Wednesday, June 15, 2011

Complete DHS Daily Report for June 15, 2011

Daily Report

Top Stories

• According to msnbc.com, federal and state agents searched a 30-square-mile swath of Montana forest June 13 for a former militia leader following a shootout with sheriff’s deputies. (See item 45)

45. June 14, msnbc.com, Reuters, Associated Press, and NBC – (Montana) ‘Armed and extremely dangerous’ ex-militia leader hunted after Mont. shootout. Federal and state agents searched a 30-square-mile swath of rugged Montana forest June 13 for a former militia leader following a shootout with sheriff’s deputies, authorities said. The 47-year-old exchanged gunfire with Missoula County sheriff’s deputies along a logging trail June 12 after a slow-speed chase near Lolo, officials said. No one was hurt. Known for his anti-government sentiments, the suspect previously told police “he wasn’t going to be taken down like last time,” the Missoula County undersheriff said. He told the Associated Press June 13 the former Marine may have planned the attack. Officials believe he may have placed caches of food and weapons along his planned escape route. Authorities seized two of three vehicles registered to him, including the Jeep Cherokee loaded with rifles that he abandoned June 12, but suspect he may have stashed another SUV in the Lolo National Forest, the Missoula County undersheriff said. Tactical agents from the FBI and agents from U.S. Marshals Service, Missoula police, Missoula County sheriff’s officers, as well as law officers from the U.S. Forest Service, Bureau of Land Management, and the Montana National Guard assisted in the search. The incident began when deputies responded to a report that the operator of a car registered to the suspect was driving erratically at a rest stop near Lolo. When patrol cars arrived, the driver allegedly ran a stop sign. Officers pursued the car for 30 miles before it spun onto a side road near a trailhead. The former militia leader allegedly responded to commands that he surrender by shooting at deputies before disappearing into the forest. The suspect is the former leader of a Flathead County militia group known as Project 7, named for the number “7” on Flathead County license plates in Montana. Project 7 allegedly plotted to assassinate local officials, go to war with the National Guard, and overthrow the federal government. The week of June 6, the suspect was stopped by the Montana Highway Patrol for a moving violation. He told patrolmen then that “it would take a SWAT team” to bring him in. “He’s a danger to anyone he meets,” the undersheriff said. Source: http://www.msnbc.msn.com/id/43389933/ns/us_news-crime_and_courts/

• The Associated Press reports the swollen Missouri River ruptured two levees in northwest Missouri June 13, sending floodwater over rural farmland toward a small town in Iowa and a resort community in Missouri. (See item 62)

62. June 13, Associated Press – (Iowa; Missouri) 2 Missouri River levees break near Iowa-Mo. border. The swollen Missouri River ruptured two levees in northwest Missouri June 13, sending floodwater over rural farmland toward a small town in Iowa and a resort community in Missouri. Water rushing from a nearly 300-foot-wide hole in a levee near Hamburg was expected to continue widening the breach and reach the top of a secondary levee protecting the southwest Iowa town by June 15, the U.S. Army Corps of Engineers said. If the secondary wall fails, parts of Hamburg could be under as much as 10 feet of standing water. Crews were working to add another 3 feet to the levee, said the Corps’ Omaha District commander. Officials originally estimated the levee had a 50-foot hole, but it had grown to nearly 300 feet by the evening of June 13 and was continuing to widen. Across the border in Missouri, the river punched a 225-foot-wide hole through a levee about 45 miles downriver near Big Lake in Holt County. The roughly 30 residents who stayed in the resort town after the river started rising were told to leave June 13. Source: http://www.chron.com/disp/story.mpl/ap/top/all/7608947.html

Details

Banking and Finance Sector

15. June 14, WHP 21 Harrisburg – (Pennsylvania; North Carolina; New York) Two fugitives from string of bank robberies arrested. Two fugitives involved with 11 different bank robberies in Central Pennsylvania were arrested June 9 and June 11. Officials say these robbers used elaborate old man masks. On June 2, it was announced that the men were considered fugitives. On June 9, one of the men was arrested in Charlotte, North Carolina, by the FBI. On June 11, the other man was arrested in Long Island, New York, by the FBI and the Suffolk County Police Department. Both men are being returned to the area for prosecution. If convicted, the man arrested in New York faces life in prison, while the other suspect faces up to 3 years in jail. Source: http://www.whptv.com/news/local/story/Two-fugitives-from-string-of-bank-robberies/UwTcg-Ywi0GcAJ5Wvb44kw.cspx

16. June 13, Minneapolis Star Tribune – (Minnesota) Plymouth broker is third to be charged in Cook’s Ponzi scheme. A Plymouth, Minnesota, securities broker was charged June 13 in a Minneapolis federal court with securities fraud, wire fraud conspiracy, and money laundering in connection with another man’s $194 million Ponzi scheme. The 54-year-old man is the third person to be criminally charged in connection with the scheme but may not be the last. The charges were filed by way of “criminal information” rather than indictment, and search warrant documents filed in May suggest that the securities broker is helping the government investigate his former associates. According to the charges filed against the man, for 6 months in 2008 he conspired with others to pitch a fraudulent foreign currency investment program, which led to losses of more than $150 million for nearly 1,000 investors, mostly retirees. He used his position as a licensed securities broker to lend credibility to the program, the U.S. attorney’s office said in a statement June 13. He faces up to 10 years in prison on the money-laundering charge, and 5 years each on the securities fraud and conspiracy charges. Source: http://www.startribune.com/business/123787849.html

