorities and capabilities that are key to stopping and preventing attacks and essential to our work with victims before, during, and after they’re hit.

One particularly critical authority is Rule 41, which I know many of you are familiar with. It allows law enforcement to seize “instrumentalities of a crime.”

Think malware that’s been secretly installed on victim networks.

With Rule 41 search and seizure warrants, we can combat illicit cyber activity that spans multiple states, seizing the bad guys’ domains and servers, removing malware and webshells, or conducting operations to kick adversaries out of our systems. 

In the case of Volt Typhoon and Flax Typhoon, we could not have protected our nation’s critical infrastructure—your networks—without our Rule 41 authorities and the help of our partners in the private sector. In many of these cases, it’s the private sector that helps us identify the threat actors and understand those critical technical details. And, in some cases, we’re able to work with private sector companies and our government partners to develop mitigation measures, helping shut the doors the bad guys have propped open.

For us to continue to successfully execute our Rule 41 operations, information and intelligence sharing is critical because, bottom line: The FBI, our government partners, and the private sector each tend to have a piece of the puzzle, and everyone has to share their piece to complete the picture to help us impose the greatest possible cost on our adversaries.That’s how essential all of you are in our nation’s cybersecurity.

And we need you to keep playing a role in this space, because the threat is only going to get more severe as adversaries like China, Russia, and Iran turn to AI [artificial intelligence] to infiltrate our networks and steal our information. We’re going to need all the help we can get.

Conclusion 

The mission of the FBI always has—and always will—prioritize victims.

Working to keep people and organizations safe, providing the assistance they need in the aftermath of a crime: That’s what we do.  

And if the criminals and hostile nation-states behind today’s cyber threats had their way, everybody would be a victim—not just you and your networks, data, and livelihoods; but all Americans and the essential services they depend on.

So, if there’s only one thing you take away from my time here today, I hope it’s this: The FBI needs and wants to work with you. Let us save you money, save you time, and save you from future attacks so that you can keep your organization’s focus where it should be: on your operations, and—together—we can help keep our nation safe.

Thank you.

FBI Miami Special Agent in Charge Jeffrey Veltri’s Updates to the West Palm Beach, Florida, Assassination Attempt Investigation

Source: Federal Bureau of Investigation FBI Crime News

Good afternoon. For quick introduction, my name is Jeffrey Veltri, and I am the special agent in charge of the FBI’s Miami Field Office.  
 
The FBI immediately responded to the scene here in West Palm Beach, Florida, and we are investigating this matter as an apparent assassination attempt on former President Trump.  

We view this as extremely serious and are determined to provide answers as to what led up to the events that took place.  
 
I want to emphasize we are just a little over 24 hours into this investigation, so we are going to provide as much as we can publicly while our investigation is ongoing. We must also stress the U.S. attorney’s office is pursuing charges, and that limits some details we can publicly disclose. 
 
Arrest 

Yesterday afternoon, Martin County Sheriff’s Office took custody of Ryan Routh, and he was transported back to Palm Beach County Sheriff’s Office. Our FBI agents then attempted to interview him, and he invoked his right to an attorney. 
 
FBI’s law enforcement activities  

In the last 24 hours, the FBI and our partners have been dedicated to investigating the incident and utilizing all available resources. These efforts have included:  

  • DOJ and USAO engagement: Our investigative team and the USAO’s for the Southern District of Florida and DOJ’s National Security Division are actively working hand-in-hand to pursue and subsequently execute several warrants. Thus far, the warrants include a video recording device, subject’s cellular devices, vehicle, and other electronic devices located at previous known residences.  
  • Interviews: We are coordinating with United States Secret Service to complete the interviews of numerous agents. We have also interviewed seven civilian witnesses at the scene. That is just the beginning. FBI’s Honolulu and Charlotte Field Offices have initiated the interviews of several family members, friends, and former colleagues of the subject. 
     
  • FBI deployed several specialty teams and assets from FBI Headquarters and Quantico’s Lab Division, to include evidence and critical incident response personnel.  
  • Evidence Response Team is collecting and processing multiple evidentiary items. These range from the rifle—which is a SKS model with a scope and obliterated serial numbers—two bags, the subject’s electronics, and what appears to be ceramic tiles. DNA has also been collected from those items, which are being sent to Quantico for testing. We will also process Routh’s vehicle for evidence.
     
