DNI Releases Budget Figure for FY 2019 Appropriations Requested for the National Intelligence Program

Source: United States Director of National Intelligence

Headline: DNI Releases Budget Figure for FY 2019 Appropriations Requested for the National Intelligence Program

Consistent with Section 601 of the Implementing the Recommendations of the 9/11 Commission Act of 2007, as amended (50 U.S.C. 3306), the Director of National Intelligence is disclosing to the public the aggregate amount of appropriations requested for Fiscal Year 2019.

NEWS RELEASE

FOR IMMEDIATE RELEASE
ODNI News Release No. 11-18
February 27, 2018

DNI Releases Budget Figure for FY 2019 Appropriations Requested
for the National Intelligence Program

Consistent with Section 601 of the Implementing the Recommendations of the 9/11 Commission Act of 2007, as amended (50 U.S.C. 3306), the Director of National Intelligence is disclosing to the public the aggregate amount of appropriations requested for Fiscal Year 2019.

The aggregate amount of appropriations requested for the FY 2019 National Intelligence Program is $59.9 billion, which includes funding requested to support Overseas Contingency Operations.

Any and all subsidiary information concerning the NIP budget, whether the information concerns particular intelligence agencies or particular intelligence programs, will not be disclosed.  Beyond the disclosure of the NIP top-line figure, there will be no other disclosures of currently classified NIP budget information because such disclosures could harm national security. The only exceptions to the foregoing are for unclassified appropriations, such as for the Intelligence Community Management Account.

IARPA Launches “SuperTools” Program to Develop Superconducting Circuit Design Tools

Source: United States Director of National Intelligence

Headline: IARPA Launches “SuperTools” Program to Develop Superconducting Circuit Design Tools

NEWS RELEASE

FOR IMMEDIATE RELEASE
ODNI News Release No. 10-18
February 22, 2018

IARPA Launches “SuperTools” Program to Develop
Superconducting Circuit Design Tools

WASHINGTON – The Intelligence Advanced Research Projects Activity, within the Office of the Director of National Intelligence, announces today the “SuperTools” program, a multi-year research effort to develop comprehensive software tools for designing and analyzing superconducting electronics circuits.

This software would enable the user to design complex circuits with greater speed while using less power, which is no match for today’s semiconductor technology. “Modern electronic design tools are the core of the semiconductor revolution and have allowed ever more sophisticated electronic circuits to be designed and eventually built. Superconducting electronics offers the possibility of even faster and lower power circuits, but the design tools still need to be developed.” said Mark Heiligman, IARPA program manager.

Through a competitive Broad Agency Announcement, IARPA has awarded SuperTools research contracts to teams led by the University of Southern California and Synopsys Inc. Government agencies and national laboratories, including Lawrence Berkeley National Laboratory, National Institute of Standards and Technology, MIT Lincoln Laboratory, and Sandia National Laboratories will assist IARPA in conducting independent test and evaluation of the tool suites and associated design methodologies developed by each team. IARPA has partnered with the U.S. Army Research Office in the management of the SuperTools program.

IARPA invests in high-risk, high-payoff research programs to tackle some of the most difficult challenges of the agencies and disciplines in the Intelligence Community. Additional information on IARPA and its research may be found on www.iarpa.gov.

You have identified 70 objects taken from child sexual abuse images

Source: Europol

Headline: You have identified 70 objects taken from child sexual abuse images

We still need your help with 25 new objects uploaded to Europol’s website today

This morning Europol uploaded 25 new objects to its Stop Child Abuse – Trace an Object webpage. The objects are all taken from the background of child sexual abuse images. Since the launch of this project, where we ask the general public for information about the origin of the objects, you have sent us more than 18 300 tips. This information was carefully processed by Europol’s European Cybercrime Centre (EC3) and has proven to be extremely useful. Thanks to your information, 70 objects have been identified.

Of those 70 objects, 25 were identified to one or a reasonable number of likely countries of production. This means that we are almost certain that the image containing child sexual abuse was produced in those countries. All of your tips for these 25 objects have been transmitted to these countries and several investigations are currently ongoing. These investigations are very complex and can take months, even years, but these tips are very important as they can be the vital clue that acts as the starting point for an investigation or links other pieces of evidence.

