Source: United States Coast Guard
| News Release |
U.S. Coast Guard 8th District Public Affairs Detachment Texas |
10/15/2024 09:29 AM EDT
HOUSTON — The Coast Guard medevaced a 36-year-old female from the Galveston Jetty in Galveston, Texas, Monday.
Source: United States Coast Guard
| News Release |
U.S. Coast Guard 8th District Public Affairs Detachment Texas |
10/15/2024 09:29 AM EDT
HOUSTON — The Coast Guard medevaced a 36-year-old female from the Galveston Jetty in Galveston, Texas, Monday.
Source: Royal Canadian Mounted Police
The Grand Bay-Westfield RCMP is seeking the public’s help in connection with a rise in copper wire thefts along Highways 1 and 7, near Grand Bay-Westfield.
Since 2022, there has been a significant increase in reports of copper wire thefts across the province, posing a significant risk to public safety as it can limit access to 911 and other critical infrastructure.
The RCMP encourages everyone to remain vigilant and report any suspicious activity, for example:
The RCMP is also warning the public of the dangers of stealing copper wire. Power lines and electrical substations can contain very high voltages of electricity, which should only be handled with the right training and equipment. Vandalizing electrical equipment poses a significant safety risk, and can cause serious injuries, including death.
Anyone who witnesses suspicious activity, or who has information related to these crimes is asked to contact their local police department. Information can also be provided anonymously through Crime Stoppers at 1-800-222-TIPS (8477), by downloading the secure P3 Mobile App, or by Secure Web Tips at http://www.crimenb.ca.
Source: United States Navy
With decades of public service, Panetta offered frank advice and lessons learned to the more than 1,300 students, faculty and staff gathered in the packed NPS King Hall auditorium.
“Fundamental to everything our democracy stands for is leadership, and that requires character, integrity, and courage,” said Panetta. “Those qualities are abundant in this room, and being selected to come to NPS further sets you apart. When you graduate, you will carry the additional obligation to do more, take risks, make hard decisions and lead solutions to complex national defense challenges if we’re going to remain the world’s strongest democracy.”
In his opening comments, Panetta stressed the importance of alliances in addressing today’s conflicts, and terrorism instigated and supported by a growing axis of autocracies lead by China, Russia, Iran and North Korea.
“Our adversaries are actively working to undermine trust,” Panetta remarked. “When our nation is distracted, tyrants will fill the void. The leader’s job is not to point fingers, but to point out falsehoods and elevate reality so we can agree on the problem, then work together to address it. Across the aisle, or across alliances, that’s how leaders get things done. That’s how we win.”
The “Fireside Chat” was moderated by retired U.S. Army Lt. Gen. Eric Wendt, a former Special Forces Green Beret and current professor of practice in the school’s Department of Defense Analysis, and an NPS distinguished alumnus. When asked the one thing he would do to improve DOD today, Panetta responded, “There are many things, but the one thing I am most concerned about is speed.”
“We need DOD bureaucracy to move at the speed of technology,” added Panetta. “I’m concerned that we can’t act swiftly enough to ensure our advantage by leveraging and learning about cutting edge technologies. Industry is setting the pace, and much of it is American innovation, but we need to apply innovative thinking to how we acquire, adapt and adopt technology to meet capability needs. I believe NPS and the future Naval Innovation Center at NPS are parts of the solution.”
During his visit, Panetta also spoke with Defense Analysis students in the DA 3900 Command and Leadership course taught by Wendt, where he further encouraged students to apply their operational experience, NPS education and research to solving the most vexing challenges facing DOD.
Before leading the DOD, Panetta served as a member of the United States House of Representatives, director of the Office of Management and Budget, White House Chief of Staff, and as Director of the Central Intelligence Agency.
Today, Panetta co-directs with his wife, Sylvia, the Panetta Institute for Public Policy, based at California State University, Monterey Bay. The Institute is a nonpartisan, not-for-profit center that seeks to instill in young men and women the virtues and values of public service.
Learn more about the NPS Department of Defense Analysis at https://nps.edu/web/da
Source: United Kingdom London Metropolitan Police
A man and woman have been charged with offences relating to the murder of 24-year-old Dontae McLaren in Lambeth last month.
Tyanne Corbin, 25 (23.05.1999) and Hamid Hamdi, 25 (31.10.1998) appeared at Central Criminal Court on Tuesday, 14 October charged with causing Dontae grievous bodily harm with intent, and violent disorder.
Both were remanded in custody to appear at Kingston Crown Court on Wednesday, 6 November.
A 26-year-old man arrested on suspicion violent disorder and causing grievous bodily harm is currently on bail. Next due on a date in early November.
Police were called at around 04:05hrs on Sunday, 29 September to reports of a large group fighting with knives in Wandsworth Road, SW8.
Officers, London Ambulance Service and London’s Air Ambulance attended.
Despite the best efforts of the emergency services, 24-year-old Dontae McLaren was pronounced dead at the scene. Specialist officers continue to support his family.
+ Dynzell Patrick, 26 (18.06.1998) has previously appeared in court charged with Dontae’s murder. He is next due to appear at Central Criminal Court on 23 December.
Source: United Kingdom London Metropolitan Police
An east London man who sent night vision and thermal imaging rifle scopes to support terrorist activity by the Taliban in Afghanistan in 2017 and 2018 has been jailed.
Muhammad Choudhary, 41 (15.06.83) previously pleaded guilty to terrorism funding and fundraising offences following a joint investigation by His Majesty’s Revenue and Customs (HMRC) and the Met’s Counter Terrorism Command.
He was sentenced on Tuesday, 15 October, at the Old Bailey to a total of seven years’ imprisonment, with an additional year to be served on an extended licence.
Detectives and investigators identified that Choudhary sent thermal imaging night vision rifle scopes to Pakistan on a number of occasions in 2017 and 2018. He later admitted they were intended for use by the Taliban, which, at the time, launched various attacks against the then-Government and coalition forces in Afghanistan.
Acting Commander Gareth Rees, of the Met’s Counter Terrorism Command, said: “This case is a prime example of how terrorist activity can take many different forms, and shows that we will investigate anyone in the UK who supports terrorist activity, regardless of what it may be in support of or to where it may be linked.
“This was a unique case where Government colleagues identified potential terrorist-related activity and shared information with us. Further enquiries conducted by Counter Terrorism Command officers led to Choudhary being convicted and jailed for various terrorism offences.”
Mike Pass, Assistant Director, Fraud Investigation Service, HMRC, said: “The UK operates a strict licensing regime to uphold international sanctions and to ensure military equipment does not fall into the wrong hands. We will continue to work with our law enforcement partners to ensure effective controls and enforcement on military goods, which contributes to the UK’s national security.”
Choudhary first came to the attention of HMRC after a seizure of rifle scopes at Heathrow Airport in January 2018. It was identified that Choudhary was the person behind the consignment, which was intended for an address in Pakistan.
Further enquiries revealed that Choudhary bought the sniper sights from legitimate hunting suppliers. He was interviewed under caution by HMRC investigators and he later admitted in interview that the recipient and end users were members of the Taliban.
As a result, this information was passed to the Met’s Counter Terrorism Command and officers launched an investigation, which resulted in Choudhary being charged with various terrorism offences in September 2023.
