Category: Security Intelligence

  • MIL-OSI Security: IAEA-Supported Laboratory Opens to Fight Microplastics in Galapagos Islands

    Source: International Atomic Energy Agency – IAEA

    The Galapagos Islands where the Oceanography and Microplastics Laboratory, supported by the IAEA, was established to monitor and analyse microplastic pollution.

    A new laboratory supported by the International Atomic Energy Agency (IAEA) was officially inaugurated this month in the Galapagos Islands to address the growing threat of marine microplastic pollution.

    The Oceanography and Microplastics Laboratory was established by the government in Ecuador, with support from the IAEA, to monitor and analyse microplastic pollution in the Galapagos Islands. Designated a UNESCO World Heritage Site, the Galapagos Islands are renowned for their extraordinary biodiversity and unique evolutionary adaptations, shaped by their remote location some 1000 kilometres west of mainland Ecuador.

    While a robust monitoring and cleanup programme is in place to tackle the estimated six tonnes of plastic waste that wash ashore on the islands each year, microplastics — plastic particles smaller than five millimetres — pose a more complex challenge for the Galapagos National Park, a protected area encompassing 97% of the islands.

    Nuclear-derived techniques can help detect and analyse microplastic particles too small for traditional monitoring. The laboratory is now analysing water samples and will be able to analyse sediment, and biota samples from the islands at a microscopic scale to identify the types of polymers and improve the understanding of how they disperse in the marine environment where they can endanger marine life.

    In a video address at the opening ceremony for the laboratory on 17 July, IAEA Director General Rafael Mariano Grossi said the laboratory — situated on the Santa Cruz Island — will be an active partner in environmental monitoring and reporting of microplastic pollution for Ecuador, including the Galapagos Islands.

    “The laboratory offers new opportunities to conduct studies on the environmental impact on the vulnerable and relevant biodiversity of the Islands, helping authorities to take and implement more precise control measures aimed at the protection and conservation of the Galapagos National Park,” he added.

    The new laboratory marks a significant milestone in the IAEA’s NUTEC Plastics initiative, which has supported countries since its launch in 2020 in researching microplastics and applying nuclear techniques to enhance recycling processes. The support to the Galapagos Islands follows the IAEA’s work in Antarctica — another valuable ecosystem — with the launch of microplastics research there in 2024.

    The data generated in the new laboratory will enable local and national authorities to more accurately assess plastic pollution levels and design targeted strategies to mitigate their impact. The information will also feed into the IAEA’s coordinated efforts under the IAEA Marine Environment Laboratories in Monaco to build a global network of laboratories with analytical capacities to monitor and mitigate marine microplastic pollution.

    The IAEA, through its technical cooperation programme, has also strengthened monitoring and analytical capacities in institutions such as the Galapagos National Park and the Escuela Superior Politécnica del Litoral (ESPOL) in Guayaquil, to address the growing threat of marine pollution from microplastics in the Galapagos Islands. The IAEA has allocated nearly €1 million to provide the new laboratory with equipment and training for monitoring marine stressors such as ocean acidification, eutrophication, and microplastic pollution — all of which threaten the region’s unique biodiversity and ecosystems.

    MIL Security OSI

  • MIL-OSI Security: Illicit firearms: Operation Trigger IX nets 14,260 arrests across Latin America

    Source: Interpol (news and events)

    18 April 2023

    Drugs worth USD 5.7 billion also seized in INTERPOL-led operation targeting key trafficking routes and organized crime groups

    LYON, France – In the biggest firearms operation ever coordinated by INTERPOL, authorities in Central and South America have made 14,260 arrests and seized some 8,263 illicit firearms, as well as 305,000 rounds of ammunition.

    With illicit firearms used by criminals to commit armed robberies and murder, they are also closely associated with the proliferation of a wide range of other crimes using the same trafficking routes.

    The links between illicit firearms and drug manufacturing and trafficking were thrown into sharp relief, with the seizure of 203 tonnes of cocaine and other drugs together worth some USD 5.7 billion, and 372 tonnes of drug precursors during Operation Trigger IX (12 March – 2 April).

    Law enforcement across INTERPOL’s 195 member countries have reported record drug seizures in the past year and, in many cases, a spike in drug-related violence, fueled by the traffic of illegal firearms.

    The operation, which saw an unprecedented level of cooperation across 15 countries, also identified a range of other crimes such as corruption, fraud, human trafficking, environmental crime and terrorist activities.

    Colombian authorities arrested the subject of an INTERPOL Red Notice

    Arrests in Honduras – Operation Trigger IX

    Firearms are closely associated with the proliferation of a wide range of other crimes.

    Border checks – Operation Trigger IX

    Operational hub – Operation Trigger IX

    Marine patrols – Operation Trigger IX

    Operation Trigger IX led to the disruption of 20 organized criminal groups

    Drug seizure – El Salvador

    A woman attempting to smuggle pistols and chargers between Paraguay and Brazil.

    Seizure by Chile – Operation Trigger IX

    Vehicle checks – Operation Trigger IX

    Uruguay saw its largest-ever seizure of ammunition.

    Operational highlights

    INTERPOL gathered firearms experts from participating countries at an operational hub in Foz do Iguaçu in the tri-border area of Argentina, Brazil, and Paraguay, to support frontline actions and ensure the swift exchange and cross-checking of intelligence.

    On the ground, coordinated actions led to the disruption of 20 organized criminal groups, including the arrest of members of Primeiro Comando da Capital, Mara Salvatrucha and the Balkans Cartel, all involved in firearms trafficking.

    In Uruguay, 100,000 pieces of ammunition trafficked internationally by two European nationals were seized by authorities, marking the country’s largest-ever such seizure.

    Authorities in Brazil and Paraguay shut down several firearms dealerships following the identification of irregular transfers and unlicensed sales.

    Other operational results include:

    • 11 victims were rescued in Paraguay, when authorities dismantled a human trafficking ring.
    • In cooperation with Venezuela, police in Colombia arrested a Venezuelan national subject to an INTERPOL Red Notice for terrorism and arms trafficking.
    • A 32 year old woman was arrested at the land border between Paraguay and Brazil with eight pistols and 16 chargers taped to her body.

    Looking ahead, some 30 investigations were opened as a result of actions on the ground, and authorities identified 15 new modus operandi for the illicit manufacturing, trafficking and concealment of firearms, with INTERPOL’s Purple Notice leveraged to help alert member countries.

    Officers perform real-time checks against INTERPOL’s databases during Operation Trigger IX.

    Operational hub – Brazil

    Border checks between Argentina and Brazil

    Seizure by Honduras – Operation Trigger IX

    Police checks by Argentina – Operation Trigger IX

    Authorities shut down several firearms dealerships in Brazil and Paraguay

    Authorities had immediate access to the INTERPOL Ballistic Information Network

    Arrest in Paraguay – Operation Trigger IX

    El Salvador firearms dealership checks – El Salvador

    INTERPOL’s global reach

    “The fact that an operation targeting illicit firearms resulted in such massive drugs seizures is further proof, if needed, that these crimes are intertwined,” said INTERPOL Secretary General Jürgen Stock.

    “The results, coming just weeks after our Americas Regional Conference was highlighting the need for greater information sharing on these linked organized crime activities, also demonstrate the unique value of INTERPOL in supporting efforts in the field.  

    “The organized crime networks behind all of these illicit activities have only one priority, which is profit. We, as law enforcement, must be equally determined to dismantle them across every region and globally,” concluded Secretary General Stock.

    Valdecy Urquiza, INTERPOL’s Vice-President for the Americas, highlighted the value of joint initiatives such as Trigger IX in prioritizing national and regional efforts against illicit flows. “Intelligence-led investigations and operations enable police to cooperate internationally and remove illicit firearms from circulation to protect the public,” said Mr Urquiza.

    INTERPOL global tools used by investigators during the operation include the Illicit Arms Records and Tracing Management System (iARMS), the only global database of illicit firearms, including stolen, lost and trafficked/smuggled firearms.

    Authorities also had immediate access to the INTERPOL Ballistic Information Network (IBIN), enabling law enforcement officials to compare images of ballistic fingerprints from fired casings and projectiles to establish links between crimes worldwide.

    Tracing the history and ownership of recovered firearms provides crucial investigative leads. Every firearm is unique and can be identified by its serial number, make, model and calibre as well as by its ballistic ‘fingerprint’. Comparing ballistics evidence of recovered cartridge casings and ammunition is therefore crucial to investigations.

    During the operation, INTERPOL’s Firearms Programme was supported by INTERPOL’s Regional Bureaus in Argentina and El Salvador, its Drugs and Fugitives units, and its Command and Coordination Centre.

    More than 100 national law enforcement agencies were involved in the operation, including the collaboration of US Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) and Homeland Security Investigations (HSI), which supported participating countries.

    Participating countries: Argentina, Bolivia, Brazil, Chile, Colombia, Costa Rica, Ecuador, El Salvador, Guatemala, Honduras, Mexico, Panama, Paraguay, Peru, Uruguay.

    Operation Trigger IX was funded by the European Union and carried out under the framework of Project Disrupt.

    MIL Security OSI

  • MIL-OSI Security: Greater strategic alignment key to facing Europe’s crime threats

    Source: Interpol (news and events)

    Police leaders throughout the region look to strengthen cooperation against terrorism, illicit trafficking and other crimes

    OHRID, North Macedonia – Three days of discussions between senior police officers from 53 countries in Europe and the wider INTERPOL membership have led to a call for greater coordination to effectively combat the region’s most pressing security threats.

    INTERPOL’s 50th European Regional Conference saw delegates adopt recommendations to more closely align international efforts in a range of strategic areas, including counterterrorism, illicit trafficking and the sharing of police data.

    The meeting took place as Europe faces a historic peak in the production of illegal narcotics, which has strengthened organized crime groups and led to an accompanying rise in violent crime across the region.

    “The globalized nature of crime means that our respective borders are only as strong as our weakest links,” said Stephen Kavanagh, INTERPOL Executive Director of Police Services.

    “The data contributed to INTERPOL is a contribution not just to national or regional security, but to global security,” Mr Kavanagh added.

    No alternative

    A panel featuring leaders from European Union law enforcement bodies Europol and Frontex focused on the need for greater alignment between INTERPOL and regional policing bodies, to build a global model for a police data-sharing architecture and ensure Global Policing Goals are aligned with the United Nations Sustainable Development Goals.

    “The most important part of international police cooperation is information exchange,” said Peter De Buysscher, INTERPOL Vice President for Europe, who chaired the conference. “We need a global data-sharing framework. There is no alternative.”

    The volume of data in policing has increased dramatically in recent years, opening up new investigative opportunities but also posing data management challenges. At the international level, there is a crucial need to minimize duplication and increase alignment so that investigators or frontline officers have access to the right information when they need it.

    Joint initiatives such as FIELDS, which brings together capabilities from INTERPOL and Frontex into a unified system that helps border officials spot fraudulent travel and identity documents, was highlighted as a concrete example of successful alignment.

    What drug traffickers fear

    European police leaders also discussed the rapidly evolving state of play with regards to drug trafficking and the organized crime groups behind the illicit trade.

    The adaptability of networks was identified as a key challenge to enforcement, with groups often working across national and regional lines to secure ever-greater profits. To effectively combat such networks, police must be just as adaptive and even more collaborative.

    Recent successes in INTERPOL initiatives such as the I-CAN project targeting the ‘Ndrangheta mafia group, closely involved in bringing cocaine from Latin America into Europe, were highlighted as examples of innovative international police cooperation.

    Launched in 2020, I-CAN has already produced results that have “exceeded expectations”, according to  one conference speaker, with more than 40 high-profile arrests and tens of thousands of pieces of intelligence exchanged.

    “This is what drug traffickers fear,” said one closing speaker. “All of us in the same room, working together, exchanging information and breaking down walls.”

    MIL Security OSI

  • MIL-OSI Security: Europe: Drug trafficking, organized crime increasing by “an order of magnitude”

    Source: Interpol (news and events)

    8 May 2023

    At INTERPOL’s 50th European Regional Conference, delegates have gathered to discuss common crime threats from drug trafficking to cybercrime.

    OHRID, North Macedonia – Strengthening international police cooperation to counter the rapidly escalating threat posed by organized crime networks was the key focus of INTERPOL’s 50th European Regional Conference.

    The three-day (8-10 May) conference brings together more than 140 participants from 53 countries in Europe and beyond to discuss the most pressing crime issues facing the region.

    The conference takes place in Ohrid, North Macedonia, which itself marks 30 years as an INTERPOL member country this year.

    “These past 30 years, through our membership in the world’s largest police organization, have witnessed our commitment and willingness to be engaged in global police cooperation,” said Oliver Spasovski, Minister of Interior of the Republic of North Macedonia, in remarks during the conference’s opening ceremony.

    “With the establishment of the global INTERPOL I-24/7 communication system, our country was among the first to connect with this global police family, to exchange information between members and the General Secretariat, as well as directly access global criminal databases,” the Minister added.

    Unprecedented scale

    Fueled by historic levels of drug trafficking, organized crime groups are increasingly posing a direct threat to state authority in many countries, and there is evidence that levels of violence related to these criminal networks is also increasing.

    “Organized crime is a top concern,” said INTERPOL President Ahmed Naser al-Raisi in the conference’s opening ceremony. “These transnational crimes not only threaten the safety and security of the region, but also have a spillover effect on the rest of the world.”

    Last month, INTERPOL announced its largest ever firearms trafficking operations, which saw more than 14,000 suspects arrested across Central and South America, and an unprecedented USD 5.7 billion in illegal narcotics seized.

    “Over the last five years, [drug] trafficking and consumption have increased by an order of magnitude, with Europe one of the main transit and destination markets,” said INTERPOL Secretary General Jürgen Stock.

