Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations

Source: US Department of Homeland Security

Summary

The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), the Communications Security Establishment Canada (CSE), the Australian Federal Police (AFP), and Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) are releasing this joint Cybersecurity Advisory to warn network defenders of Iranian cyber actors’ use of brute force and other techniques to compromise organizations across multiple critical infrastructure sectors, including the healthcare and public health (HPH), government, information technology, engineering, and energy sectors. The actors likely aim to obtain credentials and information describing the victim’s network that can then be sold to enable access to cybercriminals.

Since October 2023, Iranian actors have used brute force, such as password spraying, and multifactor authentication (MFA) ‘push bombing’ to compromise user accounts and obtain access to organizations. The actors frequently modified MFA registrations, enabling persistent access. The actors performed discovery on the compromised networks to obtain additional credentials and identify other information that could be used to gain additional points of access. The authoring agencies assess the Iranian actors sell this information on cybercriminal forums to actors who may use the information to conduct additional malicious activity.

This advisory provides the actors’ tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs). The information is derived from FBI engagements with entities impacted by this malicious activity.

The authoring agencies recommend critical infrastructure organizations follow the guidance provided in the Mitigations section. At a minimum, organizations should ensure all accounts use strong passwords and register a second form of authentication.

Download the PDF version of this report:

For a downloadable list of IOCs, see:

Technical Details

Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 15. See the MITRE ATT&CK Tactics and Techniques section in Appendix A for a table of the actors’ activity mapped to MITRE ATT&CK tactics and techniques.

Overview of Activity

The actors likely conduct reconnaissance operations to gather victim identity [T1589] information. Once obtained, the actors gain persistent access to victim networks frequently via brute force [T1110]. After gaining access, the actors use a variety of techniques to further gather credentials, escalate privileges, and gain information about the entity’s systems and network. The actors also move laterally and download information that could assist other actors with access and exploitation.

Initial Access and Persistence

The actors use valid user and group email accounts [T1078], frequently obtained via brute force such as password spraying [T1110.003] although other times via unknown methods, to obtain initial access to Microsoft 365, Azure [T1078.004], and Citrix systems [T1133]. In some cases where push notification-based MFA was enabled, the actors send MFA requests to legitimate users seeking acceptance of the request. This technique—bombarding users with mobile phone push notifications until the user either approves the request by accident or stops the notifications— is known as “MFA fatigue” or “push bombing” [T1621].

Once the threat actors gain access to an account, they frequently register their devices with MFA to protect their access to the environment via the valid account:

  • In two confirmed compromises, the actors leveraged a compromised user’s open registration for MFA [T1556.006] to register the actor’s own device [T1098.005] to access the environment.
  • In another confirmed compromise, the actors used a self-service password reset (SSPR) tool associated with a public facing Active Directory Federation Service (ADFS) to reset the accounts with expired passwords [T1484.002] and then registered MFA through Okta for compromised accounts without MFA already enabled [T1556] [T1556.006].

The actors frequently conduct their activity using a virtual private network (VPN) service [T1572]. Several of the IP addresses in the actors’ malicious activity originate from exit nodes tied to the Private Internet Access VPN service.

Lateral Movement

The actors use Remote Desktop Protocol (RDP) for lateral movement [T1021.001]. In one instance, the actors used Microsoft Word to open PowerShell to launch the RDP binary mstsc.exe [T1202].

Credential Access

The actors likely use open-source tools and methodologies to gather more credentials. The actors performed Kerberos Service Principal Name (SPN) enumeration of several service accounts and received Kerberos tickets [T1558.003]. In one instance, the actors used the Active Directory (AD) Microsoft Graph Application Program Interface (API) PowerShell application likely to perform a directory dump of all AD accounts. Also, the actors imported the tool [T1105] DomainPasswordSpray.ps1, which is openly available on GitHub [T1588.002], likely to conduct password spraying. The actors also used the command Cmdkey /list, likely to display usernames and credentials [T1555].

Privilege Escalation

In one instance, the actors attempted impersonation of the domain controller, likely by exploiting Microsoft’s Netlogon (also known as ”Zerologon”) privilege escalation vulnerability (CVE-2020-1472) [T1068].

Discovery

The actors leverage living off the land (LOTL) to gain knowledge about the target systems and internal networks. The actors used the following Windows command-line tools to gather information about domain controllers [T1018], trusted domains [T1482], lists of domain administrators, and enterprise administrators [T1087.002] [T1069.002] [T1069.003]:

  • Nltest /dclist
  • Nltest /domain_trusts
  • Nltest /domain_trusts/all_trusts
  • Net group “Enterprise admins” /domain
  • Net group “Domain admins” /domain

Next, the actors used the following Lightweight Directory Access Protocol (LDAP) query in PowerShell [T1059.001]to search the AD for computer display names, operating systems, descriptions, and distinguished names [T1082].

                                           $i=0
                                           $D= [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()
                                           $L='LDAP://' . $D
                                           $D = [ADSI]$L
                                           $Date = $((Get-Date).AddDays(-90).ToFileTime())
                                           $str = '(&(objectcategory=computer)(operatingSystem=*serv*)(|(lastlogon>='+$Date+')(lastlogontimestamp>='+$Date+')))'
                                           $s = [adsisearcher]$str
                                           $s.searchRoot = $L.$D.distinguishedName
                                           $s.PropertiesToLoad.Add('cn') > $Null
                                           $s.PropertiesToLoad.Add('operatingsystem') > $Null
                                           $s.PropertiesToLoad.Add('description') > $Null
                                           $s.PropertiesToLoad.Add('distinguishedName') > $Null
                                           Foreach ($CA in $s.FindAll()) {
                                                         Write-Host $CA.Properties.Item('cn')
                                                         $CA.Properties.Item('operatingsystem')
                                                         $CA. Properties.Item('description')
                                                         $CA.Properties.Item('distinguishedName')
                                                         $i++
                                           }
                                           Write-host Total servers: $i

Command and Control

On one occasion, using msedge.exe, the actors likely made outbound connections to Cobalt Strike Beacon command and control (C2) infrastructure [T1071.001].

Exfiltration and Collection

In a couple instances, while logged in to victim accounts, the actors downloaded files related to gaining remote access to the organization and to the organization’s inventory [T1005], likely exfiltrating the files to further persist in the victim network or to sell the information online.

Detection

To detect brute force activity, the authoring agencies recommend reviewing authentication logs for system and application login failures of valid accounts and looking for multiple, failed authentication attempts across all accounts.

To detect the use of compromised credentials in combination with virtual infrastructure, the authoring agencies recommend the following steps:

  • Look for “impossible logins,” such as suspicious logins with changing usernames, user agent strings, and IP address combinations or logins where IP addresses do not align to the user’s expected geographic location.
  • Look for one IP used for multiple accounts, excluding expected logins.
  • Look for “impossible travel.” Impossible travel occurs when a user logs in from multiple IP addresses with significant geographic distance (i.e., a person could not realistically travel between the geographic locations of the two IP addresses during the period between the logins). Note: Implementing this detection opportunity can result in false positives if legitimate users apply VPN solutions before connecting into networks.
  • Look for MFA registrations with MFA in unexpected locales or from unfamiliar devices.
  • Look for processes and program execution command-line arguments that may indicate credential dumping, especially attempts to access or copy the ntds.dit file from a domain controller.
  • Look for suspicious privileged account use after resetting passwords or applying user account mitigations.
  • Look for unusual activity in typically dormant accounts.
  • Look for unusual user agent strings, such as strings not typically associated with normal user activity, which may indicate bot activity.

Mitigations

The authoring agencies recommend organizations implement the mitigations below to improve organizations’ cybersecurity posture based on the actors’ TTPs described in this advisory. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA. The CPGs, which are organized to align to the National Institute of Standards and Technology (NIST) Cybersecurity Framework, are a subset of cybersecurity practices, aimed at meaningfully reducing risks to both critical infrastructure operations and the American people. These voluntary CPGs strive to help small- and medium-sized organizations kick-start their cybersecurity efforts by prioritizing investment in a limited number of essential actions with high-impact security outcomes. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.

  • Review IT helpdesk password management related to initial passwords, password resets for user lockouts, and shared accounts. IT helpdesk password procedures may not align to company policy for user verification or password strength, creating a security gap. Avoid common passwords (e.g. “Spring2024” or “Password123!”).
  • Disable user accounts and access to organizational resources for departing staff [CPG 2.D]. Disabling accounts can minimize system exposure, removing options actors can leverage for entry into the system. Similarly, create new user accounts as close as possible to an employee’s start date.
  • Implement phishing-resistant MFA [CPG 2.H]. See CISA’s resources Phishing-Resistant Multifactor Authentication and More than a Password for additional information on strengthening user credentials.
  • Continuously review MFA settings to ensure coverage over all active, internet-facing protocols to ensure no exploitable services are exposed [CPG 2.W].
  • Provide basic cybersecurity training to users [CPG 2.I] covering concepts such as:
    • Detecting unsuccessful login attempts [CPG 2.G].
    • Having users deny MFA requests they have not generated.
    • Ensuring users with MFA-enabled accounts have MFA set up appropriately.
  • Ensure password policies align with the latest NIST Digital Identity Guidelines.
    • Meeting the minimum password strength [CPG 2.B] by creating a password using 8-64 nonstandard characters and long passphrases, when possible.
  • Disable the use of RC4 for Kerberos authentication.

