Thursday, May 31, 2018
Criminal Justice Technology in the News
Law Enforcement News
Law Enforcement Agencies Turning to Drones to Fight Crime
Policeone.com, (05/29/2018), John Seewer for The Associated Press
The number of public safety agencies with drones has more than doubled since the end of 2016, according to data collected by the Center for the Study of the Drone at New York's Bard College. The center estimated that slightly more than 900 police, sheriff, fire and emergency agencies now have drones, with Texas, California and Wisconsin leading the way.
Link to Article
New Program Allows Teachers to Alert Police in Seconds
Western Mass News, (05/23/2018), Mary Cate Mannion and Erin Fitzsimonds
A new program is being implemented in some western Massachusetts schools that will allow teachers to alert police in seconds in an emergency. The In Force app can be launched from a cell phone or a computer, and within 12 seconds, an alert is sent to local police with the location. Officers will join the alert, and a chat bubble will open where the sender can add a description of an assailant or information about an emergency.
Link to Article
Officials Demonstrate Getting into ‘Warm Zones' During Mass Attacks to Treat Victims
Pittsburgh Post-Gazette, (05/23/2018), Annie Rosenthal
Pittsburgh police officers, firefighters and EMTs recently participated in training to prepare them to treat victims of mass shootings or other attacks before the scene has been cleared. Previously, protocol has required emergency medical teams to wait until a building is entirely cleared before sending in medics. The new method is to provide police protection that will allow teams of medical personnel to enter areas of a building that police have deemed free of immediate threats without having to wait until the entire building is clear.
Link to Article
Need a Safe Place to Exchange Goods? Sunnyvale Police Has Just the Place for You
The Mercury News, (05/23/2018), Khalida Sarwari
People in Sunnyvale, Calif., can now exchange goods purchased from online sites in an area in front of the Sunnyvale Department of Public Safety. The exchange zone is two well-lit, marked parking spaces that are monitored by surveillance cameras 24 hours a day. The cameras keep a log of transactions that officers can go back and review in the event of a dispute or safety violation.
Link to Article
Small County in Texas Gets its First Cyberdetective, Thanks to a Federal Training Program
Palestine Herald-Press, (05/25/2018), William Patrick
The police department in Palestine, Texas, has its first cyberdetective, who took a five-week course on computer evidence recovery at the U.S. Secret Service National Computer Forensics Institute in Hoover, Ala. With more than 21,000 reported cases last year, Texans lost nearly $80 million to Internet crime alone. In Palestine, detectives face hundreds of computer and Internet-based crimes every year, such as scams attempting to acquire personal information and money.
Link to Article
Troy Police Awarded $6k Grant to Improve Bicycle, Pedestrian Safety
Troy Record, (05/27/2018), Nicholas Buonanno
The police department in Troy, N.Y., will use $6,000 in grant funds to advance bicycle and pedestrian safety. The Governor's Traffic Safety Committee has distributed more than $468,000 in federal grant funds for 20 bike and pedestrian projects across the state. Programs cover bicycle safety education and helmet distribution, pedestrian safety outreach and law-based education.
Link to Article
Corrections News
South Carolina Plans to Use Drones to Remotely Watch Inmates
Herald Business Journal, (05/24/2018), Meg Kinnard for The Associated Press
South Carolina corrections officials plan to use drones to remotely monitor inmates at the state's 21 prisons. The technology can be used to monitor a prison and the area outside, where contraband like cellphones and drugs can be launched over walls.
Link to Article
Ohio Prison Inmates Pirated Movies and Built Computers From Spare Parts, Inspector General Finds
Cleveland.com, (05/23/2018), Jackie Borchardt
Inmates at Ohio's Marion Correctional Institution assembled several dozen computers from parts, pirated software and illegally copied movies to broadcast on the prison movie network, an investigation from the state inspector general has found. The findings, released in a report, stemmed from a previous 2017 investigation that found inmates hacked into the prison network, stole fellow prisoners' personal information and applied for credit cards in their names.
Link to Article
Parole Official: State Needs More Housing for Ex-Inmates
The Associated Press via The Seattle Times, (05/17/2018)
New Mexico should invest in more residential treatment centers and transitional housing for people recently released from prison, according to Sandy Dietz, chairwoman of the New Mexico Parole Board. During remarks at a public safety task force meeting, Dietz indicated the inadequate number of supportive housing and treatment options for ex-inmates has resulted in some violating their parole and ending up back in prison.
Link to Article
Louisiana to Restore Voting Rights to People on Probation and Parole for Felonies
Gambit, (05/17/2018), Alex Woodward
Legislation passed by the Louisiana state legislature would restore voting rights to potentially thousands of formerly incarcerated people convicted of felony crimes. The legislation, which went to the governor to consider for signature, would restore the right to vote to most felons after a five-year period after leaving prison, giving roughly 3,000 of the state's 70,000 formerly incarcerated people a chance to vote.
