Five Country Ministerial 2024 – Declaration Bridging Government Efforts and Elevating Survivors’ Voices

Source: US Department of Homeland Security

Preamble 

We, the Home Affairs, Interior, Security and Immigration Ministers of Australia, Canada, New Zealand, the United Kingdom, and the United States (the ‘Five Countries’) , recognize the importance of drawing in the voices and experiences of victims and survivors of child sexual exploitation and abuse, and in particular, their ongoing advocacy efforts petitioning for increased responses from government and industry to eliminate child sexual abuse and resulting material. 

We want to acknowledge the important work and advocacy of survivors’ coalitions, such as the Phoenix 11, a consortium of brave victims and survivors from the United States and Canada who have engaged with the Five Countries. Other victims and survivors coalitions are supported by non-governmental organizations. All of these brave victims and survivors continue to engage and call on government, lawmakers and industry to champion the rights of children to be safe online. 

We acknowledge that more work needs to be done to ensure all levers are used to combat this crime, and to that end, the expertise of victims and survivors is key to enabling meaningful, trauma-informed change.  

Commitment 

We, the Ministers of the Five Countries, commit to work more proactively and collaboratively with victims and survivors of child sexual exploitation and abuse and the organisations working to support them, to ensure Five Country efforts to combat this crime type are informed by their lived experiences and expertise. 

The Five Countries will continue to adopt, both individually and collectively, an approach to policy and engagement that is victim-centric and trauma-informed . Our commitment to victims and survivors of child sexual exploitation and abuse rests on the understanding that respect, care and protection, ongoing dialogue, and empowerment are central to this process and will enable victims and survivors to report their abuse and access the support they need to heal from their experiences 

Next Step 

The Five Country Ministerial Tackling Child Sexual Abuse Working Group will engage organizations and advocates in their respective regions in late 2024 to determine the best path forward and identify concrete actions to undertake. 

Five Country Ministerial 2024 – Joint statement on Irregular Migration

Source: US Department of Homeland Security

The Five Countries have a long and proud tradition of welcoming migrants and providing protection to the most vulnerable people across the world. We remain committed to promoting and protecting the human rights of all migrants, including refugees, and will continue to offer protection in line with our international obligations. We will strive to ensure the successful integration into our respective countries and communities of migrants and refugees who have a lawful right to remain. It is our responsibility to ensure that we have the necessary national, regional and international architecture in place to maximise the positive aspects of safe, orderly and regular migration, whilst also addressing global irregular migration. 

Globally, irregular migration and forced displacement have increased in scale. This presents complex challenges that need to be addressed through a well-managed, coordinated, flexible and whole-of-route strategy. We recognise the value of a comprehensive approach which takes into account the diverse and multi-dimensional drivers of irregular movement and forced displacement. These drivers can include conflict and violence, poverty, political instability, crime and corruption, environmental degradation and climate change, or the seeking of family reunification or economic opportunities. 

The Five Countries aim to work together to identify and implement consistent, equitable, and mutually beneficial partnerships that develop and stabilise source countries, improve the capacity of transit countries, and deter individuals from embarking on dangerous or irregular journeys or attempting to misuse our migration systems. 

Further, the Five Countries remain committed to disrupting the activities of bad actors, and taking swift action against those who exploit the vulnerable and who violate, or facilitate the violation of, our respective immigration laws. This includes working to combat attempts to misuse our migration systems, including through visa fraud. We will endeavour to prevent and disrupt people smuggling activities and prosecute the people smuggling groups and facilitators responsible. We will also seek to return, in a fair, safe and orderly manner, those individuals who have no legal basis to remain in our countries, consistent with our domestic and international obligations. 

As partners, the Five Countries acknowledge the existing international migration and protection frameworks and value the activities and partnerships with international organisations across the migration space, including the United Nations High Commissioner for Refugees (UNHCR), the International Organisation for Migration (IOM) and the International Criminal Police Organisation (INTERPOL). We will continue to collaborate with these institutions and leverage existing national, regional and international frameworks to bolster our responses through strengthened institutions, systems and processes. 

The Five Countries encourage pragmatic approaches to establishing migration policies and managing their sovereign borders in defence of national security, and in accordance with our obligations under national and international law. To this end, we affirm our collective responsibility to identify and better understand the evolving challenges of irregular migration. We commit to working together, learning from best practice based on robust evidence and analysis to identify and implement effective and sustainable solutions. Our efforts will include taking bold, flexible approaches and action, where needed. 

The Five Countries agree that it is through committed and focused partnerships that we will deliver results on providing protection to the most vulnerable whilst protecting our borders and maintaining public confidence in our migration and protection systems, in line with our international obligations and commitments. 

Five Country Ministerial 2024 – Joint Communique

Source: US Department of Homeland Security

We, the Home Affairs, Interior, Security and Immigration Ministers of Australia, Canada, New Zealand, the United Kingdom, and the United States (the ‘Five Countries’) remain steadfast in our commitment to uphold and promote shared liberal democratic values, and in working collaboratively to protect our citizens, communities, and governments from evolving national security threats in an increasingly contested world. Throughout 2024, the Five Countries have collaborated and advanced efforts on a range of issues relevant to our collective national security thematic areas of interest, specifically in consideration of the following issues: 

National Security Risks of Artificial Intelligence (AI) 

The Five Countries recognise the enormous opportunities presented by critical and emerging technologies – such as Artificial Intelligence (AI) – in creating new jobs, improving productivity, and aiding in cyber defence. However, the rapid development and deployment of AI risks creating novel security vulnerabilities (including both to and from AI systems) and providing a platform for malign actors to increase the speed and scale of malicious activities. We are particularly concerned by the use of AI to facilitate the creation and distribution of mis/disinformation, malware, terrorist and violent extremist content, non-consensual deep fake pornography, and child sexual abuse material (CSAM). We continue to share information on how our governments are establishing frameworks to best manage the risks associated with AI, while still taking advantage of the benefits, and remain committed to working together to ensure our shared values shape international standards and governance for AI. 

We acknowledge that deeper cooperation among the Five Countries will support the safe, secure, and trustworthy deployment and use of these technologies in a way that minimises the risks and maximises opportunities in a national security context. The Five Countries remain committed to continuing to align our work in achieving this goal. 

Countering Foreign Interference 

With more people than ever voting in elections around the world in 2024, the Five Countries recognise the need for resilient and transparent democratic institutions to mitigate evolving threats to democratic processes. Such threats, including the proliferation of state-sponsored disinformation through increased use of emerging technologies, pose a significant challenge to upholding our democratic values. 

We are resolute in our commitment to ensuring that communities are free from transnational repression, and recognise the continued need for collaboration, information sharing and taking action to protect our communities, businesses, and citizens. It is unacceptable for any foreign government to target members of our communities to prevent individuals from exercising their fundamental rights and freedoms in the Five Countries. 

Finally, the Five Countries recognise the need to mitigate the threat posed by foreign interference and espionage within our research ecosystems. The Five Countries remain committed to exchanging best practices and threat information on research security, including how foreign entities of concern may be attempting to adapt to and bypass safeguards, to improve the resilience of those ecosystems. 

Cyber Security 

The increase in malicious and sophisticated cyber security threats is impacting the daily lives of citizens, businesses and governments across the Five Countries. We emphasise the need to target the enablers that make up the cybercrime business model, who are providing the illicit products, goods and services that make it easier to commit cybercrime. Malicious cyber activity against critical infrastructure by both state and non-state malicious cyber actors pose some of the greatest threats to our Five Countries and we are committed to jointly disrupting these operations and securing our most important networks. 