These mitigations apply to critical infrastructure entities across sectors.

The authoring agencies also recommend software manufacturers incorporate secure by design principles and tactics into their software development practices to protect their customers against actors using compromised credentials, thereby strengthening the security posture of their customers.  For more information on secure by design, see CISA’s Secure by Design webpage and joint guide.

Validate Security Controls

In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating organization security programs against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

To get started:

  1. Select an ATT&CK technique described in this advisory (see Table 1 to Table 12).
  2. Align your security technologies against the technique.
  3. Test your technologies against the technique.
  4. Analyze your detection and prevention technologies’ performance.
  5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
  6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

Contact Information

Organizations are encouraged to report suspicious or criminal activity related to information in this advisory to:

  • CISA via CISA’s 24/7 Operations Center [report@cisa.gov or 1-844-Say-CISA (1-844-729-2472)] or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact.
  • For NSA cybersecurity guidance inquiries, contact CybersecurityReports@nsa.gov.

Disclaimer

The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the authoring agencies.

Intrusion events connected to this Iranian group may also include a different set of cyber actors–likely the third-party actors who purchased access from the Iranian group via cybercriminal forums or other channels. As a result, some TTPs and IOCs noted in this advisory may be tied to these third-party actors, not the Iranian actors. The TTPs and IOCs are in the advisory to provide recipients the most complete picture of malicious activity that may be observed on compromised networks. However, exercise caution if formulating attribution assessments based solely on matching TTPs and IOCs.

Version History

October 2, 2024: Initial version.

Appendix A: MITRE ATT&CK Tactics and Techniques

See Tables 1–12 for all referenced actors’ tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

Table 1: Reconnaissance
Technique Title  ID Use
Gather Victim Identity Information T1589 The actors likely gathered victim information.
Table 2: Resource Development
Technique Title  ID Use
Obtain Capabilities: Tool T1588.002 The actors obtained a password spray tool through an open-source repository.
Table 3: Initial Access
Technique Title ID Use
Valid Accounts T1078 The actors used password spraying to obtain valid user and group email account credentials, allowing them access to the network.
Valid Accounts: Cloud Accounts T1078.004 The actors used accounts hosted on Microsoft 365, Azure, and Okta cloud environments as additional methods for initial access.
External Remote Services T1133 The actors exploited Citrix systems’ external-facing remote services as another method for gaining initial access to the system.
Table 4: Execution
Technique Title  ID Use
Command and Scripting Interpreter: PowerShell T1059.001 The actors used PowerShell commands to maintain and expand access.
Table 5: Persistence
Technique Title ID Use
Account Manipulation: Device Registration T1098.005 The actors used PowerShell commands to maintain and expand access.
Modify Authentication Process T1556 The actors used a public facing Active Directory Federation Service (ADFS) domain to reset the passwords of expired accounts.
Modify Authentication Process: Multi-Factor Authentication T1556.006 The actors used an MFA bypass method, such as Multi-Factor Authentication Request Generation, providing the ability to modify or completely disable MFA defenses.
Table 6: Privilege Escalation
Technique Title ID Use
Exploitation for Privilege Escalation T1068 The actors attempted impersonation of the domain controller likely by exploiting CVE-2020-1472, Microsoft’s Netlogon Privilege Escalation vulnerability.
Domain or Tenant Policy Modification: Trust Modification T1484.002 The actors leveraged a public-facing ADFS password reset tool to reactivate inactive accounts, allowing the actor to authenticate and enroll their devices as any user in the AD managed by the victim tenant.
Table 7: Defense Evasion
Technique Title ID Use
Indirect Command Execution T1202 The actors attempted impersonation of the Domain Controller likely by exploiting CVE-2020-1472, Microsoft’s Netlogon Privilege Escalation vulnerability.
Table 8: Credential Access
Technique Title ID Use
Brute Force: Password Spraying T1110.003 The actors targeted applications, including Single Sign-on (SSO) Microsoft Office 365, using brute force password sprays and imported the tool DomainPasswordSpray.ps1.
Credentials from Password Stores T1555 The actors used the command Cmdkey /list likely to display usernames and credentials.
Steal or Forge Kerberos Tickets: Kerberoasting T1558.003 The actors performed Kerberos Service Principal Name (SPN) enumeration of several service accounts and received Rivest Cipher 4 (RC4) tickets.
Multi-Factor Authentication Request Generation T1621 The actors sent MFA requests to legitimate users.
Table 9: Discovery
Technique Title ID Use
Remote System Discovery T1018 The actors used LOTL to return information about domain controllers.
Permission Groups Discovery: Domain Groups T1069.002 The actors used LOTL to return lists of domain administrators and enterprise administrators.
Permission Groups Discovery: Cloud Groups T1069.003 The actors used LOTL to return lists of domain administrators and enterprise administrators.
System Information Discovery  T1082 The actors were able to query the AD to discover display names, operating systems, descriptions, and distinguished names from the computer.
Account Discovery: Domain Account T1087.002 The actors used LOTL to return lists of domain administrators and enterprise administrators.
Domain Trust Discovery T1482 The actors used LOTL to return information about trusted domains.
Table 10: Lateral Movement
Technique Title  ID Use
Remote Services: Remote Desktop Protocol T1021.001 The actors used Microsoft Word to open PowerShell to launch RDP binary mstsc.exe.
Table 11: Collection
Technique Title ID Use
Data from Local System T1005 The actors downloaded files related to remote access methods and the organization’s inventory.
Table 12: Command and Control
Technique Title ID Use
Application Layer Protocol: Web Protocols T1071.001 The actors used msedge.exe to make outbound connections likely to Cobalt Strike Beacon C2 infrastructure.
Ingress Tool Transfer T1105 The actors imported a tool from GitHub and used it to conduct password spraying.
Protocol Tunneling T1572 The actors frequently conduct targeting using a virtual private network (VPN).

Appendix B: Indicators of Compromise

See Tables 13 to 15 for IOCs obtained from FBI investigations.

Table 13: Malicious Files Associated with Iranian Cyber Actors
Hash Description
1F96D15B26416B2C7043EE7172357AF3AFBB002A Associated with malicious activity.
3D3CDF7CFC881678FEBCAFB26AE423FE5AA4EFEC Associated with malicious activity.

Disclaimer: The authoring organizations recommend network defenders investigate or vet IP addresses prior to taking action, such as blocking, as many cyber actors are known to change IP addresses, sometimes daily, and some IP addresses may host valid domains. Many of the IP addresses provided below are assessed VPN nodes and as such are not exclusive to the Iranian actors’ use. The authoring organizations do not recommend blocking these IP addresses based solely on their inclusion in this JCSA. The authoring organizations recommend using the below IP addresses to search for previous activity the actors may have conducted against networks. If positive hits for these IP addresses are identified, the authoring organizations recommend making an independent determination if the observed activity aligns with the TTPs outlined in the JCSA. The timeframes included in the table reflect the timeframe the actors likely used the IPs.

Table 14: Network Indicators
IP Address Date Range
95.181.234.12 01/30/2024 to 02/07/2024
95.181.234.25 01/30/2024 to 02/07/2024
173.239.232.20 10/06/2023 to 12/19/2023
172.98.71.191 10/15/2023 to 11/27/2023
102.129.235.127 10/21/2023 to 10/22/2023
188.126.94.60 10/22/2023 to 01/12/2024
149.40.50.45 10/26/2023
181.214.166.59 10/26/2023
212.102.39.212 10/26/2023
149.57.16.134 10/26/2023 to 10/27/2023
149.57.16.137 10/26/2023 to 10/27/2023
102.129.235.186 10/29/2023 to 11/08/2023
46.246.8.138 10/31/2023 to 01/26/2024
149.57.16.160 11/08/2023
149.57.16.37 11/08/2023
46.246.8.137 11/17/2023 to 01/25/2024
212.102.57.29 11/19/2023 to 01/17/2024
46.246.8.82 11/22/2023 to 01/28/2024
95.181.234.15 11/26/2023 to 02/07/2024
45.88.97.225 11/27/2023 to 02/11/2024
84.239.45.17 12/04/2023 to 12/07/2023
46.246.8.104 12/07/2023 to 02/07/2024
37.46.113.206 12/07/2023
46.246.3.186 12/07/2023 to 12/09/2023
46.246.8.141 12/07/2023 to 02/10/2024
46.246.8.17 12/09/2023 to 01/09/2024
37.19.197.182 12/15/2023
154.16.192.38 12/25/2023 to 01/24/2024
102.165.16.127 12/27/2023 to 01/28/2024
46.246.8.47 12/29/2023 to 01/29/2024
46.246.3.225 12/30/2023 to 02/06/2024
46.246.3.226 12/31/2023 to 02/03/2024
46.246.3.240 12/31/2023 to 02/06/2024
191.101.217.10 01/05/2024
102.129.153.182 01/08/2024
46.246.3.196 01/08/2024
102.129.152.60 01/09/2024
156.146.60.74 01/10/2024
191.96.227.113 01/10/2024
191.96.227.122 01/10/2024
181.214.166.132 01/11/2024
188.126.94.57 01/11/2024 to 01/13/2024
154.6.13.144 01/13/2024 to 01/24/2024
154.6.13.151 01/13/2024 to 01/28/2024
188.126.94.166 01/15/2024
89.149.38.204 01/18/2024
46.246.8.67 01/20/2024
46.246.8.53 01/22/2024
154.16.192.37 01/24/2024
191.96.150.14 01/24/2024
191.96.150.96 01/24/2024
46.246.8.10 01/24/2024
84.239.25.13 01/24/2024
154.6.13.139 01/26/2024
191.96.106.33 01/26/2024
191.96.227.159 01/26/2024
149.57.16.150 01/27/2024
191.96.150.21 01/27/2024
46.246.8.84 01/27/2024
95.181.235.8 01/27/2024
191.96.227.102 01/27/2024 to 01/28/2024
46.246.122.185 01/28/2024
146.70.102.3 01/29/2024 to 01/30/2024
46.246.3.233 01/30/2024 to 02/15/2024
46.246.3.239 01/30/2024 to 02/15/2024
188.126.89.35 02/03/2024
46.246.3.223 02/03/2024
46.246.3.245 02/05/2024 to 02/06/2024
191.96.150.50 02/09/2024
Table 15: Devices
Device Type Description
Samsung Galaxy A71 (SM-A715F) Registered with MFA
Samsung SM-G998B Registered with MFA
Samsung SM-M205F Registered with MFA

U.S. Department of Homeland Security Recognizes 320 Employees at Secretary’s Award Ceremony in Washington D.C.

