So, What Really Goes in Space to Have a Space Force?

Primer: Did you know there is something called the OuterSpace Treaty? Yup, it covers arms control, verification and compliance. Sounds great right? Problem is it is dated 2002.

Then there is the NASA summary of the 1967 Space Treaty.

GPS is operated and maintained by the U.S. Air Force. GPS.gov is maintained by the National Coordination Office for Space-Based Positioning, Navigation, and Timing.

Like the Internet, GPS is an essential element of the global information infrastructure. The free, open, and dependable nature of GPS has led to the development of hundreds of applications affecting every aspect of modern life. GPS technology is now in everything from cell phones and wristwatches to bulldozers, shipping containers, and ATM’s.

GPS boosts productivity across a wide swath of the economy, to include farming, construction, mining, surveying, package delivery, and logistical supply chain management. Major communications networks, banking systems, financial markets, and power grids depend heavily on GPS for precise time synchronization. Some wireless services cannot operate without it.

GPS saves lives by preventing transportation accidents, aiding search and rescue efforts, and speeding the delivery of emergency services and disaster relief. GPS is vital to the Next Generation Air Transportation System (NextGen) that will enhance flight safety while increasing airspace capacity. GPS also advances scientific aims such as weather forecasting, earthquake monitoring, and environmental protection.

Finally, GPS remains critical to U.S. national security, and its applications are integrated into virtually every facet of U.S. military operations. Nearly all new military assets — from vehicles to munitions — come equipped with GPS.

***

There is a robust debate within Washington and the Pentagon if whether or not a new branch of Armed Services is really needed. Presently, the Air Force has most exclusive authority of all things space except for research and exploration which is performed by NASA.

There is even a debate within the Air Force which was raised last February.

US Air Force Chief of Staff General David L. Goldfein predicted it’ll only be a “matter of years” before American forces find themselves “fighting from space.” To prepare for this grim possibility, he said the Air Force needs new tools and a new approach to training leaders. Oh, and lots of money.

“[It’s] time for us as a service, regardless of specialty badge, to embrace space superiority with the same passion and sense of ownership as we apply to air superiority today,” he said.

These are some of the strongest words yet from the Air Force chief of staff to get the Pentagon thinking about space—and to recognize the U.S. Air Force as the service branch best suited for the job. “I believe we’re going to be fighting from space in a matter of years,” he said. “And we are the service that must lead joint war fighting in this new contested domain. This is what the nation demands.”

The USAF and other military officials have been saying this for years, but Goldfein’s comments had an added sense of urgency this time around. Rep. Mike Rogers, the Strategic Forces Subcommittee chairman, recently proposed the creation of a new “Space Corps,” one that would be modeled after the Marines. The proposed service branch, it was argued, would keep the United States ahead of rival nations like Russia and China. The idea was scrapped this past December—at least for now. Needless to say, Rogers’ proposal did not go over well with the USAF; the creation of the first new uniformed service branch in 70 years would see Pentagon funds siphoned away from the Air Force. Hence Goldfein’s speech on Friday, in which he argued that the USAF is the service branch best positioned to protect American interests in space.

But in order to protect “contested environments,” the US Air Force will need to exercise competency in “multi-domain operations,” he said. This means the ability to collect battlefield intelligence from “all domains,” including air, ground, sea, cyber, and space. “I look forward to discussing how we can leverage new technology and new ways of networking multi-domain sensors and resilient communications to bring more lethality to the fight,” said Goldfein.

Indeed, the USAF has plenty of work to do make this happen, and to keep up with its rivals. China, for example, recently proposed far-fetched laser-armed satellite to remove space junk, while also demonstrating its ability to shoot down missiles in space. Should a major conflict break out in the near future, space will most certainly represent the first battlefield.

“When you think of how dependent the US military is on satellites for everything from its communication and navigation to command and surveillance, we are already fighting in space, even if it’s not like the movies depicted,” Peter W. Singer, fellow at New America and author of Ghost Fleet: A Novel of the Next World War, told Gizmodo. “If we were ever to fight another great power, like a China or Russia, it is likely the opening round of battle would be completely silent, as in space no one would hear the other side jamming or even destroying each other’s satellites.”

