News & Information       http://info.owt.com

Security

12/20/2018   Security Focus Vulnerabilities
GIMP CVE-2017-17786 Heap Buffer Overflow Vulnerability
01/23/2018   Security Focus Vulnerabilities
SEC Consult SA-20180123-0 :: XXE & Reflected XSS in Oracle Financial Services Analytical Applications
01/23/2018   Security Focus Vulnerabilities
[SECURITY] [DSA 4094-1] smarty3 security update
01/23/2018   Security Focus Vulnerabilities
[security bulletin] HPESBHF03805 rev.7 - Certain HPE products using Microprocessors from Intel, AMD, and ARM, with Speculative Execution, Elevation of Privilege and Information Disclosure.
01/23/2018   Security Focus Vulnerabilities
CentOS Web Panel v0.9.8.12 - Remote SQL Injection Vulnerabilities
01/23/2018   SecurityFocus News
Enterprise Intrusion Analysis, Part One
01/23/2018   SecurityFocus News
Responding to a Brute Force SSH Attack
01/23/2018   SecurityFocus News
Data Recovery on Linux and <i>ext3</i>

>> Advertisement <<
Can you answer the ERP quiz?
These 10 questions determine if your Enterprise RP rollout gets an A+.
http://www.findtechinfo.com/as/acs?pl=781&ca=909
01/23/2018   SecurityFocus News
WiMax: Just Another Security Challenge?
01/23/2018   SecurityFocus News
Time to Squish SQL Injection
01/23/2018   SecurityFocus News
Lazy Workers May Be Deemed Hackers

>> Advertisement <<
Can you answer the ERP quiz?
These 10 questions determine if your Enterprise RP rollout gets an A+.
http://www.findtechinfo.com/as/acs?pl=781&ca=909
01/23/2018   SecurityFocus News
The Scale of Security
01/23/2018   SecurityFocus News
Hacker-Tool Law Still Does Little
01/23/2018   Forbes Security
After the government of Hawaii sent a warning to cellphones telling Hawaiians that they were about to be hit by an ICBM, it took 38 minutes for the mistake to be corrected. Now we know why.
01/23/2018   Forbes Security
For the second week in a row, Michael Wolff's look inside the Trump White House "Fire and Fury" is atop the New York Times' best sellers list. Its popularity has not gone unnoticed by cybercriminals.
01/23/2018   InfoWorld Security
Blockchain continues to evolve and grow, as more companies test it out. It's now seen as the heart of a new global shipping platform that could save companies billions of dollars and as the underpinning for a P2P cloud storage endeavor.
01/23/2018   Department of Homeland Security
Release Date: 
January 23, 2018

International cooperation in science, technology, and innovation promotes security, prevents and reduces risks of manmade and natural hazards, and enhances resilience. As the research and development arm of the Department of Homeland Security (DHS), the Science and Technology Directorate (S&T) understands the importance of global cooperation and engages with its international partners to enhance homeland security capabilities.

Through its International Cooperative Programs Office (ICPO), S&T maintains valuable partnerships with a number of nations. Among these international partners, Israel stands out due to a rich research and development collaboration portfolio with S&T. The U.S. and Israel began their annual bilateral meetings in 2008.Demo of EOD Robot prototype by DHS S&T’s First Responders Group and Israel National Police at New Jersey State Police (New Brunswick, NJ Nov 2017).

Through five working groups under various S&T components—the First Responders Group (FRG), Cyber Security Division, Borders and Maritime Security Division, Chemical and Biological Defense Division, and the Explosives Division—S&T and Israel’s Minister of Public Safety (MOPS) have collaborated on numerous projects benefiting public security.

“During my first visit to Israel in my current role, I had the chance to see firsthand the importance of our partnership with Israel and the how this joint collaboration is contributing to the success to our mutual portfolios,” said William N. Bryan, Senior Official Performing the Duties of the Under Secretary for Science and Technology for the Department of Homeland Security.

Mr. Bryan’s recent comments came after the two countries signed a comprehensive chemical/biological (chem-bio) project arrangement during the eighth annual bilateral meeting in Tel Aviv in September 2017. This project will fund develop technologies for first responders’ use during chemical or biological attacks, accidents or incidents.

“We have big expectations from this new initiative. The intent is to improve the response capability of first responders to chem-bio hazards. We want our first responders to be better prepared when dealing with such events,” said Yaron Kron, head of the Technology Division within the Ministry of Public Security of Israel.

The new chem-bio project is expected to open the door for collaboration between S&T and Israel’s Ministry of Defense.

S&T's First Responders Group and the BIRD Foundation

With its multiple projects and thanks to its partnership with the Israel-U.S. Binational Industrial Research and Development (BIRD) Foundation, FRG actively collaborates with Israel. DHS S&T and the MOPS established a cooperative activity to promote and fund jointly developed technologies for first responders. Managed by the BIRD Foundation this joint research effort supports the development of S&T’s Next Generation First Responder Apex Program technology capabilities to ensure first responders are better protected, connected and fully aware.

Demo of EOD Robot prototype by DHS S&T’s First Responders Group and Israel National Police at New Jersey State Police (New Brunswick, NJ Nov 2017).“When you combine innovation from two countries with different points of view and experiences, the results you get can be very creative. The U.S. - Israel BIRD Foundation becomes a bridge between the innovation and the markets in both countries. It is an important bridge,” said Dr. Eitan Yudilevich, Executive Director of the BIRD Foundation, as he described the partnership.        

The program has identified 21 first responder capability gaps. Entering its third year, the FRG-BIRD foundation partnership has approved investing $3.7 million in four projects, covering five of those 21 capability gaps, from indoor tracking of first responders to search and rescue using unmanned robots. Going forward, the program seeks to include additional innovative technologies, such as wearable sensors, advanced video capabilities and other technologies for next generation first responders

As a member of the International Forum to Advance First Responder Innovation (IFARI), Israel actively participates with S&T and representatives from 12 other nations and the European Commission in identifying requirements for first responders around the world.

“IFARI provides a very good framework, and we encourage companies to use the outcomes of the forum decisions for better exposure to a broader market,” Dr. Yudilevich said. “We hope to extend the program to the larger homeland security space, including border protection and secondary response agencies, in the coming years.”

BIRD announced its third call for proposals early in January, 2018 and the selection of new projects is planned for June 2018.

 

Caption for both photos: Demo of EOD Robot prototype by DHS S&T’s First Responders Group and Israel National Police at New Jersey State Police (New Brunswick, NJ Nov 2017). S&T photo.

 

Topics: 
01/23/2018   Department of Homeland Security
Release Date: 
January 23, 2018

For Immediate Release
Office of the Press Secretary
Contact: 202-282-8010

WASHINGTON –  Today, The Department of Homeland Security (DHS) announced that it has issued a waiver to ensure the expeditious construction of barriers and roads in the vicinity of the international border in the state of New Mexico, near the Santa Teresa, New Mexico port of entry.  The waiver was published in the Federal Register today.

This waiver is pursuant to authority granted to the Secretary of Homeland Security by Congress and covers a variety of environmental, natural resource, and land management laws.  Congress provided the Secretary of Homeland Security with a number of authorities necessary to carry out DHS’s border security mission.  One of these authorities is found at section 102 of the Illegal Immigration Reform and Immigrant Responsibility Act of 1996, as amended (“IIRIRA”).  Section 102(a) of IIRIRA provides that the Secretary of Homeland Security shall take such actions as may be necessary to install additional physical barriers and roads in the vicinity of the United States border to deter illegal crossings in areas of high illegal entry into the United States.  In section 102(b) of IIRIRA, Congress has called for the installation of additional fencing, barriers, roads, lighting, cameras, and sensors on the southwest border.  Finally, in section 102(c) of IIRIRA, Congress granted to the Secretary of Homeland Security the authority to waive all legal requirements that the Secretary, in Secretary’s sole discretion, determines necessary to ensure the expeditious construction of the barriers and roads authorized by section 102 of IIRIRA.

The Department exercised the waiver authority in Section 102 (c) of IIRIRA on five occasions from 2005 to 2008 and on two occasions in 2017.

The geographic scope of this waiver covers an approximately 20 mile segment of the border starting at the Santa Teresa port of entry and extending westward.  This is within the Border Patrol’s El Paso Sector. The El Paso Sector remains an area of high illegal entry.  In fiscal year 2016 alone, the United States Border Patrol apprehended over 25,000 illegal aliens and seized approximately 67,000 pounds of marijuana and approximately 157 pounds of cocaine in the El Paso Sector.  To begin to meet the need for additional border infrastructure in this area, DHS will replace legacy vehicle barrier that no longer meets the Border Patrol’s operation needs with new bollard wall.      

While the waiver eliminates DHS’ obligation to comply with various laws with respect to covered projects, DHS remains committed to environmental stewardship.  DHS has been coordinating and consulting, and intends to continue doing so, with other federal and state resource  agencies to ensure that impacts to the environment, wildlife, and cultural and historic artifacts are analyzed and minimized, to the extent possible.

DHS continues to implement President Trump’s Executive Order 13767 - also known as Border Security and Immigration Enforcement Improvements – and continues to take steps to immediately plan, design and construct a physical wall along the southern border, using appropriate materials and technology to most effectively achieve complete operational control of the southern border.

# # #

Topics: 
01/23/2018   Trend Micro Security
Every device sooner or later begins to run slower and slower. Even the Mac, which is a highly-efficient Apple product, starts to slow down and becomes a real pain to use over time. If you are a heavy Mac user this is especially true and you are more likely to experience performance issues.   There...
01/23/2018   Sophos Security
Malware-infected gas pumps display the false data, and customers end up with up to 7% less gas than they paid for
01/23/2018   Sophos Security
Of all the adversaries facing the US in cyberspace, there is one that the FBI and CIA often seem to struggle to contain: teenagers.
01/23/2018   Sophos Security
It's found and banned thousands more automated Russian accounts, and it's planning for detecting such accounts better in time for mid-terms.
01/23/2018   Security Focus Vulnerabilities
Multiple CPU Hardwares CVE-2017-5754 Information Disclosure Vulnerability
01/23/2018   Security Focus Vulnerabilities
Multiple CPU Hardwares CVE-2017-5715 Information Disclosure Vulnerability
01/23/2018   Security Focus Vulnerabilities
Multiple CPU Hardwares CVE-2017-5753 Information Disclosure Vulnerability
01/22/2018   Department of Homeland Security
Release Date: 
January 23, 2018

253 Russell Senate Office Building

Good morning Chairwoman Fischer, Ranking Member Booker, and distinguished Members of the Committee. Thank you for inviting me here today to testify about the Transportation Security Administration’s (TSA) role in surface transportation security.