At an Old Bailey hearing in January, he pleaded guilty to a charge of fundraising for the purposes of terrorism (contrary to section 15 of the Terrorism Act, 2000), and two charges of making funding arrangements for the purposes of terrorism (contrary to section 17, TACT, 2000).
Choudhary was also previously charged with 23 offences under the Customs and Excise Management Act (1979). He pleaded not guilty to these offences at a hearing in February, and it was subsequently agreed for these offences to lay on file.
Source: United States Navy
JEJU-DO, South Korea (Oct. 13, 2024) – Forward-deployed U.S. Navy submarine tender USS Frank Cable (AS 40) departed the island of Jeju-Do, Oct. 13, after a scheduled port visit.
Seven decades ago, the United States and Republic of Korea (ROK) signed the U.S.-ROK Mutual Defense Treaty and established an alliance that has proven to be among the most capable, cooperative, and durable in the world. Frank Cable’s visit highlights the enduring nature of the U.S.-ROK partnership.
“This port visit was an outstanding opportunity to strengthen the relationship between our people and our navies,” said Capt. Mike Thompson, commanding officer, USS Frank Cable. “It was an honor to meet our counterparts from the Republic of Korea navy and to build bonds that benefit the entire region. As a nation, we strive to strengthen deterrence and modernize the U.S.-ROK Alliance through regular bilateral consultations, exercises, and strategic asset deployments. This visit, and visits like this, enhance our interoperability with a key ally and ensure our readiness to address shared maritime security challenges.”
Over the past four days in port, Frank Cable brought alongside ROK Na Dae-Yong (SS-069), a Chang Bogo-class submarine, in order to provide services and further demonstrate Frank Cable’s ability to repair allied submarines across the Indo-Pacific region. Frank Cable also conducted key leader engagements, hosted ship tours for ROK civilian and naval personnel, and embraced the opportunity to explore the local community and culture on Jeju-Do Island.
While aboard Frank Cable, ROK visitors walked the ship’s main spaces, met with command leadership and heard from Frank Cable Sailors in the Repair, Weapons, Supply, Medical, and Deck departments. These Sailors highlighted the scope of expeditionary submarine tender capabilities through a variety of displays and demonstrations.
Frank Cable personnel were also invited to tour the ROK Na Dae-Yong. Named in honor of a Korean naval officer and acclaimed ship designer, the Na Dae-Yong utilizes a diesel-electric power plant and was commissioned in 2000.
“I was thrilled to get to tour the Na Dae-Yong while here in the South Korea,” said MMN1 Gregory Ray, from Snohomish, Washington. “I’ve been on three different classes of U.S. submarines, but never a foreign submarine, and it still surprises me how different the manning and configurations can be in order to successfully execute the mission.”
The timing of this port visit was particularly special for both nations in light of the anniversaries that surround it. Frank Cable’s visit not only coincided with the U.S. Navy’s 249th birthday, but also comes just days after the anniversary of the U.S.-ROK Mutual Defense Treaty, codified Oct. 1, 1953.
Frank Cable, forward-deployed to the island of Guam, provides expeditionary intermediate-level maintenance, services, and logistics support to deployed submarines and surface vessels in the Indo-Pacific region. Frank Cable is currently conducting routine operations in support of national security in the U.S. 7th Fleet area of operations.
Under Commander, U.S. Pacific Fleet, U.S. 7th Fleet is the U.S. Navy’s largest forward-deployed numbered fleet, and routinely operates with allies and partners in preserving a free and open Indo-Pacific region.
For more information about Frank Cable visit our Facebook page http://www.facebook.com/FrankCableAS40 .
Are you interested in taking orders to Guam? Want to learn more about the duty station and life on our island? For more information, check out the ‘Go Guam!’ website at http://www.csp.navy.mil/go-guam/ and download the ‘1st Fifteen’ checklist.
Source: United States Navy
LARNACA, CYPRUS – The amphibious transport dock ship USS New York (LPD 21) and embarked 24th Marine Expeditionary Unit (MEU), Special Operations Capable (SOC) arrived in Larnaca, Cyprus for a regularly scheduled port visit, October 14, 2024.
“Our Sailors and Marines are eager to experience the vibrant Cypriot culture, food, and history while continuing to forge and strengthen the ties between the two partners,” said Cmdr. David Pagan, New York’s executive officer. “The opportunity to experience the world-class hospitality of the Cypriot people is something our crew is exceptionally excited for and we sincerely appreciate their support as we deepen our bond with them as military ambassadors for the United States.”
While in the NAVEUR-NAVAF area of operations, New York will support U.S., Allied and partner interests in the region, including in the Eastern Mediterranean Sea, to continue promoting regional stability and deterring aggression. The presence of an integrated Navy-Marine Corps team provides flexibility and enhanced capability to NAVEUR-NAVAF and U.S. 6th Fleet.
New York departed Norfolk, Virginia on a scheduled deployment to the U.S. Naval Forces Europe-Africa (NAVEUR-NAVAF) area of operations on May 22.
The Wasp Amphibious Ready Group (WSP ARG) consists of the amphibious assault ship USS Wasp (LHD 1), New York, Harpers Ferry-class dock landing ship USS Oak Hill (LSD 51), and embarked 24th Marine Expeditionary Unit (MEU), Special Operations Capable (SOC).
The 24th MEU (SOC) is a Marine Air-Ground Task Force (MAGTF) providing strategic speed and agility, ensuring our Marines are prepared to respond and protect U.S. national security interests around the globe. The MEU can respond rapidly from longer ranges with greater capabilities across the spectrum of military conflict.
You can follow USS New York’s adventures on Facebook and Instagram (@uss_newyork).
To learn more about WSP ARG and 24th MEU (SOC) “Team of Teams,” visit their DVIDS feature page at https://www.dvidshub.net/feature/wasparg24thmeu.
Source: United States Navy
PACIFIC OCEAN – The aircraft carrier USS Nimitz (CVN 68) took one more step toward returning to a deployment-ready state, completing its first post planned incremental availability exercise while underway in the Pacific Ocean Sept. 27.
The culmination of the training evolution was a Final Evaluation Problem (FEP), a command assessment tailored to the unique training portfolio and requirements of Nimitz, as well as the ship’s upcoming deployment. Passing the FEP moves Nimitz into the pre-deployment phase, beginning the ship’s preparation for the Composite Training Unit Exercise (COMPTUEX), and eventual deployment.
“We’ve overcome the first major hurdle of Nimitz’s pre-deployment training and evaluation process,” said Capt. Douglas Graber, Nimitz commanding officer. “It was difficult evolution, but the long hours of training and preparation we put in really paid off. I couldn’t be more proud of our crew and their performance throughout the evaluation process.”
For more information please contact the USS Nimitz Public Affairs Officer at pao@cvn68.navy.mil.
Source: United States Navy
NORTH SEA – The Harry S. Truman Carrier Strike Group (HSTCSG) transited through the Strait of Dover for the North Sea, Oct. 14.
The strike group will conduct operations in the North Sea with Allies and partners from several countries in the region, demonstrating the warfighting interoperability and strategic relationships built over the past eighty years.
“Storied in world history, our transit through the Strait of Dover to operate with our Allies in the North Sea underscores our commitment to maritime security and the NATO Alliance,” said Rear Adm. Sean Bailey, commander of the HSTCSG. “We will operate with our NATO Allies and partners to strengthen our collective readiness, defense, and deterrence. No nation can confront today’s challenges alone, and we look forward to showcasing our interoperability.”