The other 45 objects you identified have unfortunately not led to a specific location because they are present in a large number of countries all over the world. These identifications are still extremely useful for law enforcement because they eliminate an investigative trail. That alone allows the investigators to spend more time and resources on other leads with a higher potential for success.

Europol and its law enforcement partners would like to thank everyone who has taken the effort to visit www.europol.europa.eu/stopchildabuse and is equally committed to tracing these objects and ultimately helping to stop child abuse.

Billy Jack Johnson — Central Intelligence Agency

Source: Central Intelligence Agency CIA

Headline: Billy Jack Johnson — Central Intelligence Agency

This is part of our series about CIA employees who have made the ultimate sacrifice. Here we will look at the lives of the men and women who have died while serving their country.

Currently, there are 125 stars carved into the marble of the CIA Memorial Wall. The wall stands as a silent, simple memorial to those employees “who gave their lives in the service of their country.” The CIA has released the names of 91 employees; the names of the remaining 34 officers must remain secret, even in death.


Billy Jack Johnson, a World War II veteran, was an expert in paramilitary and maritime operations. He was a talented instructor, and he became known throughout the Agency for his skill and expertise in unique specialties, such as sabotage, escape and evasion, fingerprint analysis, and lock picking.

In February 1968, Billy was serving in Southeast Asia when the vehicle he was riding in was struck by an enemy mortar. Billy was killed instantly.

Early Years:

Billy served for nearly 20 years in the US Navy as a Chief Quartermaster, with World War II experience in Japan, Korea, Formosa (now Taiwan), and aboard the USS Mississippi and USS Tangier.

Based on Billy’s Navy operational specialty—Far East maritime supply and support—and his paramilitary training and experiences, he was detailed to the CIA from 1952 through 1956 as a trainer in maritime and paramilitary operations.

Following his honorable discharge from the Navy, Billy joined the CIA in August 1956.

Life at CIA:

Billy’s first CIA assignment was as a training assistant in the Soviet Division of the Deputy Directorate for Plans (DDP), forerunner to today’s Directorate of Operations.

Over the next ten years, he served in a variety of positions – training assistant, training officer, and senior instructor – specializing in paramilitary and maritime operations. Billy was also an expert in agent communications and surveillance training, and his maritime experiences ran the gamut from navigation, piloting, and ship maintenance to amphibious techniques under combat conditions.

By 1965, he was working in the Agency’s special operations division as a senior instructor, and he had added ammunition, sabotage, and demolition to his growing list of specialties. At one point during the late 1960s, Billy was considered by many to be among the Agency’s leading experts in fingerprint identification and escape and evasion. He was also considered one of the Agency’s two best “picks and locks” experts.

His Final Mission:

In the autumn of 1966, Billy was assigned to the Far East Division of the DDP, and was sent to Southeast Asia as an operations officer. He served as the Agency’s advisor to a special police informant program and as the operational advisor to a combined revolutionary development cadre and provincial reconnaissance unit of more than 600 local nationals.

Billy was also responsible for intelligence activities in the region, targeting operations against the enemy infrastructure. By this time, he had advanced from senior instructor to agent handler and intelligence collector.

On February 1, 1968, while performing one of his many rounds to conduct surveys, make payroll disbursements, and meet with local tribal leaders, Billy Jack Johnson was killed when the vehicle in which he was riding in took a direct hit from an enemy mortar.

Billy Johnson was 49 years old. He was survived by his wife and three sons.

‘Internet of Things’ cyber risks tackled during INTERPOL Digital Security Challenge

Source: Interpol (news and events)

Headline: ‘Internet of Things’ cyber risks tackled during INTERPOL Digital Security Challenge

22 February 2018

VIENNA, Austria – Do you know how to protect your webcam from being hacked? Would you know if a cybercriminal was using your printer to carry out cyberattacks?

While most of us are aware of the dangers that cybercriminals can pose to our computers and mobile phones and take steps to protect them, we seldom consider how these threats can affect the growing number of Internet-connected devices we use in our daily lives.

The ‘Internet of Things’

All devices which can connect to the Internet – collectively called the ‘Internet of Things’ or IoT – are potentially at risk of a cyberattack. Everyday personal items like video cameras, refrigerators and televisions can be used by cybercriminals for malicious means.

