Category: Security Intelligence

  • MIL-OSI Security: Bonavista — Bonavista RCMP arrests suspect in multiple break and enters, charges laid

    Source: Royal Canadian Mounted Police

    Following recent investigations into property crimes in Bonavista, 43-year-old Christopher Delaney of Bonavista was arrested on October 9, 2024, by Bonavista RCMP.

    On October 2, 2024, Bonavista RCMP received a report of a break, enter and theft at an Ultramar gas station on Confederation Drive. The suspect forced entry into the store and allegedly stole a quantity of cigarettes from inside.

    On the evening of September 29, 2024, Bonavista RCMP received a report of an attempted residential break and enter on Sweeney’s Lane that occurred while the home owner was away from the property. The suspect tried to gain access to the residence but was startled by a neighbour.

    A short time later that same evening, Bonavista RCMP received a report of a possible break and enter at the Irving gas station on Confederation Drive. The suspect forced entry into the business and stole a quantity of cigarettes, beer and lottery tickets.

    Evidence obtained during each of these investigations identified the suspect involved as Delaney.

    Delaney was remanded in custody over the weekend and is charged with the following criminal offences:

    • Break enter and committing – two counts
    • Possess break in instrument – two counts
    • Mischief Under $5000.00 (damage to property) – three counts
    • Breach of a Probation Order – three counts

    He will appear in court today.

    RCMP NL continues to fulfill its mandate to protect public safety, enforce the law, and ensure the delivery of priority policing services in Newfoundland and Labrador.

    MIL Security OSI

  • MIL-OSI Security: Appeal for information following assault in west London

    Source: United Kingdom London Metropolitan Police

    Met officers have released an image of a man they would like to speak to following an assault in Notting Hill, west London.

    An unknown male was walking westbound along Westbourne Grove, W2, on Saturday, 5 October at 13:02hrs where he was seen on CCTV pushing a male victim to the floor.

    The victim, who was walking with his 3-year-old child at the time, was captured falling to the floor and hitting his head into a wall, which caused quite serious injuries, including bleeding, a fractured eye socket and heavy bruising.

    The victim and his child have since been discharged from hospital, but require further treatment.

    The man has been described as a black male, of medium to large build, around the age of 40.

    He was last seen wearing a blue jacket, blue trousers, with a pair of white trainers and a blue baseball cap.

    Enquiries are ongoing but police say it appears at this stage to be an unprovoked attack.

    If you recognise this man or if you have any information which could help, please report it to police online or call 101 quoting 3239/05OCT24.

    Alternatively this can be reported to the independent charity Crimestoppers anonymously on 0800 555 111.

    MIL Security OSI

  • MIL-OSI Security: Birdton — Have you seen this stolen trailer?

    Source: Royal Canadian Mounted Police

    The Keswick RCMP Detachment is asking for the public’s help locating a stolen trailer from Birdton, N.B.

    The theft is believed to have occurred on September 30, at an open field on Crow Hill Road, in Birdton.

    The trailer is described as a white 2010 K-Z Cayote, with New Brunswick licence plate TPX 030, and vehicle identification number 4EZTC222XA8041333.

    Anyone with information about the theft, or who has seen the trailer since September 30, is asked to contact the Keswick RCMP at 506-357-4300. Information can also be provided anonymously through Crime Stoppers at 1-800-222-TIPS (8477), by downloading the secure P3 Mobile App, or by Secure Web Tips at http://www.crimenb.ca.

    MIL Security OSI

  • MIL-OSI Security: Former Castroville Police Chief Convicted of Wire Fraud

    Source: Federal Bureau of Investigation (FBI) State Crime News

    SAN ANTONIO – A federal jury convicted former Castroville Police Chief, Christopher Filline, for one count of conspiracy to commit wire fraud.

    According to court documents and evidence presented at trial, Filline, 58, developed a scheme in 2016 to defraud Farmers Insurance Group by destroying his vehicle that he insured through the company, and claiming it had been stolen. Filline arranged for two co-conspirators to take the vehicle and light it on fire using an accelerant. He subsequently filed a false report with the Lytle Police Department and an insurance claim with Farmers Insurance Group, declaring his vehicle had been stolen. The filing resulted in Filline receiving a $14,388.25 payment.

    Filline was indicted in January 2020. He faces up to 20 years in federal prison and a $250,000 fine. A sentence hearing has been set for Jan. 22, 2025.

    U.S. Attorney Jaime Esparza for the Western District of Texas made the announcement.

    The FBI, Texas Department of Public Safety, and the Bexar County Fire Marshal’s Office investigated the case.

    Assistant U.S. Attorneys Greg Surovic and Christina Playton are prosecuting the case.

    ###

    MIL Security OSI

  • MIL-OSI Security: O’Fallon, Missouri, Man Admits Child Sex Charges

    Source: Federal Bureau of Investigation (FBI) State Crime News

    ST. LOUIS – A man from O’Fallon, Missouri on Wednesday admitted engaging in sexual activity with a 15-year-old that he met online and discussing child sex with another 15-year-old victim.

    Andrew Haller, 34, pleaded guilty in U.S. District Court in St. Louis to all of the charges he faced: two counts of coercion and enticement of a minor, one count of distribution of child pornography and one count of receipt of child pornography.

    Haller admitted separately meeting two 15-year-old girls on Tumblr before moving their conversations to the encrypted app Telegram.

    The 15-year-old California victim told the FBI that Haller introduced the topic of “daddy dom,” and told her he was also sexually abusing another teen. Haller listed rules for the victim, including that she would have to ask his permission once a day to urinate, wear a collar at all times, and refer to him only as “Sir,” Dad” or “Daddy.” He also asked her for nude photos and sent her photos and videos of the other victim.

    After identifying Haller and performing a court-approved search of his home in November of 2023, the FBI identified the other victim. She told the FBI that she sent Haller sexually explicit photos at his direction. They met in person twice in 2023 and engaged in sexual activity. Haller struck her during the first visit and took pictures and videos of her, his plea says. He also discussed with her his desire to abuse children too young to talk or remember the abuse.

    Haller possessed 195 images and 92 videos of known or suspected child sexual abuse material, and sent that material to others via Telegram and Signal, another encrypted app, his plea says.

    Haller is scheduled to be sentenced Jan. 28, 2025. The coercion charge carries a mandatory minimum sentence of 10 years in prison and the child pornography charges each carry a five-year mandatory minimum sentence. Assistant U.S. Attorney Michael Hayes has agreed as part of the plea to ask for no more than 25 years in prison.

    The FBI investigated the case. Assistant U.S. Attorney Michael Hayes is prosecuting the case.

    This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by U.S. Attorneys’ Offices and the Department of Justice Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. For more information about Project Safe Childhood, please visit http://www.justice.gov/psc.

    MIL Security OSI

  • MIL-OSI Security: Defense News: NAS Pensacola Security Force Participates in Training Exercise

    Source: United States Navy

    The exercise was unrelated to any current threats, but was designed to enhance the training and readiness of Navy security personnel and better prepare Department of the Navy (DoN) personnel for potential force protection situations.

    “It’s important that we constantly evaluate our response procedures to a variety of realistic threats to enhance our personnel and force-wide readiness,” said NAS Pensacola Installation Training Officer Erich Brinkmeier. “These exercises test information dissemination, individual response plans, security force response and our ability to coordinate with local emergency responders and the community.”

    The exercise included an unmanned aerial surveillance exercise and an active shooter drill, each of which members of the NAS Pensacola Anti-Terrorism Training Team (ATTT) used to gauge readiness from responding NAS Pensacola Naval Security Forces personnel.

    “As an installation, it’s critical that we remain prepared for any potential threat,” said NAS Pensacola Commanding Officer Capt. Terry ‘Village’ Shashaty. “These exercises test our readiness to communicate efficiently across all departments and ensure the safety and security of our service members, their families and visitors to the installation.”

    For more than one hundred years, NAS Pensacola, referred to as the Cradle of Naval Aviation, has supported the operational and training missions of tenant commands, including Naval Air Technical Training Center (NATTC), Naval Aviation Schools Command (NASC), the Center for Naval Aviation Technical Training (CNATT), Marine Aviation Training Support Groups
    (MATSG) 21 and 23 and is the headquarters for Naval Education and Training Command (NETC).

    MIL Security OSI

  • MIL-OSI Security: Defense News: Carderock Hosts Small Business Industry Day and Navy Small Business Symposium with Capital Tech Bridge

    Source: United States Navy

    WEST BETHESDA, Md. – Naval Surface Warfare Center Carderock Division hosted its annual Industry Day virtually on Oct. 9, 2024. This was followed by the in-person Navy Small Business Symposium, facilitated by the NavalX Capital Tech Bridge and the Pike District Partnership, at the Bethesda North Marriott Hotel and Conference Center on Oct. 10.

    Industry Day provided a virtual platform for Carderock’s technical experts to connect with industry members and showcase Carderock’s mission, focus areas, and technical capabilities. The goal was to expand the pool of small business partners to foster innovation between the Navy and the private sector.

    Carlos Duran, Carderock’s Deputy of Small Business Programs, facilitated the virtual program in collaboration with the Capital Tech Bridge. Duran was also the 2024 recipient of Naval Sea Systems Command’s Excellence Award in Small Business.

    “The intent of Carderock’s Annual Industry Day is to share technical information with industry, so they have a better understanding of our mission and needs. This approach augments the ecosystem of technically available small business concerns that can compete for our contracts,” said Duran.

    The Navy Small Business Symposium, coordinated by Capital Tech Bridge, offered an in-person forum for small businesses to connect with the Navy, specifically Naval Sea Systems Command (NAVSEA), Naval Air Systems Command (NAVAIR), and Naval Information Warfare Systems Command (NAVWAR). The Department of the Navy Office of Small Business Programs (OSBP) provided information for participants explaining how to do business with the Navy. Presenters included Maryland APEX Accelerators and Montgomery County Economic Development Corporation (MCEDC).

    The Department of the Navy Office of Small Business Programs is “bringing more players to the field,” by inclusion of new businesses from atypical sources through its Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) programs.

    “Annually the Navy includes 21% of businesses [that] are owned by socially or economically disadvantaged persons and 41% of the businesses that participate in SBIR and STTR programs are new to the program and to the Navy. The Navy is responsible for 50% of all transitions to the commercialization phase out of the entire DoD,” said Susie Drummond, Naval Sea Systems Command SBIR/STTR Outreach.

