Trump Should Eliminate 2 Agencies

Formed in 1947, The National Security Council  is the President’s in house forum for national security and foreign policy matters. The President also has the ‘President’s Intelligence Advisory Board which is to assess intelligence collection and activities. The operating budget is unknown but it is estimated to be in the range of $18 billion.

The 1947 National Security Act established the NSC in order to “advise the President with respect to the integration of domestic, foreign, and military policies relating to the national security so as to enable the military services and the other departments and agencies of the government to cooperate more effectively in matters involving the national security.” Presidents have latitude to structure and use the NSC as they see fit. In practice, the NSC staff’s activities now extend somewhat beyond providing policy advice. First, as one former NSC official notes, “White House involvement is often needed for precise execution of policy, especially when secrecy is required to perform delicate tasks.” Second, the rise in strategic importance of transnational threats such as terrorism and narco-trafficking, along with post-Cold War military campaigns in the Balkans, Iraq and Afghanistan, have increasingly necessitated “whole of government” responses that leverage diplomatic, military, and development tools from a variety of different U.S. government agencies. The NSC often coordinates such responses, and as the international security environment has become more complex, whole-of-government responses to individual crises have become more frequent, translating into even greater NSC involvement. This is leading many scholars and practitioners to question the appropriate size, scope and role for the NSC.

Much has changed since 1947 especially under the GW Bush administration and then later under the Obama administration where the size of the NSC grew dramatically with approved appropriations from Congress. The NSC appears to have an estimated 400-500 people assigned. With this size of agency heads on the Council, staffers, lawyers and rotations, how can there be any real control? Are there misguided agendas inside the Council? For sure. What about leaks? Oh yes. At least 3 people assigned to the NSC have been fingered as leakers or whistle-blowers since Trump became President. An estimated 80% of the NSC staff comes from the CIA, the State Department and the Pentagon.

Image result for national security council

There are competing agencies inside the Federal government, think tanks, non-government agencies and the entire diplomatic wing as well as the agencies operating under what is commonly referred to as the IC= intelligence community. This agency is simply redundant and has overlapping policies.

Speaking of redundant, the next agency that should be eliminated is the DNI, know as the Director of National Intelligence, created in 2004. It is currently headed by Joseph Maguire. It oversees 16 other intelligence agencies, advises the President and produces the PDB, the Presidential Daily Briefing which is also shared with several other officials that are cleared to receive it. DNI was recommended by the 9/11 Commission report due to intelligence failures leading up to the attack on the United States. The annual budget for DNI is estimated to be in the range of $90 billion and there are over 2000 employees. There are 6 centers and 15 offices where the NIP, National Intelligence Program resides.

Image result for odni

There are four directorates, each led by a deputy director of national intelligence:

Enterprise Capacity Directorate
Mission Integration Directorate
National Intelligence Council
National Security Partnerships Directorate
Strategy & Engagement Directorate
Intelligence Advanced Research Projects Activity

There are four mission centers, each led by a director of that center:

Cyber Threat Intelligence Integration Center
National Counterproliferation Center
National Counterterrorism Center
National Counterintelligence and Security Center

There are also four oversight offices:

Office of Civil Liberties, Privacy and Transparency
Office of Equal Employment Opportunity & Diversity
Office of the Intelligence Community Inspector General
Office of General Counsel

For sure many things have changed with regard to national security and foreign relations since 1947 but it can be argued that confusion ensues with all the competing departments. There is the matter of the ongoing Overseas Contingency Operation, Cyber wars and now the military frontier of Space.

Image result for defense intelligence agency

So the solution is to eliminate these two agencies and concentrate the work on the DIA, Defense Intelligence Agency. The DIA is in fact an intersection of the Department of Defense, the Intelligence Community, mobilized warfighters, policy-makers and force-planners including weapons systems acquisitions. DIA also covers, history, doctrine, economics, chemistry, asymetrical capabilities, cyber and political science.

Do you see the need for streamlining, control, management, and eliminating competing challenges? Perhaps this is but one solution to stopping leaks, draining more of the swamp, achieving concise intelligence and policy.

 

US Intel Tips Forced China to Prosecute Fentanyl Operation

A trial continues as fentanyl drug traffickers are sentenced in court, Thursday, Nov. 7, 2019, in Xingtai, north China’s Hebei Province. The court sentenced at least nine fentanyl traffickers Thursday in a case that was a culmination of a rare collaboration between Chinese and U.S. law enforcement to crack down on global networks that manufacture and distribute lethal synthetic opioids. (Jin Liangkuai/Xinhua via AP)

XINGTAI, China (AP) — A Chinese court sentenced nine fentanyl traffickers on Thursday in a case that is the culmination of a rare collaboration between Chinese and U.S. law enforcement to crack down on global networks that manufacture and distribute lethal synthetic opioids.

Liu Yong was sentenced to death with a two-year reprieve, while Jiang Juhua and Wang Fengxi were sentenced to life in prison. Six other members of the operation received lesser sentences, ranging from six months to 10 years. Death sentences are almost always commuted to life in prison after the reprieve.

Working off a 2017 tip from the U.S. Department of Homeland Security about an online drug vendor who went by the name Diana, Chinese police busted a drug ring based in the northern Chinese city of Xingtai that shipped synthetic drugs illicitly to the U.S. and other countries from a gritty clandestine laboratory. They arrested more than 20 suspects and seized 11.9 kilograms (26.2 pounds) of fentanyl and 19.1 kilograms (42.1 pounds) of other drugs.

In form, the enterprise resembled a small business, with a perky sales force that spoke passable English, online marketing, contract manufacturing, and a sophisticated export operation, according to U.S. and Chinese law enforcement.

But the business had grave implications. Police photographs of the seizure show a dingy, chaotic scene, with open containers of unidentified chemicals and Chinese police in rubber gloves and breathing masks.

Liu and Jiang were accused of manufacturing and trafficking illicit drugs. The others were accused of trafficking.

Chinese officials said the Xingtai case was one of three fentanyl trafficking networks they are pursuing based on U.S. intelligence, but declined to discuss the details of the other cases, which are ongoing.

Austin Moore, an attaché to China for the U.S. Homeland Security Department, said the Xingtai case was “an important step” showing that Chinese and U.S. investigators are able to collaborate across international borders.

Moore said Chinese police identified more than 50 U.S. residents who tried to buy fentanyl from the Xingtai organization. Those leads prompted over 25 domestic investigations and have already resulted in three major criminal arrests and indictments in New York and Oregon, he said.

Scrambling to contain surging overdose deaths, Washington has blamed Beijing for failing to curb the supply of synthetic drugs that U.S. officials say come mainly from China. In August, President Donald Trump lashed out at Chinese President Xi Jinping for failing to do more to combat illicit opioid distribution in China’s vast, freewheeling chemicals industry. U.S. officials have reportedly moved to link Beijing’s efforts on fentanyl to U.S. trade talks.

