Hat Tip to the FBI for Operation Wire Wire

Beyond phishing, there is vishing and smishing.
Vishing is using the phone, either a land line or cell.
Smishing is scamming your text messages.
Tactics are constantly being developed. Are you paying attention?
Department of Justice
Office of Public Affairs

FOR IMMEDIATE RELEASE
Monday, June 11, 2018

74 Arrested in Coordinated International Enforcement Operation Targeting Hundreds of Individuals in Business Email Compromise Schemes

42 Alleged Fraudsters Arrested in the United States

Federal authorities announced today a significant coordinated effort to disrupt Business Email Compromise (BEC) schemes that are designed to intercept and hijack wire transfers from businesses and individuals, including many senior citizens.  Operation Wire Wire, a coordinated law enforcement effort by the U.S. Department of Justice, U.S. Department of Homeland Security, U.S. Department of the Treasury and the U.S. Postal Inspection Service, was conducted over a six month period, culminating in over two weeks of intensified law enforcement activity resulting in 74 arrests in the United States and overseas, including 29 in Nigeria, and three in Canada, Mauritius and Poland.  The operation also resulted in the seizure of nearly $2.4 million, and the disruption and recovery of approximately $14 million in fraudulent wire transfers.

BEC, also known as “cyber-enabled financial fraud,” is a sophisticated scam often targeting employees with access to company finances and businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments.  The same criminal organizations that perpetrate BEC also exploit individual victims, often real estate purchasers, the elderly, and others, by convincing them to make wire transfers to bank accounts controlled by the criminals. This is often accomplished by impersonating a key employee or business partner after obtaining access to that person’s email account or sometimes done through romance and lottery scams.  BEC scams may involve fraudulent requests for checks rather than wire transfers; they may target sensitive information such as personally identifiable information (PII) or employee tax records instead of, or in addition to, money; and they may not involve an actual “compromise” of an email account or computer network.  Foreign citizens perpetrate many BEC scams.  Those individuals are often members of transnational criminal organizations, which originated in Nigeria but have spread throughout the world.

“Fraudsters can rob people of their life’s savings in a matter of minutes,” said Attorney General Sessions. “These are malicious and morally repugnant crimes. The Department of Justice has taken aggressive action against fraudsters in recent months, conducting the largest sweep of fraud against American seniors in history back in February. Now, in this operation alone, we have arrested 42 people in the United States and 29 others have been arrested in Nigeria for alleged financial fraud. And so I want to thank the FBI, nearly a dozen U.S. Attorneys’ Offices, the Secret Service, Postal Inspection Services, Homeland Security Investigations, the Treasury Department, our partners in Nigeria, Poland, Canada, Mauritius, Indonesia, and Malaysia, and our state and local law enforcement partners for all of their hard work. We will continue to go on offense against fraudsters so that the American people can have safety and peace of mind.”

“This operation demonstrates the FBI’s commitment to disrupt and dismantle criminal enterprises that target American citizens and their businesses,” said FBI Director Christopher A. Wray. “We will continue to work together with our law enforcement partners around the world to end these fraud schemes and protect the hard-earned assets of our citizens. The public we serve deserves nothing less.”

“The Secret Service remains committed to aggressively investigating and pursuing those responsible for cyber-enabled financial crimes,” said U.S. Secret Service Director Randolph “Tex” Alles.  “Although the explosive expansion of the cyber domain has forced us to develop innovative ways of conducting these types of investigations, our proven model remains the same.”

“FinCEN has been a leader in the fight against BEC and other cyber-enabled crime,” said FinCEN Director Kenneth A. Blanco. “Since 2014, working with our domestic and international partners, our Rapid Response Program has helped recover over $350 million stolen from innocent Americans.  We must continue to be smarter, quicker, and better than the criminals that we face every day.  Today’s action is a victory, but it will take vigilance, time, and resources to take this fight into the future.  In defense of the victims of these crimes, we are ready for the challenge.”