    Capital Tech Bridge facilitated the event and continues to seek new venues to provide these connecting opportunities. This effort has expanded since the July announcement of a Partnership Intermediary Agreement between Carderock and the Pike District Partnership.

    Increased local economic development is a shared goal of Naval Surface Warfare Center Carderock Division, Capital Tech Bridge and the Pike District Partnership. By creating a welcoming business environment and new avenues for collaboration, the hope is for Montgomery County to remain a strong economic base that will support the Navy and Marine Corps mission for years to come.

    Eugene Cornelius, Director of Pike District Partnership, shared the objective of the partnership.

    “We are the advocate for economic development here in the North Bethesda area. One of the things that we have learned when it comes to small businesses and government contracting is that a lot of those in this city and [at this symposium] will need technical assistance…We’re learning as we go and we are providing information that we think is valuable to [them] as we go,” said Cornelius.

    The symposium also provided opportunities to network, share ideas and challenges, and connect directly with technical experts during the “Ask Me Anything” panel. The panel included Lauren Hanyok, Carderock’s Capital Tech Bridge director, Eugene Cornelius, Director of Pike District Partnership, and Susie Drummond, Naval Sea Systems Command SBIR/STTR Outreach, who provided keen insight into new applications, emerging technologies and ways to leverage existing capabilities.

    Hanyok provides the logistical glue and serves as a facilitator for connecting efforts like the Navy’s Small Business Symposium. In her role at Capital Tech Bridge, she also understands the value of creating Partnering Intermediary Agreements with organizations like the Pike District Partnership and Navy labs under Carderock.

    “All Navy labs have the ability to enter into Partner Intermediary Agreements with non-profits like the Pike District Partnership. They have access to county resources to help Capital Tech Bridge host its events outside of the Carderock fence line so that we can reach a bigger audience with less barriers to entry,” said Hanyok.

    “Not a lot of people in Montgomery County know what Carderock is, so partnering with a hyper-local PIA helps us better engage with the community and learn that a Navy organization is right in their backyard with not only small business opportunities, but a fantastic STEM program and there are job opportunities in all fields.”

    By fostering innovation and technological advancement, the Capital Tech Bridge aims to strengthen this partnership to driving progress that benefits both the Navy and the region. The Capital Tech Bridge encompasses a vibrant innovation ecosystem for the Navy and Marine Corps, partnering with naval warfare centers and national labs to solve complex problems for Sailors and Marines.

    For more information on the Capital Tech Bridge or upcoming events by the Capital Tech Bridge, please contact Lauren “Tink” Hanyok at lauren.w.hanyok.civ@us.navy.mil

    MIL Security OSI

  • MIL-OSI Security: Former Official Accused of Stealing Nearly $700,000 from St. Louis County Charity

    Source: Federal Bureau of Investigation (FBI) State Crime News

    ST. LOUIS – A former official of a charity that houses adults with intellectual and developmental disabilities has been indicted and accused of embezzling about $690,000 over more than a decade.

    Joelle Fouse, 57, was indicted October 9 with three felony counts of wire fraud. She is surrendering Tuesday and will appear in U.S. District Court in St. Louis to plead not guilty.

    The indictment says that Fouse was the manager / director of finance and human resources for the charity from October 2012 through December 2023, when she was terminated. Fouse was responsible for payroll, expense reimbursement and maintaining the charity’s books and records. She stole from the charity in three ways, the indictment says. Fouse provided false information to a third-party payroll processing company that caused the company to make 71 unauthorized payments totaling $139,810 to multiple bank accounts controlled by Fouse, the indictment says. The indictment also accuses Fouse of triggering 181 unauthorized expense payments into bank accounts she controlled, totaling $407,186. Finally, Fouse allegedly used her company credit card to make184 unauthorized purchases totaling $133,210. The charity also overpaid the employer portion of payroll taxes by about $10,694 due to the inflated payroll, the indictment says.

    The indictment says Fouse took cash out of ATMs and used the charity’s funds for travel, clothing, entertainment, restaurant meals, rent payments and day-to-day expenses for herself and relatives. She tried to cover up her crimes by making false entries in financial and accounting records, it says.

    The charity contacted the FBI and cooperated with their investigation.

    Charges set forth in an indictment are merely accusations and do not constitute proof of guilt.  Every defendant is presumed to be innocent unless and until proven guilty.

    Each wire fraud charge carries a penalty of up to 20 years in prison, a $250,000 fine or both prison and a fine.

    The FBI investigated the case. Assistant U.S. Attorney Hal Goldsmith is prosecuting the case. 

    MIL Security OSI

  • MIL-OSI Security: Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations

    Source: US Department of Homeland Security

    Summary

    The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), the Communications Security Establishment Canada (CSE), the Australian Federal Police (AFP), and Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) are releasing this joint Cybersecurity Advisory to warn network defenders of Iranian cyber actors’ use of brute force and other techniques to compromise organizations across multiple critical infrastructure sectors, including the healthcare and public health (HPH), government, information technology, engineering, and energy sectors. The actors likely aim to obtain credentials and information describing the victim’s network that can then be sold to enable access to cybercriminals.

    Since October 2023, Iranian actors have used brute force, such as password spraying, and multifactor authentication (MFA) ‘push bombing’ to compromise user accounts and obtain access to organizations. The actors frequently modified MFA registrations, enabling persistent access. The actors performed discovery on the compromised networks to obtain additional credentials and identify other information that could be used to gain additional points of access. The authoring agencies assess the Iranian actors sell this information on cybercriminal forums to actors who may use the information to conduct additional malicious activity.

    This advisory provides the actors’ tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs). The information is derived from FBI engagements with entities impacted by this malicious activity.

    The authoring agencies recommend critical infrastructure organizations follow the guidance provided in the Mitigations section. At a minimum, organizations should ensure all accounts use strong passwords and register a second form of authentication.

    Download the PDF version of this report:

    For a downloadable list of IOCs, see:

    Technical Details

    Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 15. See the MITRE ATT&CK Tactics and Techniques section in Appendix A for a table of the actors’ activity mapped to MITRE ATT&CK tactics and techniques.

    Overview of Activity

    The actors likely conduct reconnaissance operations to gather victim identity [T1589] information. Once obtained, the actors gain persistent access to victim networks frequently via brute force [T1110]. After gaining access, the actors use a variety of techniques to further gather credentials, escalate privileges, and gain information about the entity’s systems and network. The actors also move laterally and download information that could assist other actors with access and exploitation.

    Initial Access and Persistence

    The actors use valid user and group email accounts [T1078], frequently obtained via brute force such as password spraying [T1110.003] although other times via unknown methods, to obtain initial access to Microsoft 365, Azure [T1078.004], and Citrix systems [T1133]. In some cases where push notification-based MFA was enabled, the actors send MFA requests to legitimate users seeking acceptance of the request. This technique—bombarding users with mobile phone push notifications until the user either approves the request by accident or stops the notifications— is known as “MFA fatigue” or “push bombing” [T1621].

    Once the threat actors gain access to an account, they frequently register their devices with MFA to protect their access to the environment via the valid account:

    • In two confirmed compromises, the actors leveraged a compromised user’s open registration for MFA [T1556.006] to register the actor’s own device [T1098.005] to access the environment.
    • In another confirmed compromise, the actors used a self-service password reset (SSPR) tool associated with a public facing Active Directory Federation Service (ADFS) to reset the accounts with expired passwords [T1484.002] and then registered MFA through Okta for compromised accounts without MFA already enabled [T1556] [T1556.006].

    The actors frequently conduct their activity using a virtual private network (VPN) service [T1572]. Several of the IP addresses in the actors’ malicious activity originate from exit nodes tied to the Private Internet Access VPN service.

    Lateral Movement

    The actors use Remote Desktop Protocol (RDP) for lateral movement [T1021.001]. In one instance, the actors used Microsoft Word to open PowerShell to launch the RDP binary mstsc.exe [T1202].

    Credential Access

    The actors likely use open-source tools and methodologies to gather more credentials. The actors performed Kerberos Service Principal Name (SPN) enumeration of several service accounts and received Kerberos tickets [T1558.003]. In one instance, the actors used the Active Directory (AD) Microsoft Graph Application Program Interface (API) PowerShell application likely to perform a directory dump of all AD accounts. Also, the actors imported the tool [T1105] DomainPasswordSpray.ps1, which is openly available on GitHub [T1588.002], likely to conduct password spraying. The actors also used the command Cmdkey /list, likely to display usernames and credentials [T1555].

    Privilege Escalation

    In one instance, the actors attempted impersonation of the domain controller, likely by exploiting Microsoft’s Netlogon (also known as ”Zerologon”) privilege escalation vulnerability (CVE-2020-1472) [T1068].

    Discovery

    The actors leverage living off the land (LOTL) to gain knowledge about the target systems and internal networks. The actors used the following Windows command-line tools to gather information about domain controllers [T1018], trusted domains [T1482], lists of domain administrators, and enterprise administrators [T1087.002] [T1069.002] [T1069.003]:

    • Nltest /dclist
    • Nltest /domain_trusts
    • Nltest /domain_trusts/all_trusts
    • Net group “Enterprise admins” /domain
    • Net group “Domain admins” /domain

    Next, the actors used the following Lightweight Directory Access Protocol (LDAP) query in PowerShell [T1059.001]to search the AD for computer display names, operating systems, descriptions, and distinguished names [T1082].

                                               $i=0
                                               $D= [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()
                                               $L='LDAP://' . $D
                                               $D = [ADSI]$L
                                               $Date = $((Get-Date).AddDays(-90).ToFileTime())
                                               $str = '(&(objectcategory=computer)(operatingSystem=*serv*)(|(lastlogon>='+$Date+')(lastlogontimestamp>='+$Date+')))'
                                               $s = [adsisearcher]$str
                                               $s.searchRoot = $L.$D.distinguishedName
                                               $s.PropertiesToLoad.Add('cn') > $Null
                                               $s.PropertiesToLoad.Add('operatingsystem') > $Null
                                               $s.PropertiesToLoad.Add('description') > $Null
                                               $s.PropertiesToLoad.Add('distinguishedName') > $Null
                                               Foreach ($CA in $s.FindAll()) {
                                                             Write-Host $CA.Properties.Item('cn')
                                                             $CA.Properties.Item('operatingsystem')
                                                             $CA. Properties.Item('description')
                                                             $CA.Properties.Item('distinguishedName')
                                                             $i++
                                               }
                                               Write-host Total servers: $i

    Command and Control

    On one occasion, using msedge.exe, the actors likely made outbound connections to Cobalt Strike Beacon command and control (C2) infrastructure [T1071.001].

