Showing posts with label U.S. SENATE. Show all posts
Showing posts with label U.S. SENATE. Show all posts

Sunday, May 31, 2015

FORMER U.S. SENATE COMMITTEE STAFFER CHARGED WITH WIRE FRAUD

FROM:  U.S. JUSTICE DEPARTMENT
Thursday, May 28, 2015
Former Senate Staffer Charged with Wire Fraud

A former staff member of the U.S. Senate Committee on Commerce, Science and Transportation was charged by indictment in the Eastern District of Virginia with defrauding at least three women of approximately $500,000, announced Assistant Attorney General Leslie Caldwell of the Justice Department’s Criminal Division and U.S. Attorney Dana J. Boente of the Eastern District of Virginia.

The indictment charges Robert Lee Foster, 65, of De Pere, Wisconsin, with nine counts of wire fraud.

According to the indictment, from 2008 through May 2015, Foster devised a scheme to fraudulently obtain money and property from at least three women, whom Foster targeted because of their age, health, marital or family status, or other personal circumstances.  The indictment alleges that Foster used his affiliation with the U.S. Senate to gain the victims’ trust and confidence, and that he made various false and fraudulent representations to the victims, which prompted them to send Foster money, which funds he then used for his own personal benefit.

An indictment is merely an accusation, and a defendant is presumed innocent unless proven guilty in a court of law.

This case was investigated by the FBI.  The case is being prosecuted by Trial Attorneys Kevin Driscoll and Peter Halpern of the Criminal Division’s Public Integrity Section and Assistant U.S. Attorney Jamar Walker of the Eastern District of Virginia.

Monday, April 13, 2015

PRESIDENT OBAMA ASKS SENATE TO CONSENT TO RATIFY PROTOCOL AMENDING CONVENTION BETWEEN U.S. AND JAPAN

FROM:  THE WHITE HOUSE
April 13, 2015
Message to Congress -- Protocol Amending the Convention between the Government of the United States of America and the Government of Japan

TO THE SENATE OF THE UNITED STATES:

I transmit herewith, for the advice and consent of the Senate to its ratification, the Protocol Amending the Convention between the Government of the United States of America and the Government of Japan for the Avoidance of Double Taxation and the Prevention of Fiscal Evasion with respect to Taxes on Income and a related agreement entered into by an exchange of notes (together the "proposed Protocol"), both signed on January 24, 2013, at Washington, together with correcting notes exchanged March 9 and March 29, 2013.  I also transmit for the information of the Senate the report of the Department of State, which includes an overview of the proposed Protocol.

The proposed Protocol was negotiated to bring U.S.-Japan tax treaty relations into closer conformity with current U.S. tax treaty policy.  For example, the proposed Protocol provides for an exemption from source-country withholding tax on all cross-border payments of interest, and updates the provisions of the existing Convention with respect to the mutual agreement procedure by incorporating mandatory arbitration of certain cases that the competent authorities of the United States and Japan have been unable to resolve after a reasonable period of time.

I recommend that the Senate give early and favorableconsideration to the proposed Protocol and give its advice and consent to its ratification.



BARACK OBAMA

Thursday, September 11, 2014

PRESIDENT OBAMA'S LETTER TO SENATE ON WAR POWERS RESOLUTION REGARDING CENTRAL AFRICAN REPUBLIC

FROM:   THE WHITE HOUSE 
September 11, 2014
Letter from the President -- War Powers Resolution Regarding the Central African Republic

Dear Mr. Speaker: (Dear Mr. President:)

On September 10, 2014, approximately 20 U.S. Armed Forces personnel deployed to the Central African Republic to support the resumption of the activities of the U.S. Embassy in Bangui.

This force was deployed along with U.S. Department of State Diplomatic Security personnel for the purpose of protecting U.S. Embassy personnel and property.  This force is expected to remain in the Central African Republic until it is replaced by an augmented U.S. Marine Security Guard Detachment and additional U.S. Department of State civilian security personnel as the security situation allows.

This action has been directed consistent with my responsibility to protect U.S. citizens both at home and abroad, and in furtherance of U.S. national security and foreign policy interests, pursuant to my constitutional authority to conduct U.S. foreign relations and as Commander in Chief and Chief Executive.

I am providing this report as part of my efforts to keep the Congress fully informed, consistent with the War Powers Resolution (Public Law 93-148).  I appreciate the support of the Congress in these actions.

Wednesday, July 16, 2014

ASSISTANT AG CALDWELL TESTIFIES BEFORE SENATE COMMITTEE ON "BOTNET" THREAT

FROM:  U.S. JUSTICE DEPARTMENT 
Assistant Attorney General Leslie R. Caldwell Testifies Before the Senate Committee on the Judiciary Subcommittee on Crime and Terrorism
Washington, D.C. ~ Tuesday, July 15, 2014

Good afternoon, Chairman Whitehouse, Ranking Member Graham, and Members of the Subcommittee.  Thank you for the opportunity to appear before the Subcommittee today to discuss the Department of Justice’s fight against botnets.  I also particularly want to thank the Chair for holding this hearing and for his continued leadership on this important issue.

