Tuesday, October 14, 2025

🌱GrowNYC Volunteer Newsletter

 

GrowNYC Banner

GrowNYC Volunteer Newsletter

Register for our next Virtual Volunteer Orientation 

Fall Flowers

What's new: Interested in volunteering with GrowNYC? Join our online orientation where our Volunteer Program Manager will provide information about GrowNYC, local agriculture and food access, as well as current and upcoming volunteer opportunities.

Orientation is open to all, however, GrowNYC volunteers must be 18 years of age or older. The volunteer orientation is required to participate in our volunteer opportunities.

GrowNYC’s Volunteer Spotlight 
Penelope Hammond

Meet Penelope, our spotlight volunteer of the month! Read the interview below to learn more about Penelope.

1. How long have you been volunteering with GrowNYC?
I have been volunteering with GrowNYC for just over a year.

2. Why did you decide to volunteer with GrowNYC?
I decided to join and volunteer with GrowNYC when I was intrigued by the cooking demonstration post. Since cooking is one of my hobbies/interests, this activity quickly became one of my favorite volunteer activities. Whenever I arrive at a Farmstand or Greenmarket, doing a cooking demo is the first thing that comes to mind. It is also the activity that takes most of my time while volunteering. Another activity that I was amazed by within this organization is gardening. Gardening is my second favorite activity with GrowNYC.

3. Tell us about yourself, what interests you and how do you spend your time?
I love spending time in nature and reading at local cafe shops. I really enjoy reading memoirs since they give inspiration about life and I love learning about life. The way I spend time in nature is going on hiking trips. Other interests of mine are cooking and learning about nutrition/holistic health. I always learn something new while cooking. I am now into adding herbs as a topping to my foods, which gives an extra boost of flavor!

4. What has been your favorite moment/memory volunteering with GrowNYC so far?
My favorite memory of volunteering with GrowNYC is unforgettable! A GrowNYC staff member named Gregg Scott was ecstatic with the cooking demonstration that I made for customers and community members. This was at the Bed-Stuy Farmstand on a sunny humid day and I decided to make a salad that popped color to represent summer. Gregg was so impressed that he decided to take a picture of the salad. I will never forget his stunned reaction to the rich flavor of the salad.

Greenmarket & Farmstand Volunteer Opportunities 
Cooking Demo Taste Test

Volunteer with GrowNYC Greenmarkets and Farmstands to help support local farmers by creating a welcoming environment and ensuring they have opportunities to sell fresh produce. This is also a great way to do your part in helping ensure that all NYC residents have access to fresh and local produce!

These events are outdoors, rain or shine. Please dress for the weather and bring a reusable water bottle! Sign up for one or more opportunities at the following locations:

Staten Island:
Food Access Volunteer | Staten Island Mall Greenmarket | Saturdays (sign up)
Food Access Volunteer | St. George Greenmarket | Saturdays (sign up)

Queens:
Food Access Volunteer | Jackson Heights Greenmarket | Fridays (sign up)

Brooklyn:
Food Access Volunteer | Bay Ridge Greenmarket | Saturdays (sign up)
Food Access Volunteer | Bartel Pritchard Greenmarket | Sundays (sign up)

Manhattan:
Outreach & Cooking | Ruppert Park (92nd) Greenmarket | Sundays (sign up)
Outreach Volunteer | Tribeca Greenmarket | Saturdays (sign up)
Outreach Volunteer | Rockefeller Center Greenmarket | Wednesdays (sign up)
Food Access Volunteer | Uptown Grand Central Farmstand | Wednesdays (sign up)
Food Access Volunteer | 82nd Street Greenmarket | Saturdays (sign up)
Food Access Volunteer | Inwood Greenmarket | Saturdays (sign up)
Food Access Volunteer | 79th Street Greenmarket | Sundays (sign up)

Secretary Noem Announces U.S. Coast Guard to Receive Paychecks Despite Government Shutdown Thanks to One Big Beautiful Bill Funding

 

U.S. Department of Homeland Security Secretary Kristi Noem made the following announcement:  

“While Democrats have played politics with military pay to fight for illegal aliens, the US Coast Guard has been defending our maritime borders, stopping the flow of deadly narcotics and illegal immigration into our country, and countering America's adversaries around the world.  