    Exfiltration and Collection

    In a couple instances, while logged in to victim accounts, the actors downloaded files related to gaining remote access to the organization and to the organization’s inventory [T1005], likely exfiltrating the files to further persist in the victim network or to sell the information online.

    Detection

    To detect brute force activity, the authoring agencies recommend reviewing authentication logs for system and application login failures of valid accounts and looking for multiple, failed authentication attempts across all accounts.

    To detect the use of compromised credentials in combination with virtual infrastructure, the authoring agencies recommend the following steps:

    • Look for “impossible logins,” such as suspicious logins with changing usernames, user agent strings, and IP address combinations or logins where IP addresses do not align to the user’s expected geographic location.
    • Look for one IP used for multiple accounts, excluding expected logins.
    • Look for “impossible travel.” Impossible travel occurs when a user logs in from multiple IP addresses with significant geographic distance (i.e., a person could not realistically travel between the geographic locations of the two IP addresses during the period between the logins). Note: Implementing this detection opportunity can result in false positives if legitimate users apply VPN solutions before connecting into networks.
    • Look for MFA registrations with MFA in unexpected locales or from unfamiliar devices.
    • Look for processes and program execution command-line arguments that may indicate credential dumping, especially attempts to access or copy the ntds.dit file from a domain controller.
    • Look for suspicious privileged account use after resetting passwords or applying user account mitigations.
    • Look for unusual activity in typically dormant accounts.
    • Look for unusual user agent strings, such as strings not typically associated with normal user activity, which may indicate bot activity.

    Mitigations

    The authoring agencies recommend organizations implement the mitigations below to improve organizations’ cybersecurity posture based on the actors’ TTPs described in this advisory. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA. The CPGs, which are organized to align to the National Institute of Standards and Technology (NIST) Cybersecurity Framework, are a subset of cybersecurity practices, aimed at meaningfully reducing risks to both critical infrastructure operations and the American people. These voluntary CPGs strive to help small- and medium-sized organizations kick-start their cybersecurity efforts by prioritizing investment in a limited number of essential actions with high-impact security outcomes. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.

    • Review IT helpdesk password management related to initial passwords, password resets for user lockouts, and shared accounts. IT helpdesk password procedures may not align to company policy for user verification or password strength, creating a security gap. Avoid common passwords (e.g. “Spring2024” or “Password123!”).
    • Disable user accounts and access to organizational resources for departing staff [CPG 2.D]. Disabling accounts can minimize system exposure, removing options actors can leverage for entry into the system. Similarly, create new user accounts as close as possible to an employee’s start date.
    • Implement phishing-resistant MFA [CPG 2.H]. See CISA’s resources Phishing-Resistant Multifactor Authentication and More than a Password for additional information on strengthening user credentials.
    • Continuously review MFA settings to ensure coverage over all active, internet-facing protocols to ensure no exploitable services are exposed [CPG 2.W].
    • Provide basic cybersecurity training to users [CPG 2.I] covering concepts such as:
      • Detecting unsuccessful login attempts [CPG 2.G].
      • Having users deny MFA requests they have not generated.
      • Ensuring users with MFA-enabled accounts have MFA set up appropriately.
    • Ensure password policies align with the latest NIST Digital Identity Guidelines.
      • Meeting the minimum password strength [CPG 2.B] by creating a password using 8-64 nonstandard characters and long passphrases, when possible.
    • Disable the use of RC4 for Kerberos authentication.

    These mitigations apply to critical infrastructure entities across sectors.

    The authoring agencies also recommend software manufacturers incorporate secure by design principles and tactics into their software development practices to protect their customers against actors using compromised credentials, thereby strengthening the security posture of their customers.  For more information on secure by design, see CISA’s Secure by Design webpage and joint guide.

    Validate Security Controls

    In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating organization security programs against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

    To get started:

    1. Select an ATT&CK technique described in this advisory (see Table 1 to Table 12).
    2. Align your security technologies against the technique.
    3. Test your technologies against the technique.
    4. Analyze your detection and prevention technologies’ performance.
    5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
    6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

    The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

    Contact Information

    Organizations are encouraged to report suspicious or criminal activity related to information in this advisory to:

    • CISA via CISA’s 24/7 Operations Center [report@cisa.gov or 1-844-Say-CISA (1-844-729-2472)] or your local FBI field office. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact.
    • For NSA cybersecurity guidance inquiries, contact CybersecurityReports@nsa.gov.

    Disclaimer

    The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the authoring agencies.

    Intrusion events connected to this Iranian group may also include a different set of cyber actors–likely the third-party actors who purchased access from the Iranian group via cybercriminal forums or other channels. As a result, some TTPs and IOCs noted in this advisory may be tied to these third-party actors, not the Iranian actors. The TTPs and IOCs are in the advisory to provide recipients the most complete picture of malicious activity that may be observed on compromised networks. However, exercise caution if formulating attribution assessments based solely on matching TTPs and IOCs.

    Version History

    October 2, 2024: Initial version.

    Appendix A: MITRE ATT&CK Tactics and Techniques

    See Tables 1–12 for all referenced actors’ tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

    Table 1: Reconnaissance
    Technique Title  ID Use
    Gather Victim Identity Information T1589 The actors likely gathered victim information.
    Table 2: Resource Development
    Technique Title  ID Use
    Obtain Capabilities: Tool T1588.002 The actors obtained a password spray tool through an open-source repository.
    Table 3: Initial Access
    Technique Title ID Use
    Valid Accounts T1078 The actors used password spraying to obtain valid user and group email account credentials, allowing them access to the network.
    Valid Accounts: Cloud Accounts T1078.004 The actors used accounts hosted on Microsoft 365, Azure, and Okta cloud environments as additional methods for initial access.
    External Remote Services T1133 The actors exploited Citrix systems’ external-facing remote services as another method for gaining initial access to the system.
    Table 4: Execution
    Technique Title  ID Use
    Command and Scripting Interpreter: PowerShell T1059.001 The actors used PowerShell commands to maintain and expand access.
    Table 5: Persistence
    Technique Title ID Use
    Account Manipulation: Device Registration T1098.005 The actors used PowerShell commands to maintain and expand access.
    Modify Authentication Process T1556 The actors used a public facing Active Directory Federation Service (ADFS) domain to reset the passwords of expired accounts.
    Modify Authentication Process: Multi-Factor Authentication T1556.006 The actors used an MFA bypass method, such as Multi-Factor Authentication Request Generation, providing the ability to modify or completely disable MFA defenses.
    Table 6: Privilege Escalation
    Technique Title ID Use
    Exploitation for Privilege Escalation T1068 The actors attempted impersonation of the domain controller likely by exploiting CVE-2020-1472, Microsoft’s Netlogon Privilege Escalation vulnerability.
    Domain or Tenant Policy Modification: Trust Modification T1484.002 The actors leveraged a public-facing ADFS password reset tool to reactivate inactive accounts, allowing the actor to authenticate and enroll their devices as any user in the AD managed by the victim tenant.
    Table 7: Defense Evasion
    Technique Title ID Use
    Indirect Command Execution T1202 The actors attempted impersonation of the Domain Controller likely by exploiting CVE-2020-1472, Microsoft’s Netlogon Privilege Escalation vulnerability.
    Table 8: Credential Access
    Technique Title ID Use
    Brute Force: Password Spraying T1110.003 The actors targeted applications, including Single Sign-on (SSO) Microsoft Office 365, using brute force password sprays and imported the tool DomainPasswordSpray.ps1.
    Credentials from Password Stores T1555 The actors used the command Cmdkey /list likely to display usernames and credentials.
    Steal or Forge Kerberos Tickets: Kerberoasting T1558.003 The actors performed Kerberos Service Principal Name (SPN) enumeration of several service accounts and received Rivest Cipher 4 (RC4) tickets.
    Multi-Factor Authentication Request Generation T1621 The actors sent MFA requests to legitimate users.
    Table 9: Discovery
    Technique Title ID Use
    Remote System Discovery T1018 The actors used LOTL to return information about domain controllers.
    Permission Groups Discovery: Domain Groups T1069.002 The actors used LOTL to return lists of domain administrators and enterprise administrators.
    Permission Groups Discovery: Cloud Groups T1069.003 The actors used LOTL to return lists of domain administrators and enterprise administrators.
    System Information Discovery  T1082 The actors were able to query the AD to discover display names, operating systems, descriptions, and distinguished names from the computer.
    Account Discovery: Domain Account T1087.002 The actors used LOTL to return lists of domain administrators and enterprise administrators.
    Domain Trust Discovery T1482 The actors used LOTL to return information about trusted domains.
    Table 10: Lateral Movement
    Technique Title  ID Use
    Remote Services: Remote Desktop Protocol T1021.001 The actors used Microsoft Word to open PowerShell to launch RDP binary mstsc.exe.
    Table 11: Collection
    Technique Title ID Use
    Data from Local System T1005 The actors downloaded files related to remote access methods and the organization’s inventory.
    Table 12: Command and Control
    Technique Title ID Use
    Application Layer Protocol: Web Protocols T1071.001 The actors used msedge.exe to make outbound connections likely to Cobalt Strike Beacon C2 infrastructure.
    Ingress Tool Transfer T1105 The actors imported a tool from GitHub and used it to conduct password spraying.
    Protocol Tunneling T1572 The actors frequently conduct targeting using a virtual private network (VPN).

    Appendix B: Indicators of Compromise

    See Tables 13 to 15 for IOCs obtained from FBI investigations.

    Table 13: Malicious Files Associated with Iranian Cyber Actors
    Hash Description
    1F96D15B26416B2C7043EE7172357AF3AFBB002A Associated with malicious activity.
    3D3CDF7CFC881678FEBCAFB26AE423FE5AA4EFEC Associated with malicious activity.