Source: US Department of Homeland Security

WASHINGTON – On October 15, the U.S. Department of Homeland Security (DHS) held an awards ceremony hosted at DHS headquarters located at St. Elizabeths campus in Southeast Washington, D.C. where 350 employees received a Secretary’s Award in recognition of their outstanding contributions to the Department’s mission.  

“Every single day, with great determination, integrity, and skill, the 268,000 men and women of the Department of Homeland Security ensure the safety and security of the American people,” said Secretary of Homeland Security Alejandro N. Mayorkas. “Thanks to these extraordinary public servants, our shores, harbors, skies, cyberspace, and borders are protected; fentanyl and other deadly drugs are prevented from entering our country; communities are able to recover and rebuild after a natural disaster; the scourges of human trafficking, forced labor, and online exploitation are mitigated; and so much more. The individuals we recognize today with our Department’s highest honor, the Secretary’s Award, reflect the very best of DHS – and in their selfless dedication to mission, the very best of public service.” 

The DHS Secretary’s Awards are an annual program that recognizes the extraordinary individual and collective achievements of the workforce. The 320 awardees recognized in today’s ceremony represent the Countering Weapons of Mass Destruction Office (CWMD), the Office of Intelligence and Analysis (I&A), the Management Directorate (MGMT), the Office of Health Affairs (OHA), the Office of the Inspector General (OIG), the Office of Legislative Affairs (OLA), Office of Homeland Security Situational Awareness (OSA), the Science and Technology Directorate (S&T), and the Transportation Security Administration (TSA). 

 “In recognizing these outstanding DHS personnel with a Secretary’s Award, we recognize all our talented personnel; the achievements of one are not possible without the contributions of others,” added Secretary Mayorkas. “We also express our appreciation to their families and loved ones; when one serves, the family serves too.” 

This year’s award recipients developed and issued policy and procedures associated with a whole-scale transition to a new pay system for TSA; launched a series of coordinated and collaborative initiatives, operations and investigations targeting Transnational Criminal Organizations (TCOs) and national security threats operating and transiting through the Darien Gap region; arrested over 8,000 human smugglers, produced over 5,000 intelligence reports, and seized over $38M USD in real property; ensured over 2,300 vital alerts and warnings were provided to owners and operators of critical infrastructure to protect against cyberattacks; among many other achievements.  

This year, DHS is holding nine Secretary’s Awards ceremonies across the country, honoring over 1,700 employees, the most annual awardees ever.  

Last year, Secretary Mayorkas unveiled 12 priorities for the Department, including a commitment to champion the workforce and transform the employee experience. DHS has the third largest workforce of any federal department, behind the Department of Defense and Department of Veterans Affairs. The Department is home to more than 92,000 sworn law enforcement officers, the greatest number of law enforcement officers of any department in the federal government. DHS has committed to increasing the representation of women in law enforcement or related occupations at DHS to 30% by 2030. Over 54,000 veterans, or nearly 21% of the workforce, continue serving their country by working at DHS.  

DHS operational components interact more frequently on a daily basis with the American public than any other federal department, from travelers moving through air, land, and sea ports of entry, to businesses importing goods into the country, to immigrants applying for services. To learn more about the impact DHS makes every day, visit: DHS.gov/TodayDHSWill

Last year, DHS improved the efficiency of processing noncitizens at the Southwest Border, deployed across the country to respond to natural disasters, investigated cybercrimes, created a new streamlined process for adjudicating asylum applications, safely and securely resettled nearly 90,000 evacuated Afghans in the United States, provided resources for organizations to enhance their cybersecurity resilience, established a process for Ukrainian nationals seeking refuge, secured the 2022 midterm elections, and demonstrated heroism by acting quickly and courageously to save lives in harrowing circumstances.    

Call for a G7 Action Plan to Prevent and Counter the Smuggling of Migrants

Source: US Department of Homeland Security

Preamble

We, the Interior and Security Ministers of the G7, in the context of the G7 Coalition to Prevent and Counter the Smuggling of Migrants launched by our Governments at the G7 Apulia summit as part of an approach ‘to enhance border management and enforcement and curb transnational organized crime involved in migrant smuggling and trafficking in persons’, reiterate and confirm our determination to intensify our efforts to prevent, counter and eradicate organized crime groups engaged in migrant smuggling, also in its connection with trafficking in persons, and strip them of the proceeds generated by these heinous crimes while always providing protection and assistance to migrants and victims of trafficking in persons, particularly women and girls.

While the smuggling of migrants and trafficking in persons are different phenomena, they often interact and both endanger the lives of the most vulnerable, exposing them to dangerous journeys and to an increased risk of serious violence and exploitation, including, but not limited to, sexual and labour exploitation, forced begging, and forced criminality.

Although difficult to quantify in statistical terms due to its unlawful and hidden nature, the United Nations Office on Drugs and Crime (UNODC) estimates that the migrant smuggling trade generates about US$ 6.75 billion a year for criminal organizations in two of the principal migrant smuggling routes leading from East, North and West Africa to Europe and from South America to North America. The global figure is likely to be much higher. Migrant smuggling is a form of irregular migration which undermines the sovereign right of states to regulate and manage the entry of foreign nationals and control their borders, which impacts security and damage public confidence in our systems.

While migrant smuggling affects G7 countries in different ways, it is a global phenomenon and we affirm our collective commitment and shared responsibility to a whole-of-route, whole-of-society, integrated, comprehensive, inclusive, sustainable and balanced approach. We will, in partnership with one another and with civil society organisations, tackle the challenges irregular migration presents and seize the opportunities created by regular, controlled migration, in line with the Global Alliance to counter migrant smuggling launched by the EU, including its call to action.

Recalling our G7 Leaders’ Communique, in our shared efforts to counter organised crime involved in migrant smuggling, we reaffirm our commitment to protecting human rights and fundamental freedoms, regardless of their migratory status, and, in this regard, we also recall the right of everyone to seek asylum from persecution as set forth in the Universal Declaration of Human Rights, and the obligations of states parties related to international protection under the 1951 Refugees Convention and its 1967 Protocol. In this sense we also acknowledge the importance action carried by the UNHCR in protecting victims of trafficking in persons. Furthermore, we will seek to ensure compliance with our international obligations, including those under the United Nations Convention against Transnational Organised Crime.

Priorities of the Action Plan

Within this framework and shared approach, we have been instructed by our Leaders to develop the following “G7 Action Plan to Prevent and Counter the Smuggling of Migrants“, pursuing the following priorities:

  • promote enhanced cooperation on investigative capacities, involving the relevant authorities in the countries of origin, transit and destination of irregular migratory flows as well as relevant international organisations;

  • strengthen border management processes, while respecting the sovereign right of States to control their borders and their prerogatives to govern migration within their jurisdiction. This should be conducted in accordance with international law, in particular as regards to the applicable rights of migrants, and in compliance with the applicable non-refoulement obligations and the prohibition of torture and cruel, inhuman or degrading treatment;

  • develop concrete collaborative actions to be taken in the global fight against transnational criminal organizations engaged in migrant smuggling and trafficking in persons;

  • promote a productive and reliable exchange of information as well as effective cooperation activities between our law enforcement, immigration and border control agencies and those of Coalition partner countries, which are essential for joint law enforcement actions based on established evidence against migrant smuggling and human trafficking networks;

  • engage with all facets of the international transportation system. Transportation companies – whether transport operators or supporting industries – play a critical role in preventing abuse of their service by migrant smugglers and traffickers in persons and in identifying potential victims of trafficking in persons. Engagement with aviation transport stakeholders – be it airlines or aviation authorities – is key to addressing the use of commercial means of transport to facilitate irregular migration, in line with the measures outlined in the EU’s ‘Toolbox addressing the use of commercial means of transport to facilitate irregular migration to the EU’;

  • discourage migrants from embarking on irregular and potentially perilous journeys by informing them about the heightened risks associated with migrant smuggling including the risk of trafficking in persons and of return from the destination country, if there is no lawful right to remain as well as on the availability of legal migration pathways opportunities and alternative economic opportunities in their regions.