“President Trump did not want any of our military to go without pay as a result of Democrats' political theater, and we at DHS worked out an innovative solution to make sure that didn't happen. 

“Thanks to President Trump's leadership and the One Big Beautiful Bill, the brave men and women of the US Coast Guard will not miss a paycheck this week as they continue to carry out their critical homeland security and military missions.” 

Chairman of Prince Group Indicted for Operating Cambodian Forced Labor Scam Compounds Engaged in Cryptocurrency Fraud Schemes

 

Department of Justice Files Largest Ever Forfeiture Action Against Approximately $15B in Bitcoin Currently in U.S. Custody

An indictment was unsealed today in federal court in Brooklyn, New York, charging UK and Cambodian national Chen Zhi, also known as Vincent, 37, the founder and chairman of Prince Holding Group (Prince Group), a multinational business conglomerate based in Cambodia, with wire fraud conspiracy and money laundering conspiracy for directing Prince Group’s operation of forced-labor scam compounds across Cambodia. Individuals held against their will in the compounds engaged in cryptocurrency investment fraud schemes, known as “pig butcheringscams, that stole billions of dollars from victims in the United States and around the world. The defendant is at large. 

The U.S. Attorney’s Office for the Eastern District of New York and the Justice Department’s National Security Division also filed today a civil forfeiture complaint against approximately 127,271 Bitcoin, currently worth approximately $15 billion, that are proceeds and instrumentalities of the defendant’s fraud and money laundering schemes, and were previously stored in unhosted cryptocurrency wallets whose private keys the defendant had in his possession. Those funds (the Defendant Cryptocurrency) are presently in the custody of the U.S. government. The complaint is the largest forfeiture action in the history of the Department of Justice. 

“Today’s action represents one of the most significant strikes ever against the global scourge of human trafficking and cyber-enabled financial fraud,” said Attorney General Pamela Bondi and Deputy Attorney General Todd Blanche. “By dismantling a criminal empire built on forced labor and deception, we are sending a clear message that the United States will use every tool at its disposal to defend victims, recover stolen assets, and bring to justice those who exploit the vulnerable for profit. We are grateful for the hard work of Director Patel and the men and women of the FBI.” 

“Today the FBI and partners executed one of the largest financial fraud takedowns in history,” said FBI Director Kash Patel. “This is an individual who allegedly operated a vast criminal network across multiple continents involving forced labor, money laundering, investment schemes, and stolen assets — targeting millions of innocent victims in the process. Justice will be done and I’m proud of the men and women of the FBI who executed the mission faithfully.”

“As alleged, the defendant was the mastermind behind a sprawling cyber-fraud empire operating under the Prince Group umbrella, a criminal enterprise built on human suffering. Trafficked workers were confined in prison-like compounds and forced to carry out online scams on an industrial scale, preying on thousands worldwide, including many here in the United States,” said Assistant Attorney General for National Security John A. Eisenberg. “This indictment and historic forfeiture, the largest in Department history, reflect our commitment to using every tool at our disposal to ensure such crimes do not pay.”

“As alleged, the defendant directed one of the largest investment fraud operations in history, fueling an illicit industry that is reaching epidemic proportions,” said U.S. Attorney Joseph Nocella Jr. for the Eastern District of New York. “Prince Group’s investment scams have caused billions of dollars in losses and untold misery to victims around the world, including here in New York, on the backs of individuals who have been trafficked and forced to work against their will. This historic indictment and forfeiture complaint send a strong message to fraudsters everywhere that we will pursue you no matter where you are, no matter who you are, and no matter your insidious methods, and we will never stop fighting for victims.”

As alleged in the indictment and forfeiture complaint, since approximately 2015, the defendant has been the founder and chairman of Prince Group, a Cambodian corporate conglomerate that operates dozens of business entities in more than 30 countries. Prince Group is ostensibly focused on real estate development, financial services, and consumer services. However, in secret, the defendant and his top executives grew Prince Group into one of Asia’s largest transnational criminal organizations. Under the defendant’s direction, Prince Group made enormous profits operating scam compounds across Cambodia that perpetrated fraudulent cryptocurrency investment schemes.

To perpetrate these schemes, malicious actors contacted unwitting victims through messaging or social media applications and convinced them to transfer cryptocurrency to specified accounts based on false promises that the funds would be invested and generate profits. In reality, the funds were stolen from the victims and laundered for the benefit of the perpetrators. The scam perpetrators often built relationships with their victims over time, earning their trust before stealing their funds.

