Category: Intelligence

  • MIL-OSI Security: Small Defense Contractors Share How NSA Gives Them a Boost

    Source: National Security Agency NSA

    FORT MEADE, Md. – A buzz is reverberating throughout the Defense Industrial Base (DIB) about the National Security Agency (NSA).

    Word has spread that the Agency’s new Cybersecurity Collaboration Center (CCC) offers no-cost cybersecurity services, and businesses are signing up in growing numbers, according to CCC Chief Morgan Adamski: “Companies see the value not just for their bottom line, but also for national security.”

    Established in 2020, the CCC embraces one of NSA’s primary strategies for cybersecurity: scaling public-private partnerships empowered by insights derived from foreign signals intelligence.

    To date, more than 1,000 industry partners have signed up for CCC services. These companies have broad and deep reach, ranging from major service providers that can harden billions of endpoints to small businesses that provide critical components to the nation’s most sensitive systems.

    Working together with the CCC as the bridge, NSA and its partners are sharing insights and building a comprehensive threat picture that is mutually beneficial.

    Small businesses make up the majority of the DIB supply chain (70%). These small businesses have access to sensitive Department of Defense (DoD) information, but often don’t have the technical expertise or other resources to defend their networks against a sophisticated nation state threat, said Bailey Bickley, NSA’s DIB Defense Chief.

    “These companies are an attractive target for our adversaries who are seeking to steal U.S. intellectual property in order to build their own military capabilities and economies,” said Bickley. “We don’t expect small businesses to defend against nation-state threats alone. It’s in NSA’s and DoD’s best interests to help.” 

    ‘Seamless’ Integration in 15 Minutes

    Mike T. is the founder and owner of a small defense contractor that manufactures critical components for national security systems. When he recently learned that his company’s network contained slight misconfigurations, he jumped on the issue and reached out to NSA for help.

    “We don’t want people finding a backdoor and stealing drawings and next thing you know, we are on the hook,” he said.

    Analysts at the CCC were able to enroll Mike’s company in NSA’s DIB Cybersecurity as a Service (CSaaS) offerings. As a result, the company received technical assistance to help improve his company’s network security. This included enrollment in a Protective Domain Name System (PDNS) service, which blocks users from connecting to known malicious or suspicious domains by running them through a filter —composed of commercial threat feeds and a unique threat feed provided by NSA — prior to resolving them. The integration was “seamless” and took 15 minutes, he said.

    Further, the networks for Mike’s company are now hardened against malicious nation-state actors who could steal its intellectual property, putting the nation’s insights and investments at risk.

    “As a small business, we don’t have the unlimited resources that the big players have, so we appreciate anything that gives us an edge,” said Mike, whose workforce numbers between 8 and 32 people depending on production cycles. “It is one less thing to think about, one less expense, and one less worry.”

    NSA also benefits by receiving DNS data that the CCC is able to run custom analytics over to better understand ways nation-state actors are targeting the DIB, and then, defend against them.

    The service is processing 70 million DNS queries a day and has blocked billions of malicious queries to date, including ransomware activity and known nation-state spear phishing, malware, and botnets, according to statistics compiled by the Cybersecurity Directorate’s DNS provider.

    PDNS is just one part of the CCC’s suite of services offered to the DIB that the DoD funds. Other core services provided by the DIB Defense Team are Attack Surface Management — gaining an adversarial view of a company’s network and then finding and fixing issues — and Threat Intelligence Collaboration — staying ahead of the adversary by receiving non-public, DIB-specific NSA threat intelligence.
     
    Attack Surface Management helps customers prioritize patching by providing an inventory of internet-facing assets, running vulnerability scans across those assets to determine where they may be vulnerable, then prioritizing results based off which vulnerabilities are under active exploitation.
     
    Two newer authorities, delegated by the Secretary of Defense and the DoD Chief Information Officer, underpin the CCC’s ability to engage in bilateral information sharing with companies: the 2019 National Defense Authorization Act Section 1642b, and the 2020 DIB Delegation of Authorities.

    Companies with active DoD contracts are encouraged to learn more about the CCC and enroll in NSA’s DIB Cybersecurity services. Get started by filling out a Cybersecurity Services Contact Form.


    NSA Media Relations
    MediaRelations@nsa.gov
    443-634-0721

    MIL Security OSI

  • MIL-OSI Security: U.S. Military Academy Wins First Place at the 2024 NSA Cyber Exercise

    Source: National Security Agency NSA

    FORT MEADE, Md. – After months of preparation and three days of elaborate and challenging cyber operations, the U.S. Military Academy has emerged as the champion of the sixth annual NSA Cyber Exercise (NCX).
     
    The battle for the coveted NCX trophy included participants from the U.S. service academies and senior military colleges, who competed alongside individuals from multiple NSA professional development programs. A team from USCYBERCOM’s Cyber National Mission Force (CNMF) participated in a For Exhibition Only (FEO) status. All team members rose to the challenge, applying their technical, collaborative, and critical thinking skills to simulated scenarios they can expect to encounter throughout their cyber careers.
     
    “Agility and adaptability have been and will continue to be keys to our success,” Maj Gen Matteo Martemucci, deputy chief of the Central Security Service said during his welcome message “Remain alert, focused, and trust your training. This is what we prepare for.”
     
    The U.S. Air Force Academy placed second, while the University of North Georgia finished third, beating out the U.S. Coast Guard Academy, the U.S. Naval Academy, and the senior military colleges, including Norwich University, Texas A&M University, The Citadel, Virginia Military Institute, and Virginia Tech. NSA’s Cybersecurity Operations Development Program (CSODP took first amongst the development programs.
     
    This year’s NCX was the first hybrid competition since the COVID-19 pandemic, allowing institutions to participate in person or virtually.
     
    Teams engaged in offensive cyber activities against a fictional adversary that attacked a satellite downlink. Exercises focused on active attack and malware, software development, and cybersecurity policy. These, along with the final attack-and-defend cyber combat exercise, challenged participants to use their creativity and collaboration skills to prevail against complex cyber threats.
     
    “The competition is more than a trophy,” said Kenneth Allison, associate director of the Hollingsworth Center for Ethical Leadership at Texas A&M University, whose team competed in this year’s contest. “The additional knowledge and exposure to real-world challenges, the opportunities to ask questions, build confidence, and meet people that you may work with in the future – that’s what makes the NCX such a valuable part of our academic program.”

    Martemucci awarded West Point’s cyber competition team members with the NCX trophy after edging out their competition in the tournament.
     
    “Congratulations to the U.S. Military Academy,” Martemucci said during the closing ceremony. “We hope that this simulation not only deepened your understanding of the current threat environment, but also inspired you to continue to hone your skills and talents to help protect our Nation, whether in uniform, academia, government, or industry.”

    This three-day, unclassified cyber competition is the culmination of the Agency’s effort to advance strategic goals by developing and testing the skills, teamwork, planning, and decision-making of future cybersecurity professionals.

     “The most exciting part for me is witnessing our future leaders put their skills to use,” said NCX Program Manager Kelley Welch. “Throughout the year, and especially during the competition, planting the seeds giving students firsthand insight into the vast cyber career opportunities within NSA’s mission, and how they can apply their passions and skills to help secure our Nation’s future.”
     
    The final cyber combat exercise required participants to work collaboratively as they applied their cybersecurity knowledge to exploit and extract data from a physical device. Strong coordination, planning, communication, teamwork, and decision-making skills were essential to each team’s success.
     
     “I was a little intimidated at first because I assumed that we would only interact with our team members during the event,” said Joselyn Cordova-Flores, a junior at Norwich University and first-time NCX participant. “Instead, I had a chance to engage with people from NSA and different teams while working on other activities. The collaborative environment not only showed me that I have what it takes to be successful in this field, but also solidified NSA as my No. 1 career choice after graduation.”
     
    Fostering connections across the cyber defense community in a conducive learning environment is what LT Ryan Quarry, instructor for the U.S. Coast Guard Academy, finds most rewarding about the NCX.
     
    “This is a unique opportunity for students to network with their peers in other service academies, and other like-minded individuals who can help them reach their career goals,” he said. “In addition, the real-world scenarios give them immediate insight into their strengths and areas for development. These are two of many factors which make the NCX a premiere event for the U.S. Coast Guard Academy and a critical component of its cyber education programs.” 
     
    For more information on the NSA Cyber Exercise, visit https://www.nsa.gov/Cybersecurity/NSA-Cyber-Exercise/


    NSA Media Relations
    MediaRelations@nsa.gov
    443-634-0721

    MIL Security OSI

  • MIL-OSI Security: NSA/CSS Employees Donate More Than $2M for 2023 Combined Federal Campaign

    Source: National Security Agency NSA

    The 2023 Combined Federal Campaign (CFC) concluded on January 12, 2024, with National Security Agency (NSA)/Central Security Service (CSS) affiliate contributions exceeded NSA’s goal of $1.9 million with over $2 million donated to 1,398 charities.

    The CFC, led by the U.S. Office of Personnel Management (OPM), enables federal employees and retirees to support people and communities in need across the country and around the world.

    It is the world’s largest and most successful annual workplace charity campaign, according to Barry Boseman, chief of State and Local Affairs.
    NSA led donations in the mid-Atlantic region, which includes four states, Washington D.C., and 1,200 participating government agencies, Boseman said. The Department of Defense (DoD) total for the 2023 CFC was over $8.5 million, of which NSA contributed over 20%, and the nationwide total was $68.3 million.

    “I’m incredibly proud of the contributions that our workforce made during this year’s campaign,” said Gen. Tim Haugh, Commander, USCYBERCOM, Director, NSA/Chief, CSS. “NSA remains committed to giving back to our local communities during the CFC and beyond.”

    “The theme for the 2023 CFC was ‘Give Happy,’ as the CFC connected giving with happiness, showing that when federal employees give together, they are happier,” said Veronica Maylish Beckenstrater, NSA’s CFC program manager for the 2023 campaign.

    William “Roy” Surrett, NSA’s lead CFC senior advocate, agreed. “Thank you again for ‘giving happy’ to important causes like helping communities recover from disasters, supporting military families, ensuring education for all, and more,” he said. “There is no better feeling than to help those in need here in our local area, across our Nation, and around the world.”

    “The workforce’s dedication was vital to the success of the campaign and will bring help and hope to thousands of people as monetary and volunteer pledges go to support the missions of participating charities,” Maylish Beckenstrater said.

    Keyworkers and senior advocates distributed marketing materials, spoke at town halls, and hosted events, including charity fairs, chili cook-offs, pet contests, painting parties, and bingo games to encourage the workforce to donate to causes that mean the most to them, she explained.

    “It was innovative ideas like these that helped NSA exceed its goal this year and to show the community we care,” Maylish Beckenstrater added. “I can’t wait to see our workforce band together for next year’s campaign.”


    Interested in learning more about joining NSA’s mission? Visit NSA.gov/Careers for more information. 
     

    MIL Security OSI

  • MIL-OSI Security: Annual Awards Ceremony Recognizes Outstanding Contributions From Western Pennsylvania Law Enforcement Officers and Prosecutors

    Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

    PITTSBURGH, Pa. – The Law Enforcement Agency Directors (LEAD) of Western Pennsylvania recognized more than three dozen area law enforcement officers and prosecutors during its 26th Annual LEAD Awards Ceremony, announced United States Attorney Eric G. Olshan. Comprising the Western Pennsylvania heads of federal, state, and local law enforcement agencies, LEAD bestows awards annually as a way of recognizing outstanding performance from law enforcement agents and officers, as well as prosecutors.

    Notable among the LEAD Awards presented were:

    • The Lifetime Service Award was presented to (Retired) Supervisory Special Agent Louis “Lou” Weiers for his outstanding service with the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF). Weiers began his career with the ATF in January 1991 as a Special Agent with the Pittsburgh field office’s Arson/Explosives group, also serving as a member of the National Response Team from 1998 until 2005. Weiers was promoted to Resident Agent in Charge of the Pittsburgh Firearms Trafficking and Violent Crime group in March 2005, and was among the longest tenured supervisory investigators within the ATF upon his September 2024 retirement. Among the many investigations on which he worked during his career, Weiers served as the first-line supervisor at the 2018 Tree of Life shooting in Pittsburgh, where his group led the ATF response and firearms investigation with the Federal Bureau of Investigation (FBI); represented ATF at the September 11, 2001, Flight 93 crash site in Shanksville, Pennsylvania; and was involved in the 2014 48-day manhunt for Eric Frein, who killed a Pennsylvania State Trooper and critically injured another during an attack at a State Police barracks. Weiers also served in several acting Assistant Special Agent in Charge details within the Philadelphia Field Division throughout the decades.

    • The Courage Under Hostile Fire Award was presented to Pittsburgh Bureau of Police Officer Craig Claflin, who, as the first officer on the scene of a domestic dispute call at a Kincaid Street residence in Pittsburgh’s Garfield neighborhood in July 2024, was immediately fired upon by the assailant. Officer Claflin quickly neutralized, disarmed, and detained the assailant, saving lives and preventing injuries to neighboring civilians and fellow law enforcement officers.

    • An individual LEAD award was presented to Assistant U.S. Attorney Katherine Jordan of the U.S. Attorney’s Office. AUSA Jordan’s work has consistently involved the handling of both complex, long-term investigations and prosecutions of violent individuals and drug traffickers. During the past year, her cases included multiple long-term drug trafficking investigations conducted by FBI’s Greater Pittsburgh Safe Streets Task Force—one of which was a Title-III wiretap investigation—as well as a long-term Drug Enforcement Administration investigation into a large-scale drug trafficking organization, the latter of which included the execution of multiple search warrants in late-June 2024 that ultimately resulted in the seizure of nearly 120 kilograms of cocaine, over $1.2 million in cash, and eight firearms, in addition to the charging of numerous individuals. In September 2024, shortly after the takedown of her FBI Title-III investigation, AUSA Jordan secured a guilty verdict in the jury trial of local large-scale drug trafficker Leon Ford Sr., whom Jordan and her team of investigators had indicted and successfully convicted of conspiracy to distribute five kilograms or more of cocaine and 400 grams or more of fentanyl, as well as possession with intent to distribute 400 grams or more of fentanyl.

    • Several individuals from the ATF, along with Assistant U.S. Attorney Maureen Sheehan-Balchon of the U.S. Attorney’s Office, received a team award for outstanding performance for their seven-month investigation and prosecution of a complex illegal firearms manufacturing and distribution network out of Altoona, Pennsylvania. The criminal conspiracy involved the manufacture and sale of untraceable ghost guns, AR-15 style rifles, and “hit kits” containing a Polymer 80 privately made firearm with no serial number, a threaded barrel to attach an included silencer, subsonic ammunition, and latex gloves.

    • Members of the Mt. Lebanon Police Department, Allegheny County Police Department, Allegheny County Sheriff’s Office, and FBI received a team award for their investigation of a series of crimes involving the sexual exploitation of children.

    • Corporals and troopers from Pennsylvania State Police Troops B and D Forensic Services Units were honored with a team award for their processing of a particularly complex Pittsburgh crime scene.

    • Two U.S. Postal Inspection Service officials received individual LEAD awards for their roles in helping to uncover and disrupt criminal operations in separate investigations involving, in one case, a California-to-Western Pennsylvania drug trafficking network, and, in the other, a games of chance theft ring. Officers and agents from organizations including the Allegheny County Sheriff’s Office, ATF, FBI, Homeland Security Investigations, Internal Revenue Service – Criminal Investigation, and Pennsylvania State Police also received individual awards for their performance in a variety of incidents and investigations involving firearms, narcotics, sexual exploitation of minors, tax evasion, and public safety.