“The U.S. Postal Inspection Service has a long history of successfully investigating complex fraud and corruption cases,” said Chief Postal Inspector Guy Cottrell. “We are proud to work alongside our fellow law enforcement partners in major efforts, such as Operation Wire Wire, to target those individuals who take advantage of the American public for illegal profits. Anyone who engages in deceptive practices like this should know they will not go undetected and will be held accountable, regardless of where they are. Postal Inspectors will continue to work tirelessly to protect our customers from fraud.”

A number of cases involved international criminal organizations that defrauded small to large sized businesses, while others involved individual victims who transferred high dollar funds or sensitive records in the course of business.  The devastating effects these cases have on victims and victim companies, affect not only the individual business but also the global economy.  Since the Internet Crime Complaint Center (IC3) began keeping track of BEC and its variant, Email Account Compromise (EAC), as a complaint category, there has been a loss of over $3.7 billion reported to the IC3.  BEC and EAC is a prevalent scam and the Justice Department along with our partners will continue to aggressively pursue and prosecute the perpetrators, including money mules, regardless of where they are located.

Money mules may be witting or unwitting accomplices who receive ill-gotten funds from the victims and then transfer the funds as directed by the fraudsters.  The money is wired or sent by check to the money mule who then deposits it in his or her own bank account.  Usually the mules keep a fraction for “their trouble” and then wire the money as directed by the fraudster.  The fraudsters enlist and manipulate the money mules through romance scams or “work-at-home” scams.

Starting in January 2018, this coordinated enforcement action targeted hundreds of BEC scammers.  In addition, law enforcement agents executed over 51 domestic actions including search warrants, money mule warning letters, and asset seizure warrants totaling nearly $1 million.  Local and state law enforcement partners on FBI task forces across the country, with the assistance of multiple District Attorney’s Offices, charged 15 alleged money mules for their role in defrauding victims.  These money mules were employed by the fraudsters to launder their ill-gotten gains by draining the funds into other accounts that are difficult to trace.

Among those arrested on federal charges in BEC schemes include:

  • Following an investigation by the FBI and the U.S. Secret Service, 23 individuals were charged in the Southern District of Florida with laundering at least $10 million from proceeds of BEC scams, including eight people charged in an indictment unsealed last week in Miami. These eight defendants are alleged to have conspired to launder proceeds from numerous BEC scams, totaling at least approximately $5 million, including approximately $1.4 million from a victim corporation in Seattle, as well as various title companies and a law firm.
  • Following an investigation led by the FBI with the assistance of the IRS Criminal Investigation, Gloria Okolie and Paul Aisosa, both Nigerian nationals residing in Dallas, Texas, were charged in an indictment filed on June 6 in the Southern District of Georgia.  According to the indictment, they are alleged to have victimized a real estate closing attorney by sending the lawyer a spoofing email posing as the seller and requesting that proceeds of a real estate sale in the amount of $246,000 be wired to Okolie’s account.  They are charged with laundering approximately $665,000 in illicit funds.  The attorney experienced $130,000 in losses after the bank was notified of the fraud and froze $116,000.
  • Adeyemi Odufuye aka “Micky,” “Micky Bricks,” “Yemi,” “GMB,” “Bawz” and “Jefe,” 32, and Stanley Hugochukwu Nwoke, aka Stanley Banks,” “Banks,” “Hugo Banks,” “Banky,” and “Jose Calderon,” 27, were charged in a seven-count indictment in the District of Connecticut in a BEC scheme involving an attempted loss to victims of approximately $2.6 million, including at least $440,000 in actual losses to one victim in Connecticut.  A third co-conspirator Olumuyiwa Yahtrip Adejumo, aka “Ade,” “Slimwaco,” “Waco,” “Waco Jamon,” “Hade,” and “Hadey,” 32, of Toledo, Ohio, pleaded guilty on April 20 to one count of conspiracy to commit wire fraud.  Odufuye was extradited from the United Kingdom to the United States and on Jan. 3, pleaded guilty to one count of conspiracy to commit wire fraud and one count of aggravated identity theft. Nwoke was extradited to the United States from Mauritius on May 25, marking the first extradition in over 15 years from Mauritius.  His case is pending.
  • Richard Emem Jackson, aka Auwire, 23, of Lagos, Nigeria, was charged in an indictment filed on May 17 in the District of Massachusetts with two counts of unlawful possession of a means of identification as part of a larger fraud scheme. According to the indictment, on two occasions in 2017, Jackson is alleged to have possessed the identifications of two victims with the intent to commit wire fraud conspiracy.  In another case being prosecuted in the District of Massachusetts, a 25-year-old Fort Lauderdale, Florida man was indicted in federal court in Boston on June 6 on one count of money laundering conspiracy. According to the indictment, the individual was part of a conspiracy that engaged in wire fraud. It is alleged that in early 2018, the defendant’s co-conspirators gained access to email accounts belonging to a Massachusetts real estate attorney and sent emails to recipients in Massachusetts that “spoofed” the real estate attorney’s account in an attempt to cause the email recipient to transfer nearly $500,000, which was intended to be used for payment in connection with a real estate transaction, to a shell account belonging to a money mule recruited and controlled by the defendant.

