Tag: FBI

  • BULLETIN: Prosecutors, FBI Say Man Engineered $28 Million Securities Fraud By Manipulating Court With Aid Of ‘Sham Lawsuits’ Brought By ‘Florida-Based Lawyers’ Who Obtained ‘Pleadings From A Single Manhattan-Based Law Firm’

    breakingnews72BULLETIN: The former president and chief executive officer of Unico Inc. in San Diego has been indicted on federal charges of conspiracy to commit securities fraud and obstruction of justice, amid spectacular allegations of legal chicanery.

    Mark Anthony Lopez was accused of conspiring with New Jersey-based stock trader Mark Allen Lefkowitz to manipulate the share price and volume of Unico’s stock to benefit corporate insiders at the expense of shareholders. Lefkowitz already has pleaded guilty.

    Among the stunning allegations is that Lopez and Lefkowitz manipulated a court in Florida into approving litigation settlements while not revealing they effectively were staging lawsuits as part of a conspiracy to exploit an SEC loophole.

    From a statement by U.S. Attorney Laura E. Duffy of the Southern District of California (italics added):

    To carry out the fraud, Lopez and Lefkowitz exploited Section 3(a)(10) of the Securities Act of 1933 C a little-known provision that allows companies to issue unregistered shares of stock to settle “bona fide” debts. Lopez, on behalf of Unico, would enter into purported loan agreements with various shell corporations owned by Lefkowitz, most of which were based in the Turks and Caicos Islands. It was understood by the conspirators that Unico would purposefully default on the loan agreements so that Lefkowitz’s companies could initiate sham lawsuits against Unico.

    Each and every one of these sham lawsuits would be brought by Florida-based lawyers in a Sarasota, Florida court. The Florida attorneys, even though they represented opposite sides in the lawsuits, would obtain their pleadings from a single Manhattan-based law firm that oversaw the sham lawsuits. Very soon after each lawsuit was filed — and typically within the very same week — Lopez and Lefkowitz would draft a written settlement agreement. The terms of the written settlement agreement would be extremely favorable to Lefkowitz. In short, Lopez would agree to settle Unico’s debt by issuing unregistered shares of stock worth on average seven times the debt that Unico actually owed. According to a secret side-agreement with Lopez, Lefkowitz would sell the shares on the open market to unsuspecting buyers and kick back a portion of the proceeds to Unico. This kickback would take the form of a new loan — which would have the added benefit of continuing the fraud scheme.”

    Lopez, prosecutors said, also sought to obstruct an SEC probe by “refusing to turn over emails, which he printed and concealed in two manila folders marked ‘Files Deleted’ and another marked ‘Not Released to SEC Subpoena (Delete).’”

    More obstruction occurred when Lopez “redacted portions of an email and tried to delete it from his computer, and later lied to the SEC under oath during deposition testimony,” prosecutors said.

    He potentially faces up to 65 years in federal prison, if convicted on all counts, prosecutors said.

    Duffy’s office said that the alleged misdeeds of Lopez attacked “the very heart” of the U.S. financial system.

    “When these corporate leaders ignore that duty and use their positions to enrich insiders, it not only harms shareholders, but also threatens to undermine confidence in our financial markets and slows our country’s ongoing economic recovery,” Duffy said.

     

  • UPDATE: Leaming — Again: After Earlier Claiming He’d Been Targeted For ‘DEATH,’ AdSurfDaily Figure And Purported ‘Sovereign Citizen’ Now Claims’ He’s Been Subjected To ‘POISON’ And ‘TORTURE’

    AdSurfDaily figure Kenneth Wayne Leaming now claims he's been subjected to "POISON" and "TORTURE."
    AdSurfDaily figure Kenneth Wayne Leaming now claims he’s been subjected to “POISON” and “TORTURE.”

    In 2009, AdSurfDaily figure and purported “sovereign citizen” Kenneth Wayne Leaming claimed a city in Washington state targeted him for “DEATH” and threatened to kill him by “HUNTING” him down “in screaming packs and mobs” and using “several armed street gangs” that served as police, according to records.

    Leaming, now 57, further claimed the Pierce County city of Puyallup engaged in terrorism by controlling “multiple electronic broadcast media” and employing police who used “chemical and biological weapons,” “machine guns” and “explosives.”

    In November 2011, prosecutors said Leaming was found in Spanaway, Wash., with two federal fugitives from Arkansas. Those fugitives now have been convicted of mail fraud for a multimillion-dollar, home-based business caper. Court filings by Timothy Shawn Donavan, 64, and Sharon Jeannette Henningsen, 68, suggest they also were sovereign citizens.

    After Leaming’s arrest with Donavan and Henningsen, federal prosecutors in the Western District of Washington said an FBI terrorism Task Force found evidence that Leaming had filed false liens against at least five public officials involved in the AdSurfDaily Ponzi case filed by the U.S. Secret Service in 2008.