  • Cellular Analysis Survey Team conducted thorough analysis of the subject’s cellular device’s location. The CAST analysis aligns with the witness’ account of the subject’s presence at the scene both before and around the time of the incident on September 15. More specifically, we are continuing to conduct analysis and will be compiling the subject’s movements in the days and months leading up to September 15. Cellular data shows the subject was in the vicinity of the golf course roughly 12 hours before the engagement with the U.S Secret Service. 
  • Our investigative teams conducted a neighborhood canvas in an effort to collect and obtain relevant video footage.  
  • The subject had an active online presence, and we are going through what he posted and any searches conducted online. In addition, we are going through media reports and public statements he made that he wanted to recruit Afghan soldiers and others to fight for Ukraine. 
  • The FBI has sent multiple requests to companies for returns on the subject’s phone and social media accounts. We received several returns and are waiting on additional responses from other companies as well. Our investigative team is completing analyses of the returns and actioning leads as needed; we anticipate continuing until the FBI knows the full totality of the subject’s social media presence.  
  • Law enforcement holdings and history: In 2002, the subject was charged and convicted in North Carolina for possession of a weapon of mass destruction. Law enforcement checks also revealed that from 1997 to 2010, the subject had numerous felony charges for stolen goods.  I can also share with you that he was the subject of a previously closed 2019 tip to the FBI where it was alleged he was a felon in possession of a firearm. In following up on the tip, the alleged complainant was interviewed and did not verify providing the initial information. The FBI passed the information to local law enforcement in Honolulu.  

Law enforcement coordination

On behalf of the FBI, I would like to thank Palm Beach County Sheriff’s Office and Martin County Sheriff’s Office for their incredible work in actioning the witness’ information and rapidly apprehending the subject. 
 
I would also like to thank the United States Secret Service; the USAO Southern District of Florida; Department of Justice’s National Security Division; Bureau of Alcohol, Tobacco, Firearms, and Explosives; and our FBI field offices, Honolulu and Charlotte, who have been conducting additional law enforcement activity related to the subject.  
 
Your continued partnerships have been invaluable.  
 
Call to action 
 
Oftentimes in law enforcement, we tell our citizens to be vigilant and aware of their surroundings. Yesterday, a citizen provided remarkable assistance, which led to the arrest of the subject.  
 
We appreciate the public’s diligence in passing potential tips and important information regarding the subject and this incident to the FBI.  
 
If you have any information, please call 1-800-CALL-FBI or go online to tips.fbi.gov.

2023 Cryptocurrency Fraud Report Released

Source: Federal Bureau of Investigation FBI Crime News

Losses related to cryptocurrency fraud totaled over $5.6 billion in 2023, a 45% increase in losses since 2022, according to a report from FBI’s Internet Crime Complaint Center (IC3) published on September 9, 2024. The number of complaints from the public regarding cryptocurrency fraud continues to steadily increase, reaching 69,000 in 2023.

Cryptocurrency is a type of digital currency that you can use to buy goods or services or to invest. Examples of cryptocurrencies include bitcoin, ether, or tether. As the use of cryptocurrency in the global financial system continues to grow, criminals are increasingly using cryptocurrency due to its decentralized nature, the speed of irreversible transactions, and the ability to transfer value around the world. Using cryptocurrency also makes it harder for victims to recover stolen funds. Once an individual sends a payment, the recipient owns the cryptocurrency. Recipients often quickly transfer that digital currency into an account overseas for cashout purposes.

Criminals can exploit cryptocurrencies in many types of criminal schemes. In 2023, most cryptocurrency complaints involved investment scams. These losses totaled $3.9 billion and accounted for almost 71% of all losses related to cryptocurrency in 2023. Other examples of scams associated with cryptocurrency include tech support, confidence and romance, and government impersonation scams.   

Cryptocurrency investment fraud is the most common type of cryptocurrency scam. In this type of fraud, criminals use various means of manipulation to convince victims to deposit increasing amounts of money into financial “investments” using cryptocurrency. In truth, these investments are fake; criminal actors who are usually located overseas control—and ultimately steal—all victim money. As a result, victims typically lose everything they invested.

