Skip Navigation

Critical Infrastructure News

In an effort to mitigate vulnerabilities within the commerce stream that threaten the nation’s consumers and to protect national security, Homeland Security officials recently launched its Global Trade Task Force (GTTF), a U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations (HSI)-led multi-agency effort that leverages robust import and export controls and investigative authorities to combat illicit commercial activities. Authorities announced results from a recent task force effort Monday at Detroit’s Fort Street Cargo Facility.

The new task force combines the investigative, interdiction, regulatory, and licensing capabilities from a variety of agencies, including HSI, U.S. Customs and Border Protection, the Drug Enforcement Administration, the Commerce Department's Bureau of Industry and Security, and the FDA’s Office of Criminal Investigations.

The GTTF's primary mission is to counter the following types of illicit commercial activities:

Health & Safety: Trafficking of counterfeit, substandard, or tainted merchandise, with an emphasis on goods that pose a threat to public health or safety including pharmaceuticals and cosmeceuticals, automotive, aerospace, rail, and heavy industry products; and environmental crimes.

Trade Crime: Financially-motivated fraud schemes that deprive revenue from the United States government or which harm businesses, rights holders, or undermine financial institutions.

Counter-Proliferation: Illegal export of United States military products, sensitive dual-use technology, weapons of mass destruction, or chemical, biological, radiological, and nuclear materials.

Read more: ICE Newsroom

Security talk a wake-up call for members of synagogues, churches, mosques

Members of synagogues, churches and mosques listened to law enforcement officials and security professionals, watched video footage of crimes and emergencies Jan. 29 at the Mandel Jewish Community Center in Beachwood.

The presentation, called “Safe and Secure: Protecting Your House of Worship,” drew about 250 people for the two-hour presentation on a night when temperatures outside dipped into single digits.

Topics covered included preventing and responding to active shooting incidents, security best practices and identifying and reporting hate crimes.

The presentation was jointly sponsored by the Jewish Federation of Cleveland, the U.S. Department of Justice, the FBI and the Anti-Defamation League Cleveland.

The presentation happened to take place the same date as Damon Joseph, 21, of Holland, Ohio, was indicted following a plot to shoot two synagogues in the Toledo area. His arrest on Dec. 7, in part, prompted this event.

His three-count indictment included attempting to provide material support to ISIS, attempting to commit a hate crime, and possessing firearms in furtherance of a crime of violence, according to the U.S. Department of Justice.

Bridget Brennan, first assistant U.S. attorney in the Northern District of Ohio, told the Cleveland Jewish News Joseph’s indictment represents a first.

“They’ve never been charged in the same indictment,” she said. “It’s unique that way.”

During the presentations, Joseph’s case was related to the audience, along with the case of the burning of a prayer rug inside a mosque in Toledo.

U.S. Attorney Justin Herdman told of the founding of the U.S. Department of Justice, which was formed to combat the Ku Klux Klan in the South.

FBI Special Agent John Breen spoke about the immediate reaction to trauma: “denial, deliberation and a decisive moment.”

He said that instantaneous moments of denial can result in loss of life, and showed footage from the Bataclan Theatre shooting in Paris, where a guitarist on stage momentarily froze and was subsequently shot.

“The problem is with this denial,” he said. “Denial is going to cause delay, and delay costs lives.

“You can’t have a cookie cutter response.”

He spoke of the “run, hide, fight” response, and said hiding means taking shelter in a secure room, pulling shades and, if possible, having covert communication with police.

Fighting, he said, is “a last resort but is sometimes necessary.”

A panel on security best practices stressed using every tool available. They also spoke of the importance of developing relationships – and sharing information – with local police so that police are familiar with their buildings prior to an emergency.

Relying too heavily on any one tool can lead to disappointments, the panelists said, and they suggested taking advantage of training offered by local police.

William Werner, FBI supervisory special agent, said it is important to report suspicious activity.

“You don’t want the first time you interact with an officer to be in an emergency,” he said.

Beachwood Police Chief Gary Haba talked about the importance of sharing floor plans of houses of worship with police.

“In case of a major incident, that’s helpful,” he said.

“There’s probably ways you can interact with your law enforcers that you haven’t thought of,” said panelist Leroy Morrow, a certified protection professional at LMJ Services LLC, adding that police may have information they can share with congregations about “pre-information.”

Morrow suggested sharing keys to buildings with local police.

“You have to start with organization,” said Jim Hartnett, director of community wide security at the Federation. “It has to start with understanding the threats out there.”

Hartnett suggested starting with the most likely scenarios, rather than the most challenging ones, such as medical emergencies, fire or flood.

“I would suggest starting with a basic plan,” he said. “There’s no 100 percent fail-safe solution.”

“The first thing that’s going to fail is your communications,” Hartnett said, adding, “Don’t solely rely on technology.”

Monitoring security cameras to make sure they’re recording properly is also important, the panelists said, so is making sure that more than one person has access to the film.

“The one man or woman who has access is always in Texas or Hawaii,” Haba said.

While Ohio does not have specific hate crimes laws, Russell W. Tye, co-criminal chief at the Cuyahoga County Prosecutor’s Office, spoke of the state statutes that can be used in such incidents.

Anita Gray, ADL director of development, spoke of the importance of civil rights groups in helping victims of hate crimes, and encouraged people to call them for help if they are victims.

She encouraged victims to remember the words of perpetrators, particularly slurs.

“Words, as you’ve heard, are very important,” she said.

She explained that while some statements of hate and bigotry are counted as free speech, “All acts of hatred and bigotry are unacceptable.”

Walled Hezam, who goes to the Islamic Center of Akron, said he was grateful to the organizers for the informative presentation that will help protect houses of worship.