The threat from botnets—networks of victim computers surreptitiously infected with malicious software, or “malware,” that are controlled by an individual criminal or an organized criminal group—has increased dramatically over the past several years.  The computers of American citizens and businesses are, as we speak, under attack by individual hackers and organized criminal groups using state-of-the-art techniques seemingly drawn straight from a science fiction movie.  Unfortunately, this cybercrime wave is all too real.  Botnet attacks are intended to undermine Americans’ privacy and steal from unsuspecting victims.  If left unchecked, they will succeed.

The Department of Justice, working through highly trained prosecutors and Federal Bureau of Investigation (FBI) agents, recognizes this threat, and is working day and night to protect our citizens, our national security interests, and our businesses.  We responsibly employ the investigative and remedial tools Congress has given us, and we leverage our strengths by teaming up with partners across the federal government and, where appropriate, in the private sector and foreign law enforcement.  As in the recent disruption of the Gameover Zeus botnet, which I will discuss more later, we find ourselves matched against increasingly sophisticated cyber criminals, and must evolve our tools and tactics minute-by-minute to prevent further harm to innocent victims.

Our successful effort to suppress the Gameover Zeus botnet should remind us that those who use botnets to cause harm are increasing in number and sophistication, and we cannot expect continued success if we merely rest on our laurels.  The Department is armed with the laws and resources that we have been granted, but those tools must be updated and enhanced.  If we want to remain effective in protecting our citizens and businesses, our laws and our resources must keep pace with the tactics and numbers of our adversaries.  Our adversaries are always adapting.  So must we.  In my testimony, I will outline several legislative proposals that will assist the Department in its efforts to counter the threat posed by botnets.  Finally, I will outline our resource needs—in particular the need for additional specialized criminal prosecutors.

Current DOJ Anti-Botnet Activities

Cybercrime overall has increased dramatically over the last decade, and caused enormous financial damage and innumerable invasions of Americans’ privacy.  The advances in computing technology that have powered our economy have also empowered those who seek to do us harm.  Today, cyber criminals can steal personal and financial information from tens of millions of citizens in a single breach.  To be sure, thefts of such information were committed long before the digital revolution.  But stealing ten million credit card numbers previously would have required burglarizing thousands of stores, whereas now it can be done from a basement with a laptop.  And some crimes have been uniquely adapted in the digital age.  For example, in a new, disturbing twist on extortion, hackers have secretly activated the cameras on victims’ laptop computers, taken compromising pictures or videos, and demanded payments not to expose those pictures or videos to the public.  All the while, technological advances, including advances designed to protect privacy, such as anonymizing software and encryption, are being used to frustrate criminal or civil investigations and, perversely, protect the wrongdoers.  Our cyber crimefighters must be equipped with the tools and expertise to compete with and overcome our adversaries.

Over the same time period, botnets have emerged as a major threat.  Sometimes called “botmasters” or “botherders,” cyber criminals who control botnets can use advances in communications technology to take control of thousands, or even hundreds of thousands, of victim computers, or “bots.”  They can then command the computers they control to, for example, deluge an internet site with junk data, overwhelming it and knocking it offline.  They may conduct such distributed denial-of-service (DDOS) attacks out of malice, as ideological attacks on those with whom they disagree, or even as a paid service to other criminals.  They can also use the infected bots to steal banking credentials, credit card numbers, and other financial information.  They can use them to send spam—email messages that range from advertising for illegal and dangerous pharmaceutical products, to fraud schemes aimed at artificially inflating the price of stocks, to “phishing” messages that gather sensitive information.  Moreover, cybercriminals can use botnets to engage in other online crime by using their networks of infected computers as “proxies.”  This activity allows such criminals to conceal their identity and location while they commit crimes that range from fraud and theft of data to drug dealing and the sexual exploitation of children.

Botnets pose a threat to the United States, our citizens, and our businesses that must not be underestimated.  By hijacking numerous victims’ identities, credit cards, and bank accounts, criminal groups already have stolen hundreds of millions of dollars.  And every day cyber criminals violate the privacy of Americans on a staggering scale, by stealing financial information, personally identifiable information, login credentials, and other information from victims who often do not even realize their computers have been compromised.  Because botnets can be so lucrative, their designers use sophisticated code, locate their servers in countries around the world, and employ the latest in encryption methods—all designed to frustrate personal and corporate cybersecurity efforts, and to prevent law enforcement from responding effectively.  Indeed, recent cases and ongoing investigations reveal that botnets are used by criminals halfway around the world to commit crimes of a scope and sophistication that was difficult to imagine only a few years ago.