Losses from cryptocurrency-related investment fraud schemes reported to the IC3 rose from $2.57 billion in 2022 to $3.96 billion in 2023‚a 53% increase. Many individuals have accumulated massive debt to cover losses from these fraudulent investments.

Individuals aged 30-39 and 40-49 filed the most complaints related to cryptocurrency investment fraud (approximately 5,200 reports in each age group). But complainants over the age of 60 reported the highest losses (over $1.24 billion).

Learn more about the process behind cryptocurrency investment fraud 

The FBI, along with the Department of Justice, law enforcement, regulatory agencies, and financial institution partners, is dedicated to identifying the perpetrators of these schemes and bringing them to justice.

The FBI’s IC3 is the central intake hub for individuals in the U.S. or abroad to report fraud and cybercrime. The IC3 analyzes complaints and aggregates them to identify trends and help develop strategies to combat these schemes and protect scam victims from loss. IC3 also shares the complaints it receives with FBI field offices, other law enforcement agencies, and regulatory entities for further investigation or action, as appropriate.

In February 2022, the FBI formed the Virtual Assets Unit (VAU), a specialized team dedicated to investigating cryptocurrency-related crimes. The VAU centralizes the FBI’s cryptocurrency expertise into one nerve center, providing technological equipment, blockchain analysis, virtual asset seizure training, and other sophisticated training for FBI personnel. 

Director Wray’s Remarks at U.S. Department of Justice Election Threats Task Force Meeting

Source: Federal Bureau of Investigation FBI Crime News

Thank you, Attorney General [Merrick B.] Garland and Deputy Attorney General [Lisa] Monaco, for bringing the task force together for this meeting.

I know this group is busy year-round working with our partners—especially our brothers and sisters in state and local law enforcement who are often the first line of defense in protecting election workers from violence and threats of violence. And, as we get closer and closer to Election Day, we’ll continue to step up our collective efforts to protect those charged with ensuring our elections run smoothly.

As I’ve said before, election workers—many of whom are volunteers, and all of whom are public servants—are the lifeblood of our elections, and we’re committed to ensuring that threats directed at election workers receive the swift and thorough response they deserve.

Of course, our commitment to protecting elections and Americans’ right to vote extends to an even broader array of threats—threats the FBI, as both a law enforcement and intelligence agency, will continue to work 24/7 to uncover and disrupt. That means aggressively combatting attempts by foreign adversaries to undermine confidence in U.S. elections, sow discord, and damage our democratic institutions.

The actions announced today focus on Russia, but Russia is by no means the only adversary we’ve seen try to meddle in our society and democratic processes. Just last month, for instance, the FBI—working with the broader [U.S.] Intelligence Community and CISA [the Cybersecurity and Infrastructure Security Agency]—called out Iran for targeting and attempting to compromise former President [Donald] Trump’s campaign.

And we continue to keep a close eye on China’s efforts to denigrate down-ballot candidates it sees as a threat, and on their broader efforts to sow discord.

Whether it’s China, Iran, Russia, or some other country, attempts to meddle in our elections or destabilize our free and open society represent attacks on our democracy. And as long as foreign adversaries keep engaging in these hostile influence campaigns, they’re going to keep running into the FBI.

Today, we’re exposing two illegal Russian covert influence operations targeting the American public.

The first was run by RT, formerly known as “Russia Today.”

For years, the Russian government has used RT to seed and amplify their propaganda narratives around the world. And while RT America suspended its official operations in the U.S. in early 2022, our investigation revealed that, since at least last year, RT has used people living and working inside the U.S. to facilitate contracts with American media figures to create and disseminate Russian propaganda here.

The content was pitched as legitimate, independent news, when in fact, much of it was created in Russia by RT employees who work for the Russian government.

The second operation reveals even more malign activities by companies working under the direction and control of the Russian government—companies that created media websites to trick Americans into unwittingly consuming Russian propaganda.

Today’s announcement exposes those companies and their influence operations—operations that relied on AI [artificial-intelligence]-generated content, influencers, and paid social media advertisements to drive internet traffic to their sites and target Americans with disinformation.