Yu Haibin, deputy director of the Office of China National Narcotics Control Commission, on Thursday called allegations that Chinese supply is at the root of America’s opioid problem “irresponsible and inconsistent with the actual facts.”

“Drug crime is the public enemy of all humankind,” he added. “It’s about the life of human beings. It should not be related with the trade war or other political reasons.”

Chinese officials have been at pains to emphasize the efforts they have made to expand drug controls and crack down on illicit suppliers, even though synthetic opioid abuse is not perceived to be a significant problem in China.

But prosecuting cases against a new, rising class of Chinese synthetic drug kingpins has remained a challenge. Profit-seeking chemists have adroitly exploited regulatory loopholes by making small changes to the chemical structure of banned substances to create so-called analogs that are technically legal.

U.S. officials have been hopeful that China’s move earlier this year to outlaw unsanctioned distribution of all fentanyl-like drugs as a class will help constrain supply and make it easier to prosecute Chinese dealers.

According to the U.S. Centers for Disease Control and Prevention, more than 500,000 Americans died of drug overdoses in the decade ending in 2017 — increasingly, from synthetic opioids like the ones sold by the Xingtai network.

The American opioid crisis began in the 1990s, when the over-prescription of painkillers like OxyContin stoked addiction. Many people who became hooked on pain pills later moved to heroin. Fentanyl — an even more potent lab-made drug that raked in profits — then entered the U.S. illicit drug supply, causing overdose deaths to spike.

*** China sentences 9 to jail for smuggling fentanyl to U.S ...

The question of what, if any, responsibility China should bear for fuelling a deadly opioid crisis in the United States has been a bitter source of contention between the two superpowers.

China’s jailing of nine people Thursday for trafficking and selling fentanyl to US buyers following a rare joint probe with US law enforcement would suggest Beijing is moving to address the problem.

But experts warn that while the case is a big step, it is not enough to stop the drug from pouring into the United States — from China and increasingly from Mexico as drug cartels pick up the slack.

Here is a look at the opioid crisis and the tensions it has caused between China and the United States:

What’s fentanyl?

Fentanyl was introduced to the US market in the 1960s as an intravenous anaesthetic to manage severe pain. It is used for cancer patients or those receiving end-of-life care.

The drug is 50 times more potent than heroin, with only a few milligrammes — equivalent to a few grains of sand — enough to kill someone.

It is trafficked into the United States, primarily from China and Mexico, in the form of powder or tablets, and is sometimes mixed with heroin and cocaine.

Fentanyl and other synthetic opioids killed 32,000 people in the US last year according to government data.

The drug can be bought online and shipped to the United States via regular mail, posing a major challenge for postal inspectors sifting through mountains of packages.

What’s China doing about it?

Trump has long urged China to crack down on fentanyl.

It has even become a bargaining chip in the trade spat between the world’s two largest economies.

“High-level officials continue to blame China for the failure to stem the flow and that might be impacting the trade negotiations,” Bryce Pardo, a policy researcher at RAND Corporation, told AFP.

When Trump and President Xi Jinping declared a trade war truce at a summit in Argentina in December 2018, the Chinese side said it would designate all variants of fentanyl as controlled substances.

Trump hoped the move would be a “game changer” because China applies the death penalty against drug dealers.

It was not until five months later, in May, that China finally designated all fentanyl analogues as a controlled substance.

Before the ban, smugglers could skirt the law by changing the formula to make fentanyl-like drugs.

But three months later, Trump complained that China was still not doing enough.

Then came the news on Thursday that a court in northern Hebei province had handed a suspended death sentence to a smuggler and jailed eight others for terms ranging from six months to life after the first successful joint US-China investigation against a fentanyl operation.

Is it enough?

“It’s one case. You can count it as a success and it is,” Mike Vigil, a former head of international operations at the US Drug Enforcement Administration (DEA), told AFP.

“But there is much more to be done. That’s a very tiny tip of the iceberg,” Vigil said.

Experts say China lacks the manpower to inspect all laboratories that produce fentanyl.

“The big problem is that there are so many laboratories and they have about 2,000 inspectors, which is not nearly enough,” Vigil said.

Scott Stewart, a security analyst at US intelligence consultancy Stratfor, said the flow of fentanyl and its precursor chemicals will not stop until China addresses “deeper problems” such as going after “powerful players” and lifting tax credits companies get for selling certain chemicals.

Is the ban working?

While the US welcomed China’s ban on all types of fentanyl, the move appears to have shifted production to Mexico, where drug cartels have quickly adapted to new law enforcement actions.

Chinese labs also produce the chemicals needed to make fentanyl and Mexican drug traffickers are importing them to produce the narcotic themselves, Vigil said.

“Precursor chemicals are fuelling the rise in the manufacture of fentanyl in Mexico by the major drug cartels,” Vigil said.

The DEA said Monday the cartels were making “mass quantities” of fentanyl-laced drugs.

China, for its part, continues to deny it is the source of the problem.

Following Thursday’s court case, Yu Haibin, a Chinese anti-drug official, pointedly said American deaths from overdoses had continued to rise after Beijing cracked down on all types of fentanyl.

The Lawyer’s Plot for the Coup Against Trump

Have you met Edward Luttwak? You can be sure the lawyer for the Whistleblower has. Luttwak published a book titled Coup D’ Etat, the practical handbook.

Coup d’État astonished readers when it first appeared in 1968 because it showed, step by step, how governments could be overthrown. Translated into sixteen languages, it has inspired anti-coup precautions by regimes around the world. In addition to these detailed instructions, Edward Luttwak’s revised handbook offers an altogether new way of looking at political power—one that considers, for example, the vulnerability to coups of even the most stable democracies in the event of prolonged economic distress.

So we have this cat, Mark Zaid. Within minutes of the inaugural event for President Trump, Zaid’s tweets began stating the coup has begun. Now the question is who in Washington DC was watching, considering and conspiring to join the coup army…plenty.

Mark Zaid: It’s troubling that Trump gave Jared Kushner security clearance

Zaid is a known quantity inside the Beltway.

Zaid is a recognized expert in Federal court especially in whistle-blower cases. These cases almost always include leaking or publishing classified material as such is/was the case of Edward Snowden. The Zaid law firm, where he is the managing partner includes at least 5 other lawyers handling cases of national security, diplomatic immunity, defamation cases and international transactions. Zaid is the founder of the James Madison Project, a non-profit organization that takes on government agencies for alleged wrong-doing, coverups and secrecy policies. Note however he never took on Hillary and Libya…or the email server scandal….