To prepare the United States for this possibility, Goldfein said the Air Force needs to invest in new technologies and train a new generation of leaders. On that last point, the CSAF ordered Lt. Gen. Steven Kwast, the commander of Air Education and Training Command, to develop a program to train officers and non-commissioned officers for space ops. “We need to build a joint, smart space force and a space-smart joint force,” Goldfein said.

As reported in SpaceNews, the USAF is asking for $8.5 billion for space programs in the 2019 budget, of which $5.9 billion would go to research and development, and the remaining for procurement of new satellite and launch services. Over next five years it hopes to spend $44.3 billion on development of new space systems, which is 18 percent more than it said it would need last year to cover the same period.

 

Trouble Ahead After DPRK’s FM Visit to Tehran

So, it appears there is more to the teaming up between Tehran and Pyongyang.

The Iranian President Rouhani told the North Korean Foreign Minister in a recent confab to NOT trust the United States.

Meanwhile, SecState, Mike Pompeo issued a proposal to North Korea calling for a timeline Pompeo that would mandate North Korea hand over 60 to 70 percent of its nuclear warheads to a third party within six to eight months, according to the report.

North Korea has reportedly rejected a formal timeline for its denuclearization proposed by Secretary of State Mike Pompeo.

Vox reported Wednesday that Pyongyang has rejected the timeline several times over the past two months amid continued negotiations over North Korea’s nuclear program.

The timeline Pompeo proposed would mandate North Korea hand over 60 to 70 percent of its nuclear warheads to a third party within six to eight months, according to the report.

However, it is unclear how many warheads North Korean leader Kim Jong Un has, making it difficult to verify that Pyongyang has actually turned over an agreed-upon percentage.

Trump administration officials in recent weeks have expressed frustration with North Korea’s efforts to denuclearize despite President Trump hailing his June summit with Kim in Singapore as a success.

“The ultimate timeline for denuclearization will be set by Chairman Kim, at least in part,” Pompeo told Channel NewsAsia in an interview last week.

“The decision is his. He made a commitment, and we’re very hopeful that over the coming weeks and months we can make substantial progress towards that and put the North Korean people on a trajectory towards a brighter future very quickly.”

White House national security adviser John Bolton told Fox News on Tuesday that “North Korea that has not taken the steps we feel are necessary to denuclearize.”

Iran fires attack on Trump as it tells North Korea: ‘US ... photo

Then we have yet another emerging hacking warning from CERT.

The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have identified a Trojan malware variant—referred to as KEYMARBLE—used by the North Korean government. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA.

US-CERT encourages users and administrators to review Malware Analysis Report (MAR) MAR-10135536-17 and the US-CERT page on HIDDEN COBRA – North Korean Malicious Cyber Activity for more information.

Not to leave out Iran’s cyber attack warnings.

Iranian hackers have laid the groundwork to carry out extensive cyber attacks against private U.S. and European companies, U.S. officials warn, according to NBC News. Although experts don’t believe any such attack is imminent, the preparations could enable denial-of-service attacks on infrastructure including electric grids and water plants, plus health care and technology companies across the U.S., Europe, and Middle East, say U.S. officials at the 2018 Aspen Security Forum.

A spokesperson for the Iranian mission to the United Nations, Alireza Miryousefi, told NBC News that the U.S. is more aggressive in terms of cyber attacks, and Iran’s moves are merely defensive.

***

As sanctions reimposed in response to its nuclear program begin to bite, Iran seems poised to follow the trail North Korea blazed in cyberspace: state-directed hacking that aims at direct theft to redress economic pain. Accenture researchers have been tracking ransomware strains, many of them requiring payment in Bitcoin or other cryptocurrencies, and they’ve concluded that they represent an incipient Iranian campaign against targets of opportunity that offer the prospect of quick financial gain. Tehran’s state-directed hackers have a reputation as being relatively less sophisticated than those run by Russia and China (and indeed those run by major Western powers, the Five Eyes and their closest friends) but they also have a reputation as determined fast-learners.