    LEAD is composed of the following law enforcement agencies: Bureau of Alcohol, Tobacco, Firearms and Explosives; Drug Enforcement Administration; Federal Bureau of Investigation; U.S. Attorney’s Office, Western District of Pennsylvania; Homeland Security Investigations; Internal Revenue Service – Criminal Investigation; U.S. Department of Homeland Security, Transportation Security Administration; U.S. Department of Defense – Defense Criminal Investigative Service; U.S. Department of Housing and Urban Development; U.S. Marshals Service; U.S. Postal Service Office of Inspector General; U.S. Postal Inspection Service; U.S. Probation & Pretrial Services; United States Secret Service; U.S. Social Security Administration – Office of Inspector General; U.S. Department of State – Diplomatic Security Service; U.S. Department of Transportation, Federal Air Marshal Service; U.S. Department of Transportation – Office of Inspector General; U.S. Department of Veterans Administration – Office of Inspector General; U.S. Department of Labor – Office of Inspector General; U.S. Department of Agriculture – Office of Inspector General; U.S. Department of Homeland Security – Federal Protective Service; U.S. Food and Drug Administration – Office of Criminal Investigations; Pennsylvania Office of Attorney General; Pennsylvania State Police; Pennsylvania Board of Probation and Parole; Western Pennsylvania Chiefs of Police Association; Allegheny County Police Department; Allegheny County Sheriff’s Office; Allegheny County District Attorney’s Office; Allegheny County Chiefs of Police Association; Allegheny County Housing Authority Police Department; Port Authority of Allegheny County Police Department; Washington County District Attorney’s Office; Westmoreland County District Attorney’s Office; Pittsburgh Bureau of Police; Mt. Lebanon Police Department; Carnegie Mellon University Police Department, and University of Pittsburgh Department of Public Safety.

    MIL Security OSI

  • MIL-OSI Security: ATF Assembles Federal Law Enforcement Teams; Provides Emergency Support for Hurricanes Helene, Milton

    Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

    WASHINGTON – The federal government’s Emergency Support Function #13 (ESF #13) was activated to provide federal public safety and security assistance in the aftermath of Hurricanes Helene and Milton. ESF #13 is managed by the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) on behalf of the Department of Justice.

    On Oct. 5, ESF #13 was activated to provide force protection for ESF #9 Federal Urban Search and Rescue (US&R) teams and ESF #8 Public Health and Medical Services missions following Hurricane Milton. ESF #13 is also positioned to provide direct federal assistance to Florida if needed. Since arriving in Florida, ESF #13 has:

    • Pre-staged 34 Law Enforcement Strike Teams (LEST) comprised of more than 440 federal law enforcement officers (FLEO) from 12 separate federal agencies, including ATF, Bureau of Land Management (BLM), Bureau of Indian Affairs (BIA), Bureau of Prisons (BOP), Customs and Border Patrol (CBP), Coast Guard Investigative Service (CGIS), Drug Enforcement Agency (DEA), Federal Air Marshals (FAMS), Internal Revenue Service (IRS), Small Business Administration Office of Inspector General (SBA-OIG), U.S. Fish and Wildlife Service (USFWS), and U.S. Marshals Service (USMS). It is anticipated that more FLEOs will be requested to assist with response efforts.
    • Staged resources to provide law enforcement and security support for 22 US&R teams and two Disaster Medical Assistance Teams (DMAT).

    On Sept. 24, ESF #13 was activated for Hurricane Helene to the southeastern part of the United States.

    At its peak, ESF #13:

    • Deployed more than 30 federal LESTs consisting of 400+ FLEOs from 15 federal law enforcement agencies, included ATF, DEA, FBI, USMS, BOP, CBP, BLM, USFWS, CGIS, Environmental Protection Agency Criminal Investigation Division (EPA-CID), Department of Transportation OIG (DOT-OIG), U.S. Treasury Inspector General (TIGTA), Health and Human Services OIG (HHS-OIG), FAMS, and IRS.
    • Deployed to Florida, Georgia, Tennessee, and North Carolina for Helene recovery support.
    • Supported approximately 30 federal US&R teams from Virginia, Tennessee, Ohio, California, Texas, Indiana, Missouri, Maryland, New Jersey, New York, Pennsylvania, Nebraska, Colorado, Utah, Arizona, and Nevada.
    • Deployed more than 40 K-9s to assist in searches.
    • Supported four Health and Medical Task Forces (HMTF) and DMATs in the Western North Carolina area.
    • Deployed approximately 10 peer support personnel from ATF and USMS.

    The federal government’s disaster response includes 15 Emergency Support Functions. ESF #13 coordinates the federal law enforcement response to any disaster requiring the federal whole-of-government response. In Feb. 2006, the Department of Justice was designated the ESF #13 coordinating department. In October 2008, ATF was assigned as the lead coordinating agency for ESF #13 on behalf of DOJ.

    [1:01 PM] Herman, Cara A. (ATF) ATF teams up with multiple agencies to stage resources to provide law enforcement and security support to FEMA’s ESF #9 Urban Search and Rescue teams.

    ATF teams up with multiple agencies to stage resources to provide law enforcement
    and security support to ESF #9 Federal Urban Search and Rescue teams.

    ESF #13 provides force protection for FEMA’s Urban Search and Rescue teams following Hurricane Milton.

    ESF #13 provides force protection for Federal Urban Search
    and Rescue teams following Hurricane Milton.

    ESF #13 provides force protection for a FEMA Urban Search and Rescue team in the southeastern part of the U.S. following Hurricane Helene.

    ESF #13 provides force protection for aUrban Search and Rescue
    team in the southeastern part of the U.S. following Hurricane Helene.

    ESF #13 continues to provide force protection for Urban Search and Rescue teams as they use drones to look for victims across the southeastern part of the U.S. following Hurricane Helene.

    ESF #13 continues to provide force protection for Urban Search
    and Rescue teams as they use drones to look for victims across
    the southeastern part of the U.S. following Hurricane Helene.

    MIL Security OSI

  • MIL-OSI Security: Reforestation Underway on NSA Washington’s East Campus

    Source: National Security Agency NSA

    As construction continues on NSA/CSS Washington’s (NSAW) East Campus, hundreds of native trees have been planted as part of the agency’s reforestation effort.

    Reforestation is the process of planting new trees in areas that have been disturbed by construction, or where there were few trees initially. The construction of East Campus required the removal of many trees that had been part of the site, in order to construct the utility infrastructure, as well as the new buildings on site.

    This reforestation effort is driven by NSA’s Environmental Management System Policy, which states that the Agency is committed to the establishment and maintenance of world-class environmental, safety, and occupational health programs, and that these programs are designed to protect the environment and health of the workforce, customers, and communities.

    “We believe it is important to be a good neighbor, so we worked to incorporate the requirements of the Fort Meade forest policy into our site layout and construction,” said Matthew Boren, chief of the Military Construction (MILCON) office within NSA’s Installation and Logistics (I&L) organization.

    Reforestation has benefits to both the environment and to the workforce.

    Environmentally, it improves and expands the natural habitat of birds and animals. A large portion of the reforestation occurred along the Midway Branch, where the reforestation trees expand the stream buffer and ensure that development does not encroach on the stream. Additionally, the trees help reduce the amount of stormwater runoff from the site, as well as improve the quality of stormwater that does leave. In turn, that protects the Little Patuxent and the Chesapeake Bay and the quality of those waters.

    Reforestation replants trees in a more natural environment and in larger numbers. This is different from landscape trees, which are standalone and singular in nature and do not provide the same habitat features, or quantity of stormwater support.

    To grow these reforestation areas, MILCON office partners with Occupational Health and Well-Being Services to enhance the NSAW campus, adding shade, storm water management, and improving the well-being of the workforce by creating a more relaxed atmosphere, according to Williams.

    Both the reforestation areas and landscape trees require care and maintenance, from normal mulching to evaluation by an arborist. Whether it is a new tree that does not thrive or an established tree that is causing issues for the surrounding forestation, they may need to be trimmed or replaced.

    I&L tries to plant a new tree somewhere close to the original spot, but in a better location, whenever one is removed.

    “Our goal is to be a great place for the next generations of Agency employees,” Boren added.


    Interested in learning more about joining NSA’s mission? Visit NSA.gov/Careers for more information. 

    MIL Security OSI

  • MIL-OSI Security: Women of Installations & Logistics Build Strong Future for NSA

    Source: National Security Agency NSA

    FORT MEADE, Md. – Construction is booming across the NSA/CSS Washington (NSAW) campus, with upgrades to existing buildings and the expansion of East Campus.

    Behind these innovative projects are the women of Installations & Logistics (I&L), who play a critical role in paving the way for the future of NSA. During Women’s History Month, NSA celebrates them and all of the women helping drive mission outcomes.

    Caryn O. began her career in I&L about 15 years ago and although she had no construction background when she started, she has since flourished in her role as an I&L project manager.

    “I absolutely love being in the construction field because it is really cool to see drawings and then see it actually turn into something physical,” she said.

    After joining I&L, Caryn earned a graduate degree in construction management and has since managed major upgrades to the Friedman Conference Center in 2017 and floor to ceiling renovations in the OPS1 building on NSAW’s main campus that began in 2019. According to Caryn, both projects involved obstacles that had to be overcome, including supply chain issues associated with the COVID-19 pandemic.

    Despite these obstacles, Caryn said she would definitely recommend construction as a career.

    “I enjoy working with dedicated and hard-working individuals who endure dirt, climate issues, and long hours and never complain,” she said.

    Project Manager Katie F. is leading renovations to the 70-year-old 9800 barracks buildings located east of the “Big 4” – a group of buildings on NSAW’s main campus. This $44.5M project was awarded in 2020, and the final phases are expected to be finished in April.

    “Overall, it was gratifying to support a project that improves the quality of life for service members,” she said.  “It is personally satisfying to use my background and skills to help deliver facilities that will ultimately support NSA’s mission.”

    Katie worked as a civil engineer for several years at an external organization before joining I&L’s Design & Engineering team in 2012. After several years, she decided to learn more about the construction side of projects. In 2017, she joined the Infrastructure team within Project Execution, whose mission is to improve existing spaces and infrastructure at NSAW.

    “As a project manager, I am able to leverage my work experience, as well as my master’s degrees in civil engineering and business administration, to execute projects from start to finish,” Katie said. “It was challenging to balance the requirements of various stakeholders while staying within budget and complying with the contract.”

    Katie said she enjoys learning from people with different areas of expertise.

    “It’s inspiring to watch people with diverse backgrounds, including engineering, business, and trades, collaborate to execute a successful project,” she said.

    Carolyn S. is the deputy project manager supporting the construction of the Chiari Center on East Campus. She has more than 12 years of interior design and project management experience, both external and internal to NSA. She joined NSA in August 2016 as an interior designer in the Design and Engineering office, where she gained a strong foundational knowledge of I&L’s facility design and construction requirements. She joined the Military Construction (MILCON) team in September 2023.

    Carolyn said her favorite part about the MILCON office is that every day is different, and she is able to witness all aspects of a project.

    “Being able to see designs come to life in construction and eventually become a finished building that will support some of our Agency’s biggest missions is one of the best parts of my job,” she said. “Since we are working in active construction, you never know what each day will bring.”

    Jessica M., who joined NSA as a contractor in 2010 and became an Agency employee in 2019, is currently a project manager in the MILCON office working on East Campus Building 5.

    “I enjoy the varied and changing work,” she said, adding that she enjoys the work/life balance that includes telework and a flexible schedule.

    “Being a woman in construction can be intimidating at first,” said Jessica. “According to the Bureau of Labor Statistics 1 in 10 of those in the construction industry are women. Advice I have as a woman in this male-dominated field would be to be your own best advocate, be confident enough to use your skillset and knowledgeable to make the right decisions, understand your strengths, and use all the tools you’ve acquired throughout your life to be successful.”  

    According to Jessica, she and the MILCON team work to build long-lasting facilities that will serve NSA’s workforce for the next 50 years, and keep the mission moving forward.

    “We are being good stewards for being fiscally responsible,” she said. “We are problem solvers. We look at the big picture and find how to reduce or mitigate a problem.”

    All of the women said they enjoy their work and are proud to be a part of the construction field.

    “There are many professional opportunities in construction, and women should not be intimidated by outdated stereotypes of the industry,” Katie said.


    NSA Media Relations
    MediaRelations@nsa.gov
    443-634-0721

    MIL Security OSI

  • MIL-OSI Security: New NSA Display at BWI Honors SIGINT Support to Warfighters

    Source: National Security Agency NSA

    The early 1950s saw the dedication of two new organizations headquartered less than 10 miles apart: NSA and the Friendship International Airport — now Baltimore/Washington International Thurgood Marshall Airport (BWI). Nearly eight decades later, the partnership between these organizations is expanding in a new way.

    Earlier this week, Agency leaders traveled to BWI for a first look at a newly installed wall display illustrating NSA’s unique support to the Armed Forces through declassified archival imagery. This first-of-its-kind exhibit highlights the SIGINT work of the Agency and its predecessors during WWII, the Korean War, and the Vietnam War.

    “My grandfather served in WWII on the Red Ball Express, I had an uncle who served in the Marine Corps during the Vietnam War, and as a combat contingency deployer of 14 times throughout my 27 years in the military, it’s always good to see representation on the wall,” CMSgt Kenneth Bruce, Command Senior Enlisted Leader of USCYBERCOM and Senior Enlisted Advisor of NSA/CSS, said during the ribbon-cutting ceremony.

    Located in BWI’s Honor Flights corridor, the display welcomes and honors active-duty military and veterans arriving at the airport. According to Bruce, it’s important to increase awareness of NSA’s history as a combat support agency providing SIGINT and cybersecurity insights to military operations around the world.

    “We’re very appreciative of what this represents and what NSA has represented to our Nation,” Chief Bruce said on behalf of the nearly 17,000 members of the Central Security Service, who ensure the warfighter is integrated into what NSA does on a daily basis. “As these honor flights come in to BWI and thousands of service members walk through these hallways, they’ll always have a reminder of what they do and why they do it.”

    A team representing organizations across the Engagement & Policy Directorate worked for five years collaborating to ensure the design, content, and delivery was as impactful as possible in demonstrating NSA’s long-standing support to the U.S. Military, according to Stephanie Bartolowits, chief of Information Management and the project originator. The display supports the Director of National Intelligence’s Transparency Initiative and fulfills NSA’s responsibility to declassify and disseminate materials to the public.

    “We try to do a transparency project every year as an Agency to be forward-leaning, to share with the public what we do,” Bartolowits said. “We’re hoping some of these service members will be able to walk by here, recognize themselves and see these things, and know that we really appreciate them.”

    This exhibit opened less than two years after NSA launched its first-ever recruitment display at the airport, which is home to the Nation’s largest USO lounge and sees more military members traveling through than any other airport, according to Bartolowits.

    Maryland Aviation Administration CEO Ricky Smith said the partnership between BWI and NSA represents a “rich family” of Maryland-based institutions that serve the American people. “To have you present at this airport and to be able to showcase the value you bring to the community is a pleasure,” he said.

    According to Engagement & Policy Director Sheila Thomas, the NSA-BWI partnership is natural.

    “Support to military is in our core, our ethos. I can’t tell you how much it means to see this in a public arena,” she said. “This will continue on well past us, and that’s really something that’s remarkable, something we can be so proud of.”
     

    MIL Security OSI

  • MIL-OSI Security: Minnie Kenny Remembered During Event at National Cryptologic Museum

    Source: National Security Agency NSA

    The life and legacy of one of the National Security Agency’s (NSA) Hall of Honor cryptanalysts was recently recognized at the National Cryptologic Museum (NCM). Nearly 70 current and former NSA employees along with NSA organizers, gathered for an afternoon of reflection and fellowship to honor cryptologic giant, Minnie Kenny.
     