    Disclaimer: The authoring organizations recommend network defenders investigate or vet IP addresses prior to taking action, such as blocking, as many cyber actors are known to change IP addresses, sometimes daily, and some IP addresses may host valid domains. Many of the IP addresses provided below are assessed VPN nodes and as such are not exclusive to the Iranian actors’ use. The authoring organizations do not recommend blocking these IP addresses based solely on their inclusion in this JCSA. The authoring organizations recommend using the below IP addresses to search for previous activity the actors may have conducted against networks. If positive hits for these IP addresses are identified, the authoring organizations recommend making an independent determination if the observed activity aligns with the TTPs outlined in the JCSA. The timeframes included in the table reflect the timeframe the actors likely used the IPs.

    Table 14: Network Indicators
    IP Address Date Range
    95.181.234.12 01/30/2024 to 02/07/2024
    95.181.234.25 01/30/2024 to 02/07/2024
    173.239.232.20 10/06/2023 to 12/19/2023
    172.98.71.191 10/15/2023 to 11/27/2023
    102.129.235.127 10/21/2023 to 10/22/2023
    188.126.94.60 10/22/2023 to 01/12/2024
    149.40.50.45 10/26/2023
    181.214.166.59 10/26/2023
    212.102.39.212 10/26/2023
    149.57.16.134 10/26/2023 to 10/27/2023
    149.57.16.137 10/26/2023 to 10/27/2023
    102.129.235.186 10/29/2023 to 11/08/2023
    46.246.8.138 10/31/2023 to 01/26/2024
    149.57.16.160 11/08/2023
    149.57.16.37 11/08/2023
    46.246.8.137 11/17/2023 to 01/25/2024
    212.102.57.29 11/19/2023 to 01/17/2024
    46.246.8.82 11/22/2023 to 01/28/2024
    95.181.234.15 11/26/2023 to 02/07/2024
    45.88.97.225 11/27/2023 to 02/11/2024
    84.239.45.17 12/04/2023 to 12/07/2023
    46.246.8.104 12/07/2023 to 02/07/2024
    37.46.113.206 12/07/2023
    46.246.3.186 12/07/2023 to 12/09/2023
    46.246.8.141 12/07/2023 to 02/10/2024
    46.246.8.17 12/09/2023 to 01/09/2024
    37.19.197.182 12/15/2023
    154.16.192.38 12/25/2023 to 01/24/2024
    102.165.16.127 12/27/2023 to 01/28/2024
    46.246.8.47 12/29/2023 to 01/29/2024
    46.246.3.225 12/30/2023 to 02/06/2024
    46.246.3.226 12/31/2023 to 02/03/2024
    46.246.3.240 12/31/2023 to 02/06/2024
    191.101.217.10 01/05/2024
    102.129.153.182 01/08/2024
    46.246.3.196 01/08/2024
    102.129.152.60 01/09/2024
    156.146.60.74 01/10/2024
    191.96.227.113 01/10/2024
    191.96.227.122 01/10/2024
    181.214.166.132 01/11/2024
    188.126.94.57 01/11/2024 to 01/13/2024
    154.6.13.144 01/13/2024 to 01/24/2024
    154.6.13.151 01/13/2024 to 01/28/2024
    188.126.94.166 01/15/2024
    89.149.38.204 01/18/2024
    46.246.8.67 01/20/2024
    46.246.8.53 01/22/2024
    154.16.192.37 01/24/2024
    191.96.150.14 01/24/2024
    191.96.150.96 01/24/2024
    46.246.8.10 01/24/2024
    84.239.25.13 01/24/2024
    154.6.13.139 01/26/2024
    191.96.106.33 01/26/2024
    191.96.227.159 01/26/2024
    149.57.16.150 01/27/2024
    191.96.150.21 01/27/2024
    46.246.8.84 01/27/2024
    95.181.235.8 01/27/2024
    191.96.227.102 01/27/2024 to 01/28/2024
    46.246.122.185 01/28/2024
    146.70.102.3 01/29/2024 to 01/30/2024
    46.246.3.233 01/30/2024 to 02/15/2024
    46.246.3.239 01/30/2024 to 02/15/2024
    188.126.89.35 02/03/2024
    46.246.3.223 02/03/2024
    46.246.3.245 02/05/2024 to 02/06/2024
    191.96.150.50 02/09/2024
    Table 15: Devices
    Device Type Description
    Samsung Galaxy A71 (SM-A715F) Registered with MFA
    Samsung SM-G998B Registered with MFA
    Samsung SM-M205F Registered with MFA

    MIL Security OSI

  • MIL-OSI Security: Île-à-la-Crosse  — Île-à-la-Crosse RCMP seize cocaine in traffic stop

    Source: Royal Canadian Mounted Police

    On October 12, 2024 at approximately 3:00 a.m., Île-à-la-Crosse RCMP conducted a traffic stop on Highway #155 near Île-à-la-Crosse.

    During the traffic stop, officers located and seized a small amount of cocaine, a large sum of cash and drug trafficking paraphernalia. The adult male driver and adult female passenger were arrested at the scene.

    As a result of investigation, 46-year-old Jamey Hanson and 31-year-old Ashley Desjarlais, both from Buffalo Narrows, were charged with:

    • one count, possession for the purpose of trafficking – cocaine, Section 5(2), Controlled Drugs and Substances Act;
    • one count, possession of property obtained by crime over $5000, Section 354(1)(a), Criminal Code.

    Hanson and Desjarlais will appear in Meadow Lake Provincial Court on October 15, 2024.

    MIL Security OSI

  • MIL-OSI Security: Sagkeeng First Nation — Powerview RCMP investigating homicide

    Source: Royal Canadian Mounted Police

    On October 14, 2024, at approximately 12:20 am, Powerview RCMP received a report of a female being assaulted on Northshore Road in Sagkeeng First Nation. Officers attended immediately and located a 26-year-old female at the side of the road. She was pronounced deceased on scene.

    Police were able to track the suspect to a nearby residence. RCMP Major Crime Services deployed and took carriage of the investigation.

    A 15-year-old male has been arrested and charged with Second Degree Murder in relation to the female’s death. An autopsy is scheduled to be completed October 15, 2024.

    The investigation continues.

    MIL Security OSI

  • MIL-OSI Security: Defense News: Fleet to Faculty: GM1 Smith’s Impact as an Instructor at SCSTC San Diego

    Source: United States Navy

    NETC and SCSTC: Delivering Fleet-Ready Training

    SCSTC San Diego, part of the Naval Education and Training Command (NETC), is charged with the vital mission of training Sailors for success in the fleet. NETC’s training infrastructure, including SCSTC and its other subordinate commands, focuses on equipping Sailors with relevant, real-world skills for operational readiness.

    “NETC’s training programs are built on the strength of passionate instructors and fleet-relevant equipment,” Smith shares. “It’s one thing to read about a system, but when Sailors work on the same equipment they’ll use in the fleet, they’re more confident and prepared to fulfill their roles.”

    By combining knowledgeable instructors with real-world technology, NETC ensures that Sailors are ready to apply their skills immediately, contributing directly to mission success.

    Mentorship and Success in the Classroom

    As an instructor at SCSTC, Smith serves as a mentor to students, guiding them through the technical challenges of their coursework. Reflecting on one student’s journey, Smith describes how they struggled initially with the course’s technical depth but demonstrated a steadfast determination to learn.

    “This student had a strong will to learn, so we took the time to break down the lessons into manageable pieces,” Smith explains. “Once they had a solid foundation, it was incredible to see them build on that knowledge and graduate at the top of their class. Moments like these are why I teach.”

    Smith’s dedication to mentorship ensures that Sailors are not only knowledgeable but also empowered to overcome obstacles and succeed.

    Essential Qualities for Success in Navy Training

    Smith emphasizes that success in NETC’s demanding programs goes beyond technical knowledge; personal qualities are just as critical.

    “The best qualities for success here are a positive attitude, willingness to learn, resiliency, and a growth mindset,” she says. “A positive attitude keeps you motivated, resiliency helps you push through challenges, willingness to learn broadens your skills, and a growth mindset allows you to learn from mistakes and continuously improve.”

    These qualities enable Sailors to excel in their training and maximize the opportunities provided by NETC.

    Looking to the Future: A Career of Growth and Opportunity

    From her time aboard USS Pinckney to her current role at SCSTC, Smith’s career reflects the Navy’s commitment to developing combat-ready Sailors. Now serving as a Leading Petty Officer and the Cardiopulmonary Resuscitation (CPR) coordinator for SCSTC, Smith continues to shape the future of the fleet by training and mentoring the next generation of Navy warfighters.

    “The Navy has given me opportunities I never imagined,” she reflects. “As an instructor, I’m honored to help shape the Sailors who will carry out the Navy’s mission in the future.”

    Through NETC’s programs, Smith and her fellow instructors provide a foundation of knowledge, resilience, and dedication, preparing Sailors to tackle the challenges of tomorrow.

    Smith’s journey from fleet Sailor to instructor at SCSTC San Diego demonstrates the vital role of NETC and its subordinate commands in providing top-tier, hands-on training that prepares Sailors for the complex demands of modern naval warfare. Her leadership and dedication continue to inspire Sailors, ensuring that the Navy remains equipped with technically proficient and highly motivated personnel.

    For more information on the training programs offered by NETC and SCSTC, visit https://www.netc.navy.mil/

    MIL Security OSI

  • MIL-OSI Security: Fostering security-related scientific cooperation with Romania through NATO’s SPS Programme

    Source: NATO

    On Wednesday (16 October 2024), members of NATO’s Science for Peace and Security (SPS) team were in Bucharest to announce an upcoming call for proposals on security-related scientific cooperation. The new call invites researchers from Romania, as well as other NATO and partner nations, to submit proposals for collaborative research activities.

    The information day was also an opportunity to mark Romania’s twentieth anniversary in NATO and highlight how Romania’s scientific community has contributed to NATO over the years. Dignitaries and researchers alike gathered to mark past and current successes of cooperation through the Science for Peace and Security Programme.

    Thanks to one project, medical specialists have been able to use telemedicine to remotely assist during major disasters, and another SPS project helped build operational capabilities for civil protection in Mauritania. One of the current SPS activities involving Romania helps strengthen the Republic of Moldova’s capacity to respond to Chemical, Biological, Radiological, and Nuclear (CBRN) incidents.