The Action Plan is divided into five pillars: (i) strengthening the operational and investigative capacities of law enforcement agencies; (ii) strengthening international, judicial and police cooperation; (iii) intensified cooperation with third countries of origin and transit of irregular migration flows; (iv) prevention and awareness raising; and (v) knowledge and monitoring of the phenomenon.

Development of the Action Plan

  1. Strengthening the operational and investigative capacities of law enforcement agencies in the fight against organized criminal groups engaged in migrant smuggling and trafficking in persons by:

  • creating in the G7 countries considering themselves affected by migrant smuggling, where not already existing, law enforcement units specialized in crimes and investigations in the field of migrant smuggling and trafficking in persons;

  • creating or reinforcing, in the G7 countries considering themselves affected by migrant smuggling, a network of liaison officers from the relevant G7 countries (Police Liaison Officers, Internal Affairs and Justice Experts, etc.) in the countries of origin and transit of irregular migration flows;

  • enhancing intelligence and information exchange as a crucial element for possible subsequent joint law enforcement actions, including in the framework of the European Multidisciplinary Platform Against Criminal Threats (EMPACT) and by using established channels (e.g. Interpol’s I-24/7, Europol’s SIENA) for this purpose;

  • establishing and launching joint investigative actions by law enforcement officers from G7 countries considering themselves affected by the phenomenon, and also from third countries, where appropriate. These actions should be aimed at conducting investigations on targets of common interest and identifying “High Value Targets,” (i.e., organized transnational criminal groups, migrant smugglers and traffickers in persons) to be located for the purpose of capture, on which to focus the investigative attention and using INTERPOL and Europol capacities for centralised analysis;

  • Working collaboratively with social media companies to monitor internet and social networks platforms, as appropriate, to prevent their use in enabling migrant smuggling and trafficking in persons including through collectively calling on social media companies to do more to respond to online content that advertises migrant smuggling services, taking into account the duty to comply with existing domestic and international legislation and to cooperate intra-industry, especially supporting smaller companies, and make effective use of new technology, such as Artificial Intelligence tools, to promptly remove online activity of smugglers promoting irregular migration and offering illicit transportation services to migrants.

  • Encourage, where appropriate, trauma informed approaches to law enforcement interacting with survivors of migrant smuggling and victims of trafficking in persons.

 

  1. Strengthening international cooperation between police, judicial and border officials to combat organized crime groups engaged in migrant smuggling and trafficking in persons;

  • supporting key source and transit countries to fully implement their obligations under the UN Convention against Transnational Organised Crime (UNTOC) and its Protocols on the Smuggling of Migrants and Trafficking in Persons, working with the United Nations Office on Drugs and Crime (UNODC) as appropriate to assist those countries in the criminalization of smuggling of migrants;

  • utilising existing multilateral forums and multilateral relations with international initiatives and stakeholders including the Roma-Lyon Group, the Venice Justice Group, the Financial Action Task Force, EU’s Global Alliance to Counter Migrant Smuggling, the International Criminal Police Organization (INTERPOL), the United Nations Office on Drugs and Crime (UNODC) and other United Nations bodies, and the European Union Agency for Law Enforcement Cooperation (Europol), through the European Multidisciplinary Platform Against Criminal Threats (EMPACT), and the European Border and Coast Guard Agency (Frontex) within their respective mandates, and regional initiatives such as Niamey, Rabat, Khartoum and Budapest Process – in order to improve the effectiveness of the implementation of this plan and avoid duplication considering available resources;

  • using national-level and regional resources, Europol, and INTERPOL’s capabilities to support police, immigration and criminal intelligence cooperation and maximize the use of both national-level and multilateral databases and information exchange channels;

  • develop and share good practice on disrupting the enablers of smuggling of migrants including work to degrade the supply and value chains. This should include sharing expertise on the seizure and confiscation of criminal proceeds or instrumentalities to maximise law enforcement efforts by taking a ‘follow the money’ approach. This would target the proceeds of organised crime groups engaged in migrant smuggling and trafficking in persons and would also strengthen cooperation to identify, trace, freeze, manage and potentially confiscate illegal profits from migrants smuggling. To this purpose, the G7 members should take full advantage of the the potential of the Financial Investigation Units’ network.

 

  1.  Stronger cooperation with countries of origin and transit of irregular migration flows, where appropriate through:

  • the development and implementation of cooperation initiatives for the support of transit and origin countries in managing the challenges associated with, and providing alternatives to, irregular migration;

  • exploring equitable and mutually beneficial partnerships and bilateral or multilateral instruments with countries of origin, transit, and destination, aimed at cooperation in the field of combating smuggling of migrants, trafficking in persons and border security;

  • collaborating, where appropriate, with international organizations to enhance multifunctional centres along key migration routes offering information and assistance to migrants and the facilitatation of the safe and orderly repatriation of those not entitled to remain in G7 countries;

  • supporting host and transit countries along key migration routes in strengthening their capacities in the field of asylum and refugee protection;

  • facilitating voluntary returns of migrants from transit and destination countries, fostering cooperation on enforced returns of persons with no right to stay, in full respect of human rights and the principle of non-refoulement, allowing for increased options for migrants and more effective management of migration flows;

  • strengthening the management capacity of land and sea borders of the main countries of transit of irregular migration flows, identifying target countries and providing naval and land surveillance resources and assets or training;

  • consideration of visa requirements for certain individuals with a nexus to migrant smuggling, where appropriate, and consistent with domestic and international obligations;

  • working with the transportation industry and law enforcement of countries of transit to better identify potential migrant smuggling and cases of trafficking in persons and adjust responses based on emerging threats and knows risks;

  • promoting the cooperation on international obligations to readmit own citizens who have no right to stay including under the Convention on International Civil Aviation of 7 December 1944, known as the Chicago Convention;

 

  1. Prevention and awareness raising by:

  • developing and promoting effective information and awareness raising campaigns in key countries of origin and transit, on the risks of irregular migration, smuggling of migrants and trafficking in persons. Campaigns may also signpost on available legal pathways, the effectiveness of migration policies and measures to repatriate migrants without authorization to remain in country, in cooperation with local authorities and international bodies (such as UNHCR, IOM and European External Action Service) present both in countries of origin and transit. This may be in collaboration with international organisations and civil society where appropriate.

  • facilitate legal and safe migration alternatives, as set out in the G7 Apulia Leaders’ Communique which highlights regular pathways as a key part of comprehensive migration management strategies.

  • Cooperation with social media companies, including through a roundtable event organised by G7 partners, for the active engagement to identify and counter online content which promotes and offers intermediation and irregular migration services.

 

  1. Increasing knowledge and Monitoring of migrant smuggling

  • Encourage the conducting of field studies, including in collaboration with the international organizations, civil society organizations and academia to monitor and anticipate developments and trends in irregular migration flows, at global level and with regional focus;

  • sharing among the relevant authorities of the G7 countries of good practices, in the fight against migrant smuggling and trafficking in persons and all related offences and exploitation, in the protection of smuggled migrants and victims of trafficking in persons, as well as in maintaining border management;

  • supporting and further developing collective mechanisms for the exchange and analysis of statistical data on irregular migration flows and related phenomena, in order for G7 countries to improve their ability to monitor, identify and respond to identified trends;

  • encourage, in a manner consistent with applicable law, collection of gender and age disaggregated data, and dissemination of data on labor exploitation connected to trafficking in persons;

  • monitoring and review of the state of implementation of this Action Plan, to be conducted within the Roma-Lyon Group with progress reporting to the RLG Heads of Delegation to take place at the bi-annual meetings.

G7 Interior and Security Ministers’ Communiqué

Source: US Department of Homeland Security

  • We, the Interior and Security Ministers of the G7 and the Vice President of the EU Commission and the EU Commissioner for Home Affairs, met on 2 to 4 October 2024 in Mirabella Eclano, Italy. Under the chairmanship of Italy, we discussed the complex challenges to the security of our nations and renewed our commitment to fighting threats to our societies and democratic values.

  • Recognizing our common challenges, we are ever more determined to tackle them together, whilst also upholding the rule of law and safeguarding the freedoms of our citizens.

  • We build on the commitments of the previous G7 Interior and Security Ministers’ Meetings, including the Mito Communique, in which we set our common agenda to address the current and emerging challenges based on our shared values.

  • We support the ongoing efforts and intensification of cooperation of the G7 Roma-Lyon Group (RLG) to prevent and counter terrorism and violent extremism and counter organized crime under Italy’s presidency in 2024.

  • We welcome the G7 Coalition to Prevent and Counter the Smuggling of Migrants launched by the G7 Apulia Summit held in Borgo Egnazia, emphasizing the importance of taking a global approach to delivering effective and sustainable measures to tackling these complex crimes, leveraging synergies with other initiatives aimed at fostering international cooperation such as the Global Alliance to Counter Migrant Smuggling launched by the EU, including its call to action.

  • As tasked by our Leaders at the Apulia G7 Leaders’ Communique, we adopt the annexed Action Plan, which is aimed at preventing, countering, and dismantling organized criminal networks that profit from the smuggling of migrants, the trafficking in persons and other related crimes, as well as to disrupt the business models of organized criminal enterprises.

    Threats resulting from international crisis scenarios Middle East and Terrorism

  • We reiterate and support the Apulia G7 Leaders’ Communique that unequivocally condemned the horrific terrorist attacks against Israel committed and carried out by Hamas and others on October 7, 2023, and call for the immediate release of all remaining hostages without pre-conditions. We remain deeply concerned for the humanitarian situation in Gaza and, recalling the UN Security Council Resolution 2735, we urge an immediate ceasefire and a sustained increase in humanitarian assistance.

