FBI San Diego described its field investigation that identified tickmilleas.com as a fraudulent cryptocurrency investment site used to defraud U.S. victims and supported the domain seizure carried out by the Scam Center Strike Force. The office highlighted victim reports that the website showed fabricated returns and noted coordination with app stores and social platforms to remove related apps and accounts.

The FBI’s San Diego Field Office provided details of its investigative work that helped identify and dismantle tickmilleas.com, a site used in a pig‑butchering style cryptocurrency fraud directed at Americans. San Diego agents interviewed victims, analyzed transaction flows, and traced communications that demonstrated how victims were recruited via dating and social platforms, directed to the fraudulent site, and convinced to transfer funds into cryptocurrency wallets. Victim statements described the site’s presentation of fake account balances and rapid, implausible returns intended to establish trust and prompt larger transfers. The field office worked in tandem with federal prosecutors and international partners to map the scheme’s digital footprint and to support seizure efforts. Coordinated outreach to major app stores and social media companies resulted in the removal of numerous mobile apps and social accounts tied to the compound, disrupting the scammers’ ability to onboard new victims. The release urged affected individuals to file complaints with IC3 and local law enforcement to assist ongoing tracing and asset recovery efforts.