As of noon today, we’ve seized those sites, rendered them inoperable, and made clear to the world what they are: Russian attempts to interfere in our elections and influence our society.

As the lead agency for investigating threats to U.S. elections, the FBI is focused on ensuring our laws are respected and enforced. And when we learn that adversaries overseas are trying to hide who they are and where their propaganda is coming from as part of campaigns to deliberately sow discord, we will continue do everything we can to expose their hidden hand and disrupt their efforts.

I’ll close by saying “thank you,” again, to everyone on the task force for the support you’re providing us, and for everything you’re doing to instill confidence in our elections and ensure they’re conducted in a way that’s safe, fair, and legitimate for the American people.

Thank you.

FBI Pittsburgh Special Agent in Charge’s Remarks to Media on Updates to the Butler, Pennsylvania, Assassination Attempt Investigation

Source: Federal Bureau of Investigation FBI Crime News

Remarks as prepared for delivery

Opening Remarks

Thank you EAD [Executive Assistant Director Robert R.] Wells.

My name is Kevin Rojek. I’m the special agent in charge of the FBI Pittsburgh Field Office. 

The Pittsburgh office continues to lead the investigation into the attempted assassination of former President Donald Trump through the tireless efforts of our agents, intelligence analysts, and professional staff employees.  

We have also received invaluable assistance from countless personnel from several FBI field offices and FBI Headquarters divisions.  

Additionally, I want to acknowledge the incredible partnership with both the Pennsylvania State Police and the U.S. attorney’s office who have worked jointly with us on this investigation since day one.  

Motive and Co-Conspirators 

Since July 13, we have worked diligently towards two goals: 

  • identify the subject’s motive for the attempted assassination; and
  • determine whether he worked with any co-conspirators or conducted this attack alone.  

Regarding motive: Extensive analysis of the subject’s online search history, as well as his specific online activity, has provided us valuable insight into his mindset, but not a definitive motive.  

Regarding co-conspirators: To date, we have not uncovered any credible evidence indicating the subject conspired with anyone else. 

Outside Reviews 

During the last few weeks, the FBI has received numerous requests to support external investigations associated with the attempted assassination, including the independent review panel formed by DHS [Department of Homeland Security] Secretary [Alejandro] Mayorkas, DHS’ Office of Inspector General, as well as the bipartisan congressional task force.  

As EAD Wells stated, the FBI remains committed to transparency in sharing appropriate investigative results with each of these investigative teams and with the American people.  

Scope of Investigation

Regarding the scope of the investigation: First, I want to remind the public that the FBI is responsible for investigating the actions of the subject. 

It is not the FBI’s role to investigate the actions, the security posture, or the responsibilities of the Secret Service or local law enforcement related to the campaign rally. 

To date, we’ve conducted nearly 1,000 interviews, served numerous search warrants, issued dozens of subpoenas, and analyzed hundreds of hours of video footage. 

The Investigation

The FBI continues to follow up on all potential leads in order to refine the timeline of events leading up to the attempted assassination.  

We also remain in contact with the subject’s family members, who have been extremely cooperative with our investigation. 

Online Search Activity

Now, regarding the subject’s online activity, analysis of searches conducted between 2019 and 2024 provided extensive insight into the subject’s mindset and specific research he conducted in preparation for the attack. 

Searches for Campaign Events

In late September 2023, an account connected to the subject was used to search the former president’s campaign schedule and upcoming appearances in Pennsylvania. 

Next, from April of 2024 through July 12, the subject searched campaign events for both former President Trump and President [Joe] Biden, including events scheduled to take place in western Pennsylvania. 

Searches for Butler Event

Specifically on July 4, 2024, the subject searched for details of the former president’s campaign event in Butler. 

On July 6, the subject registered to attend the rally, and that same day, he specifically searched for:

  • “how far was Oswald from Kennedy,”
  • ”where will Trump speak from at Butler Farm Show,”
  • ”Butler Farm Show podium,” and
  • “Butler Farm Show photos.” 

On July 8, the subject searched “AGR International,” on July 9 he searched “ballistic calculator,” and on July 10 he searched “weather in Butler.” 
 
Searches for Biden and Trump:  

In the 30 days prior to the attack, the subject conducted more than 60 searches related to President Biden and former President Trump.  