  • We condemn terrorism and violent extremism in all their forms, both online and offline. We are determined to protect our societies’ freedom and security, while upholding the rule of law and respecting human rights. We will continue to counter the financing of terrorism, the use of the Internet and emerging technologies for terrorist purposes, including the spread of terrorists’ violent ideologies and violent extremist propaganda, as well as through other means such as traditional media, while promoting respect for human rights such as freedom of expression.

  • We are fully aware that globally, the threat posed by violent extremism and terrorism has notably increased following the terrorist attack by Hamas and other terrorist groups on Israel. The conflict has triggered reactions, including increased polarization and radicalization to violence.

  • We are determined to adopt any lawful measures at both national and international levels to address the escalation of the current Middle East crisis and its impact on our communities. We are committed to providing our citizens with the highest level of security acting decisively and jointly by sharing our best resources.

  • We recognize value in investing in preventative efforts to support more socially cohesive and resilient societies. We intend to direct our actions towards both international and domestic dimensions to prevent the conditions that could drive violent extremist behaviors and strive to provide, as much as possible, for a holistic and proactive response, including partnering with and supporting civil society and communities. In particular, we aim to address the drivers of violent extremism, including violent extremist ideologies before they can lead to attacks. We also recognize the value of other preventive tools against terrorism, such as administrative and judicial measures. We aim to identify best practices in this area and make use of these measures, as appropriate, in order to prevent attacks on our territories.

  • We reiterate our commitment to fight the dissemination of terrorist and violent extremist content online as well as the use of new technology for terrorist purpose, while promoting respect for human rights, including freedom of expression. We call on digital industry to step up efforts to address the rise in terrorist and violent extremist content online. We also stress the need to increase dialogue and cooperation between governments, civil society organizations, and the digital industry. We reaffirm our cooperation with the Global Internet Forum to Counter Terrorism (GIFCT) and reiterate the importance of expanding its membership to include a broader range of tech companies, including smaller platforms. We also call on the GIFCT and its member companies to renew their commitments to prioritize addressing terrorist and violent extremist content online. We also reiterate our support to the Christchurch Call commitments.

  • A further potential threat we all face is that of individuals who have served their sentences for terrorist crimes and have now been released from prison, but retain the intent to conduct attacks, or inmates who are serving sentences for other type of crimes and have radicalized to violent extremism during detention. Prisons represent a key area where potential processes of radicalization to violent extremism should be closely monitored. We intend to strengthen our cooperation on this issue, within the scope of our respective domestic laws, to support activities related to terrorist disengagement, rehabilitation, and reintegration into the community.

  • We will aim to renew our efforts to take advantage of the potential offered by international political cooperation fora, such as Global Coalition against Daesh and the Global Counter Terrorism Forum (GCTF), which both includes all G7 members, and its inspired institutions (Hedayah – Center of Excellence for Countering Violent Extremism, GCERF – Global Community Engagement and Resilience Fund, and the IIJ – International Institute for Justice and the Rule of Law).

  • In this context, we welcome the G7 Roma-Lyon Group continues to assess the terrorist threats arising from crisis scenarios and discuss possible concrete actions to achieve a more systematic exchange of information on new trends, modus operandi and movement of known and suspected terrorists.

  • We, the G7 Interior and Security Ministers, reiterate our Leaders’ unwavering commitment to stand with Ukraine as it defends its freedom, sovereignty, independence, and territorial integrity within its internationally recognized borders against Russia’s aggression, for as long as it takes. We once again condemn, in the strongest possible terms, Russia’s illegal, unprovoked and brutal war against Ukraine. The security implications of Russia’s aggression for G7 members continue to be significant.

  • The full-scale invasion has caused a humanitarian crisis and generated large numbers of displaced people from Ukraine, internally, across the region, and to the G7 countries, creating opportunities for criminal networks to exploit the situation. We commit to identifying and tackling these criminal threats by working at all levels.

  • It is a priority to protect displaced Ukrainians, ensure the safety of hosting communities outside Ukraine and to address the risk of exploitation and trafficking of Ukrainians fleeing war by devising concrete strategies and effective actions, including through the continued efforts taken by the G7 Roma-Lyon Group.

  • We will continue to provide strong support to Ukraine in every area of our competence, including the respect of the rule of law, accountability for war crimes committed by members Russia’s forces and other government officials, the fight against organized crime and corruption, the fight against the trafficking in persons, and in firearms and other small arms and light weapons, as well as in the implementation of sanctions, and strengthening Ukraine’s resilience and border management through capacity building

  • We condemn all types of crimes committed in the context of Russia’s war. There must be no impunity for war crimes and other atrocities, including Russia’s unlawful killings, sexual violence, and torture. In this context, we reiterate our commitment to holding those responsible to account according to international law, including by supporting the efforts of the Ukrainian authorities and international bodies such as the International Criminal Court (ICC) and the International Centre for the Prosecution of the Crime of Aggression against Ukraine (ICPA) at Eurojust. We strongly condemn the unlawful deportation and transfer of Ukrainian civilians, including children, to Russia and elsewhere, and will continue to follow the progress of the ICC investigations in this regard with the utmost attention, and call for the immediate and safe return of all children, including those facing heightened risk of trafficking in persons. We reiterate the need for close cooperation between international and national authorities, supported by Europol and Eurojust, to ensure those responsible for international crimes can be held accountable.

  • We expect G7 Roma-Lyon Group to support Ukraine building up robust capacity to monitor the stocks and the acquisition and possession of firearms and SALW, investigate and prosecute their illegal possession and trafficking, and support international cooperation and assistance in this area, making full use of INTERPOL’s communication channels, databases and analytical capabilities.

  • Pending Russia’s withdrawal of its forces and the negotiation of a peace that is just, comprehensive and sustainable, in accordance with international law, including the UN charter, it is imperative to proactively address current and post-conflict recovery and reconstruction challenges in Ukraine. We will continue to provide comprehensive assistance to support the country’s recovery and reconstruction efforts, in both the short and long term. We will remain committed to sharing experiences and defining common investigative models to support Ukrainian authorities to reinforce their justice system and rule of law, tackle corruption and financial crimes, in line with international standards.

  • We commend the ongoing efforts by the G7 Roma-Lyon Group to intensify the support to Ukraine in the fields of prevention and countering terrorism and organized crimes, including the production of the Compendium on Support to Ukraine. The Compendium is a valuable resource and tool to enhance cooperation, collaboration and coordination among G7 members and to illustrate how capacity building efforts by G7 countries are instrumental in supporting Ukraine. We also welcome the priorities set in the 2024 Declaration of the G7 Ambassadors’ Support Group for Ukraine.

  • Countering foreign interference: hybrid threats including foreign information manipulation and interference (FIMI)

  • Hybrid threats, including foreign information manipulation and interference (FIMI), continue to be a growing security challenge to democratic societies. They aim to sow division in our societies, often support violent extremist activities and are fueled by malicious foreign players or their proxies. Information manipulation operations are being widely used by a range of domestic and foreign actors to create tensions and advance their strategic goals. As billions of people around the world are called to cast their ballots in 2024, the protection of fair elections free from any foreign interference and manipulation is a central focus of the G7 Agenda.

  • With the rapid evolution of emerging technologies, we are more concerned than ever about foreign interference in our democratic life and processes, and how attempted interference and manipulation campaigns, related malicious cyber activities, and transnational repression collectively undermine sovereignty and democratic values.

  • Foreign states, or non-state actors acting on their behalf, aim at misleading and deceiving our citizens, destabilizing our governments and democratic institutions, disrupting our critical infrastructure and undermining our shared values. They increasingly adopt hybrid tactics to threaten our rules-based international system, also by exploiting emerging technologies, such as Artificial Intelligence. Another growing threat to our democratic values and rule of law is transnational repression and information suppression.

  • We join our colleagues and counterparts among the G7 in our commitment to protecting our information environment and democratic values against any attempt of foreign interference and manipulation. In this regard, we affirm our continuing support for the G7 Rapid Response Mechanism (RRM) to strengthen the G7 coordination in identifying and responding to foreign threats against democracies, including by developing a collective response framework to counter foreign threats to democracies. We will strengthen our coordinated effort to prevent, detect, disrupt and respond to threats addressing the impact of hybrid threats at the earliest stage possible. Together we will work to strengthen public resilience to and awareness of FIMI.

  • We strongly condemn the widespread use of information manipulation and interference by the Russian Government and other foreign actors. We commit to championing free and independent media; we promote pluralism and freedom of expression. We will also address the potential risks of the malicious use of new technologies, in particular Artificial Intelligence. We therefore call upon tech companies, in particular social media platforms, to intensify their efforts to prevent and counter FIMI campaigns spreading on their platforms, and to reduce the potential abuse of AI for this purpose.

  • Security in the cyberspace and virtual assets Security perspectives in the cyberspace and new frontiers of investigation into the Virtual assets

  • Many social, political, and economic activities now occur through the use of information and communication technologies, offering significant opportunities for future innovations in every field. However, the rapid development of this realm also poses risks. These threats target individuals, government entities, businesses and public infrastructures, and these threats are posed by criminal organizations, terrorists and hostile state entities.