To counter this significant and complex threat, the Justice Department is vigorously responding to botnets and other cybercrimes through the tenacious work of the Criminal Division’s Computer Crime and Intellectual Property Section, also known as CCIPS, and the Computer Hacking and Intellectual Property Coordinators and National Security Cyber Specialists in U.S. Attorneys’ Offices across the country.  These prosecutors, along with colleagues in the National Security Division (NSD), form a network of almost 300 Justice Department cybercrime prosecutors.  In addition, the FBI has made combating cyber threats one of its top national priorities, working through Cyber Task Forces in each of its 56 field offices and continuing to strengthen the National Cyber Investigative Joint Task Force.  The FBI has also moved aggressively to counter the botnet threat through Operation Clean Slate, a major FBI initiative designed to identify and eliminate the most significant criminal botnets.  The United States Secret Service also focuses on cyber threats to financial networks and the personal financial information of Americans.  Through a network of 35 Electronic Crimes Task Forces across the country and in key foreign countries, Secret Service investigations have resulted in the arrest and successful prosecution of the criminals responsible for some of the largest data breaches.  U.S. Immigration and Customs Enforcement, Homeland Security Investigations (HSI), through the HSI Cyber Crimes Center (C3), has also dedicated significant resources to equip its Special Agents with the tools and knowledge necessary to combat transnational cybercrime.

The Department’s response to botnets takes two tracks, often at the same time.  First, whenever possible, we seek to arrest, prosecute, and incarcerate the criminals who use botnets to victimize Americans.  For example, in January 2014, Aleksandr Andreevich Panin, a Russian national, pled guilty in federal court in Atlanta, Georgia to conspiracy to commit wire and bank fraud for his role as the primary developer and distributor of the malicious software known as “SpyEye.”  According to industry estimates, SpyEye has infected over 1.4 million computers in the United States and abroad.  SpyEye secretly infected victims’ computers and enabled cyber criminals to remotely control them through command and control servers.  Designed to automate the theft of confidential personal and financial information, such as online banking credentials, credit card information, usernames, passwords, PINs, and other personally identifying information, SpyEye was the preeminent malware toolkit used from approximately 2009 to 2011.  Panin sold versions of the SpyEye virus to other criminals for prices ranging from $1,000 to $8,500.  Panin is believed to have sold the SpyEye virus to at least 150 “clients” who, in turn, used it to set up their own botnets.  One of Panin’s clients alone was reported to have stolen over $3.2 million in a six-month period using SpyEye.  Panin is awaiting sentencing, and four of his clients and associates were arrested by foreign law enforcement agencies.

Similarly, in federal court in New York in May 2014, Michael Hogue pled guilty, and an indictment was unsealed against Alex Yucel, in connection with their development of a particularly insidious piece of computer malware known as Blackshades.  This malware was sold and distributed to thousands of people in more than 100 countries and was used to infect more than half a million computers worldwide.  Once installed on a computer, the malware could collect the user’s financial information and even turn on the computer’s camera to spy on the unsuspecting user.  An individual who helped market and sell the malware and two Blackshades users who bought the malware and then unleashed it upon unsuspecting computer users were also charged and arrested in the U.S.  The charges and guilty plea were part of a law enforcement operation involving 18 other countries.  More than 90 arrests have been made so far, and more than 300 searches have been conducted worldwide.  

Arresting and convicting key players can disrupt criminal enterprises, but such actions are not always sufficient to counter the threat, particularly given the transnational nature of cybercrime.  They also will not always remedy the harm caused by a botnet.  Accordingly, the Department has pursued a second approach to botnets:  the use of seizures, forfeitures, restraining orders, and other civil and criminal legal process to dismantle criminal infrastructure.  In cases such as Gameover Zeus, Blackshades, and a 2011 case involving the Coreflood botnet, the Department used these legal authorities, with judicial authorization and oversight, to wrest domains and servers from cyber criminals’ control, prevent infected computers from communicating with the criminals’ command and control infrastructure, and liberate hundreds of thousands of computers.

In May of this year, CCIPS, the United States Attorney for the Western District of Pennsylvania, and the FBI, in partnership with other federal and private-sector organizations, disrupted a botnet that illustrates the magnitude of the threat.  Before it was disrupted, the Gameover Zeus botnet was widely regarded as the most sophisticated criminal botnet in existence.  One common and sinister method used by Gameover Zeus was a “man-in-the-middle” attack, in which victims trying to access websites for purposes such as online banking were tricked into entering login credentials, passwords, and other personal information that communicated that information to criminals at the same time they were passed onto their destination.  With the click of a mouse, the botmasters then used this stolen information to rob small businesses, hospitals, and other victims, transferring funds from victim accounts to their own accounts.  From September 2011 through May 2014, Gameover Zeus infected between 500,000 and 1 million computers and caused more than $100 million in financial losses.  In one case alone, nearly $7 million was fraudulently transferred from a regional bank.  Other victims included an Indian tribe, a corporation operating assisted living facilities, and a composite materials company.