My colleagues at TSA and I appreciate the continued support of this Committee and its Members, as we carry out our vital security mission. We are grateful for the constructive relationship TSA enjoys with this Committee, and I look forward to building on this relationship during my tenure at the helm of TSA.

The U.S. surface transportation system is a complex, interconnected network made up of mass transit systems, passenger and freight railroads, over-the-road bus operators, motor carrier operators, pipelines, and maritime facilities. These modes operate in close coordination with – and in proximity to – one another every day. To that point, the different modes of the surface transportation system often use the same roads, bridges, and tunnels to function. In short, the American economy and way of life depend on this network continuing to operate securely and safely.

To put the size of the system into perspective, consider that over 11 million passengers daily travel on the New York Metropolitan Transportation Authority (NY MTA) system alone. And more than 10 billion trips are taken each year on 6,800 U.S. mass transit systems, ranging from very small bus-only systems in rural areas to very large multi-modal systems, like the NY MTA, in urban areas. More than 500 individual freight railroads carrying essential goods operate on nearly 140,000 miles of track. Eight million large capacity commercial trucks and almost 4,000 commercial bus companies travel on the four million miles of roadway in the United States and on more than 600,000 highway bridges greater than 20 feet in length and through 350 tunnels greater than 300 feet in length. Over-the-road bus operators carry approximately 750 million intercity bus passengers each year. The pipeline system consists of approximately 3,000 private companies, which own and operate more than 2.5 million miles of pipelines transporting natural gas, refined petroleum products, and other commercial products.

As you can see, securing surface transportation is a critically important and complex undertaking. Recent terror attacks and plots – like the attempted suicide bombing in the New York City Port Authority Bus Terminal and an increase in vehicle ramming incidents around the world, including the most recent attack also in New York City – provide compelling reminders of the difficulty in securing a “system of systems” that is designed to quickly move massive volumes of passengers and commodities.

I look at three things when assessing risk in any particular transportation mode; the threat, the vulnerability, and the consequence, should an incident occur. When it comes to the surface mode, I take the threat very seriously. Because of the open nature of these systems, high ridership, and the types of commodities transported, the system is inherently vulnerable and the consequences of an attack would be high. Although we have invested significant resources and implemented numerous programs and policies to reduce identified vulnerabilities and minimize potential consequences, in the current climate, vigilance and preparation can only take us so far. I am actively assessing how best to leverage and enhance TSA’s surface expertise to strengthen our partnership with surface stakeholders.

TSA’s Role

Unlike aviation, where TSA has been heavily involved in day-to-day security operations since its inception, surface transportation security has primarily been approached as a partnership with surface transportation owners and operators because they, not TSA, are primarily responsible for their own security operations. We believe this collaborative approach and relationship with surface owners and operators is appropriate. The interconnected, varied and expansive scope of the surface transportation system creates unique security challenges that are best addressed by system owners and operators and federally supported through stakeholder communication, coordination, and collaboration. TSA takes our security role for surface transportation very seriously. To best support surface transportation owners and operators with their security needs, we focus our efforts on system assessments, voluntary operator compliance with industry standards, collaborative law enforcement and security operations, accurate and timely exchange of intelligence information, and regulatory oversight.

TSA’s different role in security for surface transportation versus aviation is understandably reflected in its annual appropriation. Although TSA’s budget for surface transportation is small compared to the aviation sector, the nation realizes a significant return from this investment. TSA’s resources and personnel directly support ongoing security programs with committed security partners who, in turn, dedicate millions of dollars to secure critical infrastructure, provide uniformed law enforcement and specialty security teams, and conduct operational activities and deterrence efforts. TSA invests its resources to help those partners identify vulnerabilities and risks in their operations, and works with specific owners/operators to develop and implement risk-mitigating solutions to address their specific vulnerabilities and risks.

TSA is a co-Sector Specific Agency along with Department of Transportation (DOT) and United States Coast Guard (USCG) for the transportation sector. The USCG is the lead federal agency for maritime security in the U.S., and TSA supports the USCG in its maritime security efforts and in coordinating interagency efforts for the maritime mode. DOT and TSA work collectively to integrate safety and security priorities for the other modes of surface transportation. Although DOT’s regulations relate to safety, many safety activities and programs also benefit security and help to reduce overarching risk to the transportation system. In the surface environment, TSA has built upon those standards to improve the security posture with minimal regulations.

TSA’s Approach

Information and intelligence sharing is at the heart of TSA’s approach to surface transportation security. Whether we are providing unclassified information about known tactics, or classified information about specific threats, TSA works to deliver information to the appropriate surface transportation security partners. We maintain a communication network that facilitates the timely dissemination of information to stakeholders so they can take appropriate actions to prepare for, prevent and defeat acts of terrorism.

TSA also provides training and exercise support to surface transportation operators and their employees. The focus of those efforts is often on ensuring the effectiveness of communication channels, response plans, and other operational protocols. From frontline employees to security executives, TSA works to provide tools that enhance preparedness and close gaps in security planning. We host activities ranging from tabletop to full-scale exercises that focus on events associated with a single transit system to multi-modal regional events that bring federal, state, and local security and emergency response partners together.

Without the partnership, collaboration, and initiative of surface owners and operators, TSA could not fulfill our surface transportation security mission in making systems as safe and secure as practical. I have met with many representatives of the surface transportation community to better understand their concerns and perspective on securing the transportation network and continue to make this type of open dialogue a priority. To that end, TSA is hosting a Surface Public Area Security Summit next month to discuss security best practices and promote additional collaboration. This event will bring together domestic and international surface transportation stakeholders to discuss security challenges, various approaches to addressing them, and opportunities for future collaboration.

Innovation and Technology

The inherently open and expansive scope of surface passenger transportation and the evolving threat to it requires TSA to continue researching and developing innovative processes and technologies to increase security without creating undesired financial or operational burdens. Partnership is the key to fostering innovation and ensuring the surface transportation system is secure both today and in the future.

TSA incorporates partner needs and capability gaps into our work to influence and stimulate the development of new security technologies in the marketplace. This effort is designed to make more readily available innovative and advanced technologies useful for public area security. We try to keep pace with the fast-moving advancement of security technologies to address current and evolving threats by looking at emerging technologies, including from outside the transportation environment, to determine applicability to the surface transportation environment. TSA works closely with surface transportation owners and operators to introduce new technology and approaches to securing surface transportation through collaborative operational test beds for different modes of transportation (mass transit, highway motor carrier, pipeline, and freight rail), and critical infrastructure protection security technology projects to address the increasing threat demonstrated from attacks world-wide. For example, TSA is presently working with New Jersey Transit, Washington Metropolitan Transit Authority, Amtrak, and Los Angeles Metro to assess the effectiveness of technologies designed to address threats associated with person- and vehicle-borne improvised explosive devices.

Implementing 9/11 Recommendations

We continue to work to address the remaining requirements of the Implementing Recommendations of the 9/11 Commission Act of 2007 (9/11 Act, Public Law 110-53). To date, TSA has met over 90% of the mandates imposed by the 9/11 Act, including 39 of the 42 surface transportation security-related mandates. Completing the remaining 9/11 Act requirements is among my highest priorities.

These mandates include the issuance of regulations for surface transportation employee training and vetting, the conducting of vulnerability assessments and standards for security plans, and mandates for the technology work just described. In December 2016, TSA issued the Notice of Proposed Rulemaking (NPRM) for the Surface Employee Training Rule and the Advance Notice of Proposed Rulemaking (ANPRM) for the Vulnerability Assessment and Security Plan Rule; TSA anticipates publication of the final Training Rule this fiscal year. While working on these rulemakings, TSA has taken steps through collaborative initiatives and assessments to ensure that front line employees receive security training and that owners and operators have robust security programs which include security plans, employee vetting and exercises.

Although the finalization of these rules is pending, TSA has worked diligently with stakeholders that would be affected by these rules to implement programs that meet, and in several instances exceed, what would be required by the rules. For example, TSA evaluates several areas required for a sound security program through our Baseline Assessment for Security Enhancement (BASE) program, including security training, security planning, and employee and contractor vetting. The majority of the higher-risk transit systems (those with daily passenger trips of 60,000 or higher) achieved a score of 90% or higher in the security planning, security training, and employee and contractor vetting areas in their most recent BASE reviews.

Conclusion

In closing, I believe a reinvigorated strategy is an essential foundation for success in our mission, and I have engaged my executive staff, with their years of experience, to reexamine and re-envision TSA’s strategy and to place a much greater emphasis on surface transportation security – both in organizational and mission focus. I have also engaged many private sector surface transportation owners and operators to improve strategic partnerships and promote effective collaboration, and look forward to ongoing engagement with members of this committee as we develop our strategic path forward for TSA.

Chairwoman Fischer, Ranking Member Booker, and Members of the Committee, thank you for the opportunity to testify before you today. I am honored to serve in this capacity and I look forward to your questions.

01/22/2018   Sophos Security
An Indian researcher has created a stir by claiming Uber's 2FA is "useless". What's the full story?
01/22/2018   Forbes Security
Cryptocurrency is forcing us to re-evaluate laws, regulations, and community financial standards. Jibrel Network is here to handle that.
01/22/2018   InfoWorld Security

This powerful micro-cut shredder from AmazonBasics turns a letter-sized sheet into 2,235 pieces of confetti, up to 6 sheets at a time (5/32 by 15/32 inches; security level P-4). Inserted one at a time, it also destroys credit cards, rendering them completely unusable. It features a generous 4.1-gallon waste bin that is easy to manage. This micro-cut shredder averages 4.5 out of 5 stars on Amazon from over 1,900 people (72% rate a full 5 stars: read reviews). Its typical list price of $50 has been reduced 29% to $36. See it on Amazon.