We note the importance of fraud in the cyber security context and are particularly concerned about online scam centres that target vulnerable individuals globally; are involved in human trafficking for forced criminality to support their operations; or feed into a highly profitable criminal enterprise that undermines our cyber security. We reaffirm our support to the commitments made at the Global Fraud Summit. A key outcome from the Summit was to maintain strong engagement with industry, and the Five Countries agree to progress further efforts in this space to tackle the fraud threat and better protect our citizens. 

We recognise the broader role of continued public-private collaboration in mitigating cyber security and data threats for our citizens, businesses and nations. To further deepen our relationship with industry, the Five Countries commit to share lessons learned from respective domestic efforts in securing data to ensure trusted and secure cross-border data flows and enhance the resilience of our data. 

We recognise the value of coming together as the Five Countries to enhance strategic engagement on priority cybercrime threats, particularly through the international Counter Ransomware Initiative (CRI). The Five Countries will actively support the CRI and will engage in wider fora to advance our shared aims through international cooperation and build cross-border resilience to collectively disrupt malicious cyber actors. 

Domestic Security 

In response to recent events in the Middle East, the Five Countries have regularly drawn on the FCM to discuss the conflict and broader security situation, as well as associated domestic security challenges. This includes recognising the effects of this conflict on impacted communities, exploring the associated impacts in polarising and radicalising community attitudes, and understanding the threats posed by the spread of extremist content and disinformation. 

We remain very concerned about the rise of terrorist and violent extremist content online and its impact, particularly on young people, and we recognise the importance of continued engagement with industry to mitigate this issue. 

As members of the Global Internet Forum to Counter Terrorism (GIFCT) Independent Advisory Committee, we call on the organisation to strengthen its efforts to address terrorist and violent extremist content, including when it arises in the context of a prolonged conflict. We stress the importance of expanding GIFCT membership to include a broader range of technology companies, as well as in helping smaller platforms to identify and address terrorist and violent extremist content. In parallel, we continue to support the implementation of the Christchurch Call commitments and welcome the launch of the Christchurch Call Foundation. 

We commit to addressing the complexity of youth radicalisation, as well as the need to better understand the risks of personalised ideological motivations. We acknowledge that unique pathways and factors can make at-risk individuals susceptible to radicalisation, including violent extremism. We will continue to share information on effective approaches to prevention, such as intervention approaches to support diversion efforts; and are committed to working together to conduct a diagnosis of how violent extremist actors leverage technology to encourage at-risk individuals to violence. 

Lawful Access 

The Five Countries will continue working together to maintain tightly-controlled lawful access to communications content that is vital to the investigation and prosecution of serious crimes including terrorism and child abuse. We will work in partnership with technology companies to do this, protecting the safety of our citizens. 

Child Sexual Exploitation and Abuse (CSEA) 

The Five Countries note the significant role of emerging technologies, including AI, in the proliferation of child sexual exploitation and abuse material. We reiterate our collective commitment to exercising all levers available to tackle this crime type and keep children safe in all settings. 

We recognise the need to work collaboratively across the whole sector, noting the specific knowledge and role of industry and academia, and the expertise of victims, survivors and their families to ensure our efforts to combat child sexual exploitation and abuse are holistic, evidence-based, and promote technological innovation. In this spirit, we jointly endorsed the “Bridging Government Efforts and Elevating Survivors’ Voices” statement (Annex I). 

We also recognise the continued importance of the Voluntary Principles to Counter Online Sexual Exploitation and Abuse and – noting that the landscape has changed significantly since their launch five years ago – commit to further engagement with signatories to seek updates on efforts to uphold the principles as outlined. 

While there has been progress through voluntary action to date, the Five Countries urgently call on tech companies to continue to drive innovation to keep children safe online on their platforms and to adhere to legal requirements in each of our jurisdictions. We remain committed to working with industry to explore holistic efforts and supporting innovation in tackling child sexual exploitation and abuse, including responding to the proliferation of AI-generated child sexual exploitation and abuse content. 

Migration  

The Five Countries recognise the extensive pressures on our border management, migration and protection systems that are being exacerbated by significant volumes of global migration and displacement seen across the world. 

We acknowledge that there are a multitude of drivers for irregular migration and forced displacement, and we recognise the importance of taking a whole-of-route approach in response to mixed migrant flows. The Five Countries will continue to explore opportunities to work together to combat organised crime groups that are facilitating and profiting from human smuggling. 

The Five Countries also recognise the opportunities presented by the rise in global migration and mobility, and note the benefits of safe and regular migration pathways. At the same time, we remain committed to enforcing our immigration laws and delivering consequences for those individuals who have no right to remain in our respective countries. We encourage the use of innovative policy levers to maintain well-managed regular pathways in light of increasing demand on our migration systems. We are committed to deepening our collaboration to enhance the integrity of our migration and border systems by leveraging emerging technology and examining additional efforts to address fraud and stop bad actors from exploiting our regular pathways. 

The Five Countries remain steadfast in our commitment to promoting and protecting the human rights of all migrants, refugees, and asylum-seekers in accordance with our international obligations, whilst endorsing pragmatic approaches of countries to establish policies in their own national interest and national security. 

Closing 

The FCM remains the preeminent Ministerial-level forum for the Five Countries to engage and exchange information on shared national security issues and implement new initiatives to respond to various areas of concern. Our efforts to collaborate and exchange best practise in responding to evolving threats continues to grow and we look forward to further deepening these efforts in the coming year ahead 

DHS Conducts Removal Flight to the People’s Republic of China

Source: US Department of Homeland Security

WASHINGTON – On October 15, the U.S. Department of Homeland Security (DHS), through U.S. Immigration and Customs Enforcement (ICE), conducted its second charter removal flight to the People’s Republic of China (PRC) of Chinese nationals this year.  The first large charter removal flight since 2018 was conducted in June in close coordination with the PRC’s National Immigration Administration. This week’s flight demonstrates the Department’s continued commitment to pursuing sustained cooperation with the PRC and other international partners to reduce and deter irregular migration.  

DHS continues to enforce U.S. immigration laws and deliver tough consequences for those who enter unlawfully. This includes swiftly returning those without a legal basis to remain in the United States, while encouraging the use of lawful pathways. On June 4, President Biden issued a Proclamation to temporarily suspend the entry of certain noncitizens across the southern border. As a result, since June 4 the Border Patrol’s encounters have decreased more than 55%, and DHS has operated more than 398 international repatriation flights through the end of August to more than 140 countries—including the PRC. 

“Intending migrants should not believe the lies of smugglers – Chinese nationals without a legal basis to remain in the United States are subject to swift removal,” said Secretary of Homeland Security Alejandro N. Mayorkas. “The Department of Homeland Security will continue to strengthen consequences for individuals unlawfully entering our country and enforce our nation’s laws.”

DHS regularly engages counterparts throughout the hemisphere and around the world to accept repatriations of nationals without a legal basis to remain in the United States and takes other steps to reduce irregular migration; promote safe, lawful, and orderly pathways; and hold transnational criminal networks accountable for abusing our lawful trade and travel systems, and the smuggling and exploitation of vulnerable people. Over the last year, DHS has removed individuals to a range of countries around the world, including Colombia, Ecuador, Peru, Egypt, Mauritania, Senegal, Uzbekistan, India, and the PRC. As a result of these efforts, DHS removed or returned more individuals in FY2024 than any year since FY2010. Efforts to expand removal flights continue.