    Leaming allegedly also filed bogus liens or assisted in filing liens against a former cabinet official in the administration of President George W. Bush, the head of a credit union and at least two U.S. prison officials. In 2012, while detained, Leaming sued President Obama and Attorney General Eric Holder, advancing a Birther conspiracy theory.

    A federal judge tossed that lawsuit. Court filings by Leaming now suggest he intends to sue Holder anew, this time in the District of Columbia as opposed to the Western District of Washington.

    But Leaming also has another active lawsuit against Holder and others in the Western District of Washington. A complaint by Leaming dated yesterday asserts he has been subjected to “POISON” and “TORTURE” during his ongoing detention at the SeaTac federal detention center near Seattle.

    In October 2012, federal prosecutors alleged that Leaming “was instrumental in founding the ‘County Rangers,’ the sovereign group’s armed enforcement wing. Members of the County Rangers were issued realistic-looking badges and credentials were required to possess firearms as part of their duties, and held themselves out as law enforcement agents.”

    Leaming already is a convicted felon from a case that alleged he had no license and yet piloted an aircraft. When he was arrested in November 2011 in the company of Donavan and Henningsen, several firearms were found in Leaming’s residence, including an “AK-47 style assault rifle with a bayonet,” prosecutors said.

    He later was charged with unlawful possession of firearms as a convicted felon.

    When agents executed a search warrant, they found “numerous boxes of correspondence and legal paperwork documenting other apparent fraud schemes,” prosecutors said.

  • BULLETIN: AdSurfDaily Figure And Purported ‘Sovereign Citizen’ Kenneth Wayne Leaming Now Seeks To File Another Lawsuit

    Kenneth Wayne Leaming
    Kenneth Wayne Leaming

    BULLETIN: (UPDATED 12:35 P.M. ET U.S.A.) AdSurfDaily figure and purported “sovereign citizen” Kenneth Wayne Leaming has reached out from jail again in a bid to sue the government and officeholders.

    Leaming, 57, is detained in the SeaTac federal-detention facility near Seattle on charges of filing false liens against at least five public officials involved in the ASD Ponzi case and other crimes. He was arrested by an FBI terrorism Task Force in November 2011. Since his arrest, Leaming has filed lawsuits against President Obama, Attorney General Eric Holder, the U.S. Attorney for the Western District of Washington and a county sheriff in Arkansas.

    Filings in U.S. District Court for the District of Columbia — the venue from which the ASD Ponzi prosecution was brought — now show that Leaming is seeking to sue Holder anew, along with a federal prison official in Washington state. Leaming originally sued Holder and Obama in a different venue.

    His new claims make Holder a prospective defendant in the D.C. District Court and make new claims against the Attorney General.

    The case is docketed as “unassigned” to a specific judge, but U.S. District Judge Rosemary Collyer — an alleged target of one of Leaming’s false liens and the presiding judge in the ASD case — has issued an order that requires Leaming to submit certain paperwork to the court before the case can proceed. The January docket for the D.C. district suggests that Collyer’s duties this month have included the initial responses to complaints brought by individuals desiring to sue members of government.

    Leaming does not appear to be making an ASD-related claim in his most recent case. Even so, it is possible that Collyer would remove herself from any Leaming-related process moving forward because of the FBI allegations he filed a false lien against her in Washington state.

    In the new filing in the D.C. District, Leaming appears to be trying to make a damages claim against a SeaTac prison official while simultaneously making a claim against Holder. The earlier case against Holder and Obama was tossed in the Western District of Washington months ago. Following a Birther conspiracy theory, it alleged that Obama was not born in the United States and thus was inelegible to be President — and that Holder was a bogus Attorney General because he’d been appointed by a bogus President.

    Leaming now is demanding damages paid in “United States Silver Eagle Dollars,” amid allegations he was denied access to a law library. In his earlier case against Holder and Obama, he demanded payment in gold in silver.

  • Man From Colorado Town Of Fairplay Ran ‘Gold Coin’ Fraud Scheme, Prosecutors Say

    ponziblotterJames P. Burg, formerly of Fairplay, Colo., ripped off his customers for gold coins and, in at least one instance, “used one customer’s payment for coins to refund funds to another customer,” federal prosecutors said.

    The scam fetched more than $2.4 million and operated through three websites, prosecutors said.

    Burg, 61, became the subject of an investigation carried out by the FBI, the IRS and the U.S. Postal Inspection Service, the office of U.S. Attorney John Walsh of the District of Colorado said.

    He has been charged with six counts of wire fraud, four counts of money laundering, four counts of willful failure to file tax returns and nine counts of mail fraud.

    “The U.S. Postal Inspection Service has no shortage of investment investigations and this is another example of greed overcoming honest business practices,” said Adam Behnen, inspector in charge of the U.S. Postal Inspection Service.