Gameover Zeus was also used to install Cryptolocker—a type of malware known as “ransomware”—on infected computers.  Cryptolocker enabled cyber criminals to encrypt key files on the infected computers.  Victims then saw a splash screen on their computer monitors, telling them that their files were encrypted and that they had three days to pay a ransom, usually between about $300 and $750, if they wanted to receive the decryption key.  The victims found themselves confronted with the loss of critical data, such as family photographs or essential business records.  In the short period between its emergence in mid-to-late 2013 and the disruption action in May 2014, the Cryptolocker malware infected more than 260,000 computers worldwide.  Many victims simply paid the ransom that was demanded of them.  These victims included the police department of Swansea, Massachusetts, which paid approximately $750 to recover its investigative files and arrest photographs.  Others refused to pay the ransom and tried to defeat the malware.  A Pittsburgh insurance company was eventually able to restore data from a backup, but only after incurring an estimated $70,000 in losses and sending employees home during remediation.  A Florida company lost critical files, which resulted in an estimated $30,000 in loss.  And a North Carolina business, whose main files and backup were both encrypted, lost its critical files despite engaging a computer forensics firm to try to restore its access.  That company has lost about $80,000, and the owner told the FBI that he may have to lay off employees as a result.

Disrupting and mitigating these threats requires determination, technical skill, and creativity.  In response to previous efforts to disable botnets, the creators of the Gameover Zeus botnet designed a novel and resilient structure, including three distinct layers of command and control infrastructure that rendered the botnet particularly difficult to overcome.  The Department’s successful disruption began with a complex international investigation conducted in close partnership with the private sector.  It continued through the Department’s use of an inventive combination of criminal and civil legal process to obtain authorization to stop infected computers from communicating with each other and with other servers around the world.  The operation simultaneously targeted all three command and control layers of Gameover Zeus, and stopped Cryptolocker from encrypting additional computers.  The investigation and court-authorized operation ultimately permitted the team not only to identify and charge one of the leading perpetrators, but also to stop the botnet and ransomware from functioning.  Moreover, the FBI was able to identify victims and, working with the Department of Homeland Security, foreign governments, and private-sector partners, facilitate the removal of malware from many victim computers.  Disclosure to, and engagement with, the public was critical to this remediation effort.  DOJ and DHS released a technical alert to raise awareness of the botnet and lay out resources available to help affected entities minimize the damage.

I cannot emphasize enough the importance to our anti-botnet efforts of the cooperation of foreign governments and our U.S. government and private-sector partners.  In every case I have mentioned, foreign law enforcement services took carefully coordinated steps worldwide to disrupt the scheme and investigate the offenders, by seizing servers, interviewing subjects, making arrests, and providing evidence to U.S. investigators.  The Department has devoted substantial resources to building the relationships with foreign law enforcement partners that made these coordinated efforts possible.  The FBI, for example, maintains more than 60 legal attachés in embassies around the world.  The Criminal Division’s Office of International Affairs provides immeasurable legal support to evidence collection and extradition.  CCIPS conducts training programs to help our allies develop cyber laws, and our federal law enforcement partners work to improve investigative capacities.  Due in large part to our extensive engagement with, and training of, foreign criminal prosecutors and law enforcement officers, we have developed highly productive international relationships that are critical to the success of our investigations and prosecutions.

One factor has harmed our relationships with foreign law enforcement agencies, however:  our inability to rapidly respond to foreign requests for electronic evidence located in the United States.  Our capacity to do so simply has not kept up with the demand.  The President’s budget for fiscal year 2015 requests additional prosecutors, together with support personnel, to be assigned to the Criminal Division and to United States Attorneys’ Offices to streamline and facilitate the process of handling Mutual Legal Assistance Treaty (MLAT) requests between the United States and its law enforcement partners around the world.  The FY 2015 request, if granted, will enable the Department to meet the Administration’s commitment to cut MLAT response times in half by the end of 2015 and reduce the amount of time to comply with legally sufficient requests to a matter of weeks, as well as to strengthen the Department’s relationships with our foreign law enforcement partners, particularly in regard to cyber investigations.

Like the value of our relationships with foreign law enforcement, the expertise, dedication, and cooperation of private-sector entities have been crucial to our success.  For example, security researchers develop highly specialized expertise in particular botnets and help develop countermeasures that match the botnets in sophistication.  Their technical contributions are truly astounding.  Private-sector companies also serve a critical function when they notify victims that their computers have been compromised and supply the tools needed to clean up those computers.  Because the vast majority of the internet is owned and operated by the private sector, we simply could not conduct anti-botnet operations without the firm commitment of network service providers to protecting their customers.