    “We continue to see record seizures at European borders and ports, and a corresponding rise in violent crime, corruption and money laundering of unprecedented scale,” added Secretary General Stock.

    The global scale of many organized crime networks, often spanning multiple continents, has underlined that international cooperation through INTERPOL is often the only means for police in Europe and other regions to bring fugitives to justice or gather crucial intelligence.

    European crime landscape

    Beyond drug trafficking, the results of INTERPOL’s 2022 Global Crime Trend report, which surveyed police across the Organization’s 195-country membership, show that money laundering and cyber or cyber-enabled crimes also top European law enforcement’s list of concerns.

    Money laundering ranked second among the crime trends most frequently indicated by member countries in the region as posing a ‘high’ or ‘very high’ threat, with financial fraud also ranking very high.

    The report notes that the use of online tools by criminals to perpetrate financial fraud schemes has also rapidly expanded in recent years, particularly since the COVID-19 pandemic.

    Especially concerning, 76 per cent of police respondents from Europe expect online child sexual exploitation and abuse to increase or increase significantly in the next three to five years.

    The report notes that the demand for livestreaming abuse has steadily increased in recent years, likely intensifying during the pandemic. While live distance child abuse most often take place in Southeast Asia, cases in the European Union have also recently been detected.

    Keeping Europe safe

    Founded in the heart of Europe – in Vienna – during the region’s interwar period 100 years ago, INTERPOL’s history is closely intertwined with that of Europe.

    Established in a 1920s context of geopolitical upheaval and concerns of rising international crime, the Organization’s founding representatives agreed that only through collaboration could police combat transnational crime threats – a common goal shared throughout periods of political or economic tension.

    Later, in one of the Organization’s darkest chapters, the Nazis assumed control of the International Criminal Police Commission – as INTERPOL was then called – after deposing its President. In 1946, Belgium spearheaded INTERPOL’s rebuilding in the new postwar era.

    Today, European member countries remain global leaders in their use of and contribution to INTERPOL capabilities – and this activity is quickly growing. With regards to INTERPOL databases, European member countries contribute more records, undertake more searches and – crucially – receive more hits than any other region.

    New historical peaks for records, searches and hits in INTERPOL databases from European member countries were reached in 2022. In the past year alone, searches of INTERPOL databases by European law enforcement have risen by nearly a third.

    The figures underscore the fundamental place INTERPOL capabilities occupy in European countries’ approaches to keeping their communities safe.

    MIL Security OSI

  • MIL-OSI Security: Ohio Fugitive Wanted for Rape of a Juvenile Arrested in Massachusetts

    Source: US Marshals Service

    Boston, MA – The U.S. Marshals Service (USMS), District of Massachusetts Fugitive Task Force (MAFTF) announces the arrest of Webster Portalatin-Castro, 37, who was wanted for rape of a person under the age of 18. The warrant was issued on June 3, 2025, from the Cleveland Municipal Court in Cleveland, OH.

    On Thursday, July 31st, 2025, Portalatin-Castro was arrested in Lawrence, MA for a warrant for rape of a juvenile. The Cleveland Police Department in Ohio requested the assistance of the USMS Northern Ohio Violent Fugitive Task Force (NOVFTF) with locating Portalatin-Castro.

    The NOVFTF and the Cleveland Police Department worked collaboratively and provided investigative information to the MAFTF, as Castro was believed to be in Massachusetts. The MAFTF along with significant assistance from the MA State Police Violent Fugitive Apprehension Section (VFAS), Lawrence PD, Lowell PD, and the Middlesex County Sheriff’s Office tracked down Portalatin-Castro to Lawrence, MA, where he was placed under arrest.

    Castro is being charged as a Fugitive from Justice and will be arraigned in Massachusetts pending his extradition back to Ohio.

    Portalatin-Castro is unlawfully present in the United States and according to ICE, he entered the country illegally in 2023.

    If you have any information regarding the whereabouts of any state or federal fugitive please contact the United States Marshals Service, contact the USMS at 1-877-WANTED2 or submit information via the USMS Tips App.

    MAFTF participants include the USMS District of MA, MA State Police, Boston Police, Brockton Police, Cambridge Police, Hampden County Sheriff’s Department, Haverhill Police, Lowell Police, Middlesex Sheriff’s Department, New Bedford Police, Plymouth County Sheriff’s Department, Springfield Police, Worcester Police, West Springfield Police, Suffolk County Sheriff’s Department, Randolph Police, Quincy Police and the Bureau of Alcohol, Tobacco, Firearms & Explosives.

    MIL Security OSI

  • MIL-OSI Security: Cleveland Fugitive, Illegal Alien, Wanted for Rape of a Minor Arrested in Boston

    Source: US Marshals Service

    Boston, MA – Earlier this morning, the U.S. Marshals Service (USMS), District of Massachusetts Fugitive Task Force (MAFTF) arrested Webster Portalatin-Castro, 37, who was wanted for rape of a person under the age of 18. 

    The warrant was issued on June 3, 2025, from the Cleveland Municipal Court in Cleveland, OH. During the investigation into his whereabouts members of the Northern Ohio Violent Fugitive Task Force (NOVFTF) gathered information that Portalatin-Castro may have fled the Cleveland area and was possibly hiding near Boston, Massachusetts.

    Early this morning, The MAFTF along with significant assistance from the MA State Police Violent Fugitive Apprehension Section (VFAS), Lawrence PD, Lowell PD, and the Middlesex County Sheriff’s Office tracked Portalatin-Castro to an address in the 700 block of Haverhill St. in Lawrence, MA, where he was placed under arrest.  Lawrence is approximately 30 miles north of Boston. 

    Castro is being charged as a fugitive from justice and will be arraigned in Massachusetts pending his extradition back to Ohio. Additionally, Portalatin-Castro is unlawfully present in the United States and according to ICE, he entered the country illegally in 2023.  

    U.S. Marshal Pete Elliott stated, “The U.S. Marshals Service will track down violent sexual predators such as this whether they are in the city of Cleveland or have fled across the country.  There is nowhere for them to hide when the Marshals are looking for them.”

    Anyone with information concerning a wanted fugitive can contact the Northern Ohio Violent Fugitive Task Force at 1-866-4WANTED (1-866-492-6833), or you can submit a web tip. Reward money is available, and tipsters may remain anonymous.  Follow the U.S. Marshals on Twitter @USMSCleveland.

    The Northern Ohio Violent Fugitive Task Force – Cleveland Division is composed of the following federal, state and local agencies:  U.S. Marshals Service, Cleveland Police Department, Cuyahoga County Sheriff’s Office, Cuyahoga Metropolitan Housing Authority Police Department, Euclid Police Department, Ohio Adult Parole Authority, Ohio State Highway Patrol, Independence Police Department, Parma Police Department, Aurora Police Department, Solon Police Department, Cleveland RTA Police Department, Westlake Police Department, Bedford Police Department, Middleburg Heights Police Department, Newburgh Heights Police Department and the Metrohealth Police Department. 

    MIL Security OSI

  • MIL-OSI Security: President Trump Ends Unfair “De Minimis” Tariff Exemption, A Major Victory in Securing the Homeland

    Source: US Department of Homeland Security

    President Trump’s Executive Order empowers DHS to continue cracking down on smuggling and unfair trade practices

    WASHINGTON – President Trump signed an Executive Order suspending duty-free de minimis tariff exemptions for low-value shipments from all countries. His order empowers Homeland Security Secretary Kristi Noem to close this loophole which was used to avoid tariffs and smuggle deadly synthetic opioids like fentanyl into the United States.

    “For decades, bad actors have taken advantage of America’s de minimis process by smuggling in deadly narcotics, harmful products, and other contraband in hidden products,” said Department of Homeland Security Assistant Secretary Tricia McLaughlin. “This loophole led to the death of thousands of Americans, fueled the opioid crisis, and harmed U.S. consumers. This decision to end de minimis will save American lives, increase revenue, and protect the American consumer and entrepreneur.”

    Under the de minimis treatment, imported goods that are valued at or under $800 were exempt from tariff duties. Countries exploited this system to flood the American market with cheap goods that undercut American manufacturers and cost American jobs. This exemption also allowed drug cartels and other criminal organizations to smuggle drugs and other contraband into our country.

    Over the past decade the volume of de minimis shipments to the United States exploded, growing from 134 million shipments in 2015 to over 1.36 billion shipments in 2024. De minimis shipments accounted for 90% of all cargo seizures in FY 24. These shipments often broke the law with 98% of narcotics seized from cargo falling under the de minimis exemption, as well as 97% of counterfeit items seized.

    Now, thanks to President Trump’s Executive Order, this loophole is closed. U.S. Customs and Border Protection is empowered to enforce tariffs on these goods and can continue to protect the homeland from the smuggling of deadly synthetic opioids like fentanyl and counterfeit goods. This will save American lives, protect American jobs, and restore billions in lost revenue.

    # # #

    MIL Security OSI

  • MIL-OSI Security: Hays man sentenced to 4 years in prison on gun charges

    Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

    BILLINGS – A Hays man who possessed illegal firearms was sentenced today to 48 months in prison to be followed by 3 years of supervised release, U.S. Attorney Kurt Alme said.

    Wylon Alfred Plainfeather, 54, pleaded guilty in March 2025 to one count of possession of an unregistered firearm and one count of possession of an unregistered silencer.

    U.S. District Judge Susan P. Watters presided.

    The government alleged in court documents that on December 27, 2022, law enforcement officers responded to a Billings residence to search for a probationer. The probationer was not present, but officers searched the house and found three firearms in the basement.

    As law enforcement was preparing to leave the residence following the search, Plainfeather pulled into the driveway. He admitted owning all three guns and acknowledged one was a sawed-off shotgun and another, a .22 caliber rifle, had a tube on it. Plainfeather said he fired the gun with the tube and claimed it was not very effective at making it quieter. He said he got all the firearms from the reservation and that he traded for them. Law enforcement officers confirmed the firearms were in operable condition but not registered to Plainfeather (or anyone else) in the National Firearms Registration and Transfer Record (NFRTR).

    Assistant U.S. Attorney Kelsey Hendricks prosecuted the case. The investigation was conducted by the ATF, Montana Division of Criminal Investigation, and Montana Probation and Parole.

    This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations (TCOs), and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces (OCDETFs) and Project Safe Neighborhood (PSN).

    XXX

    MIL Security OSI

  • MIL-OSI Security: D.C. Guard Tests Skills With Jamaican, Barbadian Forces

    Source: United States SOUTHERN COMMAND

    Soldiers from the District of Columbia National Guard; Jamaica Defence Force, or JDF; Jamaica National Reserve; and Barbados Defence Force Reserves recently participated in the Caribbean Regional Training Camp 2025, a joint exercise aimed at bolstering regional security, enhancing disaster response capabilities and strengthening interoperability among the participating nations.

    MIL Security OSI

  • MIL-OSI Security: U.S. Marshals Arrest Fugitive Charged with Killing 3 During 2024 Block Party

    Source: US Marshals Service

    Philadelphia, PA – Members of the U.S. Marshals Eastern Pennsylvania Violent Crimes Fugitive Task Force arrested Amir Jones, 32, in the 4900 block of Kershaw Street in Philadelphia. Jones was wanted by the Philadelphia Police Department for 3 counts of homicide in relation to a July 21, 2024, mass shooting in the 1200 block of N. Alden Street. Three people were killed and six injured during a gun battle between two group of males that occurred during a neighborhood block party. On July 23rd, a warrant was issued for Amir Jones, and the case was delegated to the Marshal’s Fugitive Task Force. 

    At 6:00 a.m., investigators from the Marshals Fugitive Task Force in Philadelphia executed a search warrant at an apartment in the 4900 block of Kershaw Street where investigators believed Jones was hiding. Jones initially refused to comply with commands but after 30 minutes of negotiating, Jones surrendered without incident. 

    “High profile shootings will always garner U.S. Marshals Service attention. Be assured, our relentless pursuit of those involved never ceases until the perpetrators of these crimes are captured” said Eric Gartner, United States Marshal for the Eastern District of Pennsylvania.

    The Eastern Pennsylvania Violent Crimes Fugitive Task Force is a team of law enforcement officers led by U.S. Marshals in Philadelphia and the surrounding counties. The task force’s objective is to seek out and arrest violent crime fugitives. Membership agencies include the Philadelphia Police Department, Pennsylvania State Parole Officers, Pennsylvania State Police, Pennsylvania Attorney General Agents, Immigration Customs Enforcement, Chester Police Department, Bucks County Sheriff’s Office, and Delaware County Sheriff’s Office.

    MIL Security OSI

  • MIL-OSI Security: CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization

    Source: US Department of Homeland Security

    Summary

    The Cybersecurity and Infrastructure Security Agency (CISA) and U.S. Coast Guard (USCG) are issuing this Cybersecurity Advisory to present findings from a recent CISA and USCG hunt engagement. The purpose of this advisory is to highlight identified cybersecurity issues, thereby informing security defenders in other organizations of potential similar issues and encouraging them to take proactive measures to enhance their cybersecurity posture. This advisory has been coordinated with the organization involved in the hunt engagement.

    In 2024, CISA led a proactive hunt engagement at a U.S. critical infrastructure organization with the support of USCG analysts. During hunts, CISA proactively searches for evidence of malicious activity or malicious cyber actor presence on customer networks. The organization invited CISA to conduct a proactive hunt to determine if an actor had been present in the organization’s environment. (Note: Henceforth, unless otherwise defined, “CISA” is used in this advisory to refer to the hunt team as an umbrella for both CISA and USCG analysts).

    During this engagement, CISA did not identify evidence of malicious cyber activity or actor presence on the organization’s network, but did identify cybersecurity risks, including:

    • Insufficient logging;
    • Insecurely stored credentials;
    • Shared local administrator (admin) credentials across many workstations;
    • Unrestricted remote access for local admin accounts;
    • Insufficient network segmentation configuration between IT and operational technology (OT) assets; and
    • Several device misconfigurations.

    In coordination with the organization where the hunt was conducted, CISA and USCG are sharing cybersecurity risk findings and associated mitigations to assist other critical infrastructure organizations with improving their cybersecurity posture. Recommendations are listed for each of CISA’s findings, as well as general practices to strengthen cybersecurity for OT environments. These mitigations align with CISA and the National Institute for Standards and Technology’s (NIST) Cross-Sector Cybersecurity Performance Goals (CPGs), and with mitigations provided in the USCG Cyber Command’s (CGCYBER) 2024 Cyber Trends and Insights in the Marine Environment (CTIME) Report.

    Although no malicious activity was identified during this engagement, critical infrastructure organizations are advised to review and implement the mitigations listed in this advisory to prevent potential compromises and better protect our national infrastructure. These mitigations include the following (listed in order of importance):

    • Do not store passwords or credentials in plaintext. Instead, use secure password and credential management solutions such as encrypted password vaults, managed service accounts, or built-in secure features of deployment tools.
      • Ensure that all credentials are encrypted both at rest and in transit. Implement strict access controls and regular audits to securely manage scripts or tools accessing credentials.
      • Use code reviews and automated scanning tools to detect and eliminate any instances of plaintext credentials on hosts or workstations.
      • Enforce the principle of least privilege, only granting users and processes the access necessary to perform their functions.
    • Avoid sharing local administrator account credentials. Instead, provision unique, complex passwords for each account using tools like Microsoft’s Local Administrator Password Solution (LAPS) that automate password management and rotation.
    • Enforce multifactor authentication (MFA) for all administrative access, including local and domain accounts, and for remote access methods such as Remote Desktop Protocol (RDP) and virtual private network (VPN) connections.
    • Implement and enforce strict policies to only use hardened bastion hosts isolated from IT networks equipped with phishing-resistant MFA to access industrial control systems (ICS)/OT networks, and ensure regular workstations (i.e., workstations used for accessing IT networks and applications) cannot be used to access ICS/OT networks.
    • Implement comprehensive (i.e., large coverage) and detailed logging across all systems, including workstations, servers, network devices, and security appliances.
      • Ensure logs capture information such as authentication attempts, command-line executions with arguments, and network connections.
      • Retain logs for an appropriate period to enable thorough historical analysis (adhering to organizational policies and compliance requirements) and aggregate logs in an out-of-band, centralized location, such as a security information event management (SIEM) tool, to protect them from tampering and facilitate efficient analysis.

    For more detailed mitigations addressing the identified cybersecurity risks, see the Mitigations section of this advisory.

    Technical Details

    Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See Appendix: MITRE ATT&CK Tactics and Techniques for a table of potential activity mapped to MITRE ATT&CK tactics and techniques.

    Overview

    Cybersecurity and Infrastructure Security Agency (CISA) and United States Coast Guard (USCG) analysts (collectively referred to as CISA in this report) conducted a threat hunt engagement at a critical infrastructure organization in 2024. During this hunt, CISA proactively searched for evidence of malicious activity or the presence of a malicious cyber actor on the customer’s network using host, network, industrial control system (ICS), and commercial cloud and open-source analysis tools. CISA searched for evidence of activity by looking for specific exploitation tactics, techniques, and procedures (TTPs) and associated artifacts.

    While CISA did not find evidence of threat actor presence on the organization’s network, the team did identify several cybersecurity risks. These findings are listed below in order of risk. Technical details of each identified cyber risk are included, along with the potential impact from threat actor exploitation of each risk (recommendations for mitigating each risk are listed in the Mitigations section below).

    Several of these findings align with those observed during similar engagements conducted by US Coast Guard Cyber Command (CGCYBER), which are documented in their 2024 Cyber Trends and Insights in the Marine Environment (CTIME) report. The authoring agencies encourage critical infrastructure organizations to review the CTIME report to understand trends in the techniques/attack paths threat actors are using to compromise at-risk organizations, and what mitigations organizations should implement to prevent a successful attack.

    Key Findings

    Shared Local Admin Accounts with Non-Unique Passwords Stored as Plaintext

    Details: CISA identified a few local admin accounts with non-unique passwords; these accounts were shared across many hosts. The credentials for each account were stored plaintext in batch scripts. CISA discovered these authorized scripts were configured to create user accounts with local admin privileges and then set identical, non-expiring passwords—these passwords were stored in plaintext in the script. One script was configured to create an admin account (set with a password stored in the script in plaintext) and automatically add to the admin group. The account was set as the local admin account on many other hosts.

    Potential Impact: The storage of local admin credentials in plaintext scripts across numerous hosts increases the risk of widespread unauthorized access, and the usage of non-unique passwords facilitates lateral movement throughout the network. Malicious actors with access to workstations with either of these batch scripts could obtain the passwords for these local admin accounts by searching the filesystem for strings like net user /add, identifying scripts containing usernames and passwords [T1552.001], and accessing these accounts to move laterally.

    For example, during a controlled security validation exercise (with explicit permission from the customer), CISA used the credentials found in one of the scripts to log into its associated admin account locally on a workstation [T1078.003], and then establish a Remote Desktop Protocol (RDP) connection to another workstation [T1021.001]. This demonstrated that the credentials allowed local login to an admin account and enabled lateral movement to any workstation with the account. While using this account, the user had local admin privileges on many workstations. Upon initiating the RDP session, the system issued out a notification that another user was currently logged in and that continuing the session would disconnect the existing user, confirming that the account can be accessed remotely via RDP.

    The uniform use of local admin accounts with identical, non-expiring passwords across numerous hosts, coupled with the storage of these credentials in plaintext within accessible scripts, elevates the risk of unauthorized access and lateral movement throughout the network.

    With local admin access, malicious cyber actors can:

    • Modify existing accounts or create new accounts [T1098], potentially escalating privileges or maintaining persistent access.
    • Install malicious browser extensions on compromised systems [T1112].
    • Communicate with compromised systems using standard application layer protocols [T1071], which may bypass certain security monitoring tools.
    • Modify local policies to escalate privileges or disable security features [T1484].
    • Alter system configurations or install software that executes at startup [T1547], ensuring continued access and persistence.
    • Hijack the execution flow of applications to inject malicious code [T1574].

    The widespread distribution of plaintext credentials and the use of identical passwords across hosts increases the risk of unauthorized access throughout the network. This vulnerability heightens the potential for attackers to conduct unauthorized activities, which may impact the confidentiality, integrity, and availability of the organization’s assets.

    Note: This finding was associated with workstations only; servers and other devices were not affected.

    Insufficient Network Segmentation Configuration Between IT and Operational Technology Environments

    Details: While assessing interconnectivity between the customer’s IT and operational technology (OT) environments, CISA identified that the OT environment was not properly configured. Specifically, standard user accounts could directly access the supervisory control and data acquisition (SCADA) virtual local area network (VLAN) directly from IT hosts.

    First, CISA determined it was possible to establish a connection via port 21 from a user workstation in the IT network to a system within the SCADA VLAN. The test established that a network path was available, the remote host was reachable, the port was open and listening for connections, and that the port was directly accessible between the IT and SCADA VLANs, with misconfigured network-level restrictions—for example, firewalls or access control lists (ACLs)—blocking the Transmission Control Protocol (TCP) connection on the port. This test was conducted using a standard user account on a regular IT workstation without administrative privileges [T1078].

    Second, CISA discovered that the customer did not have sufficient secured bastion hosts dedicated for accessing SCADA and heating, ventilation, and air conditioning (HVAC) systems. A bastion host­—sometimes referred to as a jump box or jump server—is a specialized, highly secured system (often a server or dedicated workstation) that serves as the sole access point between a network segment (such as an internal IT network) and a protected internal network (like an OT or ICS environment). By inspecting and filtering all inbound and outbound traffic, a bastion host is designed to prevent unauthorized access and lateral movement, ensuring that only authenticated and authorized users can interact with internal systems. Though several hosts were designated as bastion hosts for remote access to SCADA and HVAC systems, they lacked the enhanced security configuration, dedicated monitoring, and specialized scrutiny expected of bastion hosts.

    Potential Impact: Insufficient OT network segmentation configuration, network access control (NAC), and the ability of a non-privileged user within the IT network to use their credentials to access the critical SCADA VLAN [T1078] presents a security and safety risk. Given that SCADA and HVAC systems control physical processes, compromises of these systems can have real-world consequences, including risks to personnel safety, infrastructure integrity, and equipment functionality.

    Malicious actors could further exploit potentially unsecured workstations with access to OT systems, and insufficient network segmentation configuration between IT and OT systems, in the following ways:

    • Use RDP or Secure Shell (SSH) protocols to move laterally from compromised IT workstations to OT systems [T1021.001] [T1021.004].
    • Execute commands and scripts using scripting languages like PowerShell to attack OT systems [T1059].
    • Map network connections to identify paths to OT systems [T1049].
    • Gather information about network configurations to plan attacks on OT systems [T1016].

    By exploiting these weaknesses, attackers can potentially gain unauthorized access to critical OT systems, manipulate physical processes, disrupt operations, and cause harm.

    Insufficient Log Retention and Implementation

    Details: CISA was unable to hunt for every MITRE ATT&CK® procedure in the scoped hunt plan partly because the organization’s event logging system was insufficient for this analysis. For example, Windows event logs from workstations were not being forwarded to the organization’s security information event management (SIEM), verbose command line auditing was not enabled (meaning command line arguments were not being captured in Event ID 4688), logging in the SIEM was not as comprehensive as required for the analysis, and log retention did not allow for a thorough analysis of historical activity.

    Potential Impact: The absence of comprehensive and detailed logs, along with a lack of an established baseline for normal network behavior, prevented CISA from performing thorough behavior and anomaly-based detection. This limitation hindered the ability to hunt for certain TTPs, such as living-off-the-land techniques, the use of valid accounts [T1078], and other TTPs used by sophisticated threat actors. Such techniques often do not produce discrete indicators of compromise or trigger alerts from antivirus software, intrusion detection systems (IDS), or endpoint detection and response (EDR) solutions. Further, the lack of workstation logs in the organization’s SIEM meant CISA could not analyze authentication events to identify anomalous activities, such as unauthorized access using local administrator credentials. This gap exposes networks to undetected lateral movement and unauthorized access.

    Insufficient logging can prevent the detection of malicious activity by hindering investigations, which makes detection of threat actors more challenging and leaves the network susceptible to undetected threats.

    Additional Findings

    Misconfigured sslFlags on a Production Server

    Details: CISA used PowerShell to examine the ApplicationHost.config file[1]—a central configuration file for Internet Information Services (IIS) that governs the behavior of the web server and its applications and websites—on a production IIS server. CISA observed an HTTPS binding configured with sslFlags==“0”, which keeps IIS in its legacy “one-certificate-per-IP” mode. This mode disables modern certificate-management features, and because mutual Transport Layer Security (TLS) (client-certificate authentication) must be enabled separately in “SSL Settings” or by adding , the binding leaves the client-certificate enforcement off by default, allowing any TLS client to complete the handshake anonymously. Moreover, sslFlags does not control protocol or cipher selection, so outdated protocols or weak cipher suites (e.g., SSL 3.0, TLS 1.0/1.1) may still be accepted unless Secure Channel (Schannel)[2] has been explicitly hardened.

    Potential Impact: The misconfigured sslFlags could enable threat actors to attempt an adversary-in-the-middle attack [T1557] to intercept credentials and data transmitted between clients and the IIS server. Malicious actors could also exploit vulnerabilities in older Secure Sockets Layer (SSL)/TLS protocols, as well as weak cipher suites, increasing the risk for protocol downgrade attacks in which an attacker forces the server and client to negotiate the use of weaker encryption standards [T1562.010]. This compromises the confidentiality and integrity of data transmitted over this channel. Furthermore, the absence of client certificate enforcement meant the server did not validate the identity of the connecting clients beyond the basic SSL/TLS handshake. This deficiency exposed the server to risks where unauthorized or malicious clients could impersonate legitimate users, potentially gaining access to sensitive resources without proper verification.

    Misconfigured Structured Query Language Connections on a Production Server

    Details: CISA reviewed machine.config file on a production server and identified that it was configured with a centralized database connection string, LocalSqlServer, for both profile and role providers. This configuration implies that, unless overridden in each application’s web.config files, every ASP.NET site on the server connects to the same Structured Query Language (SQL) Express or aspnetdb database and shares the same credentials context.

    Additionally, CISA identified that the machine.config file set the minRequiredPasswordLength to be less than 15 characters, which is CISA’s recommended password length.

    Potential Impact: Using a centralized database approach increases risk, as a single breach or misconfiguration in this central SQL database server can compromise all applications dependent on the server. This creates a single point of failure and could be exploited by attackers aiming to gain broad access to the system.

    Additionally, setting the minimum password length to any password under 15 characters is more vulnerable to various forms of brute-force attacks, such as password guessing [T1110.001], cracking [T1110.002], spraying [T1110.003], and credential stuffing [T1110.004]. If a threat actor successfully cracked these weak passwords, they could gain unauthorized access to user or application accounts and leverage vulnerabilities within applications to further escalate privileges, potentially leading to unauthorized access to the backend SQL Server databases. This could result in data breaches, data manipulation, or a loss of database integrity.

    Mitigations

    CISA and USCG recommend that critical infrastructure organizations implement the mitigations below to improve their organization’s cybersecurity posture. Recommendations to reduce cyber risk are listed for each of CISA’s findings during this engagement and are ordered starting from the highest to lowest importance for organizations to implement. CISA and USCG also include general practices to strengthen cybersecurity for OT environments that are not tied to specific findings.

    These mitigations align with the Cross-Sector Cybersecurity Performance Goals jointly developed by CISA and the National Institute for Standards and Technology (NIST). The Cybersecurity Performance Goals (CPGs) provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful TTPs. Visit CISA’s CPGs webpage for more information.

    Many of these mitigations also align with recommendations made by CGCYBER in their 2024 CTIME report. The report provides relevant information and lessons learned about cybersecurity risks gathered through operations similar to this threat hunt engagement, and best practices to mitigate these risks. Please see the 2024 CTIME report for additional recommendations for critical infrastructure organizations to implement to harden their environments against malicious activity.

    Implement Unique Credentials and Access Control Measures for Administrator Accounts

    • Provision unique and complex credentials for local administrator accounts [CPG 2.C] on all systems. Do not use shared or identical administrative credentials across systems. Ensure service accounts/machine accounts have passwords unique from all member user accounts.
      • For example, organizations can deploy Microsoft LAPS (see Microsoft Learn’s Windows LAPS Overview for more information) to ensure each machine has a unique, complex local administrator password; passwords are rotated automatically within Microsoft Active Directory, reducing the window of vulnerability; and that password retrieval is limited to authorized personnel only.
    • Require phishing-resistant multifactor authentication (MFA) [CPG 2.H] in addition to unique passwords for all administrative access, including local- and domain-level administrator accounts, RDP sessions, and VPN connections.
    • Use privileged access workstations (PAWs) dedicated solely for administrative tasks and isolate them from the internet and general network to reduce exposure to threats and lateral movement.
      • Harden PAWs by applying CIS Benchmarks: limit software to essential administrative functions, disable unnecessary services and ports, and ensure regular updates and patches.
      • Enforce strict access controls to restrict PAW access to authorized administrators only.
    • Conduct continuous auditing of privileged accounts by regularly collecting and analyzing logs of administrative activities, such as login attempts, command executions, and configuration changes [CPG 2.T].
      • Configure automated alerts for anomalous behaviors, including logins outside standard hours, access from unauthorized locations, and repeated failed logins.
      • Periodically review all administrator accounts to confirm the necessity and appropriateness of access levels; align these auditing practices with NIST SP 800-53 Rev. 5 Controls AU-2 (Auditable Events) and AU-12 (Audit Record Generation).
    • Apply the principle of least privilege by limiting administrative privileges to the minimum required for users to perform their roles [CPG 2.E].
      • Create individual administrative accounts with unique credentials and role-specific permissions and disable or rename built-in local administrator accounts to reduce common attack vectors.
      • Avoid using shared administrator accounts to improve accountability and auditability, and ensure administrators use standard accounts for non-administrative tasks to minimize credential exposure.
      • Implement Role-Based Access Control (RBAC) to assign permissions based on job functions, as aligned with NIST SP 800-53 Rev. 5 Control AC-5 (Separation of Duties).
    • Identify and remove unauthorized or unnecessary local administrator accounts, maintain oversight by documenting and tracking all authorized accounts, and enforce strict account management policies by restricting account creation privileges and implementing approval workflows for new administrator accounts.

    Securely Store and Manage Credentials

    • Purge credentials from the System Center Configuration Manager (SCCM). Review SCCM packages, task sequences, and scripts to ensure that no plaintext credentials are embedded, and update or remove any configurations that deploy scripts with plaintext credentials.
    • Do not store plaintext credentials in scripts. Instead, store credentials in a secure manner, such as with a credential/password manager or vault, or other privileged account management solution [CPG 2.L].
    • Use encrypted communication. If scripts must retrieve credentials at runtime, use encrypted channels and protocols (e.g., TLS 1.3) to communicate with secure credential stores. Ensure that credentials are not written to disk or exposed in logs.
    • Use unique local administrator passwords, such as by deploying Microsoft LAPS. Set appropriate permissions on Active Directory attributes used by LAPS (ms-MCS-AdmPwd and ms-MCS-AdmPwdExpirationTime) per Microsoft’s security recommendations.

    Establish Network Segmentation Between IT and OT Environments

    • Assess the existing network architecture to ensure effective segmentation between the IT and OT networks [CPG 2.F]—this process should evaluate both logical and physical segmentation, ensuring clear boundaries between IT and OT assets.
      • Use NIST SP 800-82 Rev. 3 (Guide to OT Security) and International Electrotechnical Commission (IEC) 62443 standards as guides for network segmentation best practices.
      • Network segmentation is essential for containing breaches within isolated segments and preventing them from spreading across networks. Depending on your environment, consider implementing the following segmentation:
        • Implement VLAN segmentation with inter-VLAN access controls.
        • Create separate VLANs for IT and OT systems, specifically isolating OT components such as SCADA systems from IT network VLANs.
        • Configure inter-VLAN access controls, including Layer 3 ACLs, to restrict traffic between IT and SCADA VLANs.
        • Deploy firewalls with application-layer filtering capabilities to monitor and control data flow between the VLANs, ensuring that only authorized protocols and devices can communicate across segments.
    • Implement a demilitarized zone (DMZ) between IT and OT environments to provide an additional security layer.
      • Position firewalls at both the IT-DMZ and OT-DMZ boundaries to filter traffic and enforce strict communication policies.
      • Configure the DMZ to act as an intermediary, with only essential communications permitted between IT and OT networks.
      • Ensure the DMZ hosts shared services (e.g., bastion hosts, jump servers, or data historians) that require limited interaction with both environments, with access controls and monitoring in place.
    • Consider a full network re-architecture if current segmentation methods cannot effectively separate IT and OT networks.
      • Collaborate with cybersecurity and network experts to design an architecture that meets ICS-specific security requirements—this redesign may involve transitioning to a micro-segmented or zero trust architecture, which includes strict identity verification for all users and devices attempting to access OT assets.[3]
    • Implement unidirectional gateways (data diodes) where appropriate to prevent bidirectional communication.
    • Keep network diagrams, configuration files, and asset inventories up to date.
    • Regularly test segmentation controls to validate their effectiveness in restricting unauthorized access by conducting penetration testing and security assessments.
      • Include simulated breach scenarios to confirm that segmentation contains threats within isolated zones.
      • Ensure compliance with NIST SP 800-53 Rev. 5 Control AC-4 (Information Flow Enforcement) to align segmentation measures with best practices for controlled information flow.

    Prevent Unauthorized Access via Port 21

    • Disable File Transfer Protocol (FTP) services on SCADA devices and servers if they are not required. Replace FTP with secure alternatives, such as SSH FTP (SFTP) or FTP over TLS/SSL (FTPS).
    • Block inbound and outbound FTP traffic on port 21 using firewalls and ACLs.
      • Implement restrictive ACL policies at network boundaries to control FTP access across all network layers.
      • As outlined in CIS Control 9.2 (Limit Unnecessary Ports, Protocols, and Services), close any unused ports to strengthen network defenses.
    • Implement IDS/Intrusion Prevention System (IPS) technologies to monitor traffic between the IT network and SCADA VLAN, use signature and anomaly detection, and integrate IDS/IPS with a SIEM system for centralized monitoring.
    • Enhance authentication and encryption mechanisms. Require MFA for SCADA access, use secure remote access technologies when necessary, securely encrypt communications (using protocols such as TLS 1.2 or higher, preferably TLS 1.3), and establish VPN tunnels to communicate between IT networks and SCADA systems.
    • Perform network traffic filtering and deep packet inspection.
      • Use SCADA-aware firewalls capable of understanding SCADA protocols and inspecting and filtering traffic at the application layer.
      • Only allowlist authorized protocols and command structures to SCADA operations. Use one-way communication devices to prevent data from flowing back into the SCADA network.

    Establish Secure Bastion Hosts for OT Network Access

    • Ensure bastion hosts are dedicated secure access points exclusively used to access the OT network and deployed as exclusive management gateways for all devices within a network.
      • Make bastion hosts the single access points for conducting all administrative tasks, system management, and configuration changes; this centralizes access control and ensures any interaction with the OT system passes through a rigorously monitored and secure environment, minimizing the potential for unauthorized access.
    • Do not allow staff to use bastion hosts as regular workstations.
      • Provide staff with separate workstations for accessing email, internet browsing, etc., on the IT network.
      • Establish and enforce policies that prohibit non-administrative activities on bastion hosts, ensuring they remain dedicated to OT network access.
    • Regularly audit and monitor bastion hosts to maintain security integrity, prevent unauthorized use, and quickly address any vulnerabilities or policy non-compliance.
    • Configure comprehensive logging of all activities on bastion hosts, including authentication attempts, command executions, configuration changes, and file transfers. Aggregate logs into a SIEM.
    • Isolate bastion hosts from the IT network; bastion hosts should reside in a separate security zone with restricted communication pathways (see CISA’s infographic on Layering Network Security Through Segmentation).
      • Deploy bastion hosts in a DMZ, imposing physical and logical isolation from other networks.
      • Configure firewalls between the IT network, bastion hosts, and the OT network, enforcing strict access control policies to allow only necessary traffic.
    • Ensure secure configuration and hardening of bastion hosts: Comply with NIST SP 800-123 and CIS Benchmarks and CNSSI 4009-2015, remove nonessential applications and services to reduce the attack surface, configure system settings to be secure, conduct effective patch management, enforce the principle of least functionality, and disable unused ports and protocols.
    • Implement access control policies: remove any access permissions to the OT network from IT workstations and ensure only bastion hosts have access to the OT network.
      • Implement NAC solutions to enforce policy-driven access control decisions based on device compliance and user authentication to provide dynamic access control and real-time visibility into the devices on the network.
    • Equip each bastion host with robust authentication mechanisms, including phishing resistant MFA [CPG 2.H], to verify the identity of users accessing the network.
      • Align with AAL3 as defined in NIST SP 800-63B. AAL3 requires hardware-based authenticators and proof of possession of cryptographic keys through secure authentication protocols.
    • Implement stringent access controls that restrict access to authorized personnel only using RBAC principles, ensuring that personnel can only access information and perform tasks pertinent to their roles and duties. This reduces the risk of internal threats or lateral movement and prevents unauthorized access.
    • Securely configure remote access tools, including by using secure protocols and disabling remote access tools on IT workstations to the OT network, enforcing that all remote access occurs through bastion hosts.
      • Disable insecure protocols like Telnet and unencrypted VNC to prevent interception and unauthorized access.
      • Log all remote access sessions and monitor for unauthorized or anomalous activities.

    Implement Comprehensive Logging, Log Retention, and Analysis

    • Implement comprehensive and verbose (i.e., detailed) logging across all systems, including workstations, servers, network devices, and security appliances [CPG 2.T].
      • Enable logging of critical events such as authentication attempts, command-line executions with command arguments (Event ID 4688), and network connections.
    • Aggregate logs in an out-of-band, centralized location [CPG 2.U] where adversaries cannot tamper with them, such as a dedicated SIEM, in order to facilitate behavior analytics, anomaly detection, and proactive threat hunting [CPG 2.T, 2.U]. For more information on behavior- and anomaly-based detection techniques, see joint guidance Identifying and Mitigating Living off the Land.
    • Ensure comprehensive logging on bastion hosts for all activities. Capture detailed records of login attempts [CPG 2.G], commands executed (with command arguments enabled), configurations changed, and files transferred.
    • Continuously monitor logs for early detection of anomalous activities. Configure the SIEM to generate automatic alerts for suspicious activity and implement behavior analysis techniques to detect anomalies.
    • Securely store log backups and use tamper resistant storage [CPG 2.U] to prevent a threat actor from altering or purging logs to conceal malicious activity.

    For additional guidance on logging, see joint guidance Best Practices for Event Logging and Threat Detection.

    Securely Configure HTTPS Bindings and LocalSqlServer Connection String

    • Enforce both client certificate verification and secure renegotiation in IIS by configuring the sslFlags setting to “3” in the ApplicationHost.config file. Setting sslFlags=“3” requires clients to present valid X.509 certificates for authentication and implements the TLS Renegotiation Indication Extension (RFC 5746). To implement this, perform the following steps:
      • Locate the element for the HTTPS site within ApplicationHost.config.
      • Set the sslFlags attribute to “3”: .
      • Restart IIS to apply the changes: iisreset.
    • Restrict the server to use only secure and up-to-date SSL/TLS protocols and cipher suites.
      • Disable deprecated protocols like SSL 2.0, SSL 3.0, TLS 1.0, and TLS 1.1 to prevent protocol downgrade attacks that compromise the confidentiality and integrity of data.
    • Override the global settings in machine.config by modifying each application’s web.config file to define its own connection strings and providers. This isolates applications at the database level and allows for tailored security configurations for each application.
    • Create dedicated SQL Server database accounts for each application with permissions limited to necessary operations (e.g., SELECT, INSERT, UPDATE), and avoid granting excessive privileges.
      • Do not assign roles like db_owner or sysadmin to application accounts. This reduces the risk of privilege escalation and enhances accountability through segregated access logs.
    • Use machine.config only for configurations that must be applied globally across all applications on the server.
      • Audit the machine.config file to ensure no application-specific settings are present.

    Enforce Strong Password Policies

    • Implement a system-enforced policy that requires a minimum password length of 15 or more characters for all password-protected IT assets and all OT assets, when technically feasible [CPG 2.B].
      • Consider leveraging passphrases and password managers to make it easier for users to maintain sufficiently long passwords.
    • In instances where minimum password lengths are not technically feasible, apply and record compensating controls, such as rate-limiting login attempts, account lockout thresholds, and strong network segmentation. Prioritize these systems for upgrade or replacement.
    • Implement MFA [CPG 2.H] in addition to strong passwords (i.e., passwords 15 characters or longer).

