Russia’s Other War, Cyber

 

Finding weakness and exploiting it in the cyber realm is hidden warfare, few speak about. For the West, Russia tops the list. China, Iran and North Korea are also on the short list. For Russia’s other targets, the Baltic States are in the Russian target list.

CBS: The U.S. has elevated its appraisal of the cyber threat from Russia, the U.S. intelligence chief said Thursday, as he delivered the annual assessment by intelligence agencies of the top dangers facing the country.

“While I can’t go into detail here, the Russian cyber threat is more severe than we had previously assessed,” James Clapper, the director of national intelligence, told the Senate Armed Services Committee, as he presented the annual worldwide threats assessment.

As they have in recent years, U.S. intelligence agencies once again listed cyber attacks as the top danger to U.S. national security, ahead of terrorism. Saboteurs, spies and thieves are expanding their computer attacks against a vulnerable American internet infrastructure, chipping away at U.S. wealth and security over time, Clapper said.

Russia ‘was behind German parliament hack’

BBC: Germany’s domestic intelligence agency has accused Russia of being behind a series of cyber attacks on German state computer systems.

The BfV said a hacker group thought to work for the Russian state had attacked Germany’s parliament in 2015.

This week it emerged that hackers linked to the same group had also targeted the Christian Democratic Union party of Chancellor Angela Merkel.

Russia has yet to respond publicly to the accusations made by the BfV.

Sabotage threat

BfV head Hans-Georg Maassen said Germany was a perennial target of a hacker gang known as Sofacy/APT 28 that some other experts also believe has close links with the Russian state. This group is believed by security experts to be affiliated with the Pawn Storm group that has been accused of targeting the CDU party.

The Russian Cyber Threat: Views from Estonia

Tensions between Russia and its adversaries in the West are escalating. In recent years, Russia has undermined the security of its neighbors by violating their land borders, crossing into their airspace unannounced and harassing them above and below sea level. Less noticed or understood, however, are Moscow’s aggressive actions in cyberspace. The small Baltic country of Estonia—a global leader in digital affairs—is well-placed to shed light on the tactical and strategic aspects of Russia’s offensive computer network operations.

In fact, three civilian and intelligence agencies responsible for cyber security—the Estonian Information System Authority, Internal Security Service and Information Board—recently issued reports that help put together different pieces of the puzzle. The conclusion is that “in cyberspace, Russia is the source of the greatest threat to Estonia, the European Union and NATO.” Now policymakers on both sides of the Atlantic must decide what to do about it.

Russia has been developing and employing offensive cyber capabilities for years. Russian cyber threat groups consist of professional, highly skilled practitioners whose daily jobs are to prepare and carry out attacks. And they don’t go after low-hanging fruit; instead, they receive specific orders on which institutions to target and what kind of information is needed. Criminals, hacktivists, spies and others linked to Russian strategic interests are usually well-financed, persistent and technologically advanced. They have a wide range of tools and resources, including the ability to carry out denial-of-service attacks, develop sophisticated malware and exploit previously unknown software vulnerabilities. Russian threat actors cloak their identities by using remote servers and anonymizing services. They target everything from the mobile devices of individuals to the IT infrastructure of entire government agencies.

Often, Russian threat actors map target networks for vulnerabilities and conduct test attacks on those systems. After carrying out reconnaissance, they conduct denial-of-service attacks or try to gain user access. Common techniques include sending emails with malicious attachments, modifying websites to infect visitors with malware and spreading malware via removable media devices like USB drives. Once inside, they continue to remotely map networks, attempt to gain administrator-level access to the entire network and extract as much sensitive data as possible. Such access also lets them change or delete data if that’s what the mission requires. They’ll often go after the same targets for years to get what they need. They have the confidence that comes from perceived anonymity and impunity; if they make a mistake or fail, they’ll simply try again.

