Tuesday, June 29, 2021

Request for Information To Improve Federal Scientific Integrity Policies

 

The White House Office of Science and Technology Policy published today in the Federal Register a Request for Information (RFI) to Improve Federal Scientific Integrity Policies. The RFI supports the work on the Scientific Integrity Fast Track Action Committee and seeks information to assess the effectiveness of Federal scientific integrity policies and needed areas of improvement; share effective practices Federal agencies could adopt to improve implementation of their scientific integrity policies; and identify related topics or concerns that should be addressed to enhance public trust in science. Responses are welcome from stakeholders representing all backgrounds and perspectives with an interest in scientific integrity. 

Responses must be submitted to ScientificIntegrityRFI@ostp.eop.gov by July 28, 2021.

SUBMIT RESPONSE

Monday, June 28, 2021

Register for "Best Practices for Engaging Participants in Video Conferences"

 

Webinar date: July 7, 2021, 1:00 pm – 2:00 pm Eastern

In this webinar, attendees will learn a variety of strategies to keep participants engaged in an online meeting environment. First, attendees will learn about the importance of familiarizing themselves with settings and tools within web conferencing applications, primarily Zoom. Attendees will be presented with best practices when running meetings and presentations as well as techniques and activities to engage participants and verify their understanding. 

Other best practices for facilitating interactions with and among attendees will be illustrated using a variety of tools specific to Zoom, including chatting, breakout rooms, annotations, polling, electronic whiteboards, and shared files. Peer instruction and think-pair-share activities will be reviewed along with management and oversight of these activities.  

Attendees will also be provided with factors to keep in mind for a variety of settings when creating and selecting strategies for engagement. The presenters will discuss web conference tools analysis, illustrating the potential advantages afforded by some applications compared to others.

REGISTER

Monday, June 21, 2021

DOD Awards $96.1 Million Contract to United Safety Technology, Inc. to Increase Domestic Production Capacity of Nitrile Gloves

 June 21, 2021


On June 21, 2021, the Department of Defense (DOD), on behalf of and in coordination with the Department of Health and Human Services (HHS), awarded a $96.1 million contract to United Safety Technology, Inc., to increase domestic production of nitrile gloves.

This industrial base expansion effort will allow United Safety Technology to increase production capacity of nitrile gloves by 216 million gloves per month by February 2023. 

DOD's Defense Assisted Acquisition Cell (DA2) led this effort in coordination with the Department of the Air Force's Acquisition COVID-19 Task Force (DAF ACT).  HHS’ Assistant Secretary for Preparedness and Response (ASPR) funded this effort through the Coronavirus Response and Relief Supplemental Appropriations (CRRSA) Act to support industrial base expansion for critical medical resources. 

Wednesday, June 16, 2021

Russian National Convicted of Charges Relating to Kelihos Botnet

 Helped Hackers Evade Defenses of U.S. Businesses and Conduct Malicious Cyber Attacks

A federal jury in Hartford convicted a Russian national yesterday for his role in operating a “crypting” service used to conceal “Kelihos” malware from antivirus software, enabling hackers to systematically infect victim computers around the world with malicious software, including ransomware.  Oleg Koshkin, 41, formerly of Estonia, was convicted of one count of conspiracy to commit computer fraud and abuse and one count of aiding and abetting computer fraud and abuse.  He faces a maximum penalty of 15 years in prison and is scheduled to be sentenced on September 20.

“By operating a website that was intended to hide malware from antivirus programs, Koshkin provided a critical service that enabled other cyber criminals to infect thousands of computers around the world,” said Acting U.S. Attorney Leonard C Boyle.  “We will investigate and prosecute the individuals who aid and abet cyber criminals as vigorously as we do the ones who actually hit the ‘send’ button on viruses and other malicious software.”

“The defendant designed and operated a service that was an essential tool for some of the world’s most destructive cybercriminals, including ransomware attackers,” said Acting Assistant Attorney General Nicholas L. McQuaid of the Justice Department's Criminal Division.  “The verdict should serve as a warning to those who provide infrastructure to cybercriminals: the Criminal Division and our law enforcement partners consider you to be just as culpable as the hackers whose crimes you enable — and we will work tirelessly to bring you to justice.”