Cyberattacks targeting or using IoT devices have increased significantly in the past two years, according to several reports from the private cybersecurity industry. An example was the Mirai botnet, which in 2016 infected tens of thousands of devices, mostly Internet routers, with weak password security.  These were then used in coordinated distributed denial of service (DDoS) attacks against websites worldwide including a university and several media sites.

In the world of cybercrime, the number of IoT devices a criminal has access to is seen as a sign of their status.

Although police around the world are developing the skills necessary to forensically examine computers and mobile phones, they are often not aware of how to collect evidence from other connected devices.

The latest edition of the INTERPOL Digital Security Challenge tackled this threat, with 43 cybercrime investigators and digital forensics experts from 23 countries investigating a simulated cyberattack on a bank launched through an IoT device.

“Cybercrime investigations are becoming more and more complex and operational exercises such as the Digital Security Challenge, which simulate some of the hurdles that investigators face every day, are vital for the development of our capacities,” said Peter Goldgruber, Secretary General of the Austrian Ministry of the Interior.

Meeting the challenge

In the scenario, cybercriminals attacked a bank in an attempt to steal large sums of money. The investigators analysed the bank’s computers to identify the date, time and files where the malware installed by the criminals.

Through this digital forensic examination, the teams discovered the malware was contained in an e-mail attachment sent via a webcam which had been hacked, and not directly from a computer. This is an emerging modus operandi, as it is more difficult to identify the source of the attack.

Once the teams accessed the digital data held by the compromised webcam, they identified the command and control server being used to remotely control the device to conduct the cyberattack. Further evidence led to the identification of a second command and control server, and the investigators identified technical vulnerabilities of the servers which could be used to prevent further attacks.  

Noboru Nakatani, Executive Director of the INTERPOL Global Complex for Innovation said the scenario provided a learning experience on how to conduct real-world investigations more effectively.

“The ever-changing world of cybercrime is constantly presenting new challenges for law enforcement, but we cannot successfully counter them by working in isolation.

“A multi-stakeholder approach which engages the expertise of the private sector is essential for anticipating new threats and ensuring police have access to the technology and knowledge necessary to detect and investigate cyberattacks,” said Mr Nakatani.

Sharing expertise

Conducted annually, INTERPOL’s Digital Security Challenge helps police worldwide develop the skills necessary to tackle the latest cybercrime threats. The first two events in 2016 and 2017 simulated cyber blackmail involving bitcoin and a ransomware attack.

This year’s three-day (19 – 21 February) event was organized in close cooperation with the INTERPOL National Central Bureau in Vienna and private sector partners NEC Corporation and Cyber Defense Institute.

“NEC has contributed as a strategic partner to INTERPOL’s commitment to improve the cybersecurity skills of investigators throughout the world. For the third year, NEC is honored to have helped develop the Digital Security Challenge by providing our expertise at this cutting-edge event,” said Kozo Matsuo, Vice President of NEC Corporation’s Cyber Security Strategy Division.

Training sessions to develop participants’ practical knowledge on IoT device analysis and the latest trends in malware-related crime were delivered by specialists from NEC Corporation, InfoSec, Meiya Pico, SECOM, Kaspersky Lab and TrendMicro. Support was also provided by the UN Office on Drugs and Crime (UNODC).

Kenji Hironaka, President of Cyber Defense Institute said: “We are proud to have provided forensic content and technical support during all three INTERPOL Digital Security Challenge events. We will continue assisting law enforcement around the world to enhance their cybercrime investigation capabilities.”

Protecting your devices

Most people use anti-virus products and update their software and programmes regularly on their computers and mobile phones to protect them from cyberthreats. But few people take the same precautions to secure their connected devices, leaving them vulnerable to attacks.

Tips for safeguarding IoT devices:

  • Change the factory default passwords – these can be the same for hundreds or thousands of devices, making it easy for criminals to hack;
  • Regularly update all software;
  • Disable features which allow the device to be accessed remotely;
  • Take extra care when buying used devices – you don’t know what the previous owner installed on the device.

12 arrested and 4 women safeguarded in Spain and the UK in operation against sexual exploitation of women

Source: Europol

Headline: 12 arrested and 4 women safeguarded in Spain and the UK in operation against sexual exploitation of women

The members of the human trafficking ring recruited the victims in Nigeria using voodoo threats

The Spanish National Police, supported by Europol, the National Crime Agency (NCA) and the National Agency for the Prohibition of Trafficking in Persons (NAPTIP) from Nigeria, have safeguarded four Nigerian women who were forced into prostitution in different Spanish locations. The dismantled network operated mainly in Spain, but also in Italy, the United Kingdom, Libya, Niger and Nigeria.