DHS Offers Protections for Lebanese Nationals Currently in the United States

Source: US Department of Homeland Security

Certain Lebanese nationals will be eligible for DED and TPS, allowing them to work and temporarily remain in the United States

WASHINGTON The U.S. Department of Homeland Security (DHS) is announcing new actions to provide temporary immigration reprieve to eligible Lebanese nationals currently in the United States and allowing them the opportunity to request work authorization. Included in today’s announcement are details related to the Deferred Enforced Departure (DED) for Lebanese nationals as previously announced in July, and a planned new Temporary Protected Status (TPS) designation for Lebanon.

After consultation with interagency partners, Secretary Mayorkas is announcing a new TPS designation for Lebanon for 18 months due to ongoing armed conflict and extraordinary and temporary conditions in Lebanon that prevent nationals of Lebanon from returning in safety. Those approved for TPS will be able to remain in the country while the United States is in discussions to achieve a diplomatic resolution for lasting stability and security across the Israel-Lebanon border. The designation of Lebanon for TPS will allow Lebanese nationals (and individuals having no nationality who last habitually resided in Lebanon) who have been continuously residing in the United States since October 16, 2024 to file initial applications for TPS, if they are otherwise eligible. Lebanese nationals who entered the United States after October 16, 2024 will not be eligible for TPS. More information about TPS, including how to apply for employment authorization, will be included in a forthcoming Federal Register Notice which DHS intends to publish in the next few weeks. Individuals should not apply for TPS under this designation until this Federal Register Notice publishes.

Today, U.S. Citizenship and Immigration Services (USCIS)also posted a Federal Register Notice establishing procedures for those Lebanese nationals covered by President Biden’s July 26, 2024 grant of Deferred Enforced Departure to apply for Employment Authorization Documents (EADs) that will be valid through January 25, 2026. As described in the Federal Register Notice, eligible Lebanese nationals can apply for an EAD by filing Form I-765, Application for Employment Authorization. USCIS adjudicates each EAD application on a case-by-case basis to determine if an applicant meets all standards and eligibility criteria. More information about DED-based EADs is available on the USCIS website.

DHS is also publishing a Special Student Relief Notice for F-1 nonimmigrant students whose country of citizenship is Lebanon, or individuals having no nationality who last habitually resided in Lebanon, so that eligible students may request employment authorization, work an increased number of hours while school is in session, and reduce their course load while continuing to maintain F-1 status through the DED designation period.

In total, approximately 11,000 Lebanese nationals will likely be eligible for DED and TPS pursuant to these actions. There are also approximately 1,740 F-1 nonimmigrant students from Lebanon in the United States who may be eligible for Special Student Relief. 

Statement from Secretary Alejandro N. Mayorkas on the Independent Review Panel Report of the July 13, 2024 Assassination Attempt in Butler, Pennsylvania

Source: US Department of Homeland Security

WASHINGTON – Secretary of Homeland Security Alejandro N. Mayorkas issued the following statement on the Independent Review Panel report released today regarding the July 13, 2024 assassination attempt against former President Trump in Butler, Pennsylvania.

“We are grateful to the members of the bipartisan Independent Review Panel and their staff for their in-depth examination of the security failures that led to the July 13, 2024 assassination attempt on the former President and the loss of life and casualties suffered.  The members of the Independent Review Panel are highly accomplished individuals with extensive security and law enforcement backgrounds, and the U.S. Secret Service’s protection mission will benefit greatly from their recommendations.

“I have reviewed the Independent Review Panel’s report and have met with the Panel members. We will fully consider the Panel’s recommendations and are taking the actions needed to advance the Secret Service’s protection mission.  These actions will be responsive not only to the security failures that led to the July 13, 2024 assassination attempt, but, importantly, to what the Independent Review Panel describes as systemic and foundational issues that underlie those failures.  I commend Acting Director Rowe for his leadership and for proactively undertaking security enhancements, including those informed by the Secret Service’s internal Mission Assurance Review.

“I have the utmost confidence in the men and women of the United States Secret Service.  We are operating in a heightened and dynamic threat environment, and it is their talent, unwavering dedication, and tireless service that ensures the safety and security of their protectees and our nation.”

Following the events of July 13 President Joe Biden directed DHS to conduct an independent security review. On July 21, 2024 Secretary Mayorkas named a bipartisan panel with extensive law enforcement and security experience to conduct a 45-day independent review. The independent review panel of experts from outside of government was comprised of former DHS Secretary Janet Napolitano; the Hon. Mark Filip, a former federal judge and Deputy Attorney General to President George W. Bush; Ms. Frances Townsend, former Homeland Security Advisor to President George W. Bush; and Chief David Mitchell, the former superintendent of Maryland State Police and former Secretary of the Department of Public Safety and Homeland Security for the State of Delaware.

CISA and FBI Release Product Security Bad Practices for Public Comment

Source: US Department of Homeland Security

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) released the Product Security Bad Practices for public comment today. This catalog outlines practices that are deemed exceptionally risky and provides recommendations for software manufacturers to mitigate these risks. It urges software manufacturers to avoid these bad practices, especially those who produce software used in service of critical infrastructure or national critical functions (NCFs). Members of the public may submit public comment on this guidance starting today.

The National Cybersecurity Strategy calls for a fundamental shift to rebalance the responsibility to defend cyber space onto those best positioned to bear it; namely, the software manufacturers who build products underpinning our collective digital infrastructure. Fully realizing this shift requires an understanding of the most egregious software development practices that software manufacturers must avoid. This catalog enumerates such practices.

“It’s 2024, and basic, preventable software defects continue to enable crippling attacks against hospitals, schools, and other critical infrastructure. This has to stop. These product security bad practices pose unacceptable risks in this day and age, and yet are all too common.” said CISA Director Jen Easterly. “We hope that by following this clear-cut, voluntary guidance, software manufacturers can lead by example in taking ownership of their customers’ security outcomes and fostering a secure by design future. Please provide input and let us know how we can improve this list of bad practices.”

“Our National Cybersecurity Strategy highlights the importance of securing our nation’s critical infrastructure and shoring up our cyber defenses,” said White House National Cyber Director Harry Coker Jr. “The impact of product security bad practices has wide-ranging consequences across our nation and is often felt by the American people. Our private sector partners must shoulder their responsibility and build secure products and I’m glad to see this document as another tool to help software manufacturers do just that. We need to work together to prioritize best practices to better protect our nation.”

“Bad practices in software development, especially when that software will be used by critical infrastructure, put both customers and our national security at risk,” said Assistant Director of the FBI’s Cyber Division Bryan Vorndran. “The FBI urges software manufacturers to avoid the risky practices described in this guidance, which lead to vulnerabilities that malicious actors routinely exploit.”

These product security bad practices represent the next major step in CISA and partners’ global Secure by Design initiative, which has joined forces with 18 U.S. and international agencies to publish guidance and catalyzed commitments from over 220 software manufacturers to CISA’s Secure by Design Pledge. The bad practices build on practices laid out in the pledge and other guidance including NIST’s Secure Software Development Framework. This catalog will be a central guiding document in CISA’s Secure by Design initiative going forward, playing a key role informing future guidance and actions.