    Kenny started at the NSA’s predecessor agency in 1952 as a Communications Clerk. At the time, there were very few African Americans in that role. Kenny quickly excelled in language, traffic analysis and cryptanalysis. She rose through the ranks at the Agency, working at an elite “think tank” studying the future of cryptanalysis. Kenny served as Deputy Commandant of the National Cryptologic School and made her mark as a leader along the way.
     
    The NCM was the backdrop for fellowship amongst the Phoenix Society members and the current workforce. Organizers say the event, “preserves the connection between former and current cultural influencers with an eye on the path laid for future generations at NSA.”
     
    Kenny was known for leaving a red carnation on the desks of managers and employees she felt were doing a good job. So it was only fitting that organizers of the memorial event wore red as a representation.
     
    Kenny’s impact is still felt within the agency. She influenced the career of NSA Chief of Staff, Marlisa Smith who said, “Her name speaks for itself. When you say Ms. Kenny’s name you are just in awe of her.” During the event, Smith told the story of being a very young person at the agency and being scared to approach Minnie Kenny. “When you did approach her, you got that warmth and you knew she really cared about the workforce”.
     
    Former NSA Chief of Staff Ernie Green was also in attendance. He recalled walking in the halls of NSA and getting bumped by a woman who said, “I don’t know you.” That woman was Minnie Kenny. Green said from that point on, Kenny took him under her wing, taking him to Washington D.C., introducing him to influential lawmakers. Green talked about Kenny’s passion of furthering the mission to help elevate African Americans in the agency.
     
    Another Cryptologic Pioneer, Lillian “Lil” Berry said, “The thing that impressed me most about Minnie Kenny was how she pushed us to do our best. How she encouraged us to get our education. She pushed us. The best thing is, she encouraged you to bring your families in, and we have three generations of my family here today.”
     
    Other attendees, including Kenny’s former receptionist told the crowd funny anecdotes about Kenny, from how she liked her coffee to that overseas trip where her luggage was lost…twice.
     
    Those in attendance had the opportunity to view the grounds of the future building named the Kenny Center, in her honor. The 700,000-square-foot building is expected to be completed in 2028. The Kenny Center will provide a modern platform to support Information & Intelligence Analysis (IIA) for NSA and the Intelligence Community (IC).
     
    Guests concluded the afternoon with a tour of the National Cryptologic Museum, given by NSA Historian Dave Hatch. Attendees toured the tribute to Minnie Kenny and other Women in Cryptology, who were ahead of their time.
     
    The overall theme of the day was honoring Minnie Kenny, the contributions she made, the influence she had and the legacy she left.
     
    Guests left with red carnations, a fitting end to honor a life well lived.


    The National Cryptologic Museum is the only fully public museum in the Intelligence Community and is now open Monday through Saturday from 10 a.m. to 4 p.m. Admission is free and no reservations are required — click here for more information about the museum or to start planning your visit!

    MIL Security OSI

  • MIL-OSI Security: NSA Awards Authors of Study of Automated Attacks on New Webservers

    Source: National Security Agency NSA

    The National Security Agency (NSA) Research Directorate recently selected “Uninvited Guests: Analyzing the Identity and Behavior of Certificate Transparency Bots,” as the winner of its 11th Annual Best Scientific Cybersecurity Paper Competition.

    The winning paper, authored by Stony Brook University researchers Brian Kondracki, Johnny So, and professor Nick Nikiforakis, examined a study of automated attacks on new webservers, and explored how a web browser can trust an organization’s publicly issued cryptographic credentials. At the heart of their investigation was a simple question: What happens when you setup a new encrypted website?

    “This paper was selected as the winner because the researchers performed high-level, clearly written, and impactful science,” said NSA’s Director of Research, Gil Herrera. “It is the cutting-edge and relatable research that has made the paper stand out as the winner of this year’s competition.”

    NSA’s Laboratory for Advanced Cybersecurity Research established the annual Best Cybersecurity Paper Competition in 2013 to encourage the development of scientific foundations in cybersecurity, and to support the enhancement of cybersecurity within devices, computers, and systems through rigorous research, solid scientific methodology, documentation, and publishing. Herrera, along with NSA cybersecurity experts and external authorities in the field, selected the winning paper from 30 studies nominated by the public on the Science of Security website.

    The winning researchers studied autonomous systems which probe newly instantiated encrypted websites. They identified 105 malicious security bots attempting to perform nefarious actions such as data exfiltration, reconnaissance, and vulnerability exploitation. They also identified security systems examining sites to identify new phishing attacks. These profiles provide new insights into these autonomous actions happening on the Internet. This data can be used by both system administrators and developers to protect systems from compromise.

    The research team collected this data by creating the Certificate Transparency Honeypot (CTPOT), a system that obtains new certificates and monitors web bots for potential targets. CTPOT allows researchers to trick web bots, isolate them, and identify if they are malicious.

    “Beyond the technical merit of this paper, this paper is noteworthy because the high quality of documentation allows for others to verify and build upon this research advancement,” said Adam Tagert, Technical Director of NSA’s Science of Security Initiative. “Clear and available documentation are key components for advancing science, a primary goal of the NSA Science of Security Program”

    Nominations are now open for the 12th annual Best Scientific Cybersecurity Paper Competition. NSA welcomes nominations of papers published in 2023 in peer-reviewed journals and technical conferences that show an outstanding contribution to cybersecurity science. Winners will be announced at the end of 2024.

    Visit the Best Scientific Cybersecurity Paper webpage for more information on the competition and to nominate a paper.
     

    MIL Security OSI

  • MIL-OSI Security: Scouts Honored at National Cryptologic Museum’s Annual Scout Day

    Source: National Security Agency NSA

    “Best day of my life!” One Scout exclaimed as he left the National Cryptologic Museum’s (NCM) annual event on Saturday March 2nd, 2024.

    Rain couldn’t damper things for the scouts and their families as the event drew a near record number of attendees with more than 650 people coming through the doors of the NCM in just six hours.

    The NCM’s Scout Day was open to scouts and their families all over Maryland and beyond, with some even traveling more than two hours to take part in the festivities. Activity stations ranged from fingerprinting and robotics, to invisible ink and a scavenger hunt. With activities set up throughout the museum, kids and their parents had the opportunity to take in all kinds of lessons. In addition to cipher wheels and decoding encrypted messages, they learned about language, cryptology and the history of coding during slavery.

    Scouts could earn a Disabilities Awareness Merit Badge after completing tasks that showed what it was like to live with visual, hearing and physical impairments.
     
    Scout leaders say events like this help their scouts see the bigger picture.

    “People just don’t realize all the way from Hobos to Space Shuttle, to Military to State secrets, code has been around since the Egyptians,” said Stan Zdun, Scoutmaster for Troop 249 in Edgewater, Md. “Since the beginning of time,” he added.
     
    Jennifer Wilcox, the museum’s Director of Education, and her staff prepared for the event for months. She said that this year’s Scout Day was one of, if not the most successful to date.


    The National Cryptologic Museum is the only fully public museum in the Intelligence Community and is now open Monday through Saturday from 10 a.m. to 4 p.m. Admission is free and no reservations are required — click here for more information about the museum or to start planning your visit!

    MIL Security OSI

  • MIL-OSI Security: Doing It Until We Got It Right: A Short History of the Pearl Harbor Investigations

    Source: National Security Agency NSA

    On December 7, 1941, Japanese naval aircraft swept in on an unsuspecting US Pacific Fleet and Army in the Hawaiian Islands and destroyed many American ships and aircraft. In a little over two hours, 18 warships—including eight battleships—and over 160 aircraft were knocked out of action. With Japan’s eastern flank secured, its forces would rampage through the rest of the Pacific virtually unopposed.
     
    Within days of the disaster, calls resounded from the public, press, and the government itself for an investigation into how and why such an event could occur. To many, it was not just the magnitude of the defeat, but the extraordinary unpreparedness of U.S. forces in Hawaii: Someone had to pay.
     
    However, fixing responsibility for the debacle at Pearl Harbor was complicated by the revelations about the MAGIC decrypts. MAGIC was the cover name assigned to the intelligence garnered from the decryptions and translations of Japanese diplomatic messages.
     
    From September 1940 until the attack on Pearl Harbor, American cryptologists had read the most sensitive Japanese diplomatic messages and had kept President Franklin Roosevelt informed of every Japanese diplomatic and political policy turn. But MAGIC didn’t tell Roosevelt and other government leaders what the Japanese military was planning — that information was in Japanese Navy communications, and those ciphers and codes had largely resisted the efforts of American cryptologists to break them. Any investigation of the Pearl Harbor disaster would be as much a revelation of what we didn’t know as of what we did know.
     
    The issue of culpability would not be settled in one investigation, and for many people it was never really settled at all. Ultimately, eight hearings would be held during World War II and after, culminating in a joint congressional investigation beginning on November 15, 1945. What follows is a brief summary of each.
     
    The Roberts Commission, December 18, 1941-December 23, 1942: This commission, set by presidential executive order, was charged to determine the facts of the Japanese attack and establish if any dereliction of duty had occurred. MAGIC was discussed, but who received it and the details of the reports were not covered. Not surprisingly, the hearings were hostile to the area commanders, General Walter Short, USA, and Admiral Husband Kimmel, USN. The major political and military figures in Washington were exonerated.
     
    The Hart Inquiry, February 15, 1944-June 15, 1944: The Navy Department ordered Admiral Thomas Hart, former commander of the Asiatic Fleet, to conduct a one-man inquiry on Pearl Harbor so that important testimony would not be lost by hazard of war.
     
    The Army Pearl Harbor Board, July 20, 1944-October 20, 1944: In response to an act of Congress on July 13, 1944, the Army’s adjutant general convened hearings which took testimony from 151 witnesses. MAGIC evidence was taken only during the last week of the hearings. Surprisingly, and perhaps because radio intercept information was downplayed, the board censured Generals George Marshall and Leonard Gerow (War Plans Division) for not fully advising General Short of the situation vis-a-vis Japan.
     
    The Naval Court of Inquiry, July 24, 1944-October 19, 1944: A court of inquiry was convened in response to the same congressional act of July 13, 1944. The hearings made full use of MAGIC, though the testimony on it was classified and kept from the public. The findings of the inquiry completely exonerated Admiral Kimmel. Instead, Admiral Harold Stark, chief of naval operations at the time of Pearl Harbor, was blamed for failing to adequately advise Kimmel of the critical situation prior to the attack.
     
    The Clausen Investigation, November 23, 1944-September 12, 1945: By personal direction of the secretary of war, a one-man inquiry conducted by Major Henry Clausen was detailed to obtain testimony to supplement the Army Board’s completed investigation.
     
    The Hewitt Inquiry, May 14, 1945-July 11, 1945: Similar to the Clausen investigation, the Navy secretary ordered Admiral Kent Hewitt to continue the naval inquiry.
     
    The Clarke Investigation, September 14-16, 1944 and July 13, 1945-August 4, 1945: The secretary of war ordered Colonel Carter Clarke, head of the Military Intelligence Division, which, in turn, oversaw the army’s COMINT efforts, to investigate the handling of communications by the military intelligence division prior to Pearl Harbor.
     
    On November 15, 1945, the Joint Congressional Committee Investigation into the Pearl Harbor disaster held its first session. Established by a Joint Congressional Resolution, this investigation promised to be the most thorough possible. The Truman administration released all of the relevant classified documents, including the MAGIC translations. All of the participants that were still alive, with the exception of the seriously ill Secretary of War Stimson, were examined.
     
    In 1946, the committee’s findings were released in 40 volumes. A single volume report contained 12 findings that apportioned the blame among all the principals: Hawaiian area commanders as well as the War and Navy Departments. A minority report also censured President Roosevelt but concluded, like the majority findings, that Secretary Stimson, Secretary Knox, Generals Marshall and Gerow, and Admiral Stark, as well as General Short and Admiral Kimmel, were culpable for the disaster.
     
    The hope that the investigations would finally determine who was responsible was never fulfilled.
     
    Although many figures in Washington were blamed, Kimmel and Short would bear the onus for the disaster. But the fifty years following the investigations would see a stream of “revisionist” histories and rationalizations for the major figures, such as Admiral Kimmel. Conspiracies to suppress intelligence by Churchill, Roosevelt, and others would be “exposed,” and historians would “discover” new intelligence that existed which would have saved Pearl Harbor.
     
    However, the phoenix-like nature of the Pearl Harbor controversy proved only what one of Admiral Kimmel’s lawyers wrote to him in 1953: “Pearl Harbor never dies, and no living person has seen the end of it.”

    MIL Security OSI

  • MIL-OSI Security: Cybersecurity Speaker Series: Preparing for Post-Quantum

    Source: National Security Agency NSA

    FORT MEADE, Md. – Cryptography is our first and last line of defense for the nation’s most sensitive systems. The quantum threat is real and it is imperative to modernize to protect these systems now.

    In the next video in the Cybersecurity Speaker Series released today, NSA’s Senior Cryptographic Authority, Dr. Adrian Stanger, and NSA’s Cryptographic Solutions Technical Director, Dr. William J. Layton, sat down with NSA’s Cybersecurity Collaboration Center Chief of Defense Industrial Base (DIB) Defense, Bailey Bickley, to discuss preparing for Post-Quantum.

    “In theory if you make one of these [Quantum Computers], it can solve some math problems regular computers can’t,” said Layton.  “If you were to build a very large scale one that was very reliable, that’s still some distance in the future, it could break an enormous share of all the cryptography we use in the government at home or to run the internet. Essentially the foundation of security for a lot of the world would be shaken if we didn’t do anything about that.”

    Through the Cybersecurity Speaker Series, the center highlights NSA experts to share their insights, lessons, and contributions of their work in cybersecurity. 

    Cyber is an ever-changing landscape, and part of NSA’s mission is to look out to the horizon at new technologies that will become the next generation of threats. Quantum computing will be a game changer and will introduce new and advanced threats. A “Cryptographically Relevant” Quantum Computer has the potential to break existing public key crypto according to Stanger.

     “When we talk about cryptography here, we are not just talking about breaking encryption,” said Stanger, “but also the ability to masquerade as somebody to break authentication which has a bigger and more profound effects as that allows an adversary access to systems.”

    “The real challenge is for those who are managing systems who are custom building things,” said Layton. “For all those things in the world we forget to update or have been carefully built and rarely touched getting through and finding all those places that need to be fixed over the next few years is really the big challenge we are facing.”

    We have to move out now and plan for the future. Once the first cryptographically relevant quantum computer boots up, any system not upgraded to Quantum Resistant cryptography will be susceptible to attack.

    “The take away is “don’t panic!” But plan and prepare now,” said Bickley.

    View the latest Speaker Series installment below, along with the complete series on YouTube. Follow us on Twitter/X @NSACyber and on the CCC LinkedIn showcase page to track future releases.
     
    If you’re interested in joining NSA’s team, visit http://www.intelligencecareers.gov/nsa.
     

    MIL Security OSI

  • MIL-OSI Security: NSA’s Morrison Center Earns Gold LEED Certification for Sustainability

    Source: National Security Agency NSA

    The Morrison Center, constructed on the National Security Agency (NSA)/Central Security Service (CSS) Washington East Campus, has received the U.S. Green Building Council’s Leadership in Energy and Environmental Design (LEED) Gold certification — the first project on the campus to earn the designation.

    “The Morrison Center demonstrates that innovative design, functionality, and environmental stewardship can coexist harmoniously to create exceptional spaces for the benefit of both people and the planet,” said Randy Westfall, chief of Installations & Logistics (I&L).