Proposals to Enhance Anti-Botnet and other Cyber Capabilities

The Department is dedicated to using innovative means to target increasingly complex botnet threats as they emerge.  But there is a lot more work to be done, and we ask that Congress continue its support of these critical efforts.  I would like to highlight some of the Department’s legislative and budgetary proposals that would enhance our ability to identify botnet perpetrators, bring them to justice, disrupt their criminal enterprises, and protect the security, privacy, and property of Americans.

Department prosecutors rely on criminal statutes to bring cyber criminals to justice and to halt their criminal activity.  One of the most important of these laws is the Computer Fraud and Abuse Act, also called the “CFAA.”  The CFAA is the primary Federal law against hacking.  It protects the public against criminals who hack into computers to steal information, install malware, and delete files.  The CFAA, in short, reflects our shared baseline expectation that people are entitled to have control over their own computers and are entitled to trust that the information they store in their computers remains safe.

The CFAA was first enacted in 1986, at a time when the problem of cybercrime was still in its infancy.  Over the years, a series of measured, modest changes have been made to the CFAA to reflect new technologies and means of committing crimes and to equip law enforcement with tools to respond to changing threats.  But the CFAA has not been amended since 2008, and the intervening years have again created the need for the enactment of modest, incremental changes.  The Administration’s May 2011 legislative proposal proposed revisions to keep Federal criminal law up to date.  We continue to support changes like these that will keep up with rapidly evolving technologies and uses.

In addition, our investigations of those responsible for creating and using botnets and our efforts to disrupt botnets rely substantially on the availability of legal investigative process pursuant to the Electronic Communications Privacy Act (“ECPA”).  ECPA governs the Department’s access to much of the electronic evidence necessary to investigate botnets, hold perpetrators accountable, and develop methods to free unsuspecting victims.  It is essential to the success of our anti-botnet initiatives, and to our efforts against cybercrime as a whole, that the government maintain the ability to obtain relevant electronic evidence in a responsible, timely and effective manner.

Selling Access to Botnets

In the years since 2011, experience has revealed additional shortcomings in the criminal law.  For example, while botnets can be used for various nefarious purposes, including theft of personal or financial information, the dissemination of spam, and DDOS attacks, the creators and operators of botnets do not always commit those crimes themselves.  Frequently they sell, or even rent, access to the infected computers to others.  The CFAA does not clearly cover such trafficking in access to botnets, even though trafficking in infected computers is clearly illegitimate, and can be essential to furthering other criminal activity.  We thus propose that section 1030(a)(6) of the CFAA be amended to cover trafficking in access to botnets.

In addition, section 1030(a)(6) presently requires proof of an intent to commit a financial fraud.  Such intent is often difficult—if not impossible—to prove because the traffickers of unauthorized access to computers often have a wrongful purpose other than the commission of fraud.  Indeed, sometimes they may not know or care why their customers are seeking unauthorized access to other people’s computers.  This reality has made it more challenging in many cases for our prosecutors to identify a provable offense, even when we can establish beyond a reasonable doubt that individuals are selling access to thousands of infected computers.  We therefore recommend that Congress amend section 1030(a)(6) of the CFAA to address this shortcoming.

Enhancing Judicial Authority to Disrupt Botnets and other Malware

Under current law, two federal statutes, 18 U.S.C. §§ 1345 & 2521, give the Attorney General the authority to bring civil suits against defendants who are engaged in or “about to” engage in wiretapping or the violation of specified fraud crimes. [1]   See 18 U.S.C. §§ 1345(a), 2521.  The court is then empowered to enjoin the violation, “or take such other action, as is warranted to prevent a continuing and substantial injury to the United States or to any person or class of persons for whose protection the action is brought.”  18 U.S.C. § 1345(b); see also 18 U.S.C. § 2521.  Due process is ensured by the balancing test applied by the court to determine whether an injunction is appropriate and by the applicable Federal Rules of Civil Procedure.

These authorities played a prominent role in the Department’s successful disruptions of the Coreflood botnet in 2011 and the Gameover Zeus botnet in 2014.  These botnets collected online financial account information as it was transmitted from infected computers, thus violating the Wiretap Act, and the criminals used their access to steal from victims’ bank accounts, which constitutes wire and bank fraud.  Because these botnets violated statutes against fraud and wiretapping, courts were authorized to issue orders under sections 1345 and 2521 that permitted the United States to take corrective action necessary to disrupt them.

No analogous statutory authority exists, however, for violations of the CFAA that do not involve fraud or the interception of communications.  As a result, the law does not provide a clear statutory remedy for the government to use against botnets or other types of malware that criminals employ for other purposes, such as DDOS attacks.  Similar to frauds and illegal wiretaps, these types of computer hacking—which are prohibited under section 1030—present serious threats that can cause severe and continuing damage as long as they persist.  We would welcome the opportunity to work with the Committee to ensure that the law appropriately addresses this challenge.