Of particular note, our investigation identified specific searches conducted on July 5 to include “when is the DNC convention” and “when is the RNC in 2024.” 

Searches related to IEDs: 

Next, regarding the two improvised explosive devices located in the shooter’s vehicle as well as the device found in his bedroom, the subject conducted multiple searches pertaining to explosive devices as early as September 2019 continuing through this summer.  

These searches specifically included:

  • “detonating chord,”
  • “blasting cap,”
  • “how to make a bomb from fertilizer,” and
  • “how do remote detonators work.” 

The subject also searched for ammonium nitrate, nitromethane, and other materials consistent with the manufacturing of explosive devices.  

Explosives: 

Continuing on the topic of the explosive devices located in the subject’s vehicle, the FBI’s Lab determined the components used by the subject were legal to purchase and readily available online. 

Rifle Analysis 

Additionally, regarding the subject’s rifle, the FBI Laboratory Division successfully test fired the weapon, concluding it was—and remains—fully operational. 

They also positively matched all eight shell casings located on the roof with the subject’s rifle. 

Addressing Incorrect Reporting

I would like to take this opportunity to clarify some information.

Encrypted Email Accounts: 
First, regarding the subject’s use of overseas encrypted email accounts. 

We understand these accounts were encrypted. However, the level of encryption was no more sophisticated than any standard, widely used, internet-based email service.  

We successfully accessed the information from these accounts and appropriately analyzed their content. 

However, we continue to identify and exploit the subject’s accounts. 

Release of the Crime Scene 

Second, regarding the release of the crime scene, the FBI did release the crime scene at the Butler Farm grounds, as well as the AGR complex to the property owners in a timely fashion.   

In fact, we released these sites on a rolling basis—but only after completing a thorough processing of each location, exhausting all efforts to collect any items of evidentiary value. 

Prior to releasing each site, we followed all appropriate evidence-gathering procedures and completed the final release of the scene seven days after the attack. 

Cleaning of the Biological Evidence 

Third, regarding the cleaning of the AGR roof, the FBI followed established evidentiary policies and procedures for the return of crime scenes to the property owner. 

This included cleaning the biological material from the AGR roof, only after ensuring we collected all relevant evidence.  

Release Of Subject’s Body 

I would now like to clarify the process undertaken to release the subject’s body to his family. 

After rendering the scene safe and following our established evidence gathering procedures, the FBI contacted the Butler County Coroner’s Office.   

Subsequently, the coroner removed the body from the scene and conducted a death investigation. 

The Butler County Coroner’s Office then deferred to have the Allegheny County Office of the Medical Examiner conduct the autopsy . 

Once Allegheny County completed the autopsy, the Butler County Coroner’s Office consulted with the FBI asking if there were any additional necessary investigative steps with respect to the body.   

The FBI and Pennsylvania State Police then concurred with the Butler County Coroner’s Office decision to release the remains to the subject’s family. 

I want to stress that It is not standard procedure or practice for the FBI or any law enforcement agency to request that the coroner or medical examiner maintain indefinite custody of a deceased subject’s body once the investigative purposes of our agency and our partner agencies are completed. 

Autopsy and Toxicology Results

I would also like to mention that the FBI is now in possession of the subject’s autopsy and toxicology reports from the coroner’s office.  

The autopsy report indicated the subject was pronounced deceased at 6:25 p.m. on July 13, 2024, as a result of a single gunshot wound to the head.

All reviewable evidence collected from the AGR roof and from the subject’s body are consistent with the round fired by the Secret Service sniper.  

Additionally, the toxicology report revealed negative results quote “for alcohol and drugs of abuse.” 

Interviews of First Responders on Night of Incident 

Next, regarding questions surrounding the release of first responders from the shooting scene on the night of July 13. 

We had no reason or intention to hold or detain any first responder, as the law enforcement community assembled in Butler was actively responding to public safety risks and assisting with investigative activity throughout the night.  

The FBI appreciates the monumental local law enforcement response that lasted hours after the attack and continues to this day. 

Our priorities that night—as shared by local law enforcement—were to secure the scene, preserve evidence, and ensure public safety. 
 