Link to Article
Dept. of Probation Launches Rap Sheet Review Project
News12, (05/16/2018)
The New York City Department of Probation is offering a workshop to help residents review their criminal records. The Rap Sheet Review Project helps people learn their rights, find out what is on their criminal records and show them what to do if there are errors.
Link to Article
Assistant Attorney General for National Security John C. Demers Delivers Remarks at FedScoop’s 5th Annual FireEye Government Forum on Cyber Threat Intelligence
Good afternoon, and thank you for inviting me here to share
a few words on the importance of collaboration in confronting the national
security cyber threat.
Protecting the nation from national security threats is the
mission of the National Security Division.
Although NSD was created in response to the September 11th terrorist
attacks, its mission goes well beyond terrorism. In the past years it has come increasingly to
include a focus on cyber as part of the threat posed by certain foreign
nations. And as we do with respect to
terrorism, NSD drives collaboration among prosecutors, law enforcement
officials, intelligence attorneys and the Intelligence Community to ensure that
we approach the national security cyber threat using every tool and resource
available to the federal government.
Some of you in this room come from the private sector —
companies both large and small.
Companies that consult and provide advice, and companies that
manufacture products. Others come from
federal, state and local governments — or from other countries. Your work may be diverse, but you all
appreciate one thing. You know that
there are countries in this world that want what we have. They want our sensitive information, our
technology, our intellectual property.
And they want to destroy any competitive advantage we enjoy. Around the world there are people who wake up
every morning thinking about how they’re going to destroy it. And they go to bed at night, much too often,
thinking about a job well done. One
thing they’re not spending much time thinking about is our laws and
international cyber norms.
You don’t have to be a defense contractor to be worried
about this. Recently, we prosecuted
cases involving the thefts of grains of rice and kernels of corn. No one is immune. If you’re in business, if you’re in
government, if you’re in medicine or academic research, you have something of
value to someone else. And to get it,
foreign countries will use all means, including computer intrusions.
You are not going to stop these countries on your own. No private company or institution has the
resources of a determined nation state.
Nor is any one part of the federal government going to stop these
adversaries on its own. We’ll only
succeed in defending the nation’s firepower and the fruits of its brain power
if we’re partnered together.
In recent years, NSD has furthered the government’s efforts
to deter and disrupt malicious national security cyber threats by charging
hackers acting on behalf of China, Russia, Iran and Islamic State of Iraq and
al-Sham (ISIS). But not every cyber disruption
needs to be a prosecution. In fact, just
last week, the Department announced it obtained a court order to disrupt a
global botnet known as the “VPNfilter” that had infected hundreds of thousands
of home and office routers controlled by the Sofacy Group, a well-known
malicious cyber-hacking organization.
The botnet provided the Sofacy Group ability to undertake all manner of
malicious cyber activity, from unlawful surveillance to theft of valuable
information to disruptive attacks. The
Department could not have begun to neutralize this threat alone. We worked closely with the private sector,
including private security researchers, and other government partners, such as
the Department of Homeland Security. If
we continue to work together, we will do much, much more.
Let me provide two other illustrations of the good that can
happen when the private sector and the government work together.
Let’s take the case of Yahoo. Yahoo was the victim of a breach in 2013,
only to discover three years later that it had been subject to a second,
massive breach in 2014. When this
information came to light, Yahoo notified the government and provided valuable
assistance to the FBI, fully cooperating at every stage of the investigation.
As a result of this effective collaboration, Yahoo and the
FBI determined that hackers, working both for financial gain and on behalf of
Russian intelligence officers, had stolen information from at least 500 million
Yahoo accounts, and used that stolen information to obtain access to the
contents of accounts hosted by Yahoo, Google and other providers. Russian journalists, U.S. and Russian
government officials, and private-sector employees of financial, transportation
and other companies had all been targeted.
Thanks to the close cooperation of Yahoo, Google and others,
DOJ prosecutors and the FBI were able to identify and expose the hackers
without further compromising the privacy of the account holders. Three of the defendants were Russian
nationals residing in Russia — two Federal Security Service or “FSB” agents and
a known Russian hacker, an FBI “Most Wanted Cyber Criminal,” Alexsey Belan.
The fourth defendant was a 22-year-old hacker named Karim
Baratov, who resided in Canada.
Following the U.S. indictment, Canada captured and arrested
Baratov. He was brought to the U.S. and
pleaded guilty to eight criminal counts, including conspiracy to commit
computer fraud and abuse and aggravated identity theft. Earlier this week, he was sentenced to five
years in jail.
The second case demonstrates that cooperating with the
government, and benefiting from its knowledge and tools, can help a company
that has been hacked, see things for what they really are.
A few years ago, a Midwestern consumer goods company was the
victim of what appeared to be a “run of the mill” intrusion. An intruder had obtained unauthorized access
to their customer database and had obtained personally identifiable information
for their customers. The company’s IT
personnel worked diligently to eject the hacker from their network, but he kept
coming back. Eventually, the hacker
threatened to expose the company’s customer information unless he was paid a
ransom.
Around that time, the company connected with the FBI.