  • We are aware that by now the big transnational criminal organizations, as well as the main national organized crime groups rely to different extents on online illicit activities and on cybercrime, in view of the enormous potential that the internet offers in terms of making and multiplying illicit profits. In this scenario, cybercrime has long since exceeded warning levels, representing today one of the main threats to the security of our citizens but also to the structures and economic systems of our countries.

  • We welcome the adoption by the special ad hoc committee of a United Nations convention against cybercrime and acknowledge the importance of this Convention. This Convention will enhance the existing frameworks provided by the United Nations Convention against Transnational Organized Crime (commonly referred to as the Palermo Convention) and the Budapest Convention. To counter the rise in ransomware attacks by malicious cyber actors, including state aligned groups and cybercriminals, we continue to make best use of the International Counter Ransomware Initiative and will coordinate our efforts across the G7 to reduce ransom payments. We will also consider further coordinated actions to impose costs on malicious actors.

  • Following the 2023 G7 Interior and Security Ministers’ Declaration on Enhancing Cooperation in the Fight against Transnational Organized Fraud and the communique signed by all G7 at the Global Fraud Summit, we also reaffirm our commitment to tackling transnational organized fraud including cyber-enabled fraud, a rising global threat. We will strengthen our understanding of the threat picture to enable stronger law enforcement collaboration to dismantle these criminal networks.

  • We will remain vigilant, encouraging the contribution of Internet Service Providers to prevent “lawless zones” online, where vulnerable individuals, especially minors, may be at risk of entering.

  • We are committed to adopting a comprehensive approach and security strategies with the aim of planning, coordinating, and implementing appropriate measures to prevent and respond to malicious online activities. We will continue to share within the G7 Roma-Lyon Group best practices for identifying malicious online activities as well as criminal perpetrators’ actions. We will continue to strengthen the technological tools available to our law enforcement and national security authorities through existing organizations and agencies – such as INTERPOL and Europol – and mechanisms, such as the European Multidisciplinary Platform Against Crime Threats, as well as in the area of exchange of information, and in accordance with the existing legal framework respecting human rights and fundamental freedoms.

  • We seek the cooperation of Internet Service Providers (ISPs) and operators of social media platforms in implementing voluntary initiatives to timely detect and report illicit conduct in their systems, even in the absence of mandates from public security authorities.

  • Terrorist organizations are also leveraging social media platforms to radicalize individuals and reach as many supporters as possible to encourage and facilitate the commission of violent actions. In this context, young individuals, including minors, are especially at risk. Terrorists and individuals radicalized to violence also use private and encrypted online communication channels, which makes the investigation work of competent services difficult. Through these channels, they can broaden their networks and share propaganda or even manuals facilitating terrorist attacks. Apart from sharing such elements, terrorist organizations use social media to run crowdfunding campaigns, requesting financial contributions to their cause. In these campaigns, the organizations and their facilitators and supporters are increasingly using online payment platforms and especially virtual assets at the expense of more traditional means of payment.

  • Given the significant development of the cyber dimension in law enforcement activities, we are committed to coordinate the G7 action assessing risks, identifying threats and vulnerabilities and developing appropriate regulatory, organizational countermeasures, including training and capacity building, for use by the investigative bodies.

  • We also intend to increase our focus on transnational financial investigations aimed at detecting illicit financial flow and money laundering as well as confiscating proceeds of crime and funds intended to finance terrorism, including virtual assets, thus preventing and combating entry into legal economies by criminal organizations and terrorists, as well as deterring the financing of criminal activities. Applying the “follow the money” approach, which includes conducting systematic parallel financial investigations to investigate the networks of organized crime and terrorist groups, is a key lever for dismantling such transnational organized criminal groups.

  • In this regard, we aim to call for enhanced international law enforcement cooperation by third countries where proceed of crime transit or are destined, and/or where perpetrators operate, in order to confiscate said funds and apprehend perpetrators. Together we plan to collectively call on those countries to cooperate in accord with international obligations, including the Palermo Convention (the UN Convention Against Transnational Organized Crime), the UN Convention Against Corruption, and in line with Financial Action Task Force (FATF) standards.

  • We welcome the decision of the G7 Roma-Lyon Group to set up the “Cryptocurrency Prosecutors and Agents Network” from G7 countries, allowing exchange on investigations into the use of cryptocurrency and other forms of digital assets in criminal enterprises.

  • We will continue working together to maintain tightly-controlled lawful access to communications content that is vital to the investigation and prosecution of serious crimes including terrorism and child abuse. And we will work in partnership with technology companies to do this, protecting the safety of our citizens.

  • Illicit synthetic drugs From Methamphetamines to Fentanyl and beyond: a constantly evolving threat

  • Acknowledging the new threats posed by illicit synthetic drugs, we remain united in fighting against all types of illicit drugs, including plant-based drugs such as cocaine, and the organized crime groups responsible for their proliferation.

  • We welcome the Apulia G7 Leaders’ Communique on Synthetic Drug Threats and reaffirm our joint commitment to countering the illicit production, distribution, and sale of illicit synthetic drugs and to support evidence-based public responses to reduce drug use and its consequences.

  • We, the G7 Interior and Security Ministers express our deepest concern about the increasing threat faced by our communities from the availability of illicit synthetic drugs, such as fentanyl, nitazenes and captagon, which are becoming increasingly widespread. This rapidly evolving phenomenon is fueled by organized crime groups who attempt to maximize the illicit profit by contaminating the illegal drug supply with extremely dangerous synthetic substances.

  • This illicit synthetic drug challenge is complex. Organized crime’s use of low-cost chemicals and precursors diverted from legal activities makes it extremely difficult to control these substances in a timely manner. We thus call on all nations to actively investigate – and where appropriate prosecute – chemical companies and employees who are knowingly supplying criminal organizations with chemical substances that can be used to manufacture illicit drugs.

  • We plan to strengthen the systematic exchange of information on existing and/or planned policies, strategies and national plans to counter illicit synthetic drugs. We will facilitate the rapid exchange, among law enforcement agencies, of data on emerging synthetic drugs that have appeared on the market, methods of production, and the criminal networks involved. We intend to take swift action to implement the decisions of the UN Commission on Narcotic Drugs to control synthetic drugs and their precursors and to make best use of and fully leverage the capabilities of INTERPOL. In particular, we are united in using, strengthening, and expanding early warning systems, like the United Nations Office on Drugs and Crime (UNODC) Early Warning Advisory, to exchange information on the emergence of new substances on the market and share methodologies.

  • We welcome the first meeting of experts from chemical analysis laboratories of the G7 countries that will take place in Rome on October 15th and 16th, 2024, aimed at sharing best practices in identifying and tracking illicitly manufactured fentanyl, other synthetic drugs and other new psychoactive substances. In responding to the spread of illicit synthetic drugs, we recognize the need to improve the level of preparedness of law enforcement agencies, including with targeted in-depth training.

  • We will extend our cooperation to source and transit countries of illicit drugs and precursor chemicals. We will also “follow the money” to work with countries where the illicit proceeds of drug trafficking are directed in order to detect, seize and confiscate them.

  • We plan to continue to coordinate our positions in international and multilateral cooperation fora addressing the issue of illicit synthetic drugs. We also intend to learn from the recommendations of the Global Coalition to Address the Synthetic Drug Threats, as appropriate.

  • Addressing illicit drugs, whether synthetic or plant-based, requires a global and coordinated response from the many players along the supply chain to prevent and disrupt their flow, and effectively combat the criminal organizations behind them. This is why we strongly support “public-private” partnerships, including in ports, where public actors, in particular internal security forces and customs agencies, work in conjunction with private actors such as port operators and major shipping companies. These partnerships could be supported through “ports alliances”, following the example of the European Port Alliance, inaugurated on 24 January 2024 in Antwerp.

  • We recognize the importance of advancing the Hiroshima AI Process outcomes, and welcome support from the countries and organizations beyond the G7, as demonstrated by its Friends Group.

  • We recognize that AI technology is developing at a rapid pace, making it critical to continue to take proactive steps to mitigate risks which may emerge. We affirm our determination to make every effort to fully understand its possible uses and to provide our countries with the regulatory and technological tools that allow to fully embrace the opportunities it offers as well as mitigate the risks it involves.

  • We intend to assure our citizens the highest level of security, against both AI-exacerbated harms and wider threats, as well as use of AI in pursuit of our shared security goals. This can be done through cooperation among our countries in developing and adopting convergent policies on AI, developing global environments leading to innovation and digital security, exploring appropriate common rules and standards for a responsible and ethical use of AI in the security and intelligence sectors, and ensuring the essential respect for citizens’ rights and freedoms. We will invest in AI literacy programs for our citizens to enhance their resilience against malicious misuse of AI.

  • We will work to prevent the use of AI tools in illegal activities, including through greater education about the methods in which AI can be used by criminals.

  • While protecting civil liberties, privacy and personal data we are determined to take advantage of the opportunities that AI can offer in the field of law enforcement, particularly with reference to counter-terrorism and serious crime, victim support, online fraud detection and the fight against money laundering and financial crimes, in a manner that complies with applicable national and international law.

  • In this regard, we are committed to developing advanced tools to monitor, detect, and stop in time suspicious conduct or illegal conduct, including where that is supported or generated by AI.

  • Likewise, we are determined to encourage civil society organizations and state-led initiatives to harness the opportunities of AI to help prevent radicalisation to violence.

