Making Black History, Today

Source: Central Intelligence Agency CIA

Headline: Making Black History, Today

Feature Story: In honor of Black History Month, CIA.gov asked current African American officers of different ages and backgrounds, with varying years of service and a variety of positions, to discuss why they chose a career at CIA and the legacy they hope to leave behind. These officers’ Agency experiences span the spectrum from analyst to engineer to graphic artist to operations officer with careers running in length from three to 17 years. Their reflections are highlighted and paraphrased within.

Free data recovery kit for victims of GandCrab ransomware now available on No More Ransom

Source: Europol

Headline: Free data recovery kit for victims of GandCrab ransomware now available on No More Ransom

As of today, a new decryption tool for victims of the GandCrab ransomware is available on www.nomoreransom.org. This tool has been released by the Romanian Police (IGPR) under the supervision of the General Prosecutor’s Office (DIICOT) and in collaboration with the internet security company Bitdefender and Europol.
First detected one month ago, GandCrab has already made 50 000 victims worldwide, a vast number of which in Europe, making it one of the most aggressive forms of ransomware so far this year.

DNI Releases Budget Figure for FY 2019 Appropriations Requested for the National Intelligence Program

Source: United States Director of National Intelligence

Headline: DNI Releases Budget Figure for FY 2019 Appropriations Requested for the National Intelligence Program

Consistent with Section 601 of the Implementing the Recommendations of the 9/11 Commission Act of 2007, as amended (50 U.S.C. 3306), the Director of National Intelligence is disclosing to the public the aggregate amount of appropriations requested for Fiscal Year 2019.

NEWS RELEASE

FOR IMMEDIATE RELEASE
ODNI News Release No. 11-18
February 27, 2018

DNI Releases Budget Figure for FY 2019 Appropriations Requested
for the National Intelligence Program

Consistent with Section 601 of the Implementing the Recommendations of the 9/11 Commission Act of 2007, as amended (50 U.S.C. 3306), the Director of National Intelligence is disclosing to the public the aggregate amount of appropriations requested for Fiscal Year 2019.

The aggregate amount of appropriations requested for the FY 2019 National Intelligence Program is $59.9 billion, which includes funding requested to support Overseas Contingency Operations.

Any and all subsidiary information concerning the NIP budget, whether the information concerns particular intelligence agencies or particular intelligence programs, will not be disclosed.  Beyond the disclosure of the NIP top-line figure, there will be no other disclosures of currently classified NIP budget information because such disclosures could harm national security. The only exceptions to the foregoing are for unclassified appropriations, such as for the Intelligence Community Management Account.

IARPA Launches “SuperTools” Program to Develop Superconducting Circuit Design Tools

Source: United States Director of National Intelligence

Headline: IARPA Launches “SuperTools” Program to Develop Superconducting Circuit Design Tools

NEWS RELEASE

FOR IMMEDIATE RELEASE
ODNI News Release No. 10-18
February 22, 2018

IARPA Launches “SuperTools” Program to Develop
Superconducting Circuit Design Tools

WASHINGTON – The Intelligence Advanced Research Projects Activity, within the Office of the Director of National Intelligence, announces today the “SuperTools” program, a multi-year research effort to develop comprehensive software tools for designing and analyzing superconducting electronics circuits.

This software would enable the user to design complex circuits with greater speed while using less power, which is no match for today’s semiconductor technology. “Modern electronic design tools are the core of the semiconductor revolution and have allowed ever more sophisticated electronic circuits to be designed and eventually built. Superconducting electronics offers the possibility of even faster and lower power circuits, but the design tools still need to be developed.” said Mark Heiligman, IARPA program manager.

Through a competitive Broad Agency Announcement, IARPA has awarded SuperTools research contracts to teams led by the University of Southern California and Synopsys Inc. Government agencies and national laboratories, including Lawrence Berkeley National Laboratory, National Institute of Standards and Technology, MIT Lincoln Laboratory, and Sandia National Laboratories will assist IARPA in conducting independent test and evaluation of the tool suites and associated design methodologies developed by each team. IARPA has partnered with the U.S. Army Research Office in the management of the SuperTools program.

IARPA invests in high-risk, high-payoff research programs to tackle some of the most difficult challenges of the agencies and disciplines in the Intelligence Community. Additional information on IARPA and its research may be found on www.iarpa.gov.

You have identified 70 objects taken from child sexual abuse images

Source: Europol

Headline: You have identified 70 objects taken from child sexual abuse images

We still need your help with 25 new objects uploaded to Europol’s website today

This morning Europol uploaded 25 new objects to its Stop Child Abuse – Trace an Object webpage. The objects are all taken from the background of child sexual abuse images. Since the launch of this project, where we ask the general public for information about the origin of the objects, you have sent us more than 18 300 tips. This information was carefully processed by Europol’s European Cybercrime Centre (EC3) and has proven to be extremely useful. Thanks to your information, 70 objects have been identified.

