(COLUMBUS, Ohio)— Ohio Governor Mike DeWine today announced details of a new program to help victim service agencies meet the needs of survivors of human trafficking.
The new Direct Services for Victims of Human Trafficking Grant Program was created by Governor DeWine and the Ohio General Assembly as part of Ohio’s new operating budget. A total of $4 million in funding is now available for nonprofit organizations to help them adequately serve the growing number of sex and labor trafficking victims in need of support.
“As awareness of human trafficking grows, the number of identified victims also increases, so it is absolutely critical that our local service programs have enough resources,” said Governor DeWine. “This infusion of grant funding will help ensure that support for trafficking victims is widely available.”
The Ohio Department of Public Safety’s Office of Criminal Justice Services (OCJS) opened the application period for the grant program today. Direct services that are eligible for funding include but are not limited to mental health services, substance use disorder treatment, education and employment support, and residential placement. Awards are expected to be announced in January 2024.
In total, $9 million in funding was dedicated to combating human trafficking in Ohio’s new operating budget. This historic investment will also be used toward additional local and statewide projects and to expand the Governor’s Human Trafficking Task Force, which prioritizes a holistic approach to responding to human trafficking by identifying gaps in prevention, victim services, and prosecution.
“We appreciate Governor DeWine and the Ohio General Assembly for recognizing the need for expanded victim services throughout the state,” said Maria Busch, state anti-trafficking coordinator for the Governor’s Human Trafficking Task force. “Those who’ve been subject to human trafficking have unique needs and often require several levels of support to move forward, and this investment will make a significant difference in helping survivors take back control of their lives.”
Nonprofit organizations that provide direct support to victims of trafficking and/or those considered at high risk of trafficking will be eligible for grant funding. Priority consideration will be awarded to applicants who demonstrate evidence-based and survivor-informed programming.
A bidders training webinar for potential applicants will be held on Tuesday, October 3, at 9:30 a.m. The training is not mandatory but will provide helpful information on both the application preparation and review process. Nonprofit organizations with questions should contact the State Anti-Trafficking Coordinator at SAHTC@info.dps.ohio.gov.
Leticia Gallarzo used the identity of a real nurse to obtain employment as a registered nurse
GRAND RAPIDS, MICHIGAN — U.S. Attorney for the Western District of Michigan Mark Totten today announced that a federal grand jury returned an indictment charging Leticia Gallarzo, 48, of Allegan County, with wire fraud, two counts of aggravated identity theft, two counts of making false statements in medical records affecting health care benefit programs, and production of a false identification document, all charges relating to her scheme to defraud employers by posing as a registered nurse.
“These allegations that Ms. Gallarzo faked her qualifications as a licensed medical professional are highly concerning and potentially put innocent patients at risk,” said U.S. Attorney Mark Totten. “My office takes this threat to the public very seriously and thanks our law enforcement partners for their investigative work in this case.”
If convicted, Gallarzo faces a maximum sentence of up to 20 years in prison for wire fraud and two years mandatory imprisonment for aggravated identity theft, to be served consecutively to the underlying sentence.
According to allegations in the indictment and a previously filed criminal complaint, Gallarzo used the Michigan licensing number and the name of a person licensed as a nurse to obtain employment as a registered nurse at two different locations: an area nursing home and a hospice facility.
Gallarzo did not possess a valid nursing license and represented that she earned a master’s degree in nursing from The George Washington University and a bachelor’s degree in nursing from Davenport University, despite not having a degree of any kind in nursing. Gallarzo produced a counterfeit Michigan nursing license that was also used to obtain employment with the hospice facility.
The hospice facility learned that Gallarzo was a nurse impostor when her fingerprints matched the fingerprints on record due to her previous state and federal convictions for practicing nursing without a license in Texas in 2015 and 2016. The Michigan State Police arrested Gallarzo shortly thereafter.