  • We intend to remain vigilant to hostile actors’ use of AI to undermine the integrity of democratic processes or individuals’ ability to freely form opinions.

  • We recognize that the technological development of police capabilities should not undermine traditional investigative activities, in which the human factor and investigative insight are fundamental. Ours should be a “technologically supported law enforcement” rather than a “technologically driven law enforcement,” as the automated process must generally be human interpretable, logically reconstructable and in support of, not in place of, human decision making.

  • In support of our efforts, we should collaborate with private stakeholders who develop and operate AI-based services and we call upon these organizations to put in place ethical and transparent policies as well as the sharing of data and procedures in order to understand AI threats and vulnerabilities. We call on private stakeholders to invest in educating society and policy makers on opportunities and risks of AI based services and products. In partnership with them, we want to develop common strategies to counter malicious uses, harness the opportunities of AI and implement control mechanisms. We are committed to promoting educational and awareness programs to create a culture of cybersecurity and ethics in the use of AI, providing the skills needed to protect data and recognize suspicious behavior.

  • We encourage the G7 Roma-Lyon Group, in coordination with the G7 Justice Venice Group, to proactively progress the discussion aimed at achieving a common understanding of opportunities and challenges AI presents to security authorities and to report on possible best practices to be jointly adopted in utilizing such technology for law enforcement purposes while both protecting civil liberties and countering the use of AI tools in criminal endeavors.

  • Irregular Migration Preventing and Countering migrant smuggling and trafficking in persons: a common security challenge

  • Migrant smuggling and trafficking in persons, while being different phenomena, often pose serious and life-threatening dangers to the most vulnerable, offend the dignity of individuals on the move and expose them to violence and exploitation. These unacceptable behaviors may undermine human rights and the sovereign right of States to control their borders, including for reasons of security and protection, as well as their prerogative to govern migration within their jurisdiction, in accordance with their obligations under international law and consistent with international commitments.

  • Through the three-pronged framework, set out at the Apulia G7 Leaders’ Summit, we, Ministers of the Interior of the G7 Countries, will reinforce our joint efforts to prevent, counter and dismantle the organized criminal networks profiting from migrant smuggling and trafficking in persons, to address the root causes of irregular migration and forced displacement and to offer safe and regular pathways for migration. Collectively, as part of a comprehensive approach to addressing these challenges, we also commit to working together to combat all forms of abuse and exploitation of migrants and displaced persons.

  • Recalling our Apulia G7 Leaders’ Communique, we reaffirm our commitment to protecting human rights and fundamental freedoms, regardless of their migratory status and, in this regard, we also recall the right of everyone to seek asylum from persecution, as set forth in the Universal Declaration of Human Rights, and the obligations of states parties related to international protection under the 1951 Refugee Convention and its 1967 Protocol.

  • Taking into consideration the launch of the G7 Coalition to Prevent and Counter the Smuggling of Migrants, and as mandated by the G7 Leaders, we have adopted the attached Action Plan (Annex A), working through existing partnerships and mechanisms, including with UNODC and other relevant United Nations bodies, such as the International Organization for Migration and the United Nations High Commissioner for Refugees, the EU’s Global Alliance to Counter Migrant Smuggling launched by the EU, including its call to action, and relevant EU Agencies and bodies such as Europol, Eurojust and Frontex, as well as the Financial Action Task Force, INTERPOL and through G7 frameworks such as the Roma-Lyon Group and the Venice Justice Group.

  • We commit to adopting a whole-of-route, whole-of-government approach, while considering the social aspects of migration, working not only across our G7 partners, but also with countries of origin and transit of migratory flows, and other strategic partners and international and civil society organizations. In doing so, we will build on the expertise and networks of the G7 Roma-Lyon Group.

  • Together, we recognise the importance of transnational cooperation to support countries of origin to reduce the smuggling of migrants and the trafficking of persons, to secure their borders and to increase the search and rescue capabilities at sea of countries with sea borders. We commit to addressing the root causes of irregular migration, including through promotion of safe, lawful and orderly alternatives and pathways. Further, we commit to promote economic development initiatives in source countries, integration and stabilisation opportunities where displaced migrants reside, and appropriate lawful pathways. We also need address the risk of exploitation and trafficking and support the development of protection capacities in transit countries along migratory routes and in countries of destination, routes in compliance with human rights obligations.

  • We will work to foster integrated border management and achieve more effective interception, investigation, disruption, prosecution and anti-corruption activities, to discourage, dismantle smuggling and trafficking networks throughout migration routes, with the aim of bringing perpetrators to justice and seizing their assets. In this regard, we recall the primary role of UNTOC and its protocols and encourage our partners to ensure their effective implementation.

  • In line with the “follow the money” approach, we acknowledge that it is crucial we prevent the “business model” for criminal individuals and networks from obtaining and accumulating illicit assets. Financial investigations for the identification, detection, tracing and subsequent seizure and confiscation of the proceeds of crime – also in the form of cryptocurrencies – are of key importance. Legislative and judicial action should prioritize focusing on High Level Targets to maximize its impact in disrupting the activities of organized criminal networks. Anti-money laundering initiatives and investigations on the connections between migrant smuggling, trafficking in persons and transnational financial crimes will be reinforced among our national authorities.

  • We will commit to countering the digital dimension of migrant smuggling as well as its connection to trafficking in persons, focusing on the use of the internet and social media by criminal organizations to promote, manage and facilitate transnational migrant smuggling and trafficking in persons also in cooperation with relevant international and EU bodies and agencies, such as the UNODC, Europol and Eurojust. In this sense, it is important to seek active cooperation from internet service providers and social media companies, as well as work towards a more and more common and coordinated approach among law enforcement authorities to improve cooperation with these stakeholders, both on preventive (deletion of content at source, the dereferencing of websites and the development of a counter-narrative), and on legal (increasing transparency on social networks, developing moderation practices and making platforms more accountable) aspects.

  • We acknowledge that effective return policies enforced in a manner consistent with international law and in full respect of human rights are an essential tool in combating migrant smuggling and irregular migration, as they represent a deterrent for migrants. In particular, we will work to strengthen border management and visa policies and processes, also with a view to limit the activities of migrant smuggling and human trafficking networks. We will also work collectively to support the safe and dignified return of persons not eligible to remain, as well as to support sustainable reintegration efforts in countries of origin. We will leverage our collective diplomatic efforts in encouraging countries to readmit their nationals, in line with their international commitments and through fair processes.

  • We plan to identify individuals who profit from irregular cross-border movements, including those originating from regions characterized by persistent instability. We intend to intensify collaboration amongst relevant authorities on exchanges of data and information, including biographic and biometric data, to more effectively identify and detect at border and immigration controls, high-risk travelers associated with organized crime or terrorism, as well as to identify and duly assist smuggled migrants and victims of human trafficking and other related crimes. For this purpose, we plan to draw upon our national level databases, as well as INTERPOL’s databases and communication channels, to share appropriate data, including but not limited to API (Advance Passenger Information) data, PNR (Passenger Name Record) data, and, more generally, data on lost or stolen documents or any travel bans imposed at the national level.

  • In this sense, we resolve in making full use of the opportunities offered by existing frameworks and initiatives such as the Global Compact for Migration, the Niamey Process, the Khartoum Process, the Bali Process and more recently the “Rome Process”, whose scope is fighting human traffickers and smugglers as well as supporting economic development and, other means of action: the NDICI – Global Europe.

  • Microsoft Releases October 2024 Security Updates

    Source: US Department of Homeland Security

    Microsoft released security updates to address vulnerabilities in multiple products. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system.

    CISA encourages users and administrators to review the following and apply necessary updates:

    CISA and FBI Warn of Iranian-Backed Cyber Activity to Undermine U.S. Democratic Institutions

    Source: US Department of Homeland Security

    Fact sheet provides information on actors’ techniques and recommended mitigations for individuals and organizations associated with national political campaigns

    WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) published a fact sheet today, How to Protect against Iranian Targeting of Accounts Associated with National Political Organizations. Actors affiliated with the Iranian Government’s Islamic Revolutionary Guard Corps (IRGC) are using social engineering techniques across email and chat applications probably to stoke discord and undermine confidence in U.S. democratic institutions. This fact sheet provides recommended actions to protect against this malicious activity.

    IRGC actors target and compromise the personal and business accounts of Americans, in particular. individuals associated with national political organizations. They also target individuals and organizations working or have worked on issues related to Iranian and Middle Eastern affairs.

    CISA and the FBI recommend mitigations and best practices that will help organizations and individuals strengthen their security and resilience, including keeping applications and operating systems updated, training staff to only use official accounts for business, and implementing phishing-resistant multifactor authentication (MFA).  

    “With FBI, CISA works to provide timely, actionable information that helps our partners reduce their risk from myriad threats,” said CISA Executive Assistant Director for Cybersecurity, Jeff Greene. “IRGC cyber actors pose an ongoing and escalating risk. We urge individuals and organizations associated with national political organizations or campaigns to review and implement actions in this joint fact sheet.”

    The FBI and CISA continue to work closely to provide services and information to safeguard public and private sector and individuals.

    For more information, please visit CISA’s Iran Cyber Threat and #Protect2024 webpages.

    ###

    About CISA 

    As the nation’s cyber defense agency and national coordinator for critical infrastructure security, the Cybersecurity and Infrastructure Security Agency leads the national effort to understand, manage, and reduce risk to the digital and physical infrastructure Americans rely on every hour of every day.