Of those 70 objects, 25 were identified to one or a reasonable number of likely countries of production. This means that we are almost certain that the image containing child sexual abuse was produced in those countries. All of your tips for these 25 objects have been transmitted to these countries and several investigations are currently ongoing. These investigations are very complex and can take months, even years, but these tips are very important as they can be the vital clue that acts as the starting point for an investigation or links other pieces of evidence.

The other 45 objects you identified have unfortunately not led to a specific location because they are present in a large number of countries all over the world. These identifications are still extremely useful for law enforcement because they eliminate an investigative trail. That alone allows the investigators to spend more time and resources on other leads with a higher potential for success.

Europol and its law enforcement partners would like to thank everyone who has taken the effort to visit www.europol.europa.eu/stopchildabuse and is equally committed to tracing these objects and ultimately helping to stop child abuse.

Elder Fraud

Source: Federal Bureau of Investigation (FBI)

Headline: Elder Fraud

Fraud schemes against the elderly also include a variety of mass mailing and telemarketing frauds such as lottery phone scams, romance scams, grandparent scams, IRS imposter schemes, and others. Many of these schemes are perpetrated by criminals outside the United States. All of the schemes have one goal: to trick and deceive senior citizens into turning over their hard-earned savings.

“These fraudsters view our seniors as prime targets,” Bowdich said. Many senior citizens have large nest eggs saved over decades. At the same time, they may not be technologically savvy. The scammers also know that elderly victims often don’t report being victimized either because they feel guilty or embarrassed, “or because they don’t even realize they are being scammed,” Bowdich explained.

Other agencies participating in today’s announcement included the U.S. Postal Inspection Service and the Federal Trade Commission, which actively investigate elder fraud, and, like the FBI, offer educational material and other resources to senior citizens so they can become more aware of the threat.

“While criminals see the elderly as trusting people with money,” Bowdich explained, “we see them as national treasures. The elderly are the cornerstone of this country. Many of them sacrificed for their families … for their nation.” He added, “We understand how devastating a fraudulent scheme against elderly victims can be, not just financially, but emotionally, mentally, and even physically.”

Sessions and others at the press conference—including a woman whose elderly grandmother committed suicide after losing her life savings to scammers—encouraged senior citizens and their caregivers to report elder fraud to the authorities so that these “despicable con artists” can be brought to justice. “I hope that no victim of fraud feels ashamed,” Sessions said. “This can happen to anyone.”

To report elder fraud to the FBI, visit your local FBI office, call 1-800-CALL FBI (225-5324), or file a complaint online at the FBI’s Internet Crime Complaint Center at www.ic3.gov.

Billy Jack Johnson — Central Intelligence Agency

Source: Central Intelligence Agency CIA

Headline: Billy Jack Johnson — Central Intelligence Agency

This is part of our series about CIA employees who have made the ultimate sacrifice. Here we will look at the lives of the men and women who have died while serving their country.

Currently, there are 125 stars carved into the marble of the CIA Memorial Wall. The wall stands as a silent, simple memorial to those employees “who gave their lives in the service of their country.” The CIA has released the names of 91 employees; the names of the remaining 34 officers must remain secret, even in death.


Billy Jack Johnson, a World War II veteran, was an expert in paramilitary and maritime operations. He was a talented instructor, and he became known throughout the Agency for his skill and expertise in unique specialties, such as sabotage, escape and evasion, fingerprint analysis, and lock picking.

In February 1968, Billy was serving in Southeast Asia when the vehicle he was riding in was struck by an enemy mortar. Billy was killed instantly.

Early Years:

Billy served for nearly 20 years in the US Navy as a Chief Quartermaster, with World War II experience in Japan, Korea, Formosa (now Taiwan), and aboard the USS Mississippi and USS Tangier.

Based on Billy’s Navy operational specialty—Far East maritime supply and support—and his paramilitary training and experiences, he was detailed to the CIA from 1952 through 1956 as a trainer in maritime and paramilitary operations.

Following his honorable discharge from the Navy, Billy joined the CIA in August 1956.

Life at CIA:

Billy’s first CIA assignment was as a training assistant in the Soviet Division of the Deputy Directorate for Plans (DDP), forerunner to today’s Directorate of Operations.

Over the next ten years, he served in a variety of positions – training assistant, training officer, and senior instructor – specializing in paramilitary and maritime operations. Billy was also an expert in agent communications and surveillance training, and his maritime experiences ran the gamut from navigation, piloting, and ship maintenance to amphibious techniques under combat conditions.

By 1965, he was working in the Agency’s special operations division as a senior instructor, and he had added ammunition, sabotage, and demolition to his growing list of specialties. At one point during the late 1960s, Billy was considered by many to be among the Agency’s leading experts in fingerprint identification and escape and evasion. He was also considered one of the Agency’s two best “picks and locks” experts.