    Additional Mitigation Recommendations to Strengthen Cybersecurity

    CISA and USCG recommend critical infrastructure organizations implement the following additional mitigations (not tied to specific findings from the engagement) to improve the cybersecurity of their IT and OT environments:

    • Secure RDP from the IT to OT environments by deploying dedicated VPNs for all remote interactions with the OT network. Using RDP without strong authentication practices can lead to credential theft. Additionally, RDP does not inherently segregate or closely monitor user sessions, which can allow a compromised session to affect other parts of the network.
      • Deploy VPNs with strong encryption protocols such as SSL/TLS or Internet Protocol Security (IPsec) [CPG 2.K] to safeguard data integrity and confidentiality; use MFA [CPG 2.H] at all VPN access points to ensure only authorized personnel can gain access.
      • Configure VPN gateways to perform rigorous security checks and manage traffic destined for the OT network, ensuring comprehensive validation of all communications through pre-defined security policies.
        • VPN gateways should function as the primary enforcement points for access controls, scrutinizing every data packet to detect and block unauthorized access attempts.
      • Align the VPN traffic monitoring with the DMZ’s capabilities to regulate and inspect the data flow between IT and OT environments.
      • As part of the broader network architecture review, ensure the VPN infrastructure is correctly segmented from other network resources [CPG 2.F] to prevent any spillover effects from the IT environment to the OT network, containing potential breaches within isolated network zones.
      • Within the VPN configuration, enforce strict routing rules that require all remote access requests to pass through the DMZ and be authenticated by bastion hosts. This minimizes the risk of unauthorized access and ensures that all remote interactions with the OT network are monitored and controlled.
    • If wireless technology is employed within the OT environment, implement Wi-fi Protected Access 3 (WPA3)-Enterprise encryption with strong authentication protocols like Extensible Authentication Protocol (EAP)-TLS to ensure data confidentiality and integrity.
      • Deploy and continuously monitor Wireless Intrusion Prevention Systems (WIPS) to detect, prevent, and respond to unauthorized access attempts and anomalous activities within the wireless network infrastructure.
      • Disable unnecessary features like Service Set Identifier (SSID) broadcasting and peer-to-peer networking, enable Media Access Control (MAC) filtering as an additional layer, and keep wireless firmware updated.

    Validate Security Controls

    In addition to applying mitigations, CISA and USCG recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. CISA and USCG recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 1 to Table 9).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program—including people, processes, and technologies—based on the data generated by this process.

    CISA and USCG recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Contact Information

    Critical infrastructure organizations are encouraged to report suspicious or criminal activity related to information in this advisory to:

    Additional Resources

    For more information on improving cyber hygiene for critical infrastructure IT and OT environments, please see the following additional resources authored by CISA, CGCYBER, and international partners:

    Disclaimer

    The information in this report is being provided “as is” for informational purposes only. CISA and USCG do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA and USCG.

    Version History

    July 31, 2025: Initial version.

    Appendix: MITRE ATT&CK Tactics and Techniques

    See Table 1 to Table 9 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 1: Initial Access
    Technique Title ID Use
    Valid Accounts T1078 Malicious actors could use access to valid accounts for access to IT and OT networks.
    Valid Accounts: Local Accounts T1078.003 Threat actors could use credentials obtained for local administrator accounts to gain administrator access to workstations or services that use the account.
    Account Manipulation T1098 Malicious actors could modify existing accounts or create new accounts to maintain access or escalate privileges. 
    Table 2: Execution
    Technique Title ID Use
    Command and Scripting Interpreter  T1059 Malicious actors could use script interpreters like PowerShell to execute commands and scripts. 
    Table 3: Persistence
    Technique Title ID Use
    Boot or Autostart Execution T1547 Malicious actors could configure autostart execution paths to ensure persistence.
    Hijack Execution Flow T1574 Malicious actors could hijack the execution flow of applications and inject malicious code.
    Table 4: Privilege Escalation
    Technique Title ID Use
    Domain or Tenant Policy Modification T1484 Malicious actors could modify domain policies to escalate privileges or evade defenses.
    Table 5: Defense Evasion
    Technique Title ID Use
    Modify Registry T1112 Malicious actors could install malicious browser extensions on compromised systems.
    Impair Defenses: Downgrade Attack T1562.010 Malicious actors could exploit vulnerabilities in older systems to force a downgrade to a less secure mode of operation.
    Table 6: Credential Access
    Technique Title ID Use
    Unsecured Credentials: Credentials in Files T1552.001 Malicious actors could search for and exploit credentials stored in unsecured files. 
    OS Credential Dumping T1003 Malicious actors could extract credentials from memory or storage from unsecured workstations.
    Adversary-in-the-Middle T1557 Malicious actors could position themselves between networked devices to intercept credentials and other data. 
    Brute Force: Password Guessing T1110.001 Malicious actors could systematically guess possible passwords.
    Brute Force: Password Cracking T1110.002 Malicious actors could recover plaintext credentials after obtaining password hashes or other similar credential material.
    Brute Force: Password Spraying T1110.003 Malicious actors could attempt to use a common password against different accounts to try to obtain account access. 
    Brute Force: Credential Stuffing T1110.004 Malicious actors could try to use credentials gained from an unrelated account to gain access to a desired account in the victim’s environment. 
    Table 7: Discovery
    Technique Title ID Use
    System Network Connections Discovery T1049 Malicious actors could map network connections to identify paths to OT systems from an unsecured IT workstation with access to the OT network. 
    System Network Configuration Discovery T1016 Malicious actors could use an unsecured workstation to discover network configurations.
    Table 8: Lateral Movement
    Technique Title ID Use
    Remote Services: Remote Desktop Protocol T1021.001 Malicious actors could use valid credentials to establish an RDP connection to access a workstation. 
    Remote Services: SSH T1021.004 Malicious actors could use valid accounts to establish an SSH connection to a workstation.
    Table 9: Command and Control
    Technique Title ID Use
    Application Layer Protocol T1071 Malicious actors could use application layer protocols to communicate with systems they compromised while blending in with existing network traffic. 

    MIL Security OSI

  • MIL-OSI Security: Drug Trafficker Sentenced to More Than 15 Years for Trafficking Methamphetamine

    Source: US FBI

    Jacksonville, Florida – U.S. District Judge Wendy W. Berger has sentenced Kevin Ray Marcano (37, Cambridge, MA) to 15 years and 8 months in federal prison for conspiracy to distribute controlled substances, specifically 500 grams or more of a mixture and substance containing methamphetamine. Marcano pleaded guilty on April 22, 2025. 

    According to court documents, in March 2022, Marcano began supplying methamphetamine across the country by shipping multi-pound packages to known customers, including an individual in Jacksonville. From March 2022 to July 2023, Marcano sent approximately 5 packages each containing about 10 pounds of methamphetamine to the Jacksonville customer. In September 2023, the same individual called Marcano and ordered another shipment of four pounds of methamphetamine in exchange for $4,900. Within five days of placing the order from Marcano, the four-pound shipment of methamphetamine arrived.

    “This criminal was responsible to shipping large quantities of methamphetamine across the country, fueling addiction and poisoning communities far beyond his own,” said Homeland Security Investigations Jacksonville Assistant Special Agent in Charge Tim Hemker. “Thanks to the dedicated efforts of HSI and FBI special agents, this individual’s nationwide narcotics distribution network has been dismantled.”

    This case was investigated by the Federal Bureau of Investigation and Homeland Security Investigations. It was prosecuted by Assistant United States Attorney Kelly S. Milliron. 

    MIL Security OSI

  • MIL-OSI Security: Convicted Felon Pleads Guilty to Gun and Drug Charges

    Source: US FBI

    BUFFALO, N.Y.-U.S. Attorney Michael DiGiacomo announced today that Jeremy Hodge, 39, of Buffalo, NY, pleaded guilty before U.S. District Judge Lawrence J. Vilardo to possession with intent to distribute 40 grams or more of fentanyl and being a felon in possession of a firearm, which carry a mandatory minimum penalty of five years in prison, a maximum of 40 years, and a $5,000,000 fine.

    Assistant U.S. Attorney Jeffrey E. Intravatola, who is handling the case, stated that on April 4, 2025, the FBI executed a search warrant at Hodge’s Ernst Avenue residence, on his vehicle, and person. Law enforcement seized a semi-automatic handgun, ammunition, and drug paraphernalia. Hodge was arrested at the scene. He was previously convicted of felony charges in April 2008 and March 2009, and is legally prohibited from possessing a firearm.

    This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations (TCOs), and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces (OCDETFs) and Project Safe Neighborhood (PSN).

    The plea is the result of an investigation by the Federal Bureau of Investigation Safe Streets Task Force, under the direction of Acting Special Agent-in-Charge Mark Grimm.

    Sentencing is scheduled for December 8, 2025, before Judge Vilardo.

    # # # #

     

    MIL Security OSI

  • MIL-OSI Security: FBI Detroit Marks 50th Anniversary of James ‘Jimmy’ Hoffa’s Disappearance with Continued Commitment to Missing Persons Investigations

    Source: US FBI

    DETROIT, MI—Today marks 50 years since the disappearance of James “Jimmy” Hoffa, a case which remains one of the most well-known missing person investigations in FBI history. Regardless of the age of the case, the FBI Detroit Field Office remains committed to following all credible leads and is seeking information to assist in moving this case forward.

    The Hoffa investigation remains active, and our office continues to urge anyone with information to come forward. The FBI investigates missing persons cases where there may be potential federal violations, including kidnapping, organized crime, or other criminal acts.

    “As the 50th anniversary of Mr. Hoffa’s disappearance approaches, the FBI Detroit Field Office remains steadfast in its commitment to pursuing all credible leads,” said Cheyvoryea Gibson, special agent in charge of the FBI Detroit Field Office.

    The FBI routinely provides support to local, state, and federal law enforcement partners who handle missing persons cases. We provide forensic analysis, investigative coordination, intelligence sharing, and victim services support.

    The FBI Detroit Field Office extends its appreciation to the community and other partners across the nation for their ongoing cooperation and shared commitment to this investigation, as well as the equally important missing person cases, in locating missing individuals and supporting families affected.

    Anyone with information related to the Jimmy Hoffa case, or any other missing persons investigation is encouraged to contact the FBI at 1-800-CALL-FBI or submit a tip online at tips.fbi.gov.

    MIL Security OSI

  • MIL-OSI Security: Gunrunner Who Illegally Trafficked More than 200 Firearms to DC Area Sentenced to 84 Months in Prison

    Source: Office of United States Attorneys

                WASHINGTON – Michael Pittman, 30, of the District of Columbia, was sentenced today to 84 months in federal prison in connection with trafficking more than 200 illegal firearms from Georgia and North Carolina to the Washington D.C. area where he sold many of them to convicted felons, announced U.S. Attorney Jeanine Ferris Pirro.

                Pittman pleaded guilty on April 14, 2025, to conspiracy to commit firearms trafficking.

                In addition to the 84-month prison term, U.S. District Court Judge Tanya S. Chutkan ordered Pittman to serve three years of supervised release.

                Joining in the announcement was Special Agent in Charge Anthony Spotswood of the Washington Field Division of the Bureau of Alcohol, Tobacco, Firearms, and Explosives, and Chief Pamela A. Smith of the Metropolitan Police Department.

                According to court documents, from at least April 2023 through May 2024, Pittman rented cars and drove to Georgia and North Carolina where he purchased guns from illegal firearm suppliers. Pittman re-sold the firearms in the D.C. area, advertising them through different means. He took photos of the firearms displayed on his bed with prices.

                Between April 2023 through May 2024, Pittman obtained, advertised, or sold 200 or more firearms.

                On May 30, 2024, Virginia State Police arrested Pittman in Mecklenburg County, Virginia, as he was returning to D.C. from a buying trip. Pittman fled from a traffic stop before he crashed and ran into the nearby woods. Police recovered Pittman’s backpack which contained 16 firearms, an additional firearm he had dropped, and two firearms he had left in his vehicle.

                Law enforcement subsequently obtained a warrant and searched Pittman’s residence. In Pittman’s home, law enforcement recovered hundreds of rounds of ammunition, firearm cleaning and repair tools, firearm magazines, and three additional firearms. Law enforcement also observed the same red-and-black patterned bed spread observed in the images from Pittman’s phone.

                Pittman has one prior felony conviction for second degree assault in Prince George’s County, Maryland, for which he was sentenced to two years in prison suspended as to all but 30 days.

                This case was investigated by the Bureau of Alcohol, Tobacco, Firearms and Explosives Washington Field Division with valuable assistance from the Virginia State Police. It was prosecuted by Assistant U.S. Attorneys Cameron A. Tepfer and Sarah Martin.

    24cr296

    MIL Security OSI

  • MIL-OSI Security: Serial Armed Robber and Rapist Sentenced for “Nightmarish” Crimes

    Source: Office of United States Attorneys

    DETROIT – Today, Deandre Martece Williams was sentenced to 327 months in prison on charges of felon in possession of a firearm and kidnapping, in connection with a series of armed robberies, non-fatal shootings, and rapes he committed in 2023, United States Attorney Jerome F. Gorgon Jr. announced. In sentencing Williams, United States District Judge Mark A. Goldsmith stated that Williams’s “utter disregard for human dignity is breathtaking in the worst sense of the word” and referred to his conduct as “nightmarish.” During a three month stretch in 2023, Williams victimized fifteen people in eight separate incidents, seriously injuring four people, and raping three at gunpoint.