    The SPS information day was co-organized with the Ministry of Research, Innovation and Digitalization and the Military Technical Academy of the Ministry of Defence of Romania. 

    MIL Security OSI

  • MIL-OSI Security: NATO Defence Ministers to advance work on deterrence and defence, support to Ukraine and global partnerships

    Source: NATO

    As NATO Defence Ministers prepare to meet at NATO Headquarters in Brussels on Thursday and Friday (17-18 October 2024), Secretary General Mark Rutte previewed the expected outcomes of the meeting in a press conference at NATO Headquarters.

    Allies need “to move further and faster to meet the growing threats we face”, he explained, adding that ”this requires more forces, capabilities and investment to meet the ambitious targets set by our defence plans.” Mr Rutte listed expanded defence industrial capacity, more robust supply chains and new technologies as critical to ensuring the Alliance remains resilient across all domains. He said he expected Ministers to greenlight a new NATO initiative to improve standardisation, explaining that “better implementation of standards can help reduce the cost of defence procurement, so this is essential work for NATO.”
     
    The Secretary General reaffirmed that NATO stands shoulder-to-shoulder with Ukraine, both now and into the future. NATO Defence Ministers will meet with their Ukrainian counterpart, Rustem Umerov in the NATO-Ukraine Council on Thursday evening to discuss the battlefield situation and Ukraine’s most urgent needs. Mr Rutte indicated that work is well on track both to set up the new NATO command in Wiesbaden to coordinate security assistance and training for Ukraine, and to deliver on the pledge of 40 billion euros in military aid for Ukraine. He announced that “NATO Allies provided 20.9 billion euros in military assistance to Ukraine during the first half of 2024 and Allies are on track to meet their commitments for the rest of the year”, adding that “the message is clear: NATO is delivering for Ukraine, and we will continue to do so.”
     
    The Defence Ministers’ meeting will also be an opportunity to exchange views on the current global security situation with NATO’s close partners in the Indo-Pacific and with the European Union. For the first time, Defence Ministers from Australia, Japan, New Zealand and the Republic of Korea are joining a NATO Defence Ministers’ meeting. “In this more interconnected world, it is vital that we tackle our shared security challenges together” the Secretary General concluded.

    MIL Security OSI

  • MIL-OSI Security: Edmonton — Fraudster arrested for money laundering offences via hawala system

    Source: Royal Canadian Mounted Police

    The RCMP Federal Policing Northwest Region’s Provincial Financial Crime Team (PFCT) in Edmonton has charged an Airdrie resident with fraud and money laundering-related offences.

    Between January and July 2023, the accused is alleged to have fraudulently received in excess of $100,000 from domestic and international victims who sent money via e-transfer and wire transfer to purchase goods from online sales platforms. The fraudulent sales included goods such as hay bales, deer antlers, antiseptic cleaning wipes and sea urchins.

    The accused is also believed to have been running an informal value transfer system, known as hawala, using trade-based money laundering methods that contravene the Proceeds of Crime (Money Laundering) and Terrorist Financing Act (PCMLTFA).

    Mbua Ngomba Kalla, 49, a resident of Airdrie, was charged was arrested and charged with:

    • Theft over $5,000 contrary to section 380(1)(a) of the Criminal Code;
    • Possession of property obtained by crime contrary to section 355(a) of the Criminal Code;
    • Failure to register as a money service business contrary to section 11.1 of the PCMLTFA;
    • Failure to report large value transactions contrary to section 12 of the PCMLTFA; and,
    • Failure to verify identity contrary to section 74(1) of the PCMLTFA.

    Kalla is scheduled to appear in the Airdrie Provincial Court on Oct. 17, 2024.

    “By working with our partners at the Financial Transactions and Reports Analysis Centre of Canada and law enforcement agencies across Canada, we found that the individual used the internet to commit multiple frauds with victims across western Canada and abroad.”

    • Insp. John Lamming, RCMP Federal Policing Northwest Region

    If you believe you may be a victim of fraud, or are currently being targeted by fraud, please report it to your local law enforcement and the Canadian Anti-Fraud Centre (CAFC) at 1-888-495-8501. Instances of compromised personal and/or financial information should be reported to your bank and credit card company. To learn more about the various types of frauds and scams, please visit the CAFC’s scam webpage.

    The Provincial Financial Crime Team is a specialized unit that conducts investigations relating to multi-jurisdictional serious fraud, investment scams and corruption.

    MIL Security OSI

  • MIL-OSI Security: Met detectives secure justice following the murder of a teenager in Dagenham

    Source: United Kingdom London Metropolitan Police

    Four men have been jailed for a total of 91 years after being found guilty of fatally stabbing an 18-year-old in Dagenham thanks to the work of dedicated Met officers.

    Wazabakana Kukabu, known as Jordan to his loved ones, was tragically murdered last year (May 2023).

    At the Old Bailey on Tuesday, 15 October, Michael Tommy-Mbogba, 21 (13.12.02) of Arkwrights, Harlow was sentenced to 29 years. Toulwalase Odunewu, 18 (22.10.05) of Angel Way, Romford was also sentenced to 23 yea

    rs in prison.

    A 16-year-old boy – who cannot be named for legal reasons – was also sentenced to 16 years for the same murder, while a 17-year-old – who also cannot be named – was sentenced to 23 years.

    Detective Chief Inspector Laura Semple, who led the investigation, said: “I want to extend our deepest condolences to Jordan’s family and those who knew him – our thoughts very much remain with them today.

    “I would also like to thank those witnesses who came forward and provided crucial evidence during the trial, as well as acknowledge the incredible efforts of those Met officers and other emergency service staff who tried so desperately to save Jordan’s life.

    “Knife crime has a devastating impact on our communities and rips families apart – that’s why we’re committed to doing everything in our power to work with partners and charities, such as the Ben Kinsella Trust, to protect young people and make London safer.”

    At around 23:45hrs on Friday, 5 May 2023, Jordan and his friend drove to Dagenham Heathway station, where they parked their car. The four defendants were already nearby and moved towards the vehicle brandishing machetes. One of the defendants stabbed Jordan in the chest while he sat in the back seat.

    He managed to sprint away and stop a passing car for help, but quickly collapsed on the road.

    Police officers on patrol nearby provided CPR but Jordan was sadly pronounced dead a short time later.

    Detectives immediately launched an investigation and pieced together CCTV of the attack and the defendants leaving the scene. They identified witnesses as part of the investigation, who came forward and supplied crucial evidence.

    One explained that he had seen the defendants sitting on the top deck of a bus after the murder re-enacting the fatal attack they had just carried out.

    Met search teams found a blood-stained knife close to the scene, which was tested and matched to Tommy-Mbogba. Fingerprints were also found in a taxi, which the group had used later that night.

    The 17-year-old boy was also found guilty of the attempted murder of Jordan’s friend, while the other three defendants were found guilty of Grievous Bodily Harm (GBH) against the same victim.

    All were also found guilty of a separate incident of violent disorder, which had taken place two days previously.

    In a statement Jordan’s father said: “I want to take this opportunity to thank the judge, the prosecution team and the investigation team for all the hard work. My son possessed beauty both inside and out. He had a pure heart and was so gentle he would not harm anyone, yet his life was taken so prematurely. I can only visit Jordan’s grave and mourn the loss of his beautiful presence to this world.”

    In a statement Jordan’s mother said: “Words will never explain the pain and devastation I have writing this. Jordan has a family who love him so much and you took my precious son away from us. He always showed his whole family and everyone who knew him love and affection.”

    If you are concerned about knife crime or know somebody who carries a weapon, has been a victim or is at risk of becoming a victim – please visit the Crimestoppers website or the Met’s ‘Stop Knife Crime’ web pages.

    Note to Editors

    There is no video footage of the incident available for release at the request of Jordan’s family.

    All four defendants were previously found guilty at a trial at Old Bailey on Monday, 17 June 2024.

    MIL Security OSI

  • MIL-OSI Security: INTERPOL operation nets terror suspects, cash and illegal weapons

    Source: Interpol (news and events)

    16 October 2024

    LYON, France – An INTERPOL counter-terrorism operation to strengthen border security has enabled millions of crosschecks against international databases, resulting in 66 arrests, significant seizures and the identification of 81 individuals subject to INTERPOL notices and diffusions.
    Operation Neptune VI brought together law enforcement agencies from 14 countries with the goal of bolstering security measures and responses around the maritime routes across the Mediterranean Sea, as well as in airports and at land borders in the participating countries.
    The initiative, carried out in cooperation with WCO, FRONTEX and Europol, equipped teams with handheld devices and gave local authorities expanded access to INTERPOL databases.
    The operation focused on identifying and analysing the movement patterns of Foreign Terrorist Fighters and people with links to terrorism as well as criminal groups responsible for cross-border crimes such as drug trafficking, weapons smuggling and human trafficking.
    During Neptune VI, which ran for approximately two weeks in each country, officers on the ground also checked INTERPOL records of stolen vehicles and lost or stolen travel documents, which are both key assets for facilitating terrorist funding and mobility.
    By the end of the operation on 16 September 2024, more than 16 million crosschecks had been made against the various INTERPOL databases, generating 187 ‘hits’.
    A dozen arrests were made on the basis of INTERPOL Red Notices. Another 54 people were apprehended under national arrest warrants and for crimes detected at the border, including drugs and fraud offenses as well as the smuggling of gold, cash and weapons.

    Cyprus: Seizure displayed during Operation Neptune VI

    France: Documents being verified at the border

    France: Millions of database crosschecks were made during the international operation

    Iraq: Document verification during Operation Neptune VI

    Albania: The operation brought together law enforcement agencies from 14 countries

    Albania: Vehicle undercarriage check

    Albania: K9 inspection

    Algeria: Document inspection during Operation Neptune VI

    Algeria: Document check

    Bulgaria: The operation aimed to strengthen border security

    Red and Blue Notices to catch and track terror suspects

    One suspect detained as part of the operation was the subject of a Red Notice for a terror attack carried out 23 years ago on a church in Pakistan. The fugitive is being held by local authorities as extradition procedures are carried out.
    In another case, airport border police blocked entry to an individual who was the subject of an INTERPOL Blue Diffusion, issued in 2015.  The person had previously travelled to join ISIS through a European country.
    In contrast to a Red Notice which can form the basis for provisional arrest, a Blue Notice or diffusion is a request between INTERPOL member countries to collect additional information about a person’s identity, location or activities, in relation to a criminal investigation. During the Neptune VI operation, 29 subjects of Blue Notices and Diffusions were identified, allowing officers to track individuals with links to terrorism.