This joint guidance lists the bad practices in three categories:

  • Product properties, which describe observable, security-related qualities of a software product.
  • Security features, which describe the security functionalities that a product supports.
  • Organizational processes and policies, which describe the actions taken by a software manufacturer to ensure strong transparency in its approach to security.

CISA selected the bad practices based on the threat landscape as representing the most dangerous and pressing items that software manufacturers should avoid.

The public comment period concludes on Monday, December 2, 2024. During the comment period, members of the public can provide comments and feedback via the Federal Register at Request for Comment on Product Security Bad Practices Guidance. Following the public comment period, CISA will issue a revised version of the bad practices.

To learn more about the Secure by Design initiative, visit Secure by Design on CISA.gov.

###

About CISA 

As the nation’s cyber defense agency and national coordinator for critical infrastructure security, the Cybersecurity and Infrastructure Security Agency leads the national effort to understand, manage, and reduce risk to the digital and physical infrastructure Americans rely on every hour of every day.

Visit CISA.gov for more information and follow us on XFacebookLinkedIn, Instagram

Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations

Source: US Department of Homeland Security

Summary

The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), the Communications Security Establishment Canada (CSE), the Australian Federal Police (AFP), and Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) are releasing this joint Cybersecurity Advisory to warn network defenders of Iranian cyber actors’ use of brute force and other techniques to compromise organizations across multiple critical infrastructure sectors, including the healthcare and public health (HPH), government, information technology, engineering, and energy sectors. The actors likely aim to obtain credentials and information describing the victim’s network that can then be sold to enable access to cybercriminals.

Since October 2023, Iranian actors have used brute force, such as password spraying, and multifactor authentication (MFA) ‘push bombing’ to compromise user accounts and obtain access to organizations. The actors frequently modified MFA registrations, enabling persistent access. The actors performed discovery on the compromised networks to obtain additional credentials and identify other information that could be used to gain additional points of access. The authoring agencies assess the Iranian actors sell this information on cybercriminal forums to actors who may use the information to conduct additional malicious activity.

This advisory provides the actors’ tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs). The information is derived from FBI engagements with entities impacted by this malicious activity.

The authoring agencies recommend critical infrastructure organizations follow the guidance provided in the Mitigations section. At a minimum, organizations should ensure all accounts use strong passwords and register a second form of authentication.

Download the PDF version of this report:

For a downloadable list of IOCs, see:

Technical Details

Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 15. See the MITRE ATT&CK Tactics and Techniques section in Appendix A for a table of the actors’ activity mapped to MITRE ATT&CK tactics and techniques.

Overview of Activity

The actors likely conduct reconnaissance operations to gather victim identity [T1589] information. Once obtained, the actors gain persistent access to victim networks frequently via brute force [T1110]. After gaining access, the actors use a variety of techniques to further gather credentials, escalate privileges, and gain information about the entity’s systems and network. The actors also move laterally and download information that could assist other actors with access and exploitation.

Initial Access and Persistence

The actors use valid user and group email accounts [T1078], frequently obtained via brute force such as password spraying [T1110.003] although other times via unknown methods, to obtain initial access to Microsoft 365, Azure [T1078.004], and Citrix systems [T1133]. In some cases where push notification-based MFA was enabled, the actors send MFA requests to legitimate users seeking acceptance of the request. This technique—bombarding users with mobile phone push notifications until the user either approves the request by accident or stops the notifications— is known as “MFA fatigue” or “push bombing” [T1621].

Once the threat actors gain access to an account, they frequently register their devices with MFA to protect their access to the environment via the valid account:

  • In two confirmed compromises, the actors leveraged a compromised user’s open registration for MFA [T1556.006] to register the actor’s own device [T1098.005] to access the environment.
  • In another confirmed compromise, the actors used a self-service password reset (SSPR) tool associated with a public facing Active Directory Federation Service (ADFS) to reset the accounts with expired passwords [T1484.002] and then registered MFA through Okta for compromised accounts without MFA already enabled [T1556] [T1556.006].

The actors frequently conduct their activity using a virtual private network (VPN) service [T1572]. Several of the IP addresses in the actors’ malicious activity originate from exit nodes tied to the Private Internet Access VPN service.

Lateral Movement

The actors use Remote Desktop Protocol (RDP) for lateral movement [T1021.001]. In one instance, the actors used Microsoft Word to open PowerShell to launch the RDP binary mstsc.exe [T1202].

Credential Access

The actors likely use open-source tools and methodologies to gather more credentials. The actors performed Kerberos Service Principal Name (SPN) enumeration of several service accounts and received Kerberos tickets [T1558.003]. In one instance, the actors used the Active Directory (AD) Microsoft Graph Application Program Interface (API) PowerShell application likely to perform a directory dump of all AD accounts. Also, the actors imported the tool [T1105] DomainPasswordSpray.ps1, which is openly available on GitHub [T1588.002], likely to conduct password spraying. The actors also used the command Cmdkey /list, likely to display usernames and credentials [T1555].

Privilege Escalation

In one instance, the actors attempted impersonation of the domain controller, likely by exploiting Microsoft’s Netlogon (also known as ”Zerologon”) privilege escalation vulnerability (CVE-2020-1472) [T1068].

Discovery

The actors leverage living off the land (LOTL) to gain knowledge about the target systems and internal networks. The actors used the following Windows command-line tools to gather information about domain controllers [T1018], trusted domains [T1482], lists of domain administrators, and enterprise administrators [T1087.002] [T1069.002] [T1069.003]:

  • Nltest /dclist
  • Nltest /domain_trusts
  • Nltest /domain_trusts/all_trusts
  • Net group “Enterprise admins” /domain
  • Net group “Domain admins” /domain

Next, the actors used the following Lightweight Directory Access Protocol (LDAP) query in PowerShell [T1059.001]to search the AD for computer display names, operating systems, descriptions, and distinguished names [T1082].

                                           $i=0
                                           $D= [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()
                                           $L='LDAP://' . $D
                                           $D = [ADSI]$L
                                           $Date = $((Get-Date).AddDays(-90).ToFileTime())
                                           $str = '(&(objectcategory=computer)(operatingSystem=*serv*)(|(lastlogon>='+$Date+')(lastlogontimestamp>='+$Date+')))'
                                           $s = [adsisearcher]$str
                                           $s.searchRoot = $L.$D.distinguishedName
                                           $s.PropertiesToLoad.Add('cn') > $Null
                                           $s.PropertiesToLoad.Add('operatingsystem') > $Null
                                           $s.PropertiesToLoad.Add('description') > $Null
                                           $s.PropertiesToLoad.Add('distinguishedName') > $Null
                                           Foreach ($CA in $s.FindAll()) {
                                                         Write-Host $CA.Properties.Item('cn')
                                                         $CA.Properties.Item('operatingsystem')
                                                         $CA. Properties.Item('description')
                                                         $CA.Properties.Item('distinguishedName')
                                                         $i++
                                           }
                                           Write-host Total servers: $i

Command and Control

On one occasion, using msedge.exe, the actors likely made outbound connections to Cobalt Strike Beacon command and control (C2) infrastructure [T1071.001].

Exfiltration and Collection

In a couple instances, while logged in to victim accounts, the actors downloaded files related to gaining remote access to the organization and to the organization’s inventory [T1005], likely exfiltrating the files to further persist in the victim network or to sell the information online.