Prince Group’s schemes targeted victims around the world, including in the United States, with assistance from local networks working on Prince Group’s behalf. One such network operated in Brooklyn, New York, and facilitated the fraudulent transfer and laundering of millions of dollars on behalf of Prince Group from over 250 victims in New York and across the country.

Prince Group carried out these schemes by trafficking hundreds of workers and forcing them to work in compounds in Cambodia and execute the scams, often under the threat of violence. The compounds housed vast dormitories surrounded by high walls and barbed wire, and functioned as violent forced labor camps. The defendant was directly involved in managing the scam compounds and maintained records associated with each one, including ledgers tracking profits and which fraudulent schemes were run out of which rooms. The defendant also maintained documents describing and depicting “phone farms” at the compounds: automated call centers that used thousands of phones and millions of mobile telephone numbers to facilitate the various fraudulent schemes. The defendant was directly involved in using violence against the individuals within the forced labor camps and possessed images of Prince Group’s violent methods, including photographs depicting beatings and other methods of torture. The defendant communicated directly with his subordinates about beating individuals who “caused trouble,” in one case specifying that the victims should not be “beaten to death.”

In furtherance of these schemes, the defendant and a close network of Prince Group’s top executives used their political influence in multiple foreign countries to protect their criminal enterprise and paid bribes to public officials to avoid disruption by law enforcement. They subsequently laundered the proceeds of the fraudulent schemes through professional money laundering operations and through Prince Group’s own network of ostensibly legal business enterprises, including its online gambling and cryptocurrency mining operations.

At the defendant’s direction, Prince Group associates used sophisticated cryptocurrency laundering techniques to obscure the source of fraudulent Prince Group profits, including “spraying” and “funneling” techniques in which large volumes of cryptocurrency were repeatedly disaggregated across scores of virtual currency addresses and then re-consolidated into fewer addresses to obscure the source of the funds. Some of these criminal proceeds were ultimately held in wallets at cryptocurrency exchanges or exchanged for traditional currency and stored in traditional bank accounts. Other criminal proceeds included the Defendant Cryptocurrency, which was stored in unhosted cryptocurrency wallets whose private keys the defendant personally held. The defendant maintained diagrams recording the process by which some of the Defendant Cryptocurrency was laundered. The defendant boasted to others of Prince Group’s mining businesses that “the profit is considerable because there is no cost” — that is, unlike legitimate enterprises, the operating capital for the cryptocurrency mining businesses comprised money stolen from Prince Group’s many victims.

The defendant and his co-conspirators subsequently used some of the criminal proceeds for luxury travel and entertainment and to make extravagant purchases such as watches, yachts, private jets, vacation homes, high-end collectables, and rare artwork, including a Picasso painting purchased through an auction house in New York City.

If convicted, the defendant faces a maximum penalty of 40 years in prison.

In parallel with today’s actions by the Department of Justice, the Department of the Treasury today designated Prince Group as a transnational criminal organization and announced sanctions against the defendant and multiple associated individuals and entities, for their roles in illicit activity. The United Kingdom’s Foreign, Commonwealth and Development Office also announced sanctions.

The FBI New York Joint Asian Criminal Enterprise Task Force is investigating the case, with assistance from the FBI’s Virtual Asset Unit.

If you have information about Chen Zhi or Prince Group, please contact the FBI at PrinceGroupTips@fbi.gov. According to the FBI Internet Crime Complaint Center’s 2024 Internet Crime Report, cryptocurrency investment fraud caused more than $5.8 billion in reported losses in 2024 alone. You can learn more about cryptocurrency investment fraud here. Members of the public who believe they are victims of cryptocurrency investment fraud and other cyber-enabled crime should contact the FBI Internet Crime Complaint Center at www.ic3.gov.

Assistant U.S. Attorneys Alexander F. Mindlin, Andrew D. Reich, Benjamin Weintraub and Rebecca M. Schuman for the Eastern District of New York are prosecuting the case in partnership with Deputy Chief Christopher B. Brown of the National Security Division’s NatSec Cyber Section, and Assistant U.S. Attorney Tanisha Payne for the Eastern District of New York’s Asset Recovery Section is handling forfeiture matters.