The Strait of Dover, historically known as the Dover Narrows, is the narrowest part of the English Channel and separates Great Britain from mainland Europe. The channel also separates the Atlantic Ocean from the North Sea, a strategically important area where the carrier strike group will conduct various bilateral operations with Allies and partners. The strike group last operated in the North Sea during a deployment in 2018, including time operating above the Arctic Circle in the Norwegian Sea for the NATO exercise Trident Juncture.
“I’m excited to operate in the North Sea again,” said Capt. Dave Snowden, commanding officer of USS Harry S. Truman and former executive officer during the 2018 deployment. “With its unique geographical and environmental characteristics, every time we operate in this region we increase our proficiency and showcase our inherent flexibility to operate anywhere in the world.”
The HSTCSG will support U.S. Naval Forces Europe’s maritime operations and theater security cooperation missions, working alongside Allies and partners to maintain maritime safety, security, and stability. The Ford-class aircraft carrier USS Gerald R. Ford (CVN 78) operated in the North Sea in 2023 and was the first aircraft carrier to visit Oslo, Norway, for a port of call since 1958.
Before entering the Strait of Dover, the strike group operated off the Azores and Northern Africa for a series of warfighting training scenarios between the strike group’s ships and air wing before heading North for the English Channel.
“It feels like the world has their eyes on us, speculating where we’ll go and what we’ll do next,” said Lt. Adam Biethman, a reactor department officer onboard Harry S. Truman. “I love the flexibility of our strike group, and it’s great to know we’ll be operating and learning from our Allies in the North Sea.”
The carrier strike group consists of the flagship USS Harry S. Truman (CVN 75); Carrier Air Wing (CVW) 1 with nine embarked aviation squadrons; staffs from CSG-8, CVW-1, and Destroyer Squadron (DESRON) 28; the Ticonderoga-class guided-missile cruiser USS Gettysburg (CG 64); and two Arleigh Burke-class guided-missile destroyers, USS Stout (DDG 55) and USS Jason Dunham (DDG 109).
HSTCSG’s mission is to conduct prompt and sustained combat operations at sea and remain the cornerstone of the Navy’s forward presence through sea control and power projection capabilities. You can find them on DVIDS at https://www.dvidshub.net/unit/CVN75.
Source: Federal Bureau of Investigation (FBI) State Crime News
Charity fraud scams can come in many forms: emails, social media posts, crowdfunding platforms, cold calls, etc. They are especially common after high-profile disasters. Always use caution and do your research when you’re looking to donate to charitable causes.
Homicide Victim Washington Township, New Jersey December 4, 1986
The FBI is seeking to identify individuals involved in the violent activities that occurred at the U.S. Capitol and surrounding areas on January 6, 2021. View photos and related information here. If you have any information to provide, visit tips.fbi.gov or call 1-800-CALL-FBI.
Source: Federal Bureau of Investigation (FBI) State Crime News
FRESNO, Calif. — Scott Eric Anderson, 46, of Fresno, was sentenced Wednesday to three years in prison for conspiracy to destroy property, malicious destruction by means of an explosive device and being a felon in possession of a firearm, U.S. Attorney Phillip A. Talbert announced.
According to court documents, between November 2022 and February 2023, Anderson committed a series of pipe-bombings on unoccupied vehicles and property in Fresno. The bombings damaged vehicles belonging to two auto-related businesses on Clinton Avenue in Fresno. On Feb. 19, 2023, a bomb heavily damaged a vehicle used by a home health care business on Fallbrook Avenue in Fresno. Anderson sometimes recorded his crimes by video. Law enforcement also recovered a pistol in Anderson’s bedroom. Anderson was previously convicted of carrying a loaded and concealed weapon and is prohibited from possessing a firearm.
This case was the product of an investigation by the Fresno Police Department, the Federal Bureau of Investigation, and the Bureau of Alcohol, Tobacco, Firearms and Explosives. Assistant U.S. Attorney Michael G. Tierney prosecuted the case.
Source: Federal Bureau of Investigation (FBI) State Crime News
Charity fraud scams can come in many forms: emails, social media posts, crowdfunding platforms, cold calls, etc. They are especially common after high-profile disasters. Always use caution and do your research when you’re looking to donate to charitable causes.
Homicide Victim Washington Township, New Jersey December 4, 1986
The FBI is seeking to identify individuals involved in the violent activities that occurred at the U.S. Capitol and surrounding areas on January 6, 2021. View photos and related information here. If you have any information to provide, visit tips.fbi.gov or call 1-800-CALL-FBI.
Source: NATO
On Wednesday, 16 October 2024, NATO Secretary General Mark Rutte will receive the Prime Minister of Sweden, Mr Ulf Kristersson, at NATO Headquarters in Brussels.
Media advisory
13:50 (CEST) Joint press conference by the Secretary General and the Prime Minister of Sweden.
Media coverage
For more information:
For general queries: contact the NATO Press Office
Follow us on X: @NATO, @SecGenNATO and @NATOPress
Source: United Kingdom London Metropolitan Police
Detectives investigating the assault of a pensioner in Hammersmith have released an image of a man they want to identify and speak with.
On Tuesday, 2 July at around 13:00hrs, the victim, an 85-year-old man, was attempting to board the 220 bus at Hammersmith bus station.
He stopped and held up other passengers behind him as he allowed women and children to board the bus first.
The suspect appeared to take offence to this and began verbally abusing the victim before pushing him out of the way and causing him to fall.
He was taken to hospital he was found to have broken his hip.
Anyone who can name the man in the image should call police on 101 or Tweet @MetCC quoting 01/545400/24.
To remain 100% anonymous call the independent charity Crimestoppers on 0800 555 111 or visit Crimestoppers-uk.org.
Source: NATO
NATO has officially launched its Chief Scientist Grants Programme, dedicated to fostering excellence in science and technology research. In total, 500,000 euros will support research projects focused on advancing science and contributing to global security. Researchers from NATO member countries are invited to apply, with grants ranging from 25,000 euros to 100,000 euros. These will support projects in areas such as deterrence and defence; diversity in Science, Technology, Engineering, and Mathematics (STEM) fields; emerging and disruptive technologies; as well as Science and Technology (S&T) resilience and foresight.
PLEASE NOTE:
You can now apply for the NATO Chief Scientist Grants Programme.
Who: The grants are open to nationals from NATO Allies who are working for or affiliated with NATO Allied governments, research institutes, non-governmental organizations or the private sector. Applicants need to be resident in the country where the institution they are working for is located. The programme particularly encourages applications from women in STEM fields.
What: Applicants must submit an application form including a proposal related to one of the listed focus areas. Qualifying projects will need to be completed by end 2025. Proposals should include a forward-looking general problem statement and aim for both scientific excellence and real-world security impact.
Applicants should also address the economic viability of their proposals, and include reference to the Applicant’s experience handling similar projects. The application should include an evaluation of potential risks associated with the proposal, and a risk response plan.
When: Applications are open from now until November 15, 2024. Shortlisted candidates may be contacted in December 2024, and selected candidates will be notified by January 2024. All selected projects will have to be completed by the end of 2025.