CCN: As the US gets ready to impose sanctions on Iran, hackers in that country are working on ransomware to secure bitcoin, according to cybersecurity experts interviewed by The Wall Street Journal.

Accenture PLC’s cybersecurity intelligence group has followed five Iranian built ransomware variations in the last two years. The hackers are hoping to secure payments in cryptocurrencies, according to Jim Guinn, who oversees the industrial cybersecurity business at Accenture.

Several clues link the ransomware to Iran. Samples include messages in Farsi that are connected to Iran based computers.

A recent Accenture report noted the ransomware could be driven by Iranian government supported parties, criminals, or both.

Scourge Continues

Ransomware has plagued both businesses and governments for years, having disabled payment systems at the San Francisco Municipal Transportation Agency, U.K hospitals and cargo shipments. Government supported hackers in some instances have obtained cryptocurrency payments from victims.

One variant of ransomware that iDefense discovered has been linked to Iran’s government, according to CrowdStrike Inc., another cybersecurity firm. The software, called Tyrant, was developed to discourage Iranian citizens from downloading software designed to discourage government snooping, CrowdStrike noted.

Palo Alto Networks Inc. and Symantec Corp. issued reports last month that described a pair of data stealing operations connected to Iran.

Crypto Mining Linked To Iran

Crypto mining software, which robs computers of their processing power to mine cryptocurrencies, has also been linked to Iran.

Accenture cited crypto mining software installed on Middle Eastern customer networks equipped with digital clues to Iran.

Crypto mining software has created problems in gas and oil facilities in the Middle East, Guinn said. He estimated millions of dollars of compute cycles have been stolen in the last year.

Iran Denies Culpability

Iran has claimed it has not been involved in cyber attacks, and that it has been a hacking victim.

A cyber attack called Stuxnet initiated by the U.S. and Israel about a decade ago disabled uranium-enrichment centrifuges for Iran’s nuclear program. Iran has since focused on enhancing its own cyber capabilities, according to government officials and security researchers.

Keith Alexander, chief executive of IronNet Cybersecurity Inc. and former director of the U.S. Cyber Command and the National Security Agency said crypto mining and theft is a way for cash-strapped countries to make fast profits.

Guinn said hackers have also stolen intellectual property.

The Process for Fallen Troops’ Identities

When her duty day is over, Army Sgt. 1st Class Jennifer Owen often wonders if she did enough to help identify fallen service members.

A lab worker examines personal effects that may have belonged to a fallen service member.

Army Sgt. 1st Class Jennifer Owen, a morgue noncommissioned officer for the Defense POW/MIA Accounting Agency, examines a personal effect that may have belonged to a fallen service member in a laboratory at Joint Base Pearl Harbor-Hickam, Hawaii, March 12, 2018. Army photo by Sean Kimmons

As the noncommissioned officer in charge of the morgue at the Defense POW/MIA Accounting Agency, which is tasked to account for more than 82,000 Americans missing from past conflicts, she analyzes human remains and personal effects in hopes to close a cold case.

“At the end of the day, I have to be able to look in the mirror and say I’ve done my best,” she said. “And when I get up in the morning, I say I’m going to do better, because these families have been waiting years and years.”

Owens is one of about 100 service members and civilians who work at the agency’s laboratories here and at Offutt Air Force Base in Nebraska. Each year, the labs identify the remains of around 200 Americans that are then reunited with families.

On Aug. 1, more than 50 cases containing remains believed to be those of American service members were provided to DPAA by North Korea.

The remains are now undergoing further analysis and identification at the labs.

The painstaking work, which can take months to years to complete, is Owen’s passion. Whenever a positive identification comes in, she said, it is as if the service member’s name is given back.

‘These Are All Heroes’

“What drives me the most is that these are heroes,” she said, looking across a lab holding hundreds of unknown remains. “These are all heroes [who] have a name and a family.”

Each year, DPAA conducts up to 80 investigation and recovery team missions throughout the world to pinpoint last known locations of missing Americans and to attempt to excavate their remains.