The BEC scam is related to other forms of fraud such as:

  • “Romance scams,” which lull victims to believe that their online paramour needs funds for an international business transaction, a U.S. visit or some other purpose;
  • “Employment opportunities scams,” which recruits prospective employees for work-from-home employment opportunities where employees are required to provide their PII as new “hires” and then are significantly overpaid by check whereby the employees wire the overpayment to the employers’ bank;
  • “Fraudulent online vehicle sales scams,” which convinces intended buyers to purchase prepaid gift cards in the amount of the agreed upon sale price and are instructed to share the prepaid card codes with the “sellers” who ignore future communications and do not deliver the goods;
  • “Rental scams” occur when renters forward a check in excess of the agreed upon deposit for the rental property to the victims and request the remainder be returned via wire or check and back out of the rental agreements and ask for a refund; and
  • “Lottery scams,” which involves persons randomly contacting email addresses advising them they have been selected as the winner of an international lottery.

The cases were investigated by the FBI, U.S. Secret Service, U.S. Postal Inspection Service, U.S. Immigration and Customs Enforcement’s Homeland Security Investigations, the U.S. Department of the Treasury Financial Crimes Enforcement Network (FinCEN) and IRS Criminal Investigation.  U.S. Attorney’s Offices in the Districts of Central California, Connecticut, Eastern Virginia, Massachusetts, Nebraska, New Jersey, Southern Florida, Southern Georgia, Southern Texas, Eastern Pennsylvania, Eastern Washington, Western Pennsylvania, Western Tennessee, Western Washington, Utah, and elsewhere have ongoing investigations some of which have resulted in arrests in Nigeria.  The Justice Department’s Computer Crime and Intellectual Property Section, Money Laundering and Asset Recovery Section and Office of International Affairs of the Criminal Division provided assistance. District Attorney’s Offices of Caddo Parrish in Shreveport, Louisiana; Harris County, Texas and Los Angeles are handling state prosecutions. Additionally, private sector partners and the Nigerian Economic and Financial Crimes Commission, Canadian law enforcement including the Toronto Police Service, the Mauritian Attorney-General and the Commissioner of Police, Polish Police Central Bureau of Investigation, Indonesian National Police Cyber Crimes Unit, and the Royal Malaysia Police provided significant assistance.

This operation, which was funded and coordinated by the FBI, serves as a model for international cooperation against specific threats that endanger the financial well-being of each member country’s residents.  Attorney General Sessions expressed gratitude for the outstanding efforts of the participating countries, including law enforcement actions that were coordinated and executed by the Economic and Financial Crimes Commission (EFCC) in Nigeria to curb business email compromise schemes that defraud businesses and individuals alike.