The Department of Justice’s Office of International Affairs provided valuable assistance duringthe investigation. The Government also thanks the United Kingdom’s National Crime Agency, the Isle of Man Constabulary’s Proactive International Money-Laundering Investigations Team and the United Kingdom’s Foreign, Commonwealth & Development Office, which also announced sanctions today against entities related to Prince Group.

An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

Attorney General James Secures $14.2 Million from Car Insurance Companies Over Data Breaches

 

Eight Car Insurance Companies’ Poor Cybersecurity Allowed Hackers to Steal Driver’s License Numbers to Fraudulently Obtain Unemployment Benefits
AG James Has Secured More Than $20 Million from 10 Car Insurance Companies for Data Security Failures Impacting Approximately One Million New Yorkers; AG James Encourages Companies to Follow OAG’s Guidance to Protect Consumers’ Personal Data 

New York Attorney General Letitia James today secured $14.2 million from eight car insurance companies for failing to protect the private information of more than 825,000 New Yorkers. The data breaches were part of a hacking campaign that targeted car insurance companies’ quoting tools and stole people’s personal information, including driver’s license numbers and dates of birth. The hackers later used some of the stolen driver’s license information to file fraudulent unemployment claims at the height of the COVID-19 pandemic.

An investigation by the Office of the Attorney General (OAG) and the New York State Department of Financial Services (DFS) concluded that the car insurance companies did not implement reasonable data security controls to protect consumers’ private information. Today’s settlements require all eight companies to pay penalties and significantly improve their data security. Affected New Yorkers were offered free credit report monitoring for one year. Attorney General James previously secured $6.5 million from four other car insurance companies for also failing to protect New Yorkers’ data. To date, Attorney General James has secured a total of $20.79 million from 10 auto insurance companies. Attorney General James encourages companies to follow guidance provided by her office to protect consumers’ personal data.

“New Yorkers pay hundreds of dollars in car insurance each month. When they go searching for a cheaper option, they should not have to worry that their private information could be stolen,” said Attorney General James. “These eight car insurance companies had poor cybersecurity that allowed hackers to easily steal New Yorkers’ personal information and use some of the information for fraud. I thank the Department of Financial Services and the Department of Labor for their partnership and continued work to hold companies accountable when they fail to protect consumers.” 

The car insurance companies involved in today’s settlements are: American Family Mutual Insurance Company/Midvale Indemnity CompanyFarmers InsuranceHagerty Insurance AgencyThe Hartford Insurance GroupInfinity Insurance CompanyLiberty Mutual InsuranceMetromile, and State Auto Mutual Insurance Company.

These companies allowed people to obtain a car insurance price quote using an online tool. Some of the companies also provided password protected tools to insurance agents to generate quotes for customers. 

The OAG’s investigation found that data thieves were able to exploit a “pre-fill” function in the companies’ online quoting tools. After limited private information about an individual was entered through an online quoting tool, the company would “pre-fill” the form with private information purchased from data brokers. The purpose of “pre-fill” was to insert information the user might not have on hand and make filling out the form easier. For example, by entering limited information into the tool, such as a person’s full name and date of birth, the other fields on the tool were pre-populated, such as an individual’s driver’s license numbers and similar information about other drivers in their household. The OAG found that the car insurance companies did not take reasonable steps to protect pre-fill private information. The attacks on these eight companies exposed the private information of over 825,000 New Yorkers. Some of the exposed data was later used to file unemployment claims during the COVID-19 pandemic.

The OAG’s investigation revealed that several companies suffered more than one attack, did not have common security tools in place to prevent and detect attacks, and/or did not use multifactor authentication to protect agent account credentials. Key findings from the investigations include: 