“The work is complex, the work is difficult, and it takes that dedication, that passion … to be able to perform this solemn obligation that we make to the nation and to the families,” said Kelly McKeague, the agency’s director.

The joint agency, which employs many service members and veterans, has agreements with nearly 50 nations that assist in its missions, he added.

Most of the missing fell at World War II battle sites in the Pacific region. There are also almost 7,700 service members unaccounted for from the Korean War, with the majority believed to be in North Korea.

DPAA teams were allowed to conduct missions in North Korea from 1996 to 2005, but operations were halted as diplomatic relations deteriorated in the region. Agency officials hope these missions could soon start up again.

Before he became the agency’s lab director, John Byrd had the opportunity to help recover Americans who fought in North Korea at the Battle of Unsan. The 1950 battle pitted Chinese forces against American and South Korean troops.

When remains are identified by his staff it is always a testament to good field and lab work that solved the decades-old case, Byrd said.

“It’s extremely gratifying,” he said, “and it kind of keeps you grounded where you know why you’re here and why you’re doing this work.”

DNA Testing

A majority of DPAA cases involve some type of DNA testing. Samples are taken from the remains and sent to the Armed Forces DNA Identification Lab in Delaware.

To help this process, family members who have a missing loved one are encouraged to provide a DNA sample that will serve as a comparison.

If no reference samples are on file, a battalion of professional genealogists working for service casualty offices will try to locate family members.

Many times their starting point is the service member’s home address from the 1940s, if they served in World War II. This makes it extremely difficult to track down a living family member as the years pass on.

“It’s one of the greatest challenges of all. How do you find close family members of a missing serviceman from 1944?” Byrd asked. “It’s not easy. Some [cases] we run into dead-ends and we can’t find anybody.”

The Defense Department has kept dental records of troops dating back to World War I that can be used to help in the identification process.

In 2005, the agency also discovered another method that has proved successful. Many troops who served in early conflicts had to get chest X-rays as part of a tuberculosis screening when they first signed up.

Like the dental records, these radiographs were stored in a warehouse by the DoD. DPAA later obtained thousands of copies of them. Lab personnel use them as a comparison tool, since the shape of each person’s chest is different.

“The process of comparing this induction chest x-ray to an x-ray we take from the remains is analogous to doing fingerprint comparison,” Byrd said. “It’s a very similar kind of mindset that you take when you look at the two side-by-side; you’re looking for commonalities and differences.”

When a service member is identified, family members often come to the lab so they can participate in escorting the remains back home, he said. For those who work at the lab, those family member visits make the months or years of work seem worthwhile.

“When you have a family member come in and the staff who actually worked on the case get to meet them, they get to see the tangible results of their hard work,” Byrd said. “It’s definitely a boost to their morale.”

In the Field

Before that sort of closure can start for families, recovery teams spend weeks at a time doing the grunt work of excavating sites.

Army Capt. Brandon Lucas, who serves as a team leader, recalled his team digging nearly 20 feet into the ground in Laos in search of an F-4 Phantom fighter pilot who vanished during the Vietnam War.

A lab worker holds an item under a magnifying panel.

Army Sgt. 1st Class Jennifer Owen, a morgue noncommissioned officer for the Defense POW/MIA Accounting Agency, examines a personal effect that may have belonged to a fallen service member in a laboratory at Joint Base Pearl Harbor-Hickam, Hawaii, March 12, 2018. Army photo by Sean Kimmons

While no remains were found on that mission, they were still able to confidently close the site and shift efforts elsewhere.

Then there was another mission in Slovenia, where the tail gunner of a bomber aircraft from World War II went missing.

When his plane crashed, the gunner was the only one in his aircrew killed. Residents later buried him next to a church.

As Lucas’ team arrived at the site, the townspeople still knew about the crash and the gunner. Residents regularly visited his team, often bringing Lucas and the others food and drinks. An elderly woman even told him that for decades she would clean the grave site once a week.

When his team recovered the remains, a somber tone spread through the community.