Criminalizing the Overseas Sale of Stolen U.S. Financial Information

To ensure that we can take action when cyber criminals acting overseas steal data from U.S. financial institutions, we also recommend a modification to what is known as the access device fraud statute, 18 U.S.C. § 1029.  One of the most common motivations for criminal hacking is to obtain financial information.  The access device fraud statute proscribes the unlawful possession and use of “access devices,” such as credit card numbers and devices such as credit card embossing machines.  Not only do lone individuals commit this crime, but, more and more, organized criminal enterprises have formed to commit such intrusions and to exploit the stolen data through fraud.

The Department of Justice recommends that the statute be expanded to enable prosecution of offenders based in foreign countries who directly and significantly harm United States financial institutions and citizens.  Currently, a criminal who trades in credit card information issued by a U.S. financial institution, but who otherwise does not take one of certain enumerated actions within the jurisdiction of the United States, cannot be prosecuted under section 1029(a)(3).  Such scenarios are not merely hypothetical.  United States law enforcement agencies have identified foreign-based individuals selling vast quantities of credit card numbers issued by U.S. financial institutions where there is no evidence that those criminals took a specific step within the United States to traffic in the data.  The United States has a compelling interest in prosecuting such individuals given the harm to U.S. financial institutions and American citizens, and the statute should be revised to cover this sort of criminal conduct.

Enhancing Resources to Combat Botnets and other Cyber Threats

This last May, the Department submitted to Congress a multiyear cyber threat strategic plan.  The report identified six strategic initiatives:

Ensure that all of DOJ's investigators and attorneys receive training on cybercrime and digital evidence.
Increase the number of digital forensic experts and the capacity of available digital forensic hardware.
Enhance DOJ's expertise in addressing complex cyber threats.
Improve information sharing efforts with the private sector.
Expand and strengthen relationships with international law enforcement and criminal justice partners on cybercrime to enhance the sharing of electronic evidence.
Enhance capacity in the area of cyber policy development and associated legislative work.
The plan repeatedly highlighted the disruption of botnets as a key priority.  In order to properly address the threat of botnets and other cybercrimes, components across the Department, such as CCIPS, NSD, and the United States Attorneys’ Offices, need additional resources.

The Department confronts an increasing demand for its anti-cybercrime expertise.  CCIPS, for example, conducts its own prosecutions, receives requests for consultation of its attorneys or digital investigative analysts, provides advice to law enforcement agencies, engages with the private sector regarding the implementation of investigative authorities, and delivers domesic and international training.  This escalation in activity is due in part to the ever-expanding nature of the cyber threat.  Prosecutorial needs have also resulted from the expansion of investigative efforts, as the FBI has increased its resources in support of the Next Generation Cyber Initiative to enhance the technical capabilities of investigative personnel, increase cyber investigations, and improve cyber collection and analysis.

The Department would like to thank the Senate for its continued support of our national security-related cyber efforts, including fiscal year 2014 funding increases that are allowing the Department to hire more than a dozen additional national security cyber professionals, including attorneys, in furtherance of our efforts to combat cyber-based terrorism and nation state-sponsored cyber intrusions.  Just this summer, thanks in part to your support, those efforts yielded historic results, with the indictment of five members of the Chinese military on charges of cyber-based economic espionage.  Cyber threats to the national security continue to evolve, and to outpace our growth, but the Department is committed to following the facts and evidence where they lead to detect, deter, and disrupt them.  We look forward to continuing to work with you on this front.

Conclusion

I very much appreciate the opportunity to discuss with you the Department’s efforts to combat botnets.  We are committed to using all available tools to disrupt these networks and bring perpetrators to justice, as we seek to protect Americans’ security, privacy, and property.    
Thank you for the opportunity to discuss the Department’s work in this area, and I look forward to answering any questions you might have.

Wednesday, May 21, 2014

PRESIDENT OBAMA'S MESSAGE TO SENATE ON NEW TAX CONVENTION WITH POLAND

FROM:  THE WHITE HOUSE 
Message to the Senate -- Transmitting a Tax Convention with Poland
TO THE SENATE OF THE UNITED STATES:

I transmit herewith, for the advice and consent of the Senate to its ratification, the Convention between the United States of America and the Republic of Poland for the Avoidance of Double Taxation and the Prevention of Fiscal Evasion with Respect to Taxes on Income, signed on February 13, 2013, at Warsaw (the "proposed Convention"). I also transmit for the information of the Senate the report of the Department of State, which includes an overview of the proposed Convention.