Victims are encouraged to file a complaint online with the IC3 at bec.ic3.gov. The IC3 staff reviews complaints, looking for patterns or other indicators of significant criminal activity, and refers investigative packages of complaints to the appropriate law enforcement authorities in a particular city or region. The FBI provides a variety of resources relating to BEC through the IC3, which can be reached at www.ic3.gov.

For more information on BEC scams, visit: www.ic3.gov/media/2018/180611.aspx

Fed Gov Spent $76 Billion in 2017 for Cyber Security, Fail v Success

Go here for the Forum Part One

Go here for the Forum Part Two

Fascinating speakers from private industry, state government and the Federal government describe where we are, the history on cyber threats and how fast, meaning hour by hour the speed at which real hacks, intrusions or compromise happen.

David Hoge of NSA’s Threat Security Operations Center for non-classified hosts worldwide describes the global reach of NSA including the FBI, DHS and the Department of Defense.

NSA Built Own 'Google-Like' Search Engine To Share ... photo

When the Federal government spent $76 billion in 2017 and we are in much the same condition, Hoge stays awake at night.

With North Korea in the constant news, FireEye published a report in 2017 known as APT37 (Reaper): The Overlooked North Korea Actor. North Korea is hardly the worst actor. Others include Russia, China, Iran and proxies.

Targeting: With North Korea primarily South Korea – though also Japan, Vietnam and the Middle East – in various industry verticals, including chemicals, electronics, manufacturing, aerospace, automotive, and healthcare.
Initial Infection Tactics: Social engineering tactics tailored specifically to desired targets, strategic web compromises typical of targeted cyber espionage operations, and the use of torrent file-sharing sites to distribute malware more indiscriminately.
Exploited Vulnerabilities: Frequent exploitation of vulnerabilities in Hangul Word Processor (HWP), as well as Adobe Flash. The group has demonstrated access to zero-day vulnerabilities (CVE-2018-0802), and the ability to incorporate them into operations.
Command and Control Infrastructure: Compromised servers, messaging platforms, and cloud service providers to avoid detection. The group has shown increasing sophistication by improving their operational security over time.
Malware: A diverse suite of malware for initial intrusion and exfiltration. Along with custom malware used for espionage purposes, APT37 also has access to destructive malware.

More information on this threat actor is found in our report, APT37 (Reaper): The Overlooked North Korean Actor.

** NSA 'building quantum computer to crack security codes ...  photo

Beyond NSA, DHS as with other agencies have cyber divisions. The DHS cyber strategy is found here. The fact sheet has 5 pillars:

DHS CYBERSECURITY GOALS
Goal 1: Assess Evolving
Cybersecurity Risks.
We will understand the evolving
national cybersecurity risk posture
to inform and prioritize risk management activities.
Goal 2: Protect Federal Government
Information Systems.
We will reduce vulnerabilities of federal agencies to ensure they achieve
an adequate level of cybersecurity.
Goal 3: Protect Critical
Infrastructure.
We will partner with key stakeholders
to ensure that national cybersecurity
risks are adequately managed.
Goal 4: Prevent and Disrupt Criminal
Use of Cyberspace.
We will reduce cyber threats by
countering transnational criminal
organizations and sophisticated cyber
criminals.
Goal 5: Respond Effectively to Cyber
Incidents.
We will minimize consequences from
potentially significant cyber incidents
through coordinated community-wide
response efforts.
Goal 6: Strengthen the Security and
Reliability of the Cyber Ecosystem.
We will support policies and activities
that enable improved global cybersecurity risk management.
Goal 7: Improve Management of
DHS Cybersecurity Activities.
We will execute our departmental
cybersecurity efforts in an integrated
and prioritized way.

Related reading:National Protection and Programs Directorate

NPPD’s vision is a safe, secure, and resilient infrastructure where the American way of life can thrive.  NPPD leads the national effort to protect and enhance the resilience of the nation’s physical and cyber infrastructure.