These tactical activities are carried out in pursuit of strategic objectives. In the long term, this includes undermining and, if possible, helping to dissolve the EU and NATO. Moscow also aims to foster politically divided, strategically vulnerable and economically weak societies on its periphery in order to boost its own ability to project power and influence on those countries’ decisions. Russian cyber threat actors help by stealing military, political or economic data that gives Russia advantages in what it sees as the zero-sum game of foreign relations. The exfiltrated data can be used to recruit intelligence agents or provide economic benefits to its companies. Cyber capabilities can also be used to carry out influence operations that undermine trust between the citizens and the state. Telling examples of that strategy include its multi-week distributed-denial-of-service (DDoS) attacks against Estonia in 2007, its coordinated attacks against Ukraine’s 2014 presidential elections and the false-flag operation against a French telecommunication provider in 2015.

Most worryingly, today’s intelligence operations can enable tomorrow’s military actions. Influence operations, including the use of propaganda and social media, can create confusion and dissatisfaction among the population. Denial-of-service attacks can inhibit domestic and international communication. Coordinated, plausibly deniable attacks on multiple critical national infrastructure sectors can disrupt the provision of vital services such as energy, water, or transportation. This can provide a context for the emergence of “little green men”. Malicious code can be weaponized to hinder military and law enforcement responses. Clearly, cyber capabilities have the potential to be a powerful new tool in the Kremlin’s not-so-new “hybrid warfare” toolbox. With enough resources and preparation, they can be used in attempts to cause physical destruction, loss of life and even to destabilize entire countries and alliances. Such operations could be but a decision or two away in terms of planning, and perhaps several months or years before implementation. What can be done about it?

Preventive and countermeasures exist at the personal, organizational, national and international levels. Individuals should take “cyber hygiene” seriously, since Russian threat actors target both personal and work devices. This includes employing basic security technologies, backing up data, not visiting dubious websites and not opening suspicious emails. Organizations that handle sensitive information should adopt stricter security policies, including for handling of work-related data on personal devices. Information systems managers must be especially vigilant since they are primary targets, and weak personal security on their part may compromise national security. For their part, governments must enact the basics: computer security laws, national cyber strategies, a police focus on cybercrime, national CERTs, public-private partnerships and capable intelligence agencies. They also need continuous training and exercises to keep relevant agencies prepared for their missions. Finally, global cooperation and expeditious exchange of information among cyber security firms, national computer security incident response teams (CSIRTs) and security services are key to identifying Russian attack campaigns and taking defensive countermeasures.

All such countermeasures comprise elements of a deterrence-by-denial strategy that aims to raise the cost of carrying out malicious operations. States have also undertaken diplomatic initiatives to manage the potential instability that could result from the use of weaponized code—namely confidence-building measures, norms of responsible state behavior and attempts to agree on international law. While laudable, none of these have curbed Russian cyber aggression in the short term. For example, Russia’s coordinated December 2015 attack on the Ukrainian electrical grid—highlighted in all three agencies’ reports—was clearly an attack on critical national infrastructure that violated tentative international norms signed by Russia, possibly even while the campaign was being prepared. Defensive and diplomatic countermeasures must be complemented by a cohesive strategy of deterrence-by-punishment by individual countries as well as like-minded allies.

Cyber threat actors with links to Russia (APT28/Sofacy/Pawn Storm, the Dukes/APT29, Red October/Cloud Atlas, Snake/Turla/Uroburos, Energetic Bear/DragonFly, Sandworm Team and others) target NATO members on a daily basis—mainly for espionage and influence operations. But a recent SCMagazineUK article claims that the FSB plans to spend up to $250 million per year on offensive cyber capabilities. “Particular attention is to be paid to the development and delivery of malicious programs which have the ability to destroy the command and control systems of enemy armed forces, as well as elements of critical infrastructure, including the banking system, power supply and airports of an opponent.” Clearly, we had better be prepared.