This marks a significant opportunity for researchers to contribute to global security and technological advancement, while also promoting diversity and inclusion in defence-related STEM fields. Any inquires may be directed to mbx.sto@hq.nato.int.
Source: Royal Canadian Mounted Police
On August 24th, 2024 Yellowknife RCMP received a complaint that a group of masked individuals was attempting to gain entry to an occupied residence in Yellowknife.
Officers attended the location and arrested 4 suspects after a brief altercation. A hand gun was subsequently located and seized after the arrests.
Yellowknife RCMP’s General Investigation Unit has been engaged and the investigation is continuing.
Two arrested subjects are currently facing charges as a result of the incident.
28-year-old Suleiman Abdow of Edmonton has been charged with:
· Fail to comply with release order conditions (3 counts), contrary to section 145(5)(a) of the Criminal Code
· Mischief under $5000, contrary to section 430(4) of the Criminal Code
· Fail to comply with probation order conditions, contrary to section 733.1(1) of the Criminal Code
· Disguised with intent to commit an offence, contrary to section 351(2) of the Criminal Code
32-year-old Joshua Desjarlais of Yellowknife has been charged with:
· Disguised with intent to commit an offence, contrary to section 351(2) of the Criminal Code
Abdow and Desjarlais both appeared before a Justice of the Peace and were remanded into custody.
The remaining two suspects were released by police.
Anyone who has information about this incident is asked to contact the Yellowknife RCMP at 669-1111 or Crime Stoppers at http://www.p3tips.com. In the event of an emergency call, 911.
Source: Royal Canadian Mounted Police
RCMP Commissioner Mike Duheme will provide an update on the RCMP‘s investigative efforts related to violent criminal activity occurring in Canada with connections to India.
Members of the media attending in person need to register by email at rcmp.hqmediarelations-dgrelationsmedias.grc@rcmp-grc.gc.ca and must arrive by 11 am.
Members of the media joining virtually will register through the Microsoft Teams link.
Source: NATO
NATO Secretary General Mark Rutte met with the NATO Supreme Allied Commander Europe (SACEUR), General Christopher Cavoli and other senior officials during his first visit to the Alliance’s Supreme Headquarters (SHAPE) in the Belgian city of Mons on Monday (14 October 2024).
In the afternoon, the Secretary General travelled with General Cavoli to Wiesbaden, Germany to visit NATO’s new Security Assistance and Training Ukraine (NSATU) command at the Clay Barracks, where the Secretary General also met with German Defence Minister Boris Pistorius.
In talking with the troops, Mr. Rutte noted how important their work was, preparing the way for 700 personnel who will be stationed in Wiesbaden and at logistical nodes on the Eastern flank of the Alliance. He said that the new command will make a real difference for Ukraine on the battlefield and “for our own security”.
NSATU will coordinate the provision of military training and equipment for Ukraine by NATO Allies and partners – including artillery, ammunition and air defences – and will help Ukrainian forces prepare for the future.
Source: Royal Canadian Mounted Police
An extraordinary situation is compelling us to speak about what we have discovered in our multiple ongoing investigations into the involvement of agents of the Government of India in serious criminal activity in Canada. It is not our normal process to publicly disclose information about ongoing investigations, in an effort to preserve their integrity. However, we feel it is necessary to do so at this time due to the significant threat to public safety in our country.
Over the past few years, and more recently, law enforcement agencies in Canada, including the RCMP, have successfully investigated and charged a significant number of individuals for their direct involvement in homicides, extortions and other criminal acts of violence.
In addition, there has been well over a dozen credible and imminent threats to life which have led to the conduct of Duty to Warn by law enforcement with members of the South Asian community, and specifically members of the pro-Khalistan movement. As a result, in February 2024, the RCMP created a multidisciplinary team to investigate and coordinate efforts to combat this threat. The team has learned a significant amount of information about the breadth and depth of criminal activity orchestrated by agents of the Government of India, and consequential threats to the safety and security of Canadians and individuals living in Canada.
Despite law enforcement action, the harm has continued, posing a serious threat to our public safety. We reached a point where we felt it was imperative to confront the Government of India and inform the public about some very serious findings that have been uncovered through our investigations.
There is a violent extremism threat in Canada that Canada and India have been working on over the years. However, these threats are impacting Canada and India’s ability to collaborate.
Earlier this week, the Deputy Commissioner of Federal Policing, Mark Flynn, made attempts to meet with his Indian law enforcement counterparts to discuss violent extremism occurring in Canada and India, and present evidence pertaining to agents of the Government of India’s involvement in serious criminal activity in Canada. These attempts were unsuccessful, therefore Deputy Commissioner Flynn met with officials of the Government of India, along with the National Security and Intelligence Advisor (NSIA), Nathalie Drouin, and Deputy Minister of Foreign Affairs David Morrison over the weekend.
Through our national taskforce and other investigative efforts, the RCMP has obtained evidence that demonstrates four very serious issues:
Investigations have revealed that Indian diplomats and consular officials based in Canada leveraged their official positions to engage in clandestine activities, such as collecting information for the Government of India, either directly or through their proxies; and other individuals who acted voluntarily or through coercion.
Evidence also shows that a wide variety of entities in Canada and abroad have been used by agents of the Government of India to collect information. Some of these individuals and businesses were coerced and threatened into working for the Government of India. The information collected for the Government of India is then used to target members of the South Asian community.
This evidence was presented directly to Government of India officials, urging their cooperation in stemming the violence and requesting our law enforcement agencies work together to address these issues.
The RCMP is hoping to address these threats through our relationship with the Government of India and the National Investigation Agency with the end goal of strengthening the safety and security of the Canadian public and South Asian community.
The safety and security of our citizens, regardless of their background or beliefs, remains a top priority for the RCMP and we will not tolerate any form of intimidation, harassment, or harmful targeting of communities or individuals in Canada.
We are seeking the public’s assistance in reporting incidents of foreign interference by the Government of India. Anyone who feels threatened online or in person, should report the incident to their local police. If someone is in immediate danger, call 9-1-1. Individuals can also report to the RCMP National Security Information Network by phone at 1-800-420-5805 or online at rcmp.ca/report-it.
We recognize the concern and fear people might be feeling when seeing this news and we recognize that South Asians are victims of the activities we’re investigating. We want to assure all Canadians that their safety and security is at the forefront of everything we do and we urge the public and South Asian communities to remain calm and give law enforcement and Canadian officials time to continue discussions.
While the RCMP does not generally comment on investigative matters to preserve operational integrity, we will keep the public updated as things develop.
Source: United States Coast Guard
U.S. Coast Guard sent this bulletin at 10/14/2024 03:30 PM EDT
10/14/2024 03:15 PM EDT
Source: Royal Canadian Mounted Police
The Codiac Regional RCMP is asking for the public’s help locating a missing 43-year-old man from Moncton, N.B.
Ronald John Carr was last seen on October 13, 2024, at approximately 3:30 p.m., on MacBeath Avenue in Moncton. He was reported missing to police the same day. Police have followed up on several leads to try and locate him, but have so far been unsuccessful. Police are concerned for his wellbeing.
Ronald John Carr is described as being approximately 5 feet, 10 inches (178 centimetres) tall, and weighing approximately 231 pounds (105 kilograms). He has brown eyes and is bald. He was last seen wearing black shorts. He has tattoos on his neck and arms.
Anyone with information on his whereabouts is asked to contact the Codiac Regional RCMP at 506-857-2400.
Source: International Atomic Energy Agency – IAEA
Sediment that accumulates in the seagrasses, mangroves and marshes can be analysed to help indicate changes in the environment over periods of time, ranging from the past few years to millions of years ago. The capacity of vegetated coastal ecosystems to sequester and store carbon in their sediments can be measured by nuclear and isotopic techniques.
The IAEA Marine Environment Laboratories in Monaco use these elements to determine the rates at which organic carbon accumulates in marine sediments using sediment core samples from vegetated coastal ecosystems. Sediment cores are collected by using long plastic tubes that during sampling are able to preserve the layers of sediment accumulated over time.
The naturally occurring radioactive isotope lead-210 (210Pb), in combination with some artificial radionuclides such as caesium-137 (137Cs) are used to determine the sedimentation rates in the sediments at timescales of decades – up to around 100 years, a period during which human induced impacts on the environment have dramatically increased.
These techniques encompass radiochemical separation and measurements by alpha and gamma spectrometry adapted to each isotope. This is then combined with the measurement of organic carbon contents and its isotopes along the sedimentary record by mass spectrometry methods to assess the organic carbon stocks and burial rates.
Source: National Security Agency NSA
NSA has a long history of establishing research partnerships with universities, non-profits and industry, but it reached a new milestone in 2024.
The Office of Research and Technology Applications (ORTA) recently established a Cooperative Research and Development Agreement (CRADA) with the University of Texas Permian Basin (UTPB), making them the first Hispanic-Serving Institution to join the Advancing Research Innovating Solutions through Engagement (ARISE) CRADA.
As part of this agreement, UTPB students and faculty will have the opportunity to work directly with NSA researchers and liaisons on unclassified mission problems. According to ORTA deputy director said Karen Presley, this new partnership is a step forward in increasing representation of diverse students into the program.
“Diversity brings different talent, experiences, and skill sets to NSA which can lead to innovative ways of approaching problems,” Presley said. “This is a win-win for both the universities and the Agency.”
ARISE provides collaborative research opportunities to diverse, underrepresented student populations and faculty. According to Presley, it also supports NSA’s efforts to build and sustain a diverse, expert workforce that continues to provide the Nation with competitive advantages.
Presley first connected with Brian Shedd, who was then working for a public university, at a technology transfer event in 2017. They discussed collaborating on a CRADA, and although that specific agreement never came to fruition, Shedd and Presley kept in contact over the years.
Fast forward to 2024, Shedd, who is now the executive director of UTPB’s Office of Innovation and Commercialization, reached out to ORTA about the opportunity for UTPB to join the ARISE program. That initial chance conversation seven years ago turned into an impactful opportunity for NSA, UTPB, and the greater southwest Texas region, Presley said.
“It’s a testament to the idea that no interaction is too small: a brief run-in with a colleague can, years later, turn into a major collaboration,” she added.
UTPB prides itself on being a small school that thinks large and lives locally, according to Shedd.
“National security, cybersecurity, and infrastructure are all topics that are important to our region,” he said. “This partnership is unique for the university and provides an opportunity for students to get their hands on early stage technology.”
According to Shedd, the university’s business and computer science programs will start by performing market and intellectual property assessments. Eventually, they will participate in research and development to address some of the Agency’s mission problems.
“This partnership has been years in the making, and we’re excited to finally see it come to fruition,” Presley said. “I really can’t wait to see what the students at UTPB are able to achieve through this CRADA.”
NSA ORTA establishes partnerships with industry, academia, and other government agencies to help accelerate mission goals, advance science, foster innovation, and promote technology commercialization. Click here to learn more!
Source: National Security Agency NSA
Join the National Cryptologic Museum for the 10th Annual STEM Fest! Explore a world of discovery where science, technology, engineering and math come together!
Get ready for hands-on exhibits, exciting activities and industry experts that will help spark curiosity and creativity!
The NCM is partnering with the Maryland STEM Festival for the 10th consecutive year. It’s a chance to explore the latest innovations in the STEM fields and have a family fun adventure! STEM Fest is free and open to the public.
When: November 9,, 2024 10am-4pm
Where: National Cryptologic Museum
8290 Colony Seven Rd, Annapolis Junction, MD 20701
Source: National Security Agency NSA
Last month, National Security Agency (NSA) affiliates traveled to North Dakota’s Turtle Mountain Indian Reservation to teach Native high school students about programming, cybersecurity, and robotics.
Dr. Adam Tagert from Research and Dr. Nathan BrownEagle from Cybersecurity attended NSA Day, the final day of the Sandia National Laboratory-sponsored camp at Turtle Mountain Community College (TMCC)—a private tribal land-grant community college founded by the Turtle Mountain Band of Chippewa Indians in 1972.
NSA’s diverse workforce, cybersecurity mission, and history of bringing the robots to Indian Country attracted the attention of the National Nuclear Security Administration and Sandia National Labs. Sandia then extended the invitation to NSA’s American Indian Alaska Native Employee Resource Group (AIAN ERG) to participate in the event with Tribal community colleges and universities.
NSA Day at the camp was included for students interested in future STEM or cybersecurity careers. TMCC has a strong focus in cybersecurity and is working towards accrediting a Bachelor of Science in Cybersecurity to add to their Associate of Applied Science program.
The first assignment of NSA Day at the camp was to program a set of robots to play soccer.
“It was inspiring to see students take a difficult challenge and the excitement that followed when they saw the robots move based on their commands and programming,” Tagert said, explaining that is the benefit of robotics. “It’s the ability to see the effect on the real world compared to changing something on a monitor.”
After a few soccer matches, where the students had the robots push a neon green foam ball into the goal, the NSA team performed a cyberattack on the robots to show that without cybersecurity, simple attacks, like a denial of service (DoS) can make cyber devices uncontrollable. A DoS is an event in which an attacker sends more information than the recipient can handle, which causes delays or missed commands.
The students then experimented by attacking each other’s robots and defending themselves with a mitigation that caused the robot to stop listening to commands over a set threshold. The students took to the final activity eagerly, which was more programming intensive than the soccer game and cybersecurity component.
This camp has appealed to Native youth in the past, even successfully attracting Native interns to Sandia National Labs over the past two summers.
“Hopefully, these students will be interested in applying for Stokes or other programs,” BrownEagle said. “Our opportunity to present just shows the impact of NSA reaching out to a broader demographic of STEM fair participants.”
BrownEagle added that a shortened version of the activity has also been presented at various national STEM conferences over the years.
“I’m grateful that Sandia recognized the value of Adam’s curriculum and invited us to bolster the region’s cybersecurity education for these Native students,” BrownEagle said.
Source: National Security Agency NSA
FORT MEADE, Md. – “It shows you how fragile life is,” mother of Flight 93’s youngest victim said with tear-filled eyes at the sight of her 20-year old daughter’s photo and purse on display at the 9/11 memorial in the lobby of the Morrison Center on NSA/CSS Washington’s East Campus.
Earlier this year, Deborah “Debby” Borza donated to NSA the purse that her daughter carried on 11 September 2001. She was recently invited to the Agency to view this memorial on what would have been her daughter, Deora Bodley’s, 43rd birthday.
Debby Borza weeps at the sight of NSA’s Flight 93 memorial in memory of her daughter.
