Friday, June 6, 2025

VCJC News & Notes 6/6/25

 

Van Cortlandt Jewish Center
News and Notes

Picture

Here's this week's edition of the VCJC News and Notes email. We hope you enjoy it and find it useful!

Reminders

  1. Shabbos


    Shabbos information is, as always, available on our website, both in the information sidebar and the events calendar.
    Here are the times you need:  
    Shabbos Candles Friday 6/6/25 @ 8:06 pm
    Shabbos morning services at 8:40 am.  Please join the services if you can do so safely. 
    Shabbos Ends Saturday 6/7/25 @ 9:10 pm

    If you require an aliyah or would like to lead services, read from the torah or haftorah please speak to one of the gabbaim.
     

  2. Save the date

    Next Blood Drive has been scheduled for

    July 27, 2025, from 9:30 - 2:00 PM

    Please plan on participating.


Our mailing address is:

Van Cortlandt Jewish Center
3880 Sedgwick Ave
Bronx, NY 10463

DEC Announces New State Record Fallfish

 

Logo

Second Record-Breaking Fish Caught Within 10 Days

The New York State Department of Environmental Conservation (DEC) announced that a second fish species made the record books just 10 days after a channel catfish record was broken. Alex Pidhorodeckyj of Peekskill, NY, reeled in a 4 lb. 1 oz. fallfish from the St. Lawrence River near Massena while jigging for walleye and pike. Pidhorodeckyj’s catch broke the previous fallfish record caught in 2009 by half a pound.  

“A second New York State record broken in a matter of days is exciting news for our fisheries and our state,” said Commissioner Amanda Lefton. “DEC congratulates Alex Pidhorodeckyj on this record catch and advises anglers there are even more records waiting just below the water’s surface. With summer right around the corner, I encourage New Yorkers to get outside and experience how fun fishing can be across our abundant lakes, rivers, and streams.”   

Fallfish are the largest native minnow species in New York State and are commonly found in medium-sized streams to large, warmwater rivers. Not often sought after by anglers, fallfish are usually caught while targeting other species, such as smallmouth bass or trout. Fallfish have a reputation for putting up a good fight when caught.  

Pidhorodeckyj submitted details of his winning catch as part of DEC's newly revamped Angler Achievement Awards Program, which tracks state record fish and recognizes anglers who catch any of the 40 eligible fish species that meet or exceed the minimum qualifying lengths established for that species. Through this program, anglers can enter freshwater fish that meet specific qualifying criteria and receive official recognition of their catch along with a species-specific sticker commemorating their achievement.

The program’s three categories are: Angler Award; Youth Angler Award; and State Record. As part of the program revamp, anglers can now submit entries for qualifying catches from the convenience of their smart phone through an online entry form. For official program rules, eligible species, and associated minimum qualifying lengths, visit the Angler Achievement Awards webpage.

The program further supports Governor Kathy Hochul's “Get Offline, Get Outside” initiative that promotes physical and mental health by helping encourage New York’s children and families to put down their phones and computers, take a break from social media, and enjoy recreation and outdoor social gatherings. Anglers are encouraged to check out the Tackle Box feature in DEC’s HuntFishNY app that provides one-stop-shopping for information on access sites, stocking, regulations and more.

Louisiana Man Pleads Guilty to $3.8 Million Durable Medical Equipment Fraud Scheme

 

A Louisiana man pleaded guilty in connection with a five-year scheme to submit millions of dollars in fraudulent claims to Medicare for expensive and medically unnecessary medical equipment.

According to court documents, Michael L. Riggins, 62, of West Monroe, Louisiana, pleaded guilty to one count of conspiracy to commit health care fraud for his role in a durable medical equipment (DME) scheme. Riggins was the owner of Bluewater Healthcare (Bluewater), a DME supply company in West Monroe. From 2018 to 2023, Riggins paid for doctors’ orders for medically unnecessary DME and tricked doctors into signing DME orders and certificates of medical necessity in order to bill for it. Despite receiving hundreds of complaints regarding the fraudulent orders, Riggins submitted over $3.8 million in fraudulent claims to Medicare for supplying the DME and was reimbursed over $1.8 million.