    From a statement by prosecutors (italics added):

    As part of the scheme, Burg represented that he was the chief executive officer of a company known as Superior Discount Coins (SDC) and that SDC was in the business of selling coins. Burg also conducted business using a company known as Gold Run Investments (GRI) and represented that GRI was in the business of selling coins. At times, Burg operated GRI using the alias “Tim Burke.” Burg advertised and solicited customers through radio advertisements and over the Internet using websites he controlled, including; www.superiordiscountcoins.com, www.yourcoinbroker.com, and www.goldruninvestments.net.

    Burg misrepresented and promised customers that if they ordered coins from SDC or GRI and paid him for those coins, he would deliver the coins to them or to accounts designated by them. He sent and caused to be sent to customers that ordered coins from SDC or GRI invoices stating amounts of money owed for the coins and, in some cases, providing information about a bank account to which the customers should transfer their money to purchase the coins.

    The money Burg received from customers was not used to purchase coins for such customers, but instead he converted the money to his own use and benefit. Burg refused to refund money to customers in several instances where the customers requested a return of their money after he failed to deliver coins as originally promised. To prevent the scheme’s detection, Burg sometimes filled customers’ orders for coins only after such customers threatened to take legal action or report him to law enforcement authorities. Burg used one customer’s payment for coins to refund funds to another customer.

    “Fraud schemes are often described as a house of cards and will eventually fall apart exposing the individuals responsible,” said Stephen Boyd, special agent in charge, IRS-Criminal Investigation, Denver Field Office

    See 9News.com report from 2011:

  • FBI Offers Up To $10,000 Reward For Info Leading To Capture Of Accused Ponzi Schemer And International Fugitive Peter Heckman

    These photos of Petyer Heckman were taken in 2009, the FBI says.
    These photos of Peter Heckman were taken in 2009, the FBI says.

    A German national who allegedly conducted a Ponzi scheme in Hawaii and then fled to Indonesia is the subject of an FBI manhunt.

    Peter Heckman, 63, ran a Ponzi scheme in which he promised investors “guaranteed returns of 10 to 15 percent for terms as short as two weeks,” the FBI said. The scam allegedly fetched at least $1.2 million, and Heckman was indicted on seven counts of wire fraud in 2007.

    But Heckman knew that he was under investigation and “fled Hawaii immediately prior to his indictment,” the FBI said, noting it now was offering a “reward of up to $10,000 for information leading to Heckman’s capture.”

    In 2010, the agency tracked him to Indonesia, where “he was operating a recording studio and had launched a record label producing albums for musical artists in the Philippines and Indonesia.”

    Heckman once operated a “failing recording studio” on the Hawaii island Kauai, the FBI said.

    From the FBI (italics added):

    Peter Heckman is 63 years old, 5’7” tall, 200 pounds, with gray hair and blue eyes. He is a German national who often uses the first name “Hans” and sometimes spells his last name “Heckmann” to mask his true identity while marketing his recording production services.

    Heckman’s Wanted poster notes he uses these aliases: Peter Hans Heckman, Peter Hans Heckmann, Peter Heckmann, Peter Heck, Hans Heckman, Hans Heckmann, Hans Peter Heckman, H.P. Heckman, H.P. Heckmann.

    “Anyone recognizing Heckman or having information as to his current location is asked to call the Honolulu FBI at 808-566-4300,” the agency said.

  • Jose Banks, Purported ‘Sovereign’ Who Escaped From Chicago Jail After Bank-Robbery Conviction, Captured; Manhunt Still Under Way For Second Escapee

    josebankscaptured

    EDITOR’S NOTE: Thanks to PP Blog reader “Tony” for a heads-up on this:

    Joseph “Jose” Banks, a purported “sovereign citizen” convicted of bank robbery earlier this month, has been captured after his escape from a federal jail in Chicago on Tuesday, the FBI told the Associated Press.

    A manhunt for alleged fellow escapee Kenneth Conley continues.

    Also see: Chicago Tribune story on capture of Banks.

    ABC 7 video report:

  • BULLETIN: 2 Inmates, Including Purported ‘Sovereign,’ Escape From Chicago Jail; 1 Of The Escapees Got Mention On PP Blog Just Days Ago

    Jose Banks: source FBI.
    Jose Banks: source FBI.

    BULLETIN: Two inmates escaped from the Metropolitan Correctional Center in downtown Chicago earlier today, the FBI said.

    One of the escapees — Jose Banks — is a purported “sovereign citizen” who got a mention on the PP Blog Dec. 15.

    Banks, a convicted bank robber,  is considered “armed and dangerous,” the FBI said.