“A lot of them actually shed tears when we found the remains,” Lucas said. “It was special to them and it was special to me.”

The poignant moment, along with others he has experienced during missions, galvanized the meaning of the mission for him.

“I’m potentially bringing back a fallen comrade,” Lucas said. “I would want to know that if it was me lost out there somebody is trying to recover me and give my family closure.”

Maritime Recovery

Recovery missions also extend out into the sea, where many service members have disappeared as a result of aircraft crashes or ships sunk.

While she served as commander of the 8th Theater Sustainment Command, Army Maj. Gen. Susan A. Davidson was an advocate for her unit to support the solemn mission.

The unit regularly supplies DPAA with highly-trained Army divers from the 7th Engineer Dive Detachment, who often work on the sea floor with no visibility and use a suction hose to remove loose sediment from recovery sites.

On a barge, team members then sift through the sediment for the remains or personal effects of those missing.

When divers returned to Hawaii, she encouraged them to share their experiences and what they got out of the mission with others in the unit.

“They come back a different person and they have a different respect for our Army and for what we do,” Davidson said.

Back at the lab, Owen and others strive to identity those heroes who have been found.

“I feel that I am part of something so much bigger that I can contribute to,” she said.

Eligible Receiver 97, Red Team Being Applied Today for Cyber Hacks?

An early classified Defense Department cybersecurity exercise named “Eligible Receiver 97” (ER97) featured a previously unpublicized series of mock terror attacks, hostage seizures, and special operations raids that went well beyond pure cyber activities in order to demonstrate the potential scope of threats to U.S. national security posed by attacks in the cyber domain, according to recently declassified documents and a National Security Agency (NSA) video posted today by the nongovernmental National Security Archive at The George Washington University.

“Joint Exercise Eligible Receiver 97”, run during the Clinton presidency, is frequently pointed to as a critical event in the United States’ appreciation of threats in cyber space. The exercise led directly to the formation of what would eventually become United States Cyber Command (USCYBERCOM) and informed key studies such as the formative Marsh Report on critical infrastructure protection. Despite the significance of ER97, however, very little is publicly known about the exercise itself.

ER97 involved an NSA Red Team playing the role of North Korean, Iranian and Cuban hostile forces whose putative aim was to attack critical infrastructure as well as military command-and-control capabilities to pressure the U.S. government into changing its policies toward those states. An interagency Blue Team was required to provide recommendations to personnel enacting defensive responses. Until now, only two phases out of three (infrastructure and command-and-control) had been publicly known.  The video and documents posted today provide new details about the third phase involving kinetic attacks in the physical domain – i.e. more traditional terrorist assaults on civilian targets – which were built upon intelligence gathered through the Red Team’s successes. Read more here on the declassified files.

*** With all the cyber terror going on today in the United States, are we doing more ‘red team’ exercises? Perhaps some of those tactics are paying off many years later.

3 Carbanak (FIN7) Hackers Charged With Stealing 15 Million ...

Three Members of Notorious International Cybercrime Group “Fin7” in Custody for Role in Attacking Over 100 U.S. Companies

Victim Companies in 47 U.S. States; Used Front Company ‘Combi Security’ to Recruit Hackers to Criminal Enterprise

          SEATTLE – Three high-ranking members of a sophisticated international cybercrime group operating out of Eastern Europe have been arrested and are currently in custody facing charges filed in U.S. District Court in Seattle, announced U.S. Attorney Annette L. Hayes, Assistant Attorney General Brian A. Benczkowski of the Justice Department’s Criminal Division and Special Agent in Charge Jay S. Tabb Jr. of the FBI’s Seattle Field Office.

According to three federal indictments unsealed today, Ukrainian nationals Dmytro Fedorov, 44, Fedir Hladyr, 33, and Andrii Kolpakov, 30, are members of a prolific hacking group widely known as FIN7 (also referred to as the Carbanak Group and the Navigator Group, among other names).  Since at least 2015, FIN7 members engaged in a highly sophisticated malware campaign to attack more than 100 U.S. companies, predominantly in the restaurant, gaming, and hospitality industries.  As set forth in the indictments, FIN7 hacked into thousands of computer systems and stole millions of customer credit and debit card numbers which were used or sold for profit.

