Wednesday, December 7, 2016
The Imperial Japanese attacked Pearl Harbor on this day in 1941.
You can read about the attack via the below link:
Back in 1970 I was a teenage seaman stationed aboard the USS Kitty Hawk as the aircraft carrier headed towards "Yankee Station," off the coast of Vietnam. On the way, we made a port-of-call to Pearl Harbor in Hawaii and sailed by the USS Arizona Memorial.
As you can see from the above U.S. Navy photo, all hands "manned the rails," an honor tradition that had us on deck in our dress white uniforms as we passed the memorial, which floats above the sunken battleship that went down during the Japanese sneak attack.
I have a enlarged framed copy of this photo hanging in my basement office and library.
You can also read a detailed account of the Japanese attack on Pearl Harbor via the below link:
Note: In the above U.S. Navy photo, the aircraft carrier USS Abraham Lincoln, manning the rails, is shown entering Pearl Harbor for a visit in 2011.
Tuesday, December 6, 2016
Retired FBI Agent Solves Arts Crimes Including A Missing Nazi Diary, Confederate Relics And Even Batmobiles
Erin Arvedlund at the Philadelphia Inquirer offers a piece on art crime investigator and retired FBI special agent Robert K. Wittman, author of The Devil's Diary: Alfred Rosenberg and the Stolen Secrets of the Third Reich.
You can read the rest of the piece via the below link:
The FBI released the below report:
It was a highly secure infrastructure of servers that allegedly offered cyber criminals an unfettered platform from which to conduct malware campaigns and “money mule” money laundering schemes, targeting victims in the U.S. and around the world.
But the Avalanche network, which was specifically designed to thwart detection by law enforcement, turned out to be not so impenetrable after all. And late last week, the FBI took part in a successful multi-national operation to dismantle Avalanche, alongside our law enforcement partners representing 40 countries and with the cooperation of private sector partners. The investigation involved arrests and searches in four countries, the seizing of servers, and the unprecedented effort to sinkhole more than 800,000 malicious domains associated with the network.
It’s estimated that Avalanche was responsible for as many as 500,000 malware-infected computers worldwide on a daily basis and dollar losses at least in the hundreds of millions as a result of that malware.
“Cyber criminals can victimize millions of users in a moment from anywhere in the world,” according to Scott Smith, assistant director of the FBI’s Cyber Division. “This takedown highlights the importance of collaborating with our international law enforcement partners against this evolution of organized crime in the virtual.”
The investigation into the highly sophisticated Avalanche network, initiated four years ago by German law enforcement authorities and prosecutors, uncovered numerous phishing and spam campaigns that resulted in malware being unwittingly downloaded onto thousands of computers internationally after their users opened bad links in e-mails or downloaded malicious attachments. Once the malware was installed, online banking passwords and other sensitive information were stolen from victims’ computers and redirected through the intricate network of Avalanche servers to back-end servers controlled by the cyber criminals, who wasted no time in using this information to help themselves to other people’s money.
One type of malware distributed by Avalanche was ransomware, which encrypted victims’ computer files until the victim paid a ransom to the criminal perpetrator. Other types of malware stole victims' sensitive banking credentials, which were used to initiate fraudulent wire transfers. And in terms of the money laundering schemes, highly organized networks of money mules purchased goods with the stolen funds, enabling the cyber criminals to launder the illicit proceeds of their malware attacks.
How did these cyber criminals hear about the Avalanche network in the first place? Access to the network was advertised through postings—similar to advertisements—on exclusive underground online criminal forums.
“Cyber criminals can victimize millions of users in a moment from anywhere in the world.”
Scott Smith, assistant director, FBI Cyber Division
Because most cyber schemes cross national borders, an international law enforcement response is absolutely critical to identifying not just the technical infrastructure that facilitate these crimes, but also the administrators who run the networks and the cyber criminals who use these networks to carry out their crimes.
The FBI—with its domestic and international partners—will continue to target the most egregious cyber criminals and syndicates. But U.S. businesses, other organizations, and the general public need to do their part by protecting their computers and networks from malware and other insidious cyber threats. Don’t click on links embedded inside e-mails. Don’t open e-mail attachments without verifying who they’re from. Use strong passwords. Enable your pop-up blocker. Only download software from sites you trust. And make sure your anti-virus software is up to date.
Each of us securing our own devices—coupled with a coordinated law enforcement effort to combat ongoing cyber threats—will go a long way toward protecting all of us in cyberspace.
Posted by Paul Davis at 3:30 PM
Labels: criminal network of worldwide computer servers known as Avalanche, cyber crime, FBI, FBI takedown
Monday, December 5, 2016
Saturday, December 3, 2016
Sarah Pruitt at History.com offers a piece on the birth of SEAL Team Six.
IF much of the history and operations of the U.S. Navy’s special operations forces, or Navy SEALs, remain shrouded in secrecy, that’s especially true for Team Six, the highly classified group that carries out some of the world’s most dangerous and difficult military missions. The Pentagon barely acknowledges the group’s existence, and doesn’t call it by the name Team Six; it’s officially known as the Naval Special Warfare Development Group, or DevGru for short. From World War II to today, we trace the history behind one of the nation’s most elite and most secretive military organizations.
You can read the rest of the piece and watch a video clip via the below link:
You can also read my Counterterrorism magazine piece on the history of the Navy SEALs via the below link:
And you can read my Counterterrorism magazine piece on the WWII UDT frogmen who influenced the modern Navy SEALs via the below link:
As History.com note, on this day in 1857 Joseph Conrad, the author of Heart of Darkness, The Secret Agent and other classic novels, was born.
You can read about Joseph Conrad and his life and work via the below link: