FBI - Oregon
Emergency Messages as of 8:31 am, Sun. Dec. 16
No information currently posted. Operating as usual.
Subscribe to receive FlashAlert messages from FBI - Oregon. Please use any browser other than Internet Explorer.
Primary email address for a new account:

Emergency Alerts News Releases  
And/or follow our FlashAlerts via Twitter

About FlashAlert on Twitter:

FlashAlert utilizes the free service Twitter to distribute emergency text messages. While you are welcome to register your cell phone text message address directly into the FlashAlert system, we recommend that you simply "follow" the FlashAlert account for FBI - Oregon by clicking on the link below and logging in to (or creating) your free Twitter account. Twitter sends messages out exceptionally fast thanks to arrangements they have made with the cell phone companies.

Click here to add FBI - Oregon to your Twitter account or create one.

Hide this Message

Manage my existing Subscription

News Releases
Lt. Millican
Lt. Millican
Woodburn Police Lieutenant Graduates from the FBI National Academy (Photo) - 12/14/18

Lieutenant Jason Millican, Woodburn Police Department, recently completed one of the toughest challenges available to local law enforcement officers: the FBI National Academy. In mid-December, Lieutenant Millican and two other Oregon law enforcement officers completed a ten-week training session at the FBI National Academy in Quantico, Virginia.

There is a highly competitive process local law enforcement officers must go through to be selected for this honor. That process includes a nomination by a supervisor; interviews with the candidate and co-workers to determine leadership skills and abilities; a background check; a determination of physical fitness; and the support of former National Academy graduates within the candidate's organization.

"The exceptional law enforcement leaders selected to attend the National Academy each year have the unique opportunity to share their experiences with peers and learn best practices from officers from across the globe,” said Renn Cannon, Special Agent in Charge of the FBI in Oregon. “Only a few officers from Oregon have the chance to attend each year and we are proud to sponsor Lieutenant Millican and our other local partners in the National Academy."

Lieutenant Millican began his law enforcement career with the Woodburn Police Department in 1988 as a Police Officer. He was promoted in 2006 to the rank of Sergeant. During his career he has served as a patrol officer, K9 handler, patrol supervisor, tactical team member, detective supervisor, lead firearms instructor and range master. He became a Lieutenant in 2016 and he currently serves as the Operation Division commander overseeing patrol and traffic operations, the Mobile Crisis Response Team, and the Police K9 Unit.

"Lieutenant Millican has just completed an arduous ten week course of executive level study and a rigorous physical fitness program that has prepared him to help us take the Woodburn Police Department into the future. We are very proud of Jason for this accomplishment", said Woodburn Police Chief Jim Ferraris. "The FBI National Academy is really the 'finishing school' for command level police leaders. I look forward to Lieutenant Millican's continued contributions to our department and community".

During the ten weeks of training, local executive-level law enforcement officers spend most of their time in the classroom. Lieutenant Millican’s National Academy classes included: Essentials for Law Enforcement Executives; Emotional Intelligences; Cyber Threats; and Intelligence Theory. The program allows participants the opportunity to earn college credits through the University of Virginia for some of those studies. In addition to the classroom work, participants have physical training courses and activities.

Each year, the FBI sponsors four sessions of the National Academy. Each session includes about 220 local law enforcement officers from around the United States and around the world. While in the academy, the officers and deputies live in a dorm-like setting. The FBI does not charge U.S. students for tuition, books, equipment, meals, lodging or travel to and from their home.

Attached Media Files: Lt. Millican
Fake Ticket Scams Graphic
Fake Ticket Scams Graphic
Oregon FBI Tech Tuesday: Building a Digital Defense Against Fake Ticket Scams (Photo) - 12/11/18

Welcome to the Oregon FBI’s Tech Tuesday segment. This week: Building a digital defense against fake ticket scams.

If you are like me, you don’t want to give your kids (or husbands or parents) any more stuff. Sure all those presents look good under the Christmas tree, but enough is enough. I’m tired of cleaning the clutter out of the closets in my home and finding treasured gifts that I paid good money for still in the plastic wrap.

A better alternative always seems to be to give them “experiences,” right? Memories that will last a lifetime and earn me some good Mom or wife points down the road. These kinds of gifts can be spectacular – and spendy. Your goal this holiday shopping season is to find a good deal while still making sure that you don’t get taken. Nothing will ruin the “experience” of your “experience gift” more than showing up at a venue and finding out that your tickets are bogus. Concerts, professional sporting events and special events are all vulnerable to this scam.