His Final Mission:

In the autumn of 1966, Billy was assigned to the Far East Division of the DDP, and was sent to Southeast Asia as an operations officer. He served as the Agency’s advisor to a special police informant program and as the operational advisor to a combined revolutionary development cadre and provincial reconnaissance unit of more than 600 local nationals.

Billy was also responsible for intelligence activities in the region, targeting operations against the enemy infrastructure. By this time, he had advanced from senior instructor to agent handler and intelligence collector.

On February 1, 1968, while performing one of his many rounds to conduct surveys, make payroll disbursements, and meet with local tribal leaders, Billy Jack Johnson was killed when the vehicle in which he was riding in took a direct hit from an enemy mortar.

Billy Johnson was 49 years old. He was survived by his wife and three sons.

Sober Home Fraud

Source: Federal Bureau of Investigation (FBI)

Headline: Sober Home Fraud

Chatman would not have been able to commit this fraud without doctors signing off that they had reviewed the samples. So he hired some—including Dr. Joaquin Mendez, who worked in skilled nursing and had no background in addiction treatment—to rubber stamp the results.

“Through records, we were able to see that Dr. Mendez ‘reviewed’ 100 tests in a one-hour period. He clearly wasn’t looking at them. He was just going through and clicking to process these tests,” Gerrity said.

Chatman and his associates defrauded insurance companies of an estimated $24 million between 2013 and 2016. Chatman and his wife, Laura, lived a luxurious life thanks to their fraud proceeds, living in a $1 million home and driving high-end cars.

Yet the toll on the sober home residents was even worse than the financial crime.

Some of the more than 2,000 residents who lived in Chatman’s facilities died of overdoses. He also forced some of the women into prostitution, giving the addicted women drugs and then withholding those drugs if they would not comply. He told the women the prostitution would pay their “rent” to live at his sober homes, and sometimes the prostitution would even occur within the homes.

Last year, Chatman pleaded guilty to conspiracy to commit health care fraud, money laundering, and sex trafficking and was sentenced to 27 and a half years in prison. Laura Chatman pleaded guilty to making false statements and received a three-year prison term, while Mendez pleaded guilty to conspiracy to commit health care fraud and was sentenced to four years.

The FBI’s victim specialists played a critical role in this case by assisting the human trafficking victims with resources, as well as helping patients get legitimate drug treatment.

“It’s incredibly rewarding that we were able to get someone like Chatman off the streets, and the lengthy sentence really sends a message,” Gerrity said. “We’ve met the mothers and fathers of the patients who came here thinking their sons and daughters would get clean. This is an incredibly important issue, and by investigating these types of cases, we’re doing our part in addressing the national drug epidemic.”

‘Internet of Things’ cyber risks tackled during INTERPOL Digital Security Challenge

Source: Interpol (news and events)

Headline: ‘Internet of Things’ cyber risks tackled during INTERPOL Digital Security Challenge

22 February 2018

VIENNA, Austria – Do you know how to protect your webcam from being hacked? Would you know if a cybercriminal was using your printer to carry out cyberattacks?

While most of us are aware of the dangers that cybercriminals can pose to our computers and mobile phones and take steps to protect them, we seldom consider how these threats can affect the growing number of Internet-connected devices we use in our daily lives.

The ‘Internet of Things’

All devices which can connect to the Internet – collectively called the ‘Internet of Things’ or IoT – are potentially at risk of a cyberattack. Everyday personal items like video cameras, refrigerators and televisions can be used by cybercriminals for malicious means.

Cyberattacks targeting or using IoT devices have increased significantly in the past two years, according to several reports from the private cybersecurity industry. An example was the Mirai botnet, which in 2016 infected tens of thousands of devices, mostly Internet routers, with weak password security.  These were then used in coordinated distributed denial of service (DDoS) attacks against websites worldwide including a university and several media sites.

In the world of cybercrime, the number of IoT devices a criminal has access to is seen as a sign of their status.

Although police around the world are developing the skills necessary to forensically examine computers and mobile phones, they are often not aware of how to collect evidence from other connected devices.

The latest edition of the INTERPOL Digital Security Challenge tackled this threat, with 43 cybercrime investigators and digital forensics experts from 23 countries investigating a simulated cyberattack on a bank launched through an IoT device.

“Cybercrime investigations are becoming more and more complex and operational exercises such as the Digital Security Challenge, which simulate some of the hurdles that investigators face every day, are vital for the development of our capacities,” said Peter Goldgruber, Secretary General of the Austrian Ministry of the Interior.

Meeting the challenge

In the scenario, cybercriminals attacked a bank in an attempt to steal large sums of money. The investigators analysed the bank’s computers to identify the date, time and files where the malware installed by the criminals.