The investigation to dismantle the network began one year ago. The members of the criminal network recruited their victims by coercing them with voodoo threats in Benin City, Nigeria. The women were forced to eat a raw chicken heart and drink whisky as the criminals took clippings of their hair and nails. The criminals then used fraudulent documents to traffic the women to Europe, where they were housed in squalid conditions in Italy for several days. Once in Spain the women were hidden in their madam’s houses and forced to clean and take care of the children, whilst the organised crime group made arrangements for the submission of applications for asylum by the victims. This was necessary to ensure the victims would be more likely to remain in Spain.

The ring leaders were based in Torrelavega, Spain. They controlled the whole network from the city and if the women could not pay their debts their family was threatened by phone. The organised crime group operated in four different places in Spain. The investigation revealed that some members of the ring were acting from Italy and the UK. A European Arrest Warrant was issued by Spain and a house search took place in the UK as one of the individuals was living in Manchester. Thanks to the support of the NCA, the individual in Manchester was arrested, alongside seven in Cantabria, two in Vizcaya and two in Alicante, all in Spain.

Europol supported the investigation by providing information exchange and analytical support. On the action day two analysts were deployed to Spain equipped with a mobile office and a data extraction device. This allowed for real-time information exchange and cross-checks of the data gathered during the course of the action against Europol’s databases.

Over 41,000 artefacts seized in global operation targeting trafficking of cultural goods

Source: Interpol (news and events)

Headline: Over 41,000 artefacts seized in global operation targeting trafficking of cultural goods

21 February 2018

More than 41,000 objects including coins, furniture, paintings, musical instruments, archaeological pieces and sculptures have been seized in a global operation targeting the trafficking of cultural artefacts.

The seizures were made during the first joint customs and police operation codenamed Athena organized by the World Customs Organization and INTERPOL, and the Europe-focused Operation Pandora II coordinated by the Spanish Guardia Civil and Europol.

Tens of thousands of checks were carried out at airports and border crossing points across 81 countries during the operations which ran from October to December 2017. Auction houses, museums and private houses were also searched, resulting in more than 300 investigations being opened and 101 people arrested.

Online illicit markets

With the Internet becoming an important part of the chain in the illicit trade of cultural goods, law enforcement officers also monitored online market places and sales sites.

This resulted in the seizure more than 7,000 objects, nearly 20 per cent of the total number of artefacts recovered during the operations. In just one investigation in Spain, the Guardia Civil seized more than 2,000 cultural objects, the majority of which were coins from the Roman and other Empires.

Officials also seized 88 pieces of ivory as well as weapons including swords, a crossbow and 39 historical firearms ranging from rifles to pistols.

Operational highlights

·  Argentinean Federal Police recovered the shell of a Glyptodon, an extinct mammal. The shell, estimated to be more than one million years old, was on sale for USD 150,000.

·  Brazilian Customs seized a marble head hidden in a passenger’s suitcase. Verification of the piece’s provenance is ongoing.

·  A painting by Nicolas de Staël worth approximately EUR 500,000 was intercepted by French Customs at the Gare du Nord in Paris as it was being smuggled to London.

·  Searches of a businessman’s two homes and two commercial properties by Greek Police resulted in the recovery of 41 archaeological objects which did not have the necessary license.

Peace and security threat

“The results of the Operations Athena and Pandora II speak for themselves: cooperation between Customs and Police can yield excellent results and should be promoted and sustained at all levels. The fight against illicit trafficking of cultural objects has been long neglected by law enforcement agencies, however, we cannot turn a blind eye to it,” said WCO Secretary General Kunio Mikuriya.

While we lose our common history and identity, the proceeds of trafficking fuel terrorism, conflicts and other criminal activities. We will keep working in this area of enforcement and will soon deploy the first specialized global training curriculum for Customs administrations – a very concrete and hands-on outcome of our common work,” he added.

INTERPOL Secretary General Jürgen Stock said the Operations struck a blow against the illicit trafficking of cultural goods which poses a threat to international peace and security.