*** Going forward as devices are invented and added to the internet and rogue nations along with criminal actors, the industry is forecasted to expand with experts and costs.

Research reveals in its new report that organizations are expected to increase spending on IT security by almost 9% by 2018 to safeguard their cyberspaces, leading to big growth rates in the global markets for cyber security.

The cyber security market comprises companies that provide products and services to improve security measures for IT assets, data and privacy across different domains such as IT, telecom and industrial sectors.

The global cyber security market should reach $85.3 billion and $187.1 billion in 2016 and 2021, respectively, reflecting a five-year compound annual growth rate (CAGR) of 17.0%. The American market, the largest segment, should grow from $39.5 billion in 2016 to $78.0 billion by 2021, demonstrating a five-year CAGR of 14.6%. The Asia-Pacific region is expected to grow the fastest among all major regions at a five-year CAGR of 21.4%, due to stringent government policies to mitigate cyber threats, and a booming IT industry.

Factors such as the growing complexity and frequency of threats, increasing severity of cyber security, stringent government regulations and compliance requirements, ubiquity of online communication, digital data and social media cumulatively should drive the market. Moreover, organizations are expected to increase IT spending on security solutions and services, as well. Rising adoption of technologies such as Internet of things, evolution of big data and cloud computing, increasing smartphone penetration and the developing market for mobile and web platforms should provide ample opportunities for vendors.

By solution type, the banking and financial segment generated the most revenue in 2015 at $22.2 billion. However, the defense and intelligence segment should generate revenues of $50.7 billion in 2021 to lead all segments. The healthcare sector should experience substantial growth with an anticipated 16.2% five-year CAGR.

Network security, which had the highest market revenue in 2015 based on solution type, should remain dominant through the analysis period. Substantial growth is anticipated in the cloud security market, as the segment is expected to have a 27.2% five-year CAGR, owing to increasing adoption of cloud-based services across different applications.

“IT security is a priority in the prevailing highly competitive environment,” says BCC Research analyst Basudeo Singh. “About $100 billion will be spent globally on information security in 2018, as compared with $76.7 billion in 2015.”

Chinese Spy Networks in Britain and United States

The agents are thought to have handed over secrets while still in service for France’s external DGSE intelligence agency, similar to Britain’s MI6 and America’s CIA, Ms Parly told CNews television. The third person – believed to be the wife – has been indicted for “concealment of treasonable crimes” and placed under “judicial control”, meaning judges keep close tabs on her pending trial. More here.

France arrests two spies for passing secrets to China photo

France has confirmed the arrest of two French intelligence officers who are accused of spying for the Chinese government. It appears that the two officers were captured and charged in December. However, their arrests were not publicized at the time, because French counterintelligence officials wanted to avoid alerting more members of a possible spy ring, which some say may include up to five French citizens. It was only last Friday, a day after French media published leaked reports of the arrests, that the French government spoke publicly about the case.

France’s Minister of the Armed Forces, Florence Parly, told France’s CNews television on Friday that two French intelligence officers were “accused of extremely serious acts of treason” against the French state. The two officers had been charged with delivering classified information to a foreign power”, she said. Parly added that the spouse of one of the officers was also being investigated for participating in acts of espionage on behalf of a foreign country. When asked to identify the country that the two officers are accused of spying for, the minister refused to respond. But the Agence France Presse news agency cited an anonymous “security source”, who said that the two intelligence officers were being suspected of spying for China and that they had been captured following a sting operation by French counterintelligence officers.

French television station TFI1 said on Friday that both spy suspects are officers in the General Directorate of External Security (DGSE), France’s primary external intelligence agency. The station added that at least one of the two suspects was stationed at the embassy of France in Beijing when French counterintelligence became aware of the alleged espionage. According to some reports, the two suspects had retired from the DGSE by the time they were arrested, but committed their alleged espionage while still in the service of the spy agency. French government officials have refused to provide information about the length of the alleged espionage or the nature of the classified information believed to have been compromised. Additionally, no information is available about whether the two alleged spies were working in cooperation with each other. The BBC asked China last week about the arrests in France, but the Chinese Ministry of Foreign Affairs said it was not aware of the incident.