    Also considered armed and dangerous is Kenneth Conley, who apparently escaped with Banks this morning. Conley, too, is a bank robber, the FBI said. He is described as “male/white, age 38, 6’0” tall, 185 pounds.”

    Banks is described as “male/black, age 37, 5’8” tall, 160 pounds,” the FBI said.

    The Chicago Tribune is reporting that Banks was convicted just last week and told a federal judge, “I’ll be seeking retribution as well as damages.”

    From a Tribune Breaking News report (italics added):

    Two convicted bank robbers escaped from the federal Metropolitan Correctional Center in the Loop this morning by tying bedsheets together and shimmying down at least 15 stories to the ground below, officials say.

    Kenneth Conley: source: FBI.
    Kenneth Conley: source: FBI.

    A “widespread manhunt” is under way, the FBI said.

    Banks and Conley are “believed to be traveling together” and “were reportedly last seen earlier this morning in the Tinley Park area, the FBI said.

    They are “both convicted bank robbers” and “should be considered armed and dangerous,” the FBI said.

    “If you see them, contact local law enforcement or the Chicago Field Office of the FBI at 312-421-6700,” the FBI said.

    Link to FBI statement.

  • Payment Processor For Cybercrime Ring Sentenced To 48 Months In Federal Prison; ‘Operation Trident Tribunal’ Is Ongoing

    recommendedreading1Mikael Patrick Sallnert has been sentenced to 48 months in federal prison for his role in processing payments for a cybercrime ring, the U.S. Justice Department announced.

    Sallnert, 37, is a citizen of Sweden. As part of “Operation Trident Tribunal,” Sallnert was arrested in Denmark on Jan. 19, 2012, and extradited to the United States in March 2012. He pleaded guilty on Aug. 17, 2012, to one count of conspiracy to commit wire fraud and one count of accessing a protected computer in furtherance of fraud, the Justice Department said.

    “Payment processors like this defendant are the backbone of the cybercrime underworld,” said U.S. Attorney Jenny A. Durkan of the Western District of Washington.  “As an established businessman, this defendant put a stamp of legitimacy on cyber criminals.  He was involved in defrauding thousands of victims, and his actions contributed to insecurities in e-commerce that stifle the development of legitimate enterprises and increase the costs of e-commerce for everyone.”

    If Durkan’s name rings familiar to PP Blog readers, it’s because her office is involved in an investigation into the activities of a group of “sovereign citizens” operating in the Pacific Northwest. Kenneth Wayne Leaming, a figure in the AdSurfDaily Ponzi scheme story, is being prosecuted by Durkan’s office amid allegations he filed false liens against at least five public officials in the ASD Ponzi scheme case.

    Sallnert, prosecutors said, provided payment-processing services for “scareware” vendors.

    “Mikael Patrick Sallnert played an instrumental role in carrying out a massive cybercrime ring that victimized approximately 960,000 innocent victims,” said Assistant Attorney General Lanny A. Breuer. “By facilitating payment processing, Sallnert allowed the cybercrime ring to collect millions of dollars from victims who were duped into believing their computers were compromised and could be fixed by the bogus software created by Sallnert’s co-conspirators.  Cybercrime poses a real threat to American consumers and businesses, and the Justice Department is committed to pursuing cybercriminals across the globe.”

    Operation Trident Tribunal is an “ongoing, coordinated enforcement action targeting international cybercrime,” prosecutors said.

    “This cyber crime ring spanned multiple countries—increasing the threat it posed and complicating the necessary law enforcement response,” said Laura M. Laughlin, special agent in charge of the FBI’s Seattle Division.  “Thanks to the commitment of many foreign partners and FBI entities across the nation, we were able to dismantle that threat and ensure Mr. Sallnert faced justice.”

    Scams often rely on international payments processors to fleece their victims.

     

  • SOBERING: Cyber Criminals May Be Responsible For ‘The Greatest Transfer Of Wealth In History,’ Top Justice Department Official Says At Seattle Conference

    “The Intelligence Community’s most recent Worldwide Threat Assessment confirms that U.S. networks have already been subject to ‘extensive illicit intrusions.’ The head of the National Security Agency and the Pentagon’s Cyber Command, for one, believes such intrusions may have resulted in ‘the greatest transfer of wealth in history.’”Lisa Monaco, Assistant Attorney General for National Security, Oct. 25, 2012

    EDITOR’S NOTE: These are remarks prepared for delivery by Lisa Monaco, Assistant Attorney General for National Security, at the “2012 Cybercrime Conference” today in Seattle. Monaco presides over the Justice Department’s National Security Division.

    The conference was hosted by U.S. Attorney Jenny A. Durkan of the Western District of Washington. Durkan’s name may be familiar to longtime PP Blog readers because her office is involved in the prosecution of AdSurfDaily story figure Kenneth Wayne Leaming, a purported “sovereign citizen” charged with filing false liens against five public officials who had roles in the ASD Ponzi prosecution. ASD was a Florida-based online scam that created thousands of victims. Leaming also is accused of uttering a bogus “bonded promissory note” for $1 million and passing it at U.S. Bank, harboring fugitives implicated in a separate fraud scheme and being a felon in possession of firearms.