“As alleged in this case, the defendant recklessly and willingly put the lives of innocent patients at risk,” said Cheyvoryea Gibson, Special Agent in Charge of the FBI in Michigan. “The FBI remains committed to ensuring identity theft cases like this one are thoroughly investigated. I would like to extend a special thank you to the Michigan State Police for their outstanding work and support throughout this case.”
“The defendant’s alleged actions demonstrate blatant disregard for the safety and well-being of those under her purported care,” said Mario M. Pinto, Special Agent in Charge with the U.S. Department of Health and Human Services, Office of Inspector General (HHS-OIG). “To ensure that patients receive appropriately qualified services, HHS-OIG will steadfastly pursue those who misrepresent their medical qualifications.”
The Federal Bureau of Investigation Grand Rapids Field Office and U.S. Health and Human Service Office of Inspector General are investigating the case. Assistant U.S. Attorney Ron Stella is prosecuting the case.
The charges in an indictment are merely accusations, and a defendant is presumed innocent until and unless proven guilty in a court of law.
(COLUMBUS, Ohio)— Ohio Governor Mike DeWine issued the following reprieve of execution:
Scott Group, who was scheduled to be executed on January 10, 2024. The new date of execution has been moved to February, 2027.
Governor DeWine is issuing this reprieve due to ongoing problems involving the willingness of pharmaceutical suppliers to provide drugs to the Ohio Department of Rehabilitation and Correction (DRC), pursuant to DRC protocol, without endangering other Ohioans.
Peru Township – The Ohio State Highway Patrol’s Norwalk Post is currently investigating a one vehicle, fatal crash that occurred today, September 25, 2023 at approximately 4:21 P.M. The crash occurred on Snyder Road west of State Route 61, Peru Township, Huron County.
Shirley McQuillen, age 81, from Willard, Ohio was driving a 2016 red, Ford Escape east on Snyder Road. Ms. McQuillen traveled off the right side of the roadway striking fence posts and a tree before overturning.
Ms. McQuillen was not wearing her seatbelt and was trapped inside the vehicle. She was extricated by non-mechanical means by the Huron River Joint Fire District. Ms. McQuillen sustained fatal injuries as a result of the crash.
Drugs and/or alcohol do not appear to be a factor in the crash, which remains under investigation.
The Ohio State Highway Patrol was assisted on scene by the Huron River Joint Fire District, North Central EMS, Huron County Coroner, Metro LifeFlight, and Interstate Towing.
(COLUMBUS, Ohio) — Ohio Attorney General Dave Yost has filed an amicus brief urging the U.S. Supreme Court to block the Biden administration from censoring protected speech on social media.
“The federal government doesn’t get to play referee on the field of public discourse,” Yost said. “If you let them decide what speech is OK, one day yours might not be.”
In the filing, Yost asks the Supreme Court to deny the federal government’s request to pause a U.S. District Court injunction prohibiting certain Biden administration officials from pressuring social media platforms into deleting user content protected by the First Amendment.
The brief argues that halting the injunction would enable the executive branch to resume its troubling practice of silencing individuals and groups with views opposing those of the current administration — a federal overreach that was on full display following the outbreak of the coronavirus.
During the pandemic, the White House closely monitored social media platforms, flagging accounts and posts with dissenting views for the platforms to delete. Officials also kept tabs on the platforms’ monitoring activities and pressured the companies to adopt permanent policy changes aligned with the federal government’s goals. Similar steps were taken by the Surgeon General and the Centers for Disease Control and Prevention, among others.
Missouri and Louisiana sued last year, arguing in Missouri v. Biden that the federal government’s censorship of social media content violated the First Amendment. The U.S. Court of Appeals for the Fifth Circuit agreed, ruling against the federal government earlier this month and partly upholding an injunction granted by a U.S. District Court in Louisiana.
Yost writes in support of the plaintiffs, saying, “The facts underlying this case reflect the federal government’s tendency to wield its power to target people and speech specially disfavored by those in power.”