“Mr. Koshkin and his associates knowingly provided crypting services designed to help malicious software bypass anti-virus software,” said Special Agent in Charge David Sundberg of the FBI’s New Haven Division.  “The criminal nature of the Crypt4U service was a clear threat to the confidentiality, integrity and availability of computer systems everywhere.  We at the FBI will never stop pursuing those like Mr. Koshkin for perpetrating cyber crimes and threats to the public at large.”

According to court documents and evidence introduced during the trial, Koshkin operated the websites “crypt4u.com,” “fud.bz,” and others.  The websites promised to render malicious software fully undetectable (FUD) by nearly every major provider of antivirus software.  Koshkin and his co-conspirators claimed that their services could be used for malware such as botnets, remote access trojans (RATs), keyloggers, credential stealers, and cryptocurrency miners.

In particular, Koshkin worked with Peter Levashov, the operator of the Kelihos botnet, to develop a system that would allow Levashov to crypt the Kelihos malware multiple times each day.  Koshkin provided Levashov with a custom, high-volume crypting service that enabled Levashov to distribute Kelihos through multiple criminal affiliates.  The Kelihos botnet was used by Levashov to send spam, harvest account credentials, conduct denial of service attacks, and to distribute ransomware and other malicious software.  At the time it was dismantled by the FBI, the Kelihos botnet was known to include at least 50,000 compromised computers around the world.

Koshkin was arrested in California on September 6, 2019, and has been detained since his arrest.

Koshkin’s co-defendant, Pavel Tsurkan, is charged with conspiring to cause damage to 10 or more protected computers, and aiding and abetting Levashov in causing damage to 10 or more protected computers.  He is released on bond while awaiting trial.

As to Tsurkan, an indictment is merely an allegation, and a defendant is presumed innocent unless and until proven guilty beyond a reasonable doubt in a court of law.

Levashov was arrested by the Spanish National Police on April 7, 2017, and extradited to the United States.  On September 12, 2018, he pleaded guilty to one count of causing intentional damage to a protected computer, one count of conspiracy, one count of wire fraud, and one count of aggravated identity theft.

The FBI’s New Haven Division is investigating the case through its Connecticut Cyber Task Force.  Assistant U.S. Attorney Edward Chang of the United States Attorney’s Office and Senior Counsel Ryan K.J. Dickey of the Criminal Division’s Computer Crime and Intellectual Property Section are prosecuting the case, with assistance from the Criminal Division’s Office of International Affairs.  The Estonian Police and Border Guard Board also provided significant assistance.

In April 2021, the Department of Justice announced the creation of the Ransomware and Digital Extortion Task Force to combat the growing number of ransomware and digital extortion attacks. As part of the Task Force, the Criminal Division, working with the U.S. Attorneys’ Offices, prioritizes the disruption, investigation, and prosecution of ransomware and digital extortion activity by tracking and dismantling the development and deployment of malware, identifying the cybercriminals responsible, and holding those individuals accountable for their crimes. The department, through the Task Force, also strategically targets the ransomware criminal ecosystem as a whole and collaborates with domestic and foreign government agencies as well as private sector partners to combat this significant criminal threat.

Citizen of Estonia Admits Operating "Crypting" Service to Conceal Kelihos Botnet from Anti-Virus Software

 PAVEL TSURKAN, 33, of Estonia, pleaded guilty today in the District of Connecticut to a federal charge related to his role in operating a “crypting” service used to conceal “Kelihos” malware from antivirus software, enabling hackers to systematically infect victim computers around the world with malicious software, including ransomware.

Tsurkan pleaded guilty via videoconference before U.S. Magistrate Judge S. Dave Vatti to one count of aiding and abetting unauthorized access to a protected computer, an offense that carries a maximum term of imprisonment of 10 years.

