FBI - Oregon
Emergency Messages as of 10:23 am, Sun. Mar. 18
No information currently posted. Operating as usual.
Subscribe to receive FlashAlert messages from FBI - Oregon. Please use any browser other than Internet Explorer.
Primary email address for a new account:

Emergency Alerts News Releases  
And/or follow our FlashAlerts via Twitter

About FlashAlert on Twitter:

FlashAlert utilizes the free service Twitter to distribute emergency text messages. While you are welcome to register your cell phone text message address directly into the FlashAlert system, we recommend that you simply "follow" the FlashAlert account for FBI - Oregon by clicking on the link below and logging in to (or creating) your free Twitter account. Twitter sends messages out exceptionally fast thanks to arrangements they have made with the cell phone companies.

Click here to add FBI - Oregon to your Twitter account or create one.

Hide this Message

Manage my existing Subscription

News Releases
Alberto Hinojosa2
Alberto Hinojosa2
FBI Asking for Public's Help Finding Medford Fugitive Convicted of Dealing Methamphetamine (Photo) - 03/16/18

The FBI is asking for the public's help in locating Alberto Hinojoso of Medford, Oregon. On 4/11/16, Hinojosa pled guilty to possession with intent to distribute 50 or more grams of methamphetamine before a federal judge. The judge set sentencing for April 12, 2017. On or about January 1, 2017, Hinojoso failed to return from a planned trip to Las Vegas, Nevada. On May 4, 2017, a federal grand jury indicted him for failure to appear for sentencing, and a judge issued an arrest warrant.

The FBI has posted Hinojoso's wanted flyer in English and Spanish at: https://www.fbi.gov/wanted/cei/alberto-hinojosa

Hinojoso is described as follows:

* Race: White (Hispanic)
* Eyes: Brown
* Hair: Black
* Height: 5'11"
* Weight: 180lbs
* Other: Scars on right calf and right finger

Hinojoso's last known address is in Medford, Oregon, although he is known to have family connections in Stockton, California. He is also believed to have ties to Bakersfield, California.

Anyone with information about Hinojoso's location should contact their local FBI office or submit a tip via https://tips.fbi.gov. In Oregon, call the FBI in Medford at (541) 773-2942 or the FBI in Portland at (503) 224-4181. In California, call the FBI in Los Angeles at (310) 477-6565 or the FBI in Sacramento at (916) 746-7000.

Attached Media Files: Alberto Hinojosa2 , Alberto Hinojosa1
FBI Tech Tuesday: Building a Digital Defense Against Tax Refund Fraud (Photo) - 03/13/18

Welcome to the Oregon FBI's Tech Tuesday segment. This week, building a digital defense against tax fraud.

Last week we talked about theft of your W-2 information from your employer. This week -- we are focusing on scams that target individual taxpayers.

The IRS recently warned about a new scam in which a fraudster steals client data from a tax preparer, files a return and then has the money deposited in the legitimate taxpayer's real bank account. The fraudster then calls the taxpayer saying the refund was deposited in error and threatens to send the matter to a collection agency if the taxpayer doesn't "return" the money by sending it to the fraudster.

In another version of this refund scam, the IRS warns that some people are getting calls accusing them of committing fraud. The taxpayer is threatened with criminal charges, an arrest warrant and the "blacklisting" of his Social Security number if he doesn't immediately return the refund. Of course, the scam artist ensures that the "return" ends up getting routed to his own bank account.

If you do receive an erroneous check or refund in your account -- don't spend that money. Check with the IRS to determine the appropriate way to report the ID theft and to return the money.

Another tax scam to watch for involves phony calls from the IRS targeting vulnerable populations -- particularly new immigrants. The callers may spoof the phone number to make the caller ID appear to be from a real IRS office, and the fraudsters often approach the victims in their native language if they have limited English proficiency.

Victims are told they owe money to the IRS and must pay right away to avoid arrest, deportation or suspension of a business or driver's license. The caller often suggests the victim pay the fake debt with gift cards or wire transfers. In some instances, they will demand the victim's credit or debit card number over the phone to settle the debt immediately.

The most important thing to know is that the IRS will never initiate contact with taxpayers by email, text messages or social media. IRS officials will not call to demand immediate payment, nor will they demand that you pay without the opportunity to ask questions or file an appeal. If the IRS is trying to collect a debt or audit you, they will always attempt to contact you by mail first.

If you have any questions about a suspected fraud, contact the IRS.

If you have been victimized by this online scam or any other cyber fraud, be sure to also report it to the FBI's Internet Crime Complaint Center at www.ic3.gov or call your local FBI office.

TT - W2 theft - March 6, 2018
TT - W2 theft - March 6, 2018
FBI Tech Tuesday: Building a Digital Defense Against W-2 Theft (Photo) - 03/06/18

Welcome to the Oregon FBI's Tech Tuesday segment. This week, building a digital defense against W-2 fraud.