Mr. Zaid has testified before several committees in the House and the Senate all with the twist of meeting the ‘curiosity of this town’ as noted on the law firms website. With his early launch of the coup has started, you can bet some of this friendlies on The Hill followed his legal handbook and we are now enduring what Congressman Nunes calls a paper coup. Zaid has TS/SCI clearance and that add more bona fides to his power within the offices of the Democrats that include for sure Speaker Pelosi that is often providing all the permissions needed to Congressman Adam Schiff leading the impeachment inquiries.

Does anyone wonder how come Mr. Zaid never took any whistle-blower cases as they related to the Obama administration or even John Kerry with regard to the Iran deal? How about the IRS targeting operation or any of the other scandals in recent years….just sayin…

Okay, then there is also the other lawyer and law firm that has Andrew Bakaj with Compass Rose Legal Group.

 

 

An attorney who left the CIA in 2014 after facing professional retaliation for trying to work with intelligence community whistleblowers is now representing the U.S. official who reportedly filed a complaint alleging wrongdoing by President Trump.

Attorney Profiles – Compass Rose Legal Group, PLLC

Andrew Bakaj, a national security attorney working for Compass Rose Legal Group, a Washington national security law firm, has taken on the still unidentified whistleblower as his newest client, according to information first reported by the New York Times and confirmed by Yahoo News.

According to his Linkedin profile, Bakaj was an intern at the U.S. State Department from June 2002 to August 2002 at the U.S. Embassy in Kyiv, Ukraine. He, “Created the Embassy’s fraud database, performed various counter-fraud duties, interviewed visa candidates, translated official Ukrainian/Russian documents into English, and represented official U.S. interests at various events throughout Ukraine.

On September 24, Bakaj sent a ‘Notice of Intent to Contact Congressional Intelligence Committees’ letter to acting Director of National Intelligence Joseph Maguire, who took over for Dan Coats directly with the complaint. House Intelligence Committee Chairman Adam B. Schiff, who was copied on Bakaj’s letter, responded the same day. Schiff, who represented California’s 28th congressional district, asked for the whistleblower to come in for “voluntary interview” after Maguire testifies in a rare, open session Thursday, September 26, in a “secure location.”

Bakaj made a $100 campaign contribution to former Vice President Joe Biden’s 2020 Democratic presidential primary campaign through ActBlue, according to Federal Election Commission records. He made the contribution on April 26, 2019. ActBlue is a nonprofit that facilitates contributions to Democratic candidates.

Bakaj interned for Senator Chuck Schumer in the spring of 2001 and for then-Senator Hillary Clinton the fall of the same year. Hat tip.

Under Obama, the Russians Breached FBI Communications

So, at the time we had Comey, Mueller, Brennan, Clapper, Holder, Lynch, Rice, Power, Monaco, Donilon, McDonough, Rhodes and more.

Anyone remember when there was a pile of Russian spies that Obama expelled and traded? Remember at the very end of the Obama presidency when he expelled another pile of Russians from 3 locations and closed Russian dachas?

A big question remains that has yet to be answered and that is why did the Obama administration wait so long to impose a consequence?

Okay, well sit back this is a long read but it for sure explains the way too casual approach by Obama to Russia.

Simply put, the entire Obama administration and those democrats in congress had to be really embarrassed. With all the later Russian collusion stuff, that operation had to be a huge head-fake cover-up thing.

Whew what a mess. The Russians punked the FBI and that hurt America’s national security and policy badly…so we dispatched Hillary to do that Russian reset with that pesky red button.

Okay, here we go….

Russia carried out a ‘stunning’ breach of FBI communications system, escalating the spy game on U.S. soil

YahooNews: On Dec. 29, 2016, the Obama administration announced that it was giving nearly three dozen Russian diplomats just 72 hours to leave the United States and was seizing two rural East Coast estates owned by the Russian government. As the Russians burned papers and scrambled to pack their bags, the Kremlin protested the treatment of its diplomats, and denied that those compounds — sometimes known as the “dachas” — were anything more than vacation spots for their personnel.

The Obama administration’s public rationale for the expulsions and closures — the harshest U.S. diplomatic reprisals taken against Russia in several decades — was to retaliate for Russian meddling in the 2016 presidential election. But there was another critical, and secret, reason why those locations and diplomats were targeted.

Both compounds, and at least some of the expelled diplomats, played key roles in a brazen Russian counterintelligence operation that stretched from the Bay Area to the heart of the nation’s capital, according to former U.S. officials. The operation, which targeted FBI communications, hampered the bureau’s ability to track Russian spies on U.S. soil at a time of increasing tension with Moscow, forced the FBI and CIA to cease contact with some of their Russian assets, and prompted tighter security procedures at key U.S. national security facilities in the Washington area and elsewhere, according to former U.S. officials. It even raised concerns among some U.S. officials about a Russian mole within the U.S. intelligence community.

“It was a very broad effort to try and penetrate our most sensitive operations,” said a former senior CIA official.

American officials discovered that the Russians had dramatically improved their ability to decrypt certain types of secure communications and had successfully tracked devices used by elite FBI surveillance teams. Officials also feared that the Russians may have devised other ways to monitor U.S. intelligence communications, including hacking into computers not connected to the internet. Senior FBI and CIA officials briefed congressional leaders on these issues as part of a wide-ranging examination on Capitol Hill of U.S. counterintelligence vulnerabilities.

These compromises, the full gravity of which became clear to U.S. officials in 2012, gave Russian spies in American cities including Washington, New York and San Francisco key insights into the location of undercover FBI surveillance teams, and likely the actual substance of FBI communications, according to former officials. They provided the Russians opportunities to potentially shake off FBI surveillance and communicate with sensitive human sources, check on remote recording devices and even gather intelligence on their FBI pursuers, the former officials said.

“When we found out about this, the light bulb went on — that this could be why we haven’t seen [certain types of] activity” from known Russian spies in the United States, said a former senior intelligence official.

The compromise of FBI systems occurred not long after the White House’s 2010 decision to arrest and expose a group of “illegals” – Russian operatives embedded in American society under deep non-official cover – and reflected a resurgence of Russian espionage. Just a few months after the illegals pleaded guilty in July 2010, the FBI opened a new investigation into a group of New York-based undercover Russian intelligence officers. These Russian spies, the FBI discovered, were attempting to recruit a ring of U.S. assets — including Carter Page, an American businessman who would later act as an unpaid foreign policy adviser to Donald Trump’s 2016 presidential campaign.

The breaches also spoke to larger challenges faced by U.S. intelligence agencies in guarding the nation’s secrets, an issue highlighted by recent revelations, first published by CNN, that the CIA was forced to extract a key Russian asset and bring him to the U.S. in 2017. The asset was reportedly critical to the U.S. intelligence community’s conclusion that Russian President Vladimir Putin had personally directed the interference in the 2016 presidential election in support of Donald Trump.