Riggins is scheduled to be sentenced on Oct. 2 and faces a maximum penalty of 10 years in prison. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

Matthew R. Galeotti, Head of the Justice Department’s Criminal Division; Acting U.S. Attorney Alexander C. Van Hook for the Western District of Louisiana; and Deputy Inspector General for Investigations Christian J. Schrank of the U.S. Department of Health and Human Services, Office of Inspector General (HHS-OIG) made the announcement.

HHS-OIG is investigating the case.

Trial Attorneys Samantha Usher and Kelly Z. Walters of the Criminal Division’s Fraud Section and Assistant U.S. Attorney Robin McCoy for the Western District of Louisiana are prosecuting the case.

The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Force Program. Since March 2007, this program, currently comprised of nine strike forces operating in 27 federal districts, has charged more than 5,800 defendants who collectively have billed federal health care programs and private insurers more than $30 billion. In addition, the Centers for Medicare & Medicaid Services, working in conjunction with HHS-OIG, are taking steps to hold providers accountable for their involvement in health care fraud schemes. More information can be found at www.justice.gov/criminal-fraud/health-care-fraud-unit. 

Bronx River Sounds is back!

                      

Hey folks,


I’m reaching out to reintroduce a beloved staple program at BRAC:


Bronx River Sounds Festival is back — please join us for a celebration of the rich multicultural heritage of The Bronx and New York City through music, art, and community!


On Saturdays, June 14th, 21st, and 28th, BRAC will showcase an exciting lineup of musical guests from The Bronx and beyond, reimagining cultural traditions with contemporary flair to reflect the vibrant social fabric of our city. 


Each afternoon will kick off with interactive, family-friendly workshops, including live drawing, a salsa dance and movement session, and an Afro-Caribbean rhythm circle with live drummers.

We’d like to invite you and your friends, family, and fellow art lovers to Bronx River Sounds — and for a limited time, you can receive 50% off your ticket purchase with discount code BRACCOMMUNITY1. RSVP today!



RSVP here →

We can't wait to welcome you to BRAC for another unforgettable summer of rhythm, culture, and community!


See you soon,


Akia Squitieri

Executive Director, Bronx River Art Center


Secretary Noem Ends Politicized TSA Watchlist Program That Has Failed to Prevent a Single Terrorist Attack in its Existence; Calls for Congressional Investigation

 

The Quiet Skies Program is a redundant, corrupted program that costs US taxpayers $200 million a year

The Department of Homeland Security announced it is ending the Quiet Skies Program, which since its existence has failed to stop a single terrorist attack while costing US taxpayers $200 million a year. The program, under the guise of “national security,” was used to target political opponents and benefit political allies. TSA will continue performing important vetting functions tied to legitimate commercial aviation security threats to both ensure the safety of the American traveler and uphold its statutory obligations. REAL ID, implemented on May 7 of this year, will further help bolster TSA security. 

DHS and TSA have uncovered documents, correspondence, and timelines that clearly highlight the inconsistent application of Quiet Skies and watchlisting programs, circumventing security policies to benefit politically aligned friends and family at the expense of the American people. In addition to its own internal investigation, DHS’s Secretary Kristi Noem is calling for a Congressional investigation to uncover further corruption through this program.

“It is clear that the Quiet Skies program was used as a political rolodex of the Biden Administration—weaponized against its political foes and exploited to benefit their well-heeled friends. I am calling for a Congressional investigation to unearth further corruption at the expense of the American people and the undermining of US national security,” said Secretary Kristi Noem“TSA’s critical aviation and security vetting functions will be maintained, and the Trump Administration will return TSA to its true mission of being laser-focused on the safety and security of the traveling public. This includes restoring the integrity, privacy, and equal application of the law for all Americans.” 

