Skip to main content
Skip to content
Case File
efta-efta00172198DOJ Data Set 9Other

1/17/2020

1 1/17/2020 SIGNIFICANT ACTIVITIES VIOLENT CRIMINAL THREAT (VCT) Branch OVERALL SOPHISTICATED TECHNIQUES/STATS METHODS ARRESTS CONVICTIONS DISRUPTIONS DISMANTLEMENTS YTD=Year to Date I. Major Operational Matters (Arrests/Indictments/Convictions/Sentences /Searches/Drug Buys) 1. EFTA00172198 2 1/17/2020 2 EFTA00172199 3 1/17/2020 Efl 3 EFTA00172200 4 1/17/2020 C-19; 9A-NY-3217706; SUBJECT -"RINGER", VICTIM- EXTORTION, THREATENING COMMUNICATIONS; C/A SA On 01/08/2020, a cooperating defendant in the JEFFREY EPSTEIIN case reported to the FBI that he/she was receiving Overt Extortion threats via email. The subject was communicating via an application called CRIPTEXT and sending daily emails since 01/01/2020 to the victim, requesting money via paypal and Bitcoin in exchange to keep the subject from exposing information about the victim's relationship with JEFFREY EPSTEIN and others. If the subject did not receive payment, the subject would fabricate false

Date
Unknown
Source
DOJ Data Set 9
Reference
EFTA 00172198
Pages
11
Persons
1
Integrity

Summary

1 1/17/2020 SIGNIFICANT ACTIVITIES VIOLENT CRIMINAL THREAT (VCT) Branch OVERALL SOPHISTICATED TECHNIQUES/STATS METHODS ARRESTS CONVICTIONS DISRUPTIONS DISMANTLEMENTS YTD=Year to Date I. Major Operational Matters (Arrests/Indictments/Convictions/Sentences /Searches/Drug Buys) 1. EFTA00172198 2 1/17/2020 2 EFTA00172199 3 1/17/2020 Efl 3 EFTA00172200 4 1/17/2020 C-19; 9A-NY-3217706; SUBJECT -"RINGER", VICTIM- EXTORTION, THREATENING COMMUNICATIONS; C/A SA On 01/08/2020, a cooperating defendant in the JEFFREY EPSTEIIN case reported to the FBI that he/she was receiving Overt Extortion threats via email. The subject was communicating via an application called CRIPTEXT and sending daily emails since 01/01/2020 to the victim, requesting money via paypal and Bitcoin in exchange to keep the subject from exposing information about the victim's relationship with JEFFREY EPSTEIN and others. If the subject did not receive payment, the subject would fabricate false

Persons Referenced (1)

Tags

eftadataset-9vol00009

Ask AI About This Document

0Share
PostReddit

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
1 1/17/2020 SIGNIFICANT ACTIVITIES VIOLENT CRIMINAL THREAT (VCT) Branch OVERALL SOPHISTICATED TECHNIQUES/STATS METHODS ARRESTS CONVICTIONS DISRUPTIONS DISMANTLEMENTS YTD=Year to Date I. Major Operational Matters (Arrests/Indictments/Convictions/Sentences /Searches/Drug Buys) 1. EFTA00172198 2 1/17/2020 2 EFTA00172199 3 1/17/2020 Efl 3 EFTA00172200 4 1/17/2020 C-19; 9A-NY-3217706; SUBJECT -"RINGER", VICTIM- EXTORTION, THREATENING COMMUNICATIONS; C/A SA On 01/08/2020, a cooperating defendant in the JEFFREY EPSTEIIN case reported to the FBI that he/she was receiving Overt Extortion threats via email. The subject was communicating via an application called CRIPTEXT and sending daily emails since 01/01/2020 to the victim, requesting money via paypal and Bitcoin in exchange to keep the subject from exposing information about the victim's relationship with JEFFREY EPSTEIN and others. If the subject did not receive payment, the subject would fabricate false emails appearing to be sent by the victim, to the subject, and then post these emails on a Twitter account. The subject followed through with posting when the money was not received. The emails contained information that was false in nature, but slandered the reputation of the victim. No information on CRIPTEXT was not found in any bureau system regarding cases using this application etc. CRIPTEXT was established in 2014 and is a fairly small company. The company ,des end to end encryption for users to use they GMAIL and mask their IPs via VPNs. SA contacted the company via email, and eventually spoke to the CEO. The CEO had never had legal services requested and was unfamiliar with the protocol, however was willing to assist in anyways possible. SA explained the subpoena process to the CEO as well as how other companies handle legal request such as law enforcement portals and Emergency Disclosure Requests. SA also answered questions the CEO had on how to assist LEO's in investigations. Ultimately the CEO provided the requested information within a 24 hour period which identified the subject sending the threats, who is based in Sweden. SA was able to build the relationship with the CEO and bridge it with the FBI. The CEO stated until the portal is in place, that FBI could contact the company at abuseacriptext.com and ask for him directly if necessary. An Intel product with all of the above information is in draft. SA then contacted ALAT who is assisting in obtaining a DOB for the identified suspect, o assist SA in placing a travel alert on DEKKER. has also stated he will see if Sweden can admonish DEKKER. Numerous other subpoenas have been served where after unmasking IP addresses, the addresses resolve to Sweden, and additional open source research corroborates the subject is SA was contacted by of San Francisco who was handling a bomb threat in Kiev, where the subject was using Criptext as well. SA was able to pass along the above information to assist him on his case. 4 EFTA00172201 5 1/17/2020 5 EFTA00172202 6 1/17/2020 6 EFTA00172203 7 1 /17/2020 7 EFTA00172204 8 1/17/2020 8 EFTA00172205 9 1/17/2020 9 EFTA00172206 EFTA00172207 EFTA00172208

Technical Artifacts (2)

View in Artifacts Browser

Email addresses, URLs, phone numbers, and other technical indicators extracted from this document.

Domainabuseacriptext.com
Phone3217706

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.