Yahoo spoke about these previously unreported technical breaches and the larger government debates surrounding U.S. policies toward Russia with more than 50 current and former intelligence and national security officials, most of whom requested anonymity to discuss sensitive operations and internal discussions. While the officials expressed a variety of views on what went wrong with U.S.-Russian relations, some said the United States at times neglected to appreciate the espionage challenge from Moscow, and paid a significant price for a failure to prioritize technical threats.

“When I was in office, the counterintelligence business was … focused entirely on its core concern, which is insider threats, and in particular mole hunting,” said Joel Brenner, the head of U.S. counterintelligence and strategy from 2006 to 2009. “This is, in fact, the core risk and it’s right that it should be the focus. But we were neither organized nor resourced to deal with counterintelligence in networks, technical networks, electronic networks.”

The discovery of Russia’s newfound capacity to crack certain types of encryption was particularly unnerving, according to former U.S. officials.

“Anytime you find out that an adversary has these capabilities, it sets off a ripple effect,” said a former senior national security official. “The Russians are able to extract every capability from any given technology. … They are singularly dangerous in this area.”

The FBI’s discovery of these compromises took place on the heels of what many hoped would be a breakthrough between Washington and Moscow — the Obama administration’s 2009 “reset” initiative, which sought to improve U.S.-Russia relations. Despite what seemed to be some initial progress, the reset soon went awry.

In September 2011, Vladimir Putin announced the launch of his third presidential campaign, only to be confronted during the following months by tens of thousands of protesters accusing him of electoral fraud. Putin, a former intelligence officer, publicly accused then-Secretary of State Hillary Clinton of fomenting the unrest.

It was around this time that Putin’s spies in the United States, operating under diplomatic cover, achieved what a former senior intelligence official called a “stunning” technical breakthrough, demonstrating their relentless focus on the country they’ve long considered their primary adversary.

That effort compromised the encrypted radio systems used by the FBI’s mobile surveillance teams, which track the movements of Russian spies on American soil, according to more than half a dozen former senior intelligence and national security officials. Around the same time, Russian spies also compromised the FBI teams’ backup communications systems — cellphones outfitted with “push-to-talk” walkie-talkie capabilities. “This was something we took extremely seriously,” said a former senior counterintelligence official.

The Russian operation went beyond tracking the communications devices used by FBI surveillance teams, according to four former senior officials. Working out of secret “listening posts” housed in Russian diplomatic and other government-controlled facilities, the Russians were able to intercept, record and eventually crack the codes to FBI radio communications.

Russians leave country retreats in the U.S., ordered out ...

Some of the clandestine eavesdropping annexes were staffed by the wives of Russian intelligence officers, said a former senior intelligence official. That operation was part of a larger sustained, deliberate Russian campaign targeting secret U.S. government communications throughout the United States, according to former officials.

The Spy Next Door: What Went On in Russia's Shuttered U.S ...

The two Russian government compounds in Maryland and New York closed in 2016 played a role in the operation, according to three former officials. They were “basically being used as signals intelligence facilities,” said one former senior national security official.

Russia to U.S.: Return Seized Diplomatic Compounds, or Else

Russian spies also deployed “mobile listening posts.” Some Russian intelligence officers, carrying signals intelligence gear, would walk near FBI surveillance teams. Others drove vans full of listening equipment aimed at intercepting FBI teams’ communications. For the Russians, the operation was “amazingly low risk in an angering way,” said a former senior intelligence official.

The FBI teams were using relatively lightweight radios with limited range, according to former officials. These low-tech devices allowed the teams to move quickly and discreetly while tracking their targets, which would have been more difficult with clunkier but more secure technology, a former official said. But the outdated radios left the teams’ communications vulnerable to the Russians. “The amount of security you employ is the inverse of being able to do things with flexibility, agility and at scale,” said the former official.

A former senior counterintelligence official blamed the compromises on a “hodgepodge of systems” ineffective beyond the line of sight. “The infrastructure that was supposed to be built, they never followed up, or gave us the money for it,” said the former official. “The intelligence community has never gotten an integrated system.”

The limitations of the radio technology, said the former senior officials, led the FBI’s surveillance personnel to communicate on the backup systems.

“Eventually they switched to push-to-talk cellphones,” said a former counterintelligence executive. “The tech guys would get upset by that, because if they could intercept radio, they might be able to intercept telephones.”

That is indeed what happened. Those devices were then identified and compromised by Russian intelligence operatives. (A number of other countries’ surveillance teams — including those from hostile services — also transitioned from using radios to cellphones during this time, noted another former official.)

U.S. intelligence officials were uncertain whether the Russians were able to unscramble the FBI conversations in real time. But even the ability to decrypt them later would have given the Russians critical insights into FBI surveillance practices, including “call signs and locations, team composition and tactics,” said a former intelligence official.

U.S. officials were also unsure about how long the Russians had been able to decipher FBI communications before the bureau realized what was happening. “There was a gap between when they were really onto us, and when we got onto them,” said a former senior intelligence official.

Even after they understood that the Russians had compromised the FBI teams’ radios, U.S. counterintelligence officials could not agree on how they had done it. “The intel reporting was they did break our codes or got their hands on a radio and figured it out,” said a former senior intelligence official. “Either way, they decrypted our comms.”

Officials also cautioned, however, that the Russians could only crack moderately encrypted communications, not the strongest types of encryption used by the U.S. government for its most sensitive transmissions. It was nonetheless “an incredible intelligence success” for the Russians, said the former senior official.

While the Russians may have developed this capability by themselves, senior counterintelligence officials also feared that someone from within the U.S. government — a Russian mole — may have helped them, said former officials. “You’re wondering, ‘If this is true, and they can do this, is this because someone on the inside has given them that information?’’ said another former senior intelligence official.

Russia has a clear interest in concealing how it gets its information, further muddying the waters. According to a former senior CIA officer who served in Moscow, the Russians would often try to disguise a human source as a technical penetration. Ultimately, officials were unable to pinpoint exactly how the Russians pulled off the compromise of the FBI’s systems.

Mark Kelton, who served as the chief of counterintelligence at the CIA until he retired in 2015, declined to discuss specific Russian operations, but he told Yahoo News that “the Russians are a professionally proficient adversary who have historically penetrated every American institution worth penetrating.”

This remains a core worry for U.S. spy hunters. The number of ongoing espionage investigations into U.S. government personnel — at the CIA, the FBI and elsewhere — including those potentially recruited by Russia, “is not a little, it’s a lot,” said another former senior counterintelligence official.

Once the compromises of FBI communications devices were confirmed, U.S. officials scrambled to minimize the exposure of mobile surveillance team operations, quickly putting countermeasures in place, according to former senior officials. There was a “huge concern” about protecting the identities of the individuals on the teams — an elite, secret group — said the former senior counterintelligence official. U.S. officials also conducted a damage assessment and repeatedly briefed select White House officials and members of Congress about the compromise.