Judicial Watch Begins Interrogatories on Hillary’s Team

Interviews of Clinton aides in email case to begin this week

 Lukens  Mills

 Mull  Pagliano

 Abedin  Kennedy
TheHill: A conservative legal watchdog’s interviews with current and former aides to Hillary Clinton about her use of a private email server while serving as secretary of State will begin Wednesday and stretch into late June, the group announced.

The first person to be deposed as part of a court case concerning Clinton’s bespoke email setup is Lewis Lukens, a former executive director of the State Department’s executive secretariat, Judicial Watch said in a court filing Tuesday.

Sworn testimony with Cheryl Mills, Clinton’s former chief of staff, is set to follow and has been scheduled for next Friday.
In subsequent weeks, the watchdog group will question former department executive secretary Stephen Mull, IT expert Bryan Pagliano, an official representative from the State Department, longtime Clinton adviser Huma Abedin, and sitting Undersecretary for Management Patrick Kennedy.

Kennedy’s interview, scheduled for June 29, is slated to be the final interview as part of the Freedom of Information Act case.

Each interview could last for as long as seven hours, Judicial Watch predicted.

The depositions are the first of two separate court-ordered processes for Judicial Watch to obtain evidence as part of different open records cases concerning Clinton’s email setup. The twin court cases were launched to obtain separate documents from Clinton’s time in office but have evolved as judges have raised questions about whether the likely Democratic presidential nominee’s arrangement allowed her to circumvent open records laws.

“This court-ordered testimony could finally reveal new truths about how Hillary Clinton and the Obama State Department subverted the Freedom of the Information Act,” Tom Fitton, Judicial Watch’s president, said in a statement Tuesday.

In addition to the officials scheduled to testify as part of the Judicial Watch lawsuit, Judge Emmet Sullivan has said that Clinton herself could be forced to answer questions under oath, depending on information learned through other interviews.

In the second Freedom of Information Act case launched by Judicial Watch, the organization has asked a federal judge to interview Clinton about her email setup. The request would have to be approved by the judge and is likely to face opposition from the State Department.

If it is granted, Clinton’s testimony has the potential to dramatically upend the presidential race, given the simmering concern about her email practices while in office.

Clinton and her campaign have dismissed concerns about the setup, claiming that it was used merely for convenience and that all work-related emails have been handed back to the State Department for record keeping.

Iran’s Kidnapping of Navy Sailors Worse than Told

Of course the Obama regime is keeping all details classified until when exactly? Maybe forever, but certainly until January 2017. What is worse, the Navy fired the Commander of the Riverine Squadron for misconduct. Is the Navy pissed? Has anyone asked them? What has been the response from anyone in the Joint Chiefs? crickets….

 

 

 

It is disgusting that Iran is getting more attention, cover and protection than our own sailors.

Navy Fires Commander Eric Rasch Over Iran’s Detention of Sailors

The Navy has fired the commander of the 10 American sailors who entered Iranian territorial waters in the Persian Gulf and were captured and held by Iran for about 15 hours.

In a statement Thursday, the Navy said it had lost confidence in Cmdr. Eric Rasch, who was the executive officer of the squadron that included the 10 sailors at the time of the January incident. He was responsible for the training and readiness of the more than 400 sailors in the unit.

A Navy official said Rasch failed to provide effective leadership, leading to a lack of oversight, complacency and failure to maintain standards in the unit. The official was not authorized to discuss the details publicly so spoke on condition of anonymity. More from NBC here.

The details?

Congressman: Classified Details of Iran’s Treatment of U.S. Sailors Will Shock Nation

Lawmaker says new details being withheld by Obama administration

FreeBeacon: The classified details behind Iran’s treatment of several U.S. sailors who were captured by the Islamic Republic during a tense standoff earlier this year are likely to shock the nation, according to one member of the House Armed Services Committee, who disclosed to the Washington Free Beacon that these details are currently being withheld by the Obama administration.