Here are some tips to keep your ticket purchases on the up-and-up:

  • Pay with a credit card, not a debit card. This gives you a little more leverage to dispute the charge if something goes wrong.
  • Make sure the website is secure. Always look for the lock symbol and an “s” at the end of the “http” portion of the site’s URL.
  • Be wary if the site doesn’t have contact information for customer issues.
  • Likewise, watch out if the seller requires you use a wire transfer or gift card to pay for your purchase. This is a huge red flag.
  • Don’t buy from scalpers.
  • Popular online marketplaces often have legit tickets mixed in with frauds. Know that the risk of losing your money is high.
  • When searching for tickets online, don’t just choose the result at the top of your search list. Confirm that you know which company you are buying from and don’t just assume it is one of the more well-known options.
  • Don’t click on links or attachments in social media posts, emails or texts.

If you want to stay low-risk, consider using one of the re-sale platforms run by the major ticket vendors. You will pay that company’s ticket fee, but at least these bigger companies will guarantee that your re-sale ticket is legitimate.

If you have been victimized by this or any cyber fraud, be sure to report it to the FBI’s Internet Crime Complaint Center at www.ic3.gov or call your local FBI office.

FBI Media On-Call - 12/04/18

FBI PIO Beth Anne Steele is on leave starting at 5 pm on Tuesday, December 4th and returning to the office on Monday, December 17th. During this time, reporters needing assistance during normal business hours should email the on-call PIO at media.portland@fbi.gov. After hours, reporters can call the media pager at (503) 208-6241.


BEC Gift Card Audio
BEC Gift Card Audio
Oregon FBI Tech Tuesday: Building a Digital Defense Against Business Email Compromise Involving Gift Card Fraud (Photo) - 12/04/18

Welcome to the Oregon FBI’s Tech Tuesday segment. This week: Building a digital defense against Business Email Compromise, this time combined with gift card fraud.

Scammers know businesses are more likely to reward employees or thank customers during this time of year. ‘Tis the season, after all, for presents, incentives and end-of-year bonuses. That combined with an upward spike in business email compromise scams make companies particularly vulnerable to this kind of fraud.

Over the past year and a half – and especially in the last few months – the FBI’s Internet Crime Complaint Center – IC3.gov – has seen a huge increase in the number of businesses that are getting hit with this kind of fraud. From January 2017 to this fall, the adjusted loss topped $1 million.

The scam starts with a spoofed email or text from a person of authority, such as a CEO or HR director, telling an employee to purchase gift cards for the executive to give away or to use to purchase items, say, for a Christmas party. The employee is told to send the gift card info – including the number and PIN – back to the “boss” – really the fraudster – who then can cash out the value before you know there is a problem.

There are ways to prevent these types of scams:

  • Keep an eye out for email addresses that look similar to – but not exactly the same as – the ones used by your work supervisors or peers.
  • Be wary of requests to buy multiple gift cards, even if the request seems ordinary.
  • Watch out for grammatical errors or odd phrasing.
  • Notice language that tries to pressure you to purchase the cards quickly.
  • Finally, be wary if the sender asks you to send the gift card number and PIN back to him.

In any case, requests for gift card purchases or wire transfers should be highly scrutinized. Make sure your business uses two-factor authentication protocols or at least follow up a phone call to confirm any transfer of funds.

IC3 says that while this kind of fraud can happen to any company, there are a variety of sectors most at risk. They include the real estate, legal, medical, and distribution and supply parts of our economy as well as religious organizations.

If you have been victimized by this or any cyber fraud, be sure to report it to the FBI’s Internet Crime Complaint Center at www.ic3.gov or call your local FBI office.

BEC Update Graphic
BEC Update Graphic
Oregon FBI Tech Tuesday: Building a Digital Defense Against Business Email Compromise - Report Immediately ! (Photo) - 11/27/18

Welcome to the Oregon FBI’s Tech Tuesday segment. This week: building a digital defense against what’s called the Business Email Compromise Scam.

We’ve talked about this kind of scheme before. The traditional scam starts with Company A, Company B and the fraudster who jumps in between the two. The scammer uses an email address almost identical to the one used by a business executive at Company A as he communicates with a vendor or customer at Company B. The scammer is trying to convince Company B to route a payment into the scammer’s personal bank account instead of the Company A account. Usually the businesses have a long-standing relationship, and a request to have a big-dollar invoice paid by wire transfer doesn’t raise any flags.