The proposed Convention replaces the existing Convention, signed in 1974, and was negotiated to bring United States-Poland tax treaty relations into closer conformity with current U.S. tax treaty policies. For example, the proposed Convention contains provisions designed to address "treaty shopping," which is the inappropriate use of a tax treaty by residents of a third country, that the existing Convention does not. Concluding the proposed Convention with Poland has been a top priority for the tax treaty program at the Department of the Treasury.

I recommend that the Senate give early and favorable consideration to the proposed Convention and give its advice and consent to its ratification.

BARACK OBAMA

Saturday, May 3, 2014

LABOR SECRETARY PEREZ MAKES REMARKS ON APRIL EMPLOYMENT NUMBERS

FROM:  U.S. LABOR DEPARTMENT 
Statement of US Secretary of Labor Perez on April employment numbers

WASHINGTON — U.S. Secretary of Labor Thomas E. Perez issued the following statement about the April 2014 Employment Situation report released today:
"This morning's report demonstrates that the economy continues to rebound after a brutal recession that began in 2007. The economy generated 288,000 new jobs in April. The 273,000 created by private employers brings us to 9.2 million total new private-sector jobs over the last 50 months. Unemployment fell to 6.3 percent, the lowest since September 2008.

"I'm encouraged by this report, but we can't let one month of strong numbers diminish our sense of urgency or distract us from helping people who are still hurting. I meet too many working families who are barely getting by, let alone getting ahead. Their hard work and responsibility aren't being rewarded with the opportunity they deserve.

"To expand opportunity and ignite further economic growth, we need willing and engaged partners on Capitol Hill. But Congress continues to choose obstruction over action. While long-term unemployment remains near historic highs, it is now four months and counting since Congress took the unprecedented step of letting emergency unemployment benefits expire. Just two days ago, a minority of senators blocked a federal minimum wage increase embraced by a majority of Americans.

"President Obama is working every day to help more people climb ladders of success and punch their ticket to the middle class. He's fighting for infrastructure investment, immigration reform and other job-creating initiatives that enjoy broad public support. At the Labor Department this year, we will put on the street roughly $1 billion in new, targeted job-driven training funds that will help more people acquire the skills they need to succeed in the jobs of today and tomorrow.
"The president is committed to making this a year of action. He and I are eager to work with members of both parties to create more jobs, a stronger recovery and opportunity for all."

Friday, November 22, 2013

FTC TESTIFIES BEFORE U.S. SENATE COMMITTEE REGARDING FRAUD AFFECTING MILITARY COMMUNITY

FROM:  FEDERAL TRADE COMMISSION 

FTC Testifies Before Congress on Fraud Affecting Military Community
The Federal Trade Commission testified before a U.S. Senate Committee regarding the agency’s law enforcement and educational efforts to combat deceptive and unfair practices that impact servicemembers and their families.

Testifying before the Senate Committee on Commerce, Science, and Transportation, Charles Harwood, Deputy Director of the Bureau of Consumer Protection, said that although all consumers are potential targets for fraudsters, certain scams are more likely to affect the military community. The testimony describes the work the Commission has done to identify illegal conduct that impacts servicemembers and to stop it – including through a recent case against one of the nation’s largest refinancers of home loans for allegedly making misleading claims targeted at current and former servicemembers.

The testimony also highlights Military Sentinel, part of the FTC’s Consumer Sentinel Network that the Commission uses to collect complaints from consumers and other federal agencies and organizations. In 2012, the FTC received 42,200 fraud complaints from the military community. The top complaint categories were debt collection, imposter scams, fraud involving prize offers, sweepstakes or gifts, unlawful banking or lending practices, and scams that offer mortgage foreclosure relief or debt management services. Notably, these complaint categories overlap with some of the FTC’s highest consumer protection priorities – particularly its aggressive recent work to stop frauds related to consumer financial products and services.

The Commission is working with the DoD, VA, Departments of Education and Justice, and the Consumer Financial Protection Bureau to collect feedback from the military community regarding education institutions that may not have lived up to the promises they made to their students. The agency also is coordinating with the Defense Department on possible amendments to DoD’s military lending rule.

In addition to its law enforcement efforts and coordinating with its partners on policy initiatives, the FTC uses a variety of resources to educate military families about their rights when dealing with certain consumer protection issues. Some of the FTC’s military specific resources include information on limiting the harm from identity theft, placing an active duty alert on a credit report, and understanding military protections with respect to payday loans.

Most recently, the FTC published Eight Questions to Ask When Choosing a College After Military Service. Last year, the agency launched its first Military Consumer Protection Day, an annual partnership campaign and new website to inform the military community and veterans about a variety of consumer issues from dealing with debt to avoiding fraud.

The Commission vote approving the testimony was 4-0.

The Federal Trade Commission works for consumers to prevent fraudulent, deceptive, and unfair business practices and to provide information to help spot, stop, and avoid them.