“For criminals, the black market in works of art is becoming just as lucrative as for drugs, weapons and counterfeit goods. Ancient artefacts also represent a potential source of great wealth for terrorist groups,” said Secretary General Stock.

“To know what has been stolen and from where is the first step in any investigation, which is why INTERPOL is continuing to encourage the creation of specialized national unit and databases,” added the INTERPOL Chief.

International coordination

Given the global nature of Operation Athena, a 24-hour Operational Coordination Unit was jointly run by the WCO and INTERPOL. In addition to assisting information exchanges and issuing alerts, the unit also carried out checks against various international and national databases, such as INTERPOL’s database of Stolen Works of Art.

At the European level, Operation Pandora II was conducted with the use of the SIENA information exchange tool involving Europol’s 24/7 Operations Centre to cross-check personal data.

Over 41 000 artefacts seized in global operation targeting the illicit trafficking of cultural goods

Source: Europol

Headline: Over 41 000 artefacts seized in global operation targeting the illicit trafficking of cultural goods

Over 41 000 cultural goods such as coins, paintings and drawings, furniture and musical instruments, porcelain, archaeological and paleontological objects, books and manuscripts and sculptures were seized all over the world as a result of coordinated law enforcement actions. These seizures were made during the first Global Global Customs-Police Operation, codenamed ATHENA and organised by the World Customs Organisation (WCO) in cooperation with INTERPOL, and during the regional Europe-focused Operation PANDORA II, coordinated by the Spanish Guardia Civil and Europol.

Both operations took place from October to early December 2017, with a common action phase from 20 to 30 November 2017, and saw the involvement of customs and police forces from 81 countries. Both, ATHENA and PANDORA II, focused on the illicit trafficking of cultural objects, theft, looting as well as internet sales. Most of the actions were developed and coordinated jointly between Customs and Police on the national level with the support and participation of the experts from the Ministries of Culture and other relevant institutions and law enforcement agencies.

Apart from seizures, there have been tens of thousands of checks and controls in various airports, ports, other border crossing points, as well as in the auction houses, museums and private houses. As a result, more than 200 investigations were opened and 53 persons arrested.

Given the global nature of this crime, operation coordination units working 24/7 were established by Europol on one side, and the WCO and INTERPOL on the other, to support the exchange of information as well as disseminate alerts, warnings and perform cross- checks in different international and national databases.

Internet as a facilitator for the illicit trafficking of cultural goods

Internet has changed, as in many other fields of our society, the traditional chains of the illicit trade of cultural goods. It is a new challenge for law enforcement authorities especially for the specialized cultural goods crime units. Now the criminals can reach the collector’s (anywhere in the world) without any intermediate, and out of the traditional channels.

Facing this threat, the involved law enforcement agencies monitored thousands of market places, internet announcement has in order to detect and seize looted or stolen cultural goods. Only in this area, 63 new criminal investigations have been opened and more than 6 000 cultural objects have been seized.

In a single successful investigation in Spain, Guardia Civil seized more than 2 000 cultural objects. Most of them were coins from Roman and other Empires and archaeological objects made of ceramic, metal and stone. In addition, 88 pieces of ivory were seized during the searches, including a carving of Christ valued at EUR 6 000 , and 39 firearms of different classification, from historical weapons, such as rifles and shotguns, swords, swords, katanas and a crossbow, revolvers and pistols. The investigation started with the checks of various internet pages dedicated to the sale and purchase of objects of historical value, and is still ongoing.

The Hellenic Police conducted a fruitful investigation in the framework of PANDORA II: during the searches in two residences and in two businesses of a national entrepreneur, they found 41 archaeological objects, for which the collector did not have a corresponding license. Additionally, from a legal collection of 1 133 coins of silver, bronze and gold of the 2nd century B.C. until 200 A.C., 15 coins were missing, and from a legal collection of 105 ancient objects, 26 objects were missing. All the possessed objects of archaeological and cultural value were confiscated, namely 1 252 cultural goods.