Rep. Randy Forbes (R., Va.) told the Free Beacon in an interview that the Obama administration is still keeping details of the maritime incident under wraps. It could be a year or longer before the American public receives a full accounting of the incident, in which several U.S. sailors were abducted at gunpoint by the Iranian military.

“I’ve had a full classified briefing” from military officials, Forbes told the Free Beacon. “It could be as long as a year before we actually get that released.”

Details of the abduction are likely to start an uproar in the nation and call into question the Obama administration’s handling of the incident, which many experts say violated international and maritime law.

“I think that when the details actually come out, most Americans are going to be kind of taken aback by the entire incident, both how Iran handled it and how we handled it,” Forbes disclosed. “I think that’s going to be huge cause for concern for most Americans. That’s why I’ve encouraged members of Congress to get that briefing so they do know exactly what did take place.”

Forbes suggested that Iran’s treatment of the U.S. sailors—which included filming them crying and forcing them to apologize at gunpoint—may have been much worse than what has been publicly reported.

“I think clearly there were violations of international and maritime law that took place here,” Forbes said. “We [the United States] did almost nothing in response, in fact, to have Secretary [of State John] Kerry actually thank them for releasing our sailors after they way they captured them, I think was a slap in the sailors’ face.”

Forbes is pushing a new measure that would increase sanctions on Tehran for its treatment of the U.S. sailors in order to hold Iran accountable for its aggressive behavior.

Forbes’ measure outlines a range of Iranian aggressions against U.S. forces in the Persian Gulf region.

“Iranian military and paramilitary vessels have repeatedly behaved in a dangerous and unprofessional manner in close proximity to naval vessels and commercial shipping operating in internationally recognized maritime traffic lanes,” according to a copy of the measure viewed by the Free Beacon.

The list of provocations includes a December 2015 incident in which Iran conducted a “live firing exercise within 1,500 yards of the U.S. aircraft carrier Harry S. Truman.”

Iranian military aircraft buzzed the Truman and a French aircraft carrier in the region in January.

“The administration will not stand up and say this is just wrong,” Forbes said. “Instead of thanking them the administration should be standing up and saying its wrong.”

Congress must take action to hold Iran accountable for its aggressive military behavior, Forbes said.

“These kind of actions undermine stability in the Gulf,” he said. “And they raise the danger of inadvertent escalation.”

“I think it goes without saying that if that’s the case and they won’t stop that activity, all of that should at least be considered and debated as part of any Iran sanctions bill that may come up in the future.”

 

Big Libya $$ in the UK, Interpol Red Notice

Primer:

Sanctions on ODAC were lifted in 2013

Clinton Burned up the telephone lines with the Brit Counterparts

Drumheller to Blumenthal to Hillary for Business Ventures

Interpol Tripoli

There may be no associations but following the money, the organizations and the long term objectives begs certain questions.

    ODAC projects in Libya

Gaddafi insider accused of using state cash to buy luxury Scottish hotels

Libyan prosecutors ask UK officials for help in investigating claims Ali Ibrahim Dabaiba laundered proceeds of embezzlement in England and Scotland

Guardian: Scottish police are investigating claims by Libyan authorities that a powerful member of Muammar Gaddafi’s inner circle used money meant for hospitals and housing to buy luxury hotels in the Highlands and a string of multimillion pound homes.

The allegations were made in confidential documents sent to Scotland’s lord advocate in a request for legal assistance by the Libyan attorney general in 2014. Extracts of these have been shown to the Guardian.

One of an elite group of Gaddafi insiders known as “companions of the leader”, Ali Ibrahim Dabaiba is suspected by Libyan prosecutors of embezzling millions from public funds during his two decades as head of the country’s major infrastructure commission.

Dabaiba may have awarded contracts worth more than £200m to companies that he ultimately controlled, Libyan prosecutors claim. They allege he then laundered the proceeds in England and Scotland. They say he may have been helped by his sons, his brother, and a group of British associates based in Dunfermline, near Edinburgh.