  • Farmers Insurance experienced three different attacks, exposing the private information of approximately 45,000 New Yorkers. After the first attack, Farmers did not identify similar vulnerabilities in additional tools that were also exploited.
  • American Family Mutual Insurance Company / Midvale Indemnity Company each exposed the private information of approximately 100,000 New Yorkers.  The companies mistakenly exposed the majority of these records after a transition between two security systems. The companies did not create a comprehensive protected data inventory before that transition and did not reasonably test the attacked tools after that transition.
  • State Auto Mutual Insurance Company exposed the private information of over 100,000 New Yorkers. State Auto’s quote tools were not protected by common security tools that monitor and detect suspicious patterns, such as excessive requests from the same user or multiple requests by the same user from different IP addresses.
  • Metromile exposed the private information of approximately 90,000 New Yorkers in a single attack that was not detected for two months. Metromile did not use common security tools to prevent and detect attacks.
  • Liberty Mutual Insurance experienced attacks on three different consumer quote tools, exposing the data of approximately 50,000 New Yorkers. The attacked tools had not been subject to a privacy assessment and they were not protected by common security tools.
  • The Hartford Insurance Group experienced two attacks that impacted approximately 30,000 New York consumers. While The Hartford maintained information security policies to protect consumer data, these policies were not implemented effectively.
  • The Hagerty Insurance Agency experienced two attacks that exposed the private information of approximately 66,000 New Yorkers. While Hagerty detected unusual activity on its consumer quote tool website, Hagerty did not immediately identify it as an attack on exposed private information.
  • The Infinity Insurance Company experienced three attacks. Data thieves accessed approximately 65,000 New Yorkers’ private information through a consumer quote tool and the information of approximately 180,000 New Yorkers through two password protected agent quoting tools. Infinity did not use multifactor authentication to protect its agent tool credentials at the time of the attacks. 

Today’s settlements require these companies to significantly enhance their data security and pay penalties, in the following amounts:

  • American Family Mutual Insurance Company/Midvale Indemnity Company will pay $2.8 million;
  • Farmers Insurance will pay $1.3 million;
  • Hagerty Insurance Agency will pay $1.3 million;
  • Infinity Insurance Company will pay $2 million;
  • The Hartford Insurance Group will pay $815,000;
  • Liberty Mutual Insurance will pay $2 million;
  • Metromile will pay $2 million; and
  • State Auto Insurance will pay $2 million.

In addition to the penalties, the companies are required to adopt a series of measures to strengthen their cybersecurity practices, including:

  • Maintaining a comprehensive information security program designed to protect the security, confidentiality, and integrity of private information;
  • Developing and maintaining a data inventory of private information and ensuring the information is protected;
  • Maintaining reasonable authentication procedures for access to private information;
  • Maintaining a logging and monitoring system as well as reasonable policies and procedures designed to properly configure systems to alert on suspicious activity; and
  • Enhancing their threat response procedures.  

Today’s settlements are the latest effort by Attorney General James to hold companies accountable for having poor cybersecurity. In March 2025, Attorney General James sued Allstate Insurance for failing to protect New Yorkers’ information, causing more than 165,000 New Yorkers’ information to be exposed. In November 2024, Attorney General James and Department of Financial Services Superintendent Adrienne Harris secured $11.3 million from GEICO and Travelers for having poor data security. In October 2024, Attorney General James secured $2.25 million from a Capital Region health care provider for failing to protect the private information and medical data of New Yorkers. In July 2024, Attorney General James launched two privacy guides, a Business Guide to Website Privacy Controls and a Consumer Guide to Tracking on the Web to help businesses with and consumers protect their data online. 

Statement from Governor Kathy Hochul

Governor Kathy Hochul New York State Seal

 “When Sumitomo closed its doors, my Administration got to work — day and night — to bring this site back to life. Its potential is too great, and the people of Tonawanda and Western New York too determined, to let it sit idle. Today’s announcement is a promising step forward, and I will keep standing with the workers and their families until this plant is once again driving jobs and opportunity.”

STATEMENT FROM NYGOP CHAIR ED COX ON HOCHUL’S EXPLODING MEDICAID HOME CARE CORRUPTION SCANDAL


NYGOP Chair Ed Cox released the following statement in response to the latest report on Kathy Hochul's burgeoning Medicaid scandal:

 

“This is the latest example of the corruption, incompetence and political pay-to-play that define Kathy Hochul’s Albany.

 

"Billions of taxpayer dollars have been funneled through a no-bid contract to a politically connected company that stole from thousands of vulnerable patients and home care workers. Even Democrats are now admitting what New Yorkers have long known: Hochul’s administration is rotten to the core.

 

"Governor Hochul owes New Yorkers a full accounting of who profited, who knew, and how this no-bid boondoggle was allowed to happen. The corruption and mismanagement driving families from this state start right at the top."