DHS revealed earlier this week evidence detailing the politicization of TSA’s watchlisting program under the previous administration.

This includes William “Billy” Shaheen, spouse of fellow Democrat and sitting U.S. New Hampshire Senator, Jeanne Shaheen, being given blanket exemptions from review, while non-politically aligned members like then-Congresswoman Tulsi Gabbard received additional screening and monitoring by Federal Air Marshals.

Despite William Shaheen traveling with a known or suspected terrorist three times, then TSA Administrator Pekoske gave explicit direction to exclude Shaheen from the Silent Partner Quiet Skies list. After Senator Shaheen directly lobbied then former Administrator Pekoske, on her husband’s behalf, Pekoske granted Billy Shaheen a blanket Quiet Skies exemption. 

Shaheen was not the only high-profile individual that was placed on this exclusion list: this list also included members of foreign royal families, political elites, professional athletes, and favored journalists.

For more information on TSA security screening protocols, click here.

Department Files Civil Forfeiture Complaint Against Over $7.74M Laundered on Behalf of the North Korean Government

 

Forfeiture Action is the Latest Disruption of an Indicted North Korean Official’s Efforts to Generate Revenue for North Korea and its Weapons Program Through Illegal IT Worker Schemes and Cryptocurrency Theft

The Department of Justice filed a civil forfeiture complaint yesterday in the U.S. District Court for the District of Columbia alleging that North Korean information technology (IT) workers obtained illegal employment and amassed millions in cryptocurrency for the benefit of the North Korean government, all as a means of evading U.S. sanctions placed on North Korea. The funds were initially restrained in connection with an April 2023 indictment against Sim Hyon Sop (Sim), a North Korean Foreign Trade Bank (FTB) representative who was allegedly conspiring with the IT workers. While the North Koreans were attempting to launder those ill-gotten gains, the U.S. government was able to freeze and seize over $7.74 million tied to the scheme.

“This forfeiture action highlights, once again, the North Korean government’s exploitation of the cryptocurrency ecosystem to fund its illicit priorities,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “The Department will use every legal tool at its disposal to safeguard the cryptocurrency ecosystem and deny North Korea its ill-gotten gains in violation of U.S. sanctions.”

“For years, North Korea has exploited global remote IT contracting and cryptocurrency ecosystems to evade U.S. sanctions and bankroll its weapons programs,” said Sue J. Bai, Head of the Justice Department’s National Security Division. “This multimillion-dollar forfeiture action reflects the Department’s strategic focus on disrupting these illicit revenue schemes. We will continue to use every legal tool available to cut off the financial lifelines that sustain the DPRK and its destabilizing agenda.”

“Crime may pay in other countries but that’s not how it works here,” said U.S. Attorney Jeanine Ferris Pirro for the District of Columbia. “Any adversary who thinks they can benefit, financially, from executing a criminal scheme – whether directly or through the use of surrogates – had better rethink this ‘get rich quick’ strategy. It doesn’t work for the average citizen, and it certainly does not have a more positive outcome for foreign entities. Sanctions are in place against North Korea for a reason, and we will diligently investigate and prosecute anyone who tries to evade them. We will halt your progress, strike back, and take hold of any proceeds you obtained illegally.”

“The FBI’s investigation has revealed a massive campaign by North Korean IT workers to defraud U.S. businesses by obtaining employment using the stolen identities of American citizens, all so the North Korean government can evade U.S. sanctions and generate revenue for its authoritarian regime,” said Assistant Director Roman Rozhavsky of the FBI Counterintelligence Division. “This action shows the FBI will do everything in our power to protect Americans from being victimized by the North Korean government, and we ask all U.S. companies that employ remote workers to remain vigilant to this new and sophisticated threat.” 