After the FBI discovered that its surveillance teams’ cellphones had been compromised, they were forced to switch back to encrypted radios, purchasing different models, according to two former officials. “It was an expensive venture,” said one former counterintelligence official.

But the spying successes went both ways. The U.S. intelligence community collected its own inside information to conclude that the damage from the compromises had been limited, partly due to the Russians’ efforts to keep their intelligence coup secret, according to a former senior intelligence official. “The Russians were reticent to take steps [that might reveal] that they’d figured it out,” the former senior official said.

Even so, the costs to U.S. intelligence were significant. Spooked by the discovery that its surveillance teams’ communications had been compromised, the FBI worried that some of its assets had been blown, said two former senior intelligence officials. The bureau consequently cut off contact with some of its Russian sources, according to one of those officials.

At the time of the compromise, some of the FBI’s other Russian assets stopped cooperating with their American handlers. “There were a couple instances where a recruited person had said, ‘I can’t meet you anymore,’” said a former senior intelligence official. In a damage assessment conducted around 2012, U.S. intelligence officials concluded the events may have been linked.

The impact was not limited to the FBI. Alerted by the bureau to concerns surrounding Russia’s enhanced interception capabilities, the CIA also ceased certain types of communications with sources abroad, according to a former senior CIA official. The agency “had to resort to a whole series of steps” to ensure the Russians weren’t able to eavesdrop on CIA communications, the former senior official said. There was a “strong hint” that these newly discovered code-breaking capabilities by Russia were also being used abroad, said another former senior intelligence official.

The CIA has long been wary of Russian spies’ eavesdropping efforts outside of the United States, especially near U.S. diplomatic facilities. U.S. officials have observed Russian technical officers repeatedly walking close to those compounds with packages in their hands, or wearing backpacks, or pushing strollers, or driving by in vehicles — all attempts, U.S. officials believe, to collect information on the different signals emanating from the facilities. While the tools used by the Russians for these activities were “a bit antiquated,” said a former senior CIA official, they were still a “constant concern.”

It’s not unusual for intelligence officers operating from diplomatic facilities, including the United States’s own operatives, to try and intercept the communications of the host nation. “You had to find ways to attack their surveillance,” said Rolf Mowatt-Larssen, former head of counterintelligence at the Department of Energy and a former CIA officer who first served in Moscow in the 1980s. “The Russians do everything in the U.S. that we did in Moscow.”

Indeed, the focus on cracking radio communications was no different.

“We put extraordinary effort into intercepting and monitoring the FSB surveillance radio networks for the purpose of understanding whether our officers were under surveillance or not,” said another former senior CIA officer who also served in Moscow.

The discovery of the Russians’ new code-breaking capabilities came at a time when gathering intelligence on Russia and its leaders’ intentions was of particular importance to the U.S. government. U.S. national security officials working on Russia at the time received rigorous security training on how to keep their digital devices secure, according to two former senior officials. One former U.S. official recalled how during the negotiations surrounding the reset, NSC officials, partially tongue in cheek, “would sometimes say things on the phone hoping [they] were communicating things to the Russians.”

According to a former CIA official and a former national security official, the CIA’s analysts often disagreed about how committed Russia was to negotiations during the attempted reset and how far Putin would go to achieve his strategic aims, divergences that confused the White House and senior policy makers.

“It caused a really big rift within the [National Security Council] on how seriously they took analysis from the agency,” said the former CIA official. Senior administration leaders “went along with” some of the more optimistic analysis on the future of U.S.-Russia relations “in the hopes that this would work out,” the official continued.

Those disagreements were part of a “reset hangover” that persisted, at least for some inside the administration, until the 2016 election meddling, according to a former senior national security official. Those officials clung to the hope that Washington and Moscow could cooperate on key issues, despite aggressive Russian actions ranging from the invasion of Ukraine to its spying efforts.

“We didn’t understand that they were at political war with us already in the second term once Putin was reelected and Obama himself was reelected,” said Evelyn Farkas, the former deputy assistant secretary of defense for Russia, Ukraine, and Eurasia during the Obama administration.

As high-level hopes for the U.S.-Russia “reset” withered, concerns about the threat of Russian spying made their way to Capitol Hill. Top officials at the FBI and CIA briefed key members of Congress on counterintelligence issues related to Russia, according to current and former U.S. officials. These included briefings on the radio compromises, said two former senior officials.

Mike Rogers, a former Republican lawmaker from Michigan who chaired the House Permanent Select Committee on Intelligence from 2011 to 2015, alluded to counterintelligence concerns at a conference earlier this year in Washington, D.C.

One of those concerns was a massive intelligence failure related to the secret internet-based communications system the CIA used to communicate with agents. The extent of that failure, first reported publicly by Yahoo News in 2018, got the attention of Congress earlier.

But the problems were broader than that issue, according to Rogers.

“Our counterintelligence operations needed some adjustments,” said Rogers, adding that he and his Democratic counterpart from Maryland, Dutch Ruppersberger, requested regular briefings on the subject from agency representatives. “We started out monthly until we just wore them out, then we did it quarterly to try to make sure that we had the right resources and the right focus for the entire community on counter[intelligence].”

Rogers later told Yahoo News that his request for the briefings had been prompted by “suspected penetrations, both physical and technical, which is the role of those [Russian and Chinese] intelligence services,” but declined to be more specific.

The former committee chairman said he wanted the intelligence community to make counterintelligence a higher priority. “Counterintelligence was always looked at as the crazy uncle at the party,” he said. “I wanted to raise it up and give it a robust importance.”

The briefings, which primarily involved counterintelligence officials from the FBI and CIA and were limited to the committee leadership and staff directors, led to “some useful inquiries to help focus the intelligence community,” Rogers said. The leaders of the Senate Select Committee on Intelligence were also included in some of the inquiries, according to Rogers and a current U.S. government official.

Spokespeople for the current House and Senate intelligence committees did not respond to a request for comment. The FBI and CIA declined to comment. The Russian Embassy in Washington, D.C. did not respond to a request for comment.

The briefings were designed to “get the counterintelligence house in order,” said Jamil Jaffer, senior counsel at the House intelligence committee from 2011 to 2013, and to ensure that Congress and the intelligence agencies were “on the same page” when it came to such matters. “There were some concerns about what the agencies were doing, there were some concerns about what Congress knew, and all of these issues, of course, had China-Russia implications.”

Rogers and Jaffer declined to provide further details about what specific counterintelligence issues the committee was addressing, but other former officials indicated that worries weren’t limited to the compromise of FBI radio systems. Senior U.S. officials were contemplating an even more disturbing possibility: that the Russians had found a way to penetrate the communications of the U.S. intelligence community’s most sensitive buildings in and around Washington, D.C.

