EFTA00172198.pdf
PDF Source (No Download)
Extracted Text (OCR)
1
1/17/2020
SIGNIFICANT ACTIVITIES
VIOLENT CRIMINAL THREAT (VCT) Branch
OVERALL SOPHISTICATED TECHNIQUES/STATS
METHODS
ARRESTS
CONVICTIONS
DISRUPTIONS
DISMANTLEMENTS
YTD=Year to Date
I.
Major Operational Matters (Arrests/Indictments/Convictions/Sentences /Searches/Drug Buys)
1.
EFTA00172198
2
1/17/2020
2
EFTA00172199
3
1/17/2020
Efl
3
EFTA00172200
4
1/17/2020
C-19; 9A-NY-3217706; SUBJECT -"RINGER", VICTIM-
EXTORTION,
THREATENING COMMUNICATIONS; C/A SA
On 01/08/2020, a
cooperating defendant in the JEFFREY EPSTEIIN case reported to the FBI that he/she was
receiving Overt Extortion threats via email. The subject was communicating via an application
called CRIPTEXT and sending daily emails since 01/01/2020 to the victim, requesting money
via paypal and Bitcoin in exchange to keep the subject from exposing information about the
victim's relationship with JEFFREY EPSTEIN and others. If the subject did not receive payment,
the subject would fabricate false emails appearing to be sent by the victim, to the subject, and
then post these emails on a Twitter account. The subject followed through with posting when the
money was not received. The emails contained information that was false in nature, but
slandered the reputation of the victim. No information on CRIPTEXT was not found in any
bureau system regarding cases using this application etc.
CRIPTEXT was established in 2014 and is a fairly small company. The company ,des
end
to end encryption for users to use they GMAIL and mask their IPs via VPNs. SA
contacted the company via email, and eventually spoke to the CEO. The CEO had never had
legal services requested and was unfamiliar with the protocol, however was willing to assist in
anyways possible. SA
explained the subpoena process to the CEO as well as how other
companies handle legal request such as law enforcement portals and Emergency Disclosure
Requests. SA
also answered questions the CEO had on how to assist LEO's in
investigations. Ultimately the CEO provided the requested information within a 24 hour period
which identified the subject sending the threats, who is based in Sweden. SA
was able to
build the relationship with the CEO and bridge it with the FBI. The CEO stated until the portal is
in place, that FBI could contact the company at abuseacriptext.com and ask for him directly if
necessary. An Intel product with all of the above information is in draft.
SA
then contacted ALAT
who is assisting in obtaining a DOB for the
identified suspect,
o assist SA
in placing a travel alert on DEKKER.
has also stated he will see if Sweden can admonish DEKKER.
Numerous other subpoenas have been served where after unmasking IP addresses, the
addresses resolve to Sweden, and additional open source research corroborates the subject is
SA
was contacted by
of San Francisco who was handling a bomb threat
in Kiev, where the subject was using Criptext as well. SA
was able to pass along the
above information to assist him on his case.
4
EFTA00172201
5
1/17/2020
5
EFTA00172202
6
1/17/2020
6
EFTA00172203
7
1 /17/2020
•
7
EFTA00172204
8
1/17/2020
8
EFTA00172205
9
1/17/2020
9
EFTA00172206
Document Preview
PDF source document
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.
This document was extracted from a PDF. No image preview is available. The OCR text is shown on the left.
Extracted Information
Document Details
| Filename | EFTA00172198.pdf |
| File Size | 154.8 KB |
| OCR Confidence | 85.0% |
| Has Readable Text | Yes |
| Text Length | 3,215 characters |
| Indexed | 2026-02-11T11:07:29.698945 |