EAST ST. LOUIS, Ill. – A woman originally from China admitted involvement in counterfeit gift card scheme directed at Target shoppers across the Midwest, after she pled guilty to the federal crime in a U.S. District courtroom in East St. Louis on Thursday.
Hongying Wang, 53, originally of Hunan Province, China, admitted guilt to using and trafficking in a counterfeit access device. For the charge, Wang faces a statutory maximum of ten years imprisonment and a fine of up to $250,000.
“Protecting consumers from fraud is a familiar battle, but individuals deliberately placing fake gift cards onto sales racks with the intention of stealing the funds from patrons is a new low, and I applaud the law enforcement officials who are investigating this case,” said U.S. Attorney Rachelle Aud Crowe.
“Fraud is often mistaken for a victimless crime but when individuals like Wang commit these types of crimes, they are most certainly victimizing consumers and businesses,” said Special Agent in Charge of the HSI Chicago Area of Operations Sean Fitzgerald. “HSI works daily to protect our community from these individuals by partnering with our local and federal partners to not only keep these counterfeit products out of the hands of unsuspecting consumers, but to also hold accountable those who attempt to profit from scamming the public.”
“The Illinois State Police is committed to stopping trafficking, whether it is trafficking in guns, drugs, or in this case – counterfeit goods,” said Illinois State Police Director Brendan F. Kelly.
According to court documents, the scheme involved individuals placing altered gift cards on the sales racks at Target while retaining the access numbers. Once a gift card was loaded with money by an unsuspecting patron, the fraudsters would have the codes needed to steal the funds.
In January 2023, a Target security officer observed Wang and a co-defendant placing gift cards onto the racks in the Belleville store for customers to purchase. Upon further review, the gift cards were altered with the codes scratched off and covered by stickers to appear untouched.
In addition to Belleville, the following Target locations across the Midwest were knowingly affected by the scheme: Albuquerque, New Mexico; Norman, Oklahoma; Edmond, Oklahoma; Liberty, Missouri; Independence, Missouri; St. Peters, Missouri; Town and Country, Missouri; and Brentwood, Missouri.
If you believe you are a victim, contact the U.S. Attorney’s Office by emailing: USAILS.VW_ILS@usdoj.gov. Please provide your full name, mailing address, telephone number, and email address.
Wang admitted to possessing 6,100 fake gift cards with intent to place on the shelves.
Guangwei Gao, also of China, was named and charged in the indictment with one count of using and trafficking in a counterfeit access device.
An indictment is a formal charge against a defendant. Under the law, a defendant is presumed to be innocent of a charge until proved guilty beyond a reasonable doubt to the satisfaction of a jury.
Wang’s sentencing is set for 10:30 a.m. on Jan. 22, 2024, at the federal courthouse in East St. Louis.
Homeland Security Investigations (HSI) and the Illinois State Police (ISP) are leading the investigation, and Assistant U.S. Attorney Peter T. Reed is prosecuting the case.
Multiple Foreign Nationals Charged in Connection with Trickbot Malware and Conti Ransomware Conspiracies
WASHINGTON – Three indictments in three different federal jurisdictions have been unsealed charging multiple Russian cybercrime actors involved in the Trickbot malware and Conti ransomware schemes.
According to court documents and public reporting, Trickbot, which was taken down in 2022, was a suite of malware tools designed to steal money and facilitate the installation of ransomware. Hospitals, schools, and businesses were among the millions of Trickbot victims who suffered tens of millions of dollars in losses. While active, Trickbot malware, which acted as an initial intrusion vector into victim computer systems, was used to support various ransomware variants, including Conti. Conti was a ransomware variant used to attack more than 900 victims worldwide, including victims in approximately 47 states, the District of Columbia, Puerto Rico, and approximately 31 foreign countries. According to the FBI, in 2021, Conti ransomware was used to attack more critical infrastructure victims than any other ransomware variant.