According to the complaint, the North Korean government uses illegally obtained cryptocurrency as a means of generating revenue for its priorities. This illegally obtained cryptocurrency is allegedly generated, in part, through remote work done by North Korean IT workers deployed around the globe, including in the People’s Republic of China and the Russian Federation (Russia). Those IT workers have generated revenue for North Korea via their jobs at, among other places, blockchain development companies. To obtain employment, these North Korean IT workers allegedly bypassed security and due diligence checks using fraudulent (or fraudulently obtained) identification documents and other obfuscation strategies. These tactics hid the North Koreans’ true location and identities, causing unwitting employers to hire them and pay them a salary, often in stablecoins, such as USDC and USDT.

To send their illegally obtained cryptocurrency back to North Korea, the IT workers allegedly transferred the cryptocurrency using money laundering techniques. These techniques included: (1) setting up accounts with fictitious identities; (2) moving funds in a series of small amounts; (3) moving funds to other blockchains or converting funds to other forms of virtual currency (i.e., “chain hopping” and “token swapping,” respectively); (4) purchasing non-fungible tokens as a store of value and means of hiding illicit funds; (5) using U.S.-based online accounts to legitimize activity; and (6) commingling their fraud proceeds to hide the origin of the funds. After laundering these funds, the North Korean IT workers allegedly sent them back to the North Korean government, at times via Sim and Kim Sang Man (Kim). Kim is a North Korean national who is the chief executive officer of “Chinyong,” also known as “Jinyong IT Cooperation Company.” Chinyong is subordinate to North Korea’s Ministry of Defense (formerly known as the Ministry of the Peoples’ Armed Forces), which the Treasury Department’s Office of Foreign Assets Control (OFAC) added to its list of Specially Designated Nationals (SDN) on June 1, 2017.

Chinyong employs delegations of North Korean IT workers that operate in, among other countries, Russia and Laos. Kim allegedly acts as an intermediary between the North Korean IT workers and North Korea’s FTB by sending funds from the North Korean IT workers to Sim.

On April 24, 2023, OFAC added Sim to its SDN list. On May 23, 2023, OFAC added Chinyong and Kim to its SDN list.

This forfeiture action follows the Department’s announcement of two federal indictments charging Sim for allegedly conspiring (1) with North Korean IT workers to generate revenue through illegal employment at companies in the United States and abroad; and (2) with over-the-counter cryptocurrency traders to use stolen funds to buy goods for North Korea. The forfeiture action also follows on successful actions to disrupt North Korean revenue generation taken by the Department in May 2024August 2024December 2024, and January 2025. Those actions, which are part of the Department-wide DPRK RevGen: Domestic Enabler Initiative launched in March 2024 by the National Security Division and the FBI’s Cyber and Counterintelligence Divisions, targeted U.S. persons facilitating remote IT work and their North Korean co-conspirators.

The FBI Chicago Field Office and FBI’s Virtual Assets Unit are investigating the cases associated with this complaint.

Senior Counsel Jessica Peck of the Computer Crime and Intellectual Property Section, Trial Attorney Gregory J. Nicosia Jr. of the National Security Division’s National Security Cyber Section, Trial Attorney Emma Ellenrieder of the National Security Division’s Counterintelligence and Export Control Section, and Assistant U.S. Attorneys Christopher Tortorice and Rick Blaylock for the District of Columbia are handling the prosecutions and forfeiture action. Significant assistance was provided by former FBI Supervisory Special Agent Chris Wong.

The FBI, in conjunction with the State and Treasury Departments, issued a May 2022 advisory to alert the international community, private sector, and public about the North Korea IT worker threat. Updated guidance was issued in October 2023 by the United States and the Republic of Korea (South Korea), and in May 2024 by the FBI, which include indicators consistent with the North Korea IT worker fraud and the use of U.S.-based laptop farms. In January 2025, the FBI issued additional guidance regarding extortion and theft of sensitive company data by North Korean IT workers, along with recommended mitigations.