    Visit CISA.gov for more information and follow us on XFacebookLinkedIn, Instagram

    U.S. Department of Homeland Security Recognizes 350 Employees at Secretary’s Award Ceremony in Washington D.C.

    Source: US Department of Homeland Security

    WASHINGTON – On October 7, the U.S. Department of Homeland Security (DHS) held an awards ceremony hosted at DHS headquarters located at St. Elizabeths campus in Southeast Washington, D.C. where 350 employees received a Secretary’s Award in recognition of their outstanding contributions to the Department’s mission.

    “Every single day, with great determination, integrity, and skill, the 268,000 men and women of the Department of Homeland Security ensure the safety and security of the American people,” said Secretary of Homeland Security Alejandro N. Mayorkas. “Thanks to these extraordinary public servants, our shores, harbors, skies, cyberspace, and borders are protected; fentanyl and other deadly drugs are prevented from entering our country; communities are able to recover and rebuild after a natural disaster; the scourges of human trafficking, forced labor, and online exploitation are mitigated; and so much more. The individuals we recognize today with our Department’s highest honor, the Secretary’s Award, reflect the very best of DHS – and in their selfless dedication to mission, the very best of public service.”

    The DHS Secretary’s Awards are an annual program that recognizes the extraordinary individual and collective achievements of the workforce. The 350 awardees recognized in today’s ceremony represent the Office of Civil Rights and Civil Liberties (CRCL), the Office of the General Counsel (OGC), U.S. Immigration and Customs Enforcement (ICE), and the United States Citizenship and Immigration Services (USCIS).

    “In recognizing these outstanding DHS personnel with a Secretary’s Award, we recognize all our talented personnel; the achievements of one are not possible without the contributions of others,” added Secretary Mayorkas. “We also express our appreciation to their families and loved ones; when one serves, the family serves too.”

    This year’s award recipients developed and issued policy and procedures associated with a whole-scale transition to a new pay system for TSA; launched a series of coordinated and collaborative initiatives, operations and investigations targeting Transnational Criminal Organizations (TCOs) and national security threats operating and transiting through the Darien Gap region; arrested over 8,000 human smugglers, produced over 5,000 intelligence reports, and seized over $38M USD in real property; ensured over 2,300 vital alerts and warnings were provided to owners and operators of critical infrastructure to protect against cyberattacks; among many other achievements.

    This year, DHS is holding nine Secretary’s Awards ceremonies across the country, honoring over 1,700 employees, the most annual awardees ever.

    Last year, Secretary Mayorkas unveiled 12 priorities for the Department, including a commitment to champion the workforce and transform the employee experience. DHS has the third largest workforce of any federal department, behind the Department of Defense and Department of Veterans Affairs. The Department is home to more than 92,000 sworn law enforcement officers, the greatest number of law enforcement officers of any department in the federal government. DHS has committed to increasing the representation of women in law enforcement or related occupations at DHS to 30% by 2030. Over 54,000 veterans, or nearly 21% of the workforce, continue serving their country by working at DHS.

    DHS operational components interact more frequently on a daily basis with the American public than any other federal department, from travelers moving through air, land, and sea ports of entry, to businesses importing goods into the country, to immigrants applying for services. To learn more about the impact DHS makes every day, visit: DHS.gov/TodayDHSWill.

    Last year, DHS improved the efficiency of processing noncitizens at the Southwest Border, deployed across the country to respond to natural disasters, investigated cybercrimes, created a new streamlined process for adjudicating asylum applications, safely and securely resettled nearly 90,000 evacuated Afghans in the United States, provided resources for organizations to enhance their cybersecurity resilience, established a process for Ukrainian nationals seeking refuge, secured the 2022 midterm elections, and demonstrated heroism by acting quickly and courageously to save lives in harrowing circumstances.

    For the full list of awardees, visit 2024 Secretary’s Awards | Homeland Security (dhs.gov).  

    DHS Statement on Safety and Enforcement During Hurricane Milton

    Source: US Department of Homeland Security

    During emergency events, the Department of Homeland Security (DHS) works with its federal, state, local, and non-governmental partners to support the needs of the people in the areas that may be impacted.

    In such circumstances, U.S. Immigration and Customs Enforcement (ICE) and U.S. Customs and Border Protection (CBP) remind the public that sites that provide emergency response and relief are considered protected areas. To the fullest extent possible, ICE and CBP do not conduct immigration enforcement activities at protected areas such as along evacuation routes, sites used for sheltering or the distribution of emergency supplies, food or water, or registration sites for disaster-related assistance or the reunification of families and loved ones.

    At the request of FEMA or local and state authorities, ICE and CBP may help conduct search and rescue, air traffic de-confliction and public safety missions. ICE and CBP provide emergency assistance to individuals regardless of their immigration status. DHS officials do not and will not pose as individuals providing emergency-related information as part of any enforcement activities.

    DHS is committed to ensuring that every individual who seeks shelter, aid, or other assistance as a result of a natural disaster or emergency event is able to do so regardless of their immigration status.

    DHS carries out its mission without discrimination on the basis of race, religion, gender, sexual orientation or gender identity, ethnicity, disability or political associations, and in compliance with law and policy.

    For information about filing a complaint with the DHS Office for Civil Rights and Civil Liberties about these matters, please visit our Make a Civil Rights Complaint page.

    Statement from Secretary Alejandro N. Mayorkas Marking One Year Since the October 7th Attack

    Source: US Department of Homeland Security

    Secretary of Homeland Security Alejandro N. Mayorkas issued the following statement marking one year since the October 7, 2023 terrorist attacks on Israel.

    “One year ago today, brutal Hamas terrorists attacked innocent people in Israel, massacring more than 1,200 innocent men, women, and children of all ages, committing gruesome acts of sexual violence, gravely wounding others, and abducting more than 250 hostages. In the days, weeks, and months since, Hamas has killed hostages and Israel has rescued others. To this day, innocent people remain captive in the cruel hands of Hamas.

    “The terrorist attacks of October 7, 2023 wreaked the deadliest day for the Jewish people since the Holocaust. Today especially, one year later, we mourn the lives lost and pray for those carrying wounds, including those innocent Palestinians who have suffered as a result of Hamas’s terrorism. We express our enduring resolve to rescue the remaining hostages.

    “In the Department of Homeland Security, we work tirelessly to combat the hate that has only become more pronounced since the October 7 terrorist attacks. We combat the rise in antisemitism, Islamophobia, and all forms of hate by engaging with communities across our country, providing tools to enhance the safety of worshippers of all faiths, and distributing grant funds that Congress has provided at an unprecedented level to help religious institutions and other nonprofit organizations keep their communities secure.

    “On this day, we commemorate the victims of the October 7, 2023 terrorist attacks. May the memory of the lives lost continue to be a blessing. We pray for the release of the hostages. We redouble our efforts to combat hate, and we pray for peace.”

    DHS & Polish Ministry of Digital Affairs Sign Memorandum of Understanding, Promoting Cybersecurity and Emerging Technology Partnership

    Source: US Department of Homeland Security

    WASHINGTON – On October 1, 2024, the Department of Homeland Security (DHS) and the Polish Ministry of Digital Affairs (MDA) signed a Memorandum of Understanding (MOU) to deepen collaboration in cybersecurity and emerging technology. This arrangement strengthens the already close partnership by providing a framework for future policy and operational cooperation. It also demonstrates the shared commitment between the two sides towards the broader transatlantic security alliance in addressing global challenges such as cybersecurity and artificial intelligence, particularly as Russia continues its unprovoked and unjustified invasion of Ukraine.

    The MOU specifically calls for increased exchanges in areas including cyber policy and strategy; Secure by Design work; information sharing; incident response; human capital development; and emerging technology. The MOU highlights an explicit intent for future work related to the development of safe and secure artificial intelligence as well as Internet of Things technologies.

    “This arrangement lays the groundwork to strengthen and continue building our collaboration, helping DHS and MDA tackle shared responsibilities and achieve our security goals,” said Under Secretary for Policy Robert Silvers. “Through our strong public-private partnerships, DHS is the key link domestically for cybersecurity and critical infrastructure, and we’re increasingly becoming that link for global partners facing similar threats. I am proud to sign this MOU with such a valued partner as Poland.”

    The signing comes in the midst of the White House’s Fourth Counter Ransomware Initiative Summit. There, the United States and Poland – along with representatives from nearly 70 other countries and international organizations – committed to continuing to fight the global rise in ransomware incidents. DHS and MDA also enter this arrangement ahead of Poland assuming the rotating presidency of the Council of the European Union in January 2025, where the stated priorities include strengthening relations with the United States, as well as ensuring European information security. 

    “Poland has long championed solidarity in civil society, but effectively doing so requires ensuring societal safety and security, especially in cyberspace. With this in mind, as we consider the range of threats and potentially disruptive consequences of emerging technologies in the modern world, we believe it is crucial to partner with our closest security partners,” said MDA Under Secretary of State Rafał Rosiński, signatory for Poland.

    Various DHS entities, including the Cybersecurity and Infrastructure Security Agency (CISA), the Office of Strategy, Policy, and Plans, and the Science and Technology Directorate, will advance cybersecurity and emerging technology cooperation. Poland’s MDA will similarly coordinate implementation including via its National Research Institute (NASK).