“The Justice Department has taken action against individuals we allege developed and deployed a dangerous malware scheme used in cyberattacks on American school districts, local governments, and financial institutions,” said Attorney General Merrick B. Garland. “Separately, we have also taken action against individuals we allege are behind one of the most prolific ransomware variants used in cyberattacks across the United States, including attacks on local police departments and emergency medical services. These actions should serve as a warning to cybercriminals who target America’s critical infrastructure that they cannot hide from the United States Department of Justice.”
“Today’s announcement shows our ongoing commitment to bringing the most heinous cyber criminals to justice – those who have devoted themselves to inflicting harm on the American public, our hospitals, schools, and businesses,” said FBI Director Christopher Wray. “Cyber criminals know that we will use every lawful tool at our disposal to identify them, tirelessly pursue them, and disrupt their criminal activity. We, alongside our federal and international partners, will continue to impose costs through joint operations no matter where these criminals may attempt to hide.”
“The defendants charged in these three indictments across three different jurisdictions allegedly used their cyber knowledge and capabilities to victimize people and businesses around the world without regard for the damage they caused,” said Acting Assistant Attorney General Nicole M. Argentieri of the Justice Department’s Criminal Division. “These indictments should serve as a reminder that no matter a cybercriminal’s location, we will identify and pursue them by doing everything in our power to ensure they face the consequences of their actions.”
“Conti ransomware was used to exploit our financial systems and target hundreds of innocent victims,” said Special Agent in Charge William Mancino of the U.S. Secret Service’s Criminal Investigative Division. “The Secret Service will continue to work with our local, state, and federal law enforcement partners to investigate cybercriminals and bring offenders to justice.”
As detailed below, a federal grand jury in the Northern District of Ohio returned an indictment charging Maksim Galochkin, aka Bentley; Maksim Rudenskiy, aka Buza; Mikhail Mikhailovich Tsarev, aka Mango; Andrey Yuryevich Zhuykov, aka Defender; Dmitry Putilin, aka Grad and Staff; Sergey Loguntsov, aka Begemot and Zulas; Max Mikhaylov, aka Baget; Valentin Karyagin, aka Globus; and Maksim Khaliullin, aka Maxfax, Maxhax, and Kagas, all Russian nationals, with conspiring to use the Trickbot malware to steal money and personal and confidential information from unsuspecting victims, including businesses and financial institutions located in the United States and around the world, beginning in November 2015.
A federal grand jury in the Middle District of Tennessee returned an indictment charging Galochkin, Rudenskiy, Tsarev, and Zhuykov with conspiring to use Conti ransomware to attack businesses, nonprofits, and governments in the United States beginning in 2020 and continuing through June 2022.
A federal grand jury in the Southern District of California returned an indictment charging Galochkin in connection with the Conti ransomware attack on Scripps Health on May 1, 2021.
Northern District of Ohio
The indictment returned in the Northern District of Ohio charged all nine defendants for their alleged roles in developing, deploying, managing, and profiting from the malware known as Trickbot. Trickbot was a sophisticated, modular, multi-functional suite of malware tools which (a) infected victims’ computers with malware designed to capture victims’ online banking login credentials; (b) obtained and harvested other personal identification information, including credit cards, emails, passwords, dates of birth, social security numbers, and addresses; (c) infected other computers connected to the victim computer; (d) used the captured login credentials to fraudulently gain unauthorized access to victims’ online bank accounts at financial institutions; (e) stole funds from victims’ bank accounts and laundered those funds using U.S. and foreign beneficiary bank accounts provided and controlled by the defendants and co-conspirators; and (f) installed ransomware on victim computers.
“As alleged in the indictment, Trickbot infected millions of computers worldwide, including those used by hospitals, schools, and businesses,” said U.S. Attorney Rebecca C. Lutzko for the Northern District of Ohio. “Today’s announcement demonstrates that these dangerous cybercriminals are not anonymous, as they once believed. The indictments unsealed today show the resolve of the international community to work together to bring cybercriminals to justice. We will continue to use all resources at our disposal to stop cybercrime.”