    Recent awards bestowed upon one of NSA’s newest buildings is further cementing NSA’s Military Construction (MILCON) team as a leader in sustainable and innovative builds.

    “Obtaining LEED Gold is a notable achievement, demonstrating that our next-generation operational mission space has been built with attention to both the workforce space and the larger environmental impact of our expansion,” said Jeffrey Williams, the environmental engineer responsible for East Campus sustainability.

    Williams noted that the accolades not only highlight the building’s outstanding design and functionality, but also demonstrate NSA’s commitment to environmental stewardship and efficient resource management. “The Morrison Center boasts state-of-the-art insulation, high-performance windows, and efficient HVAC systems to minimize energy consumption and thereby reduce greenhouse gas emissions,” he said.

    LEED certification is the premier, globally recognized symbol of sustainable building design and construction. While all the buildings on East Campus are built to be LEED Silver, the Morrison Center is the first NSA-owned building to achieve LEED Gold, according to Williams. This certification signifies that the Morrison Center meets stringent criteria for energy efficiency, water conservation, indoor environmental quality, and sustainable site development, he said.

    The facilities throughout the building feature low-flow fixtures to significantly decrease water usage, as well as use of water from the reclaimed water system in industrial sources, promoting responsible resource management, Williams explained. The structure prioritizes the health and well-being of its occupants by incorporating ample daylight, superior air quality control, and ergonomic design principles, he said.

    Additionally, the facility incorporates lush green spaces for storm water management integrated into the East Campus design, along with a rooftop garden and outdoor gathering areas. According to Williams, this was done to foster a connection with nature and provide a serene environment away from the mission tempo.

    Finally, during the construction — managed by U.S. Army Corp of Engineers (USACE) Baltimore District East Campus Integrated Program Office — materials were sustainably sourced. From construction to interior finishes, the building utilizes locally sourced, environmentally friendly materials with recycled content, minimizing the impact on natural resources, Williams said.
     
    Under LEED, an evaluated project scores points across six categories: sustainable sites, water efficiency, energy and atmosphere, materials and resources, indoor environment quality (IEQ), and design innovation. Certification is achieved by documenting compliance with requirements in each category.

    “The higher the degree of compliance, the higher the certification level,” Williams said. “Achieving LEED Gold demonstrates a high degree of attention to the sustainable aspects of the building’s construction.”

    The certificate marks the latest significant recognition captured by the state-of-the-art building since it opened late last year. The Morrison Center, which serves as the new home for the National Security Operations Center and the Director, also won the Association of General Contractors Marvin M. Black Excellence in Partnering and Collaboration Award and the Office of the Director of National Intelligence’s (ODNI) Intelligence Community (IC) Facilities Program of the Year.

    The Marvin M. Black Excellence in Partnering and Collaboration Award is a highly coveted honor presented annually to construction projects that demonstrate excellence and achieve success by implementing the principles of partnering.

    According to MILCON Chief Matt Boren, construction of the 843,000-square foot facility was successful due to six guiding principles established early on: putting the mission first, safety, operational readiness/schedule, quality, teamwork, and team experience.

    “This project showcases partnering at its finest,” Boren said. “Collaboration and communication among stakeholders and the team’s commitment to a ‘mission first’ mindset resulted in a facility of exceptional quality that will play a vital role in protecting our national security for decades to come.”

    The IC Facilities Program of the Year award recognizes buildings that demonstrate excellence in facility management, maintenance, and operations. The Morrison Center surpassed other facilities projects in the IC by implementing cutting-edge technologies and systems that optimize energy consumption, enhance occupant comfort, and streamline maintenance processes, Boren said.

    By employing intelligent building automation, advanced energy management systems, and efficient waste management strategies, the facility showcases a commitment to operational efficiency and sustainable practices, Boren said.

    The Morrison Center is a testament to the possibilities of sustainable architecture and design, according to Westfall.

    “The receipt of these awards solidifies NSA’s position as a trailblazer in the IC,” Westfall said. “By combining architectural ingenuity, operational excellence, and environmental leadership, this extraordinary structure has set new benchmarks for sustainable building practices.”

    As I&L looks to the future of the East Campus, the Morrison Center stands as an inspiration for architects, developers, and facility managers worldwide, Westfall explained.

    MILCON is already applying the lessons learned in collaboration and design to create future structures on East Campus.

    “Both the Chiari Center and the Kenny Center are being constructed with the goal to further establish the East Campus as the global state-of-the-art IC campus,” Westfall said.
     


    Interested in learning more about joining NSA’s mission? Visit NSA.gov/Careers for more information. 
     

    MIL Security OSI

  • MIL-OSI Security: NSA Volunteers Give Back at Sandalwood Elementary

    Source: National Security Agency NSA

    BALTIMORE, MD. — Seven National Security Agency (NSA) employees took the phrase “giving back to the community” to heart during a recent visit to Sandalwood Elementary School where they shared cyber safety tips with 4th and 5th grade students and talked about their careers at NSA.
     
    A new NSA K-12 pilot program called “All In” coordinated the volunteers’ visit. The All In program supports under-resourced elementary schools in the counties surrounding NSA’s Maryland headquarters with STEM and world culture education. The program’s goal is to increase awareness and knowledge to build the next generation of citizens and professionals.
     
    In celebration of Cybersecurity Awareness Month in October, the volunteers shared cyber safety tips, such as password security, the good and bad of geotagging, and how to stay safe on social media and while emailing. They also highlighted their own cyber careers and experiences.
     
    “The students were engaged in the discussions, eager to share their own stories related to the topics, and walked away with a better understanding on how to be cyber safe at home and in the classroom,” said Jen Greenwaldt, the K-12 Outreach/All In Baltimore County liaison. “Seeing the excitement and engagement of students at these 4th and 5th grade levels was impressive. It made me more aware of the need to educate students on this important topic.”
     
    For Servia D., an engineer at NSA, the visit was personally rewarding.
     
    “I was pleasantly surprised to see how engaged the students were, and how much they already knew about cybersecurity topics at a very young age,” she said. “I am truly fortunate to be part of an Agency that is highly invested into giving back to the community and helping cultivate our future generation, especially in under-represented school communities.”

    To augment Sandalwood Elementary School’s cybersecurity curriculum, the NSA volunteers also shared cybersecurity resources from the National Institute of Standards & Technology and the National Initiative for Cyber Education with the school’s teachers.
     
    “With the evolution of technology and the next generation becoming more in-tune with the cyber world, it’s imperative to embrace the National Cybersecurity Workforce and Education Strategy to instill the importance of cyber safety,” Greenwaldt said.
     

    MIL Security OSI

  • MIL-OSI Security: Informational: Federal Court arraignments

    Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

    The U.S. Attorney’s Office announced that the following persons were arraigned or appeared this week before U.S. Magistrate judges on indictments handed down by the Grand Jury or on criminal complaints. The charging documents are merely accusations and defendants are presumed innocent until proven guilty beyond a reasonable doubt:

    Appearing in Missoula before U.S. Magistrate Judge Kathleen L. DeSoto and pleading not guilty on Oct. 11 was:

    Johntay Jujuan Taylor, 27, of Texas, on charges of conspiracy to commit bank fraud and wire fraud. If convicted of the most serious crime, Taylor faces a maximum of 30 years in prison, a $1 million fine and five years of supervised release. Taylor was detained pending further proceedings. The FBI; U.S. Secret Service; Chubbock, Pocatello and Kemmerer, Idaho, Police departments; Bannock County, Idaho, Sheriff’s Office; Idaho State Police; Missoula, Bozeman, Helena, Livingston and Laurel, Montana, Police departments; Yellowstone County, Montana, Sheriff’s Office; Teton County, Wyoming, Sheriff’s Office; and Evanston and Mountain View, Wyoming, Police departments conducted the investigation. PACER case reference. 23-13.

    Appearing Oct. 10 was:

    Keegan Allan Strelnik, 42, of Florence, on charges of prohibited person in possession of a firearm. If convicted of the most serious crime, Strelnik faces a maximum of 15 years in prison, a $250,000 fine and three years of supervised release. Strelnik was released pending further proceedings. The Bureau of Alcohol, Tobacco, Firearms and Explosives, U.S. Probation Office and Montana Department of Fish, Wildlife and Parks conducted the investigation. PACER case reference. 24-54.

    Nicole Lynn Shain, 39, of Bonners Ferry, Idaho, on charges of possession with intent to distribute methamphetamine and fentanyl. If convicted of the most serious crime, Shain faces a mandatory minimum of five years to 40 years in prison, a $5 million fine and at least four years of supervised release. Shain was detained pending further proceedings. Homeland Security Investigations and the Flathead Tribal Police Department conducted the investigation. PACER case reference. 24-50.

    The progress of cases may be monitored through the U.S. District Court Calendar and the PACER system. To establish a PACER account, which provides electronic access to review documents filed in a case, please visit http://www.pacer.gov/register.html. To access the District Court’s calendar, please visit https://ecf.mtd.uscourts.gov/cgi-bin/PublicCalendar.pl.

    XXX

    MIL Security OSI

  • MIL-Evening Report: Fair-minded, down to earth and unusually gifted: George Negus dies at 82

    Source: The Conversation (Au and NZ) – By Denis Muller, Senior Research Fellow, Centre for Advancing Journalism, The University of Melbourne

    George Negus, who has died at the age of 82, belonged to the nomenclatura of Australian television current affairs journalism.

    He first came to prominence as a member of the team that produced the groundbreaking nightly ABC TV current affairs program, This Day Tonight. That team was made up of others who were also to become household names: presenter Bill Peach and reporters Peter Luck, Gerald Stone and Mike Willesee.

    The program became a burr under the saddle of senior ABC management. On its second day it broke the story that the then chair of the ABC, James Darling, was not to be given a third term. The story incurred the chairman’s displeasure. The fallout went on interminably, a rehearsal for many tumults that were to follow throughout TDT’s 11-year existence.

    This kind of fearless, sometimes irreverent, public-interest journalism was meat and drink to Negus. He practised it from both sides of the chasm that traditionally separates journalists from political staffers.

    During the term of the Whitlam government, he became press secretary to the attorney-general, Lionel Murphy. He leaked to the media Murphy’s plan to raid the headquarters of the Australian Security Intelligence Organisation (ASIO) in 1973 because Murphy believed the agency was withholding from him information about domestic terrorism.

    However, it was as a television journalist that Negus made his name. In 1979 he joined the founding team of the Nine Network’s 60 Minutes program, alongside Ray Martin, Ian Leslie and, later, Jana Wendt.

    In 1992 he became the founding host of ABC TV’s Foreign Correspondent program and worked there until 1999. He developed a reputation as a well-informed and courageous reporter specialising in the Middle East. In 2004, he published a bestselling book, The World from Islam: A Journey of Discovery through the Muslim Heartland, in which he defended Islam against the stereotype that it was inherently violent.

    In 2005 he became host of the SBS program Dateline, which also had a foreign affairs focus, and in 2011 began hosting 6.30 with George Negus on the Ten network.

    In 2012, Negus and a fellow panellist on the Ten network show The Circle, Yumi Stynes, became embroiled in a controversy concerning remarks they made about Ben Roberts-Smith, many years before he was found by a federal court judge to have committed war crimes, a finding that is now on appeal.

    There was severe public blowback on Negus and Stynes, who then apologised to Roberts-Smith. They in turn received apologies from Australia’s major newspapers for misconstruing the original remarks.

    In 2015 he was made a Member of the Order of Australia for services to media and environmental conservation.

    Although he acquired a knockabout image, he was described by two women who worked with him as disarmingly approachable.

    Nehida Barakat was the senior producer for the ABC’s 7.30 program in about 2000 when Negus stood in as the summer presenter. She was apprehensive when he rang to discuss an intro she had written. “This gentlemanly voice asked: ‘Would you mind if I changed just a couple of words?’”

    Nicole Chvastek, who worked with him at Nine, said he was a big star who generated an air of excitement, a mixture of the intelligent, well-travelled journalist and “a sort of approachable larrikin everyman”.

    It was his down-to-earth approach to storytelling that viewers related to so readily. This, coupled with unshakeable fairmindedness on the issues he reported on, marked him out as an unusually gifted journalist.

    He is survived by his partner, Kirsty, and two sons, Ned and Serge. The family released a statement saying he had “passed away peacefully surrounded by loved ones after a gracious decline from Alzheimer’s disease, all the while with his trademark smile”.

    Denis Muller does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Fair-minded, down to earth and unusually gifted: George Negus dies at 82 – https://theconversation.com/fair-minded-down-to-earth-and-unusually-gifted-george-negus-dies-at-82-241367

    MIL OSI AnalysisEveningReport.nz

  • MIL-OSI: Intelligence Community Veteran Michael Widener Joins Synergy ECP Board of Advisors

    Source: GlobeNewswire (MIL-OSI)

    COLUMBIA, Md., Oct. 15, 2024 (GLOBE NEWSWIRE) — Synergy ECP, a leading provider of mission critical, highly technical solutions for the Defense and Intelligence Communities, is excited to announce the appointment of Michael Widener to its Board of Advisors. Synergy ECP is a portfolio company of Falfurrias Management Partners.

    Michael Widener, a former Senior Intelligence Service executive at the Central Intelligence Agency and four-time Chief of Station/Base, brings decades of experience to Synergy ECP’s Board of Advisors through his leadership of historically large and complex CIA programs in Africa, Europe, the Middle East, and Southeast Asia. Michael also led CIA efforts related to understanding the impact of advanced computing, microelectronics, next-generation communications, and other emerging technologies on US national security by harnessing expertise from the US private sector and worldwide venture capital ecosystem to deliver new capabilities into the Intelligence Community.

    “We are honored to welcome Michael Widener to our Board of Advisors,” said Bruce Howard, CEO of Synergy ECP. “Michael’s extensive experience at the intersection of emerging technologies, the private sector, and policymakers will support Synergy ECP’s efforts as we deliver technical solutions in areas such as signals intelligence, cyber operations, critical infrastructure resiliency, zero trust methodologies, and next generation 5G capabilities. Additionally, his mission understanding, developed through years of leading human intelligence and covert action programs, will ensure Synergy ECP stays on the leading edge of emerging technical requirements within our intelligence community.”

    “I am honored to join the Board of Advisors at Synergy ECP,” said Mr. Widener. “Our Intelligence Community faces significant challenges in understanding the national security implications of emerging technology areas such as artificial intelligence, quantum computing, and cyber. I look forward to supporting Synergy ECP as they advance on their mission of solving the toughest national security challenges for tip of the spear customers leading our Nation’s cyber and signals intelligence operations.”

    About Synergy ECP
    Founded in 2007 and headquartered in Columbia, Maryland, Synergy ECP is a leading provider of cybersecurity, software and systems engineering and IT services to the U.S. intelligence and defense communities. The company leverages its expertise in data transport solutions, software and systems engineering, and other solutions to deliver critical and innovative capabilities to high-level decision makers that enhance our nation’s security. For more information, visit http://www.synergyecp.com.

    The MIL Network

  • MIL-OSI New Zealand: Minister to attend cyber security, NATO meetings

    Source: New Zealand Government

    Minister Responsible for the GCSB and Minister of Defence Judith Collins will travel to Singapore and Brussels for Singapore International Cyber Week and the North Atlantic Treaty Organization (NATO) Defence Ministers’ Meeting. 

    New Zealand has been invited to attend the NATO meeting alongside representatives from the European Union and the Indo-Pacific 4 (IP4), which comprises New Zealand, Australia, Japan and the Republic of Korea. 

    “This is the first time IP4 Defence representatives will have the opportunity to exchange views with NATO Allies in the changing security dynamics in the Euro-Atlantic and Indo-Pacific regions, including in the context of Russia’s war of aggression against Ukraine and its implications for our region,” Ms Collins says.