    ** ______________________________________________ **

    Good afternoon.   Thank you for having me here today.   I am grateful to the U.S. Attorney’s Office for the Western District of Washington and to U.S. Attorney Jenny A. Durkan, for organizing a conference on this important topic.   Thank you all for taking the time out of your schedules to discuss these issues.   Events like these are critical to helping us succeed in combating cyber threats.

    The Threat

    If there is one thing we all know from the presentations today and our work in the field, it is the seriousness of the cyber threat.   The President has called it “one of the most serious economic and national security challenges we face as a nation.”   It’s hard to quibble with that.   Hardly a day goes by when cyber events don’t show up in the news.   As many of you know, over the last several weeks, financial institutions in the United States have been hit by a series of Distributed Denial of Service (or DDOS) attacks.   Such attacks are relatively easy to carry out, but they can cause serious harm by disrupting companies’ website services and preventing customer access.   Although these disruptions have been temporary, their frequency and persistence underscores recent Intelligence Community warnings about the “breadth and sophistication of computer network operations . . . by both state and nonstate actors.”   The cyber alarm bell has been rung.   The Intelligence Community’s most recent Worldwide Threat Assessment confirms that U.S. networks have already been subject to “extensive illicit intrusions.”   The head of the National Security Agency and the Pentagon’s Cyber Command, for one, believes such intrusions may have resulted in “the greatest transfer of wealth in history.”

    We often think of national security threats, like that of a catastrophic terrorist attack, as questions about prevention.   But the cyber threat is not simply looming – it is here.   It is present and growing.   Although we have not yet experienced a devastating cyber attack along the lines of the “cyber Pearl Harbor” that Defense Secretary Panetta recently mentioned – we are already facing the threat of a death by a thousand cuts.   Outside the public eye, a slow hemorrhaging is occurring; a range of cyber activities is incrementally diminishing our security and siphoning off valuable economic assets.   This present-day reality makes the threat of cyber-generated physical attacks, like those that might disrupt the power grid, appear no longer to be the stuff of science fiction.   And all of this comes against the backdrop of sobering forecasts from the highest ranks of our national security community.   FBI Director Mueller – a man not prone to overstatement – predicts that “the cyber threat will pose the number one threat to our country” in “the not too distant future.”

    Despite all we know about intrusions against U.S. businesses and government agencies, what is more sobering still is the Intelligence Community’s assessment that “many intrusions . . . are not being detected.”   Even with respect to those that are detected, identifying who is behind cyber activity can be uniquely challenging.   Technologies can obscure perpetrators’ identities, wiping away digital footprints or leaving investigative trails that are as long as the web is wide.   Cyber intrusions don’t announce themselves or their purpose at the threshold.   Depending on the circumstances, the purpose or endgame of a particular intrusion may be anyone’s guess – is it espionage?   Mere mischief?   Theft?   An act of war?

    The threats are as varied as the actors who carry them out.   A growing number of sophisticated state actors have both the desire and the capability to steal sensitive data, trade secrets, and intellectual property for military and competitive advantage.   While most of the state-sponsored intrusions we are aware of remain classified, the onslaught of network intrusions believed to be state-sponsored is widely reported in the media.   We know the Intelligence Community has noted that China and Russia are state actors of “particular concern,” and that “entities within these countries are responsible for extensive illicit intrusions into US computer networks and theft of US intellectual property.”   Indeed, “Chinese actors are,” according to a public report of our top counterintelligence officials, “the world’s most active and persistent perpetrators of economic espionage.”   And we know that Secretary of Defense Panetta has stated that “Iran has also undertaken a concerted effort to use cyberspace to its advantage.”

    In cases involving state actors and others, trusted insiders pose particular risks.   Those inside U.S. corporations and agencies may exploit their access to funnel information to foreign nation states.   In these cases, perimeter defense isn’t worth much; the enemy is already inside the gates.   The Justice Department has prosecuted a number of corporate insiders and others who obtained trade secrets or technical data from major U.S. companies and routed them to other nations via cyberspace.

    Earlier this year, in the first indictment of foreign state-owned entities for economic espionage, several companies controlled by the government of China were charged in San Francisco for their alleged roles in stealing a proprietary chemical compound developed by a U.S. company for China’s benefit.   While this particular theft was not cyber-enabled, cyberspace makes economic espionage that much easier.   In an Internet age, it is no longer necessary to sneak goods out of the country in a suitcase; a single click of a mouse can transmit volumes of data overseas.   Indeed, the Department has secured convictions of individuals who stole corporate trade secrets by simply e-mailing them overseas.   In one recent case, a chemist downloaded a breakthrough chemical process just developed by his company in the United States and e-mailed it to a university in China where he had secretly accepted a new job.