Tuesday, February 26, 2013

SENATE CONFIRMS SEN. HAGEL AS DEFENSE SECRETARY

FROM: U.S. DEPARTMENT OF DEFENSE
Senate Confirms Hagel as Defense Secretary
By Jim Garamone
American Forces Press Service

WASHINGTON, Feb. 26, 2013 - The Senate today confirmed former Nebraska Sen. Chuck Hagel to serve as secretary of defense, ending a protracted confirmation process.

Hagel, a decorated Vietnam veteran, will be sworn in tomorrow, succeeding Leon E. Panetta who is retiring.

The vote in the Senate was 58-41.

In a farewell message to the department, Panetta said it has been "the privilege of a lifetime to lead the men and women of this Department, and I am grateful that President Obama selected such an outstanding leader to take my place."

Panetta thanked service members and civilians for working each day to keep America safe. "I also want to share with you my pride in what we've been able to accomplish together as one team and one family at the Department of Defense," he said.

President Barack Obama nominated Hagel on Jan. 7. He testified before the Senate Armed Services Committee on Jan. 30, and the committee recommended him for confirmation to the full Senate on Feb. 12.

Hagel earned two Purple Hearts during service as an Army sergeant, and served as senator from Nebraska from 1997 to 2009.

Hagel "has signaled his very strong commitment right away to get down to business, to get deeply invested in the work of the Pentagon and its military and civilian workers" if he were to be confirmed, Pentagon Press Secretary George Little said during a Pentagon news conference earlier today.

Saturday, April 28, 2012

MILITARY PERSONNEL LEADERS GIVE TESTIMONY ON BUDGET REQUEST BEFORE SENATE COMMITTEE


FROM:  AMERICAN FORCES PRESS SERVICE



Service Personnel Leaders Testify on Budget Request

By Army Sgt. 1st Class Tyrone C. Marshall Jr.
WASHINGTON, April 27, 2012 - Army, Navy and Air Force leaders detailed plans for force readiness and service member support when they briefed a Senate committee this week on budget requests for next year.
"Wartime experiences over the past decade have taught us that we must have a total Army," Thomas R. Lamont, assistant secretary of the Army for manpower and reserve affairs, told the Senate Armed Services Committee on military and civilian personnel programs April 25. The Army National Guard and Army Reserve provide 51 percent of the Army's military end strength for around 16 percent of the base budget, he said.

Lamont said he looks forward to working with Congress to ensure the Guard and Reserve maintain a readily trained force of one million soldiers. "We are increasingly aware of the physical and emotional toll a decade of war has taken on our force," Lamont said. "And we are committed to providing quality assistance" to soldiers and family members who are struggling with issues such as substance abuse, depression, post-traumatic stress."

All affect readiness and weaken the force, Lamont said. The Army continues to take aggressive action to promote health, identify and reduce risky behaviors and prevent suicides, he said. He also said the service is working hard to establish a climate where sexual harassment, sexual assault and hazing are not tolerated.
At the same hearing, Juan M. Garcia III, assistant secretary of the Navy for manpower and reserve affairs, highlighted new ROTC units and opportunities including those for women that have opened in the force.
"We have 23 female officers assigned to submarines, with more being assigned in the very near future," Garcia said. "Last year, I spoke of new Navy ROTC units at Arizona State University and Rutgers. This year, I'm pleased to report that we're expanding our ROTC presence at Harvard, Yale and Columbia as part of our goal to make Naval service a viable option for young men and women from all regions and all segments of society."
The Navy and Marine Corps will strive to meet operational requirements as efficiently as possible, Garcia added. "For the Navy, this means continuing to move sailors from shore-support functions to sea duty to enhance operational readiness," he explained. "For the Marines, the reduction of nearly 20,000 in end strength coincides with the planned withdrawal from Afghanistan."

Garcia said the Navy's highest priority remains the care and recovery of wounded, ill and injured service members, adding, "the Navy is leading the way in innovative, therapeutic treatments of our wounded warriors."
Daniel B. Ginsberg, assistant secretary of the Air Force for manpower and reserve affairs testified about "very hard choices" the Air Force made for this year's budget submission.

"We had to reconcile top-line reductions with our requirement to fulfill our global commitments, and maintain acceptable levels of readiness while still sustaining key quality-of-life and core services for our people," Ginsberg said.

"Despite a difficult budget situation, the Air Force is committed to providing cost-effective medical care, services and programs to maintain a healthy and resilient force," he said. "We must support our people to meet the demands of a high-operation tempo and persistent conflict."

Ginsberg also told the committee how the services worked together to form a cohesive budget plan through the Defense Management Action Group.

"There's lots of communications back and forth where we highlight some of the big issues that are going to be coming forward in the year ahead," he added.

Search This Blog

Translate

White House.gov Press Office Feed