Borza and her partner, Gregory Linden, began their visit at the National Cryptologic Museum with a guided tour from the Center for Cryptologic History Chief John Tokar and a retired NSA employee and museum docent.
After a first-hand look into the Agency’s history, Borza and Linden boarded a van to East Campus to see the 9/11 memorial.
“What a great honor to have you here,” Deputy Director Wendy Noble said as she greeted them both upon their arrival.
Noble shared with Borza how much this memorial means to NSA.
“The reason we have it in the front of the building is especially for new employees, to remember why you’re here,” she said.
The project manager of the 9/11 memorial, and other members of the Morrison Center construction team were also present for the visit.
“A lot of folks that come and work here were born after 9/11,” the project manager said, sharing how the memorial helps the workforce relate to this tragic event in history.
The co-facility manager and former Morrison Center construction manager, along with members of the Facility Management Team from East Campus, also got emotional and thanked Borza for her contribution.
Picture of Flight 93 victim Deora Bodley, and the purse she carried on 9/11 on display at the 9/11 memorial at NSA/CSS Washington’s Morrison Center.
The co-facility manager explained how Borza was instrumental in the Flight 93 memorial at NSA becoming a reality, and her visit brought it all together.
Borza was equally grateful for the time and hard work they put into the entire display, especially the piece honoring her daughter.
“To the gentlemen who built it, thank you,” she said. “Thank you for taking on that responsibility. This is amazing.”
The 9/11 memorial displays: an American flag from Shanksville, Pennsylvania; elevator tracks from the World Trade Center; limestone rubble and a partially melted laptop from the Pentagon; and Bodley’s purse, cleaned and preserved from the Flight 93 crash site.
On 11 September 2001, Borza’s daughter was entering her junior year as a French and child psychology major at Santa Clara University in California, and was returning to school after a visit with girlfriends on the East Coast. She had gone to the airport early that morning to accommodate her friend who had an early class. While Bodley was not scheduled to be on Flight 93 traveling from Newark International Airport to San Francisco, she was able to get a seat on standby.
Borza was at work when she got a tearful phone call from her daughter’s friend, saying that she had gotten on an earlier flight.
It was in that moment that Borza had an unsettling feeling, and went to a church across the street to pray. Borza recalled that she asked God, “Where is Deora?” and she heard a quiet voice respond, “She’s with me.”
Moments later, Borza got a call from the airline, and heard, “I’m sorry to inform you—” from the other line. Borza dropped the phone.
Debby Borza reads a quote at the 9/11 memorial.
Bodley dreamed of becoming a child psychologist, and was committed to community service, volunteering in high school, working with the America Reads program, and tutoring kids after school.
Since that phone call, Borza has dedicated her life to honoring her daughter and the other lives lost in Shanksville, and even relocated to Maryland to be closer to the crash site and to Washington D.C.
She has been a fixture in Congress and Shanksville since 2001 — working on memorial plans, committees, and legislation where she served on the board for Families of Flight 93 and the 9/11 National Memorial Trail.
“She’s the unofficial mayor of that place! Everybody knows her,” Tokar said as he accompanied Borza to the Flight 93 crash site.
Borza spent the day prior to the NSA visit at the Flight 93 memorial in Pennsylvania, watching the recent solar eclipse and commemorating her daughter’s birthday.
She was asked to speak to a school group that was scheduled to be at the Tower of Voices memorial that day to highlight history and take in the experience. There, Borza and the students made memories as they ate Oreos (her daughter’s favorite snack), and got to see a scientific wonder happen before their eyes.
“Being with those kids, I felt Deora closer than ever before,” Borza said.
The Tower of Voices, a 93-foot tall musical instrument holding 40 wind chimes, stands as a landmark feature near the entrance to the Flight 93 National Memorial, located in Somerset County, Pennsylvania.
NSA Deputy Director Wendy Noble with Debby Borza, mother of 9/11 victim, standing in front of the 9/11 memorial at NSA/CSS Washington’s East Campus.
The living memorial creates a set of forty tones (“voices”) to remember Bodley and the 39 others who died through their ongoing voices.
“Thank you for everything you’ve done,” said Ms. Noble, further recognizing Borza’s tireless work to help memorialize those who lost their lives 23 years ago.
Borza replied tearfully, “I did it for her.”
Before the afternoon concluded, Ms. Noble gave Borza her personal coin.
Borza recalls how the trip to the Agency to see the final piece of her daughter’s memorial was a fulfilling culmination to an emotional week, and before leaving Borza told the crowd, “Some people say ‘Never Forget,’ I like to say, ‘Remember.’ I know for sure, Deora’s very happy.”
Source: National Security Agency NSA
NSA Research invited leading university research institutions across the country to the National Cryptologic Museum for a day-long event to tackle the ongoing challenge of securing critical cyber systems.
The Laboratory for Advanced Cybersecurity Research sponsored the Science of Security (SoS) Virtual Institute (VI) kick-off meeting earlier this year. It was aimed at advancing foundational research in three key areas: Trusted Systems, Artificial Intelligence and Cybersecurity, and Defensive Mechanisms.
These three VIs facilitate collaboration of industry and academic communities with NSA research liaisons, and align with the Research Directorate’s mission to anticipate technological advances, prevent disruptive technology surprise, and partner to transition research into operational outcomes, according to Dr. Rita Bush, chief of the Laboratory for Advanced Cybersecurity Research.
Bush provided opening remarks and expressed her admiration of the SoS partnerships with academia.
“I am truly honored to welcome the university researchers to our latest version of the Science of Security program. SoS has a long history of sponsoring innovative unclassified research at great universities,” Bush said. “I’m so pleased that we’ve been able to continue this program, and introduce a new generation of students to the kinds of cybersecurity challenges that we face in protecting National Security Systems.”
In 2012, the Research Directorate began funding academic “lablets” focused on the development of a broad, self-sustaining community effort to advance the science of security. The lablets were small multi-disciplinary labs at universities across the country that perform cybersecurity, to underpin advances in cyber defense.
“Building these relationships is so important because the foundational research and results of the projects will help drive improvements in cybersecurity,” SoS Program Manager Shavon D. said. “The students at these institutions are working on hard research problems that align with our Agency’s strategic goals and with the interests of the Government as a whole.”
This year, lablets were replaced by VIs, a new model that will continue in the spirit of foundational research they established while also allowing projects to be added or retired as the knowledge in various topic areas advances.
Research advancements from each VI will be extensively documented and widely distributed through the SoS Virtual Organization (SoS VO), an online unclassified repository for SoS community awareness, directed toward the maturing of the scientific basis for security.
This year, the SoS team hosted principal investigators (school representatives) from Arizona State University, the International Computer Science Institute, University of Kansas, Ohio State University, Towson University, and Vanderbilt University. Their presentations addressed wide-ranging technical topics from the VIs including “Improving Safety and Security of Neural Networks” (AI and Cybersecurity), “Advancing Security and Privacy of Bluetooth IoT” (Trusted Systems), and “Neurosymbolic Autonomous Agents for Cyber-Defense” (Defensive Mechanisms.) There are currently 11 funded VI projects this year, including projects with Carnegie Mellon University, which was awarded a contract after the kickoff meeting.
“Our research universities are a national treasure, and I want you to be aware of the impact of your work and the work of Science of Security,” said Dr. Glenn L., Acting Technical Director, Laboratory for Cybersecurity Research, during his closing remarks.