    “I will be taking the opportunity to reiterate our unwavering support for the people of Ukraine as they fight against Russia’s illegal and unjustified war of aggression.

    “In a deteriorating global environment, New Zealand is committed to working with like-minded partners to uphold the international rules-based system that is fundamental to our security and prosperity.

    While in Brussels, Ms Collins will hold bilateral meetings with defence counterparts from NATO and the Indo-Pacific region, and will participate in a meeting of the Global Coalition to Defeat ISIS.                               

    Ms Collins will also meet Directors-General from European Commission agencies in the Space, and Science, Innovation and Technology portfolios while in Brussels.

    Before going to Brussels she will attend the Singapore International Cyber Week, the most established cyber security event in the Asia Pacific region and one which provides a vital chance to discuss global cyber security. She will also take part in the annual ASEAN Ministerial Meeting on Cyber Security Special Session with Dialogue Partners.

    “I am pleased to represent New Zealand at this important gathering and am looking forward to participating in a range of discussions on global cyber security issues,” Ms Collins says.

    “Cyber security is front of mind for many New Zealand businesses and I am committed to ensuring we are prepared and resilient in this area.”             

    Ms Collins will also meet private sector representatives to discuss cyber and technology security matters while in Singapore.

    She leaves New Zealand tomorrow and returns on 20 October. 

    MIL OSI New Zealand News

  • MIL-OSI United Kingdom: £350,000 drought relief for Southern Africa

    Source: Scottish Government

    Aid for communities suffering worst drought in a century

    Thousands of drought-affected households in Zambia and Zimbabwe will receive support from the Scottish Government’s Humanitarian Emergency Fund.

    Christian Aid and the Scottish Catholic International Aid Fund (SCIAF) will each receive £175,000 to enable both charities to provide cash to communities to meet their immediate basic needs, including food and safe drinking water.

    SCIAF will support 1,530 households in Zambia with cash transfers of 600 kwacha, equivalent to £17 a month. Christian Aid will provide cash transfers to 562 drought-affected household in Zimbabwe and promote services that work to prevent gender-based violence, which can increase during times of instability following major disasters.   

    First Minister John Swinney said:

    “Between a record drought exacerbated by the climate crisis and ongoing cholera outbreaks, the current situation in Southern Africa looks very bleak.

    “This funding will ensure people in some of the hardest hit communities can put food on their families’ tables, buy basic essentials, and safe drinking water – which is critical to prevent further spread of cholera.

    “Scotland must fulfil its role as a good global citizen and a big part of that is supporting those who have contributed the least to climate change, through the worst of its effects.”

    SCIAF Chief Executive Lorraine Currie said:

    “Right now, people in Zambia and neighbouring countries in Africa are at crisis point, with failed harvest after failed harvest.

    “The root cause is climate change, which is ravaging the region. It’s making weather patterns more extreme with more intense, more frequent droughts, floods, and heat waves. Rural areas, where most people farm to feed themselves are the hardest hit.

    “This funding from the Scottish Government will literally save lives. Working through our local partners, we will make sure the most vulnerable people are reached with cash grants which will give them the freedom to quickly buy what their families need to survive. These are our sisters and brothers and we will not forget them.”

    Christian Aid’s Zimbabwe Country Director Aulline Chapisa said: 

    “We’re deeply grateful for the Scottish Government’s commitment and support. This funding will enable 562 vulnerable households to access essential food items and will be delivered by our local partner the Zimbabwe Council of Churches. It will also help to significantly reduce levels of gender-based violence by improving access to information and support services.  

    “Sadly we know that during times of crisis and food insecurity cases of domestic violence increase. Additionally, with extra funding from Christian Aid, we’ll be improving access to safe water supplies and supporting people to diversify their means of earning a living. Ultimately this project is about life saving food assistance and building resilience and wellbeing in these communities.”

    Background

    Southern Africa experienced its driest February in 100 years, according to the United Nations, with estimates suggesting between 40 – 80 per cent of the maize crop has been wiped out in areas where 70 per cent of the population relies on agriculture to survive.

    The Scottish Government’s Humanitarian Emergency Fund provides aid in the aftermath of a crisis through a panel of eight leading humanitarian aid organisations in Scotland who advise and access the fund: Mercy Corps, Oxfam, British Red Cross, Islamic Relief, SCIAF, Christian Aid, Tearfund and Save the Children.

    Scotland provided £2.9 million of humanitarian aid to nine countries between 2023-24. More than 745,000 people across Africa and southern Asia are estimated to have benefitted from this support between 2023-24, which was awarded in response to crises including earthquakes in Afghanistan, Tropical Storm Freddy in Malawi, and refugee displacement following conflict in South Sudan.

    Humanitarian Emergency Fund: Annual Report 2023-24

    MIL OSI United Kingdom

  • MIL-OSI Global: Fall of Khrushchev: 60 years since the ‘most democratic coup’ in Soviet history, how Comrade Nikita was toppled

    Source: The Conversation – UK – By Tomas Sniegon, Associate Professor, Department of European Studies, Lund University

    The overthrow of Nikita Khrushchev from the posts of first secretary of the Soviet Communist Party and the leader of the Soviet state in October 1964 was an unprecedented event in the history of the Soviet Union.

    The old leader was deposed by the opposition without violence. He was not imprisoned or killed after losing power. While his predecessors Lenin and Stalin and successors Brezhnev, Andropov and Chernenko all died in power, Khrushchev was sent into retirement, where he lived under supervision for another seven years.

    Unlike the era of the last Soviet leader, Mikhail Gorbachev, the Soviet Union did not disintegrate when its leader had to relinquish power. Six decades have now passed since what has become known as the “most democratic coup” in Soviet history – sometimes referred to as the “little October revolution”.

    Khrushchev, who rose to power on the death of Josef Stalin in 1953, actually came close to being overthrown as early as 1957. At that time, Stalin’s former collaborators and close comrades, including Georgy Malenkov and Vyacheslav Molotov, opposed him. They even gained an upper hand in the party’s highest body, the presidium. But Khrushchev was saved by the support of the army leadership, the KGB political police and the wider party leadership, the central committee.

    Seven years later, however, he was brought down by politicians from the next generation – men who largely owed their powerful positions to him.

    Strongest among them was Leonid Brezhnev, who duly took Khrushchev’s place as first secretary (shortly afterwards renaming his position general secretary, the same title as Stalin). Next in line was Alexander Shelepin, the powerful secretary of the party’s central committee who had run the KGB from 1958 to 1961.

    The role of the KGB, which in October 1964 was headed by Shelepin’s successor Vladimir Semichastny, was crucial in ensuring Khrushchev’s downfall, as its ninth directorate – which was responsible for the protection of state officials – not only protected but also constantly monitored them.

    Semichastny not only knew about the revolt against Khrushchev but was actively involved in it. Had he informed the leader about the plotting, pretty much what he was in the job to do, Khrushchev would more than likely have averted the palace coup this time as well.

    In his memoirs, Semichastny even mentioned the fact that Brezhnev raised the possibility of Khrushchev’s assassination during one conversation with him. But this plan was never put into action. In the event the plot to remove the Soviet leader was completed by non-violent means.

    Reforming leader

    Khrushchev has gone down in history as a reformer who wanted to make Soviet communism less brutal. He strongly criticised Stalin for his abuse of power but, at the same time, he gradually increased his own powers.

    His efforts at political and economic reforms stopped when they posed a threat to maintaining the monopoly of communist power. Despite paying lip service to the idea of less heavy-handed domination of the Soviet bloc from Moscow, he became known for his bloody suppression of the Hungarian revolt in 1956. During the Cuban missile crisis in 1962, he then brought the world to the brink of nuclear war.

    New kind of leadership: Kruschev meeting US president John F Kennedy in Vienna in 1961.

    His initially positive reforms improved the living standards) of the people in his country, but later became chaotic and led to social unrest, including the massacre of workers in Novocherkassk in 1962 and the need to buy grain from the west, which he had previously wanted to ideologically “bury”.

    Also, the rift between the Soviet Union and China at the turn of the 1950s and 1960s caused a certain resentment in Moscow. Khrushchev’s moves towards liberalisation had not caused the rift, which was more due to China’s increased authoritarianism under Mao Zedong during that era. This was exacerbated by border disputes between the two countries as well as disagreements over international relations. But Khrushchev’s critics felt he could – and should – have handled relations more skilfully.

    Fall and legacy

    Having faced down a coup attempt in 1957, by October 1964 Khrushchev found himself politically isolated and without support in either the presidium or in the central committee. His opponents forced him to return prematurely from his vacation in the Georgian report town of Pitsunda to Moscow where he was confronted by his political opponents, led by Brezhnev with the support of other powerful politicians, including Shelepin, Alexei Kosygin and Mikhail Suslov.

    Realising his supporters in the presidium were in the minority and that to retain power would mean involving the army or KGB, which he was not confident would back him, Khruschev resigned.

    Reflecting on how his leadership had rejected Stalinism, he is reported to have said: “I am glad that, finally, the party has matured and can control any individual.”

    But Brezhnev, who manoeuvred himself into power in Khrushchev’s stead, learned from the fall of his predecessor and tightened his grip on the levers of power. Yet the Soviet Union – thanks in large part to Khrushchev – never returned the state terror and mass murder of Stalinism.

    The Soviet Union was to experience another coup attempt against a leader in 1991, when conservative opponents tried to overthrow another reformer, Mikhail Gorbachev. But this attempt, much less prepared and elaborate and lacking the necessary wider support, failed. The Soviet Union collapsed and was formally disbanded just a few months later.

    But for many people, it’s Khrushchev whose reforms and governing style began the gradual disintegration of the Soviet Union as far back as the 1950s, partly thanks to his efforts to impose more democratisation. It is not surprising that the current Russian president, Vladimir Putin, disdains him – especially since Khrushchev, according to Putin, “senselessly donated” Crimea to Ukraine in 1954.

    At least Khrushchev himself was able to live to focus on the positives. He would recall in his memoir how he freed his country from the suffocating fear of Stalinism and was able to raise a generation of younger politicians who were finally not afraid to stand up to him. Sadly, this is no longer a hallmark under the current leadership.

    Tomas Sniegon does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Fall of Khrushchev: 60 years since the ‘most democratic coup’ in Soviet history, how Comrade Nikita was toppled – https://theconversation.com/fall-of-khrushchev-60-years-since-the-most-democratic-coup-in-soviet-history-how-comrade-nikita-was-toppled-241053

    MIL OSI – Global Reports

  • MIL-OSI USA: Magellan Diagnostics Sentenced for Concealing Malfunction in Lead Testing Devices

    Source: US Food and Drug Administration

    Department of Justice
    U.S. Attorney’s Office
    District of Massachusetts 

    FOR IMMEDIATE RELEASE
    Thursday, October 10, 2024

    Company failed to notify FDA about serious malfunction in lead testing devices that resulted in inaccurately low blood level results in children and adults

    BOSTON –Magellan Diagnostics, Inc., a medical device company headquartered in Billerica, Mass., was sentenced yesterday in federal court in Boston for criminal charges related to the concealment of a device malfunction that produced inaccurately low lead test results for tens of thousands of children and other patients.

    Magellan has been ordered to pay a $21.8 million fine, $10.9 million in forfeiture and a minimum of $9.3 million to compensate patient victims. Magellan pleaded guilty to two counts of introducing a misbranded medical device into interstate commerce. Magellan was charged criminally on May 21, 2024

    “Keeping the people of Massachusetts safe takes a variety of forms. In the case of Magellan Diagnostics, it means protecting children who may have been exposed to dangerous levels of lead that can lead to serious health consequences. This company has admitted that it left lead blood level monitoring devices in pediatricians’ offices that it knew were providing inaccurately low readings, putting thousands of kids at risk of not having their elevated lead levels accurately diagnosed. In addition to holding the company accountable, this criminal sentence requires the company to undertake an extensive effort to identify and compensate victims.”

    “Medical device makers have an obligation to provide truthful information to protect patients. By deliberately concealing and consistently misleading consumers and the FDA about device malfunctions, Magellan acted with gross disregard for its responsibility to comply with FDA requirements and put patients at risk,” said Fernando McMillian, Special Agent in Charge, FDA Office of Criminal Investigations, New York Field Office. “We will continue to thoroughly investigate those whose actions undermine the integrity of the FDA regulatory process which exists to protect consumer health.”

    “It’s absolutely appalling that Magellan Diagnostics was more concerned about its bottom line than it was about coming clean to their customers and the FDA about a serious malfunction in its lead testing devices that we believe unnecessarily endangered the health of incredibly vulnerable victims,” said Jodi Cohen, Special Agent in Charge of the Federal Bureau of Investigation, Boston Division. “When you’re not feeling well, and you’re trying to find out why, the last thing you should have to worry about is whether the diagnostic test you’re relying on lives up to its manufacturer’s claims. The FBI is grateful to see that the victims affected by Magellan’s actions in this case are one step closer to being compensated.”

    “Magellan concealed a serious flaw in its lead testing devices while ignoring the well-being of patients and knowingly providing inaccurate results of lead levels in the blood,” said Roberto Coviello, Special Agent in Charge of the U.S. Department of Health and Human Services, Office of Inspector General. “This type of egregious conduct, which only sought to benefit the corporate bottom line, can erode the public’s trust in our nation’s health care system. Today’s sentencing should send a clear message that any company engaging in such dangerous activity will be held accountable.”

    Magellan’s LeadCare Ultra and LeadCare II devices detected lead levels and lead poisoning in the blood of children and adults using either venous (blood draws through the arm) or fingerstick samples. LeadCare II, which was predominantly used to test fingerstick samples, accounted for more than half of all blood lead tests conducted in the United States from 2013 through 2017. LeadCare Ultra was predominantly used to test venous samples.

    According to court documents, Magellan failed to timely notify the FDA about a serious malfunction that caused the company’s LeadCare devices to produce inaccurate blood lead level results when used to test venous blood samples. Magellan also changed the user instructions for the LeadCare devices without prior FDA notice or approval.

    Magellan first learned that a malfunction in its LeadCare Ultra device could cause inaccurate lead test results – specifically, lead test results that were falsely low – during the FDA clearance process in June 2013. Magellan, however, released LeadCare Ultra to the market in late 2013 without informing customers or the FDA of the malfunction. In August 2014, LeadCare Ultra customers independently discovered the malfunction and complained about inaccurate results. FDA regulations required the company to file a medical device report about the malfunction within 30 days, but Magellan did not do so.

    In November 2014, Magellan sent a letter to its LeadCare Ultra customers advising them of the malfunction and recommending that they wait 24 hours before running their tests. This contradicted the instructions for use approved by the FDA. Magellan did not, however, report the malfunction to the FDA or advise the FDA of its change to the instructions until April 2015, nearly 21 months after Magellan discovered the malfunction and almost 8 months after customers discovered the malfunction on their own. In August 2015, Magellan changed the label instructions for the LeadCare Ultra device to require users to wait 24 hours before using the device to test blood samples, rather than testing the samples immediately. FDA regulations required the company to provide advance notice of the label change and file necessary reports of device correction, but Magellan did neither.  

    Magellan’s testing in 2013 also indicated that the same malfunction affected the LeadCare II device when it was used to test venous samples. Magellan, however, did not notify the FDA about the LeadCare II malfunction until November 2016.

    The FDA ultimately found that the LeadCare devices could not accurately test venous samples, leading to a recall of all LeadCare devices using venous samples and a warning to the public not to use LeadCare Ultra, LeadCare II or LeadCare Plus for testing venous blood samples because of the malfunction and a recommendation that doctors retest certain patients.

    According to the Centers for Disease Control and Prevention, there is no safe level of lead in the blood. Lead exposure may cause irreversible lifelong physical and mental health problems. Young children and pregnant women are most vulnerable to lead exposure, especially those from low-income households and those who live in housing built before 1978 because those homes are more likely to contain lead-based paint and have fixtures containing lead.

    As part of the criminal resolution, Magellan has agreed to compensate patients who were demonstrably harmed for the economic damages they suffered as a result of the malfunction in Magellan’s blood lead testing devices. If you or a family member believe you received an inaccurate blood lead test result from a LeadCare device between 2013–2017, please complete the questionnaire located on the FBI’s website at www.fbi.gov/MagellanCaseInquiry. Information about the status of the case is located on the U.S. Attorney’s Office website: https://www.justice.gov/usao-ma/victim-and-witness-assistance-program/magellan-diagnostics-inc.

    Acting U.S. Attorney Levy; FDA SAC McMillan; FBI SAC Cohen; and HHS-OIG SAC Coviello made the announcement today. Assistant U.S. Attorneys James Herbert, Kelly Lawrence and Leslie Wright of the Health Care Fraud Unit prosecuted the case.

    MIL OSI USA News

  • MIL-OSI Asia-Pac: Union Minister Shri George Kurian Inaugurated Animal Quarantine & Certification Service at Cochin International Airport in Kerala : Aims to facilitate “Ease of Living” for Pet travelers

    Source: Government of India

    Posted On: 10 OCT 2024 3:46PM by PIB Delhi

    Union Minister of State for Fisheries, Animal Husbandry and Dairying, Shri George Kurian inaugurated the newly established Animal Quarantine & Certification Service (AQCS) at Cochin International Airport (CIAL) in Kochi, Kerala today. This facility is a significant step in facilitating the import of pet dogs and cats, aligning with the Government’s commitment to enhancing the “Ease of Living” for pet owners.

    On this occasion, Union Minister of State Shri George Kurian invited suggestions from various stakeholders for further improving import and export processes for livestock, fishery products and related activities which is expected to boost economic activity in the region.

    In support of this initiative, Cochin International Airport has established several facilities including a 24-hour air-conditioned pet station, a dedicated cargo section, a veterinary doctor on call, a customs clearance center and a facilitation center for travelers accompanying pets. This new service marks a crucial advancement in supporting pet travelers and improving overall import and export processes related to animal and fishery products in Kerala.

    During the event an agreement was signed by Ms. Varsha Joshi, Additional Secretary, Department of Animal Husbandry and Dairying with CIAL for operating the Animal Quarantine facilities. Managing Director of CIAL, Mr. S. Suhas said that the decision will greatly benefit travelers accompanied by pets. This partnership aims to streamline the process, providing world-class services for pet owners and travelers making it easier to bring animals into Kerala.

    The Ministry of Fisheries, Animal Husbandry and Dairying regulates the import of livestock and livestock products under the Livestock Importation Act of 1898, amended in 2001, with a focus on preventing the introduction of exotic diseases into India. At present, live animals, including pets, are imported through six major entry points where AQCS stations are located: Delhi, Mumbai, Kolkata, Chennai, Bengaluru, and Hyderabad. This new facility at Cochin International Airport will reduce the cost and effort for pet owners importing animals into Kerala, offering them a more convenient option.

                                    ***

     

    AA

    (Release ID: 2063826) Visitor Counter : 31

    MIL OSI Asia Pacific News

  • MIL-OSI Asia-Pac: Joint Statement on Strengthening ASEAN-India Comprehensive Strategic Partnership for Peace, Stability and Prosperity in the Region in the context of the ASEAN Outlook on the Indo-Pacific (AOIP) with the support of India’s Act East Policy (AEP)

    Source: Government of India (2)

    Posted On: 10 OCT 2024 5:41PM by PIB Delhi

    WE, the Member States of the Association of Southeast Asian Nations (ASEAN) and the Republic of India, gathered on the occasion of the 21st ASEAN-India Summit on 10 October 2024 in Vientiane, Lao PDR;

    REAFFIRMING our commitment to promote the ASEAN-India Comprehensive Strategic Partnership, guided by the fundamental principles, shared values and norms that have steered the ASEAN-India Dialogue Relations since its establishment in 1992, including those enunciated in the Vision Statement of ASEAN-India Commemorative Summit (2012), the Delhi Declaration of the ASEAN-India Commemorative Summit to mark the 25th Anniversary of ASEAN-India Dialogue Relations (2018), the ASEAN-India Joint Statement on Cooperation on the ASEAN Outlook on the Indo-Pacific for Peace, Stability, and Prosperity in the Region (2021), the Joint Statement on ASEAN-India Comprehensive Strategic Partnership (2022), the ASEAN-India Joint Statement on Maritime Cooperation (2023) and ASEAN-India Joint Leaders’ Statement on Strengthening Food Security and Nutrition in Response to Crises (2023);

    WELCOMING the Decade of Act East Policy of India, where ASEAN is at the heart and of utmost priority, which has contributed to advancing ASEAN-India relations through cooperation in areas of political-security, economic, cultural and people-to-people relations;

    ACKNOWLEDGING the deep civilisational linkages and cross-cultural exchanges, facilitated through both land and maritime routes between Southeast Asia and India, encompassing the various seas and oceans of the Indo-Pacific, providing a strong foundation for the ASEAN-India Comprehensive Strategic Partnership;

    WELCOMING the activities and initiatives held in the year 2024 on the occasion of the decade of Act East Policy to further strengthen the ASEAN-India Comprehensive Strategic Partnership;

    RECOGNISING India’s support for ASEAN Centrality and unity in the evolving regional architecture and its commitment to work closely through ASEAN-led mechanisms and fora including the ASEAN-India Summit, East Asia Summit (EAS), Post Ministerial Conference with India (PMC+1), ASEAN Regional Forum (ARF), ASEAN Defence Ministers’ Meeting Plus (ADMM-Plus) and Expanded ASEAN Maritime Forum (EAMF) as well as support to ASEAN integration and the ASEAN Community building process including Master Plan for ASEAN Connectivity (MPAC) 2025, Initiative for ASEAN Integration (IAI) and ASEAN Outlook on the Indo-Pacific (AOIP);

    NOTING the United Nations General Assembly (UNGA) Resolution A/RES/78/69 which emphasises, in the Preamble, the universal and unified character of the 1982 United Nations Convention on the Law of the Sea (UNCLOS), and reaffirms that the Convention sets out the legal framework within which all activities in the oceans and seas must be carried out and is of strategic importance as the basis for national, regional and global action and cooperation in the marine sector, and that its integrity needs to be maintained;

    APPRECIATING efforts towards implementation of the ASEAN-India Joint Statement on Cooperation on the ASEAN Outlook on the Indo-Pacific for Peace, Stability, and Prosperity in the Region through trust and confidence based on shared democratic values, strong belief in sovereignty and territorial integrity, and a shared commitment to the rule of law and the principles of the UN Charter;

    REAFFIRMING our commitment to upholding multilateralism, the purposes and principles enshrined in the UN Charter and respect for international law, while recognising ASEAN’s rising global relevance and unique convening power amid the emerging multipolar global architecture and noting the growing and active role of India in major international economic and political affairs.

    Do hereby declare to

    1. Reaffirm the importance of maintaining and promoting peace, stability, maritime safety and security, freedom of navigation and overflight in the region, and other lawful uses of the seas, including unimpeded lawful maritime commerce and to promote peaceful resolutions of disputes, in accordance with universally recognised principles of international law, including the 1982 UNCLOS, and the relevant standards and recommended practices by the International Civil Aviation Organization (ICAO) and the International Maritime Organization (IMO). In this regard, we support the full and effective implementation of the Declaration on the Conduct of the Parties in the South China Sea (DOC) in its entirety and look forward to the early conclusion of an effective and substantive Code of Conduct in the South China Sea (COC) that is in accordance with international law, including the 1982 UNCLOS;

    2. Build on ongoing collaboration in defense and security within the framework of ASEAN Defence Ministers’ Meeting (ADMM) Plus, including the first ASEAN-India Maritime Exercise (AIME) in 2023 and co-chairmanship of the ADMM-Plus Experts’ Working Group on Counter-Terrorism (2024-2027), as well as noting the two initiatives announced at the ASEAN-India Defence Ministers’ Informal Meeting in 2022;

    3. Strengthen cooperation in maritime security, counter-terrorism, cybersecurity, military medicine, transnational crime, defence industry, humanitarian assistance and disaster relief, peacekeeping and demining operations and confidence building measures. This will be achieved through the exchange of visits, joint military exercise, maritime exercise, port calls by naval ships and defence scholarships;

    4. Advance the implementation of ASEAN-India Joint Statement on Maritime Cooperation and continue to cooperate on areas such as maritime security, blue economy, sustainable fisheries, marine environmental protection, marine biodiversity, and climate change issues, among others;

    5. Promote and work towards the strengthening of multilateralism through the UN and the multilateral processes to address global concerns, pursue shared goals and complementary initiatives, and promote sustainable development for the benefit of our peoples;

    6. Build on the ASEAN-India Joint Statement on Cooperation on the AOIP for Peace, Stability, and Prosperity in the Region by advancing cooperation between the AOIP and the Indo-Pacific Oceans Initiative (IPOI);

    7. Expedite the review of the ASEAN-India Trade in Goods Agreement (AITIGA) to make it more effective, user-friendly, simple, and trade-facilitative for businesses and relevant to the current global trading practices and promote mutually beneficial arrangements and strengthen economic cooperation between ASEAN and India;

    8. Promote diverse, secure, transparent and resilient supply chains while exchanging information on identifying and proactively addressing potential risks in supply chains in areas of mutual interest to promote sustainable development;

    9. Cooperate on emerging technologies including Artificial Intelligence (AI), Blockchain technology, Internet of Things (IoT), Robotics, Quantum Computing, 6-G technology, building and strengthening of startups ecosystem with special emphasis on digital connectivity and financial technology;

    10. Welcome the launch of the ASEAN-India Fund for Digital Future to support joint activities;

    11. Cooperate to unlock the full potential of safe, secure, responsible, trustworthy AI by promoting international cooperation and further discussions on international governance for AI, considering that the rapid progress of AI has the potential for prosperity and expansion of the global digital economy. We should endeavor to leverage AI for public good by solving challenges in a responsible, inclusive and human-centric manner while protecting people’s rights and safety;

    12. Note the proposal to celebrate the year 2025 as the ASEAN-India Year of Tourism to further strengthen people-to-people ties while recognising the crucial role of tourism in promoting sustainable socioeconomic development and economic prosperity, and as one of the vehicles for achieving the SDGs. In this endeavour, we support the implementation of the ASEAN-India Tourism Cooperation Work Plan 2023-2027, and to explore deeper cooperation to support joint programs for tourism education, training and research to build capacity and ensure a high-quality tourism industry. We also encourage the expansion of business networks among travel stakeholders, the practice of sustainable and responsible tourism, as well as the exchange of tourism trends and information. In addition, we support the enhancement of crisis communications, promotion of tourism investment opportunities, as well as development and joint promotion of niche markets, cruise tourism and tourism standards;

    13. Strengthen health systems by enhancing collaboration on public health including, inter alia, in the areas of research and development (R&D), public health emergency preparedness, training of healthcare professionals, medical technology, pharmaceuticals, vaccine security and self-reliance, vaccine development and production, as well as general and traditional medicine;

    14. Enhance cooperation in the field of environment, including biodiversity and climate change as well as explore cooperation in the field of energy security, including cooperation on clean, renewable, and low-carbon energy in line with the ASEAN Plan of Action for Energy Cooperation 2021-2025 and India’s renewable energy priorities, as well as other national models and priorities such as bio-circular-green development;

    15. Promote disaster and climate resilience of infrastructure systems through knowledge sharing and best practices, capacity building and technical assistance, which can be pursued such as through the framework of Coalition of Disaster Resilient Infrastructure (CDRI) as well as the proposed Memorandum of Intent (MOI) between ASEAN Coordinating Centre for Humanitarian Assistance on Disaster Management (AHA Center) and National Disaster Management Agency (NDMA) of India;

    16. Enhance connectivity between ASEAN and India in line with the “Connecting the Connectivities” approach, by exploring synergies between the Master Plan on ASEAN Connectivity (MPAC) 2025 and its successor document, the ASEAN Connectivity Strategic Plan (ACSP) and India’s connectivity initiatives in the region under India’s Act East Policy and Security and Growth for All in the Region (SAGAR) vision to ensure seamless connectivity in the Indo-Pacific by collaborating for quality, sustainable and resilient infrastructure and enhancing cooperation in transport in land, air, and maritime domains including through the early completion and operationalisation of the India-Myanmar-Thailand (IMT) Trilateral Highway while looking forward to its eastward extension to Lao PDR, Cambodia and Viet Nam;

    17. Stressing the importance of strengthening multilateralism and comprehensive reform of the multilateral global governance architecture, including the United Nations and international financial architecture, international financial institutions, and multilateral development banks, to make them fit for purpose, democratic, equitable, representative and responsive to the current global realities and the needs and aspirations of the Global South;

    18. Call for an inclusive and balanced international agenda, that responds to the concerns and priorities of the Global South, recognising that the principle of ‘Common but Differentiated Responsibilities and Respective Capabilities’ (CBDR-RC) within the United Nations Framework Convention on Climate Change (UNFCCC) applies to all relevant global challenges;

    19. Explore potential synergies with sub-regional frameworks, such as the Indian Ocean Rim Association (IORA) the Bay of Bengal Initiative for Multi-Sectoral Technical and Economic Cooperation (BIMSTEC), Indonesia-Malaysia-Thailand Growth Triangle (IMT-GT), Singapore-Johor-Riau (SIJORI) Growth Triangle, Brunei Darussalam-Indonesia-Malaysia-Philippines East ASEAN Growth Area (BIMP-EAGA), and Mekong sub-regional cooperation frameworks, including Mekong-Ganga Cooperation (MGC) and Ayeyawady Chao Phraya-Mekong Economic Cooperation Strategy (ACMECS), and to support ASEAN and India’s efforts in promoting equitable development by aligning sub-regional growth with the comprehensive, mutual growth and development of ASEAN and India;

    20. Continue to work together on regional and global issues of common concern while endeavouring to strengthen our partnership through the ASEAN-India Comprehensive Strategic Partnership.