Detection

To detect brute force activity, the authoring agencies recommend reviewing authentication logs for system and application login failures of valid accounts and looking for multiple, failed authentication attempts across all accounts.

To detect the use of compromised credentials in combination with virtual infrastructure, the authoring agencies recommend the following steps:

  • Look for “impossible logins,” such as suspicious logins with changing usernames, user agent strings, and IP address combinations or logins where IP addresses do not align to the user’s expected geographic location.
  • Look for one IP used for multiple accounts, excluding expected logins.
  • Look for “impossible travel.” Impossible travel occurs when a user logs in from multiple IP addresses with significant geographic distance (i.e., a person could not realistically travel between the geographic locations of the two IP addresses during the period between the logins). Note: Implementing this detection opportunity can result in false positives if legitimate users apply VPN solutions before connecting into networks.
  • Look for MFA registrations with MFA in unexpected locales or from unfamiliar devices.
  • Look for processes and program execution command-line arguments that may indicate credential dumping, especially attempts to access or copy the ntds.dit file from a domain controller.
  • Look for suspicious privileged account use after resetting passwords or applying user account mitigations.
  • Look for unusual activity in typically dormant accounts.
  • Look for unusual user agent strings, such as strings not typically associated with normal user activity, which may indicate bot activity.

Mitigations

The authoring agencies recommend organizations implement the mitigations below to improve organizations’ cybersecurity posture based on the actors’ TTPs described in this advisory. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA. The CPGs, which are organized to align to the National Institute of Standards and Technology (NIST) Cybersecurity Framework, are a subset of cybersecurity practices, aimed at meaningfully reducing risks to both critical infrastructure operations and the American people. These voluntary CPGs strive to help small- and medium-sized organizations kick-start their cybersecurity efforts by prioritizing investment in a limited number of essential actions with high-impact security outcomes. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.

  • Review IT helpdesk password management related to initial passwords, password resets for user lockouts, and shared accounts. IT helpdesk password procedures may not align to company policy for user verification or password strength, creating a security gap. Avoid common passwords (e.g. “Spring2024” or “Password123!”).
  • Disable user accounts and access to organizational resources for departing staff [CPG 2.D]. Disabling accounts can minimize system exposure, removing options actors can leverage for entry into the system. Similarly, create new user accounts as close as possible to an employee’s start date.
  • Implement phishing-resistant MFA [CPG 2.H]. See CISA’s resources Phishing-Resistant Multifactor Authentication and More than a Password for additional information on strengthening user credentials.
  • Continuously review MFA settings to ensure coverage over all active, internet-facing protocols to ensure no exploitable services are exposed [CPG 2.W].
  • Provide basic cybersecurity training to users [CPG 2.I] covering concepts such as:
    • Detecting unsuccessful login attempts [CPG 2.G].
    • Having users deny MFA requests they have not generated.
    • Ensuring users with MFA-enabled accounts have MFA set up appropriately.
  • Ensure password policies align with the latest NIST Digital Identity Guidelines.
    • Meeting the minimum password strength [CPG 2.B] by creating a password using 8-64 nonstandard characters and long passphrases, when possible.
  • Disable the use of RC4 for Kerberos authentication.

These mitigations apply to critical infrastructure entities across sectors.

The authoring agencies also recommend software manufacturers incorporate secure by design principles and tactics into their software development practices to protect their customers against actors using compromised credentials, thereby strengthening the security posture of their customers.  For more information on secure by design, see CISA’s Secure by Design webpage and joint guide.

Validate Security Controls

In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating organization security programs against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

To get started:

  1. Select an ATT&CK technique described in this advisory (see Table 1 to Table 12).
  2. Align your security technologies against the technique.
  3. Test your technologies against the technique.
  4. Analyze your detection and prevention technologies’ performance.
  5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
  6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

Contact Information

Organizations are encouraged to report suspicious or criminal activity related to information in this advisory to:

  • CISA via CISA’s 24/7 Operations Center [report@cisa.gov or 1-844-Say-CISA (1-844-729-2472)] or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact.
  • For NSA cybersecurity guidance inquiries, contact CybersecurityReports@nsa.gov.

Disclaimer

The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the authoring agencies.

Intrusion events connected to this Iranian group may also include a different set of cyber actors–likely the third-party actors who purchased access from the Iranian group via cybercriminal forums or other channels. As a result, some TTPs and IOCs noted in this advisory may be tied to these third-party actors, not the Iranian actors. The TTPs and IOCs are in the advisory to provide recipients the most complete picture of malicious activity that may be observed on compromised networks. However, exercise caution if formulating attribution assessments based solely on matching TTPs and IOCs.

Version History

October 2, 2024: Initial version.

Appendix A: MITRE ATT&CK Tactics and Techniques

See Tables 1–12 for all referenced actors’ tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

Table 1: Reconnaissance
Technique Title  ID Use
Gather Victim Identity Information T1589 The actors likely gathered victim information.
Table 2: Resource Development
Technique Title  ID Use
Obtain Capabilities: Tool T1588.002 The actors obtained a password spray tool through an open-source repository.
Table 3: Initial Access
Technique Title ID Use
Valid Accounts T1078 The actors used password spraying to obtain valid user and group email account credentials, allowing them access to the network.
Valid Accounts: Cloud Accounts T1078.004 The actors used accounts hosted on Microsoft 365, Azure, and Okta cloud environments as additional methods for initial access.
External Remote Services T1133 The actors exploited Citrix systems’ external-facing remote services as another method for gaining initial access to the system.
Table 4: Execution
Technique Title  ID Use
Command and Scripting Interpreter: PowerShell T1059.001 The actors used PowerShell commands to maintain and expand access.
Table 5: Persistence
Technique Title ID Use
Account Manipulation: Device Registration T1098.005 The actors used PowerShell commands to maintain and expand access.
Modify Authentication Process T1556 The actors used a public facing Active Directory Federation Service (ADFS) domain to reset the passwords of expired accounts.
Modify Authentication Process: Multi-Factor Authentication T1556.006 The actors used an MFA bypass method, such as Multi-Factor Authentication Request Generation, providing the ability to modify or completely disable MFA defenses.
Table 6: Privilege Escalation
Technique Title ID Use
Exploitation for Privilege Escalation T1068 The actors attempted impersonation of the domain controller likely by exploiting CVE-2020-1472, Microsoft’s Netlogon Privilege Escalation vulnerability.
Domain or Tenant Policy Modification: Trust Modification T1484.002 The actors leveraged a public-facing ADFS password reset tool to reactivate inactive accounts, allowing the actor to authenticate and enroll their devices as any user in the AD managed by the victim tenant.
Table 7: Defense Evasion
Technique Title ID Use
Indirect Command Execution T1202 The actors attempted impersonation of the Domain Controller likely by exploiting CVE-2020-1472, Microsoft’s Netlogon Privilege Escalation vulnerability.
Table 8: Credential Access
Technique Title ID Use
Brute Force: Password Spraying T1110.003 The actors targeted applications, including Single Sign-on (SSO) Microsoft Office 365, using brute force password sprays and imported the tool DomainPasswordSpray.ps1.
Credentials from Password Stores T1555 The actors used the command Cmdkey /list likely to display usernames and credentials.
Steal or Forge Kerberos Tickets: Kerberoasting T1558.003 The actors performed Kerberos Service Principal Name (SPN) enumeration of several service accounts and received Rivest Cipher 4 (RC4) tickets.
Multi-Factor Authentication Request Generation T1621 The actors sent MFA requests to legitimate users.
Table 9: Discovery
Technique Title ID Use
Remote System Discovery T1018 The actors used LOTL to return information about domain controllers.
Permission Groups Discovery: Domain Groups T1069.002 The actors used LOTL to return lists of domain administrators and enterprise administrators.
Permission Groups Discovery: Cloud Groups T1069.003 The actors used LOTL to return lists of domain administrators and enterprise administrators.
System Information Discovery  T1082 The actors were able to query the AD to discover display names, operating systems, descriptions, and distinguished names from the computer.
Account Discovery: Domain Account T1087.002 The actors used LOTL to return lists of domain administrators and enterprise administrators.
Domain Trust Discovery T1482 The actors used LOTL to return information about trusted domains.
Table 10: Lateral Movement
Technique Title  ID Use
Remote Services: Remote Desktop Protocol T1021.001 The actors used Microsoft Word to open PowerShell to launch RDP binary mstsc.exe.
Table 11: Collection
Technique Title ID Use
Data from Local System T1005 The actors downloaded files related to remote access methods and the organization’s inventory.
Table 12: Command and Control
Technique Title ID Use
Application Layer Protocol: Web Protocols T1071.001 The actors used msedge.exe to make outbound connections likely to Cobalt Strike Beacon C2 infrastructure.
Ingress Tool Transfer T1105 The actors imported a tool from GitHub and used it to conduct password spraying.
Protocol Tunneling T1572 The actors frequently conduct targeting using a virtual private network (VPN).