Interview of Former President Trump  

As previously reported, the FBI and the Pennsylvania State Police conducted a standard victim interview of former President Trump. 

During this productive interview, agents took the time to provide the former president with an in-depth briefing on the investigation and answered his questions regarding the attempt on his life.  

We’re grateful to the former president for his cooperation and his time. 

Timeline

I will now provide an update to the timeline associated with the subject’s actions prior to the shooting. 

Prior witness interviews indicated the subject was in the area of the AGR building at 4:26 p.m. 

Subsequent digital evidence review shows the subject was in fact near the farm show air strip, walking past a row of vendors outside the secure perimeter approximately a half mile away from the AGR grounds at 4:26 p.m. 

Second, video obtained from a local business showed the subject climbed to the roof of the AGR complex at approximately 6:05 p.m.  

Video from local business, police dash-cam, and police body cameras confirmed the subject’s movement across multiple AGR building roofs between 6:05 and 6:08 p.m. 

Finally, at 6:11 p.m., the subject fired eight rounds before being neutralized.  

Our overall finding is the subject was only on the roof for approximately 6 minutes, prior to the shooting, between 6:05 and 6:11 p.m.  
 
Wrap-Up

The FBI continues to work diligently to determine the subject’s motive. 

We believe the subject engaged in detailed attack planning well in advance of the campaign rally. 

We continue to pursue all investigative leads to determine any possible links to co-conspirators. 

The American people deserve answers, and the FBI stands committed to providing them. 

Opening Statement to Media on Updates to the Butler, Pennsylvania, Assassination Attempt Investigation

Source: Federal Bureau of Investigation FBI Crime News

Washington, D.C.

Good afternoon, everyone. My name is Robert Wells, and I am the executive assistant director of the FBI’s National Security Branch. I believe this is our third call with the media since the attack and, as you have heard me say before, the FBI remains steadfast in investigating the details surrounding the attempted assassination of former President Trump.

This extraordinarily tragic set of circumstances is of national importance, and we are determined to ensure the facts of the case are appropriately shared with Congress, the media, and the American people. Our goal throughout this process has been—and continues to be— transparency, which is why we have agreed to proactively share new information as it comes to light. We have also been cooperative with the bipartisan Congressional task force and the ongoing independent reviews of the attack, and we’re committed to working closely with each of these teams and being as transparent as possible.

Before we get into the details of the investigation, I would be remiss if I did not highlight the incredible work of the agents, analysts, and professional staff in the Pittsburgh Field Office—and around the organization—throughout this investigation. Whether it was covering down on a lead, analyzing countless points of data, or providing victim services to witnesses and victims alike, every member of the investigative team has worked around the clock to understand what transpired on and leading up to July 13. We continue to leverage the amazing cooperation with our state and local partners in the area to leave no stone unturned in this investigation.

At this time, the FBI has not identified a motive nor any co-conspirators or associates of Crooks with advance knowledge of the attack. And I want to be clear: We have not seen any indication to suggest Crooks was directed by a foreign entity to conduct the attack. As always, we will continue to follow all logical investigative steps in this ongoing investigation and have not ruled anything out at this time.

I will now turn it over to Pittsburgh Field Office’s Special Agent in Charge Kevin Rojek. He will provide the latest investigative update and the various steps the FBI has taken thus far to conduct a thorough and fulsome investigation into the attack on July 13.

Thank you, and I look forward to answering your questions.

FBI Pittsburgh Special Agent in Charge’s Remarks from Media Briefing on Updates to Investigation into Butler, Pennsylvania, Assassination Attempt

Source: Federal Bureau of Investigation FBI Crime News

Remarks as prepared for delivery

Opening Remarks

Thank you EAD [Executive Assistant Director Robert R.] Wells.

My name is Kevin Rojek. I’m the special agent in charge of the FBI Pittsburgh Field Office. 

The Pittsburgh office continues to lead the investigation into the attempted assassination of former President Donald Trump through the tireless efforts of our agents, intelligence analysts, and professional staff employees.  

We have also received invaluable assistance from countless personnel from several FBI field offices and FBI Headquarters divisions.  

Additionally, I want to acknowledge the incredible partnership with both the Pennsylvania State Police and the U.S. attorney’s office who have worked jointly with us on this investigation since day one.  