February 2018 Puzzle Periodical – A Plethora of Penguins

Source: National Security Agency NSA

Headline: February 2018 Puzzle Periodical – A Plethora of Penguins

Mama Penguin and Papa Penguin have 100 baby penguins. To help keep track of them all, they have written a (unique) number on each baby’s belly, from 1 to 100. In preparation for dinner time, Mama Penguin put the baby penguins along the sides of their iceberg, where they will catch fish. The penguins numbered from 1 to 50 like the fish on the west side of the iceberg, and those numbered from 51 to 100 like the fish on the east side of the iceberg. However, due to a miscommunication, Mama Penguin placed the odd-numbered penguins on the west side, and the even-numbered penguins on the east side. Papa Penguin wants to sort them out, with these restrictions:

Will Papa Penguin be able to sort out all his babies, so those numbered from 1 to 50 finish on the west side, while those numbered 51-100 finish on the east side?

Did you determine if Papa Penguin can sort his Baby Penguins?

Solution

Yes, it is possible for Papa Penguin to sort all of his babies! We will present an algorithm which he can follow that is guaranteed to sort them (though it is possible that a faster algorithm exists).

Suppose we sort babies ranging from m to n, where m is odd and n is even. In the original problem, m=1 and n=100. If we can repeatedly increase m and decrease n until m=n, we will have completely sorted all the babies. Our goal is to run up through all the babies from m to n-1 and back down from n-1 to m+2, so that by the end of each up-and-down pass, the state is exactly the same as it was at the start of the pass, except with babies m and m+1 on the west side, and babies n and n-1 on the east side, so that we can then do another up-and-down pass, setting m=m+2 and n=n-2. We can repeat this process until m and n are close enough that the problem is trivial.

To do an up-and-down pass: Move baby m+2 to the east side, m+1 to the west side, m+4 to east, m+3 to west, …, n-3 to east, n-4 to west, n-1 to east, n-2 to west (this is the “up” half). At this point, babies m and m+1 are on the west (where we want them), babies n-1 and n are on the east (also where we want them), and of the babies between m+1 and n-1, the odd babies are on the east and the evens are on the west (the opposite of how they were before all the swapping). To do the “down” half, move baby n-4 to the east (this is legal since our last move was n-2 to the west), then n-5 to west, n-2 to east, n-3 to west, n-6 to east, n-7 to west, n-8 to east, n-9 to west, …, m+6 to west, m+5 to east, m+4 to west, m+3 to east, m+2 to west. After setting down baby m+2, we now have babies m, m+1, and m+2 on the west (where we want them), and babies n, n-1, and n-2 on the east (also where we want them), and of the babies between m+2 and n-2, the odds are on the west and the evens are on the east (as in the original problem). We are also in a position to move baby m+4 next, so we can now do another iteration of the up-and-down pass, setting our new boundaries to m+2 and n-2, effectively reducing the problem size by 4.

We can simply repeat this process until m=49 and n=52. At this point, we will have babies 1-49 on the west (where they should be), 52-100 on the east (also where they should be), and 51 on the west and 50 on the east. Now we just need to move 51 (our most recent baby put down was 49, so this is legal). Then move baby 50 and we have sorted all of the baby penguins.

A visual illustration of an up-and-down pass, starting with odd penguins from m through n-1 on the west, and even penguins from m+1 through n on the east:

The “up” half of one iteration:

10 circles (representing 10 penguins) are shown, divided into two rows of 5 each. The top row is labeled “west”, and the bottom row is labeled “east”. The first three circles in the top row (west) are labeled “m”, “m+2”, and “m+4”. Between these three circles and the last two circles in this row is an ellipsis, indicating the omission of many more penguins. The last two circles in this row are labeled “n-3” and “n-1”. On the bottom row (east), the first three circles are labeled “m+1”, “m+3”, and “m+5”; and the last two are labeled “n-2” and “n”. Arrows indicate the movements of these circles between the two rows. An arrow labeled “first move” points from the m+2 circle to the east side; an arrow labeled “second move” points from the m+1 circle to the west side; an arrow labeled “third move” points from the m+4 circle to the east side; an arrow labeled “fourth move” points from the m+3 circle to the west side; an arrow labeled “sixth move” points from the m+5 circle to the west side; an arrow labeled “fourth-last move” points from the n-3 circle to the east side; an arrow labeled “second-last move” points from the n-1 circle to the east side; and an arrow labeled “last move” points from the n-2 circle to the west side. The arrows, circles, and text on the bottom row (east side) are colored in red to distinguish them from the black arrows, circles, and text on the top row (west side).