We are still a good month away from April's tax filing deadline -- but this is prime time for scam artists looking to cash in on your personal tax information. The FBI's Internet Crime Complaint Center recently issued an updated warning for businesses and employees to be on the watch for W-2 theft. If a cyber thief gets ahold of your W-2, he now has the ability to file your tax return -- and get your refund -- before you do. He also has access to a great deal of personally identifiable information including your Social Security number... and that can lead to a whole host of other frauds.

The most common way a scam artist gets your W-2 is through a phishing scheme -- that's phishing with a "ph". He pretends to be an executive at the company and sends an email to the HR department requesting employees' personal information or their W-2's, allegedly for tax or audit purposes. In some cases, the fraudsters have been able to cause a massive data dump affecting thousands of employees.

Sometimes these requests for data are followed by or combined with a more traditional business-email-compromise scheme where the fraudster convinces the finance department to also make unauthorized wire transfers under the executive's spoofed authority.

Here are some basic steps that businesses can take to mitigate the threat:

* Limit the number of people who have access to employees' personal info and W-2's.

* Set up two-factor verification systems to confirm the request and receipt of such sensitive information. This could be as simple as a phone call or a face-to-face meeting.

* Establish protocols for sensitive information requests ahead of time and outside of the email environment. You don't want a hacker who already has access to your system to know what your back-up security measures include.

* Ensure that you secure sensitive PII and W-2 information with encryption.

* Establish and maintain robust and strong security for your data, including firewalls, virus protection and spam filters.

Businesses that have suffered a data breach involving tax information should immediately report that breach to the IRS and your state tax agency. The IRS also wants to hear from you if you received a W-2 phishing email but did not fall victim to the scam.

If you have been victimized by this online scam or other cyber fraud, be sure to also report it to the FBI's Internet Crime Complaint Center at www.ic3.gov or call your local FBI office.

FBI Arrests Yakima Man on Assault and Sex Abuse Charges of Oregon Woman - 03/01/18

On Tuesday, February 27, 2018, FBI agents arrested Almonzo Antonio Castaneda, age 34, on charges of sexual abuse, assault of a spouse or intimate partner by strangulation and assault by striking, beating or wounding. The arrest, at Castaneda's home in Yakima, Washington, was without incident.

Castaneda is charged by criminal complaint for his alleged actions toward a partner between January and February 2018 on the Confederated Tribes of the Umatilla Indian Reservation (CTUIR). The woman is a tribal member; Castaneda is not.

Castaneda is currently lodged at the Yakima County Jail. He made his initial appearance before a federal magistrate in Yakima on February 28, 2018, and is scheduled to have a detention hearing on Friday, March 2, 2018. As the judicial process proceeds, his case will be moved back to the U.S. District Court in Oregon.

A complaint is only an accusation of a crime, and all defendants should be presumed innocent until proven guilty.

Tuesday's arrest included agents from the FBI's Pendleton, Bend and Yakima Resident Agencies and the FBI Seattle SWAT team.


Froggy Robber - Side profile b
Froggy Robber - Side profile b
Financial Institutions Security Task Force Adds to "Froggy Robber" Reward - Now up to $30,000 Total (Photo) - 02/27/18

The Oregon Financial Institutions Security Task Force (FIST) has added up to $10,000 to the reward being offered for information leading to the identification, arrest and conviction of the "Froggy Robber". This is in addition to a reward of up to $10,000 being offered by the FBI and a reward of up to $10,000 being offered by Wells Fargo.

The FBI believes the Froggy Robber is responsible for up to six bank robberies in Oregon and SW Washington since October. In each case, the suspect approached the teller counter, jumped the counter and robbed the employees at knifepoint. Those robberies include:

+ October 19, 2017 - Columbia Bank located at 1455 Southeast 1st Avenue in Canby
+ November 27, 2017 - Albina Community Bank located at 2002 NE Martin Luther King Jr Boulevard in Portland
+ December 27, 2017 - Wells Fargo Bank located at 8699 SW Main Street in Wilsonville
+ January 11, 2018 - Wells Fargo Bank located at 6785 Beaverton Hillsdale Highway in Beaverton
+ February 1, 2018 - US Bank located at 52313 Columbia River Highway in Scappoose
+ February 12, 2018 -- Wells Fargo Bank located at 1800 Main Street in Vancouver

Witnesses describe the robber as:

Hispanic man
Age: 20 to mid-30's
Height: 5'3" -- 5'5"
Weight: 130-160 pounds

The robber should be considered armed and dangerous.

Anyone with information about the suspected robber's identity or location is asked to call the FBI in Portland at (503) 224-4181 or submit a tip through the online portal at https://www.fbi.gov/tips

++About FIST++
FIST is a cooperative effort of banks and credit unions doing business in Oregon, along with local, state and federal law enforcement agencies. The sole purpose of FIST is to help reduce crimes committed against financial institutions, and by so doing, ensure the safety of staff and customers.