    Gorgon was joined in the announcement by James Deir, Special Agent in Charge of the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), Detroit Field Division, Chief Todd Bettison, Detroit Police Department (DPD), and Kym Worthy, Wayne County Prosecutor.

    During the investigation, DPD collected fired cartridge casings from the scene of multiple shootings. With the help of the ATF and the National Integrated Ballistic Information Network (NIBIN), they identified a pattern of targeting sex workers and their customers. The ATF and DPD methodically pieced together other evidence from the crime scenes and identified Williams as a suspect. On October 20, 2023, ATF agents executed a federal search warrant at Williams’s house, arrested him, and found the gun used in the robberies.

    Williams frequently found his victims in parked cars along neighborhood streets. Williams commonly approached on foot, placed his handgun through an open window or door, and robbed his victims. After the robberies, Williams shot at several of the victims as they tried to flee. Several of the victims were injured by gunfire. Williams raped two of his victims during the robberies.

    Through their investigation of the robberies, the ATF and DPD uncovered evidence linking Williams to a rape and adult kidnapping. Williams and that victim had agreed to meet over a dating app. When Williams arrived at the victim’s hotel room, he pulled out a handgun and held the victim at gunpoint for several hours while repeatedly raping the victim.

    Williams’s arrest for the robberies also led to DNA evidence linking him to an unsolved Criminal Sexual Conduct from 2012. Williams pleaded guilty to two counts of Criminal Sexual Conduct in the Third Circuit Court in Detroit for those offenses and was sentenced in March to 10 years 6 months up to 20 years prison in the Wayne County Third Circuit Court.

    “We should all hate robbery and cruelty. And this sinister man did plenty of both. For years, he was prowling around our streets. But through ingenuity and hard work, the ATF and DPD made our city safer,” said U.S. Attorney Gorgon.

    “Deandre Williams is a ruthless predator who used firearms to dominate, violate, and destroy lives,” said ATF Special Agent in Charge James Deir. “He didn’t just break the law — he shattered families, preyed on the vulnerable, instilled fear, and left a trail of mayhem wherever he went. ATF’s unique firearm expertise will continue to be the bedrock of gun violence reduction efforts in Detroit.  This expertise enables ATF and our law enforcement partners to identify AND target the most prolific shooters across the Detroit metropolitan community for federal prosecution.  Mr. Williams is a poster child for what this partnership does: removing violent thugs from the community. Williams will now need to pack a suitcase because he will be behind bars.  Exactly, where he deserves to be.”

    “The investigation of Deandre Williams yielded an unexpected dividend.  WCPO was able to successfully prosecute Williams on a 2012 sexual assault case as a direct result of evidence collected in his federal cases.  We are pleased that all of his victims will see him receive the justice he deserves,” said Wayne County Prosecutor Kym Worthy.

    This case was investigated by the Bureau of Alcohol Tobacco, Firearms and Explosives in conjunction with the Detroit Police Department. The case is being prosecuted by the United States Attorney’s Office for the Eastern District of Michigan.

    MIL Security OSI

  • MIL-OSI Security: CEO and Medical Director Charged in $500M COVID-19 Test Billing Fraud

    Source: Office of United States Attorneys

    DETROIT – Two individuals were charged for their involvement in a $500 million, nationwide scheme that involved billing Medicare, Medicaid, TRICARE, and other health insurance programs for COVID-19 testing services that were never rendered, United States Attorney Jerome F. Gorgon Jr. announced today.

    Cemhan “Jimmy” Biricik (age 46) of Boca Raton Florida, and Dr. Martin Perlin (age 74) of Fairfield, Connecticut were charged with conspiracy to commit health care fraud and more than 50 substantive counts of health care fraud. Biricik was the sole member and Chief Executive Officer of Fast Lab Technologies, LLC (Fast Lab).  Dr. Perlin was Fast Lab’s Medical Director and provider responsible for ordering the majority of the tests. Both defendants were arrested this morning.

    According to the Indictment, during the Covid-19 pandemic, New York-based Fast Lab operated a website offering “free” covid tests.  When individuals went to the website to order tests, they were asked to provide their insurance information.  Fast Lab then used this insurance information to fraudulently bill Medicare, Medicaid, TRICARE and numerous private insurances for both antigen (“rapid”) and PCR (“laboratory) tests, across multiple dates for each beneficiary. Specifically, Fast Lab’s claims represented that (1) the antigen tests had been observed by medical professionals, (2) saliva samples were collected by medical professionals, and (3) PCR testing was performed on those samples.  In reality, the vast majority of antigen tests—if taken at all—were taken at home and not observed by medical professionals; saliva samples were never collected nor returned to Fast Lab; and PCR testing was never performed. Dr. Perlin was the ordering physician for these tests, despite not having a treating relationship with the beneficiaries.  Further, Fast Lab would regularly submit insurance claims before the test kits were even delivered to the beneficiaries.  In total, Biricik billed or caused to be billed more than $500 million in claims and was paid more than $50 million.

    Gorgon was joined in the announcement by Special Agent in Charge Mario Pinto, U.S. Department of Health and Human Services Office of Inspector General (HHS-OIG), Chicago Regional Office; Special Agent in Charge Cheyvoryea Gibson, Federal Bureau of Investigation, Detroit Division; Special Agent in Charge Derek M. Holt of the U.S. Office of Personnel Management Office of the Inspector General; Acting Assistant Secretary of Labor for the Employee Benefits Security Administration Janet Dhillon (DOL-EBSA); Detroit Division; Acting Special Agent in Charge Christopher Silvestro, Defense Criminal Investigative Service (DCIS); Special Agent in Charge Charles Miller, Detroit Field Office, Internal Revenue Service – Criminal Investigation (IRS-CI); Special Agent in Charge Megan Howell, Great Lakes Region, U.S. Department of Labor, Office of Inspector General (DOL-OIG); Acting Inspector in Charge Sean McStravick, U.S. Postal Inspection Service (USPIS); Owen Cypher, U.S. Marshal for the Eastern District of Michigan and Michigan Attorney General Dana Nessel, Medicaid Fraud Control Unit (MFCU).

    The public is reminded that an Indictment is not evidence of guilt. The defendants are presumed innocent and entitled to a fair trial at which the government has the burden of proving guilt beyond a reasonable doubt.

    This case is being investigated by Special Agents from HHS-OIG, FBI, OPM-OIG, DOL-EBSA, DCIS, MFCU, IRS-CI, DOL-OIG, USPIS, and the U.S. Marshal’s Service.  It is being prosecuted by Assistant U.S. Attorneys Regina R. McCullough and Ryan A. Particka.  Assistant United States Attorney Ryan T. Nees of the United States Attorney’s Office for the Southern District of New York also provided assistance. 

    MIL Security OSI

  • MIL-OSI Security: California Defense Contractor and Private Equity Firm Agree to Pay $1.75M to Resolve False Claims Act Liability Relating to Voluntary Self-Disclosure of Cybersecurity Violations

    Source: United States Attorneys General

    Defense contractor Aero Turbine Inc., of Stockton, California, and private equity company Gallant Capital Partners LLC, of Los Angeles, have agreed to pay $1.75 million to resolve their liability under the False Claims Act for knowingly failing to comply with cybersecurity requirements in an Aero Turbine contract with the Department of the Air Force. In connection with the settlement, the United States acknowledged that Aero Turbine and Gallant took significant steps entitling them to credit for cooperating with the government.

    “Government contractors must follow required cybersecurity standards to protect sensitive defense information,” said Assistant Attorney General Brett A. Shumate of the Justice Department’s Civil Division. “When defense contractors fail to comply with cybersecurity requirements, they can mitigate the consequences by making timely self-disclosures, cooperating with investigations, and taking prompt remedial measures.”

    “Every defense contractor must provide adequate security to safeguard covered defense information,” said Acting U.S. Attorney Kimberly A. Sanchez for the Eastern District of California. “We commend Aero Turbine and Gallant for disclosing the issue and promptly cooperating to address it. We encourage others to follow their example of self-reporting to resolve violations.”

    “Protecting the integrity of the Department of Defense (DoD) procurement processes is a top priority for the DoD Office of Inspector General’s Defense Criminal Investigative Service (DCIS),” said Director Kelly Mayo of DCIS. “Failing to comply with DoD contract specifications and cybersecurity requirements puts DoD information and programs at risk of exploitation. DCIS will continue to collaborate with our law enforcement partners and the Department of Justice to investigate allegations of false claims on DoD contracts.”

    “This case serves as a reminder that cybersecurity transcends mission sets. Ensuring companies adhere to robust cybersecurity safeguards is integral to maintaining the Air Force’s operational edge against adversaries,” said Special Agent in Charge Caroline Galinis of the Air Force Office of Special Investigations (AFOSI), Procurement Fraud Detachment 1. “AFOSI’s Procurement Fraud team, alongside investigative partner agencies and the Department of Justice, played a critical role in protecting U.S. national security interests.”

    The settlement resolves the liability of Aero Turbine and Gallant under the False Claims Act for knowingly submitting or causing others to submit false or fraudulent claims for payment on a Department of the Air Force contract, which were allegedly false or fraudulent because they had not complied with the contract’s cybersecurity requirements. From January 2018 to February 2020, Aero Turbine allegedly failed to implement certain cybersecurity controls in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171 that, if not implemented, could lead to significant exploitation of the system or exfiltration of sensitive defense information.

    In addition, from June to July 2019, Aero Turbine and Gallant allegedly failed to control the flow of, and limit unauthorized access to, sensitive defense information by providing a software company based in Egypt with files containing such information, even though the software company and its foreign citizen personnel were not authorized to receive sensitive defense information under the Air Force contract. After learning of the issues, Aero Turbine and Gallant provided the government with multiple written self-disclosures, cooperated with the government’s investigation of the issues, and took prompt remedial action.

    The resolution obtained in this matter was the result of a coordinated effort between the Justice Department’s Civil Division, Commercial Litigation Branch, Fraud Section, the U.S. Attorney’s Office for the Eastern District of California, DCIS, AFOSI, and the Air Force Materiel Command Law Office Procurement Fraud Division. The matter was handled by Fraud Section attorneys Robin Overby and Christopher Terranova and Assistant U.S. Attorney David Thiess.

    The claims resolved by the settlement are allegations only, and there has been no determination of liability.

    Note: Read the Settlement here.

    MIL Security OSI

  • MIL-OSI Security: California Defense Contractor and Private Equity Firm Agree to Pay $1.75M to Resolve False Claims Act Liability Relating to Voluntary Self-Disclosure of Cybersecurity Violations

    Source: United States Attorneys General

    Defense contractor Aero Turbine Inc., of Stockton, California, and private equity company Gallant Capital Partners LLC, of Los Angeles, have agreed to pay $1.75 million to resolve their liability under the False Claims Act for knowingly failing to comply with cybersecurity requirements in an Aero Turbine contract with the Department of the Air Force. In connection with the settlement, the United States acknowledged that Aero Turbine and Gallant took significant steps entitling them to credit for cooperating with the government.

    “Government contractors must follow required cybersecurity standards to protect sensitive defense information,” said Assistant Attorney General Brett A. Shumate of the Justice Department’s Civil Division. “When defense contractors fail to comply with cybersecurity requirements, they can mitigate the consequences by making timely self-disclosures, cooperating with investigations, and taking prompt remedial measures.”

    “Every defense contractor must provide adequate security to safeguard covered defense information,” said Acting U.S. Attorney Kimberly A. Sanchez for the Eastern District of California. “We commend Aero Turbine and Gallant for disclosing the issue and promptly cooperating to address it. We encourage others to follow their example of self-reporting to resolve violations.”

    “Protecting the integrity of the Department of Defense (DoD) procurement processes is a top priority for the DoD Office of Inspector General’s Defense Criminal Investigative Service (DCIS),” said Director Kelly Mayo of DCIS. “Failing to comply with DoD contract specifications and cybersecurity requirements puts DoD information and programs at risk of exploitation. DCIS will continue to collaborate with our law enforcement partners and the Department of Justice to investigate allegations of false claims on DoD contracts.”

    “This case serves as a reminder that cybersecurity transcends mission sets. Ensuring companies adhere to robust cybersecurity safeguards is integral to maintaining the Air Force’s operational edge against adversaries,” said Special Agent in Charge Caroline Galinis of the Air Force Office of Special Investigations (AFOSI), Procurement Fraud Detachment 1. “AFOSI’s Procurement Fraud team, alongside investigative partner agencies and the Department of Justice, played a critical role in protecting U.S. national security interests.”

    The settlement resolves the liability of Aero Turbine and Gallant under the False Claims Act for knowingly submitting or causing others to submit false or fraudulent claims for payment on a Department of the Air Force contract, which were allegedly false or fraudulent because they had not complied with the contract’s cybersecurity requirements. From January 2018 to February 2020, Aero Turbine allegedly failed to implement certain cybersecurity controls in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171 that, if not implemented, could lead to significant exploitation of the system or exfiltration of sensitive defense information.

    In addition, from June to July 2019, Aero Turbine and Gallant allegedly failed to control the flow of, and limit unauthorized access to, sensitive defense information by providing a software company based in Egypt with files containing such information, even though the software company and its foreign citizen personnel were not authorized to receive sensitive defense information under the Air Force contract. After learning of the issues, Aero Turbine and Gallant provided the government with multiple written self-disclosures, cooperated with the government’s investigation of the issues, and took prompt remedial action.

    The resolution obtained in this matter was the result of a coordinated effort between the Justice Department’s Civil Division, Commercial Litigation Branch, Fraud Section, the U.S. Attorney’s Office for the Eastern District of California, DCIS, AFOSI, and the Air Force Materiel Command Law Office Procurement Fraud Division. The matter was handled by Fraud Section attorneys Robin Overby and Christopher Terranova and Assistant U.S. Attorney David Thiess.