    The other major national security threat in cyberspace is cyber-enabled terrorism.   Although we have not yet encountered terrorist organizations using the Internet to launch a full-scale cyber attack against the United States, we believe it is a question of when, not if, they will attempt to do so.   Individuals affiliated with or sympathetic to terrorist organizations are seeking such capabilities. We have already seen terrorists exhorting their followers to engage in cyber attacks on America.   Just this year, an al-Qaeda video released publicly by the Senate Homeland Security Committee encouraged al-Qaeda followers to engage in “electronic jihad” by carrying out cyber attacks against the West.

    Terrorists have already begun using cyberspace to facilitate bomb plots and other operations.   These activities go beyond the use of cyberspace to spread propaganda and recruit followers.   For example, the individuals who planned the attempted Times Square bombing in May 2010 used public web cameras for reconnaissance, file sharing sites to share operational details, and remote conferencing software to communicate.   Najibullah Zazi attempted to carry out suicide bomb attacks against the New York subways around the anniversary of 9/11 three years ago.   After returning to the United States from terrorist travel, he used the Internet to access the bomb-making instructions he had received in Pakistan and tried to communicate via the Internet in code with his al-Qaeda handlers in Pakistan just prior to the planned attack.   Khalid Aldawsari, who was convicted in June of this year in the Northern District of Texas, used the Internet extensively to research U.S. targets and to purchase chemicals and other bomb-making materials.

    Evolving To Meet the Threat — Learning from the Counterterrorism Model

    The threats we face in cyberspace are changing, and we must change with them.   Of course, we have faced similar challenges before.   After the devastating attacks eleven years ago, we learned some hard lessons.   We have since put those lessons into practice:   working across agencies to share information, and bringing down legal, structural, and cultural barriers.   Law enforcement’s approach to terrorism has become intelligence-led and threat-driven.   We have erected new structures, including the National Security Division, which I am privileged to lead.   As the first new litigating division at the Justice Department in nearly fifty years, the National Security Division was created to bring together intelligence lawyers and operators on the one hand, and prosecutors and law enforcement agents on the other, to focus all talent on the threats before us.

    Since September 11, we have made great progress against terrorism by developing effective partnerships that help us identify threats and choose the best tools available to disrupt them.   Much of our success is attributable to the all-hands-on-deck approach we have adopted for countering terrorism.   From where I sit, I can see this change reflected in our day-to-day operations.   In our investigations, for instance, we actively seek to preserve the ability to prosecute even while using intelligence tools and vice versa.   We must bring the same approach, a whole-of-government approach, an all-tools approach, to combat cyber threats to our national security.   Investigations and prosecutions will be critical tools for deterrence and disruption, ones that we have a responsibility to use.   But they are not the only options available.   The diversity of cyber threats and cyber threat actors demands a diverse response.   This nation has many tools – intelligence, law enforcement, military, diplomatic, and economic – at its collective disposal as well as deep, and diverse, expertise.   The trick is in harnessing our collective resources to work effectively together.

    Those of us charged with investigating and disrupting cyber threats to national security and advising operators and agents must be creative and forward-looking in our approach.   First, we must consider – in conjunction with our partners – what cyber threats will look like in the coming years.   Only by knowing what is on the horizon can we ensure that the right tools exist to address cyber threats before they materialize.   Second, we must be vigilant to prevent the formation of what the WMD Commission after 9/11 called “legal myths” that have led to “uncertainty” in the past “about real legal prohibitions” among operators.   And, together with operators, we must consider what kinds of tools, investigations, and outreach we can launch now to lay the groundwork for future cyber efforts.   These may be relatively simple things, like standardized protocols and established points of contact to make reporting intrusions easier. Or they may take the form of institutional relationships between the government and the private sector for sharing information.

    On an operational level, both public and private sector attorneys need to be able to tell clients what options they have available to deal with cyber threats.   If cyberspace is an “information super-highway,” then lawyers are the GPS system in a client’s car:   It is our job to tell the client how to get there.   When obstacles get in the way, we should tell the client how to avoid them.   We must look ahead, anticipate jams, and route clients around them.

    This metaphor is particularly applicable in the cyber realm.   As cyber events unfold in real time, we learn more about our adversary, the means available to him or her, and the vulnerabilities in our own systems.   Our advice must adapt accordingly.   For those of us in government who act as operational lawyers, it is important in this environment to be clear about where the legal debate stops and the policy debate begins.   For those of you in the private sector, I imagine one concern is that your clients not be left vulnerable in a shifting legal landscape.   And for those of you in academia, we need your help testing boundaries and pushing forward with questions that need to be asked and answered by all of us as we navigate this legal space together.