In the United States alone, FIN7 successfully breached the computer networks of businesses in 47 states and the District of Columbia, stealing more than 15 million customer card records from over 6,500 individual point-of-sale terminals at more than 3,600 separate business locations.  Additional intrusions occurred abroad, including in the United Kingdom, Australia, and France.  Companies that have publicly disclosed hacks attributable to FIN7 include such familiar chains as Chipotle Mexican Grill, Chili’s, Arby’s, Red Robin and Jason’s Deli.  Additionally here in Western Washington FIN7 targeted the Emerald Queen Casino (EQC) and other local businesses.  The Emerald Queen Casino was able to stop the intrusion and no customer data was stolen.

“Protecting consumers and companies who use the internet to conduct business – both large chains and small ‘mom and pop’ stores — is a top priority for all of us in the Department of Justice,” said U.S. Attorney Annette L. Hayes.  “Cyber criminals who believe that they can hide in faraway countries and operate from behind keyboards without getting caught are just plain wrong.  We will continue our longstanding work with partners around the world to ensure cyber criminals are identified and held to account for the harm that they do – both to our pocketbooks and our ability to rely on the cyber networks we use.”

“The three Ukrainian nationals indicted today allegedly were part of a prolific hacking group that targeted American companies and citizens by stealing valuable consumer data, including personal credit card information, that they then sold on the Darknet,” said Assistant Attorney General Benczkowski.  “Because hackers are committed to finding new ways to harm the American public and our economy, the Department of Justice remains steadfast in its commitment to working with our law enforcement partners to identify, interdict, and prosecute those responsible for these threats.”

“The naming of these FIN7 leaders marks a major step towards dismantling this sophisticated criminal enterprise,” said Special Agent in Charge Jay S. Tabb Jr., of the FBI’s Seattle Field Office.  “As the lead federal agency for cyber-attack investigations, the FBI will continue to work with its law enforcement partners worldwide to pursue the members of this devious group, and hold them accountable for stealing from American businesses and individuals.”

Each of the three FIN7 conspirators is charged with 26 felony counts alleging conspiracy, wire fraud, computer hacking, access device fraud, and aggravated identity theft.

In January 2018, at the request of U.S. officials, foreign authorities separately arrested Ukrainian Fedir Hladyr and a second FIN7 member, Dmytro Fedorov.  Hladyr was arrested in Dresden, Germany, and is currently detained in Seattle pending trial.  Hladyr allegedly served as FIN7’s systems administrator who, among other things, maintained servers and communication channels used by the organization and held a managerial role by delegating tasks and by providing instruction to other members of the scheme.  Hladyr’s trial is currently scheduled for October 22, 2018.

Fedorov, a high-level hacker and manager who allegedly supervised other hackers tasked with breaching the security of victims’ computer systems, was arrested in Bielsko-Biala, Poland.  Fedorov remains detained in Poland pending his extradition to the United States.

In late June 2018, foreign authorities arrested a third FIN7 member, Ukrainian Andrii Kolpakov in Lepe, Spain.  Kolpakov, also is alleged to be a supervisor of a group of hackers, remains detained in Spain pending the United States’ request for extradition.

According to the indictments, FIN7, through its dozens of members, launched numerous waves of malicious cyberattacks on numerous businesses operating in the United States and abroad.  FIN7 carefully crafted email messages that would appear legitimate to a business’ employee, and accompanied emails with telephone calls intended to further legitimize the email. Once an attached file was opened and activated, FIN7 would use an adapted version of the notorious Carbanak malware in addition to an arsenal of other tools to ultimately access and steal payment card data for the business’ customers. Since 2015, many of the stolen payment card numbers have been offered for sale through online underground marketplaces. (Supplemental document “How FIN7 Attacked and Stole Data” explains the scheme in greater detail.)