To read this article in full, please click here

01/22/2018   InfoWorld Security
Rob Lee, faculty fellow at the SANS Technology Institute, talks with host Steve Ragan about his group's work to help companies out of sticky situations, plus the state of the security industry and predictions for 2018.
01/22/2018   Sophos Security
A paper at Schmoocon 2018 over the weekend revealed a delightful cryptogram on William and Elizebeth Friedmans' tombstone.
01/22/2018   Sophos Security
In other words keep data-collecting, privacy-invading license plate cameras away from our cars.
01/22/2018   Sophos Security
Oman’s stock exchange has fixed a serious router security misconfiguration.
01/22/2018   Sophos Security
Where do they live? Why do they do it? HOW do they do it? HackerOne surveyed its registered ethical hackers to find out.
01/22/2018   Sophos Security
From how Gmail users could improve their security easily and Hawaii's emergency management password sticky note to the Netflix phish going after your login, credit card and ID, and more!
01/22/2018   Sophos Latest Virus Alerts
01/22/2018   Sophos Latest Virus Alerts
01/22/2018   Sophos Latest Virus Alerts
01/22/2018   Sophos Latest Virus Alerts
01/22/2018   Sophos Latest Virus Alerts
01/22/2018   Sophos Latest Virus Alerts
01/22/2018   Sophos Latest Virus Alerts
01/22/2018   Sophos Latest Virus Alerts
01/22/2018   Sophos Latest Virus Alerts
01/22/2018   Sophos Latest Virus Alerts
01/21/2018   Forbes Security
Leading the fields of artificial intelligence, fintech, cyber security and robotics, these are the 30 young people to watch in European tech this year.
01/21/2018   Forbes Security
In October, 2001, small teams of American soldiers on horseback defeated thousands of Taliban fighters because the soldiers were trained in one critical leadership skill: Persuasion.
01/19/2018   Department of Homeland Security
Release Date: 
January 19, 2018

For Immediate Release
Office of the Press Secretary
Contact: 202-282-8010

DHS Enforcing Critical Identification Requirements to Protect the Homeland

WASHINGTON – Beginning February 5, 2018, residents of American Samoa will no longer be able to use territory-issued driver’s licenses or identification cards to fly domestically, or enter federal buildings and military installations. On that date, the Department of Homeland Security (DHS) will begin enforcing compliance with the Real ID Act to better protect the American people.

American Samoa formerly had an extension that allowed federal agencies to continue to accept its driver’s licenses and identification cards. However, that extension expired on October 10, 2017, triggering a three month grace period before enforcement would begin on February 5, 2018. American Samoa has subsequently not been able to demonstrate a clear achievable plan for compliance as needed to receive a new extension. 

DHS continues to work with American Samoa on what actions it can take to receive a new extension. DHS has provided grants and offers technical assistance to support compliance with the REAL ID security requirements.

IMPACT ON AMERICAN SAMOA RESIDENTS

As a result of today’s decision, a driver’s license or ID issued by American Samoa (AS) will no longer be an acceptable document to board a federally-regulated commercial aircraft. American Samoa is the only state or territory that has not reached compliance or received an extension. As a result, starting February 5, 2018, American Samoan residents should bring to the airport an identity document acceptable to TSA. TSA provides a list of acceptable documents here

To allow for a smooth transition, between February 5, 2018 and May 6, 2018, TSA will provide assistance to American Samoans who arrive at an airport without an acceptable identification document. 

For federal buildings and military bases, REAL ID only affects locations where individuals are required to present an identification document for access. It does not require individuals to present identification where it is not otherwise required. When planning a visit to a Federal facility or military base, residents of American Samoa should contact the facility to determine what, if any, identification is needed for access.

BACKGROUND ON REAL ID

Based on a recommendation of the bipartisan 9/11 Commission, REAL ID is a coordinated effort by the states and the federal government to inhibit terrorists’ ability to evade detection by using fraudulently-obtained driver’s licenses and identification cards. The REAL ID Act was passed by Congress in 2005, and is designed to ensure that people boarding a flight or entering a federal building are who they say they are.

REAL ID established minimum security standards for state-issued driver’s licenses and identification cards. This includes incorporating anti-counterfeiting technology, preventing insider fraud, and using documentary evidence and record checks to ensure a person is who he or she claims to be. It also prohibits federal agencies from accepting non-compliant licenses and identification cards for access to federal facilities, nuclear power plants, and commercial aircraft. The goal of REAL ID is to improve the reliability and accuracy of state-issued driver’s licenses and identification cards used for Federal official purposes.

Because of the potential for confusion about the REAL ID enforcement milestones, residents can use the following guidelines to be fully informed and prepared.

  • Be aware of changes to American Samoa’s status. You can check for updates on REAL ID compliance or extensions at www.dhs.gov/real-id.
  • Read answers to frequently asked questions at www.dhs.gov/real-id-public-faqs.
  • Bring identity documents to the airport that are acceptable for flying domestically. TSA provides a list of acceptable alternative documents at www.tsa.gov/travel/security-screening/identification. If you need to obtain a new form of ID, please allow sufficient processing time before you travel. For example, the current processing times for U.S. passports are 6-8 weeks for routine service and 2-3 weeks for expedited service.

DHS is working closely with American Samoa to implement their REAL ID requirements and stands ready to provide additional assistance as needed. The women and men of DHS will continue to work tirelessly to put protections in place to keep our country and our people safe.

# # #

Keywords: 
01/19/2018   Department of Homeland Security
Release Date: 
January 19, 2018

For Immediate Release
Office of the Press Secretary
Contact: 202-282-8010

DHS Enforcing Critical Identification Requirements to Protect the Homeland

WASHINGTON - Beginning February 5, 2018, the Department of Homeland Security (DHS) will begin enforcing compliance with the Real ID Act to better protect the American people. Fifty-five out of fifty-six states and territories are currently compliant or have received an extension until October 10, 2018. Passengers who have licenses issued by a state or territory that is compliant or has an extension to become compliant with REAL ID requirements may continue to use their licenses as usual.

As of today, American Samoa (AS) is the only territory that has not reached compliance or received an extension. This means that starting February 5, 2018, residents will not be able to use AS-issued driver’s licenses or identification cards to fly domestically, access federal facilities (including military bases), or nuclear power plants.

American Samoa formerly had an extension that allowed federal agencies to continue to accept its driver’s licenses and identification cards. However, that extension expired on October 10, 2017, triggering a three month grace period before enforcement would begin on February 5, 2018. American Samoa has subsequently not been able to demonstrate a clear and achievable plan for compliance as needed to receive a new extension. 

DHS has worked extensively with every state and territory to provide time, technical assistance, and grants to support compliance with the REAL ID security requirements. The Department continues to urge territorial officials to take action, allowing residents of American Samoa to obtain driver’s licenses or identification cards that meet these enhanced security standards.

Background on REAL ID

Based on a recommendation of the bipartisan 9/11 Commission, REAL ID is a coordinated effort by the states and the federal government to inhibit terrorists’ ability to evade detection by using fraudulently-obtained driver’s licenses and identification cards. The REAL ID Act was passed by Congress in 2005, and is designed to ensure that people boarding a flight or entering a federal building are who they say they are.

REAL ID established minimum security standards for state-issued driver’s licenses and identification cards. This includes incorporating anti-counterfeiting technology, preventing insider fraud, and using documentary evidence and record checks to ensure a person is who he or she claims to be. It also prohibits federal agencies from accepting non-compliant licenses and identification cards for access to federal facilities, nuclear power plants, and commercial aircraft. The goal of REAL ID is to improve the reliability and accuracy of state-issued driver’s licenses and identification cards used for Federal official purposes.

Because of the potential for confusion about the REAL ID enforcement milestones, residents can use the following guidelines to be fully informed and prepared.

  • Be aware of your state’s status. You can check if your state is REAL ID compliant or has an extension at www.dhs.gov/real-id.
  • Read answers to frequently asked questions at www.dhs.gov/real-id-public-faqs.
  • Bring identity documents to the airport that are acceptable for flying domestically. TSA provides a list of acceptable documents at www.tsa.gov/travel/security-screening/identification. If you need to obtain a new form of ID, please allow sufficient processing time before you travel. For example, the current processing times for U.S. passports are 6-8 weeks for routine service and 2-3 weeks for expedited service.

DHS is working closely with all states and territories to implement their REAL ID requirements and stands ready to provide additional assistance as needed. The women and men of DHS will continue to work tirelessly to put protections in place to keep our country and our people safe.

# # #

 

Keywords: 
01/19/2018   Forbes Security
1.2 billion people around the world use Gmail. Only 10% of them are using one of its best features.
01/19/2018   Forbes Security
Chinese smartphone maker hacked in November as hackers pilfered credit card information in plain text.
01/19/2018   Trend Micro Security
It’s been just over 14 years since I almost left this crazy world due to a bad car accident. I have a number of scars and daily pains that serve as reminders of that day. While some may think scars and pain are a burden and a nuisance, I think of them as reminders of...
01/19/2018   Trend Micro Security
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, we saw discussion on the ransomware attacks plaguing institutions in the New Year, and emerging malware targeting Meltdown/Spectre patches. Read on to learn more.     SAMSAM...
01/19/2018   Sophos Security
SophosLabs has published a technical report digging into the details of a not-so-super "Super Antivirus" charade on Google Play.
01/18/2018   Forbes Security
Risk management and insurance have to shift to meet new threats and new demands in a digitally connected world.
01/18/2018   Forbes Security
Hackers used Facebook and WhatsApp phishing to score massive data haul in a sloppy surveillance op.
01/18/2018   Department of Homeland Security
Release Date: 
January 18, 2018

DHS has received new information about this privacy incident that clarifies the impacted population:

  1. If you received a written notification from Philip S. Kaplan, you were part of a finite list of approximately 246,167 DHS employees.  Most but not all of the DHS employees on this list were employed by DHS in 2014, however, some may have been employed by DHS in other years.  The written notice you received incorrectly identified the year in which an affected person may have been employed by DHS as 2014.  This update does not change your inclusion on the list of affected individuals.
  2. You may also have been affected if you were associated with a DHS OIG investigation from 2002 through 2017.  This population was previously indicated as being from 2002 -2014.  Due to technological limitations, DHS is unable to provide direct notice to these individuals.

Please refer to the updated FAQs below for more information and guidance.

Original Message

Release Date:  January 3, 2018

On January 3, 2018, select DHS employees received notification letters that they may have been impacted by a privacy incident related to the DHS Office of Inspector General (OIG) Case Management System.  The privacy incident did not stem from a cyber-attack by external actors, and the evidence indicates that affected individual’s personal information was not the primary target of the unauthorized unauthorized transfer of data.

Message Received by Affected DHS Employees

This message is to inform you of a privacy incident involving a database used by the Department of Homeland Security’s (DHS) Office of the Inspector General (OIG).  You may have been impacted by this privacy incident if you were employed by DHS in 2014, or if you were associated with a DHS OIG investigation from 2002 through 2014. 

On May 10, 2017, as part of an ongoing criminal investigation being conducted by DHS OIG and the U.S. Attorney’s Office, DHS OIG discovered an unauthorized copy of its investigative case management system in the possession of a former DHS OIG employee.