“Our group has a lot of work to do,” said Bob Horan of South Euclid, who belongs to First Unitarian Church of Cleveland in Shaker Heights. “The alarm went off for us, so this was great. This was a great kind of overview of what our task is.”

“Working together allows us exponentially greater amounts of information than we would all have siloed to ourselves,” said Wayne Elliott of Kent, who belongs to Temple Israel in Bath Township and came with two other members of that congregation.

Saying he was “thrilled to be invited,” Dr. Larry Kaye of Bath Township, who also belongs to Temple Israel, said he would like to see more communication among the Jewish federations of northeast Ohio and that “this is a step toward it.”

Mary Pat Frey, a parishioner of St. Albert the Great in North Royalton, said her church recently started an emergency plan and needs to finalize it.

“We have a security team,” said Juley Sirianni of South Euclid, who belongs to New Song Church in Cleveland Heights. “But we have a lot more to do.”

DHS’ CISA on Deck for Voice in Counterterrorism Prevention

The House on Tuesday passed H.R. 769, the Counterterrorism Advisory Board Act of 2019, which would establish a board at the Department of Homeland Security (DHS) to coordinate and integrate departmental intelligence, activities, and policy related to counterterrorism.

The Counterterrorism Advisory Board (CTAB) would include senior leaders from a variety of DHS component organizations including the Cybersecurity and Infrastructure Security Agency, Transportation Security Administration, Science and Technology Directorate, Immigration and Customs Enforcement, and the Office of Intelligence and Analysis.

The bill, according to its sponsor Rep. John Katko, R-N.Y., is intended to ensure that DHS “coordinates all of its counterterrorism efforts to limit duplication, inefficiency, and waste.” The bill, which passed on a vote of 414-12, was co-sponsored by Reps. Kathleen Rice, D-N.Y., Brian Higgins, D-N.Y., Max Rose, D-N.Y., Will Hurd, R-Texas, and Van Taylor, R-Texas.

“As the United States continues to face threats from terrorist organizations and extremists, it is imperative our country is well-prepared to respond. This legislation will establish a coordinated strategy in order to stop attacks before they occur,” said Katko. “Americans deserve to feel secure at home and abroad. It is essential that government agencies are all on the same page when it comes to protecting Americans from terror threats.”

Aside from establishing a board at DHS, the legislation also:

  • “Updates the CTAB Charter to better enable it to confront tomorrow’s challenges and requires the Secretary [of Homeland Security] to appoint a Coordinator for Counterterrorism to oversee the board’s activities.
  • Requires the CTAB to advise the Secretary on the issuance of terrorism alerts, ensuring that top counterterrorism and intelligence officials play a key role in delivering these critical notices to the public.
  • Ensures continued Congressional oversight by requiring DHS to report on the status and activities of the CTAB so that we can be certain it is meeting its mandate.”

Katko noted that the bill cleared the House in two previous tries. However, the legislation doesn’t appear to have a companion bill in the Senate yet, so its fate remains to be seen.

Researchers said Chinese intelligence officers are behind almost a decade's worth of network intrusions that use advanced malware to penetrate software and gaming companies in the US, Europe, Russia, and elsewhere. The hackers have struck as recently as March in a campaign that used phishing emails in an attempt to access corporate-sensitive Office 365 and Gmail accounts. In the process, they made serious operational security errors that revealed key information about their targets and possible location.

Researchers from various security organizations have used a variety of names to assign responsibility for the hacks, including LEAD, BARIUM, Wicked Panda, GREF, PassCV, Axiom, and Winnti. In many cases, the researchers assumed the groups were distinct and unaffiliated. According to a 49-page report published Thursday, all of the attacks are the work of Chinese government's intelligence apparatus, which the report's authors dub the Winnti Umbrella. Researchers from 401TRG, the threat research and analysis team at security company ProtectWise, based the attribution on common network infrastructure, tactics, techniques, and procedures used in the attacks as well as operational security mistakes that revealed the possible location of individual members.

Attacks associated with Winnti Umbrella have been active since at least 2009 and possibly date back to 2007. In 2013, antivirus company Kaspersky Lab reported that hackers using computers with Chinese and Korean language configurations used a backdoor dubbed Winnti to infect more than 30 online video game companies over the previous four years. The attackers used their unauthorized access to obtain digital certificates that were later exploited to sign malware used in campaigns targeting other industries and political activists.

Read more: Ars Technica 

Department store chains Saks Fifth Avenue, Saks Off Fifth and Lord & Taylor have suffered a data breach that apparently exposed details on 5 million payment cards for customers in North America, Toronto-based parent organization Hudson's Bay Company said on Sunday.

Stolen card data first appeared for sale last Wednesday. "On March 28, 2018, a notorious hacking JokerStash syndicate, also known as Fin7, announced the latest breach of yet another major corporation, with more than five million stolen payment cards offered for sale on the dark web," Gemini Advisory says. "Several large financial institutions have confirmed that all tested records had been used before at Saks Fifth Avenue, Saks Fifth Avenue Off 5th - a discounted offset brand of luxury Saks Fifth Avenue stores - as well as Lord & Taylor stores."

The JokerStash syndicate has been tied to previous sales of payment card data stolen in previous breaches, including a breach at Dallas-based luxury hotel chain Omni Hotels & Resorts that began in late 2015 and was discovered in May 2016 (see Omni Hotels & Resorts Hit by Hacker).

At the time, cybercrime intelligence firm Flashpoint told Information Security Media Group that the breach came to light after JokerStash began selling more than 50,000 payment cards stolen from Omni Hotels. At the time, Flashpoint said JokerStash was selling the stolen Omni Resorts cards data via its own website, but advertising them for sale on two Russian-language communities called Verified and Omerta.

Read more: Bank Info Security