Appendix B: Indicators of Compromise

See Tables 13 to 15 for IOCs obtained from FBI investigations.

Table 13: Malicious Files Associated with Iranian Cyber Actors
Hash Description
1F96D15B26416B2C7043EE7172357AF3AFBB002A Associated with malicious activity.
3D3CDF7CFC881678FEBCAFB26AE423FE5AA4EFEC Associated with malicious activity.

Disclaimer: The authoring organizations recommend network defenders investigate or vet IP addresses prior to taking action, such as blocking, as many cyber actors are known to change IP addresses, sometimes daily, and some IP addresses may host valid domains. Many of the IP addresses provided below are assessed VPN nodes and as such are not exclusive to the Iranian actors’ use. The authoring organizations do not recommend blocking these IP addresses based solely on their inclusion in this JCSA. The authoring organizations recommend using the below IP addresses to search for previous activity the actors may have conducted against networks. If positive hits for these IP addresses are identified, the authoring organizations recommend making an independent determination if the observed activity aligns with the TTPs outlined in the JCSA. The timeframes included in the table reflect the timeframe the actors likely used the IPs.

Table 14: Network Indicators
IP Address Date Range
95.181.234.12 01/30/2024 to 02/07/2024
95.181.234.25 01/30/2024 to 02/07/2024
173.239.232.20 10/06/2023 to 12/19/2023
172.98.71.191 10/15/2023 to 11/27/2023
102.129.235.127 10/21/2023 to 10/22/2023
188.126.94.60 10/22/2023 to 01/12/2024
149.40.50.45 10/26/2023
181.214.166.59 10/26/2023
212.102.39.212 10/26/2023
149.57.16.134 10/26/2023 to 10/27/2023
149.57.16.137 10/26/2023 to 10/27/2023
102.129.235.186 10/29/2023 to 11/08/2023
46.246.8.138 10/31/2023 to 01/26/2024
149.57.16.160 11/08/2023
149.57.16.37 11/08/2023
46.246.8.137 11/17/2023 to 01/25/2024
212.102.57.29 11/19/2023 to 01/17/2024
46.246.8.82 11/22/2023 to 01/28/2024
95.181.234.15 11/26/2023 to 02/07/2024
45.88.97.225 11/27/2023 to 02/11/2024
84.239.45.17 12/04/2023 to 12/07/2023
46.246.8.104 12/07/2023 to 02/07/2024
37.46.113.206 12/07/2023
46.246.3.186 12/07/2023 to 12/09/2023
46.246.8.141 12/07/2023 to 02/10/2024
46.246.8.17 12/09/2023 to 01/09/2024
37.19.197.182 12/15/2023
154.16.192.38 12/25/2023 to 01/24/2024
102.165.16.127 12/27/2023 to 01/28/2024
46.246.8.47 12/29/2023 to 01/29/2024
46.246.3.225 12/30/2023 to 02/06/2024
46.246.3.226 12/31/2023 to 02/03/2024
46.246.3.240 12/31/2023 to 02/06/2024
191.101.217.10 01/05/2024
102.129.153.182 01/08/2024
46.246.3.196 01/08/2024
102.129.152.60 01/09/2024
156.146.60.74 01/10/2024
191.96.227.113 01/10/2024
191.96.227.122 01/10/2024
181.214.166.132 01/11/2024
188.126.94.57 01/11/2024 to 01/13/2024
154.6.13.144 01/13/2024 to 01/24/2024
154.6.13.151 01/13/2024 to 01/28/2024
188.126.94.166 01/15/2024
89.149.38.204 01/18/2024
46.246.8.67 01/20/2024
46.246.8.53 01/22/2024
154.16.192.37 01/24/2024
191.96.150.14 01/24/2024
191.96.150.96 01/24/2024
46.246.8.10 01/24/2024
84.239.25.13 01/24/2024
154.6.13.139 01/26/2024
191.96.106.33 01/26/2024
191.96.227.159 01/26/2024
149.57.16.150 01/27/2024
191.96.150.21 01/27/2024
46.246.8.84 01/27/2024
95.181.235.8 01/27/2024
191.96.227.102 01/27/2024 to 01/28/2024
46.246.122.185 01/28/2024
146.70.102.3 01/29/2024 to 01/30/2024
46.246.3.233 01/30/2024 to 02/15/2024
46.246.3.239 01/30/2024 to 02/15/2024
188.126.89.35 02/03/2024
46.246.3.223 02/03/2024
46.246.3.245 02/05/2024 to 02/06/2024
191.96.150.50 02/09/2024
Table 15: Devices
Device Type Description
Samsung Galaxy A71 (SM-A715F) Registered with MFA
Samsung SM-G998B Registered with MFA
Samsung SM-M205F Registered with MFA

U.S. Department of Homeland Security Recognizes 320 Employees at Secretary’s Award Ceremony in Washington D.C.

Source: US Department of Homeland Security

WASHINGTON – On October 15, the U.S. Department of Homeland Security (DHS) held an awards ceremony hosted at DHS headquarters located at St. Elizabeths campus in Southeast Washington, D.C. where 350 employees received a Secretary’s Award in recognition of their outstanding contributions to the Department’s mission.  

“Every single day, with great determination, integrity, and skill, the 268,000 men and women of the Department of Homeland Security ensure the safety and security of the American people,” said Secretary of Homeland Security Alejandro N. Mayorkas. “Thanks to these extraordinary public servants, our shores, harbors, skies, cyberspace, and borders are protected; fentanyl and other deadly drugs are prevented from entering our country; communities are able to recover and rebuild after a natural disaster; the scourges of human trafficking, forced labor, and online exploitation are mitigated; and so much more. The individuals we recognize today with our Department’s highest honor, the Secretary’s Award, reflect the very best of DHS – and in their selfless dedication to mission, the very best of public service.” 