Each defendant is charged with one count of conspiracy to violate the Computer Fraud and Abuse Act, one count of wire fraud conspiracy, and one count of conspiracy to launder the proceeds of the scheme. The indictment also included an enhancement for falsely registering domains. If convicted, each defendant faces a maximum penalty of 62 years in prison.
Trickbot malware developers Alla Witte and Vladimir Dunaev were previously indicted and apprehended. Witte, a Latvian national pleaded guilty to conspiracy to commit computer fraud and was sentenced to 32 months in June 2023. Dunaev, a Russian national, currently is in custody and pending trial in Cleveland.
Middle District of Tennessee
The Middle District of Tennessee indictment charges that the individuals behind Conti ransomware, including Galochkin, Rudenskiy, Tsarev, and Zhuykov, conspired to use Conti to attack hundreds of victims. Conti’s victims included hospital systems, local governments, and foreign governments. Conti conspirators allegedly extorted funds from victims in the Middle District of Tennessee and encrypted the computer systems of a local sheriff’s department, a local police department, and local emergency medical services, among others. Ransom notes left on Conti victims’ computer systems typically boasted “if you don’t [know Conti] – just ‘google it.’”
“The conspirators who developed and deployed Conti ransomware victimized businesses, governments, and non-profits around the world, including a sheriff’s office and an emergency medical service in Tennessee,” said U.S. Attorney Henry C. Leventis for the Middle District of Tennessee. “We will continue to use the full power of this office to ensure that hackers can no longer hide behind their computer screens and to hold them accountable.”
Galochkin was a “crypter” for Conti, modifying the ransomware so that it would not be detected by anti-virus programs; Rudenskiy was a developer who supervised other Conti developers; Tsarev was a manager of other Conti conspirators; and Zhuykov was a systems administrator who managed users of Conti infrastructure, organized and paid for infrastructure and tools, and assisted in problem solving infrastructure-related issues.
Galochkin, Rudenskiy, Tsarev, and Zhuykov are each charged with one count of conspiracy to violate the Computer Fraud and Abuse Act and one count wire fraud conspiracy. If convicted, each defendant faces a maximum penalty of 25 years in prison.
Southern District of California
As alleged in the Southern District of California indictment, Galochkin caused the transmission of the Conti malware and impaired the medical examination, diagnosis, treatment, and care of one or more individuals.
Galochkin is charged with three counts of computer hacking. If convicted, he faces a maximum penalty of 20 years in prison.
“The indictment alleges a callous disregard for the medical care and the personal information of residents of the Southern District of California,” said Acting U.S. Attorney Andrew R. Haden for the Southern District of California. “This office is committed to protecting victims of cybercrime and holding perpetrators accountable.”
The FBI Cleveland Field Office is leading the investigation into Trickbot malware.
Assistant U.S. Attorneys Daniel Riedl and Duncan Brown for the Northern District of Ohio and Senior Counsel Candina Heath of the Criminal Division’s Computer Crime and Intellectual Property Section are prosecuting the Trickbot malware case.
The FBI San Diego, Memphis, and El Paso Field Offices, with U.S. Secret Service, are leading the investigation into Conti ransomware. The U.S. Attorney’s Office for the Western District of Texas provided significant assistance.
Assistant U.S. Attorney Taylor J. Phillips for the Middle District of Tennessee, Assistant U.S. Attorneys Jonathan Shapiro and Kareem Salem for the Southern District of California, and Trial Attorney Sonia V. Jimenez and Senior Counsel Ryan K.J. Dickey of the Criminal Division’s Computer Crime and Intellectual Property Section are prosecuting the Conti ransomware cases.
The Justice Department’s National Security Division provided significant assistance in the Conti ransomware and Trickbot malware investigations.
An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.