This privacy incident involved the release of personally identifiable information (PII) contained in the DHS OIG case management system and affects two groups of individuals. The first group consists of approximately 247,167 current and former federal employees that were employed by DHS in 2014 (the “DHS Employee Data”).  The second group is comprised of individuals (i.e., subjects, witnesses, and complainants) associated with DHS OIG investigations from 2002 through 2014 (the “Investigative Data”).

The privacy incident did not stem from a cyber-attack by external actors, and the evidence indicates that affected individual’s personal information was not the primary target of the unauthorized exfiltration.

All individuals potentially affected by this privacy incident are being offered 18 months of free credit monitoring and identity protection services. Notification letters were sent to all current and former employees who were potentially affected by the DHS Employee Data on December 18, 2017.  Due to technological limitations, DHS is unable to provide direct notice to the individuals affected by the Investigative Data. Therefore, if you were associated with a DHS OIG investigation from 2002 through 2014, you may contact AllClear ID at (855) 260-2767 for information on credit monitoring and identity protections services. 

The Department of Homeland Security takes very seriously the obligation to serve the Department’s employees and is committed to protecting the information in which they are entrusted. Please be assured that we will make every effort to ensure this does not happen again.  DHS is implementing additional security precautions to limit which individuals have access to this information and will better identify unusual access patterns. We will continue to review our systems and practices in order to better secure data. DHS OIG has also implemented a number of security precautions to further secure the DHS OIG network.

We sincerely apologize for any inconvenience this may have caused.  See below for additional information you may find useful.

Sincerely,

Philip S. Kaplan
Chief Privacy Officer
U.S. Department of Homeland Security

Frequently Asked Questions

Updated: January 18, 2018

I received a notice letter that states the DHS Employee List included individuals employed by DHS in 2014.  I was not employed by DHS in 2014.  Am I still affected by this privacy incident? 

If you received a letter, DHS has confirmed that your personal information was included in this privacy incident regardless of when you were employed by DHS.  The DHS OIG investigation identified a list of individuals employed directly by DHS in 2014.  In addition to this specific list, DHS OIG later discovered the names and PII of individuals employed by DHS in various years before and after 2014 that were compiled into a second list.  Notice was provided to all DHS employees whose names and PII were found on the aforementioned lists during the DHS OIG investigation.  Earlier communications and notice letters mistakenly stated that individuals affected by the breach were employed by DHS exclusively in 2014.  While the majority of the affected individuals whose names and PII were included in this privacy incident were employed by DHS in 2014, the population of affected individuals also includes individuals employed by DHS in other years.  DHS OIG sincerely apologizes for this error and any confusion it may have caused.

What information was compromised?

The compromised information included the personally identifiable information (PII) of two groups of individuals:

  1. DHS Employee Data:  Approximately 246,167 federal government employees who were employed directly by DHS.  Most of these individuals were employed by DHS during 2014. However, this data may include some individuals that were employed by DHS in other years. The PII for these individuals includes names, Social Security numbers, dates of birth, positions, grades, and duty stations. This list of federal government employees was used by DHS OIG Office of Investigations to conduct identity confirmation during the complaint and investigative process.
  2. Investigative Data:  Individuals associated with DHS OIG investigations from 2002 through early 2017, which includes subjects, witnesses and complainants who were both DHS employees and non-DHS employees.  The PII contained in this database varies for each individual depending on the documentation and evidence collected for a given case.  Information contained in this database could include names, Social Security numbers, alien registration numbers, dates of birth, email addresses, phone numbers, addresses, and personal information provided in interviews with DHS OIG investigative agents.            

Why did it take from May 2017 to December 2017 to get a notice sent to those individuals who were affected?

The investigation was complex given its close connection to an ongoing criminal investigation.  From May through November 2017, DHS conducted a thorough privacy investigation, extensive forensic analysis of the compromised data, an in-depth assessment of the risk to affected individuals, and comprehensive technical evaluations of the data elements exposed.  These steps required close collaboration with law enforcement investigating bodies to ensure the investigation was not compromised.

What do I need to do?

DHS has arranged for AllClear ID to protect your identity for 18 months at no cost to you.   The following identity protection services start on the date of this notice and you can use them at any time during the next 18 months.

  • AllClear Identity Repair: This service is automatically available to you with no enrollment required.  Identity repair is intended to address issues related to credit restoration or recovery of financial losses.  If an issue arises, please call AllClear ID at (855) 260-2767 and a dedicated investigator will assist you. 
  • AllClear Credit Monitoring: This service entails credit monitoring and a $1 million identity theft insurance policy.  To use this service, you will need to provide your personal information and the redemption code in your Notice to AllClear ID directly. You may sign up online at www.enroll.allclearid.com or by calling AllClear ID at (855) 260-2767.

After contacting AllClear, you will need to take additional steps in order to activate your phone alerts and other monitoring options available to you.  AllClear staff will guide you through the process.

What else can I do to protect myself?

The Department’s Chief Privacy Officer and Chief Security Officer recommend that you help prevent unauthorized access and/or possible fraudulent activity on your financial accounts.  Below are steps you can take to protect your identity. 

  • Consult Federal Trade Commission’s IdentityTheft.gov (www.identitytheft.gov/steps) website
  • Determine if a credit freeze is right for you.  Credit freezes, also known as security freezes, make it more difficult for someone to open new accounts in your name.  Generally, during a credit freeze your credit information can only be accessed by your existing creditors and debt collectors.  Opening a new account in your name is more difficult because most institutions require a credit report to open a new account.  However, please note that a credit freeze may not be suitable if you anticipate obtaining a loan or line of credit in the near future (i.e., mortgage or a car loan).      Please contact the credit bureaus below for more information.
  • Reach out to the three major credit bureaus regarding credit freezes and credit reports:
  • Review your free credit report carefully.  If you find errors, take these steps:
    • Dispute them yourself. You don’t need to use a credit repair service. By law, consumer reporting agencies and the creditors that provide the information in your credit report are responsible for correcting inaccurate or incomplete information in your report.
    • If errors on your credit report seem to be the result of someone stealing your identity, go to identitytheft.gov to get personalized steps to report and recover from identity theft.

Please be alert to any phone calls, emails, and other communications from individuals claiming to be from DHS, or other official sources asking for your personal information or asking that you verify such information.  This is often referred to as information solicitation or “phishing.”  DHS will never contact you by phone and ask you to provide any sensitive/identifying information.

Did this privacy incident include information about my spouse, children, other family members and/or close associates?

The DHS Employee File is a file that only contained information about individuals that were employed directly by DHS.  This file did not include any information about employees’ spouses, children, family members and/or close associates.

The breach of the DHS OIG Case Files included individuals associated with DHS OIG investigations.  Family members and close associates were impacted by this privacy incident only if they were involved in a DHS OIG investigation.  If you, a family member, and/or close associate believe you/they were impacted by this incident, please contact AllClear ID at (855) 260-2767 for more information on credit monitoring and identity protection services.       

Does this mean that all employees who appear in the DHS Employee File are or were under investigation by DHS OIG?

No.  All employees’ information was in this file regardless of whether or not they were involved with an investigation.  You were mailed a notification because DHS determined that you were included in the DHS Employee File.  DHS OIG runs queries against this file to confirm the identities of individuals associated with DHS OIG investigations.  In order for this search to function properly, the file must include all employees regardless of whether they are associated with an investigation.

I believe I was associated with a DHS OIG investigation from 2002 through 2017.  Am I impacted by this privacy incident?  What should I do?

You may be impacted by this privacy incident if you were associated with a DHS OIG investigation from 2002 through 2017 in any capacity including as a subject, complainant, or witness.  If you believe you were associated with a DHS OIG investigation from 2002 through 2017, please contact AllClear ID at (855) 260-2767 for more information on credit monitoring and identity protection services.

What if I already have identity theft protection from a prior privacy incident?

You may have been offered similar services in the past if you were impacted by other cybersecurity or privacy incidents.  If you are already enrolled in identity theft protection and credit monitoring services, the decision of whether to sign up for services provided by DHS is your choice.  The Federal Trade Commission has helpful resources available on its website concerning identity theft and what steps you should take when an incident occurs https://www.ftc.gov/idtheft.

What is DHS doing to better secure employees’ PII?

DHS OIG has implemented a number of security precautions to further secure the DHS OIG network which includes:

  • Placing additional limitations on which individuals have back end IT access to the case management system;
  • Implementing additional network controls to better identify unusual access patterns by authorized users; and
  • Performing a 360-degree review of DHS OIG’s development practices related to the case management system. 
01/18/2018   Forbes Security
More than half of CISOs rely on the NIST Cybersecurity Framework. CrowdStrike's Dan Larson thinks that framework should be expanded to include an important area: predicting threats.
01/17/2018   Department of Homeland Security
Release Date: 
January 18, 2018

210 House Capitol Visitor Center

Good afternoon Chairman Katko, Ranking Member Watson-Coleman, and distinguished Members of the Subcommittee. I appreciate the opportunity to appear before you to discuss the Transportation Security Administration’s (TSA) technology initiatives.

First and foremost, I would like to recognize the Transportation Security Officers (TSOs) on their success in providing security to over 44 million airline passengers during the December holiday travel period. They did so professionally and adapted to accommodate daily screening challenges. Over the past six months, we have seen five of the top 15 total passenger volume days in TSA’s history. On average, TSA screens 2.2 million passengers each day. During this past holiday season, the daily rate grew as high as 2.4 million. Keeping up with this challenge would not be possible without our outstanding workforce.

Additionally, I would like to thank Chairman Katko and Ranking Member Watson-Coleman for taking the time to visit TSA headquarters last month for a discussion on transportation security. I look forward to continuing to work with you and your staff to advance TSA’s critical mission.

Today’s hearing is timely, as technology deployment will be critical to TSA’s success in 2018 and beyond. Terrorists continue to target commercial aviation, including cargo, and we must strive each and every day to stay ahead of the myriad threats. In the five months since I have been on board at TSA, we have seen scores of threats against aviation. I am committed to ensuring TSA remains as successful as it has been in the sixteen years since the agency’s founding to protect our transportation systems, especially aviation. Since I have been TSA Administrator, we have improved training, deployed enhanced screening procedures, and have aggressively pursued new technologies. We are continually increasing our ability to detect threat items throughout the aviation security system, and improving technology at the checkpoint will be the focus of my remarks today.