The FBI determined that Ardit Ferizi, a Kosovo citizen
studying computer science in Malaysia, was one of the hackers who had gained
unauthorized access to the victim company’s PII.
Although the hacker had a financial motive in demanding a
ransom from the company, the customer PII Ferizi stole was not destined for the
black market; that data was of interest because, among the tens of thousands of
customer names and email accounts he stole, there were more than a thousand
email addresses that ended in “.gov” or “.mil.”
Ultimately, Ferizi used that information to produce a list
of PII for approximately 1,300 U.S. government civilian employees and U.S.
military personnel.
He provided this information to a Syrian-based ISIS member
named Junaid Hussain.
A few months earlier, Hussain, acting in the name of the
Islamic State Hacking Division, had posted a “kill list” that purported to
include the names and addresses of 100 members of the U.S. military. Ferizi wanted to help him create and
disseminate a second kill list.
And in fact, soon after he received the information from
Ferizi, Hussain used Twitter to publish the PII of all 1,300 U.S. government
and military customers of the company. In
his tweet, he threatened “the Crusaders” who were conducting a “bombing
campaign against the Muslims.”
The Department of Justice charged Ferizi with violations of
the Computer Fraud and Abuse Act, and with conspiring to provide material
support to ISIS. We were successful in
obtaining his extradition from Malaysia to the United States, and he ultimately
pleadded guilty.
In September 2016, Ferizi was sentenced to 20 years in
prison. He was also ordered to pay
$50,000 in restitution to the company.
Even though the prosecution of Ferizi was public, the name
of the company was never revealed.
We are often asked why we would bring a case against foreign
nationals located outside the U.S. Well
for one, as the Yahoo and Ferizi cases prove, we may well get one or more of
them. The U.S. government has
extradition agreements with more than 100 countries, so it is not enough for
these defendants to forego a visit to Disney World. For the rest of their lives they will be
unable to travel to more than half the countries in the world without fear of
arrest and extradition to the U.S.
Second, the investigation and charges can assist other parts
of the Government in bringing their authorities to bear. For instance, Treasury’s Office of Foreign
Assets Control can designate the charged individuals or entities under an
Executive Order that authorizes blocking the property of persons engaging in
significant malicious cyber-enabled activities — ensuring that the perpetrators
will be financially isolated from the world.
When we brought charges against the founders and employees of the
Iranian Mabna Institute that hacked more than 300 American and foreign
universities, and government agencies and institutions around the world,
Treasury also designated the Institute and ten Iranian individuals.
Third, charges raise awareness, both generally and
specifically, to this threat. In some
cases there may be additional victims that don’t know they’ve been hacked. To help the private sector identify malicious
activity and better protect itself, the FBI and DHS will often release
technical details to the public. FBI did that just last week, when it released
a Public Service Announcement about VPNFilter, advising you to reboot your
router and including signatures of the botnet’s malware, so network defenders
can identify its presence in their network.
And finally, we pursue these cases to strip these hackers of
anonymity and call them out. This
prevents nation state actors from hiding behind ritualized denials and feigned ignorance. The recent indictment of Mabna Institute
members and the prior indictment of the Chinese People’s Liberation Army are
cases in point.
So that’s what’s in it for the country. What’s in it for you? What are the benefits of working with law enforcement
— before, during and after a computer intrusion or attack?
We can help you
understand what happened when your organization has a cyber-incident.
We can share
context and information about related incidents or malware.
We can ensure
proper investigation and preservation of evidence for eventual. prosecution.
We can assist you
in dealing with regulators.
At the end of the day, the Government simply has many more
tools at its disposal to deal with the problem of national security cyber
intrusions. Tools that, working
together, we can use to respond to intrusions and deter future ones. Although we will always consider criminal
charges, pursuing prosecution may not be the best response in all cases. Accordingly, NSD attorneys work with their
interagency partners to determine whether our investigative information may be
used to support sanctions, trade pressure, technical alerts, diplomatic options
or other responses instead of, or in addition to, prosecution. All of these tools can impose real costs on
malicious activity, depriving hackers and their sponsors of the benefit of
their crimes and deterring future misbehavior.
Let me close on this note.
Everyone in this audience understands that we are in this together, and
we have an obligation to help one another.
The organization that reports a cyber intrusion doesn’t just help
itself, it also helps other targeted companies that may not even know they’ve
been victims of a hack, and it helps the country. It helps other organizations by raising their
awareness and sparking a check on their part for similar compromises. It also enables the government to work to
disrupt and deter intrusions of those other organizations. And it helps the
country by allowing the Government to piece together and respond to the
intentions and actions of antagonistic nations to better defend our nation’s
economic and military security.
It is the National Security Division’s job to disrupt and
deter national security cyber threats.
We will continue to work with other agencies to use all elements of
national power to meet this ever-changing and growing challenge. And to adequately protect our shared national
cyber security against persistent attack, we will need your help as well.
I look forward to working with you.
Subscribe to:
Posts (Atom)