(Note that the 5th move is not shown, since the 5th move is to move m+6, which is somewhere in the …, to the east. Likewise, the 3rd-last move is not shown, since the 3rd-last move is to move n-4, which is in the …, to the east. All moves between the 6th move and the 4th-last move are moving penguins represented by the …’s, so they are not shown.)

The “down” half of one iteration:

14 circles (representing 14 penguins) are shown, divided into two rows of 7 each. The top row is labeled “west”, and the bottom row is labeled “east”. The first three circles in the top row (west) are labeled “m”, “m+1”, and “m+3”. Between these three circles and the last four circles in this row is an ellipsis, indicating the omission of many more penguins. The last four circles in this row are labeled “n-8”, “n-6”, “n-4”, and “n-2”. On the bottom row (east), the first three circles are labeled “m+2”, “m+4”, and “m+6”; and the last four are labeled “n-5”, “n-3”, “n-1”, and “n”. Arrows indicate the movements of these circles between the two rows. An arrow labeled “first move” points from the n-4 circle to the east side; an arrow labeled “second move” points from the n-5 circle to the west side; an arrow labeled “third move” points from the n-2 circle to the east side; an arrow labeled “fourth move” points from the n-3 circle to the west side; an arrow labeled “fifth move” points from the n-6 circle to the east side; an arrow labeled “seventh move” points from the n-8 circle to the east side; an arrow labeled “fifth-last” points from the m+6 circle to the west side; an arrow labeled “third-last” points from the m+4 circle to the west side; an arrow labeled “second-last” points from the m+3 circle to the east side; and an arrow labeled “last move” points from the m+2 circle to the west side. The arrows, circles, and text on the bottom row (east side) are colored in red to distinguish them from the black arrows, circles, and text on the top row (west side).

(Note that the 6th move and the 4th-last move are not shown, because they are moving n-7 and m+5, respectively, which are in the …’s. All moves between the 7th move and the 5th-last move are moving penguins represented by the …’s, so they are not shown.)

State after a one full up-and-down pass:

15 circles (representing 15 penguins) are shown, divided into two rows, with 7 circles in the top row and 8 circles in the bottom row. The top row is labeled “west”, and the bottom row is labeled “east”. The first five circles in the top row (west) are labeled “m”, “m+1”, “m+2”, “m+4”, “m+6”; then there is an ellipsis to represent the omission of many more penguins; and then the last two circles in this row are labeled “n-5” and “n-3”. The first two circles in the bottom row (east) are labeled “m+3” and “m+5”; then there is an ellipsis to represent the omission of many more penguins; and then the last six circles are labeled “n-8”, “n-6”, “n-4”, “n-2”, “n-1”, and “n”.

EU AND ISRAELI POLICE JOIN FORCES AGAINST SOCIAL ENGINEERING

Source: Europol

Headline: EU AND ISRAELI POLICE JOIN FORCES AGAINST SOCIAL ENGINEERING

Last week EU and the Israeli Police organised an EU expert workshop on social engineering. Experts from Austria, Belgium, Denmark, France and Germany took part in the event with the aim of improving future information exchange between Israeli law enforcement and EU Member States.

The main activities covered at the event included comparing business email compromise attacks (BEC – also known as CEO fraud) both in EU Member States and Israel; examining best practice for cross-border investigations; and discussing new methods to counteract CEO/BEC fraud1. The workshop also looked at policing methods for network-based crime through networked organisations; improving capabilities in combatting CEO fraud; and enhancing cooperation in the field of CEO/BEC fraud between Europol and other law enforcement agencies in EU Member States.

These kinds of cases started in early 2010 with MTIC fraud (Missing Trader Intra-Community, also called missing trader fraud) with carbon credits. CEO fraud cases came soon after, followed by binary options fraud2 or FOREX scams3. EU law enforcement agencies, together with the Israeli Police, have since succeeded in arresting the money mules responsible. Investigators, EU experts and Israeli authorities arranged this event to find quicker ways of exchanging information and to build on achievements so far.

1 CEO/BEC fraud involves criminals impersonating company executives and tricking other employees into carrying out unauthorised wire transfers.

2 Binary options fraud is a fictitious short-term investment fraud.

3 FOREX scams are trading schemes used to defraud traders by convincing them to expect a high profit by trading in the foreign exchange market.