The Dabaiba family have dismissed the allegations as baseless. They maintain that they are not under investigation in Libya, and their lawyer claims they are “not wanted by any judicial, financial or security bodies”. Their alleged associates did not respond to repeated requests for comment.

Companies the Dabaibas appear to control, according to Libyan prosecutors, have invested in at least six prestigious properties in England with a current value of more than £25m. In London these include a £16.5m flat in Mayfair, a £1m flat in Marylebone, a £7m house in Hampstead; Land Registry records also show two £1m homes in Surrey.

Dabaiba’s salary at ODAC was equivalent to just £12,000 a year. His declared earnings were not, according to Libyan prosecutors, sufficient to allow him to own these properties.

Officers from Police Scotland’s serious organised crime division are understood to be actively pursuing their own investigation. A Scottish Crown Office spokesman said: “We can confirm we have received a request for mutual legal assistance from the Libyan authorities. As this relates to an ongoing investigation it would not be appropriate to comment further.”

**** Reports have also filtered through social media that one of those arrested is Ali Dabaiba, a former Gaddafi official who is wanted by Interpol for crimes including embezzlement and abuse of office. Dabaiba, formerly in charge of the Libyan Organisation for Development of Administrative Centres, turned against the Gaddafi government and provided financial support for the 2011 uprising that eventually overthrew the former dictator.

Related reading: The Hillary Spy Network

WSJ: 2014, LONDON—Libyan authorities are seeking international help in apprehending a former senior official in Moammar Gadhafi’s government who has been under investigation for alleged crimes including embezzlement and abuse of office.

Interpol last week published a so-called Red Notice seeking Ali Dabaiba, who ran Libya’s main government-contracting office for decades during the Gadhafi era. The notice, posted on Interpol’s website, said Mr. Dabaiba is “wanted by the judicial authorities of Libya for prosecution/to serve a sentence.”

A lawyer for Mr. Dabaiba had no immediate comment. An Interpol spokeswoman said the notice was published on Thursday at the request of Libyan authorities. Officials in the office of Libya’s attorney general weren’t available to comment.

The Interpol notice says the allegations against Mr. Dabaiba, 68 years old, include embezzlement, money laundering, abuse of power and other crimes. The notice didn’t address whether Mr. Dabaiba has been criminally charged in Libya.

Interpol’s Red Notice system is designed to help law-enforcement authorities in one country get assistance from other countries to track down and apprehend suspects. Interpol’s website says that the alerts are “to seek the location and arrest of wanted persons with a view to extradition or similar lawful action,” and that the notices are issued “on the basis of a valid national arrest warrant.”

As Libyan authorities try to recoup tens of billions of dollars in assets they believe were looted during Gadhafi’s reign, Mr. Dabaiba’s family has been one focus, according to the investigators and documents submitted to British law-enforcement authorities. Mr. Dabaiba is on a long list of individuals whose assets are restricted in Libya pending further investigation.

Unlike some former government officials who are under investigation, Mr. Dabaiba hasn’t been subject to restrictions on him leaving the country, according to both Libya’s asset-freeze law and the Libyan attorney general’s office.

Among the Dabaiba family’s investments Libyan investigators have been scrutinizing is a 2011 investment in a posh British real-estate agency, Chesterton Humberts, according to people familiar with the investigation and a person close to the family. That investment was the focus of a recent article in The Wall Street Journal.

Chesterton Humberts said on Twitter this month that the Dabaiba family “are not shareholders” and that the company has “never been approached by Libyan government or any law-enforcement agency.” The tweets didn’t address whether the Dabaiba family previously invested in Chesterton Humberts.

As recently as April, Mr. Dabaiba was living in the Libyan port city of Misrata, although he regularly left the country, said people who know him.

Libya’s audit agency said it found multiple questionable financial decisions at Libya’s Organization for Development of Administrative Centers when Mr. Dabaiba was in charge.