Checkpoint System

One of the most significant initiatives at the checkpoint is the introduction of Computed Tomography technology, or “CT,” as it is commonly referred. I know some of you have seen CT being tested overseas at Amsterdam’s Schiphol Airport and domestically at Boston Logan International Airport and Phoenix Sky Harbor International Airport. CT is not new technology. The idea for CT was conceived in the 1960s and first employed for medical applications in the early 1970s; however, it has evolved and is now used in other arenas, such as in aviation security. In fact, TSA has been using CT scanners to screen checked baggage since the agency’s inception in 2001. Over the past few years, industry has been aggressively working to reduce the technology equipment’s size and adjust its configuration to make it a viable option for deployment at most airport checkpoints. TSA continues to work closely and expeditiously with CT equipment manufacturers to improve detection algorithms, optimize throughput, and automate the detection of prohibited items so that CT technology can deliver the full host of capabilities needed to address checkpoint vulnerabilities into the future.

Once fully developed for the aviation environment, checkpoint CT technology will deliver a significant advancement over today’s two-dimensional X-ray technology platforms. Checkpoint CT screening technology provides a three dimensional view of the bag and enables the TSA officer to rotate the bag 360 degrees to show the contents at every angle. CT features allow officers to virtually remove unwanted clutter, and greatly enhances their ability to visually inspect the contents of carry-on bags for explosives and prohibited items. In these ways, CT offers substantially improved detection capability by more effectively detecting smaller and artfully concealed threats, thereby increasing our overall security effectiveness while enabling passengers to leave electronics in their carry-on bags. Ultimately, we hope to refine checkpoint CT technology to the point where, similar to the checked baggage process, we have automated the carry-on baggage screening process and reduced the need for officers to review all images.

In order to further our efforts and capabilities, TSA is working closely with industry partners, the Department of Homeland Security (DHS) Science and Technology Directorate, and international counterparts. Together, we are exchanging information and best practices related to operational and laboratory testing, explosives characterization, CT platform enhancements, and image library development. TSA is working closely with the European Commission, European Civil Aviation Conference, and bilaterally with the United Kingdom, France, Germany, and the Netherlands to share test results with the goal of aligning detection requirements and testing methodologies. The Netherlands, Turkey, Japan, Singapore, and South Africa are currently testing CT technology at their checkpoints, which allows for robust information sharing and ultimately guides the successful deployment of this technology.

We are also leveraging academia to develop innovative software algorithms to more accurately identify prohibited items. Through our own Innovation Task Force, TSA is providing CT vendors with end-user feedback and real world operational data to further operational development, effectiveness, and efficiencies. In short, checkpoint CT development is a worldwide effort to achieve the best screening solution that is technologically possible today. Deployment of this technology, both here at home and abroad, is a critical component of raising the global aviation security baseline.

My team has developed an aggressive plan to deploy checkpoint CT technology. We are currently pursuing a flexible approach to test, procure, and deploy CT systems, while concurrently developing CT system algorithms to significantly improve automated threat detection capabilities. This approach employs the concepts of modularity and iterative design to support deployment of specific capabilities as part of a larger solution, while progressively expanding functionality until the full CT capability is realized.

Deployment of CT technology at checkpoints is one of my top priorities, and a priority for DHS leadership as well. In FY2018, we will field almost 40 units for developmental and operational testing, with the goal of pursuing broader deployment and continued algorithm development in the first half of FY2019, dependent on funding availability. Such efforts for the acquisition of this technology and others will be reflected in the Capital Investment Plan and TSA Strategy and Intent that I am currently developing to guide our investment approach moving forward.

Concurrent with our CT efforts, we are also pursuing other technologies to increase security at checkpoints. Two such technologies are enhanced Advanced Imaging Technology (AIT) and Credential Authentication Technology (CAT). TSA continues to improve our current AIT capabilities. As you may know, AIT uses imaging technology to scan individuals and analyze the images for the presence of anomalies beneath clothes, and in obscured areas. There are currently 945 AIT units deployed at 340 airports system-wide. Upgrades to this technology include greater detection capabilities in response to some of the vulnerabilities identified by the DHS Office of the Inspector General (OIG) in 2015 and in 2017. Other changes include software that will allow TSOs to process passengers through the AIT more expeditiously, thereby improving passenger flow through the checkpoint. In addition to these upgrades to currently fielded AIT units, TSA is working with other vendors to ensure we are testing every passenger screening technology available to provide our TSOs with better tools to assist them in performing their duties. TSA will be demonstrating an enhanced AIT capability in the field later this quarter, gaining critical insights into potential technology improvements that will move us closer to the future checkpoint vision.

Another key technology under development for our checkpoints is CAT; which will greatly enhance the vital role that the Travel Document Checker (TDC) plays in ID verification, boarding pass validation, and screening status determination. Specifically, CAT will improve the TDC’s ability to accurately authenticate passenger identification documents, passenger ticketing status, and Secure Flight passenger vetting status, thereby addressing vulnerabilities associated with ID fraud and providing real-time vetting information at the checkpoint on passengers. There are 33 CAT systems currently deployed for technical testing in TSA Pre?® lanes at 10 airports, including both Reagan National and Dulles airports, to optimize system functionality and associated Concept of Operations (CONOPS.)

TSA is currently assessing another technology known as Automated Screening Lanes (ASLs). ASLs are already proving their worth and currently 111 ASLs are deployed at 12 airports including Newark, JFK, LaGuardia, Boston, and Atlanta. These lanes are not only designed to increase throughput, they also provide better security by offering capabilities such as automated pulls of bags needing further inspection, automated tracking of bins linking to the x-ray and picture images, and automated bin return allowing officers to focus on security, instead of moving bins from the end of the lane to the beginning. I envision that integrating CTs with ASLs will provide significant technological and screening process improvements at our checkpoints, and we plan on testing this integration in the near future. I appreciate the great partnerships with airlines and airports for their role in the procurement and deployment of ASLs.

Acquisition Process

Critical to the success of TSA’s technology strategy and our ability to stay ahead of the threat is the capability to acquire, procure, develop, test and field new technologies in a timely manner. As the Chairman has noted, this is an area that needs improvement and I want to assure you we are evaluating ways to accelerate the acquisition process. In an effort to further identify ways to improve efficiencies in the process, DHS and TSA are evaluating existing rapid acquisition processes across the U.S. government to leverage known experience and best practices as we develop a model to accelerate acquisition efforts and the ultimate deployment of effective solutions within a dynamic operational environment. With your support, we are confident that we will be able to create an acquisition paradigm that ensures accelerated deployment and preserves the integrity needed to deploy effective and cost efficient capabilities.

Conclusion

TSA is committed to securing the Nation’s transportation systems from terrorist activities and attacks. This year, we are focused on maturing and deploying additional CT-based systems and working closely with our domestic and international partners to raise the global baseline for aviation security. In addition, I’m developing a Capital Investment Plan, coupled with the TSA Strategy and Intent, which will chart the future course for improvements in checkpoints and checked baggage systems. I look forward to working with you on these efforts to secure our robust transportation sector. Thank you for the opportunity to discuss these important issues. I look forward to the Subcommittee’s questions.

01/17/2018   Department of Homeland Security
Release Date: 
January 18, 2018

210 House Capitol Visitor Center

Chairman King, Ranking Member Rice, and distinguished members:

Thank you for the opportunity to appear before you today to discuss the mission of U.S. Immigration and Customs Enforcement (ICE), its efforts to identify, disrupt, and dismantle transnational criminal organizations (TCOs), to include transnational gangs, drug cartels, and smugglers, and its information sharing initiatives dedicated to combatting the aforementioned threats. ICE enforces approximately 400 federal laws governing border control, customs, trade, and immigration to promote homeland security and public safety. With more than 20,000 employees and more than 400 offices across the United States and in 50 countries, the men and women of ICE execute our mission humanely, professionally, and always in accordance with the law. ICE has three operational directorates: Homeland Security Investigations (HSI), Enforcement and Removal Operations (ERO), and the Office of the Principal Legal Advisor. As a Senior Executive of ICE/HSI, I serve as the Assistant Director of ICE/HSI International Operations.

As the largest investigative component in the Department of Homeland Security (DHS), ICE/HSI protects U.S. borders by conducting multi-faceted, international law enforcement operations, and by partnering with foreign and domestic counterparts to combat criminal organizations and prevent terrorist activities.

ICE/HSI International Operations has a network of over 400 personnel, including over 180 special agents deployed to 67 attaché offices in 50 countries, who conduct investigations against TCOs, terrorist, and other criminal organizations that threaten our national security. ICE/HSI leverages its international footprint and partnerships to disrupt and dismantle TCOs that seek to exploit America's legitimate trade, travel and financial systems, and enforces U.S. customs and immigration laws at and beyond our Nation's borders to prevent threats from entering the United States.

ICE/HSI manages several strategic/information sharing initiatives, which include:

  • Transnational Criminal Investigative Unit (TCIU)
  • Biometric Identification Transnational Migration Alert Program (BITMAP)
  • Visa Security Program (VSP)
  • Trade Transparency Units (TTUs)

HSI, domestically and abroad, focuses on critical investigative areas, which include:

  • National security
  • Counter-proliferation of arms and controlled technology
  • Human smuggling and trafficking
  • Financial crimes
  • Child exploitation
  • Commercial fraud and intellectual property
  • Anti-Gang Enforcement
  • Narcotics
  • Identity and Benefit Fraud
  • Worksite Enforcement
  • Cyber
  • Human Rights Violators and War Crimes

ICE/ERO identifies, arrests, and removes aliens who present a danger to national security or are a risk to public safety, as well as those who enter the United States illegally, or otherwise undermine the integrity of U.S immigration laws and border control efforts. ERO upholds America’s immigration laws at, within, and beyond its borders through efficient enforcement and removal operations. ERO also develops investigative leads and provides support in locating and arresting foreign nationals wanted for crimes committed abroad who are now at-large in the United States.

ERO removal operations require complex coordination, management, and facilitation efforts to successfully remove or return aliens from the United States to their country of origin. ERO has enforcement officers strategically deployed to 19 locations around the world and leverages resources available through foreign law enforcement partners, including INTERPOL, EUROPOL and the HSI Attaché corps.

Combatting Transnational Criminal Organizations

ICE utilizes its broad legal authorities to investigate immigration and customs violations, including those related to export control, human rights abuses, narcotics, weapons and contraband smuggling, financial crime, cybercrime, human trafficking and smuggling, child exploitation, intellectual property theft, transnational gangs, immigration document and benefit fraud, and worksite enforcement. ICE is grateful for continued Congressional support that allows ICE to maintain critical operations at home and abroad and increase our efforts to target and combat dangerous transnational gangs and other criminal organizations.