*** As a reminder, the United States has it’s own Chinese spy network. Jerry Chun Shing Lee was charged with aiding China dismantle a U.S. informant network in China in exchange for money. He has plead not guilty.

a man smiling for the camera © Provided by South China Morning Post Publishers Limited

It was this past February that FBI Director Chris Wray provided testimony to the Senate Intelligence Committee that Chinese spies have fully infiltrated U.S. universities. Additionally, China continues to gain access and in many cases successfully, of U.S. technologies and intellectual properties through telecommunications companies, academia and most especially with joint business adventures.

China has launched an ‘all society’ approach to gain access to intellectual property and some universities are pushing back on the warnings put forth by Director Wray as there are an estimated 400,000 Chinese students studying in the United States, many attending cash strapped colleges.

Deep Throat, Deep State and #SpyGate is Old News

C’mon remember the Watergate break-in? Former CIA operatives were part of that. But wait, Nixon himself was being surveilled by the FBI. Anna Chennault, a GOP operative had interesting connections all throughout Asia. Those relationships were of big concern to the FBI and the Bureau was tracking those connections. That was all related to the Paris Peace talks on North and South Vietnam. Due to FBI eavesdropping and collections of diplomatic cables, Lyndon Johnson knew all about Nixon’s subterfuge. Have we forgotten the secret Nixon tapes? Too bad we can’t ask Mark Felt questions, dead men tell no tales.

Using intelligence agencies is an old habit yet Obama appears to have made an art of that exploitation. Obama spied on journalists including James Rosen of Fox News. Obama likely approved of John Brennan’s operation to spy on the senate staffers working on the enhanced interrogation techniques report headed by Senator Dianne Feinstein. Heck, Obama spied on Angela Merkel of Germany. Enter the NSA, they have everything. Edward Snowden proved that right? Not too sure FISA warrants were ever really needed in the first place, think about that.

Spies, informants and operatives come in many forms. They can be staffers, hired ladies, lawyers, lobbyists, policy wonks, people having cocktails at conventions, summits or conferences where business cards are exchanged for later email/phone call follow-up.

It is all old news. Old news and old tactics that get refined to due electronic communications, apps and encryption.

So, how do we know about these activities? Follow the money for starters. Remember the DNC and Hillary law firm, Perkins Coie.

The Obama for America committee paid Perkins Coie around $3 million during the 2012 election cycle, according to filings with the Federal Election Commission, A vast majority of the payments were earmarked for “Legal Services.”

Was Fusion GPS hired by Obama to surveil on Romney for opposition research? Was the media involved? Oh yeah, remember that debate and the advanced questions?  Then of course we have Fusion GPS and Trump.

Okay, this brings us to the current #Spygate and the names bubbling to the surface.

One such name is Stefan Halper. During the presidential transition, Donald Trump’s top trade advisor Peter Navarro, recommended Halper for an ambassadorship. Heck Halper was in the White House Executive Office wing last summer to discuss Asia with particular emphasis on China.

Stefan Halper goes all the way back to the Reagan/Carter days. Oh, wait, even Gerald Ford and George HW Bush were included in Halper’s political history. Is there a difference between spying, intelligence collection and being a political operative? You decide.

There is more, How about Paul Corbin? He was a communist. And yes, he was an campaign operative too. He worked on the John F. Kennedy campaign. There was also ‘Debategate‘.

 

 

Moving on and do NOT hang your hat on Carter Page. Remember the Washington Post editorial board doing an early interview with Trump and a question arose about his foreign policy team? Well, Trump threw out 2 names from the hip, Carter Page and George Stephanopoulos. In fact neither had any quality role in the Trump operation. Another was Zalmay Khalilzad, former U.S. ambassador to Afghanistan, Iraq and the United Nations. Heck Trump never met Khalilzad. He remains a back channel fella with concerns still with Pakistan, Afghanistan and Iraq. Khalilzad was part of a money laundering investigation in 2014. Could he be an operative too?