    The claims resolved by the settlement are allegations only, and there has been no determination of liability.

    Note: Read the Settlement here.

    MIL Security OSI

  • MIL-OSI Security: Mother-Daughter Duo Sentenced in Elder Fraud Scheme

    Source: US FBI

    BIRMINGHAM, Ala. – A mother and daughter have been sentenced for their involvement in an elder fraud scheme, announced U.S. Attorney Prim F. Escalona.

    U.S. District Court Judge Anna M. Manasco sentenced Mykia L. Henderson, 32, of Moody, to 87 months in prison, and Cynthia H. Mixon, 50, of Fairfield, to 57 months in prison. Both pleaded guilty to conspiracy to commit wire fraud and aggravated identity theft.

    According to the plea agreements, between December 2020 and February 2022, Mixon and Henderson were the in-home caretakers for the elderly victim. In their role as caretakers, Henderson and Mixon had access to the victim’s financial information, which they shared with one another and with other members of the conspiracy. The defendants devised a scheme to defraud the victim by using fake and fraudulent accounts they set up through Square, Inc. and Stripe, Inc. Through the scheme, the defendants charged the victim’s credit cards through the Square and Stripe accounts and then deposited the funds into their bank accounts or shared the proceeds with one another. The defendants hid the charges from the victim by including false “descriptions” to prevent their discovery. The defendants also wrote unauthorized checks to themselves that were drawn on the victim’s bank accounts. In total, members of the conspiracy stole nearly $500,000 from the victim.   

    The Federal Bureau of Investigation and Mountain Brook Police Department investigated the case.  Assistant United States Attorney Ryan S. Rummage prosecuted the case.

    Reporting from consumers about fraud and fraud attempts is critical to law enforcements’ efforts to investigate and prosecute schemes targeting older adults. If you or someone you know is age 60 or older and has been a victim of financial fraud, help is available at the National Elder Fraud Hotline: 1-833 FRAUD-11 (1-833-372-8311). This Department of Justice Hotline, managed by the Office for Victims of Crime, is staffed by experienced professionals who provide personalized support to callers by assessing the needs of the victim and identifying next steps. The hotline is staffed seven days a week from 6:00 a.m. to 11:00 p.m. [ET]. English, Spanish and other languages are available. More information about the Department’s elder justice efforts can be found on the Department’s Elder Justice website, www.elderjustice.gov.

    MIL Security OSI

  • MIL-OSI Security: Mother-Daughter Duo Sentenced in Elder Fraud Scheme

    Source: US FBI

    BIRMINGHAM, Ala. – A mother and daughter have been sentenced for their involvement in an elder fraud scheme, announced U.S. Attorney Prim F. Escalona.

    U.S. District Court Judge Anna M. Manasco sentenced Mykia L. Henderson, 32, of Moody, to 87 months in prison, and Cynthia H. Mixon, 50, of Fairfield, to 57 months in prison. Both pleaded guilty to conspiracy to commit wire fraud and aggravated identity theft.

    According to the plea agreements, between December 2020 and February 2022, Mixon and Henderson were the in-home caretakers for the elderly victim. In their role as caretakers, Henderson and Mixon had access to the victim’s financial information, which they shared with one another and with other members of the conspiracy. The defendants devised a scheme to defraud the victim by using fake and fraudulent accounts they set up through Square, Inc. and Stripe, Inc. Through the scheme, the defendants charged the victim’s credit cards through the Square and Stripe accounts and then deposited the funds into their bank accounts or shared the proceeds with one another. The defendants hid the charges from the victim by including false “descriptions” to prevent their discovery. The defendants also wrote unauthorized checks to themselves that were drawn on the victim’s bank accounts. In total, members of the conspiracy stole nearly $500,000 from the victim.   

    The Federal Bureau of Investigation and Mountain Brook Police Department investigated the case.  Assistant United States Attorney Ryan S. Rummage prosecuted the case.

    Reporting from consumers about fraud and fraud attempts is critical to law enforcements’ efforts to investigate and prosecute schemes targeting older adults. If you or someone you know is age 60 or older and has been a victim of financial fraud, help is available at the National Elder Fraud Hotline: 1-833 FRAUD-11 (1-833-372-8311). This Department of Justice Hotline, managed by the Office for Victims of Crime, is staffed by experienced professionals who provide personalized support to callers by assessing the needs of the victim and identifying next steps. The hotline is staffed seven days a week from 6:00 a.m. to 11:00 p.m. [ET]. English, Spanish and other languages are available. More information about the Department’s elder justice efforts can be found on the Department’s Elder Justice website, www.elderjustice.gov.

    MIL Security OSI

  • MIL-OSI Security: Canadian Cybercriminal Sentenced to One Year in Prison for NFT Theft Scheme

    Source: US FBI

    ALEXANDRIA, Va. – A Canadian was sentenced yesterday to a year in prison for conspiracy to commit wire fraud, wire fraud, and conspiracy to commit aggravated identity theft.

    According to court documents, in May 2022, Cameron Albert Redman, 22, of Mississauga, Ontario, formed a scheme to steal non-fungible tokens (NFTs) by gaining unauthorized access to the X accounts of various digital artists. The conspirators used the artists’ online identities to direct the artists’ followers to fraudulent websites. There, victims would seek to claim new NFTs from the digital artists. Though victims thought they were authorizing a transaction to receive NFTs into their digital wallets, they unknowingly enabled the conspirators to remove cryptocurrency and NFTs from their wallets.

    Within a few days, Redman and his co-conspirators defrauded over 200 victims and profited over $794,000.

    Erik S. Siebert, U.S. Attorney for the Eastern District of Virginia, and Reid Davis, Special Agent in Charge of the FBI Washington Field Office’s Criminal Division, made the announcement after sentencing by U.S. District Judge Leonie M. Brinkema.

    The Justice Department’s Office of International Affairs provided substantial assistance to secure the arrest and March 2025 extradition from Portugal of Redman. The Royal Canadian Mounted Police Cybercrime Investigation Team, Central Region, provided valuable assistance in this case.

    Assistant U.S. Attorney Zoe Bedell prosecuted the case.

    A copy of this press release is located on the website of the U.S. Attorney’s Office for the Eastern District of Virginia. Related court documents and information are located on the website of the District Court for the Eastern District of Virginia or on PACER by searching for Case No. 1:25-cr-129.

    MIL Security OSI

  • MIL-OSI Security: Canadian Cybercriminal Sentenced to One Year in Prison for NFT Theft Scheme

    Source: US FBI

    ALEXANDRIA, Va. – A Canadian was sentenced yesterday to a year in prison for conspiracy to commit wire fraud, wire fraud, and conspiracy to commit aggravated identity theft.

    According to court documents, in May 2022, Cameron Albert Redman, 22, of Mississauga, Ontario, formed a scheme to steal non-fungible tokens (NFTs) by gaining unauthorized access to the X accounts of various digital artists. The conspirators used the artists’ online identities to direct the artists’ followers to fraudulent websites. There, victims would seek to claim new NFTs from the digital artists. Though victims thought they were authorizing a transaction to receive NFTs into their digital wallets, they unknowingly enabled the conspirators to remove cryptocurrency and NFTs from their wallets.

    Within a few days, Redman and his co-conspirators defrauded over 200 victims and profited over $794,000.

    Erik S. Siebert, U.S. Attorney for the Eastern District of Virginia, and Reid Davis, Special Agent in Charge of the FBI Washington Field Office’s Criminal Division, made the announcement after sentencing by U.S. District Judge Leonie M. Brinkema.

    The Justice Department’s Office of International Affairs provided substantial assistance to secure the arrest and March 2025 extradition from Portugal of Redman. The Royal Canadian Mounted Police Cybercrime Investigation Team, Central Region, provided valuable assistance in this case.

    Assistant U.S. Attorney Zoe Bedell prosecuted the case.

    A copy of this press release is located on the website of the U.S. Attorney’s Office for the Eastern District of Virginia. Related court documents and information are located on the website of the District Court for the Eastern District of Virginia or on PACER by searching for Case No. 1:25-cr-129.

    MIL Security OSI

  • MIL-OSI Security: Five Co-Conspirators Plead Guilty to Smuggling Contraband Into the D.C. Jail

    Source: US FBI

               WASHINGTON – LaTara Brown, 31, of Capitol Heights, Maryland, Kiya Holland, 33, of Oxon Hill, Maryland, Darius Robertson, 31, of Washington, D.C., Marcel Vines, 28, of Washington, D.C., and Stefon Freshley, 28 of Washington, D.C. have all pleaded guilty in a conspiracy to provide a knife, cell phones, and fentanyl and other controlled substances to inmates in the D.C. jail as they awaited trial for murder and assault with intent to kill while armed. The pleas were announced by U.S. Attorney Jeanine Ferris Pirro.

               Brown, Holland, Robertson, Vines and Freshley pleaded guilty in District Court. They were previously indicted on November 14, 2024 for providing or possessing contraband in a prison, as well as conspiring to do so. The sixth co-conspirator, Rashaad Roper, 45, of Gaithersburg, MD is set to go to trial.

               As part of the plea, Brown, Holland, Robertson, Vines and Freshley admitted to their role in the conspiracy which included Holland and Brown admitting to packaging contraband, such as a knife, cell phones, and controlled substances to include fentanyl, into Tupperware containers which would then be brought to the Central Detention Facility, also known as the D.C. Jail. Robertson, Vines, and/or Freshley, who were inmates inside the housing unit, admitted to receiving the contraband from Officer Roper or another corrections officer after they were smuggled into the jail.

                Sentencings are scheduled for August 13, 2025 (Vines), September 5, 2025 (Holland), September 16, 2025 (Robertson), September 25, 2025 (Freshley), and October 21, 2025 (Brown). Each defendant faces a statutory maximum sentence of 5 years in prison for conspiracy to provide or possess contraband in a prison. Judge Timothy J. Kelly will determine the appropriate sentence at each of the respective sentencings. 

               Joining in the announcement was FBI Washington Field Office Criminal Division Special Agent in Charge Reid Davis and Chief Investigator Kevin L. Hammond of the D.C. Department of Corrections Office of Investigative Services.

               This case was investigated by the FBI’s Washington Field Office and the D.C. Department of Corrections Office of Investigative Services with the assistance of the Department of Justice Office of Inspector General. It is being prosecuted by Assistant U.S. Attorneys Joshua Gold and Sarah Santiago.

    MIL Security OSI

  • MIL-OSI Security: Five Co-Conspirators Plead Guilty to Smuggling Contraband Into the D.C. Jail

    Source: US FBI

               WASHINGTON – LaTara Brown, 31, of Capitol Heights, Maryland, Kiya Holland, 33, of Oxon Hill, Maryland, Darius Robertson, 31, of Washington, D.C., Marcel Vines, 28, of Washington, D.C., and Stefon Freshley, 28 of Washington, D.C. have all pleaded guilty in a conspiracy to provide a knife, cell phones, and fentanyl and other controlled substances to inmates in the D.C. jail as they awaited trial for murder and assault with intent to kill while armed. The pleas were announced by U.S. Attorney Jeanine Ferris Pirro.

               Brown, Holland, Robertson, Vines and Freshley pleaded guilty in District Court. They were previously indicted on November 14, 2024 for providing or possessing contraband in a prison, as well as conspiring to do so. The sixth co-conspirator, Rashaad Roper, 45, of Gaithersburg, MD is set to go to trial.

               As part of the plea, Brown, Holland, Robertson, Vines and Freshley admitted to their role in the conspiracy which included Holland and Brown admitting to packaging contraband, such as a knife, cell phones, and controlled substances to include fentanyl, into Tupperware containers which would then be brought to the Central Detention Facility, also known as the D.C. Jail. Robertson, Vines, and/or Freshley, who were inmates inside the housing unit, admitted to receiving the contraband from Officer Roper or another corrections officer after they were smuggled into the jail.

                Sentencings are scheduled for August 13, 2025 (Vines), September 5, 2025 (Holland), September 16, 2025 (Robertson), September 25, 2025 (Freshley), and October 21, 2025 (Brown). Each defendant faces a statutory maximum sentence of 5 years in prison for conspiracy to provide or possess contraband in a prison. Judge Timothy J. Kelly will determine the appropriate sentence at each of the respective sentencings. 

               Joining in the announcement was FBI Washington Field Office Criminal Division Special Agent in Charge Reid Davis and Chief Investigator Kevin L. Hammond of the D.C. Department of Corrections Office of Investigative Services.

               This case was investigated by the FBI’s Washington Field Office and the D.C. Department of Corrections Office of Investigative Services with the assistance of the Department of Justice Office of Inspector General. It is being prosecuted by Assistant U.S. Attorneys Joshua Gold and Sarah Santiago.

    MIL Security OSI

  • MIL-OSI Security: Two Men Charged For Nationwide Fraud Scheme Targeting Hundreds Of Elderly Victims

    Source: Office of United States Attorneys

    Jingbin Jiang and Su Jian Liu Are Charged With Participating in a Scheme That Attempted to Steal Over $18 Million From Over 350 Victims

    United States Attorney for the Southern District of New York, Jay Clayton; Assistant Director in Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), Christopher G. Raia; and Commissioner of the New York City Police Department (“NYPD”), Jessica S. Tisch,  announced charges against JINGBIN JIANG and SU JIAN LIU, a/k/a “Fatty,” a/k/a “Ah Pang,” for a scheme to defraud elderly victims across the United States, which attempted to steal over $18 million from over 350 victims and resulted in actual losses of over $5 million to over 70 victims.  JIANG was arrested in Staten Island this morning and will be presented today before U.S. Magistrate Judge Stewart D. Aaron.  LIU is still at large.  The case is assigned to U.S. District Judge Mary Kay Vyskocil.

    “As alleged, Jingbin Jiang and Su Jian Liu worked together with others to steal the hard-earned money of some our most vulnerable New Yorkers and others around the country,” said U.S. Attorney Jay Clayton.  “Taking advantage of our elderly after they have worked so hard to save and contributed so much to our city and this country is heartless and despicable.  These charges, and the efforts of the FBI and the NYPD, should serve as a warning to fraudsters and cybercriminals: New Yorkers want you held accountable for your crimes, and the women and men of our Office are committed to doing so.”

    “Jingbin Jiang and Su Jian Liu allegedly defrauded elderly victims of more than $5 million by utilizing extortionate tactics to coerce withdrawals of significant cash or purchases of gold,” said FBI Assistant Director Christopher G. Raia.  “This alleged conspiracy wielded fear of bankruptcy and arrest to ensure victims complied with the unlawful requests for money.  The FBI is committed to apprehending any individual who utilizes online platforms to target and exploit vulnerable victims across the country.”

    “These defendants allegedly led a nationwide fraud scheme with the goal of targeting innocent, elderly victims and stealing millions of their hard-earned savings,” said NYPD Commissioner Jessica S. Tisch.  “Jingbin Jiang and Su Jian Liu allegedly participated in a plot involving elaborate, fictitious narratives to manipulate elderly victims and trick them into participating in their scheme, which involved attempts to steal over $18 million from 350 people.  I am grateful to the members of the NYPD, FBI, and the U.S. Attorney’s Office for holding these alleged predatory fraudsters accountable.”

    According to the allegations in the Indictment unsealed today in Manhattan federal court:[1]

    Between at least in or about 2023 and in or about July 2025, JIANG and LIU participated with others in a fraudulent scheme that primarily targeted elderly victims located all across the United States, including in New York, New Jersey, Pennsylvania, Massachusetts, Texas, Washington, Wisconsin, California, Connecticut, Arizona, North Carolina, South Carolina, Missouri, Mississippi, Kentucky, Utah, Oregon, Colorado, and Montana.

    The scheme proceeded in the following manner: First, victims would typically see a pop-up message on their computers indicating that they needed to call a particular phone number controlled by members of the scheme.  The pop-up message would typically claim to come from a technology company, a bank, or the government.  Second, when victims called the phone number, they were told a fictitious narrative that would ultimately lead to a suggestion that the victims withdraw money from their bank account.  For example, some victims were falsely told that their computers had a virus, or that their computers had been hacked into and used to commit serious crimes, like downloading child sexual abuse material.  Others were falsely told that their bank accounts had been compromised and were vulnerable to unauthorized withdrawals.  To avoid arrest or protect their bank accounts from being compromised, victims were instructed to withdraw large amounts of cash from their bank accounts or purchase large quantities of gold.  Some victims were even told that their money would be safely held in the custody of a consumer protection agency like the Federal Trade Commission, and they were sent notices on fake federal government letterhead purporting to bear the signature of a federal government official:

    Third, many victims were told that a courier would be arriving at their home (or other coordinated pick-up location) to retrieve the gold and/or cash.  Victims were often provided with the courier’s name (which was fictitious), a description of the courier’s clothing, and sometimes a password, purportedly to ensure the courier was authorized to pick up the gold and/or cash.  Other victims were told to purchase and transfer cryptocurrency or gift cards, which did not require a courier.  Victims were typically under the impression that this gold and/or cash would then be deposited, on the victims’ behalf, into a new, safe, uncompromised bank account (or with the Federal Trade Commission, as noted above) that they could access without concern in the future.  In reality, these funds were stolen and never returned to the victims.  Some victims engaged in multiple transactions before realizing the fraudulent nature of the scheme.

    JIANG and LIU participated in the scheme by managing and supervising the couriers that traveled to meet the victims to pick up the cash and gold, which was then transported back to New York City.  JIANG and LIU received information about potential victims from other members of the scheme on text-messaging platforms, in messages that typically included the zip codes and the amounts of cash or gold to be collected from each victim. JIANG and LIU could then decide whether to accept the pick-up, and if they did, the other members of the scheme would provide more specific details about the victim and when and where to pick up the cash or gold.  After arranging for couriers to make the pick-ups, JIANG and LIU would provide updates to other members of the scheme about the couriers’ progress.  After the victims provided the criminal proceeds to the couriers, JIANG and LIU arranged for the criminal proceeds to be distributed to other members of the scheme, including by converting cash and gold into cryptocurrency to be easily transmitted to members of the scheme located overseas, including in India and China.  In total, members of the conspiracy have attempted to steal at least approximately $18 million from over 350 victims, and they have successfully stolen at least approximately $5 million from over 70 victims.

    If you or someone you know has been victimized by this scheme, please file a complaint with the FBI’s Internet Crime Complaint Center, which is available at ic3.gov.

    *                *                *

    JIANG, 37, of Staten Island, New York, and LIU, 38 of Edmond, Oklahoma, are both charged with one count of wire fraud conspiracy, which carries a maximum sentence of 20 years in prison; and one count of conspiracy to commit interstate transportation of stolen property, which carries a maximum sentence of five years in prison.

    The maximum potential sentences in this case are prescribed by Congress and provided here for informational purposes only, as any sentencing of the defendants will be determined by the judge.

    Mr. Clayton praised the investigative work of the FBI and NYPD’s Joint Organized Crime Task Force.  Mr. Clayton also thanked the New York State Police and the Bedford Police Department for their assistance in the investigation of this case.

    This case is being handled by the Office’s Violent & Organized Crime Unit. Assistant U.S. Attorneys Andrew K. Chan and Angela Zhu are in charge of the prosecution. 

    The charges contained in the Indictment are merely accusations, and the defendants are presumed innocent unless and until proven guilty.


    [1] As the introductory phrase signifies, the entirety of the text of the Indictment and the description of the Indictment set forth herein constitute only allegations, and every fact described herein should be treated as an allegation.

    MIL Security OSI

  • MIL-OSI Security: Bloods Gang Member Apprehended in Durham in Possession of a Firearm while on Post-Release Supervision Sentenced

    Source: Office of United States Attorneys

    GREENSBORO – A Durham, North Carolina man was sentenced today in Greensboro to 8 years in prison after pleading guilty to a firearm charge, announced United States Attorney Clifton T. Barrett of the Middle District of North Carolina (MDNC).   

    WILLIAM LOVELL HARPER, age 26, was sentenced to a total of 96 months imprisonment plus 3 years of post-release supervision by the Honorable William L. Osteen, Jr., United States District Judge for the MDNC.

    According to court records, on September 4, 2024, officers apprehended HARPER on Hillsborough Road in Durham and recovered a loaded handgun from his person. At the time of his apprehension, HARPER had three active warrants for his arrest, including one stemming from a robbery in Durham on March 2024 and another for violating his post-release supervision. HARPER had been previously convicted of Assault with a Deadly Weapon Inflicting Serious Injury and Robbery with a Dangerous Weapon in Beaufort County in 2017, as well as Conspiracy to Commit Assault with a Deadly Weapon with Intent to Kill in Craven County in 2018. Thus, at the time of the instant offense, HARPER was legally prohibited from possessing a firearm.

    In 2023, HARPER admitted that he was a member of the Bloods criminal street gang.

    In April of this year, HARPER was convicted of Robbery of a Dangerous Weapon and Possession of a Firearm by a Felon in Durham County for conduct occurring on March 28, 2024. He received a sentence of 11 to 146 months. 60 months of today’s federal sentence will run consecutively to HARPER’s state sentence.

    HARPER pleaded guilty on April 10, 2025, to one count of felon in possession of a firearm, in violation of 18 U.S.C. §§ 922(g)(1) and 924(a)(8).

    The case was investigated by the Durham Police Department and the Federal Bureau of Investigation. Valuable assistance was provided by the Durham County District Attorney’s Office. The case was prosecuted by Assistant United States Attorney Eric Iverson.

    ###

    MIL Security OSI

  • MIL-OSI Security: Previously Convicted Felon Sentenced for Possession of Pistol While on Pretrial Release

    Source: Office of United States Attorneys

                WASHINGTON – Andre Jamar Turman, 34, of the District of Columbia, was sentenced today to 28 months in federal prison for being a previously convicted felon in possession of a loaded Haskell Model JS-45 pistol while he was on probation and on pretrial release for multiple cases, announced U.S. Attorney Jeanine Ferris Pirro.

                Turman pleaded guilty on Dec. 17, 2024, to the indictment charging him with unlawful possession of a firearm and ammunition by a felon. In addition to the 28-month prison term, U.S. District Court Judge Jia M. Cobb ordered Turman to serve three years of supervised release.

                Joining in the announcement were U.S. Marshal Robert Dixon of D.C. Superior Court, Special Agent in Charge Anthony Spotswood of the Washington Field Division of the Bureau of Alcohol, Tobacco, Firearms and Explosives, and Chief Pamela A. Smith of the Metropolitan Police Department (MPD)

                According to court documents, on May 4, 2023, Deputy U.S. Marshals and MPD detectives were searching for Turman due to numerous bench warrants out of D.C. Superior Court as well as an outstanding arrest warrant.

                At about 11:30 a.m., officers spotted and arrested Turman on the 2400 block of Pennsylvania Avenue, SE, near Twining Square Park. A Deputy U.S. Marshal patted down the right front pants pocket and recovered a loaded Haskell Model JS-45 pistol. The firearm was not registered in the District of Columbia. In addition, the firearm previously had been reported as stolen.

                Turman was prohibited from possessing a firearm because he had been previously convicted of carrying a pistol without a license and sentenced to more than a year in prison. 

                At the time of his arrest, he was on probation and pretrial release for multiple cases—including release in another firearm case in Maryland.

                This case was investigated by the ATF, MPD, and U.S. Marshals. It was prosecuted by Assistant U.S. Attorneys Shezhad Akhtar and Chrisellen Rebecca Kolb.

    23cr171

    MIL Security OSI

  • MIL-OSI Security: New Haven Man Sentenced to More than 6 Years in Federal Prison for Fentanyl Trafficking Offense

    Source: Office of United States Attorneys

    David X. Sullivan, United States Attorney for the District of Connecticut, today announced that JESUS SEGUINOT, also known as “Chuchi,” 35, of New Haven, was sentenced yesterday by U.S. District Judge Stefan R. Underhill in Bridgeport to 78 months of imprisonment for his role in a fentanyl trafficking conspiracy.

    According to court documents and statements made in court, on June 25, 2020, Seguinot was sentenced in New Haven federal court to 30 months of imprisonment and three years of supervised release for drug distribution and gun possession offenses.  He was released from federal prison in May 2021.  In October 2021, the FBI’s Safe Streets Task Force learned that Luis Salaman, also known as “Bebe,” was distributing large quantities of narcotics throughout New Haven.  The investigation revealed that Salaman worked with Seguinot and others to distribute fentanyl.  Between November 2021 and March 2022, investigators made multiple controlled purchases of distribution quantities of fentanyl from Salaman, Seguinot, and their associates.  Investigators also learned that Seguinot possessed a firearm during that time.

    Seguinot was arrested on April 10, 2023.

    On December 19, 2024, a jury found Seguinot and Salaman guilty of conspiracy to distribute 40 grams or more of fentanyl, and Salaman guilty of three counts of possession with intent to distribute, and distribution of, 40 grams or more of fentanyl. 

    Seguinot’s criminal history also includes state convictions for drug distribution and weapon possession offenses.

    Seguinot has been detained since January 2, 2025.

    Salaman, who has been detained since his arrest on April 5, 2022, awaits sentencing.

    This investigation has been conducted by FBI’s Safe Streets Task Force, which includes members from the FBI, the Connecticut State Police, the Connecticut Department of Correction, and the New Haven, Milford, East Haven, West Haven, and Wallingford Police Departments.  The case is being prosecuted by Assistant U.S. Attorney David T. Huang.

    MIL Security OSI

  • MIL-OSI Security: Andover Man Pleads Guilty for Producing and Possessing Child Sexual Abuse Images

    Source: Office of United States Attorneys

    CONCORD – An Andover man pleaded guilty yesterday in federal court for producing and possessing child sexual abuse material (CSAM), Acting U.S. Attorney Jay McCormack announces.

    Dale Howe, age 37, pleaded guilty in federal court to three counts of Production of Child Pornography and one count of Possession of Child Pornography. U.S. District Court Judge Paul J. Barbadoro scheduled sentencing for November 5, 2025.

    According to the charging documents and statements made in court, the defendant provided the minor victim with drugs and sexually assaulted the minor victim. The defendant created images of the sexual abuse, which were found during a search of his phone. The defendant distributed at least three of the child sexual abuse images through a social media platform. The defendant was also in possession of more than 3,500 files of unrelated CSAM.

    The charges for Production of Child Pornography provide for a sentence with a minimum term of imprisonment of 15 years and a maximum term of imprisonment of 30 years, a maximum fine of $250,000, and a term of supervised release of at least 5 years. The charge for Possession of Child Pornography provides for a sentence with a maximum term of imprisonment of 10 years, a maximum fine of $250,000, and a term of supervised release of at least 5 years. Sentences are imposed by a federal district court judge based upon the U.S. Sentencing Guidelines and statutes which govern the determination of a sentence in a criminal case.

    Homeland Security Investigations, the Andover Police Department, and the New Hampshire State Police, the Merrimack County Sheriff’s Office, New Hampshire Internet Crimes Against Children (ICAC) and the Derry Police Department provided valuable assistance. Assistant U.S Attorneys Heather A. Cherniske and Anna Z. Krasinski are prosecuting the case.

     

    ###

    MIL Security OSI