According to court documents and statements made in court, Tsurkan, his co-defendant Oleg Koshkin, and others operated an online, for-profit service known as Crypt4U via the websites “crypt4u.com,” “crypt4u.net,” “fud.bz,” “fud.re,” as well as a custom FTP service for high-volume processing.  The websites promised to render malicious software fully undetectable (FUD) by nearly every major provider of antivirus software.  Tsurkan and his co-conspirators claimed that their services could be used for malware such as botnets, remote access trojans (RATs), keyloggers, credential stealers, and cryptocurrency miners.

Tsurkan provided the Crypt4U service to assist individuals who created and maintained networks of infected and compromised computers, known as “botnets.”  In particular, Tsurkan provided the Crypt4U service to Peter Yuryevich Levashov, who used the service in connection with the Kelihos botnet. The Kelihos botnet was used to send spam, to conduct denial of service attacks, and to distribute ransomware, among other criminal acts.  At the time it was dismantled by the FBI, the Kelihos botnet was known to include at least 50,000 compromised computers around the world, including computers in Connecticut.

Koshkin is released on a $200,000 bond pending sentencing, which is scheduled for September 27, 2021, before U.S. District Judge Michael P. Shea in Hartford.

On June 15, 2016, a jury in Hartford found Oleg Koshkin, a Russian national last residing in Estonia, guilty of one count of conspiracy to commit computer fraud and abuse and one count of aiding and abetting computer fraud and abuse.  Koshkin is detained while awaiting sentencing.

On September 12, 2018, Levashov pleaded guilty to one count of causing intentional damage to a protected computer, one count of conspiracy, one count of wire fraud, and one count of aggravated identity theft.  He is awaiting sentencing.

The FBI’s New Haven Division is investigating the case through its Connecticut Cyber Task Force.  Assistant U.S. Attorney Edward Chang of the United States Attorney’s Office and Senior Counsel Ryan K.J. Dickey of the Criminal Division’s Computer Crime and Intellectual Property Section are prosecuting the case, with assistance from the Criminal Division’s Office of International Affairs.  The Estonian Police and Border Guard Board also provided significant assistance.

In April 2021, the Department of Justice announced the creation of the Ransomware and Digital Extortion Task Force to combat the growing number of ransomware and digital extortion attacks. As part of the Task Force, the Criminal Division, working with the U.S. Attorneys’ Offices, prioritizes the disruption, investigation, and prosecution of ransomware and digital extortion activity by tracking and dismantling the development and deployment of malware, identifying the cybercriminals responsible, and holding those individuals accountable for their crimes. The department, through the Task Force, also strategically targets the ransomware criminal ecosystem as a whole and collaborates with domestic and foreign government agencies as well as private sector partners to combat this significant criminal threat.

Tuesday, June 15, 2021

There’s an App for That! An Overview of the Most Effective Smartphone Apps for Public Safety

 Wed, Dec 8, 2021 10:00 AM - 11:00 AM PST

Applications designed for public safety and complementary peripherals have resulted in increased utility and improved efficiency. This presentation will identify the benefits of a connected officer approach and provide an overview of the most effective applications currently available, including support for officer safety and wellness, criminal justice resources, and even ways of quickly distributing virtual wanted bulletins to other officers and/or the public. There will also be examples provided of cost-effective peripherals that can leverage the smartphone's computing power to create new capabilities in support of patrol or investigative operations.

 Webinar Recording:

This webinar is sponsored by Samsung. All registrants will have access to the webinar recording.

Register

Friday, June 11, 2021

Register for "Successful Onboarding in Crime Laboratories."

 

Webinar date: June 16, 2021, 1:00 – 2:00 pm ET

Onboarding involves integrating a new employee into your organization. Also known as organizational socialization, onboarding is an important process that sometimes becomes an afterthought in the rush to start a new employee. It’s important to engage employees quickly so they can become productive members of the organization as soon as possible. Many times, the bulk of onboarding new crime lab employees falls on supervisors and managers that may not have a background in human resources.

In this webinar, the presenter will cover key components of successful onboarding in a crime lab, including setting employee expectations and making the employee feel like part of the team. The presenter will go over an onboarding checklist so you can devise one that suits your agency’s needs. Lastly, the presenter will discuss how successful onboarding can get the new employee “fired up” and increase employee engagement overall.

REGISTER