Suspected Russian intelligence officers were seen conspicuously loitering along the road that runs alongside the CIA’s headquarters, according to former senior intelligence officials. “Russian diplomats would be sitting on Route 123, sometimes in cars with diplomatic plates, other times not,” a former senior intelligence executive said. “We thought, they’re out doing something. It’s not just taking down license plates; those guys are interrogating the system.”

Though this behavior dated back at least to the mid-2000s, former officials said those activities persisted simultaneously with the compromise of the FBI’s communication system. And these were not the only instances of Russian intelligence operatives staking out locations with a line of sight to CIA headquarters. They were “fixated on being in neighborhoods” that gave them exposure to Langley, said a former senior official.

Over time, U.S. intelligence officials became increasingly concerned that Russian spies might be attempting to intercept communications from key U.S. intelligence facilities, including the CIA and FBI headquarters. No one knew if the Russians had actually succeeded.

“The question was whether they had capabilities to penetrate our comms at Langley,” said a former senior CIA official. In the absence of any proof that that was the case, the working theory was that the Russian activities were provocations designed to sow uncertainty within the CIA. “We came to the conclusion that they were trying to get into our heads,” the former senior official said.

A major concern was that Russian spies with physical proximity to sensitive U.S. buildings might be exfiltrating pilfered data that had “jumped the air gap,” i.e., that the Russians were collecting information from a breach of computers not connected to the Internet, said former officials.

One factor behind U.S. intelligence officials’ fears was simple: The CIA had already figured out how to perform similar operations themselves, according to a former senior CIA officer directly familiar with the matter. “We felt it was pretty revolutionary stuff at the time,” the former CIA officer said. “It allowed us to do some extraordinary things.”

While no one definitively concluded that the Russians had actually succeeded in penetrating Langley’s communications, those fears, combined in part with the breach of the bureau’s encrypted radio system, drove an effort by U.S. intelligence officials around 2012 to fortify sensitive Washington-area government buildings against potential Russian snooping, according to four former officials.

At key government facilities in the Washington area, entire floors were converted to sensitive compartmented information facilities, or SCIFs. These are specially protected areas designed to be impenetrable to hostile signals intelligence gathering.

The normal assumption was that work done in a SCIF would be secure, but doubts arose about the safety of even those rooms. “The security guys would say, your windows are ‘tempested’”—that is, protected against the interception of emissions radiating from electronic equipment in the building —“you’re in a SCIF, it’s fine,” a former senior counterintelligence executive recalled. “The question was, ‘Is it true?’”

Increasingly, U.S. officials began to fear it was not.

New security practices were instituted in sensitive government facilities like the FBI and CIA headquarters, according to former officials. “It required many procedural changes on our part to make sure we were not susceptible to penetrations,” said a former senior CIA official. These included basic steps such as moving communication away from windows and changing encryption codes more frequently, as well as more expensive adjustments, said four former officials.

Revelations about the Russian compromise of the radio systems, recalled a former senior intelligence official, “kick-started the money flowing” to upgrade security.

While the breaches of the FBI communications systems appeared to finally spur Congress and the intelligence agencies to adopt steps to counter increasingly sophisticated Russian eavesdropping, it took the Putin-directed interference in the 2016 election to get the White House to expel at least some of those officials deemed responsible for the breaches, and to shut down the facilities that enabled them.

Even then, the decision was controversial. Some in Washington worried about retribution by the Russians and exposure of American intelligence operations, according to a former senior U.S. national security official directly involved in the discussions. The FBI consistently supported expulsions, said another former national security official.

More than two years later, the Russian diplomatic compounds used in the FBI communications compromises remain shuttered. The U.S. government has prevented many of the Russian spies expelled by the United States from returning, according to national security experts and senior foreign intelligence officials. “They are slowly creeping back in, but [the] FBI makes it hard,” said a senior foreign intelligence official. “The old guard is basically screwed. They need to bring in a whole new generation.”

In the meantime, those familiar with Russian operations warn that the threat from Moscow is far from over. “Make no mistake, we’re in an intelligence war with the Russians, every bit as dangerous as the Cold War,” said a former senior intelligence officer. “They’re trying all the time … and we caught them from time to time,” he said. Of course, he added, “you don’t know what you don’t know.”

That’s the same message that special counsel Robert Mueller tried to convey during the highly contentious hearings to discuss his report on Russian interference in the 2016 election. “They are doing it as we sit here, and they expect to do it during the next campaign,” Mueller told lawmakers on the House Intelligence Committee about covert Russian involvement in U.S. politics.

But a number of observers believe Mueller’s message about the threat from Russia was largely lost amid a partisan battle on Capitol Hill over President Trump.

During his Washington conference appearance earlier this year, Rogers, the former chair of the House Intelligence Committee, also lamented that the current politicized state of the intelligence committees would make spy agencies more hesitant to admit their failures.

“They’re not going to call you to say, ‘I screwed up.’ They’re going to say, ‘God, I hope they don’t find that,’” he said. “That’s what’s going to happen. I’ll guarantee it’s happening today.”

What Can Be Purchased at Canadian RX Pharmacies?
The best thing about Canadian drugstores is the abundance of medications they offer to their clients. As a rule, at such websites, you may find effective remedies or medical solutions to any kind of disorders, which refers to not just RX medications available on prescription, but also personal care products, vitamins and nutritional supplements. Canadian pharmacy Canadapharmrxon.com even offer a broad assortment of generic medications which are just as good as prescription drugs but are available at a more affordable price. So, what can be found at Canadian drugstores? Here is a list of the most popular options:
Anti-inflammatory medicines;
Medicines to fight infectious diseases such as antibiotics;
Antipsychotic drugs and other mental health solutions;
Men’s health goods;
Women’s skin care products;
High blood pressure solutions;
Weight control medicines;
Personal care products;
Drugs to treat stomach disorders;
Over-the-counter medicines such as herbal drugs or supplements.

 

281 Arrested Worldwide in Business Email Compromise

Operation ReWired:

Federal authorities announced today a significant coordinated effort to disrupt Business Email Compromise (BEC) schemes that are designed to intercept and hijack wire transfers from businesses and individuals, including many senior citizens. Operation reWired, a coordinated law enforcement effort by the U.S. Department of Justice, U.S. Department of Homeland Security, U.S. Department of the Treasury, U.S. Postal Inspection Service, and the U.S. Department of State, was conducted over a four-month period, resulting in 281 arrests in the United States and overseas, including 167 in Nigeria, 18 in Turkey and 15 in Ghana. Arrests were also made in France, Italy, Japan, Kenya, Malaysia, and the United Kingdom (UK). The operation also resulted in the seizure of nearly $3.7 million.