    ***

    MJPS/SR/SKS

    (Release ID: 2063888) Visitor Counter : 67

    MIL OSI Asia Pacific News

  • MIL-OSI Asia-Pac: ASEAN-India Joint Statement on Advancing Digital Transformation

    Source: Government of India (2)

    Posted On: 10 OCT 2024 5:42PM by PIB Delhi

    WE, the Member States of the Association of Southeast Asian Nations (ASEAN) and the Republic of India, on the occasion of the 21st ASEAN-India Summit on 10 October 2024 in Vientiane, Lao PDR;

    REAFFIRMING our commitment to promote the ASEAN-India Comprehensive Strategic Partnership, guided by the fundamental principles, shared values and norms that have steered the ASEAN-India Dialogue Relations since its establishment in 1992, including those enunciated in the Vision Statement of ASEAN-India Commemorative Summit (2012), the Delhi Declaration of the ASEAN-India Commemorative Summit to mark the 25th Anniversary of ASEAN-India Dialogue Relations (2018), the ASEAN-India Joint Statement on Cooperation on the ASEAN Outlook on the Indo-Pacific for Peace, Stability, and Prosperity in the Region (2021), the Joint Statement on ASEAN-India Comprehensive Strategic Partnership (2022), the ASEAN- India Joint Statement on Maritime Cooperation (2023) and ASEAN-India Joint Leaders’ Statement on Strengthening Food Security and Nutrition in Response to Crises (2023);

    RECOGNISING the significant role of digital public infrastructure (DPI) in catalysing digital transformation and promoting inclusivity, efficiency, and innovation in public service delivery; connecting individuals, communities, industries, organizations and countries across geographies, taking into account different domestic and international contexts;

    RECOGNISING that technology can enable rapid transformations for bridging the existing digital divides in the region and accelerate progress for inclusive and sustainable development while promoting region’s economic integration;

    APPRECIATING the contribution made by India towards implementation of ASEAN Digital Masterplan 2025 (ADM 2025) and noteworthy achievements of cooperation activities in the successive ASEAN-India Digital Work Plans including through knowledge sharing and capacity building programmes and the establishment of Centers of Excellence in Software Development and Training in CLMV (Cambodia, Laos, Myanmar & Vietnam) countries;

    ACKNOWLEDGING the leadership and significant advancements made by India in developing and implementing successful DPI initiatives, which have resulted in substantial social and economic benefits;

    ACKNOWLEDGING the development of the ASEAN Digital Masterplan 2026-2030 (ADM 2030), to build upon the accomplishments of the ADM 2025, which aims to expedite digital transformation across ASEAN, to facilitate the seamless transition into the next phase of digital advancement by 2030, in line with the common goals of ASEAN Community Vision 2045.

    APPRECIATING India for setting up the ASEAN-India Fund for Digital Future focusing on cooperation in digital transformation in ASEAN countries;

    Do hereby declare to strengthen cooperation in:

    1. Digital Public Infrastructure

    1.1 We acknowledge the opportunities for collaboration, with the mutual consent of ASEAN Member States and India, to share knowledge, experiences, and best practices in the development, implementation, and governance of DPI by utilizing various kinds of platforms to promote DPI development across the region;

    1.2 We recognise potential opportunities for joint initiatives and projects that leverage DPI for regional development and integration;

    1.3 We shall explore collaboration to leverage DPI across sectors in addressing diverse challenges such as education, healthcare, agriculture, and climate action.

    2. Financial Technology

    2.1 We recognise that Financial Technology (FinTech) and innovation as vital drivers for the bilateral economic partnership:

    2.2 We aim to:

    a. Explore potential collaboration of cross-border linkages between payment systems in ASEAN and India through innovative digital solutions enabling digital service delivery available in India and ASEAN.

    b. Explore partnerships between national agencies for fintech innovations and support digital solutions, including digital financial solutions.

    3. Cybersecurity

    3.1 We recognize that cooperation in cybersecurity is a crucial part of our Comprehensive Strategic Partnership.

    3.2 We welcome the establishment of the ASEAN India Track 1 Cyber Policy Dialogue and look forward to its first meeting in October this year;

    3.3 We intend to expand our cyber security cooperation to support digital economy. As we gradually move towards growing digital economies, we shall endeavour to ensure the security and resilience of digital infrastructure and services;

    4. Artificial Intelligence (AI)

    4.1 We support collaboration the development of necessary knowledge, skills, infrastructure, risk management frameworks and policies to effectively and responsibly leverage AI technologies and applications to harness the potential of AI advancements.

    4.2 We recognize that access to AI technologies including, but not limited to, computing, data-sets and foundational models is key to achieving sustainable development through AI. Therefore, we shall collaborate for democratisation of AI resources for social good in accordance with respective national laws, rules and regulations.

    4.3 We recognize that AI is changing job landscapes rapidly and there is a need for upskilling and reskilling the workforce. We support collaboration in capacity building on AI education initiatives, develop Al-focused vocational training programs, and create platforms for knowledge exchange to prepare the workforce for the future job market.

    4.4 We welcome collaboration to develop studies on governance, standards and tools to support and assess the achievement of fairness, robustness, equitable access and other mutually agreed principles of responsible AI to promote trustworthiness in artificial intelligence systems.

    5. Capacity Building and Knowledge Sharing

    5.1. We shall use the existing frameworks including the ASEAN India Digital Ministers’ Meeting for regular exchanges, workshops, seminars, training programs and other capacity building exercises focusing on relevant topics aimed at facilitating digital transformation;

    5.2. We support sharing knowledge about our respective digital solutions including DPI for mutual study and adaptation to our needs.

    6. Sustainable Financing and Investment

    6.1. While initially the activities shall be financed under ASEAN India Fund for Digital Future, being launched this year, we shall explore mechanisms for financing digital initiatives, including through public-private partnerships, international funding, and innovative financing models.

    7. Implementation Mechanism

    7.1. Task the relevant bodies of ASEAN-India to follow-up and implement this Joint Statement, in order to ensure cooperation between ASEAN and India for the advancement of digital transformation.

    ***

    MJPS/SR/SKS

    (Release ID: 2063889) Visitor Counter : 65

    MIL OSI Asia Pacific News

  • MIL-OSI Security: Eighteen Individuals and Entities Charged in International Operation Targeting Widespread Fraud and Manipulation in the Cryptocurrency Markets

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    First-ever criminal charges against financial services firms for market manipulation and “wash trading” in the cryptocurrency industry

    BOSTON – Eighteen individuals and entities have been charged for widespread fraud and manipulation in the cryptocurrency markets. Charges were unsealed in Boston against the leaders of four cryptocurrency companies, four cryptocurrency financial services firms (known as “market makers”) and employees at those firms.

    Four defendants have pleaded guilty, another defendant has agreed to plead guilty, and authorities apprehended three other defendants in Texas, the United Kingdom and Portugal this week. More than $25 million in cryptocurrency has been seized and multiple trading bots responsible for millions of dollars’ worth of wash trades for approximately 60 different cryptocurrencies have been deactivated.

    According to the charging documents, the defendants who created cryptocurrency companies made false statements about their cryptocurrencies (“tokens”) and executed sham trades in those tokens (“wash trades”) to create the appearance of trading activity that would make the tokens look like good investments. These deceptive tactics allegedly attracted new investors and purchasers, which resulted in an increase in the tokens’ trading prices. The defendants are then alleged to have sold their tokens at the artificially inflated prices, a fraud commonly known as a “pump and dump.” The largest of these cryptocurrency companies, Saitama, at one point had a multi-billion-dollar market value.

    The cryptocurrency companies also allegedly hired financial services firms ( “market makers”) to wash trade their tokens in exchange for payment. As one market maker defendant, who has agreed to plead guilty, described the practice to a prospective client: the “objective on the secondary markets” is to find “other buyers from the community, people you don’t know about or don’t care about” because “we have to make [the other buyers] lose money in order to make profit.”

    Three market makers—ZM Quant, CLS Global and MyTrade—along with their employees are charged with allegedly wash trading and/or conspiring to wash trade on behalf of NexFundAI, a cryptocurrency company and token created at the direction of law enforcement as part of the government’s investigation. A fourth market maker, Gotbit, its CEO, and two of its directors are also charged for perpetrating a similar scheme.

    Specifics regarding the defendants and conduct are detailed in Attachment A below.

    “This investigation, the first of its kind, identified numerous fraudsters in the cryptocurrency industry. Wash trading has long been outlawed in the financial markets, and cryptocurrency is no exception. These are cases where an innovative technology – cryptocurrency – met a century old scheme – the pump and dump. The message today is, if you make false statements to trick investors, that’s fraud. Period. Our Office will aggressively pursue fraud, including in the cryptocurrency industry,” said Acting United States Attorney Joshua Levy. “These charges are also a stark reminder of how vigilant online investors must be and that doing your homework before diving into the digital frontier is critical. People considering making investments in the cryptocurrency industry should understand how these scams work so that they can protect themselves.”

    “What the FBI uncovered in this case is essentially a new twist to old-school financial crime. ‘Operation Token Mirrors’ targeted nefarious token developers, promoters, and market makers in the crypto space. What we uncovered has resulted in charges against the leadership of four cryptocurrency companies, and four crypto ‘market makers’ and their employees who are accused of spearheading a sophisticated trading scheme that allegedly bilked honest investors out of millions of dollars,” said Jodi Cohen, Special Agent in Charge of the Federal Bureau of Investigation, Boston Division. “The FBI took the unprecedented step of creating its very own cryptocurrency token and company to identify, disrupt, and bring these alleged fraudsters to justice.”

    If you bought or sold any of the tokens referenced below, please fill out this form.

    The Securities & Exchange Commission has filed civil complaints alleging violations of the securities laws in relation to the conduct at Gotbit, CLS, ZM Quant, Saitama and Robo Inu. Valuable assistance was provided by the Federal Bureau of Investigation’s Legal Attachés (Madrid and London), Portugal’s Policia Judiciaria European Network of Fugitive Active Search Team (ENFAST), the United Kingdom’s National Crime Agency’s National Extradition Unit, the Internal Revenue Service Criminal Investigation, Boston Field Office and the Criminal Division’s Computer Crime and Intellectual Property Section, National Cryptocurrency Enforcement Team.

    Acting United States Attorney Joshua S. Levy and Jodi Cohen, Special Agent in Charge of the Federal Bureau of Investigation, Boston Division made the announcement. Assistant U.S. Attorneys Christopher J. Markham and David M. Holcomb of the Securities, Financial & Cyber Fraud Unit are prosecuting the cases.  

    The details contained in the charging documents are allegations. The defendants are presumed to be innocent unless and until proven guilty beyond a reasonable doubt in the court of law.  

    ###

    ATTACHMENT A

    The following individuals and entities have been charged in U.S. District Court in Boston, Mass.:

    Aleksei Andriunin, Fedor Kedrov, Qawi Jalili, Gotbit Consulting LLC (Gotbit) According to court documents, Gotbit was a well-known “market maker” in the cryptocurrency industry. Aleksei Andriunin, 26, of Russia and Portugal, was Gotbit’s Chief Executive Officer and Founder. Andriunin was arrested on Oct. 8, 2024 in Portugal and awaits extradition. Fedor Kedrov, of Russia, was Gotbit’s Director of Market Making. Qawi Jalili, of Russia was Gotbit’s Director of Sales. Gotbit, Kedrov and Jalili are each charged with wire fraud and conspiracy to commit market manipulation and wire fraud. Andriunin is also charged in a separate criminal complaint with wire fraud, conspiracy to commit market manipulation and wire fraud and conspiracy to commit money laundering.

    It is alleged that between 2018 and 2024, Gotbit provided market manipulation and wash trading services to several cryptocurrency companies, including companies located in the United States. Gotbit allegedly made wash trades worth millions of dollars on behalf of clients and received tens of millions of dollars in proceeds for these illicit services. In a 2019 interview published online, Andriunin allegedly described how he developed a code to wash trade and artificially inflate cryptocurrency trading volume. Andriunin allegedly kept track of Gotbit’s market manipulation, including with spreadsheets that compared “Created Volume” from wash trades with naturally occurring “Market Volume.” Gotbit’s employees, including Jalili and Kedrov, allegedly described these wash trading tactics to prospective clients and how to avoid detection. Jalili and Kedrov also allegedly provided these services to multiple cryptocurrencies, including the Saitama and Robo Inu cryptocurrencies.

    Riqui Liu, Baijun Ou, ZM Quant Investment LTD (ZM Quant) ZM Quant was a “market maker” in the cryptocurrency industry that allegedly advertised illicit market manipulation services to clients. Riqui Liu, 26, of the United Kingdom and Hong Kong, was an employee of ZM Quant. Baijun Ou, 32, of Hong Kong, was also an employee of ZM Quant. ZM Quant, Liu and Ou are each charged in a superseding indictment with wire fraud and conspiracy to commit market manipulation and wire fraud.

    According to court documents, ZM Quant allegedly advertised a “trading bot” that could “create volume.” ZM Quant employees allegedly discussed these illicit services with clients through Telegram messages and during video teleconferences. For example, as alleged in the charging documents, during a video teleconference in March 2024, Liu and Ou described how ZM Quant would trade “maybe ten times per minute or twenty times a minute” to “increase the trading volume” and “pump the price.” Liu and Ou also described how ZM Quant allegedly used multiple trading wallets to avoid having the trading look “fake.” It is further alleged that ZM Quant provided market manipulation services for multiple cryptocurrency companies, including Saitama and NexFundAI.

    Andrey Zhorzhes, CLS Global FZC, LLC (CLS) CLS was a “market maker” in the cryptocurrency industry that allegedly advertised illicit market manipulation services to its clients. Andrey Zhorzhes, of the United Arab Emirates, was an employee of CLS. Both CLS and Zhorzhes are charged in an indictment with wire fraud and conspiracy to commit market manipulation and wire fraud.

    It is alleged that Zhorzhes described to a prospective client how CLS’s algorithm generated trading volume on multiple cryptocurrency exchanges, as follows: 

    • “We have an algorithm that . . . basically does self-trades, buying and selling.”
    • “The idea of volume generation is . . . so the token looks organic and looks live and people get interested in trading it.”
    • “It’s very hard to track. . ..We’ve been doing that for many clients.”
    • “I know that it’s wash trading and I know people might not be happy about it.”

    Zhorzhes and other CLS traders allegedly provided these market manipulation services for NexFundAI.

    Liu Zhou, MyTrade MM – MyTrade MM was another “market maker” in the cryptocurrency industry that advertised illicit market manipulation services to its clients, including “pump and dump” consulting services and “wash trades” facilitated by “bots.” Liu Zhou, 39, of China and Canada, was the founder of MyTrade MM. Zhou is charged and has agreed to plead guilty to conspiracy to commit market manipulation and wire fraud.

    MyTrade MM’s clients had access to a dashboard on MyTrade MM’s website through which clients specified the desired amount of daily wash trades on identified cryptocurrency exchanges. MyTrade MM’s dashboard described the service as “Volume Support” and allowed for millions in wash trades per day for each client cryptocurrency, for example:

    In conversations with purported promoters of NexFundAI, Zhou allegedly described MyTrade MM as superior to “CLS” and “Gotbit” because those market makers “keep clients in the dark” and “control the pump and dump,” which means “they can do inside trading easily.” Zhou allegedly also described the various purposes for wash trading, including showing “continuous trading activity every hour”; generating large enough trading volumes for cryptocurrency exchanges to waive listing fees; and executing “pump and dumps.” According to court documents, Zhou further described that the “objective on the secondary markets” was to find “other buyers from the community, people you don’t know about or don’t care about” because “we have to make [the other buyers] lose money in order to make profit.”

    Manpreet Kohli, Haroon Mohsini, Nam Tran, Max Hernandez, Russell Armand, Vy Pham, Saitama LLC (Saitama) – Saitama was a cryptocurrency company, originally incorporated in Massachusetts in August 2021.

    Manpreet Kohli, 43, of the United Kingdom, was the CEO of Saitama. Kohli was arrested in the United Kingdom on Oct. 7, 2024 and is awaiting extradition. Haroon Mohsini, 37, of Texas, also worked at Saitama. Mohsini was arrested on Oct. 7, 2024 in the Southern District of Texas. Nam Tran, 32, of Vietnam, worked at Saitama and is currently in Vietnam. Kohli, Mohsini and Tran are each charged in a superseding indictment with wire fraud, market manipulation, and conspiracy to commit wire fraud, commit market manipulation and conduct an unlicensed money transmitting business. Max Hernandez, 36, of Massachusetts, and Russell Armand, 42, of Texas, also worked at Saitama and are charged separately and have both pleaded guilty to market manipulation and conspiracy to commit wire fraud and to operate an unlicensed money transmitting business. Vy Pham, 32, of California, is also charged for conduct at a different cryptocurrency company but, as part of that guilty plea, admitted to certain conduct involving Saitama.