During Fiscal Year (FY) 2017, ICE investigations led to the disruption or dismantlement of TCOs with more than 32,958 criminal arrests, including arrests of more than 4,818 transnational gang members. ICE also seized 981,586 pounds of narcotics, made 1,205 seizures for violations of U.S. export laws and regulations, and seized nearly $307 million in currency and monetary instruments. Additionally, ICE identified and assisted 518 human trafficking victims and more than 904 child exploitation victims.

During the last two decades, transnational organized crime has expanded dramatically in size, scope, and impact, which poses a significant threat to national security. ICE takes very seriously this threat, and targets TCOs at every critical location in the cycle: internationally, in cooperation with foreign counterparts, where transnational criminal and terrorist organizations operate; at our Nation’s physical border and ports of entry, in coordination with U.S. Customs and Border Protection (CBP), where the transportation cells attempt to exploit America's legitimate trade, travel, and transportation systems; and in cities throughout the United States, where criminal organizations earn substantial profits off their illicit activities.

As directed by the President’s Executive Order 13773, Enforcing Federal Law with Respect to Transnational Criminal Organizations and Preventing International Trafficking, ICE will continue to give a high priority and devote sufficient resources to dismantling TCOs and subsidiary organizations. ICE will continue to focus on cooperative work with other federal agencies, as well as with foreign counterparts, by sharing intelligence and law enforcement information when appropriate and permitted by law.

Joint Task Forces

In 2014, the Department announced its new Unity of Effort Initiative and directed our Department-wide Southern Border and Approaches Campaign (SBAC) Plan. The SBAC is part of a comprehensive security strategy designed to unify efforts across DHS components to address threats specifically associated with terrorism, illicit market-driven flows, and illegal migration across our Southern Border and Approaches. In furtherance of the SBAC, the Department commissioned three Joint Task Forces (JTFs) in November 2014. The three Joint Task Forces, JTF-East (JTF-E), JTF-West (JTF-W), and JTF-Investigations (JTF-I), are responsible for establishing operational priorities and synchronizing capabilities in order to achieve SBAC objectives.

Two of the JTFs, JTF-E and JTF-W, are geographically focused task forces that concentrate on the southern land and maritime borders and approaches to the United States all the way to Central and South America. JTF-I is a “functional”, multi-component task force that employs National Case Management to identify and prioritize top TCOs affecting homeland security, manage investigations and operations to dismantle them, and identify weaknesses or gaps in our practices, technology, etc.

To address these gaps, JTF-I created and implemented HOMECORT (Homeland Criminal Organization Target), the DHS-wide process for identifying and prioritizing the top criminal networks affecting homeland security.

In order to manage and unify U.S. Government efforts against these HOMECORT criminal networks, JTF-I developed three complementary processes:

  1. National Case Management to manage, integrate and support all the investigations and operations related to the targeted criminal network;
  2. Comprehensive Criminal Network Analysis to provide knowledge of the criminal network; and
  3. Integrated Action Planning to establish the business rules for conducting National Case Management and producing Comprehensive Criminal Network Analysis.

Through the sharing and fusing of each other’s information, these JTF-I processes allow DHS components to:

  • Identify and prioritize the top criminal networks impacting homeland security;
  • Tie together and manage all the investigations, operations, arrests, and seizures (covering multiple countries, jurisdictions, areas of responsibility and programs) related to all the activities (smuggling, money laundering, corruption, etc.) of a criminal network (see complementary processes below);
  • Move towards a complex common goal through a formal integrated action planning process.

Since its inception, JTF-I’s interagency delegates managed and supported the targeting of 21 HOMECORT criminal networks, comprised of more than a thousand criminal investigations. To date, 13 of those networks were dismantled to the point they no longer threaten homeland security. The networks include money launderers, human smugglers, sex traffickers, drug smugglers, bulk cash smugglers, and weapons smugglers. The remaining HOMECORT designated criminal networks continue to be the targets of active criminal investigations.

Another example of a successful joint task force model is the Border Enforcement Security Task Force (BEST) initiative. BEST teams are ICE-led, multiagency task forces that target illicit movement of people and contraband through border areas. Other DHS entities, particularly CBP and the United States Coast Guard, participate. There are 38 BEST teams on the U.S.-Canada border and U.S.-Mexico border. Canadian and Mexican (multiagency) law enforcement partners work directly with DHS and other U.S. counterparts on investigative and interdiction missions. Canadian officials are often cross-designated as U.S. law enforcement (U.S. Code: Title 19) to promote full sharing of law enforcement information. These units are housed on the U.S. side of the border. In FY 2017, the BEST teams initiated 4,034 investigations and effected 4,967 criminal arrests.

National Gang Unit

The National Gang Unit (NGU) is a critical part of ICE’s mission to bring the fight to transnational criminal gangs. The NGU identifies and develops intelligence on gang membership, associations, activities, and international movements. It also deters and disrupts gang operations by tracing and seizing cash, weapons, and other assets derived from illicit activities.

In 2005, ICE initiated Operation Community Shield, an international law enforcement initiative that combines ICE’s expansive statutory and civil enforcement authorities to combat the growth and proliferation of transnational criminal street gangs, prison gangs and outlaw motorcycle gangs throughout the United States. With assistance from state, local, tribal, and foreign law enforcement partners, the initiative helps ICE locate, investigate, prosecute, and where applicable, immediately remove gang members from our neighborhoods and ultimately from the United States.

Operation Community Shield has resulted in the criminal and administrative arrests of nearly 60,000 gang leaders, members, and associates since its inception. Among those arrests, Community Shield operations have resulted in the criminal and administrative arrests of over 7,800 leaders, members, and associates of Mara Salvatrucha-13 (MS-13), the international criminal street gang.

In 2012, ICE worked with the Treasury Department Office of Foreign Assets Control (OFAC) to designate MS-13 as a TCO, the first criminal street gang so designated. As a result of the designation, any property or property interests in the United States, or in the possession or control of U.S. persons in which MS-13 has an interest, are blocked. In addition, U.S. persons are prohibited from engaging in transactions with MS-13 and are subject to civil monetary penalties up to $250,000 and imprisonment up to 20 years.

In 2016, ICE utilized the 2012 OFAC designation to develop and implement a new strategy targeting MS-13. ICE recognizes that TCOs need funding to maintain and expand their criminal organization and has been successfully identifying, exploiting, and disrupting MS-13’s global financial networks. Part of ICE’s new strategy is to address the threats posed by MS-13 in the United States and at their command and control structure in El Salvador simultaneously. Since January 2016, ICE has been deploying special agents to El Salvador to work with our host country law enforcement partners to build their financial investigative capacity to combat MS-13 and identify MS-13’s financial networks within El Salvador. In addition, the deployment allows the free flow of actionable intelligence between ICE and our host country law enforcement partners.

In 2017, ICE worked with our DHS partners to form a departmental MS-13 Working Group, to include ICE, CBP, U.S. Citizenship and Immigration Services (USCIS), and the Department of Justice’s Bureau of Prisons (BOP). The DHS MS-13 Working Group was formed to share intelligence, bridge intelligence gaps, eliminate redundancies, enhance collaboration, and provide visibility to all DHS entities involved in the fight against MS-13. The ultimate goal of the DHS MS-13 Working Group is to develop and implement a DHS enterprise enforcement strategy to disrupt and dismantle MS-13’s global criminal networks.

As of December 28, 2017, ICE maintains 107 open investigations targeting MS-13 members and their criminal organizations globally, including Massachusetts, New York, New Jersey, Maryland, the District of Columbia, North Carolina, Texas, Tennessee, Ohio, California, Washington, and the Northern Triangle countries of Guatemala, Honduras and El Salvador through Racketeer Influenced and Corrupt Organizations (RICO), Violent Crimes in Aid of Racketeering (VICAR), and criminal conspiracy prosecutions. Without information sharing and partnering with our federal, state, local, and foreign law enforcement partners, ICE would not be nearly as successful at battling MS-13 and other gangs.

Law Enforcement Information Sharing Efforts

In addition to leveraging domestic assets, ICE uses its strategically deployed personnel around the globe to use established relationships with host country law enforcement officials and mechanisms such as Customs Mutual Assistance Agreements (CMAAs) to share information and further its investigations. Mutual Legal Assistance Treaties (MLATs) are also invaluable instruments in obtaining and receiving international legal assistance, including evidence, for criminal investigations and prosecutions.

ICE International Operations also partners with TCIUs and international task forces in 12 countries around the world. TCIUs are comprised of foreign law enforcement officials, customs officers, immigration officers, and prosecutors who receive ICE training and undergo a strict vetting process to ensure that shared information and operational activities are not compromised. Partnering with these TCIUs enables ICE to promote direct action via information sharing and investigative leads while respecting the sovereignty of the host country and cultivating international partnerships.

Aligned with the President’s Strategy in Combatting Transnational Organized Crime, TCIUs identify targets, collect evidence, share intelligence, and facilitate the prosecution of TCOs both in-country and in the United States. These efforts, which often occur thousands of miles from the U.S. borders, essentially act as an outer layer of security for the United States.

Another ICE program, BITMAP, helps provide infrastructure and capability for host governments to collect biometric data on individuals they encounter. This information is shared with U.S. law enforcement and the Intelligence Community; DHS in turn provides information back to these countries about these individuals. Through this process, ICE is able to track movement towards the United States, take joint action with partner nations along the route, and deter human smuggling through South and Central America. Comparisons of biometric data through BITMAP serve to identify criminal persons, wanted subjects (including international fugitives), and known or suspected terrorists. BITMAP is currently deployed to 14 countries, with near-term plans to expand to two additional countries.

ICE also leverages its information sharing capabilities through the use of the Visa Security Program (VSP) and Trade Transparency Units (TTU). VSP deploys trained ICE special agents abroad to high-risk visa activity posts to identify and investigate potential terrorist and criminal threats before they reach the United States. VSP contributes to both counter-flow and counter-network capabilities, as well as providing support for intelligence, interdiction and engagement. VSP special agents work alongside Department of State Consular Officers to provide real-time feedback on visa applicants prior to visa adjudication. VSP agents receive referrals based on automated screening of U.S. visa applicants conducted by ICE, in cooperation with CBP.

The core mission of the TTU is to aggressively target criminal organizations and individuals involved in trade-based money laundering (TBML) but also those perpetrating contraband smuggling and customs fraud. In order to achieve this mission, HSI reached out to key foreign trading partners and successfully established (16) TTUs abroad. TTU currently has partnerships with Argentina, Australia, Brazil, Chile, Colombia, Dominican Republic, Ecuador, Mexico, France, Guatemala, Panama, Paraguay, Peru, Philippines, United Kingdom, and Uruguay. These countries are highly dependent upon value added taxes (VAT) on commodities, which served as a motivating factor in the establishment of TTUs. These foreign partners recognize the value of information sharing, which permits the comparison of international trade and cross border movement of merchandise.