Operation WireWire - Law enforcement arrested 74 ... photo

BEC, also known as “cyber-enabled financial fraud,” is a sophisticated scam often targeting employees with access to company finances and businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. The same criminal organizations that perpetrate BEC also exploit individual victims, often real estate purchasers, the elderly, and others, by convincing them to make wire transfers to bank accounts controlled by the criminals. This is often accomplished by impersonating a key employee or business partner after obtaining access to that person’s email account or sometimes done through romance and lottery scams. BEC scams may involve fraudulent requests for checks rather than wire transfers; they may target sensitive information such as personally identifiable information (PII) or employee tax records instead of, or in addition to, money; and they may not involve an actual “compromise” of an email account or computer network. Foreign citizens perpetrate many BEC scams. Those individuals are often members of transnational criminal organizations, which originated in Nigeria but have spread throughout the world.

“The Department of Justice has increased efforts in taking aggressive enforcement action against fraudsters who are targeting American citizens and their businesses in business email compromise schemes and other cyber-enabled financial crimes,” said Deputy Attorney General Jeffrey Rosen. “In this latest four-month operation, we have arrested 74 people in the United States and 207 others have been arrested overseas for alleged financial fraud. The coordinated efforts with our domestic and international law enforcement partners around the world has made these most recent actions more successful. I want to thank the FBI, more than two dozen U.S. Attorney’s Offices, U.S. Secret Service, U.S. Postal Inspection Service, Homeland Security Investigations, IRS Criminal Investigation, U.S. Department of State’s Diplomatic Security Service, our partners in Nigeria, Ghana, Turkey, France, Italy, Japan, Kenya, Malaysia, and the UK, and our state and local law enforcement partners for all of their hard work to combat these fraud schemes and protect the hard-earned assets of our citizens. Anyone who engages in deceptive practices like this should know they will not go undetected and will be held accountable.”

“The FBI is working every day to disrupt and dismantle the criminal enterprises that target our businesses and our citizens,” said FBI Director Christopher A. Wray. “Cooperation is the backbone to effective law enforcement; without it, we aren’t as strong or as agile as we need to be. Through Operation reWired, we’re sending a clear message to the criminals who orchestrate these BEC schemes: We’ll keep coming after you, no matter where you are. And to the public, we’ll keep doing whatever we can to protect you. Reporting incidents of BEC and other internet-enabled crimes to the IC3 brings us one step closer to the perpetrators.”

“The Secret Service has taken a multi-layered approach to combating Business Email Compromise schemes through our Global Investigative Operations Center (GIOC),” said U.S. Secret Service Director James M. Murray. “Domestically, the GIOC assists Secret Service Field Offices and other law enforcement partners with analysis and investigative tactics to enhance the impact of local BEC investigations. Internationally, the GIOC targets and identifies transnational organized crime networks that perpetrate these cyber-enabled financial fraud schemes. Through this approach, the Secret Service continues to strive to protect the citizens of the United States and our financial infrastructure from these complex crimes.”

“Homeland Security Investigations (HSI), together with its law enforcement partners, has proven once again, that cyber-enabled financial fraud will not be tolerated in the United States,” said Acting Director Matthew T. Albence of U.S. Immigration and Customs Enforcement (ICE). “Operation reWired sends a clear message to criminals, that no matter how or where crimes are committed, we will do everything within our means to dismantle criminal enterprises that seek to manipulate U.S. institutions and taxpayers.”

“The consequences of this type of fraud scheme are far reaching, affecting not only people in the United States, but also across the world,” said Chief Postal Inspector Gary Barksdale. “This investigation is just another example of how effective law enforcement agencies can be when they join forces. By working together, we can keep our communities and our vulnerable populations safe from financial exploitation. The U.S. Postal Inspection Service is proud to be at the forefront of the fight against fraud and Postal Inspectors will continue to adapt to the ever changing landscape to stop the scammers and protect our customers.”

“In unraveling this complex, nationwide identity theft and tax fraud scheme, we discovered that the conspirators stole more than 250,000 identities and filed more than 10,000 fraudulent tax returns, attempting to receive more than $91 million in refunds,” said Chief Don Fort of IRS Criminal Investigation. “We will continue to work with our international, federal and state partners to pursue all those responsible for perpetrating this fraud, preying on innocent victims and attempting to cheat the U.S. out of millions of dollars.”

“The investigation of these crimes crossed international borders,” said Director Todd J. Brown of the U.S. Department of State’s Diplomatic Security Service (DSS). “Today’s charges are another successful example of our commitment to working together with both foreign colleagues abroad as well as local, state and federal law enforcement partners here at home in the pursuit of those who commit cyber-related financial crimes.”

A number of cases involved international criminal organizations that defrauded small to large sized businesses, while others involved individual victims who transferred high dollar funds or sensitive records in the course of business. The devastating effects these cases have on victims and victim companies affect not only the individual business but also the global economy. According to the Internet Crime Complaint Center (IC3), nearly $1.3 billion in loss was reported in 2018 from BEC and its variant, Email Account Compromise (EAC), nearly twice as much as was reported the prior year. BEC and EAC are prevalent scams and the Justice Department along with our partners will continue to aggressively pursue and prosecute the perpetrators, including money mules, regardless of where they are located.

Money mules may be witting or unwitting accomplices who receive ill-gotten funds from the victims and then transfer the funds as directed by the fraudsters. The money is wired or sent by check to the money mule who then deposits it in his or her own bank account. Usually the mules keep a fraction for “their trouble” and then wire the money as directed by the fraudster. The fraudsters enlist and manipulate the money mules through romance scams or “work-at-home” scams, though some money mules are knowing co-conspirators who launder the ill-gotten gains for profit.

BEC scams are related to, and often conducted together with, other forms of fraud such as:

“Romance scams,” where victims are lulled into believing they are in a legitimate relationship, and are tricked into sending or laundering money under the guise of assisting the paramour with an international business transaction, a U.S. visit, or some other cover story;

“Employment opportunities scams,” where victims are convinced to provide their PII to apply for work-from-home jobs, and, once “hired” and “overpaid” by a bad check, to wire the overpayment to the “employer’s” bank before the check bounces;

“Fraudulent online vehicle sales scams,” where victims are convinced they are purchasing a nonexistent vehicle and must pay for it by sending the codes of prepaid gift cards in the amount of the agreed upon sale price to the “seller;”

“Rental scams,” where a scammer agrees to rent a property, sends a bad check in excess of the agreed upon deposit, and requests the overpayment be returned via wire before the check bounces; and

“Lottery scams,” where victims are convinced they won an international lottery but must pay fees or taxes before receiving the payout.

Starting in May 2019, this coordinated enforcement action targeted hundreds of BEC scammers. Law enforcement agents executed over 214 domestic actions including arrests, money mule warning letters, and asset seizures and repatriations totaling nearly $3.7 million. Local and state law enforcement partners on FBI task forces across the country, with the assistance of multiple District Attorney’s Offices, also arrested alleged money mules for their role in defrauding victims.