The DHS Secretary’s Awards are an annual program that recognizes the extraordinary individual and collective achievements of the workforce. The 320 awardees recognized in today’s ceremony represent the Countering Weapons of Mass Destruction Office (CWMD), the Office of Intelligence and Analysis (I&A), the Management Directorate (MGMT), the Office of Health Affairs (OHA), the Office of the Inspector General (OIG), the Office of Legislative Affairs (OLA), Office of Homeland Security Situational Awareness (OSA), the Science and Technology Directorate (S&T), and the Transportation Security Administration (TSA). 

 “In recognizing these outstanding DHS personnel with a Secretary’s Award, we recognize all our talented personnel; the achievements of one are not possible without the contributions of others,” added Secretary Mayorkas. “We also express our appreciation to their families and loved ones; when one serves, the family serves too.” 

This year’s award recipients developed and issued policy and procedures associated with a whole-scale transition to a new pay system for TSA; launched a series of coordinated and collaborative initiatives, operations and investigations targeting Transnational Criminal Organizations (TCOs) and national security threats operating and transiting through the Darien Gap region; arrested over 8,000 human smugglers, produced over 5,000 intelligence reports, and seized over $38M USD in real property; ensured over 2,300 vital alerts and warnings were provided to owners and operators of critical infrastructure to protect against cyberattacks; among many other achievements.  

This year, DHS is holding nine Secretary’s Awards ceremonies across the country, honoring over 1,700 employees, the most annual awardees ever.  

Last year, Secretary Mayorkas unveiled 12 priorities for the Department, including a commitment to champion the workforce and transform the employee experience. DHS has the third largest workforce of any federal department, behind the Department of Defense and Department of Veterans Affairs. The Department is home to more than 92,000 sworn law enforcement officers, the greatest number of law enforcement officers of any department in the federal government. DHS has committed to increasing the representation of women in law enforcement or related occupations at DHS to 30% by 2030. Over 54,000 veterans, or nearly 21% of the workforce, continue serving their country by working at DHS.  

DHS operational components interact more frequently on a daily basis with the American public than any other federal department, from travelers moving through air, land, and sea ports of entry, to businesses importing goods into the country, to immigrants applying for services. To learn more about the impact DHS makes every day, visit: DHS.gov/TodayDHSWill

Last year, DHS improved the efficiency of processing noncitizens at the Southwest Border, deployed across the country to respond to natural disasters, investigated cybercrimes, created a new streamlined process for adjudicating asylum applications, safely and securely resettled nearly 90,000 evacuated Afghans in the United States, provided resources for organizations to enhance their cybersecurity resilience, established a process for Ukrainian nationals seeking refuge, secured the 2022 midterm elections, and demonstrated heroism by acting quickly and courageously to save lives in harrowing circumstances.    

Call for a G7 Action Plan to Prevent and Counter the Smuggling of Migrants

Source: US Department of Homeland Security

Preamble

We, the Interior and Security Ministers of the G7, in the context of the G7 Coalition to Prevent and Counter the Smuggling of Migrants launched by our Governments at the G7 Apulia summit as part of an approach ‘to enhance border management and enforcement and curb transnational organized crime involved in migrant smuggling and trafficking in persons’, reiterate and confirm our determination to intensify our efforts to prevent, counter and eradicate organized crime groups engaged in migrant smuggling, also in its connection with trafficking in persons, and strip them of the proceeds generated by these heinous crimes while always providing protection and assistance to migrants and victims of trafficking in persons, particularly women and girls.

While the smuggling of migrants and trafficking in persons are different phenomena, they often interact and both endanger the lives of the most vulnerable, exposing them to dangerous journeys and to an increased risk of serious violence and exploitation, including, but not limited to, sexual and labour exploitation, forced begging, and forced criminality.

Although difficult to quantify in statistical terms due to its unlawful and hidden nature, the United Nations Office on Drugs and Crime (UNODC) estimates that the migrant smuggling trade generates about US$ 6.75 billion a year for criminal organizations in two of the principal migrant smuggling routes leading from East, North and West Africa to Europe and from South America to North America. The global figure is likely to be much higher. Migrant smuggling is a form of irregular migration which undermines the sovereign right of states to regulate and manage the entry of foreign nationals and control their borders, which impacts security and damage public confidence in our systems.

While migrant smuggling affects G7 countries in different ways, it is a global phenomenon and we affirm our collective commitment and shared responsibility to a whole-of-route, whole-of-society, integrated, comprehensive, inclusive, sustainable and balanced approach. We will, in partnership with one another and with civil society organisations, tackle the challenges irregular migration presents and seize the opportunities created by regular, controlled migration, in line with the Global Alliance to counter migrant smuggling launched by the EU, including its call to action.

Recalling our G7 Leaders’ Communique, in our shared efforts to counter organised crime involved in migrant smuggling, we reaffirm our commitment to protecting human rights and fundamental freedoms, regardless of their migratory status, and, in this regard, we also recall the right of everyone to seek asylum from persecution as set forth in the Universal Declaration of Human Rights, and the obligations of states parties related to international protection under the 1951 Refugees Convention and its 1967 Protocol. In this sense we also acknowledge the importance action carried by the UNHCR in protecting victims of trafficking in persons. Furthermore, we will seek to ensure compliance with our international obligations, including those under the United Nations Convention against Transnational Organised Crime.

Priorities of the Action Plan

Within this framework and shared approach, we have been instructed by our Leaders to develop the following “G7 Action Plan to Prevent and Counter the Smuggling of Migrants“, pursuing the following priorities:

  • promote enhanced cooperation on investigative capacities, involving the relevant authorities in the countries of origin, transit and destination of irregular migratory flows as well as relevant international organisations;

  • strengthen border management processes, while respecting the sovereign right of States to control their borders and their prerogatives to govern migration within their jurisdiction. This should be conducted in accordance with international law, in particular as regards to the applicable rights of migrants, and in compliance with the applicable non-refoulement obligations and the prohibition of torture and cruel, inhuman or degrading treatment;

  • develop concrete collaborative actions to be taken in the global fight against transnational criminal organizations engaged in migrant smuggling and trafficking in persons;

  • promote a productive and reliable exchange of information as well as effective cooperation activities between our law enforcement, immigration and border control agencies and those of Coalition partner countries, which are essential for joint law enforcement actions based on established evidence against migrant smuggling and human trafficking networks;

  • engage with all facets of the international transportation system. Transportation companies – whether transport operators or supporting industries – play a critical role in preventing abuse of their service by migrant smugglers and traffickers in persons and in identifying potential victims of trafficking in persons. Engagement with aviation transport stakeholders – be it airlines or aviation authorities – is key to addressing the use of commercial means of transport to facilitate irregular migration, in line with the measures outlined in the EU’s ‘Toolbox addressing the use of commercial means of transport to facilitate irregular migration to the EU’;

  • discourage migrants from embarking on irregular and potentially perilous journeys by informing them about the heightened risks associated with migrant smuggling including the risk of trafficking in persons and of return from the destination country, if there is no lawful right to remain as well as on the availability of legal migration pathways opportunities and alternative economic opportunities in their regions.

The Action Plan is divided into five pillars: (i) strengthening the operational and investigative capacities of law enforcement agencies; (ii) strengthening international, judicial and police cooperation; (iii) intensified cooperation with third countries of origin and transit of irregular migration flows; (iv) prevention and awareness raising; and (v) knowledge and monitoring of the phenomenon.