The United States and its foreign TTU partners currently provide trade data which that allows HSI investigators and analysts to detect anomalies which may be indicative of criminal activity such as TBML, contraband smuggling, and trade/customs fraud. This information sharing allows for the cross referencing of trade data with other pertinent information such as Bank Secrecy Act (BSA) reports. The ultimate goal of most criminal organizations is financial gain either to promote ongoing illicit activity or as the finality of this activity, hence trade-based money laundering is often the primary means by which they launder proceeds for their criminal enterprises.

ICE’s Law Enforcement Information Sharing Initiative (LEISI) serves as an active advocate in support of law enforcement information sharing both internal and external to DHS. This includes information sharing between Federal, state, local, tribal, territorial, and foreign partners. LEISI coordinates throughout the law enforcement community to improve the understanding of information needs, provide leadership in resolving policy issues that may inhibit law enforcement information sharing, and develop approaches to overcome traditional barriers to information sharing.

The LEISI program provides program management support and oversight to include administration of the Law Enforcement Information Sharing Strategy. For FY 2018, additional focus is on international information for initiatives such as: Preventing and Combatting Serious Crimes (PCSC), the Five Country Ministerial (FCM), the Five Country Conference (FCC), and ERO’s Criminal History Information Sharing (CHIS) program.

CHIS is a DHS-led initiative between the United States and its international partners whose purpose is to provide participating nations with criminal history information in advance of an alien’s removal. In turn, foreign countries share their information with the United States. The information shared helps protect law enforcement personnel, regional security, and public safety officers all over the globe. The initiative supports efforts in immigration management, law enforcement and national security. Countries currently participating in the CHIS initiative are: Mexico, Dominican Republic, Jamaica, the Bahamas, El Salvador, Honduras and Guatemala, with planned expansion to additional countries in FY 2018.

CHIS enables ICE to identify wanted felons, including gang members, who fled to the United States to avoid prosecution in their home countries. Without this initiative, dangerous criminals might be able to circumvent prosecution. In FY 2017, CHIS sent 84,067 outbound notices of removal and ICE’s foreign partners returned 21,434 positive responses, including 2,810 foreign criminal history records, 93 foreign criminal warrants and information related to 199 transnational gang members.

During FY 2017, ICE achieved significant successes in Latin America and the Caribbean through the development of programs that bolstered the law enforcement, customs, and immigration enforcement capabilities of international partners. These successes included the joint interagency execution of Operation CITADEL, which focused efforts on building partner nation capacity in identifying, disrupting and dismantling TCOs, including those designated as drug trafficking organizations and terrorist support networks. Interagency information sharing and collaboration from agencies within DHS, the Department of State, the Department of Justice (including the Federal Bureau of Investigation), and the Department of Defense, as well as participating partner nations, has been an essential piece of Operation CITADEL’s efforts to build capacity and to address identified threats. Operation CITADEL provided resources to enhance foreign partners’ investigative capabilities to counter transnational threats and organized crime that, in turn, provided ICE the ability to expand domestic and international investigations well beyond the U.S. borders and to more effectively target the illicit pathways exploited by TCOs.

In FY 2017, the Operation CITADEL effected the training of 809 partner national personnel, 231 criminal arrests, 54 indictments, nine (9) convictions, 2,005 BITMAP enrollments, seizure of $252,235 in currency, 18,224 pounds of narcotics, seizure of 27 firearms, and encountered 3,669 aliens of possible national security concern.

Conclustion

Thank you again for the opportunity to appear before you today and for your continued support of DHS and ICE and their missions. ICE is committed to continuing its successful practice of sharing information with domestic and foreign partners and leveraging its resources around the world to stem cross-border criminal organizations. I appreciate your interest in these important issues and the efforts I have discussed today.

I would be pleased to answer any questions you may have.

01/17/2018   Forbes Security
Facebook has agreed - not entirely happily, from its tone - to expand its investigation into whether Russia meddled with the UK's Brexit referendum.
01/17/2018   Trend Micro Security
Trend Micro has been named a Leader in the Gartner 2018 Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS) again. We have improved our position in both Completeness of Vision and Ability to Execute from last year, and we believe that placement in the Leaders’ quadrant illustrates our commitment to meeting the growing security...
01/16/2018   Department of Homeland Security
Release Date: 
January 17, 2018

2167 Rayburn House Office Building

Good morning Chairman Hunter, Ranking Member Garamendi, and distinguished members of the Subcommittee. It is my pleasure to be here today to discuss the state of the U.S. maritime industry and the Coast Guard’s role serving that industry.

The U.S. Coast Guard is the world’s premier, multi-mission, maritime service responsible for the safety, security, and stewardship of the maritime domain. At all times a military service and branch of the U.S. Armed Forces, a federal law enforcement agency, a regulatory body, a first responder, and a member of the U.S. Intelligence Community, the Coast Guard operates on all seven continents and throughout the homeland, serving a Nation whose economic prosperity and national security are inextricably linked to broad maritime interests.

America’s economic prosperity is reliant on the safe, secure, and efficient flow of cargo through the Marine Transportation System (MTS), which now includes 361 ports and more than 25,000 miles of river and coastal waterways. The Nation’s waterways support $4.5 trillion of economic activity each year, including over 250,000 American jobs.1 Transportation of cargo on water by the maritime industry is the most economical, environmentally friendly, and efficient mode of transport. The maritime industry and MTS connect America’s consumers, producers, manufacturers, and farmers to domestic and global markets. Similarly, our national security depends on a healthy maritime industry and reliable MTS. The majority of the military equipment used by the Nation’s warfighters is loaded in U.S ports and delivered to theatre on Coast Guard-inspected merchant vessels that are manned by civilian merchant mariners.

As the lead federal regulator for the maritime industry, the Coast Guard must be attentive to the industry’s changing needs and dynamic challenges. Amidst emerging trends within the MTS and the maritime industry, the Coast Guard’s underlying concept of operations and our approach to continuous improvement remains unchanged. We continue to conduct our work using a consistent and enduring concept of operations that has successfully guided us for decades: the Coast Guard develops standards for safe, secure, and environmentally sound operations in the MTS; the Coast Guard assesses and enforces compliance with those standards; and when failures occur, the Coast Guard aggressively investigates them and drives the lessons learned back into our compliance and standards activities. These three phases of operations rely on our ability to leverage our marine safety workforce, engage governmental, non-governmental, and industry partners, and properly manage information and risk.

The Coast Guard’s marine safety program and regulatory process advance economic prosperity and national security by leveraging our unique capabilities to ensure that the maritime industry and MTS operate safely, predictably, and securely. We are mindful of the need to facilitate maritime commerce, not impede it. Our marine safety program does this by establishing a level playing field for industry through a framework of common-sense regulations that are enforced in a predictable and consistent manner. The Coast Guard’s regulatory standards and compliance functions also promote investment and innovation throughout the maritime sector by providing the means for investors and operators to evaluate and manage risk. This regulatory framework enables U.S. shipping to compete internationally and U.S. ports to compete equally against each other, while protecting American interests from the risk of substandard shipping.

In recent years, the maritime industry has undergone a series of cyclical changes. Within the last ten years, dramatic increases in U.S. energy production led to new construction of U.S.-flag tank barges and tank ships, and sharp increases in shipments of petroleum and petro-chemicals throughout our Nation’s ports and waterways. The expansion of oil exploration and production further offshore led to an increase in the size, complexity, and number of offshore support vessels. Though a recent prolonged downturn in the price of oil has eroded much of the oil and gas exploration and related support activity on the outer continental shelf, the volume of oil, petrochemicals, and liquefied natural gas shipments are still reaching new highs. At the same time, legislative and regulatory changes have led to increased oversight of fishing and towing vessels. The Coast Guard is now examining or inspecting as many as 6,000 additional commercial fishing vessels and 5,000 additional commercial towing vessels. Combined, these trends have shown that the maritime industry and Coast Guard are subject to rapid changes in demand and increasing volume, as technology accelerates commodity production and more vessels are brought under increased Coast Guard oversight.

Today, the maritime industry is an innovative and dynamic global industry that continually seeks new ways to efficiently meet stakeholder demands. To meet these growing demands and improve efficiency, the maritime industry is increasingly turning to new and emerging technologies, such as cyber systems, higher levels of automation, and new fuel sources. These technologies enable the maritime industry and MTS to operate with impressive reliability and capacity that drive efficiencies and economic benefits. The regulatory regime should not impede these developments. Our standards and compliance program must evolve to facilitate these changes safely and securely. As the pace and complexity of maritime commerce and operations have increased, third parties have enabled the regulatory regime to evolve and keep up with increasing demand.

Third party programs, such as the Alternate Compliance Program (ACP), have become a necessity upon which both the maritime industry and the Coast Guard rely. Like other flag states around the globe, the United States relies far more heavily on third parties today than ever before. However, as recently highlighted in the Coast Guard’s investigation after tragic sinking of the El Faro, the Coast Guard must provide the final element of the safety framework with sustainable policy, oversight, and accountability. Now, more than ever, the system requires reform. The Coast Guard plans to establish a risk-based and enduring policy framework that is easily executable and enables more robust oversight of delegated functions. Further, recognizing that the ACP is only one program among many that rely on delegation of technical functions and services to third parties, it is imperative that changes we make to ACP be applied to all programs that rely on a similar structure.

A healthy maritime industry is vital to the nation’s economic prosperity and national security. It is also dynamic and continually evolving to meet stakeholder demand. The Coast Guard’s regulatory development and compliance programs evolve to keep pace with industry change and ensure the continued safety, security, and environmental compliance in the MTS. We are focused on ensuring every Coast Guard action sustains the smooth operation of the MTS, without imposing unnecessary costs on U.S. entities competing in a global industry.

Thank you for your continued support and the opportunity to testify before you today. I am happy to answer any questions you may have.


1 “Ports’ Value to the U.S. Economy: Exports, Jobs & Economic Growth.” American Association of Port Authorities, http://www.aapa-ports.org/advocating/content.aspx?ItemNumber=21150, Accessed April 17, 2017.