Among those arrested on federal charges in BEC schemes include:

Following an investigation led by the FBI’s Chicago Division, Brittney Stokes, 27, of Country Club Hills, Illinois, and Kenneth Ninalowo, 40, of Chicago, Illinois, were charged in the Northern District of Illinois with laundering over $1.5 million from proceeds of BEC scams. According to the indictment, a community college and an energy company were defrauded into sending approximately $5 million to fraudulent bank accounts controlled by the scammers. Banks were able to freeze approximately $3.6 million of the $5 million defrauded in the two schemes. Law enforcement officials seized a 2019 Range Rover Velar S from Stokes and approximately $175,909 from Stokes and Ninalowo.

As a result of a joint investigation by the FBI, HSI, and DSS, Opeyemi Adeoso, 44, of Dallas, Texas, and Benjamin Ifebajo, 45, of Richardson, Texas, were arrested and charged in the Northern District of Texas with bank fraud, wire fraud, money laundering, and conspiracy. Adeoso and Ifebajo are alleged to have received and laundered at least $3.4 million. In furtherance of their scheme, they are alleged to have assumed 12 fictitious identities and defrauded 37 victims from across the United States.

As part of a larger investigation by the FBI and the USSS in Miami, Yamel Guevara Tamayo, 36, of Miami, Florida, and Yumeydi Govantes, 39, of Miami, Florida, were charged in the Southern District of Florida with laundering more than $950,000 of proceeds of BEC scams. The two individuals were also responsible for recruiting approximately 18 other individuals to serve as money mules, who laundered proceeds of BEC scams for an international money laundering network. The victims of the BEC scams included title companies, corporations, and individuals. The individuals were indicted June 18, 2019 and arrested June 20, 2019. The change of plea for both individuals is scheduled for Sept. 16.

In an investigation by FBI Atlanta, two individuals were charged in the Northern District of Georgia for their involvement in a Nigeria-based BEC scheme that began with a $3.5 million transfer of funds fraudulently misdirected from a Georgia-based health care provider to accounts across the United States. Two Nigerian nationals, Emmanuel Igomu, 35, of Atlanta, Georgia, and Jude Balogun, 29, of San Francisco, California, have been arrested on charges of aiding and abetting wire fraud for their part in receiving and transmitting monies derived from the BEC.

Following an investigation by the FBI, Cyril Ashu, 34, of Austell, Georgia; Ifeanyi Eke, 32, of Sandy Springs, Georgia; Joshua Ikejimba, 24, of Houston, Texas; and Chinedu Ironuah, 32, of Houston, Texas, were charged in the Southern District of New York with one count of conspiracy to commit wire fraud and one count of wire fraud for their involvement in a Nigeria-based BEC scheme that impacted hundreds of victims in the United States, with losses in excess of $10 million.

An indictment is merely an allegation and the defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

The cases were investigated by the FBI, U.S. Secret Service, U.S. Postal Inspection Service, ICE’s Homeland Security Investigations (HSI), IRS Criminal Investigation and U.S. Department of State’s Diplomatic Security Service. U.S. Attorney’s Offices in the Districts of Arizona; Central, Eastern and Southern California; Colorado; Delaware; Southern Florida; Northern Georgia; Northern Illinois; Kansas; Eastern Louisiana; Massachusetts; Nebraska; Nevada; Southern New York; Middle North Carolina; Northern Ohio; Oregon; Northern, Western and Southern Texas; Western Tennessee; Eastern Virginia; Eastern Washington, and elsewhere have ongoing investigations some of which have resulted in arrests in Nigeria. The Justice Department’s Computer Crime and Intellectual Property Section, Money Laundering and Asset Recovery Section, and Office of International Affairs of the Criminal Division provided assistance. District Attorney’s Offices of Harris County, Texas; Fort Bend County, Texas; and Washington County, Arkansas are handling state prosecutions. Additionally, private sector partners and the Nigerian Economic and Financial Crimes Commission, Ghana Police Service (GPS) and Economic and Organized Crime Office (EOCO), Turkish National Police (TNP) Cyber Department, Direction Centrale de la Police aux Frontieres (PAF) of France, Squadra Mobile Di Caserta and Italian National Police, National Police Agency of Japan, Tokyo Metropolitan Police Department (TPMD), Royal Malaysian Police, Directorate of Criminal Investigations (DCI) of Kenya and the National Crime Agency (NCA), North Wales Police, Metropolitan Police Service and Hertfordshire Constabulary of the UK provided significant assistance.

This operation serves as a model for international cooperation against specific threats that endanger the financial well-being of each member country’s residents. Deputy Attorney General Rosen expressed gratitude for the outstanding efforts of the participating countries, including law enforcement actions that were coordinated and executed by the Economic and Financial Crimes Commission (EFCC) in Nigeria to curb business email compromise schemes that defraud businesses and individuals alike.

The Justice Department’s efforts to confront the growing threat of cyber-enabled financial fraud led to the formation of the BEC Counteraction Group (BCG), which assists U.S. Attorney’s Offices and the Department with the coordination of BEC cases and the centralization of related expertise. The BCG facilitates communication and coordination between federal prosecutors, serves as a bridge between federal prosecutors and federal agents, centralizes and manages institutional knowledge and training, and participates in efforts to educate the public about protecting themselves and their organizations from BEC scams.

The BCG draws upon the expertise of the following sections within the Department’s Criminal Division: the Computer Crime and Intellectual Property Section, which regularly investigates and prosecutes cases involving computer crimes, including network intrusions; the Fraud Section, which manages complex litigation involving sophisticated fraud schemes; the Money Laundering and Asset Recovery Section, which brings experience in seizing assets obtained through criminal activity; the Office of International Affairs, which plays a central role in securing international evidence and extradition; and the Organized Crime and Gang Section, which contributes strategic guidance in prosecuting complex transnational criminal cases.

Operation reWired was funded and coordinated by the FBI and the Justice Department’s International Organized Crime Intelligence and Operations Center (IOC-2) and follows “Operation Wire Wire,” the first coordinated enforcement action targeting hundreds of BEC scammers. That effort, announced in June 2018, resulted in the arrest of 74 individuals, the seizure of nearly $2.4 million, and the disruption and recovery of approximately $14 million in fraudulent wire transfers.

Victims are encouraged to file a complaint online with the IC3 at bec.ic3.gov. The IC3 staff reviews complaints, looking for patterns or other indicators of significant criminal activity, and refers investigative packages of complaints to the appropriate law enforcement authorities in a particular city or region. The FBI provides a variety of resources relating to BEC through the IC3, which can be reached at www.ic3.gov.