In some cases, the bad guy actually hacks into the email account of the CEO or CFO at a victim company. This allows him to get in to read, receive or send emails at will. As an added twist, he can set rules within the email account to automatically forward to himself any email that includes a particular keyword or is from a particular sender. The emails pass through the legitimate executive’s account in a virtual sense – but that executive may never even see them as they get deleted from his inbox immediately.

One of the biggest problems that we in law enforcement face in stopping these crimes is that people don’t report when they do realize they are victims – or they wait several weeks to report it. This time lag allows the bad guys to move and hide the money overseas before we even have a chance to stop the transaction through the banks.

So what can businesses do? Here are a few options:

  • Avoid free web-based email accounts. Establish a company domain name and use it to create formal email addresses for your employees.
  • Check the “rules” setting on your account periodically to ensure that no one has set up auto-forwarding for your emails.
  • Be careful what you post to social media and your company website,
    especially information about who has which specific job duties. Also be cautious about using out-of-office replies that give too much detail about when your executives are out of the mix.
  • Require two-factor verification for money transfers, particularly big ones. For example – you could require a telephone call to confirm significant wire transfers. Be sure to set up this protocol early in the business relationship and outside the email environment. When the fraudster hacks your email account, you don’t want him to be able to see how to evade your security protocols.
  • Also, require your employees to use two-factor authentication to access corporate email accounts. They would need two pieces of information to log-in… something they know (such as a password) and something they have (such as a dynamic PIN that changes constantly).
  • When confirming money transfer requests, don’t rely on phone numbers or email addresses embedded in the request. Look up the number from an external source when calling.
  • Train your employees to watch for suspicious requests – such as a change in a vendor’s payment location.
  • Train your employees to avoid clicking on links or attachments from unknown senders. Doing so could download malware onto your company’s computers, making you vulnerable to a hack.

If you have been victimized by this scam or any other online scam, contact the FBI immediately. You can file an online report at the FBI’s Internet Crime Complaint Center at www.ic3.gov or call your FBI local office.

Attached Media Files: BEC Update Audio , BEC Update Graphic
Airfare Scams Graphic
Airfare Scams Graphic
Oregon FBI Tech Tuesday: Building a Digital Defense Against Airfare Scams (Photo) - 11/20/18

Welcome to the Oregon FBI’s Tech Tuesday segment. This week: building a digital defense against airfare scams.

We are just two days away from Turkey day – and only a month away from Christmas – leading us into one of the busiest travel seasons of the year. 

Going home to see the family – or maybe even jetting off to an exotic locale to celebrate in style – always seems better when you save money doing it. Today, though, we are warning of a travel scam that we are seeing reported more and more often.

In this fraud, the bad guy uses stolen credit cards to buy plane tickets for flights during peak holiday travel times. Once purchased, he will then cancel the ticket and collect a credit from the airline. With just a few keystrokes, he posts that credit for sale on a popular online sales platform. He gives some excuse as to why he had to cancel his trip – the more heartbreaking the better. He may even include the confirmation number from the original ticket in an attempt to make it look authentic.

You pick up those credits, points or vouchers at a below-market cost, leading you to think you got a great deal.

Of course, by this time the airline is wise to the fraud and cancels the voucher. When you go to cash in that great deal you bought, the airline tells you that you are out of luck. Bottom line on this one – don’t buy airline tickets or vouchers when you can’t verify the origin.

Another travel scam to watch out for – the promise of free airline tickets if you click on, like or repost something on social media. No airline is going to run a promotion like that or they would end up out of business. Oftentimes, these are scam artists who are just trying to build up a fan base for a completely different product or they are hoping to catch you in a phishing scam. You click on the wrong link and you can end up with malware on your device, leading to many months of fraudulent activity on your accounts.

To avoid this scam, make sure you follow your favorite airlines on their verified social media accounts. You will be able to find any legitimate special deals they may make available on those accounts.

Finally – a warning about false bookings. Much of the time, Americans are pretty adept at making their own reservations and travel arrangements. But if you are planning a really big or complex trip – especially an expensive one – a travel agent may make sense. In some cases, though, people are finding that their plane tickets or hotel reservations don’t exist after paying disreputable agents thousands of dollars. Do your homework and confirm that your agent is legitimate with a long history of good service.

If you have been victimized by one of these scams or any other online scam, contact the FBI immediately. You can file an online report at the FBI’s Internet Crime Complaint Center at www.ic3.gov or call your FBI local office.