Motive and Co-Conspirators 

Since July 13, we have worked diligently towards two goals: 

  • identify the subject’s motive for the attempted assassination; and
  • determine whether he worked with any co-conspirators or conducted this attack alone.  

Regarding motive: Extensive analysis of the subject’s online search history, as well as his specific online activity, has provided us valuable insight into his mindset, but not a definitive motive.  

Regarding co-conspirators: To date, we have not uncovered any credible evidence indicating the subject conspired with anyone else. 

Outside Reviews 

During the last few weeks, the FBI has received numerous requests to support external investigations associated with the attempted assassination, including the independent review panel formed by DHS [Department of Homeland Security] Secretary [Alejandro] Mayorkas, DHS’ Office of Inspector General, as well as the bipartisan congressional task force.  

As EAD Wells stated, the FBI remains committed to transparency in sharing appropriate investigative results with each of these investigative teams and with the American people.  

Scope of Investigation

Regarding the scope of the investigation: First, I want to remind the public that the FBI is responsible for investigating the actions of the subject. 

It is not the FBI’s role to investigate the actions, the security posture, or the responsibilities of the Secret Service or local law enforcement related to the campaign rally. 

To date, we’ve conducted nearly 1,000 interviews, served numerous search warrants, issued dozens of subpoenas, and analyzed hundreds of hours of video footage. 

The Investigation

The FBI continues to follow up on all potential leads in order to refine the timeline of events leading up to the attempted assassination.  

We also remain in contact with the subject’s family members, who have been extremely cooperative with our investigation. 

Online Search Activity

Now, regarding the subject’s online activity, analysis of searches conducted between 2019 and 2024 provided extensive insight into the subject’s mindset and specific research he conducted in preparation for the attack. 

Searches for Campaign Events

In late September 2023, an account connected to the subject was used to search the former president’s campaign schedule and upcoming appearances in Pennsylvania. 

Next, from April of 2024 through July 12, the subject searched campaign events for both former President Trump and President [Joe] Biden, including events scheduled to take place in western Pennsylvania. 

Searches for Butler Event

Specifically on July 4, 2024, the subject searched for details of the former president’s campaign event in Butler. 

On July 6, the subject registered to attend the rally, and that same day, he specifically searched for:

  • “how far was Oswald from Kennedy,”
  • ”where will Trump speak from at Butler Farm Show,”
  • ”Butler Farm Show podium,” and
  • “Butler Farm Show photos.” 

On July 8, the subject searched “AGR International,” on July 9 he searched “ballistic calculator,” and on July 10 he searched “weather in Butler.” 
 
Searches for Biden and Trump:  

In the 30 days prior to the attack, the subject conducted more than 60 searches related to President Biden and former President Trump.  

Of particular note, our investigation identified specific searches conducted on July 5 to include “when is the DNC convention” and “when is the RNC in 2024.” 

Searches related to IEDs: 

Next, regarding the two improvised explosive devices located in the shooter’s vehicle as well as the device found in his bedroom, the subject conducted multiple searches pertaining to explosive devices as early as September 2019 continuing through this summer.  

These searches specifically included:

  • “detonating chord,”
  • “blasting cap,”
  • “how to make a bomb from fertilizer,” and
  • “how do remote detonators work.” 

The subject also searched for ammonium nitrate, nitromethane, and other materials consistent with the manufacturing of explosive devices.  

Explosives: 

Continuing on the topic of the explosive devices located in the subject’s vehicle, the FBI’s Lab determined the components used by the subject were legal to purchase and readily available online. 

Rifle Analysis 

Additionally, regarding the subject’s rifle, the FBI Laboratory Division successfully test fired the weapon, concluding it was—and remains—fully operational. 

They also positively matched all eight shell casings located on the roof with the subject’s rifle. 

Addressing Incorrect Reporting

I would like to take this opportunity to clarify some information.

Encrypted Email Accounts: 
First, regarding the subject’s use of overseas encrypted email accounts. 

We understand these accounts were encrypted. However, the level of encryption was no more sophisticated than any standard, widely used, internet-based email service.  

We successfully accessed the information from these accounts and appropriately analyzed their content. 