Glenn shared how one of the sections in the White House’s Office of Science, Technology, and Policy 4-year Cybersecurity R&D Strategy was influenced by a Science of Security project out-brief. “Your work can have outsized impact; impact in ways that we didn’t initially imagine, informing a broad range of cybersecurity research.”
For more information about the SoS initiative and to view this year’s SoS-VI projects, please visit http://www.sos-vo.org/research#lablets.
Interested in learning more about joining NSA’s mission? Visit NSA.gov/Careers for more information.
Source: National Security Agency NSA
The term D-Day was a shorthand expression first used in World War I to denote the date an operation was to be launched. In the earlier war, officers also used H-HOUR and M-MINUTE, but these were seldom used in World War II. Because of the scope of the 1944 operation and the momentous stakes, in common parlance, “D-Day” has come to refer primarily to the landings in Normandy.
The Germans had occupied France since 1940. When the Americans entered the war in December 1941, U.S. strategic thinking called for an immediate landing in France in conjunction with our British allies, followed by an advance to liberate the country and then press on to Berlin. Britain’s high command argued against this course of action, pointing out, correctly, that the Germans were well dug in, American forces lacked experience in combat against the powerful foe, and neither country had yet assembled the reserve of men and materiel such an effort required.
As a consequence, the Allies battled the Germans in North Africa, Sicily, and Italy – but by spring 1944, the time had come to land in France and carry the battle to the German homeland. Hundreds of thousands of American, British, and Canadian men readied to land on five beaches in Normandy, France, to face well-prepared German defensive positions.
The planning for this operation, codenamed OVERLORD, was complex, but the strategic planning staff had an important asset — SIGINT. This was ULTRA, the product of cryptanalysis of high-grade enemy cryptosystems such as the now-famous ENIGMA machine. Crucial information also was derived from decrypts of reports written by the Japanese ambassador to Germany, who had toured the beachfronts of France in the autumn of 1943.
Those who study intelligence know that ULTRA gave planners access to copious amounts of information about the German weaponry emplaced along the beaches, the order of battle of the defensive units, and the standing orders given to the defenders.
Less well known but no less important was the information on German defensive mines in the English Channel. This was a vital factor, since Britain and the United States were transporting their combat units across the channel in hundreds of ships.
ULTRA provided a great deal of data on German mine laying. Some of it came from communications of the boats actually creating the minefield, some of it came from instructions to German ships about cleared areas for their sailing. The information included types of mines used, as well as boundaries for closed and open channels.
This information allowed the Allies to select mine-free routes for the ships carrying the landing parties and identify areas where minesweeping actions would be a priority.
The official historian of British COMINT in World War II wrote, “Largely with the assistance of SIGINT, though not without much tedious analysis of it . . ., the programme was reconstructed in considerable detail — a fact which proved to be of considerable importance for the success of the landings.”
In addition to ULTRA, U.S. ground forces had tactical COMINT personnel who accompanied deployed troops and provided intelligence from low-level German or Japanese communications.
The U.S. Navy also had tactical COMINT teams aboard ships in the Mediterranean and European Theaters of War, called the Y Service, a term borrowed from British usage. One of the primary missions of these teams was to provide warning of enemy air attacks and to jam German radio-controlled bombs.
Initially, the U.S. Navy had to borrow intercept operators from the U.S. Army or the Royal Navy. In early 1944, the commander of U.S. naval forces in Northwest African waters asked the Chief of Naval Operations to send twenty-four men for training in Y Service operations. He noted that the candidates should be of good intelligence, without family ties in Axis countries, wholly trustworthy, and be thoroughly fluent in idiomatic German; if any had a knowledge of German shorthand, that would be especially desirable.
In March two officers and ten enlisted men were dispatched from the U.S. to Europe for Y Service training, which was to be provided by the British admiralty.
As Allied forces prepared for Operation NEPTUNE, the naval phase of the Normandy landings, seven naval Y teams were deployed. Three of the teams had only British personnel; the other teams had mixed U.S. and UK personnel. It was felt that training alone was insufficient for success; the U.S. had to overcome lack of experience by integration of personnel with its ally.
During the D-Day landings and afterward, the Y teams undertook twenty-four-hour coverage. This began on June 5 and continued through June 18. As one later report put it, “. . . [I]n the case of the Normandy Operation, Y service proved to be of little assistance because of the general lack of enemy aircraft and naval surface craft in the face of overwhelming Allied surface and air power.”
The Y Service teams were disbanded in January 1945. By this time, the German naval and air forces were no longer a threat to U.S. and British movement of troops and support for them from the British Isles to France.
Today is the 80th anniversary of D-Day, still the largest amphibious attack conducted in the face of an armed enemy. The sacrifice in life by British, Canadian, and American troops was heavy on this day in 1944, but the successful landings truly marked the beginning of the end for Adolph Hitler and Nazism.
Source: National Security Agency NSA
FORT MEADE, Md. – Joe K never had to worry about wearing his hearing aid to work at NSA buildings—until he upgraded his device a few years ago.
Joe, who is now the People with Disabilities Employee Resource Group (PWD ERG) Deaf and Hard of Hearing Subcommittee (DHHSC) chair, formerly used an analog hearing aid, which didn’t present a security risk. When he upgraded, he didn’t realize it was a problem until he was approached by a colleague wondering about the process for his new device to be approved by NSA Security & Counterintelligence (S&CI).
“Using hearing aids can be second nature, like putting your glasses on. Sometimes you don’t think about the technology behind it,” Joe said. “Many of us [deaf and hard of hearing affiliates] weren’t aware of the security requirements to bring them in NSA buildings.”
Starting in 2019, hearing aids began incorporating “hands-free calling,” a two-way audio Bluetooth technology. The new technology, however, presented an increased security threat to NSA — the potential for the transmission of classified conversations outside of a Sensitive Compartmented Information Facility (SCIF).
The issue with hearing aid technological improvements eventually brought together a number of stakeholders — including NSA Security & Counterintelligence (S&CI), NSA Research, and a Walter Reed Medical Center audiologist with close ties to the Veterans Administration (VA). The goal was to figure out how the deaf and hard of hearing community could take advantage of the new technology without compromising security.
“The reason manufacturers are putting two-way audio Bluetooth in hearing aids is because it improves audio quality. It allows people to hear and speak through phone calls more clearly without holding the phone up to their ear and mouth,” said Jason B, technology officer for the PWD ERG DHHSC. “In the past, many hearing aids included a one-way Bluetooth feature which did not pose a threat. But lately, the two-way audio Bluetooth feature is being added as standard in all hearing aids, and that is where it became pretty problematic.”
Some jobs at NSA specifically require keen hearing to listen to and translate audio samples. Without the support of a hearing aid, some affiliates would be unable to perform their jobs successfully, Jason explained.
“I met with the chief of S&CI to brief him on the importance of hearing aids and how they allow members of the DHH community to do our jobs,” Jason said. “Mitigating security risks of modern hearing aid devices is essential because there are currently thousands of NSA employees with both diagnosed and undiagnosed hearing loss, and potentially thousands more that could be impacted in the future.”
S&CI’s Office of Physical Security conducted some initial testing of devices equipped with this new two-way audio Bluetooth technology and determined the new hands-free calling feature would, in fact, introduce a wireless microphone into a SCIF, presenting a big security challenge.
“Mitigations were being considered to address the new challenge but the COVID pandemic intervened,” said Heather J, technical director in S&CI’s Office of Physical Security. “We were working hard because we knew this was important, but we couldn’t rush something that could have such serious implications.”
As denials of hearing aid applications began to pile up, some of the Agency ERGs stepped in to advocate on behalf of the affected workforce, according to Jason. The American Veterans ERG (AV ERG) raised the recurring denial concerns to the PWD ERG.
Around the same time as the spike in hearing aid denials at NSA, an audiologist from Walter Reed Medical Center noticed a large number of her VA patients were returning new devices she had prescribed due to their inability to wear them at work. The audiologist contacted S&CI to gain insight into the problem, and S&CI engaged Research’s Laboratory for Advanced Cybersecurity Research (LACR) to help find a solution.
One of the biggest challenges with assessing medical devices with two-way audio Bluetooth is that most of the information about the devices is proprietary, according to Stephanie P, Internet of Things (IoT) Security team lead for LACR’s Trust Mechanisms office.
“We were really fortunate that the audiologist worked closely with Veterans Affairs and had connections with the six major companies that manufacture hearing aids,” Heather said. “She was able to provide context to them on the hands-free Bluetooth feature, share the challenges it presented to employers, and discuss potential solutions.”
When a new hearing aid needed to be evaluated, the LACR team was there with its tailored test scenarios, Stephanie explained.
“We provided detailed testing reports and vulnerability analysis, empowering senior leadership to make informed decisions on which devices to allow into our secured spaces,” she said. “One of the largest hearing aid manufacturers offered a disablement mitigation,” by programming software into its devices that would allow only the audiologist to deactivate the two-way audio Bluetooth feature. The user would still have the benefit of streaming the audio, one-way, directly into their hearing aid without external transmission.
“This viable mitigation was a monumental first step in ensuring NSA affiliates could have access to the latest advances in smart medical technology while at work,” said Stephanie, explaining Research doesn’t normally do this type of work but was pulled in to lead the Bluetooth assessment because of its expertise in IoT security.
In early 2023, the Agency announced it would allow this company’s Bluetooth hearing aids in SCIFs after going through the approval process.
The challenge of these two-way audio Bluetooth medical devices isn’t limited to NSA, according to Heather, who has been partnering with Office of the Director of National Intelligence (ODNI) to address concerns across the Intelligence Community.
“I wrote the current [NSA hearing aid Bluetooth mitigation] policy and am currently working with ODNI to write the medical device policy, which will apply to the entire Intelligence Community,” Heather said.
Both Heather and Stephanie are thrilled at the progress that has been made.
“I am extremely happy and proud that I was able to play a part in allowing certain Bluetooth enabled hearing aids into NSA SCIFs,” Stephanie said. “It is fantastic that this work is enabling employees with hearing loss to be able to take advantage of the latest advancements in hearing aid technology while they’re at work.”
“Balancing the needs of our workforce with the security of our facilities is getting harder as technologies get more advanced,” Heather agreed. “We’re really excited to have a way forward for this hearing aid feature, and we’re continuing to look at novel ways to mitigate new and emerging technical threats to maximize our ability to permit the latest and greatest in technology without compromising our missions.”
NSA Media Relations
MediaRelations@nsa.gov
443-634-0721
Source: National Security Agency NSA
FORT MEADE, Md. – A buzz is reverberating throughout the Defense Industrial Base (DIB) about the National Security Agency (NSA).
Word has spread that the Agency’s new Cybersecurity Collaboration Center (CCC) offers no-cost cybersecurity services, and businesses are signing up in growing numbers, according to CCC Chief Morgan Adamski: “Companies see the value not just for their bottom line, but also for national security.”
Established in 2020, the CCC embraces one of NSA’s primary strategies for cybersecurity: scaling public-private partnerships empowered by insights derived from foreign signals intelligence.
To date, more than 1,000 industry partners have signed up for CCC services. These companies have broad and deep reach, ranging from major service providers that can harden billions of endpoints to small businesses that provide critical components to the nation’s most sensitive systems.
Working together with the CCC as the bridge, NSA and its partners are sharing insights and building a comprehensive threat picture that is mutually beneficial.
Small businesses make up the majority of the DIB supply chain (70%). These small businesses have access to sensitive Department of Defense (DoD) information, but often don’t have the technical expertise or other resources to defend their networks against a sophisticated nation state threat, said Bailey Bickley, NSA’s DIB Defense Chief.
“These companies are an attractive target for our adversaries who are seeking to steal U.S. intellectual property in order to build their own military capabilities and economies,” said Bickley. “We don’t expect small businesses to defend against nation-state threats alone. It’s in NSA’s and DoD’s best interests to help.”
Mike T. is the founder and owner of a small defense contractor that manufactures critical components for national security systems. When he recently learned that his company’s network contained slight misconfigurations, he jumped on the issue and reached out to NSA for help.
“We don’t want people finding a backdoor and stealing drawings and next thing you know, we are on the hook,” he said.
Analysts at the CCC were able to enroll Mike’s company in NSA’s DIB Cybersecurity as a Service (CSaaS) offerings. As a result, the company received technical assistance to help improve his company’s network security. This included enrollment in a Protective Domain Name System (PDNS) service, which blocks users from connecting to known malicious or suspicious domains by running them through a filter —composed of commercial threat feeds and a unique threat feed provided by NSA — prior to resolving them. The integration was “seamless” and took 15 minutes, he said.
Further, the networks for Mike’s company are now hardened against malicious nation-state actors who could steal its intellectual property, putting the nation’s insights and investments at risk.
“As a small business, we don’t have the unlimited resources that the big players have, so we appreciate anything that gives us an edge,” said Mike, whose workforce numbers between 8 and 32 people depending on production cycles. “It is one less thing to think about, one less expense, and one less worry.”
NSA also benefits by receiving DNS data that the CCC is able to run custom analytics over to better understand ways nation-state actors are targeting the DIB, and then, defend against them.
The service is processing 70 million DNS queries a day and has blocked billions of malicious queries to date, including ransomware activity and known nation-state spear phishing, malware, and botnets, according to statistics compiled by the Cybersecurity Directorate’s DNS provider.
PDNS is just one part of the CCC’s suite of services offered to the DIB that the DoD funds. Other core services provided by the DIB Defense Team are Attack Surface Management — gaining an adversarial view of a company’s network and then finding and fixing issues — and Threat Intelligence Collaboration — staying ahead of the adversary by receiving non-public, DIB-specific NSA threat intelligence.
Attack Surface Management helps customers prioritize patching by providing an inventory of internet-facing assets, running vulnerability scans across those assets to determine where they may be vulnerable, then prioritizing results based off which vulnerabilities are under active exploitation.
Two newer authorities, delegated by the Secretary of Defense and the DoD Chief Information Officer, underpin the CCC’s ability to engage in bilateral information sharing with companies: the 2019 National Defense Authorization Act Section 1642b, and the 2020 DIB Delegation of Authorities.
Companies with active DoD contracts are encouraged to learn more about the CCC and enroll in NSA’s DIB Cybersecurity services. Get started by filling out a Cybersecurity Services Contact Form.
NSA Media Relations
MediaRelations@nsa.gov
443-634-0721