    One of the significant operational challenges we face is the same one the Intelligence Community confronted in reorganizing itself after the attacks of September 11.   The cyber threat demands ready and fluid means of sharing information and coordinating our actions.   At the National Security Division, we have made this evolution, and combating this threat, a top priority.   Working with our partners – including the FBI, the U.S. Attorney community, and the Computer Crime and Intellectual Property Section (one of their leaders, Richard Downing is here today) – we are ensuring that all resources are brought to bear against national security cyber threats.

    To help accomplish these goals, the National Security Division established earlier this year a National Security Cyber Specialists’ Network to serve as a one-stop shop in the Justice Department for national security-related cyber matters.   The network brings together experts from across the National Security Division and the Criminal Division and serves as a centralized resource for the private sector, prosecutors, and agents around the country when they learn of national security-related computer intrusions.   Each U.S. Attorney’s office around the country has designated a point of contact for the network.   These skilled Assistant U.S. Attorneys will act as force multipliers, broadening the network’s reach and ensuring a link back to their counterparts at headquarters.   Drawing upon the Joint Terrorism Task Force model, which has been successful in the terrorism realm, the network seeks to improve the flow of national security cyber information to offices throughout the country.   This means more information, earlier on, in national security cyber incidents.   Thanks to the contribution of other parts of the Department, especially CCIPS, the FBI, and the U.S. Attorney’s offices, the network has helped us to focus nationwide on bringing more national security cyber investigations.   Through this nationwide network, we are consolidating and deepening the Department’s expertise, institutionalizing information sharing, ensuring coordination, and pursuing investigations.

    We have also trained our attention on the diverse cyber capabilities that reside throughout the government.   The U.S. Secret Service, the Department of Commerce, and the Department of Defense, not to mention the FBI, are all common partners in this fight, each using their distinct tools to achieve a common goal.   We have enhanced our joint work with the FBI’s National Cyber Investigative Joint Task Force, where we now have a dedicated National Security Division liaison.

    Within DOJ, we are putting more prosecutors against the threat and focusing on how to best equip and educate our cyber cadre.   Through the National Security Cyber Specialists’ Network, we are training prosecutors around the country.   Next month, more than 100 prosecutors will gather in Washington, D.C. to share expertise on everything from digital evidence to the Foreign Intelligence Surveillance Act.   No matter who the perpetrator is, being an effective adviser today requires an understanding of the technologies at hand.   Perhaps we should all take a page from Estonia—where I understand they’re beginning a system of teaching first graders how to program!   As courts confront these technologies, we also have a role in helping them grapple with what these changes mean for the development of the law and interpretations of existing legal authorities.

    Partnership with the Private Sector

    Of course, the need for collaboration does not end there.   While interaction with the private sector is something that does not always come easily to the national security community, which is accustomed to operating in secrecy, it is absolutely necessary here.   The Intelligence Community has noted the considerable portion of U.S. companies that report they have been the victims of cybersecurity breaches as well as the increased volume of malware on U.S. networks.   Private companies are on the front lines.   Individual defenses, as well as broader efforts to reform – like the legislation proposed by the Administration last year – will require our joint efforts.

    To succeed in these efforts, we must develop a greater understanding of the concerns and pressures under which our private sector partners operate.   A home computer user, whose machine is used in a botnet attack might not have much incentive to remove or check for malware.   But a company targeted by such an attack has considerable incentive to do so.   When dealing with corporate victims, the government must understand the competing interests at play.   Companies may have shareholders, reputational concerns, and sometimes legal limitations.   Yet we cannot fight the current or the future threat with old mindsets on either side.   My colleague, the U.S. Attorney for the Southern District of New York, has spoken compellingly about the need for a “culture of security” and a “culture of disclosure” in industry.   For our part, we need to understand the private sector’s concerns; we need to understand that it is not just the red tape of government that industry fears.   They also fear that the disclosure of computer intrusions will bring yellow tape as well – that it will disrupt business by converting the corporate suite into a crime scene.   Reporting breaches and thefts of information is the first step toward preventing future harm.   For our part, we will work with industry.   We will share information where we can and use protective orders and other tools to protect confidential and proprietary information.

    Conclusion

    How we respond to cyber intrusions and attacks, and how we organize and equip ourselves going forward, will have lasting effects on our government and its relationship with the private sector.   Particularly in these early moments, in what will no doubt be a sustained endeavor, it is incumbent upon us to take notes – to identify impediments, legal questions, technical challenges, and address them together.   All the while we must bear in mind the great potential of these technologies and the importance of not stifling them as we find better ways to make them secure.