    In Montenegro, border police detained a traveller suspected of using a counterfeit passport. Utilizing INTERPOL’s secure global police communications system (I-24/7), they verified the document with the issuing authorities, confirming it was a forgery. It was also discovered that the suspect was wanted for attempted murder. A Red Notice was promptly issued, requesting the suspect’s arrest and extradition.

    Strengthened border controls lead to important seizures

    The arrests made during Neptune VI were just one facet of the operation’s broad success in strengthening border control. The initiative yielded significant seizures, including EUR 549,000 in undeclared cash, gold worth EUR 10 million, 25 kilograms of cannabis, 35 stolen vehicles, and several illegal rifles and ammunition.
    Additionally, Bulgarian border officials recovered two Glock pistols in the possession of an individual travelling with a fraudulent ID card. Notably, the pistol frames had been purchased as components in Central Europe, while the other parts had been falsely declared as exported to North America.

    Bulgaria: Two Glock pistols were seized

    Bulgaria: Database checking in progress

    Morocco: K9 Inspection during Operation Neptune VI

    Portugal: Document verification

    Portugal: The operation generated 187 ‘hits’ on INTERPOL databases

    Spain: A vehicle check point

    Spain: Overall 66 people were apprehended as part of Operation Neptune VI

    Spain: INTERPOL equipped local police with access to international databases

    Italy: The operation focused on identifying people with links to terrorism and cross-border crimes

    Italy: Inspection team carries out checks

    Italy: A search in progress

    Montenegro: K9 inspection of vehicles at border

    Montenegro: K9 vehicle inspection

    Morocco: Officers have access to INTERPOL’s international databases

    Greg Hinds, INTERPOL’s Counter-Terrorism Director said:
    “By working together and equipping law enforcement agencies with the frontline tools they need, we can disrupt the activities of terrorists and criminals and bring them to justice. The operation’s results demonstrate the importance of sharing intelligence and best practices among countries to combat the evolving threats of terrorism and organized crime.”
    Neptune VI is funded by Global Affairs Canada, WCO and Frontex.

    Participating countries:

    Albania, Algeria, Bulgaria, Cyprus, France, Iraq, Italy, Jordan, Lebanon, Montenegro, Morocco, Portugal, Spain, and Tunisia.

    MIL Security OSI

  • MIL-OSI Security: U.S., UAE Forces Begin Exercise Iron Defender in Arabian Gulf

    Source: United States Naval Central Command

    MANAMA, Bahrain —

    U.S. Navy, Marine Corps and Coast Guard forces joined the United Arab Emirates naval defense force for exercise Iron Defender 24, Oct. 14-24. This maritime exercise will take place in the UAE and its territorial and coastal waters.

    The combined bilateral exercise is designed to broaden levels of cooperation, support long term regional security, and enhance interoperability. Scenarios included: visit, board, search and seizure, unmanned system integration, harbor defense, diving, medical training, and training at sea.

    This is one of many exercises in which the U.S. military participates with partner nations in the Middle East intended to enhance partnerships and interoperability.

    The U.S. 5th Fleet area of operations encompasses nearly 2.5 million square miles of water area and includes the Arabian Gulf, Gulf of Oman, Red Sea, parts of the Indian Ocean and three critical choke points at the Strait of Hormuz, Suez Canal and Bab al-Mandeb.

    MIL Security OSI

  • MIL-OSI Security: Makwa Sahgaiehcan First Nation — Loon Lake RCMP ask public to report sightings of Christian Mitsuing

    Source: Royal Canadian Mounted Police

    On October 13, 2024 at approximately 7 p.m., Loon Lake RCMP received a report of a firearm discharge on Makwa Sahgaiehcan First Nation. Officers immediately responded.

    Officers investigated and determined no injuries were associated with the report.

    During the course of investigation, an officer was out of their police vehicle taking statements. An ATV with a male driver and female passenger suddenly drove toward the officer at high speed. The officer had to quickly move out of the way to avoid being struck. The ATV then fled.

    The officer did not report physical injuries.

    The next day, officers were patrolling on Makwa Sahgaiehcan First Nation. They observed the ATV from the previous night’s incident. Officers attempted to stop the ATV but it fled.

    As a result of continued investigation, 31-year-old Christian Mitsuing from Makwa Sahgaiehcan First Nation is charged with:

    – two counts, operation while prohibited, Section 320.18(1)(a), Criminal Code;

    – one count, dangerous operation of a motor vehicle, Section 320.13(1), Criminal Code;

    – one count, assault with weapon on police officer, Section 270(1)(a), Criminal Code; and

    – one count, flight from peace officer, Section 320.13, Criminal Code.

    A warrant has been issued for his arrest and Loon Lake RCMP is actively working to locate him. Investigators ask members of the public to report all sightings of Christian Mitsuing and information on his whereabouts.

    Christian Mitsuing is described as approximately 5’10” and 180 lbs. He has black hair and brown eyes. He has numerous small tattoos on his face.

    If you see Christian Mitsuing, do not approach him. Call Loon Lake RCMP by dialling 310-RCMP. Information can also be submitted anonymously by contacting Saskatchewan Crime Stoppers at 1-800-222-TIPS (8477) or http://www.saskcrimestoppers.com.

    MIL Security OSI

  • MIL-OSI Security: Data Center Company CEO Indicted for Major Fraud and Making False Statements to the U.S. Securities and Exchange Commission

    Source: United States Attorneys General

    A federal grand jury in the District of Columbia returned an indictment yesterday charging a Maryland man with major fraud against the United States and making false statements to the U.S. Securities and Exchange Commission (SEC) for his alleged participation in a scheme to deceive the SEC into thinking his company’s data center was certified at the highest rating level for reliability, availability, and security, when it was not.

    According to the indictment, Deepak Jain, 49, of Potomac, was the CEO of an information technology services company (referred to in the indictment as Company A) that provided data center services to customers, including the SEC. From 2012 through 2018, the SEC paid Company A approximately $10.7 million for the use of Company A’s data center in Beltsville, Maryland.

    As alleged in the indictment, Jain created an entity called Uptime Council, which purported to inspect and audit data centers. In order to obtain the SEC data center contract and conceal that Company A did not meet the SEC contract’s requirements, Jain allegedly drafted Uptime Council certification letters, which falsely claimed Uptime Council had certified Company A’s data center as a Tier IV data center, the highest possible rating for reliability, availability, and security. Throughout the pendency of the contract between Company A and the SEC, the SEC experienced several issues with Company A’s data center, including issues with security, cooling, and power — all of which were subjects of the standard referenced in the fraudulent Uptime Council certification letters.

    “As alleged in the indictment, Jain orchestrated a years-long scheme to defraud the SEC by falsely certifying that his company’s data center met the highest rating level, when the actual rating did not satisfy the SEC contract,” said Principal Deputy Assistant Attorney General Nicole M. Argentieri, head of the Justice Department’s Criminal Division. “Jain allegedly sought to enrich himself and his company at the expense of the reliability, availability, and security of the SEC’s electronic data. Yesterday’s charges make clear that the Criminal Division will not tolerate fraud schemes that threaten the security of the government’s electronic data.”

    “This indictment demonstrates our shared commitment with the Justice Department to hold bad actors accountable for engaging in schemes to defraud the SEC that undermine the integrity and fairness of the government procurement process,” said Inspector General Deborah Jeffrey of the SEC.

    Jain is charged with six counts of major fraud against the United States and one count of making false statements. If convicted, he faces a maximum penalty of 10 years in prison on each count of major fraud and a maximum penalty of five years in prison on the making false statements count.

    The SEC Office of Inspector General is investigating the case.

    Senior Litigation Counsel Vasanth Sridharan and Trial Attorney Spencer Ryan of the Criminal Division’s Fraud Section are prosecuting the case.

    If you believe you are a victim in this case, please contact the Fraud Section’s Victim Witness Unit toll-free at (888) 549-3945 or by email at victimassistance.fraud@usdoj.gov.

    An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: Houston Man Guilty in $160 Million Medicare Fraud Scheme

    Source: Federal Bureau of Investigation FBI Crime News (b)

    HOUSTON – A 59-year-old Houston man has been convicted of all 15 counts as charged for heading a massive Medicare fraud scheme involving the fraudulent billing of expensive topical creams, announced U.S. Attorney Alamdar S. Hamdani.  

    The jury deliberated for less than five hours before convicting Mohamad Mokbel following a 10-day trial. 

    From 2014 through 2021, Mohamad Mokbel led a company called 4M Pharmaceuticals which operated 14 pharmacies with straw owners. The jury heard evidence that Mokbel illegally purchased thousands of Medicare beneficiaries, including their identification number, personal health and physician information. Mokbel targeted elderly diabetic patients who are dependent on diabetic testing supplies to manage their blood sugar levels. Mokbel paid $16 to $40 per Medicare beneficiary.  

    To maximize reimbursements and without regard for medical necessity, Mokbel then directed 4M employees to use the Medicare beneficiaries’ patient data to run insurance claims to determine if Medicare or other insurance plans would cover and reimburse at a high rate for the topical creams, Omega-3 pills and other medications that Mokbel intended to sell through 4M pharmacies.

    At Mokbel’s direction, 4M employees would then fax pre-filled prescription requests to the patients’ doctors appearing to be for diabetic testing supplies with topical creams added at the bottom. They also included false representations that the patient was requesting a 4M Pharmacy fill their medications. In reality, Mokbel had previously purchased the patient’s personal information, the patient had not selected a 4M Pharmacy and the patient was often unaware the request was being made on their behalf. 

    Many doctors apparently took the representations in the fax at face value and did sign and send back the prefilled prescription requests to 4M. Mokbel’s call center in Houston and later in Egypt then contacted the patients and made false and misleading statements about the topical cream and their doctor’s order. Mokbel’s pharmacies then shipped out numerous topical creams, often on auto-refill, and excessively billed Medicare, Medicaid and private insurance plans. 

    Mokbel made over $200 million as a result of the scheme. 

    From 2015 through 2020, Mokbel also corruptly gave a series of bribe payments, ranging from $2,000 to $5,000 and totaling over $188,000 an employee of a pharmacy benefits manager – OptumRx – in exchange for favorable treatment for 4M pharmacies. They were credentialed and recredentialed with OptumRx which allowed them to enter into retail network agreements with OptumRx, participate in the Medicare Part D program and submit claims for prescriptions for Medicare beneficiaries. Mokbel also received information and advice about responding to audits and preventing and/or delaying OptumRX termination of many 4M pharmacies.

    U.S. District Judge Lee H. Rosenthal accepted the verdict and set sentencing for Jan. 7, 2025. At that time, Mokbel faces up to 20 years for conspiracy to commit mail fraud and health care fraud, 10 years for each of five counts of health care fraud, each of six counts of money laundering and one count of bribery concerning programs receiving federal funds as well as five years for

    conspiracy to violate the Anti-Kickback Statute and conspiracy to commit bribery. He could also be ordered to pay up to a total of $4 million in fines and possible restitution in excess of $160 million.      

    Previously released on bond, Mokbel was taken into custody pending sentencing.

    The FBI, IRS Criminal Investigation, Homeland Security Investigations, Department of Health and Human Services, Food and Drug Administration and the Texas Attorney General Medicaid Fraud Control Unit conducted the investigation. Assistant U.S. Attorneys Kathryn Leigh Olson and Adam Laurence Goldman are prosecuting the case.

    MIL Security OSI

  • MIL-OSI Security: Two men arrested as victim named following a fatal shooting in Barking

    Source: United Kingdom London Metropolitan Police

    Two men have been arrested by detectives investigating a fatal shooting in Barking.

    Police were called at approximately 04:35hrs on Sunday, 13 October to reports of a man injured in Linton Road, Barking.

    Officers and London Ambulance Service attended and found a man suffering a gunshot injury. Despite the best efforts of the emergency services he was pronounced dead on scene.

    He has today been named as Hanif Redwood, who was aged 32. His family continue to be supported by specialist officers.

    A special post mortem revealed that he died of a single gunshot wound to the head.

    Two men have been arrested on suspicion of murder, they remain in custody in an East London police station.

    Detective Chief Inspector Mark Rodgers, who is leading the investigation, said: “We continue to work at a fast pace to progress this investigation. We have made two arrests which is a positive step forward into building a picture of what happened on Sunday night.

    “Hanif was an innocent member of the public whose life was tragically taken far too soon. Hanif was a father of two, this painful loss will forever effect his family.

    “We will continue to support Hanif’s family and will update them at every point possible. We ask for you to respect their privacy during this unimaginably difficult time.

    “Despite the two arrests, we are appealing for anyone who was present in the area who may have seen or heard anything relating to this incident to please get in touch. I want to stress to you that Hanif was a hardworking, innocent man – we need to understand why this attack was carried out.

    “You can submit any footage or information via this link.

    “I want to thank the community for their patience as we carried out all our relevant enquiries. Your support does not go unnoticed. We will have extra patrols in the area – please do voice any of your concerns to officers.”

    Anyone with information is asked to call 101 or ‘X’ @MetCC and quote CAD1295/13OCT. You can upload information and material online.

    You can also provide information anonymously to the independent charity Crimestoppers on 0800 555 111.

    MIL Security OSI

  • MIL-OSI Security: St. John’s — Impaired drivers arrested by RCMP Traffic Services during Operation Impact

    Source: Royal Canadian Mounted Police

    During Operation Impact, from October 11-14, 2024, RCMP NL’s Traffic Services Units arrested multiple impaired drivers and ticketed a number of motorists for various traffic offences.

    RCMP Traffic Services Units from East, Central, West and Labrador participated in Operation Impact, an annual 4-day traffic enforcement initiative that occurs over the Thanksgiving long weekend. Operation Impact focusses on the enforcement of impaired drivers, aggressive drivers, distracted drivers and those not wearing a seat belt.

    A total of five drivers were arrested for impaired driving offences, including impairment by alcohol and impairment by drugs. One motorist received a roadside licence suspension for having a blood alcohol concentration that was above the provincial limit but below the criminal threshold. Where appropriate to do so, drivers were released from custody with future court dates to face charges of impaired operation, were issued licence suspensions and their vehicles were seized and impounded.

    During this time frame, 15 check points were conducted in various areas of the province with more than 1600 vehicles checked.

    Road safety should be of priority to all motorists throughout the year. Driving with due care and attention for yourself and all others who share the roadway is always the best decision. RCMP NL’s Traffic Services remains dedicated to the enforcement of those who place others at unnecessary risk on roadways throughout Newfoundland and Labrador.

    MIL Security OSI

  • MIL-OSI Security: RM of Rockwood — Stonewall RCMP respond to fatal collision

    Source: Royal Canadian Mounted Police

    On October 15, 2024, at approximately 5:25 pm, Stonewall RCMP received a report of a SUV travelling northbound in the southbound lane of Highway 7 at Stony Mountain and it appeared a collision had occurred. A Stonewall RCMP officer was on scene in under five minutes and found the SUV had collided with a pickup truck on Highway 7, about half a kilometer north of Road 73 North.

    The SUV was on fire and the driver and lone occupant was deceased. The deceased has not yet been identified.

    The driver and lone occupant of the pickup, a 36-year-old male from Teulon, was removed from the vehicle and officers provided CPR. He succumbed to his injuries and was pronounced deceased on scene.

    A RCMP Forensic Collision Reconstructionist attended the scene and is assisting with the ongoing investigation.

    MIL Security OSI

  • MIL-OSI Security: NATO’s Special Representative for the Southern Neighbourhood visits Morocco

    Source: NATO

    NATO’s Special Representative for the Southern Neighbourhood, Javier Colomina, travelled to the Kingdom of Morocco on 15 October 2024 for his second visit to the region in this new capacity. He met with high-level officials to discuss the further development of the NATO-Morocco partnership and other issues of mutual interest.

    “Morocco is an important country in North Africa and the Middle East and a valuable interlocutor for NATO on security issues, particularly in the field of counter-terrorism,” the Special Representative said. Noting that Morocco is the first among the partners within NATO’s Mediterranean Dialogue to conclude an Individually Tailored Partnership Programme of practical cooperation with the Alliance, Mr. Colomina highlighted the importance of the cooperation. “Morocco has always been an important contributor to peace and international security, particularly through its contributions to various missions and operations carried out by NATO,” he explained.

    “Our partnership is based on shared values and challenges,” he added, “and given the challenges that the region is facing – in particular, instability in the Sahel but also in the Middle East –  we need to cooperate even more closely and with more determination in support of international peace and mutual security.”

    MIL Security OSI

  • MIL-OSI Security: Defense News: Fifth U.S. Navy DDG Homeport Shifts to Rota, Spain

    Source: United States Navy

    The arrival of Oscar Austin expands U.S. Navy capabilities in the U.S. European Command (EUCOM) and U.S. Africa Command (AFRICOM) areas of responsibility. Oscar Austin is now assigned to Destroyer Squadron (DESRON) 60 / Commander, Task Force (CTF) 65 and U.S. 6th Fleet.

    “USS Oscar Austin’s arrival to Naval Station Rota strengthens our commitment to maintaining a forward presence in Europe,” said Vice Adm. J.T. Anderson, Commander, U.S. 6th Fleet. “The addition of this ship to our forces in the region provides our Allies with an added layer of security and assurance, and serves as a powerful symbol of the enduring partnership between the United States and Spain.”

    Modernized with the latest Aegis Ballistic Missile Defense (BMD) upgrade, USS Oscar Austin offers a key capability for the U.S., directly contributing to extended deterrence by providing Allies and partners protection against the threat of ballistic missile attack. The second U.S. Navy destroyer to shift its homeport to Naval Station Rota, scheduled to arrive in 2026, also has the latest Aegis BMD upgrade.

    “Arleigh Burke-class guided-missile destroyers are true multi-mission ships, capable of providing maritime security, conducting anti-air and anti-submarine warfare, and providing humanitarian assistance and disaster relief,” said Capt. Alex Mamikonian, commodore, DESRON 60 and CTF 65. “Bringing USS Oscar Austin to Spain enhances our ability to maintain ready and postured forces to assure, deter and defend in an increasingly complex security environment.”

    Oscar Austin departed Norfolk, Va. Sept. 30 to transit to Spain and assist in providing full coverage and protection for all NATO European populations, territories and forces against the increasing threats posed by the proliferation of ballistic missiles.

    The initial decision to base destroyers out of Spain is part of the U.S. European Phased Adaptive Approach announced by President Obama in 2009. Since its announcement, the U.S. has broadened its Ballistic Missile Defense (BMD) capabilities in theater including increasing FDNF-E from four to six and the finalization of the second Aegis Ashore site in Poland.

    Oscar Austin is the first Flight IIA Arleigh Burke-class guided-missile destroyer and proudly bears the name of Pfc. Oscar P. Austin, United States Marine Corps. Oscar Austin was commissioned on August 19, 2000, in Norfolk, Va. Oscar Austin is ballistic missile defense, anti-submarine, and anti-surface warfare capable. The ship can embark two MH-60R Seahawk helicopters to assist in anti-submarine and other warfare areas. Destroyers can work with Carrier Strike Groups, Surface Action Groups, Expeditionary Strike Groups or independently.

    U.S. 6th Fleet, headquartered in Naples, Italy, conducts the full spectrum of joint and naval operations, often in concert with allied and interagency partners, in order to advance U.S. national interests and security and stability in Europe and Africa.

    MIL Security OSI

  • MIL-OSI Security: CISA and FBI Release Product Security Bad Practices for Public Comment

    Source: US Department of Homeland Security

    WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) released the Product Security Bad Practices for public comment today. This catalog outlines practices that are deemed exceptionally risky and provides recommendations for software manufacturers to mitigate these risks. It urges software manufacturers to avoid these bad practices, especially those who produce software used in service of critical infrastructure or national critical functions (NCFs). Members of the public may submit public comment on this guidance starting today.

    The National Cybersecurity Strategy calls for a fundamental shift to rebalance the responsibility to defend cyber space onto those best positioned to bear it; namely, the software manufacturers who build products underpinning our collective digital infrastructure. Fully realizing this shift requires an understanding of the most egregious software development practices that software manufacturers must avoid. This catalog enumerates such practices.