 

01/16/2018   Forbes Security
This past week, I and several other members of the Moor Insights & Strategy team camped out at CES 2018 in Las Vegas to learn as much as we can about the latest in consumer electronics technology, trends and company strategies. Here’s my rundown of the Intel keynote.
01/16/2018   Trend Micro Security
January often marks a fresh start for both organizations and individuals. For many, lots of time is put towards goal setting for the year and taking on new challenges. At Trend Micro, a goal of ours every year is to find new ways to give back to local communities so that we are not only...
01/16/2018   Forbes Security
Apple is much closer with the FBI than the popular narrative would have people believe...
01/16/2018   Department of Homeland Security
Release Date: 
January 16, 2018

Departments of Homeland Security and Justice Release Data for the First Time on Terrorism-Related Activity 

For Immediate Release
Office of the Press Secretary
Contact: 202-282-8010

WASHINGTON – On January 16, 2018, the Department of Homeland Security (DHS) and the Department of Justice (DOJ) released a report revealing that three out of every four, or 402, individuals convicted of international terrorism-related charges in U.S. federal courts between September 11, 2001, and December 31, 2016 were foreign-born. Over the same period, U.S. Immigration and Customs Enforcement removed approximately 1,716 aliens with national security concerns. Further, in 2017 alone DHS had 2,554 encounters with individuals on the terrorist watch list (also known as the FBI’s Terrorist Screening Database) traveling to the United States.

This report was prescribed by Executive Order 13780, Protecting the Nation from Foreign Terrorist Entry into the United States, which declared that “it is the policy of the United States to protect its citizens from terrorist attacks, including those committed by foreign nationals,” and directed a series of actions to enhance the security of the American people.

The actions directed by Executive Order 13780 have—among other things—raised the baseline for the vetting and screening of foreign nationals, improved our ability to prevent the entry of malicious actors, and enhanced the security of the American people.

“My top priority as Secretary of Homeland Security is to ensure the safety and security of the American people,” said Secretary Nielsen. “This report is a clear reminder of why we cannot continue to rely on immigration policy based on pre-9/11 thinking that leaves us woefully vulnerable to foreign-born terrorists, and why we must examine our visa laws and continue to intensify screening and vetting of individuals traveling to the United States to prevent terrorists, criminals, and other dangerous individuals from reaching our country. Without legislative change DHS will continue to see thousands of terrorists a year attempt to enter the United States, and while we must be right every time, the terrorists only need to be lucky once. Therefore, DHS has personnel deployed around the world and along our borders working with our global and domestic law enforcement partners to stop terrorists before they enter the homeland.” 

“This report reveals an indisputable sobering reality—our immigration system has undermined our national security and public safety,” said Attorney General Sessions.  “And the information in this report is only the tip of the iceberg: we currently have terrorism-related investigations against thousands of people in the United States, including hundreds of people who came here as refugees.  Our law enforcement professionals do amazing work, but it is simply not reasonable to keep asking them to risk their lives to enforce the law while we admit thousands every year without sufficient knowledge about their backgrounds.  The pillars of President Trump’s immigration policy—securing our porous borders, moving to a merit-based immigration system that ends the use of diversity visas and chain migration, and enforcing our nation’s laws—will make their jobs easier and make the United States a safer place.”

The report reveals that at least 549 individuals were convicted of international terrorism-related charges in U.S. federal courts between September 11, 2001, and December 31, 2016.  An analysis conducted by DHS determined that approximately 73 percent (402 of these 549 individuals) were foreign-born.  Breaking down the 549 individuals by citizenship status at the time of their respective convictions reveals that:

  • 254 were not U.S. citizens;
  • 148 were foreign-born, naturalized and received U.S. citizenship; and,
  • 147 were U.S. citizens by birth.

According to information available to U.S. Immigration and Customs Enforcement (ICE), since September 11, 2001, there were approximately 1,716 removals of aliens with national security concerns. 

As mentioned above, in FY 2017, DHS encountered 2,554 individuals on the terrorist watchlist (also known as the FBI’s Terrorist Screening Database) traveling to the United States. Of those individuals, 335 were attempting to enter by land, 2,170 were attempting to enter by air, and 49 were attempting to enter by sea. Where consistent with the law, such individuals are denied entry into the United States, while in some cases law enforcement authorities are notified and can take appropriate action.

From October 1, 2011, to September 30, 2017, a total of 355,345 non-U.S. citizen offenders, were administratively arrested after previously being convicted of an aggravated felony, as defined in 8 U.S.C. § 1101(a)(43), or two or more crimes each punishable by more than one year (felony offenses).  During that same period, a total of 372,098 non-U.S. citizen offenders were removed from the United States after conviction of an aggravated felony or two or more felonies. 

Data from U.S. Citizenship and Immigration Services’ Fraud Detection and National Security Directorate shows that between 2007 and 2017, USCIS referred 45,858 foreign nationals who applied for immigration benefits to ICE for criminal or civil enforcement action, based on information indicating that such foreign nationals had committed egregious public safety-related offenses within the United States.

Between FY 2010 and FY 2016, CBP identified and prevented the boarding of 73,261 foreign travelers on flights destined for the United States, who may have presented an immigration or security risk.

In October, the Trump Administration sent to Congress a list of legislative priorities that would enhance our national security—such as eliminating the diversity visa lottery and extended family chain migration, funding the wall, closing loopholes in our asylum system, combatting visa overstays, and closing other loopholes in existing law that potentially benefit aliens who pose threats to our national security.

Background on the Executive Order

Section 11 of Executive Order requires the Secretary of Homeland Security, in consultation with the Attorney General, to collect and make publicly available the following information:

  1. Information regarding the number of foreign nationals in the United States who have been charged with terrorism-related offenses while in the United States; convicted of terrorism-related offenses while in the United States; or removed from the United States based on terrorism-related activity, affiliation with or provision of material support to a terrorism-related organization, or any other national-security-related reasons;
  2. Information regarding the number of foreign nationals in the United States who have been radicalized after entry into the United States and who have engaged in terrorism-related acts, or who have provided material support to terrorism-related organizations in countries that pose a threat to the United States;
  3. Information regarding the number and types of acts of gender-based violence against women, including so-called “honor killings,” in the United States by foreign nationals; and,
  4. Any other information relevant to public safety and security as determined by the Secretary of Homeland Security or the Attorney General, including information on the immigration status of foreign nationals charged with major offenses.

The link to the report is available HERE.

# # #

 

01/16/2018   Forbes Security
CrowdStrike's Falcon Prevent is a next-generation antivirus product that leverages AI and machine learning. Most antivirus products respond to threats that are known and cataloged. Falcon Prevent incorporates AI to expand the net of detectable threats to those that have never been seen before.
01/16/2018   Forbes Security
Surveillance tool grabs WhatsApp messages by exploiting Google's service for disabled users.
01/15/2018   Forbes Security
Organizations that actively support citizen development with training, low-code/no-code technology, and the right kind of IT support are the ones that will be more agile, innovative, and better able to succeed with their digital transformation efforts.
01/15/2018   Forbes Security
Estonia is the most digitally advanced society in the world. How did that happen? The country's former CIO, Taavi Kotka, explains the special ingredients that Estonia has, but highlights how other countries can follow in its wake.
01/15/2018   InfoWorld Security
Host Steve Ragan talks with Stan Engelbrecht, director of the cybersecurity practice at D3 Security, about the inherent flaws in security defenses for public transportation systems -- and what can be done.
01/13/2018   Forbes Security
The Office of the United States Trade Representative (USTR) says that pirate sites are making a fortune through advertising, and has highlighted the increasing use of illicit streaming devices in a new report.
01/12/2018   Forbes Security
Fundamentally, whether you’re on the internet, making a phone call or sending and receiving messages, your communication should simply go through, free of interference from your service provider.
01/12/2018   Forbes Security
Mergermarket’s annual prediction of which venture capital-backed companies are most likely to exit in the next 12 months.
01/12/2018   Trend Micro Security
Last week, three interesting vulnerabilities popped up on the news and security feeds. Researchers disclosed CVE-2017-5753 and CVE-2017-5715, collectively known as Spectre, and CVE-2017-5754, known as Meltdown. These vulnerabilities take advantage of “speculative execution” of instructions performed by many modern microprocessors and can potentially allow an unprivileged attacker to read privileged memory allocated to the...
01/12/2018   Trend Micro Security
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, we saw discussions on the vulnerabilities of chat bots and AI programs, and the types of software that may not be safe from malware and hackers. Read...
01/11/2018   Trend Micro Security
Securing the Internet of Things is difficult. One reason is the Internet of things consists of three different groups of technology. Each group has radically different architectural constraints. Securing each group requires a distinct approach. IoT 0.9  The primitive group contains all legacy Operational Technology (OT) and Industrial Control Systems (ICS) that use some form...
01/09/2018   Trend Micro Security
Last year, Trend Micro launched our popular Deep Security as a Service offering on the AWS Marketplace, combining industry-leading threat protection for cloud workloads, effortless deployment, and the added bonus of a unified Amazon Web Services (AWS) bill. This has been a successful model for customers wanting to purchase workload protection directly, however the reality...
01/08/2018   InfoWorld Security
Host Steve Ragan unpacks the latest news about Chinese company DJI's bug bounty program, plus new developments in video surveillance and more, with Fahmida Rashid.
01/05/2018   Trend Micro Security
Happy New Year! It’s out with the old, in with the new, right? Except we all know that the old tends to stick around, especially when it comes to vulnerabilities and patching them. Trend Micro predicts that that 2018’s biggest attacks will originate from known vulnerabilities. And speaking of known vulnerabilities, the Zero Day Initiative...
01/05/2018   InfoWorld Security

The internet of things, or IoT, is pervasive these days in your personal life. However, this technology is just getting into the Global 2000 companies. Yet most of the Global 2000 companies are unaware of the risks that they are bringing to IT and cloud security with their IoT adoption.

How did this happen? Well, for example, as thermostats and sensor fail in buildings’ HVAC systems, they are often replaced with smart devices, which can process information at the device. These new IoT sensor devices often are computers unto themselves; many have their own operating systems and maintain internal data storage. IT is largely unaware that they exist in the company, and they are often placed on the company’s networks without IT’s knowledge.

To read this article in full, please click here

01/04/2018   InfoWorld Security

Carbon Monoxide is odorless, tasteless and invisible, and it accounts for over 72,000 cases of poisoning each year. Kidde calls their C3010D model "worry free" because its sensor and sealed battery provide 10 years of uninterrupted CO detection, and a digital display that updates every 15 seconds. The unit will chirp when its reaching the ends of its life, so you don't have to wonder. The Kidde C3010D alarm is currently discounted 32% to $34.91. See this deal now on Amazon.

To read this article in full, please click here