    We have heard the warnings about the potential for a cyber 9/11, but we are, for the moment, in a position to do something to prevent it.   The cyber threat poses the next test of the imperative that we see law enforcement and national security as joint endeavors.   Our work offers an opportunity to demonstrate the strength and adaptability of the lessons we have learned over the last eleven years in the fight against terrorism.   U.S. Attorney’s Offices – and all of you sitting in this room – are at the forefront of these issues.   I look forward to pursuing the threats we face in partnership.   Thank you for being with us today.

  • URGENT >> BULLETIN >> MOVING: Would-Be Bomber With Claimed al Qaeda Ties Arrested In Plot To Blow Up New York Federal Reserve Bank, FBI Says

    “As alleged in the complaint, the defendant came to this country intent on conducting a terrorist attack on U.S. soil and worked with single-minded determination to carry out his plan. The defendant thought he was striking a blow to the American economy. He thought he was directing confederates and fellow believers.”U.S. Attorney Loretta E. Lynch, Eastern District of New York, Oct. 17, 2012

    URGENT >> BULLETIN >> MOVING: A Bangladeshi national who claimed al Qaeda ties has been arrested on charges he intended to blow up the New York Federal Reserve Bank to “destroy America,” the FBI said.

    Quazi Mohammad Rezwanul Ahsan Nafis, 21, was arrested near the bank this morning after an FBI sting, the agency said.

    The public was not in danger because the “explosives that he allegedly sought and attempted to use had been rendered inoperable by law enforcement,” the FBI said.

    CBS News is reporting that Nafis was arrested “with his finger on the fake detonator.”

    “Attempting to destroy a landmark building and kill or maim untold numbers of innocent bystanders is about as serious as the imagination can conjure,” said Mary E. Galligan, acting assistant director in charge of the FBI’s New York Field Office.

    Before settling on the bank as a target, Nafis contemplated attacks on “a high-ranking U.S. official and the New York Stock Exchange,” the FBI said. The agency did not name the official.

    Nafis had been in the United States since January, the FBI said.

    While in the United States, Nafis “attempted to recruit individuals to form a terrorist cell,” the FBI said.

    And Nafis spoke about “our beloved Sheikh Osama bin Laden” to “justify the fact that Nafis expected that the [Federal Reserve Bank] attack would involve the killing of women and children,” the FBI said.

    New York was the site of one phase of the 9/11 terrorist attacks, which killed nearly 3,000 people.

    One of the people Nafis sought to recruit “was actually a source for the FBI,” the agency said. “Through the investigation, FBI agents and NYPD detectives working with the [New York Joint Terrorism Task Force] were able to closely monitor Nafis as he attempted to implement his plan.”

    From an FBI statement (italics added):

    During the investigation, Nafis came into contact with an FBI undercover agent who posed as an al Qaeda facilitator. At Nafis’ request, the undercover agent supplied Nafis with 20 50-pound bags of purported explosives. Nafis then allegedly worked to store the material and assemble the explosive device for his attack. Nafis purchased components for the bomb’s detonator and conducted surveillance for his attack on multiple occasions in New York City’s financial district in lower Manhattan. Throughout his interactions with the undercover agent, Nafis repeatedly asserted that the plan was his own and was the reason he had come to the United States.

    Earlier this morning, Nafis met the undercover agent and traveled in a van to a warehouse located in the Eastern District of New York. While en route, Nafis explained to the undercover agent that he had a “Plan B” that involved conducting a suicide bombing operation in the event that the attack was about to be thwarted by the police.

    Upon arriving at the warehouse, Nafis assembled what he believed to be a 1,000-pound bomb inside the van. Nafis and the undercover agent then drove to the New York Federal Reserve Bank. During this drive, Nafis armed the purported bomb by assembling the detonator and attaching it to the explosives.

    Nafis and the undercover agent parked the van next to the New York Federal Reserve Bank, exited the van, and walked to a nearby hotel. There, Nafis recorded a video statement to the American public that he intended to release in connection with the attack. During this video statement, Nafis stated, “We will not stop until we attain victory or martyrdom.” Nafis then repeatedly, but unsuccessfully, attempted to detonate the bomb . . .

  • American Accused In Alleged California Ponzi Scheme And Wanted By INTERPOL Convicted In Drug Case In Ireland

    Scott Edward Cavell. Source: INTERPOL.

    A California man wanted by U.S. prosecutors in a Ponzi-scheme case was living in a rented house in Ireland and has been convicted in an Irish drug case, the Independent reported.

    Scott Edward Cavell, now 29, was described on the FBI website in 2009 as “still a fugitive, believed to be outside the United States.”

    At the time of this post, INTERPOL has a listing for Cavell on a warrant from the Eastern District of California.

    But that may change, according to details published by the Independent about comments made by an Irish judge (italics added):

    Judge Nolan said he was satisfied that Cavell had profited from the drugs operation but accepted that it is “highly likely” that he will face a lengthy prison term in America when the “federal authorities there have their say with him”.