    “It’s 2024, and basic, preventable software defects continue to enable crippling attacks against hospitals, schools, and other critical infrastructure. This has to stop. These product security bad practices pose unacceptable risks in this day and age, and yet are all too common.” said CISA Director Jen Easterly. “We hope that by following this clear-cut, voluntary guidance, software manufacturers can lead by example in taking ownership of their customers’ security outcomes and fostering a secure by design future. Please provide input and let us know how we can improve this list of bad practices.”

    “Our National Cybersecurity Strategy highlights the importance of securing our nation’s critical infrastructure and shoring up our cyber defenses,” said White House National Cyber Director Harry Coker Jr. “The impact of product security bad practices has wide-ranging consequences across our nation and is often felt by the American people. Our private sector partners must shoulder their responsibility and build secure products and I’m glad to see this document as another tool to help software manufacturers do just that. We need to work together to prioritize best practices to better protect our nation.”

    “Bad practices in software development, especially when that software will be used by critical infrastructure, put both customers and our national security at risk,” said Assistant Director of the FBI’s Cyber Division Bryan Vorndran. “The FBI urges software manufacturers to avoid the risky practices described in this guidance, which lead to vulnerabilities that malicious actors routinely exploit.”

    These product security bad practices represent the next major step in CISA and partners’ global Secure by Design initiative, which has joined forces with 18 U.S. and international agencies to publish guidance and catalyzed commitments from over 220 software manufacturers to CISA’s Secure by Design Pledge. The bad practices build on practices laid out in the pledge and other guidance including NIST’s Secure Software Development Framework. This catalog will be a central guiding document in CISA’s Secure by Design initiative going forward, playing a key role informing future guidance and actions.

    This joint guidance lists the bad practices in three categories:

    • Product properties, which describe observable, security-related qualities of a software product.
    • Security features, which describe the security functionalities that a product supports.
    • Organizational processes and policies, which describe the actions taken by a software manufacturer to ensure strong transparency in its approach to security.

    CISA selected the bad practices based on the threat landscape as representing the most dangerous and pressing items that software manufacturers should avoid.

    The public comment period concludes on Monday, December 2, 2024. During the comment period, members of the public can provide comments and feedback via the Federal Register at Request for Comment on Product Security Bad Practices Guidance. Following the public comment period, CISA will issue a revised version of the bad practices.

    To learn more about the Secure by Design initiative, visit Secure by Design on CISA.gov.

    ###

    About CISA 

    As the nation’s cyber defense agency and national coordinator for critical infrastructure security, the Cybersecurity and Infrastructure Security Agency leads the national effort to understand, manage, and reduce risk to the digital and physical infrastructure Americans rely on every hour of every day.

    Visit CISA.gov for more information and follow us on XFacebookLinkedIn, Instagram

    MIL Security OSI

  • MIL-OSI Security: Broadview — Broadview RCMP seek public assistance locating missing 26-year-old female

    Source: Royal Canadian Mounted Police

    On October 15, 2024, Broadview RCMP received a report of a missing 26-year-old female, Shyla Kaysaywaysemat.

    Shyla was last seen on October 12, 2024 at a residence on the Kahkewistahaw First Nation.

    Shyla is described as approximately 5’3″ tall. She has brown eyes and long brown hair.

    Since she was reported missing, Broadview RCMP have been checking places Shyla is known to visit and following up on information received. They are now asking members of the public to report information on Shyla’s whereabouts.

    If you have seen Shyla or know where she is, contact Broadview RCMP at 310-RCMP. Information can also be submitted anonymously by contacting Saskatchewan Crime Stoppers at 1-800-222-TIPS (8477) or http://www.saskcrimestoppers.com.

    MIL Security OSI

  • MIL-OSI Security: Security News: Justice Department and City of Albuquerque, New Mexico, Seek Partial Termination of Consent Decree Covering Albuquerque Police Department

    Source: United States Department of Justice 2

    The Justice Department and City of Albuquerque (City), New Mexico, filed a joint motion today seeking court approval to terminate certain portions of the consent decree covering the Albuquerque Police Department (APD). The joint motion follows the independent monitor’s 20th report, also filed today, which concluded that the City and APD have reached full compliance with 99% of the consent decree’s terms, the highest level of compliance achieved by APD.

    The monitor’s report indicates that APD’s compliance level reflects significant achievement in critical areas such as completing timely and high-quality use-of-force and misconduct investigations. These accomplishments take place against a backdrop of a 37% reduction in APD’s use of serious force in the last four years.

    “Our joint motion to terminate additional provisions of this consent decree demonstrates that the Justice Department has come even closer to its ultimate goal of ensuring constitutional and effective policing in Albuquerque,” said Assistant Attorney General Kristen Clarke of the Justice Department’s Civil Rights Division. “Real reform is not only possible, but evident in Albuquerque. Since this consent decree went into effect, the Albuquerque Police Department has made significant and sustained progress in implementing policing practices that respect civil rights and promote public safety. We have seen a 37% decline in use of serious force over the last four years, and continue to move reform efforts forward. The Justice Department will continue to work with the City and its police department toward our shared goal of constitutional and effective policing—the community deserves nothing less.”

    “This partial termination proves that the hard work of the men and women of the Albuquerque Police Department and the persistent advocacy from the community are achieving real results,” said U.S. Attorney Alexander M.M. Uballez for the District of New Mexico. “Where the existence of a consent agreement is a symptom of dysfunction, every paragraph terminated is evidence of progress. Effective policy, operational observance of those rules, and persistent compliance with reform have set up APD for success. The sustainment period which follows termination will ensure that APD delivers the police department the people of Albuquerque deserve.”

    The joint motion asks the court to terminate 31 consent decree provisions with which APD has fully complied for at least two years. The provisions cover a range of topics, including use of electronic control weapons (commonly known as Tasers); crisis intervention; crisis prevention; and supervision. It is the third joint motion the parties have filed in the last year seeking to terminate a total of 183 paragraphs of the consent decree, or 67% of the enforceable provisions of the agreement.

    APD has made substantial change in reaching compliance with provisions of the consent decree the parties seek to terminate, including:

    • APD has properly trained all officers on using Tasers to ensure that officers only use these weapons when lawful and necessary.
    • APD has trained specialized officers to respond to behavioral health crises and deployed those officers across the department. Albuquerque has also created a new agency called Albuquerque Community Safety to send trained mental health professionals to 911 calls involving behavioral health issues. Through these two initiatives, Albuquerque is working to ensure that people get the help they need.
    • APD has improved supervision across the police department, ensuring that officers receive the guidance, direction and support they need to be effective and comply with the law.

    The District Court for the District of New Mexico entered the consent decree in June 2015. The decree, as well as information about the Civil Rights Division, are available on the Special Litigation Section Cases and Matters website. Additional information about implementation of the consent decree is also available on the U.S. Attorney’s Office website. If you believe your civil rights have been violated, please submit a complaint through our online portal.

    MIL Security OSI

  • MIL-OSI Security: Justice Department and City of Albuquerque, New Mexico, Seek Partial Termination of Consent Decree Covering Albuquerque Police Department

    Source: United States Attorneys General

    The Justice Department and City of Albuquerque (City), New Mexico, filed a joint motion today seeking court approval to terminate certain portions of the consent decree covering the Albuquerque Police Department (APD). The joint motion follows the independent monitor’s 20th report, also filed today, which concluded that the City and APD have reached full compliance with 99% of the consent decree’s terms, the highest level of compliance achieved by APD.

    The monitor’s report indicates that APD’s compliance level reflects significant achievement in critical areas such as completing timely and high-quality use-of-force and misconduct investigations. These accomplishments take place against a backdrop of a 37% reduction in APD’s use of serious force in the last four years.

    “Our joint motion to terminate additional provisions of this consent decree demonstrates that the Justice Department has come even closer to its ultimate goal of ensuring constitutional and effective policing in Albuquerque,” said Assistant Attorney General Kristen Clarke of the Justice Department’s Civil Rights Division. “Real reform is not only possible, but evident in Albuquerque. Since this consent decree went into effect, the Albuquerque Police Department has made significant and sustained progress in implementing policing practices that respect civil rights and promote public safety. We have seen a 37% decline in use of serious force over the last four years, and continue to move reform efforts forward. The Justice Department will continue to work with the City and its police department toward our shared goal of constitutional and effective policing—the community deserves nothing less.”

    “This partial termination proves that the hard work of the men and women of the Albuquerque Police Department and the persistent advocacy from the community are achieving real results,” said U.S. Attorney Alexander M.M. Uballez for the District of New Mexico. “Where the existence of a consent agreement is a symptom of dysfunction, every paragraph terminated is evidence of progress. Effective policy, operational observance of those rules, and persistent compliance with reform have set up APD for success. The sustainment period which follows termination will ensure that APD delivers the police department the people of Albuquerque deserve.”

    The joint motion asks the court to terminate 31 consent decree provisions with which APD has fully complied for at least two years. The provisions cover a range of topics, including use of electronic control weapons (commonly known as Tasers); crisis intervention; crisis prevention; and supervision. It is the third joint motion the parties have filed in the last year seeking to terminate a total of 183 paragraphs of the consent decree, or 67% of the enforceable provisions of the agreement.

    APD has made substantial change in reaching compliance with provisions of the consent decree the parties seek to terminate, including:

    • APD has properly trained all officers on using Tasers to ensure that officers only use these weapons when lawful and necessary.
    • APD has trained specialized officers to respond to behavioral health crises and deployed those officers across the department. Albuquerque has also created a new agency called Albuquerque Community Safety to send trained mental health professionals to 911 calls involving behavioral health issues. Through these two initiatives, Albuquerque is working to ensure that people get the help they need.
    • APD has improved supervision across the police department, ensuring that officers receive the guidance, direction and support they need to be effective and comply with the law.

    The District Court for the District of New Mexico entered the consent decree in June 2015. The decree, as well as information about the Civil Rights Division, are available on the Special Litigation Section Cases and Matters website. Additional information about implementation of the consent decree is also available on the U.S. Attorney’s Office website. If you believe your civil rights have been violated, please submit a complaint through our online portal.

    MIL Security OSI