Supporters of Mr. Dabaiba say his family’s financial support for the 2011 revolution that ultimately overthrew Gadhafi makes up for any alleged misdeeds during his years at ODAC

Dabaiba ran the Organisation for Development of Administrative Centres (ODAC) for two decades until moving to London in 2011, the year Gaddafi was toppled and killed. During that time, ODAC spent an estimated £28bn of public money on building projects in the oil-rich state.

In his request for assistance from Scotland, the recently retired attorney general Abdulkader Radwan claimed “huge amounts of money” may have been “illegally transferred to the banks in Britain and Scotland”. His prosecutors were investigating whether Dabaiba was involved in embezzlement of public money, money laundering, “illicit gain” and abusing an official position.

The information originally came to light through the Panama Papers. A network of more than 100 companies in the British Virgin Islands (BVI), Malta, Liechtenstein and Britain connected to the Dabaibas and their suspected associates has been identified by asset trackers appointed by the Libyan government. More than 40 of them are in Scotland.

Dabaiba’s suspected assets include the 500-year-old Kenmore hotel on the banks of the river Tay, which claims to be Scotland’s oldest inn. The Kenmore is managed by the Aurora Hotel Collection, a small but growing portfolio of boutique Scottish hotels.

Coolbillboards, which places posters on trucks for Morrisons and Homebase, is among a number of businesses in Britain which Libyan prosecutors also suspect may ultimately belong to Dabaiba.

The request for assistance states Kenmore’s controlling companies, Coolbillboards and the Aurora group “may contain assets belonging to the State of Libya”.

Aurora and Coolbillboards did not respond to requests for comment.

On the British register of company directors, Dabaiba has given as his London address an opulent five-bedroom home at Lowndes Court, a short stroll from Harrods in Knightsbridge. It was advertised for sale in 2013 at £16.5m. The flat has been owned for at least five years a BVI company called Panthino Property SA.

An estate agent photograph of the Lowndes Court apartment.
An estate agent photograph of the Lowndes Court apartment. Photograph: Zoopla

BVI regulators forwarded information to Libyan prosecutors in November 2013 which showed an individual called Ali Dabaiba of Misrata, Libya, was the beneficial owner on Panthino. The company is also listed on the Land Registry as having paid £2.9m for a period detached house in Prince Arthur Road in Hampstead in 2006. The property has a market value of £7m today.

Libyan prosecutors claim a Liechtenstein entity called Cirrus Establishment is also ultimately controlled by the family. Cirrus is a former parent company of Coolbillboards. According to the Land Registry it previously owned a plush London apartment at Dorset House, Gloucester Place, in Marylebone, which Dabaiba’s son Al gave as his address in company filings. And in 2014 the Land Registry shows Cirrus bought two large homes in Surrey valued at £1m each.

Dabaiba was also found by Libyan prosecutors to have purchased a property in an imposing terrace on the upmarket Heriot Row in Edinburgh in 1998, paying £475,000, before selling it in 2006 for more than £1m.

Radwan’s letter cited a number of suspected frauds, including alleged overpayments for building housing units.

Later in 2014 his department sent a longer 76-page dossier, compiled by a team of asset trackers including New York-based investigator Ann Marlowe on behalf of the Libyan litigation department.

The dossier also calls for help in investigating taxpayer-funded deals worth more than 437m Libyan dinars (now £225m) for consultancy work on hospital and archaeology projects in Libya, allegedly awarded in 2008 by Dabaiba to companies controlled by twin brothers Malcolm and Andrew Flinn and their associate Steven Turnbull, who operate from an office at Dunfermline.

The directors appear to have little or no experience in these sectors.

Filings show Marco Polo Storica, a Scottish company awarded two contracts for planning restoration work at ancient Greek and Roman sites along the Libyan coast, was originally wholly owned by the Flinns, whose background is in banking; Turnbull, who is a business graduate; and Walter Calesso, an Italian living in Scotland whose previous work was in interior design, according to a biography he posted on one company website. Calesso is named as the signatory for the ODAC contracts, as is Dabaiba.