CONCORD – A New Hampshire charity pleaded guilty today in federal court to export offenses, U.S. Attorney Jane E. Young announces.
NuDay, a/k/a NuDay Syria, pleaded guilty to three counts of Failure to File Export Information. U.S. District Court Judge Joseph Laplante scheduled sentencing for December 28, 2023.
NuDay was founded by Nadia Alawa as a non-profit charity in 2013 and is headquartered in Windham, New Hampshire. Alawa served as NuDay’s President. Between 2018 and 2021, NuDay made over 100 shipments to Syria, a country that was subject to sanctions and export restrictions.
NuDay had the items shipped to Mersin, Turkey, where another company would transship them into Syria. U.S. Department of Commerce regulations require exporters, such as NuDay, to report true and accurate information about the items being exported, including the shipment’s description, end user, and monetary value.
However, NuDay falsely reported that the end destination of the shipments was Turkey and not Syria, and artificially deflated the value of the goods to be below the $2,500 reporting threshold. For example, on May 5th, 2019, NuDay falsely reported that their shipment was intended for Turkey and that the value of the container was less than $2,500. NuDay now admits that this container was actually intended for Syria and claims its true value was $8.3 million.
For an organizational defendant, the charging statute provides a sentence of no greater than five years of probation and a fine of $10,000 per count. Sentences are imposed by a federal district court judge based upon the U.S. Sentencing Guidelines and statutes which govern the determination of a sentence in a criminal case. As a condition of the plea, Nadia Alawa and her family members will have no further involvement with NuDay.
The Federal Bureau of Investigation, U.S. Department of Commerce’s Office of Export Enforcement, Internal Revenue Service’s Criminal Investigations division, and Homeland Security Investigations led the investigation. Assistant U.S. Attorney Alexander S. Chen is prosecuting the case.
Justice Department Announces First Criminal Resolution Involving the Illicit Sale and Transport of Iranian Oil in Violation of U.S. Sanctions
The Government Also Seized Almost One Million Barrels of Iranian Crude Oil
The Justice Department announced today the successful disruption of a multimillion-dollar shipment of crude oil by the Islamic Revolutionary Guard Corps (IRGC), a designated foreign terrorist organization, that was bound for another country. This is the first-ever criminal resolution involving a company that violated sanctions by facilitating the illicit sale and transport of Iranian oil and comes in concert with a successful seizure of over 980,000 barrels of contraband crude oil.
According to court documents, on April 19, Suez Rajan Limited pleaded guilty to conspiring to violate the International Emergency Economic Powers Act (IEEPA). On that same date, the company was sentenced by U.S. District Court Judge Carl J. Nichols for the District of Columbia to three years of corporate probation and a fine of almost $2.5 million. In addition, pursuant to a deferred prosecution agreement (DPA) and a seizure warrant issued by the U.S. District Court for the District of Columbia, Empire Navigation, the operating company of the vessel carrying the contraband cargo, agreed to cooperate and transport the Iranian oil to the United States – an operation which has now concluded. Empire Navigation incurred the significant expenses associated with the vessel’s voyage to the United States.
The contraband cargo is now the subject of a civil forfeiture action in the U.S. District Court for the District of Columbia. The United States’ forfeiture complaint alleges that the oil aboard the vessel is subject to forfeiture based on U.S. terrorism and money laundering statutes.
The complaint alleges a scheme involving multiple entities affiliated with Iran’s IRGC and the IRGC-Qods Force (IRGC-QF) to covertly sell and transport Iranian oil to a customer abroad. Participants in the scheme attempted to disguise the origin of the oil using ship-to-ship transfers, false automatic identification system reporting, falsified documents and other means. The complaint further alleges that the charterer of the vessel used the U.S. financial system to facilitate the transportation of Iranian oil.