    Saitama allegedly purported to create a series of products that could be used with its token and, at its peak, boasted a market value of $7.5 billion. Saitama’s leadership allegedly made a variety of false public statements, including that Saitama’s business plan had been reviewed by regulators, that its leadership was not selling the Saitama tokens they owned and that the Saitama token was coded in a way that prevented market manipulation. According to charging documents, in reality Saitama’s leadership was actively manipulating the market for the Saitama token and secretly selling their Saitama tokens for tens of millions in profits.

    Saitama’s market manipulation campaign allegedly began in or about July 2021, when leadership coordinated a series of small purchases spread across multiple cryptocurrency wallets. These trades were coordinated on Telegram, where Armand allegedly explained that the goal was to “create an illusion of massive buys and new holders” to “incite ppl [people] to buy 
    more…W[e] want list of small buys to look like it’s mor[e] buyers. That’s the idea.” Saitama’s leadership allegedly confirmed their purchases to one another, discussed how they were successfully getting others to purchase the Saitama cryptocurrency and exchanged “pump it” memes and GIFs:

    Thereafter, the Saitama leadership allegedly paid several market makers to wash trade the Saitama cryptocurrency on cryptocurrency exchanges, including BitMart, LBank and XT.com. The market makers that Saitama paid allegedly included ZM Quant and Gotbit.

    Robo Inu Finance (Robo Inu) – Robo Inu was a cryptocurrency company and token that Vy Pham created after she left Saitama in 2021. Pham has been charged and agreed to plead guilty to conspiracy to commit market manipulation, to commit wire fraud and to operate an unlicensed money transmitting business. Pham founded and promoted Robo Inu from the United States. Like Saitama, Robo Inu allegedly purported to create a series of products that could be used with its cryptocurrency. Beginning in or about 2022, Robo Inu allegedly paid Gotbit to artificially inflate the trading volume of the Robo Inu token through wash trades on cryptocurrency exchanges such as Bitmart.

    Michael Thompson, VZZN – VZZN was a cryptocurrency company and token that Armand created after he left Saitama in 2023. Michael Thompson, 50, of Virginia, also worked at VZZN. As with Armand, Thompson is charged and pleaded guilty to conspiracy to commit market manipulation. VZZN allegedly purported to be a video streaming service that could be used with the VZZN token. While promoting that service, Armand and Thompson allegedly also made misleading public statements about VZZN and artificially inflated the trading volume of the VZZN token through wash trades.

    Bradley Beatty, Lillian Finance LLC (Lillian Finance) – Lillian Finance was a cryptocurrency company and token founded by Bradley Beatty, 48, of Florida. Beatty is charged in an indictment with wire fraud. Lillian Finance allegedly purported to use blockchain technology in the healthcare industry and to use a portion of proceeds generated from token sales for charitable purposes. Beatty allegedly made a series of false statements about Lillian Finance to attract investors, for example, that he was a defense contractor and that he had addressed Congress on the topic of cryptocurrency. Thereafter, it is alleged that Beatty generated hundreds of thousands of dollars in proceeds from retail sales of the Lillian Finance token and misappropriated a portion of Lillian Finance’s profits that were supposed to be used for charity.

    The charge of market manipulation provides for a sentence of up to 20 years in prison, up to three years of supervised release, a fine of up to $5 million or twice the gross gain or loss from the offense and forfeiture. The charge of wire fraud provides for a sentence of up to 20 years in prison, up to three years of supervised release, a fine of up to $250,000 or twice the gross gain or loss from the offense, restitution and forfeiture. The charge of conspiracy to commit wire fraud, market manipulation and/or to conduct an unlicensed money transmitting business provides for a sentence of up to five years in prison, up to three years of supervised release, a fine of up to $250,000 to twice the gross gain or loss from the offense, restitution and forfeiture. The charge of conspiracy to commit money laundering provides for a sentence of up to 20 years in prison, three years of supervised release, a fine of $500,000, or twice the value of the criminally derived property, whichever is greater, and forfeiture. Sentences are imposed by a federal district court judge based upon the U.S. Sentencing Guidelines and statutes which govern the determination of a sentence in a criminal case.

    ###

    MIL Security OSI

  • MIL-OSI Security: Boston Man Charged in Elder Fraud Conspiracy That Defrauded Elderly Victim of Over $400,000

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    BOSTON – A South Boston man has been arrested and charged in connection with a scheme that defrauded a 75-year-old man from Berkshire County, Mass., of approximately $420,000.

    Urvishkumar Vipulkumar Patel, 21, was charged with conspiracy to commit wire fraud. Patel was arrested on Oct. 7, 2024 and subsequently released by the Court on conditions including GPS monitoring and orders that he remain in Massachusetts.

    According to the charging documents, in or around June 2024, the victim received a pop-up message on his computer claiming that his computer was frozen. The message contained a phone number, which the victim believed to be associated with Microsoft, and directed the victim to call for assistance. The victim then called the phone number listed in the pop-up and allegedly spoke with an individual before being transferred to another individual who called himself, “Sam Wilson.”

    It is alleged that Wilson claimed to be a federal agent with the U.S. Treasury Department and purported to confirm the victim’s name and address. When the victim stated that was not the correct address, Wilson provided additional addresses until the victim identified his correct address. Wilson then allegedly told the victim that the victim’s name and address were listed as being involved in a money laundering scheme and that the “Treasury” showed a number of houses had been purchased in the United States and Russia in the victim’s name. Wilson allegedly told the victim that he was going to help him get out of this trouble and would speak to a judge but that, in the meantime, the victim needed to safeguard his money from being further implicated in the supposed money laundering scheme. Specifically, Wilson allegedly told the victim he should withdraw cash from his bank and send it to the Treasury Department, where it would be kept in a lock box until the victim was cleared of the scheme. Wilson also allegedly cautioned that the bank would not let the victim withdraw all of his money at once – directing the victim to make the withdrawals in smaller amounts and send it to Wilson at the “Treasury” in installments.

    On approximately five separate occasions over the course of three months, the victim withdrew and provided approximately $420,000 in cash to several individuals he believed to be associated with “Sam Wilson.” On each occasion, Wilson asked the victim how much he could withdraw from his bank account, directed the victim to place the cash in a taped box with the victim’s own name and address written on it. Wilson also allegedly told the victim a specific date and time at which he would send a courier for the cash. On each occasion, the courier would pull alongside the curb in front of the victim’s house, lower one of the passenger side windows and provide a prearranged “PIN” passcode to the victim. The victim would then place the box of cash into the courier’s vehicle who would then drive away.  

    The victim’s sister reported this activity to law enforcement on Oct. 1, 2024. According to the charging documents, on Oct. 7, 2024, Patel served as the courier waiting outside of the victim’s home and was approached by an undercover officer posing as the victim. It is alleged that, after receiving the prearranged “PIN” passcode from Patel, the undercover officer placed the box into Patel’s vehicle and Patel quickly drove away. He was immediately apprehended.

    At the time of his arrest, Patel was allegedly driving a rental car and was actively engaged in a WhatsApp call on his cell phone. Patel allegedly told law enforcement that he had been collecting packages for weeks at the direction of another individual in exchange for payment. Patel also allegedly told law enforcement that he would deliver each package to a prearranged location before receiving his payment.

    The investigation remains ongoing. Members of the public who believe they are victims of a cybercrime – including elder fraud scams, cryptocurrency scams, romance scams, investment scams, and business email compromise fraud scams – should contact USAMA.CyberTip@usdoj.gov. To report elder fraud, please visit the FBI’s IC3 Elder Fraud Complaint Center or contact the dedicated National Elder Fraud Hotline at 833–FRAUD–11 or 833–372–8311 Monday – Friday, 10a.m.- 6p.m. EST.

    The charge of conspiracy to commit wire fraud provides for a sentence of up to 20 years in prison, up to three years of supervised release and a fine of up to $250,000. Sentences are imposed by a federal district court judge based upon the U.S. Sentencing Guidelines and statutes which govern the determination of a sentence in a criminal case.

    Acting United States Attorney Joshua S. Levy and Jodi Cohen, Special Agent in Charge of the Federal Bureau of Investigation, Boston Division made the announcement. Valuable assistance was provided by the North Adams Police Department and the Hampden County Sheriff’s Office. Assistant U.S. Attorney Kaitlin Brown of the Worcester Branch Office is prosecuting the case.

    The details contained in the charging documents are allegations. The defendant is presumed innocent unless and until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: FBI Philadelphia Emphasizes Strong Passwords for Cybersecurity Awareness Month

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)

    This Cybersecurity Awareness Month, the FBI Philadelphia Field Office reminds the public of the importance of using strong passwords or passphrases to protect their systems and accounts.

    These days, with how our lives are intertwined in the cyberspace, from staying connected to family and friends, to working and banking, strong online security has never been more critical.

    We use passwords for everything from protecting our devices to accounts.

    Many use simple passwords from “Password” or “1234” in an attempt to make them easier to remember. Simple passwords, even those that might include special characters, are easier to crack.

    Utilizing strong passwords and passphrases is vital in protecting against data breaches. A personal data breach occurs when personal data is leaked or spilled from a secure location to an untrusted environment. It can also happen when someone’s sensitive, protected, or confidential data is copied, transmitted, viewed, stolen, or used by an unauthorized person.

    In 2023, Pennsylvania residents reported over 1,900 complaints of personal data breaches to the FBI’s Internet Crime Complaint Center (IC3), totaling about $44.8 million in reported losses.

    In 2023, New Jersey residents reported over 1,300 complaints of personal data breaches to the IC3, totaling about $18 million in reported losses.

    Below are some password best practices:

    • Use strong and complex passwords or passphrases instead of simple passwords
    • Strong passwords should be long, random, unique

    Example password: aiH!ple$dAli&hp Example passphrase: City Statue Photograph Boxer Pretzel

    • Do NOT reuse passwords across multiple accounts
    • Be careful of using personally identifiable information when building a password to include birthdays, pet names, etc.
    • Use a password manager
    • Set up multi-factor authentication for your accounts

    For additional information on how you can protect yourself, your device, and your information, visit On the Internet: Be Cautious When Connected FBI

    For more strong password tips, visit: Use Strong Passwords | CISA

    To report a personal data breach or other Internet-enabled crime to the FBI, visit ic3.gov.

    FBI Philadelphia can be reached at (215) 418-4000.

    MIL Security OSI

  • MIL-OSI Security: Registered Sex Offender Arrested on Federal Charges Alleging He Targets & Exploits Local High School Students

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (c)

    COLUMBUS, Ohio – Law enforcement agents arrested a Columbus man this morning on federal charges alleging he sexually exploited high school girls and coerced them into engaging in commercial sex acts.

    Terrance P. Cummings, 29, has a criminal history of unlawful sexual conduct with minors dating back to 2016. In this case, Cummings’s federal child exploitation charge carries a mandatory minimum of 25 years and up to 50 years in prison and the coercion and enticement charge pending against him is punishable by at least 10 years and up to life in prison.

    The FBI asks anyone with information related to the criminal allegations against Cummings to text 740-428-0739.

    According to an affidavit filed in support of the criminal complaint, in July 2024, the Central Ohio Human Trafficking Task Force received information about a 16-year-old victim allegedly receiving gifts and illicit substances from Cummings in exchange for sex acts.

    The court documents allege Cummings had sex with numerous minor victims in exchange for drugs in addition to requesting nude images of them. On some occasions, Cummings would allegedly provide the drug to the minor victims before engaging in sex acts with them. It is alleged that Cummings sold or provided fentanyl, marijuana, Xanax, cocaine, acid and ecstasy. 

    While executing a search warrant at Cummings’s apartment in August, agents discovered a variety of narcotics, along with two iPhones submerged in the water tank on the back of the bathroom toilet, which Cummings had allegedly attempted to destroy after learning about the warrant.

    Cummings’s electronics and other accounts contained more than 18,000 sexual images and videos including child pornography. The investigation revealed that Cummings requested sexually explicit content in exchange for money, gifts and drugs.

    Cummings is charged with sexually exploiting a minor, distributing, receiving or possessing child pornography, coercion and enticement of a minor, and obstruction of justice. His case was unsealed today, and he appeared in federal court at 1:15pm.

    Kenneth L. Parker, United States Attorney for the Southern District of Ohio; Elena Iatarola, Special Agent in Charge, Federal Bureau of Investigation (FBI), Cincinnati Division; and Ohio Attorney General Dave Yost announced the charges. Assistant United States Attorneys Emily Czerniejewski and Jennifer Rausch are representing the United States in this case.

    The Central Ohio Human Trafficking Task Force was formed under Ohio Attorney General Dave Yost’s Ohio Organized Crime Investigations Commission, and includes resources from the Columbus Division of Police, Homeland Security Investigations, Delaware County Sheriff’s Office, Powell Police Department, Bureau of Criminal Investigations, The Ohio State University Police Department, Marysville Division of Police, Salvation Army, Southeast Healthcare, the Franklin County Prosecutor’s Office and the Delaware County Prosecutor’s Office.

    A criminal complaint merely contains allegations, and defendants are presumed innocent unless proven guilty in a court of law.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Former Arkansas Sheriff’s Deputies Sentenced for Federal Civil Rights Violations for Violently Assaulting Subdued Man

    Source: United States Attorneys General

    Two former Crawford County, Arkansas, sheriff’s deputies were sentenced for using unlawful force on a man they arrested. Levi White, 34, was sentenced yesterday to 63 months in prison, and Zackary King, 28, was sentenced today to 12 months in prison.

    Each defendant pleaded guilty to one count of deprivation of rights under color of law for a retaliatory assault on R.W., a 26-year-old man. On Aug. 21, 2022, White, King and a third officer approached R.W. in a gas station parking lot during their investigation into a person threatening a store attendant. R.W. lunged at White and tackled him, then all three officers quickly subdued R.W. and pinned him to the ground. After R.W. was pinned to the ground and no longer fighting the officers, White punched R.W. at least nine times in the head, then lifted R.W.’s head and slammed it into the pavement. King kicked R.W. in the back and struck R.W. once in the midsection with his fist. Following the announcement of a federal investigation into the assault, White obstructed the investigation by wiping all data from his county-issued cell phone and selectively deleting text messages about the incident from his personal phone. White asked King if King was also going to wipe his cell phone, but King declined to do so.

    “Punching a man in the head, slamming their head repeatedly on the concrete pavement, kicking them in the back and striking them in the midsection — this kind of gratuitous and unjustified violence at the hands of law enforcement runs contrary to the oath that officers take in our country to protect and serve,” said Assistant Attorney General Kristen Clarke of the Justice Department’s Civil Rights Division. “The defendants swore an oath to uphold the law, then violated that oath and abused their power as law enforcement officers by assaulting a person in their custody. At the time of the assaults, three officers had already subdued the victim, and further force was unnecessary and unlawful. White added fuel to the fire by taking steps to obstruct the investigation into the violent assault. The Justice Department will continue to vigorously prosecute officers who abuse their authority and violate the rights of people in their custody.”

    “Levi White and Zackary King’s sentencings prove that no law enforcement officer is above the law,” said Special Agent in Charge Alicia D. Corder of the FBI Little Rock Field Office. “FBI Little Rock, alongside our trusted partners at Arkansas State Police, will continue to investigate potential abuses of power and civil rights violations throughout our state. We encourage anyone who has information about abusive or corrupt law enforcement to contact the FBI’s ArkTrust Task Force immediately.”

    The FBI Little Rock Field Office and Arkansas State Police investigated the case.

    Assistant U.S. Attorneys Dustin Roberts and Devon Still for the Western District of Arkansas and Special Litigation Counsel Michael J. Songer and Trial Attorneys Lia Rettammel and Anna Gotfryd of the Justice Department’s Civil Rights Division prosecuted this case.

    MIL Security OSI