However, we continue to identify and exploit the subject’s accounts. 

Release of the Crime Scene 

Second, regarding the release of the crime scene, the FBI did release the crime scene at the Butler Farm grounds, as well as the AGR complex to the property owners in a timely fashion.   

In fact, we released these sites on a rolling basis—but only after completing a thorough processing of each location, exhausting all efforts to collect any items of evidentiary value. 

Prior to releasing each site, we followed all appropriate evidence-gathering procedures and completed the final release of the scene seven days after the attack. 

Cleaning of the Biological Evidence 

Third, regarding the cleaning of the AGR roof, the FBI followed established evidentiary policies and procedures for the return of crime scenes to the property owner. 

This included cleaning the biological material from the AGR roof, only after ensuring we collected all relevant evidence.  

Release Of Subject’s Body 

I would now like to clarify the process undertaken to release the subject’s body to his family. 

After rendering the scene safe and following our established evidence gathering procedures, the FBI contacted the Butler County Coroner’s Office.   

Subsequently, the coroner removed the body from the scene and conducted a death investigation. 

The Butler County Coroner’s Office then deferred to have the Allegheny County Office of the Medical Examiner conduct the autopsy . 

Once Allegheny County completed the autopsy, the Butler County Coroner’s Office consulted with the FBI asking if there were any additional necessary investigative steps with respect to the body.   

The FBI and Pennsylvania State Police then concurred with the Butler County Coroner’s Office decision to release the remains to the subject’s family. 

I want to stress that It is not standard procedure or practice for the FBI or any law enforcement agency to request that the coroner or medical examiner maintain indefinite custody of a deceased subject’s body once the investigative purposes of our agency and our partner agencies are completed. 

Autopsy and Toxicology Results

I would also like to mention that the FBI is now in possession of the subject’s autopsy and toxicology reports from the coroner’s office.  

The autopsy report indicated the subject was pronounced deceased at 6:25 p.m. on July 13, 2024, as a result of a single gunshot wound to the head.

All reviewable evidence collected from the AGR roof and from the subject’s body are consistent with the round fired by the Secret Service sniper.  

Additionally, the toxicology report revealed negative results quote “for alcohol and drugs of abuse.” 

Interviews of First Responders on Night of Incident 

Next, regarding questions surrounding the release of first responders from the shooting scene on the night of July 13. 

We had no reason or intention to hold or detain any first responder, as the law enforcement community assembled in Butler was actively responding to public safety risks and assisting with investigative activity throughout the night.  

The FBI appreciates the monumental local law enforcement response that lasted hours after the attack and continues to this day. 

Our priorities that night—as shared by local law enforcement—were to secure the scene, preserve evidence, and ensure public safety. 
 
Interview of Former President Trump  

As previously reported, the FBI and the Pennsylvania State Police conducted a standard victim interview of former President Trump. 

During this productive interview, agents took the time to provide the former president with an in-depth briefing on the investigation and answered his questions regarding the attempt on his life.  

We’re grateful to the former president for his cooperation and his time. 

Timeline

I will now provide an update to the timeline associated with the subject’s actions prior to the shooting. 

Prior witness interviews indicated the subject was in the area of the AGR building at 4:26 p.m. 

Subsequent digital evidence review shows the subject was in fact near the farm show air strip, walking past a row of vendors outside the secure perimeter approximately a half mile away from the AGR grounds at 4:26 p.m. 

Second, video obtained from a local business showed the subject climbed to the roof of the AGR complex at approximately 6:05 p.m.  

Video from local business, police dash-cam, and police body cameras confirmed the subject’s movement across multiple AGR building roofs between 6:05 and 6:08 p.m. 

Finally, at 6:11 p.m., the subject fired eight rounds before being neutralized.  

Our overall finding is the subject was only on the roof for approximately 6 minutes, prior to the shooting, between 6:05 and 6:11 p.m.  
 
Wrap-Up

The FBI continues to work diligently to determine the subject’s motive. 

We believe the subject engaged in detailed attack planning well in advance of the campaign rally. 

We continue to pursue all investigative leads to determine any possible links to co-conspirators. 

The American people deserve answers, and the FBI stands committed to providing them.