The complaint further alleges that the oil constitutes the property of, or provided a “source of influence” over, the IRGC and the IRGC-QF, both of which have been designated by the United States as foreign terrorist organizations, and that the oil facilitated money laundering. The documents allege that profits from oil sales support the IRGC’s full range of malign activities, including the proliferation of weapons of mass destruction and their means of delivery, support for terrorism and both domestic and international human rights abuses.
Funds successfully forfeited with a connection to a state sponsor of terrorism may in whole or in part be directed to the U.S. Victims of State Sponsored Terrorism Fund
Homeland Security Investigations Washington D.C. and FBI’s Minneapolis Field Office are investigating the cases.
Assistant U.S. Attorneys Stuart D. Allen and Rajbir S. Datta for the District of Columbia prosecuted the criminal case and they, along with Assistant U.S. Attorney Brian Hudak, are litigating the civil forfeiture case. On both actions, they received assistance from Paralegal Specialists Brian Rickers and Legal Assistant Jessica McCormick. Former Assistant U.S. Attorney Michael Grady participated in prior phases of the investigation. The Counterintelligence and Export Control Section of the National Security Division is also prosecuting and litigating these matters. The Money Laundering and Asset Recovery Section of the Criminal Division provided significant assistance in this matter. The Department thanks United Against Nuclear Iran for its valuable assistance.
A civil forfeiture complaint is merely an allegation. The burden to prove forfeitability in a civil forfeiture proceeding is upon the government.
(CANTON, Ohio) — Ohio Attorney General Dave Yost, Stark County Sheriff George T. Maier and Stark County Coroner Dr. Ron Rusnak today released a forensic facial reconstruction of an unidentified man whose remains were discovered in Canton on Dec. 22, 2001.
“He was found just a couple of months after the twin towers were struck on 9/11, that’s how long this person has been waiting to be identified,” Yost said. “Somebody somewhere knows him. People loved him. We need to help provide them closure.”
In a first for the Bureau of Criminal Investigation (BCI), which created a clay model of the John Doe, a series of photo-realistic digital images also were generated in hopes of increasing the chances that someone will come forward to assist in identification.
The remains were found at 2931 Trump Ave. SE in Canton. They were completely skeletonized and may have been at that location for multiple years.
“I want to commend the Stark County Coroner’s Office, BCI, and the Attorney General’s Office for their collaboration in identifying new information related to this investigation,” added Stark County Sheriff George T. Maier. “We remain committed to pursuing all leads, no matter how much time has passed. We owe it to the victim to bring closure and justice to this case.”
A BCI forensic artist created the clay model at the request of the Stark County Coroner’s Office. BCI’s Criminal Intelligence Unit released a corresponding public bulletin about the case today.
“I would like to thank all of you involved in our continued pursuit to properly identify our deceased,” said Stark County Coroner Dr. Ronald Rusnak. “There are many loved ones that appear to have vanished. Please help us identify this individual so that we may bring closure to those who knew and loved this individual.”
John Doe is believed to have been a Black man between 21 and 44 years old and between 5 feet 4 inches and 6 feet tall. No clothing was recovered. Additional details such as weight, hair color and eye color are unknown.
After the clay model was completed, BCI worked with experts from The Ohio State University to create digital images of the reconstruction. This digital reconstruction allows unknown features to be approximated, including eye color, skin tone, and the color and style of hair. Additionally, for cases where the precise age is not known, the digital reconstruction can be aged.
The technology allows investigators to rapidly create multiple digital images based on the forensic reconstruction. Investigators hope that the facial variations that are represented prompt tips from the public that eventually help identify John Doe.
This new technology also was applied to a second John Doe case in Stark County. His remains were found on March 31, 2020, near an oil well site about 20 yards off Sandy Avenue SE in Canton, and a clay reconstruction was released on Aug. 3, 2021.
Anyone with information about the John Doe cases should contact the Stark County Sheriff’s Office at 330-451-3937.
Law enforcement officers or family members of missing persons interested in learning more about the services provided by BCI’s Missing Persons Unit should call 855-BCI-OHIO (855-224-6446).