Development of the Action Plan

  1. Strengthening the operational and investigative capacities of law enforcement agencies in the fight against organized criminal groups engaged in migrant smuggling and trafficking in persons by:

  • creating in the G7 countries considering themselves affected by migrant smuggling, where not already existing, law enforcement units specialized in crimes and investigations in the field of migrant smuggling and trafficking in persons;

  • creating or reinforcing, in the G7 countries considering themselves affected by migrant smuggling, a network of liaison officers from the relevant G7 countries (Police Liaison Officers, Internal Affairs and Justice Experts, etc.) in the countries of origin and transit of irregular migration flows;

  • enhancing intelligence and information exchange as a crucial element for possible subsequent joint law enforcement actions, including in the framework of the European Multidisciplinary Platform Against Criminal Threats (EMPACT) and by using established channels (e.g. Interpol’s I-24/7, Europol’s SIENA) for this purpose;

  • establishing and launching joint investigative actions by law enforcement officers from G7 countries considering themselves affected by the phenomenon, and also from third countries, where appropriate. These actions should be aimed at conducting investigations on targets of common interest and identifying “High Value Targets,” (i.e., organized transnational criminal groups, migrant smugglers and traffickers in persons) to be located for the purpose of capture, on which to focus the investigative attention and using INTERPOL and Europol capacities for centralised analysis;

  • Working collaboratively with social media companies to monitor internet and social networks platforms, as appropriate, to prevent their use in enabling migrant smuggling and trafficking in persons including through collectively calling on social media companies to do more to respond to online content that advertises migrant smuggling services, taking into account the duty to comply with existing domestic and international legislation and to cooperate intra-industry, especially supporting smaller companies, and make effective use of new technology, such as Artificial Intelligence tools, to promptly remove online activity of smugglers promoting irregular migration and offering illicit transportation services to migrants.

  • Encourage, where appropriate, trauma informed approaches to law enforcement interacting with survivors of migrant smuggling and victims of trafficking in persons.

 

  1. Strengthening international cooperation between police, judicial and border officials to combat organized crime groups engaged in migrant smuggling and trafficking in persons;

  • supporting key source and transit countries to fully implement their obligations under the UN Convention against Transnational Organised Crime (UNTOC) and its Protocols on the Smuggling of Migrants and Trafficking in Persons, working with the United Nations Office on Drugs and Crime (UNODC) as appropriate to assist those countries in the criminalization of smuggling of migrants;

  • utilising existing multilateral forums and multilateral relations with international initiatives and stakeholders including the Roma-Lyon Group, the Venice Justice Group, the Financial Action Task Force, EU’s Global Alliance to Counter Migrant Smuggling, the International Criminal Police Organization (INTERPOL), the United Nations Office on Drugs and Crime (UNODC) and other United Nations bodies, and the European Union Agency for Law Enforcement Cooperation (Europol), through the European Multidisciplinary Platform Against Criminal Threats (EMPACT), and the European Border and Coast Guard Agency (Frontex) within their respective mandates, and regional initiatives such as Niamey, Rabat, Khartoum and Budapest Process – in order to improve the effectiveness of the implementation of this plan and avoid duplication considering available resources;

  • using national-level and regional resources, Europol, and INTERPOL’s capabilities to support police, immigration and criminal intelligence cooperation and maximize the use of both national-level and multilateral databases and information exchange channels;

  • develop and share good practice on disrupting the enablers of smuggling of migrants including work to degrade the supply and value chains. This should include sharing expertise on the seizure and confiscation of criminal proceeds or instrumentalities to maximise law enforcement efforts by taking a ‘follow the money’ approach. This would target the proceeds of organised crime groups engaged in migrant smuggling and trafficking in persons and would also strengthen cooperation to identify, trace, freeze, manage and potentially confiscate illegal profits from migrants smuggling. To this purpose, the G7 members should take full advantage of the the potential of the Financial Investigation Units’ network.

 

  1.  Stronger cooperation with countries of origin and transit of irregular migration flows, where appropriate through:

  • the development and implementation of cooperation initiatives for the support of transit and origin countries in managing the challenges associated with, and providing alternatives to, irregular migration;

  • exploring equitable and mutually beneficial partnerships and bilateral or multilateral instruments with countries of origin, transit, and destination, aimed at cooperation in the field of combating smuggling of migrants, trafficking in persons and border security;

  • collaborating, where appropriate, with international organizations to enhance multifunctional centres along key migration routes offering information and assistance to migrants and the facilitatation of the safe and orderly repatriation of those not entitled to remain in G7 countries;

  • supporting host and transit countries along key migration routes in strengthening their capacities in the field of asylum and refugee protection;

  • facilitating voluntary returns of migrants from transit and destination countries, fostering cooperation on enforced returns of persons with no right to stay, in full respect of human rights and the principle of non-refoulement, allowing for increased options for migrants and more effective management of migration flows;

  • strengthening the management capacity of land and sea borders of the main countries of transit of irregular migration flows, identifying target countries and providing naval and land surveillance resources and assets or training;

  • consideration of visa requirements for certain individuals with a nexus to migrant smuggling, where appropriate, and consistent with domestic and international obligations;

  • working with the transportation industry and law enforcement of countries of transit to better identify potential migrant smuggling and cases of trafficking in persons and adjust responses based on emerging threats and knows risks;

  • promoting the cooperation on international obligations to readmit own citizens who have no right to stay including under the Convention on International Civil Aviation of 7 December 1944, known as the Chicago Convention;

 

  1. Prevention and awareness raising by:

  • developing and promoting effective information and awareness raising campaigns in key countries of origin and transit, on the risks of irregular migration, smuggling of migrants and trafficking in persons. Campaigns may also signpost on available legal pathways, the effectiveness of migration policies and measures to repatriate migrants without authorization to remain in country, in cooperation with local authorities and international bodies (such as UNHCR, IOM and European External Action Service) present both in countries of origin and transit. This may be in collaboration with international organisations and civil society where appropriate.

  • facilitate legal and safe migration alternatives, as set out in the G7 Apulia Leaders’ Communique which highlights regular pathways as a key part of comprehensive migration management strategies.

  • Cooperation with social media companies, including through a roundtable event organised by G7 partners, for the active engagement to identify and counter online content which promotes and offers intermediation and irregular migration services.

 

  1. Increasing knowledge and Monitoring of migrant smuggling

  • Encourage the conducting of field studies, including in collaboration with the international organizations, civil society organizations and academia to monitor and anticipate developments and trends in irregular migration flows, at global level and with regional focus;

  • sharing among the relevant authorities of the G7 countries of good practices, in the fight against migrant smuggling and trafficking in persons and all related offences and exploitation, in the protection of smuggled migrants and victims of trafficking in persons, as well as in maintaining border management;

  • supporting and further developing collective mechanisms for the exchange and analysis of statistical data on irregular migration flows and related phenomena, in order for G7 countries to improve their ability to monitor, identify and respond to identified trends;

  • encourage, in a manner consistent with applicable law, collection of gender and age disaggregated data, and dissemination of data on labor exploitation connected to trafficking in persons;

  • monitoring and review of the state of implementation of this Action Plan, to be conducted within the Roma-Lyon Group with progress reporting to the RLG Heads of Delegation to take place at the bi-annual meetings.