FIN7 used a front company, Combi Security, purportedly headquartered in Russia and Israel, to provide a guise of legitimacy and to recruit hackers to join the criminal enterprise.  Combi Security’s website indicated that it provided a number of security services such as penetration testing.  Ironically, the sham company’s website listed multiple U.S. victims among its purported clients.

 

The charges in the indictments are merely allegations, and the defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

The indictments are the result of an investigation conducted by the Seattle Cyber Task Force of the FBI and the U.S. Attorney’s Office for the Western District of Washington, with the assistance of the Justice Department’s Computer Crime and Intellectual Property Section and Office of International Affairs, the National Cyber-Forensics and Training Alliance, numerous computer security firms and financial institutions, FBI offices across the nation and globe, as well as numerous international agencies. Arrests overseas were executed in Poland by the “Shadow Hunters” from CBŚP (Polish Central Bureau of Investigation); in Germany by LKA Sachsen – Dezernat 33, (German State Criminal Police Office) and the Polizeidirektion Dresden (Dresden Police); and in Spain by the Grupo de Seguridad Logica within the Unidad de Investigación Technologica of the Cuerpo Nacional de Policía (Spanish National Police).

This case is being prosecuted by Assistant U.S. Attorneys Francis Franze-Nakamura and Steven Masada of the Western District of Washington, and Trial Attorney Anthony Teelucksingh of the Justice Department’s Computer Crime and Intellectual Property Section.

how_fin7_attacked_and_stole_data.pdf

55 Remains from N Korea, Identification Underway

The Defense POW/MIA Accounting Agency (DPAA) stated on its Korean War website that “on several occasions in the past, [North Korean] officials have indicated they possess as many as 200 sets of remains they had recovered over the years. The commitment established within the Joint Statement between President Trump and Chairman Kim would repatriate these.”

Defense POW/MIA Accounting Agency > Our Missing > Korean ...

All Americans welcome the return of remains from the Korean War.

United Nations Command returned 55 cases of remains from the Democratic People's Republic of Korea, also known as North Korea, to Osan Air Base, South Korea, July 27, 2018.

United Nations Command returned 55 cases of remains from North Korea to Osan Air Base, South Korea, July 27, 2018. Members of the command and the Osan community were on hand at the arrival ceremony. Army photo by Sgt. Quince Lanford

The July 27 honorable carry ceremony at Osan Air Base, South Korea, transferred 55 boxes of remains covered by the United Nations flag. Now the work of identification begins.

These remains are presumed to be American, but many other nations fought in the Korean War, and it’s possible the remains may come from one of those nations.

The 1950-1953 Korean War was incredibly violent, with 36,940 Americans killed and another 92,134 wounded. Some 7,699 American service members are listed as unaccounted-for from the conflict.

Defense POW/MIA Accounting Agency Defense POW/MIA Accounting Agency

Remains Examination

The remains will be examined at the Defense POW/MIA Accounting Agency, and experts there will be responsible for identifying the remains. The agency is relatively new — coming into existence in 2015 after the merger of the Joint POW/MIA Accounting Command and the Defense Prisoner of War/Missing Personnel Office.

Many of the fallen service members died in North Korea and were buried by their comrades where they fell. Other U.S. service members were captured and placed in prisoner-of-war camps, where many succumbed to starvation, exposure and torture. Outside those camps are graves of Americans.

Defense POW/MIA Accounting Agency

The DPAA Laboratory at Hickam Air Force Base, Hawaii, is the first U.S. stop for the recently returned remains. The lab is the largest and most diverse skeletal identification laboratory in the world and is staffed by more than 30 anthropologists, archaeologists and forensic odonatologists, United Nations Command release.

Those experts will sort and examine the remains. In the past, North Korea turned over commingled remains.

The lab experts are painstaking in their examination. The age of the remains — at least 65 years old — will complicate the process. The North Koreans collected the remains, and U.S. investigators will have to do the examination without the forensic information they normally would have, such as the approximate place of the burial and the conditions around it.

Related reading: Profiles of America’s Unaccounted For Personnel

Examination of dental charts and mitochondrial DNA will be key technologies used to identifying the remains, and the process may take years to complete, DoD officials said.