++About the Oregon Bankers Association++
Established in 1905, the Oregon Bankers Association is Oregon's only full-service trade association representing FDIC-insured state and national banks and trust companies doing business in Oregon. More information is available at www.oregonbankers.com.


Note to media: A wanted flyer is available via the FBI's Unknown Bank Robber website at https://bankrobbers.fbi.gov/robbers-container/2017-10-25.8983125421

A video compilation is available at https://www.youtube.com/watch?v=W-C7s8xkqjU

Child ID Theft image
Child ID Theft image
FBI Tech Tuesday: Building a Digital Defense Against Child ID Theft (Photo) - 02/27/18

Welcome to the Oregon FBI's Tech Tuesday segment. This week, building a digital defense against child ID theft.

Anyone with kids will tell you that parenting is no easy task, but the dark side of technology is making an already-challenging job even harder.

This week we are talking about criminals who focus their attention on the smallest members of your family. They do it for two simple reasons: kids come with clean credit histories and their parents don't often notice there's a problem until years down the road.

Trafficking in children's Social Security numbers can be very profitable on the dark web -- the younger the child, the better. Why? Because an unused Social Security number can be paired with any name and date of birth, and that is a valuable tool for any kind of criminal.

What happens after your child's info is stolen and sold? The fraudsters can take out mortgages or car loans in your kid's name. They can also rack up huge credit card debt, obtain fraudulent immigration documents and more. They may share the info with other thieves, connecting multiple names to your child's number. Cleaning up this mess can be difficult and time-consuming, and your child may suffer long-term consequences as a result. When the time comes, he or she may not be able to qualify for student loans, get a credit card or be able to rent a place to live.

The original theft can happen in any number of ways -- data breach of a health care facility or business; improper disposal or leakage of information from a school; or over-sharing of information online. The result is the same.

Here are some warning signs to watch for:

* You get a notice from the IRS saying your child didn't pay the appropriate taxes
* Your child starts receiving credit card offers
* Your child receives a jury summons
* Collection agencies or companies attempt to contact your child about an unpaid bill

Our friends at the Federal Trade Commission have some advice on what you can do if this happens to your family:

* Contact each of the three major credit reporting agencies. You will likely need the child's birth certificate, proof of his or her Social Security number and government-issued ID proving who you are.
* Ask for the agencies to search for your child and your child's Social Security number to determine if there are any associated credit reports. If so, ask that all fraudulent accounts and collection notices be removed from that report.
* Place a fraud alert on your child's information with the credit reporting agencies and file a fraud alert with the FTC.
* Contact any business that is listed in the credit report and ask them to close the account and have it marked as fraudulent.
* Make sure to document every call you make and letter you send.

If you have been victimized by an online scam, be sure to report it to the FBI's Internet Crime Complaint Center at www.ic3.gov or call your local FBI office.

TT - Passwords
TT - Passwords
FBI Tech Tuesday: Building a Digital Defense with Robust Passwords (Photo) - 02/20/18

Welcome to the Oregon FBI's Tech Tuesday segment. This week, building a digital defense with strong passwords.

If you are like most of the rest of us -- remembering the 50,000 passwords you are required to use each day can be overwhelming. So overwhelming, in fact, that many people just use the same password -- or a variation of one -- over and over again. Regardless of how many special characters, numbers and capital letters that you put into it -- it is still the same password over and over again.

The people at the National Institute of Standards and Technology -- an agency within the U.S. Department of Commerce -- say that's not good enough. According to NIST researchers, more than 80% of hacking-related breaches used stolen or weak passwords.

Using the same few passwords over multiple platforms, apps, websites and the like is dangerous. Even when you are required to change the password every 90 or 120 days, that's usually not much help because most people just change a single character or add a number at the end of the old password.

So -- what does NIST recommend now? According to those government researchers:

Your password needs to be at least 8 characters, but generally the longer the better. They suggest using passphrases, not single words. For instance -- think of a crazy picture in your head such as "purple cows swim with bananas". You now have a 25-character password that is much stronger than a 6-character password with special symbols, numbers and capitals. And, as a bonus, you are more likely to remember it. Easier for you -- harder for hackers.

Focus on your most important accounts -- such as your email and bank accounts. Give each of these a unique passphrase.

Don't rely on passwords alone. Two-factor authentication is your friend. This requires something you know -- like a password PLUS something you get -- like a randomly generated PIN or code sent to your phone or hard token. If you can set one up on any particular account -- do so.

Don't want to deal with any of this? Consider using a reputable password manager. That's software or an app that generates unique passwords for every one of your accounts.

In the end, remember that there is no perfect system, but there are simple things you can do to make it more difficult for hackers to enter your virtual home.

If you have been victimized by an online scam, be sure to report it to the FBI's Internet Crime Complaint Center at www.ic3.gov or call your local FBI office.