The Libyan legal assistance request claims: “It is likely that Marco Polo Storica was set up … to misappropriate Libyan state funds in violation of both Libyan and Scots law” and requires investigation.

The same claim is made of Evergreen Consulting Ltd, based in Malta. Part owned by Calesso, the Flinns and Turnbull, according to the Libyan litigation department, from 2008 until 2010, Evergreen signed six contracts with ODAC for supervising construction work on a series of hospitals.

In UK company filings, Turnbull and the Flinns appear as directors and shareholders in dozens of concerns. Of these companies, 35 shared the same address: 16 Comely Park in Dunfermline.

The Libyan prosecutors claim: “In many, if not all, of these companies, they appear to be acting in some capacity on behalf of Ali Ibrahim Dabaiba.”

The Flinn brothers, Turnbull and Calesso did not respond to requests for comment.

The Ferguson Effect is Real

FBI Director James Comey described what is happening across the country to law enforcement and he called it the Ferguson Effect. Police have backed off due to threats, retribution by the left and organizations and to for sure save their own lives. The criminals have weapons and they have a deadly objective.

 

Washington, D.C. May 16, 2016
  • FBI National Press Office (202) 324-3691

Preliminary statistics released today by the FBI show that 41 law enforcement officers were feloniously killed in the line of duty in 2015. This is a decrease of almost 20 percent when compared with the 51 officers killed in 2014. By region, 19 officers died as a result of criminal acts that occurred in the South, nine officers in the West, five officers in the Midwest, four in the Northeast, and four in Puerto Rico.

By circumstance, eight officers were investigating suspicious persons/circumstances; seven were engaged in tactical situations; six officers were conducting traffic pursuits/stops; four were killed as a result of ambushes (entrapment/premeditation); three officers were killed as a result of unprovoked attacks; three died from injuries inflicted while answering disturbance calls (all three being domestic disturbance calls); three officers were killed while answering robbery in progress calls or pursuing robbery suspects; two were handling, transporting, or maintaining custody of prisoners; two officers were handling persons with mental illness; one sustained fatal injuries while performing an investigative activity; one was answering a burglary in progress call or pursuing a burglary suspect; and one officer was killed while attempting other arrest.

Offenders used firearms in 38 of the 41 felonious deaths. These included 29 incidents with handguns, seven incidents with rifles, one incident with a shotgun, and one incident in which the firearm type was not reported. Three victim officers were killed with vehicles used as weapons.

Thirty of the 41 killed officers were confirmed to be wearing body armor at the times of the incidents. Six of the 41 slain officers fired their own weapons, and six officers attempted to fire their service weapons. Three victim officers had their weapons stolen; three officers were killed with their own weapons.

Forty-one victim officers died from injuries sustained in 38 separate incidents. Thirty-six of those incidents have been cleared by arrest or exceptional means.

An additional 45 officers were killed in 2015 in line-of-duty accidents, which include officer deaths that are found not to be willful and intentional. This total is the same number of officers who were accidentally killed in 2014. By region, 29 officers died due to accidents in the South, six in the Midwest, five in the Northeast, and five in the West.

Twenty-nine of the officers died as a result of automobile accidents, seven were struck by vehicles, and four were fatally injured due to motorcycle accidents. Two of the 45 officers were killed from accidental shootings, one from an aircraft accident, one due to a fall, and one from an all-terrain vehicle accident.

Of the 29 officers who died due to automobile accidents, 18 officers were wearing seatbelts. Eight officers were not wearing seatbelts (four of whom were ejected from the vehicles), and seatbelt use was not reported for three of the officers who were killed due to automobile accidents.

Final statistics and complete details will be available in the Uniform Crime Reporting Program’s publication, Law Enforcement Officers Killed and Assaulted, 2015, which will be published on the FBI’s Internet site in the fall.