Now take a moment and see the issue of Russian operatives and spies in the United States to understand how the FBI tails these people. In 2010, there was a spy swap (10 operatives) that included 2 key people. One such person was Anna Chapman who was assigned to get inside the Hillary State Department operation(s) and she did. The other is Sergei Skripal. He is the former Russian military officer and double agent that Russia just attempted to kill with Novichok, a nerve agent. Then there was this other double agent in New York that was captured in a counter-intelligence operation as a result of spy operations that work out of the Russian Mission to the United Nations.

Are you beginning to understand the other work of the FBI? President Bush expelled 50 Russians, Reagan expelled 55 Soviets and both Obama and Trump have expelled 35 and 60 respectively.

With those facts, does it stand to reason that the FBI rank and file agents are very concerned about foreign operatives in politics and campaigns? There is for sure an argument to be made that informants and plants are not only used by required.

Will we ever know all the puzzle parts to these cases? NO

Is #Spygate a one off with regard to President Trump? NO

Perhaps there is something yet to be discovered in Hillary’s missing emails or Peter and Lisa’s text messages. Hello IG report by Michael Horowitz.

The tactics are tried and true…however, when will the media much less the Republicans call out the abuse of power the Obama administration on all of this? In summary, the Trump administration should fight back and impeach those Obama operatives, what say you?

 

 

Whining Congress on Election Security Really Doesn’t Care

On March 21, 2018, the Senate Intelligence Committee held a hearing after much whining from Democrats on the topic of election security. It was quite the hearing where aggressive and snotty questions were put to current DHS Secretary Kirstjen Nielsen and former DHS Secretary Jeh Johnson.

Since that hearing, the Department of Homeland Security has reached out to almost every state and collaborated on issues of security of voter databases, ensuring security of voting machine software and held sessions of advise on what had transpired during the election year of 2016. Many states have taken substantial steps to ensure integrity of all systems.

The Senate Intelligence Committee members met in closed session to discuss their findings with former Director of National Intelligence James Clapper, former CIA director John Brennan, and former National Security Agency director Adm. Mike Rogers. None has wavered from the conclusions about Russian interference in the election, according to senators who were in the room.

Former FBI director James Comey had also been invited to testify about the findings to the panel, but did not attend.

4 out of 5 House members skip classified briefing on ... photo

So, in a classified setting both the House Committee on Homeland Security and the Department of Homeland Security hosted a briefing on the facts of Russian intrusion into the U.S. election infrastructure where all 435 members of Congress were invited. Those that were whining back in March were on the invitation list. How many did finally show up to assuage their concerns? Less than 50 and by most estimates, it was 30.

The Department of Homeland Security — which found evidence of Russian hackers targeting systems in 21 states ahead of the 2016 vote — is taking the lead on helping states secure their digital election assets. Meanwhile, the FBI is working to counter foreign influence operations. Coats was present to provide lawmakers with an overall threat picture.

“Americans’ votes must count, and they must be counted correctly,” Nielsen said.

Officials provided lawmakers with an unclassified resource guide of the services Homeland Security is offering to state and local officials who request aid, which range from simple cyber “hygiene” scans that can be done remotely to more rigorous risk and vulnerability assessments that require federal officials to be on the ground in states to test their systems.

Lawmakers from both parties have expressed concerns that Russia or other foreign adversaries would look to sow discord in future elections — fears that were echoed on Tuesday.

***

DHS is offering states voluntary cyber services, including remote checks of their election systems and on-site vulnerability assessments. It’s also granting security clearances to election officials, though they haven’t all been finalized.

States are now deciding how to use their share of $380 million in federal election security grants that came with the omnibus spending package earlier this year. But it’s hardly enough to update aging voting equipment in most states ahead of the November polls, and many state officials are hoping Congress will approve more dollars. More here.