Through this digital forensic examination, the teams discovered the malware was contained in an e-mail attachment sent via a webcam which had been hacked, and not directly from a computer. This is an emerging modus operandi, as it is more difficult to identify the source of the attack.

Once the teams accessed the digital data held by the compromised webcam, they identified the command and control server being used to remotely control the device to conduct the cyberattack. Further evidence led to the identification of a second command and control server, and the investigators identified technical vulnerabilities of the servers which could be used to prevent further attacks.  

Noboru Nakatani, Executive Director of the INTERPOL Global Complex for Innovation said the scenario provided a learning experience on how to conduct real-world investigations more effectively.

“The ever-changing world of cybercrime is constantly presenting new challenges for law enforcement, but we cannot successfully counter them by working in isolation.

“A multi-stakeholder approach which engages the expertise of the private sector is essential for anticipating new threats and ensuring police have access to the technology and knowledge necessary to detect and investigate cyberattacks,” said Mr Nakatani.

Sharing expertise

Conducted annually, INTERPOL’s Digital Security Challenge helps police worldwide develop the skills necessary to tackle the latest cybercrime threats. The first two events in 2016 and 2017 simulated cyber blackmail involving bitcoin and a ransomware attack.

This year’s three-day (19 – 21 February) event was organized in close cooperation with the INTERPOL National Central Bureau in Vienna and private sector partners NEC Corporation and Cyber Defense Institute.

“NEC has contributed as a strategic partner to INTERPOL’s commitment to improve the cybersecurity skills of investigators throughout the world. For the third year, NEC is honored to have helped develop the Digital Security Challenge by providing our expertise at this cutting-edge event,” said Kozo Matsuo, Vice President of NEC Corporation’s Cyber Security Strategy Division.

Training sessions to develop participants’ practical knowledge on IoT device analysis and the latest trends in malware-related crime were delivered by specialists from NEC Corporation, InfoSec, Meiya Pico, SECOM, Kaspersky Lab and TrendMicro. Support was also provided by the UN Office on Drugs and Crime (UNODC).

Kenji Hironaka, President of Cyber Defense Institute said: “We are proud to have provided forensic content and technical support during all three INTERPOL Digital Security Challenge events. We will continue assisting law enforcement around the world to enhance their cybercrime investigation capabilities.”

Protecting your devices

Most people use anti-virus products and update their software and programmes regularly on their computers and mobile phones to protect them from cyberthreats. But few people take the same precautions to secure their connected devices, leaving them vulnerable to attacks.

Tips for safeguarding IoT devices:

  • Change the factory default passwords – these can be the same for hundreds or thousands of devices, making it easy for criminals to hack;
  • Regularly update all software;
  • Disable features which allow the device to be accessed remotely;
  • Take extra care when buying used devices – you don’t know what the previous owner installed on the device.

12 arrested and 4 women safeguarded in Spain and the UK in operation against sexual exploitation of women

Source: Europol

Headline: 12 arrested and 4 women safeguarded in Spain and the UK in operation against sexual exploitation of women

The members of the human trafficking ring recruited the victims in Nigeria using voodoo threats

The Spanish National Police, supported by Europol, the National Crime Agency (NCA) and the National Agency for the Prohibition of Trafficking in Persons (NAPTIP) from Nigeria, have safeguarded four Nigerian women who were forced into prostitution in different Spanish locations. The dismantled network operated mainly in Spain, but also in Italy, the United Kingdom, Libya, Niger and Nigeria.

The investigation to dismantle the network began one year ago. The members of the criminal network recruited their victims by coercing them with voodoo threats in Benin City, Nigeria. The women were forced to eat a raw chicken heart and drink whisky as the criminals took clippings of their hair and nails. The criminals then used fraudulent documents to traffic the women to Europe, where they were housed in squalid conditions in Italy for several days. Once in Spain the women were hidden in their madam’s houses and forced to clean and take care of the children, whilst the organised crime group made arrangements for the submission of applications for asylum by the victims. This was necessary to ensure the victims would be more likely to remain in Spain.

The ring leaders were based in Torrelavega, Spain. They controlled the whole network from the city and if the women could not pay their debts their family was threatened by phone. The organised crime group operated in four different places in Spain. The investigation revealed that some members of the ring were acting from Italy and the UK. A European Arrest Warrant was issued by Spain and a house search took place in the UK as one of the individuals was living in Manchester. Thanks to the support of the NCA, the individual in Manchester was arrested, alongside seven in Cantabria, two in Vizcaya and two in Alicante, all in Spain.

Europol supported the investigation by providing information exchange and analytical support. On the action day two analysts were deployed to Spain equipped with a mobile office and a data extraction device. This allowed for real-time information exchange and cross-checks of the data gathered during the course of the action against Europol’s databases.