17. June 13, Bay City News – (California) Police investigating suspicious fire at downtown Wells Fargo. Police were investigating a suspicious fire that burned at a Wells Fargo bank in San Francisco, California’s financial district June 13. The fire was reported at about 1 a.m. at the bank, located at 464 California Street. A window on the front of the building was broken and newspapers were set on fire inside underneath the windowsill, according to police. The fire is considered suspicious, police said. Source: http://sfappeal.com/news/2011/06/police-investigating-suspicious-fire-at-downtown-wells-fargo.php

18. June 13, Seattle Post-Intelligencer – (Washington) Police: Man arrested for ATM skimming has crime-ring ties. A Seattle, Washington man was charged June 13 with four counts of identity theft after police said he used information skimmed from Chase bank ATM machines. Prosecutors said the suspect has ties to organized crime rings operating in Washington State and other states. The 21-year-old is being held on $250,000 bail after previously posting $50,000 bond earlier in June. The man “attempted to make 66 transactions with the counterfeit credit cards that he made from information ‘skimmed’ from the victims,” a senior deputy prosecutor wrote in charging documents. “He was found with 22 different victims’ financial information stored onto counterfeit cards.” Prosecutors said more counts are expected as they search for additional victims, and the U.S. attorney’s office may take over prosecution of the case. Chase fraud-monitoring staff identified 15 locations where skimmed information was used in the Seattle area. According to a search warrant, “the identified losses to Chase from [his] ATM skimming activities are in excess of $135,000.” Source: http://www.seattlepi.com/local/article/Police-Man-arrested-for-ATM-skimming-has-1422492.php

19. June 13, New York Times – (International) Zvi Goffer found guilty in insider trading case. A man was found guilty of insider trading June 13 in New York. A 12-person jury convicted the uspect and two accused co-conspirators on its fifth day of deliberations in federal court in Manhattan. They each face up to 25 years in prison and are free on bail until their sentencing later in 2011. The case was connected to the prosecution of the hedge fund tycoon and co-founder of the Galleon Group who was found guilty in May in the largest insider trading case in a generation. Wiretaps played a central role in the trial. The jury heard secretly recorded telephone conversations between the suspect and co-conspirators, swapping confidential information about coming mergers and acquisitions. The suspect received his corporate secrets from low-level associates at a corporate law firm. Both of the lawyers at that firm pleaded guilty to passing information about deals the firm was working on. The two fed their tips to a third lawyer who then passed the intelligence on to the suspect. The way the suspect paid his sources included an elaborate scheme involving wiring money into a Swiss bank account, and into another in the name of a tipster’s housekeeper. Source: http://dealbook.nytimes.com/2011/06/13/zvi-goffer-found-guilty-in-insider-trading-case/

20. June 13, WFMY 2 Greensboro; FBI – (Texas; Georgia) Bank robber wanted in two states called ‘Cool Calm Bandit’ by FBI. A man is wanted in connection with at least four bank robberies in Texas and Georgia. FBI officials have dubbed the man the “Cool and Calm Bandit.” They said he enters the bank in a calm manner and waits in line for his turn. The suspect then presents a note demanding money and produces a pistol/semi-automatic handgun from his waistband. He places the weapon on the counter and usually covers it with his hand. Investigators said after the suspect gets the money, he leaves the bank on foot. Investigators said the unknown suspect has robbed the following banks: March 31, a bank in San Antonio, Texas; April 8, a bank in Savannah, Georgia; April 13, a bank in Savannah; and May 18, a bank in Pooler, Georgia. The FBI describes the suspect as a black male in his late 20s to early 30s, about 5’10” to 6’1”, and 190 to 210 pounds. He may have some facial hair. Law enforcement officials said the getaway car may be an Astro-style blue mini-van, or a gold colored box-style car. Source: http://www.digtriad.com/news/article/179252/175/FBI-Dubs-Bank-Robber-The-Cool-Calm-Bandit

21. June 13, Federal Bureau of Investigation – (National) Alpha One: Foreign currency trader convicted of securities fraud. A 50-year-old man from Spring, Texas, the “developer and owner” of “Alpha One”, a purportedly profitable foreign currency investment model, was convicted of securities fraud after defrauding investors of millions of dollars, a U.S. Attorney announced June 13. The man faces up to 20 years in prison and $5 million fine at sentencing. He admitted that between 2003 and 2009, he used and employed manipulative and deceptive devices and contrivances in connection with the purchase and sale of investments in a sequence of trading enterprises he formed. The convict admitted raising tens of millions of dollars from scores of investors and to having exercised custody and control over those funds under the pretense that he used them to trade, including buying and selling foreign currencies. To persuade people to invest or remain invested in his enterprises, he represented that he sought profits in the foreign currency markets using a model called “Alpha One”, which he maintained he developed and owned. The convcit admitted that he failed to trade as he represented. Rather, he made a minimal number of trades and earned little if any profits. Source: http://www.loansafe.org/alpha-one-foreign-currency-trader-convicted-of-securities-fraud

Information Technology Sector

48. June 14, Softpedia – (International) LulzSec hacks Bethesda Softworks and dumps private data. LulzSec has hacked into Bethesda Softworks’ computer network and leaked information about accounts registered on its Web sites. Bethesda Softworks, a subsidiary of ZeniMax Media, is one of the most appreciated game developers and is responsible for several popular series. It is unclear why LulzSec targeted this particular company, but the hackers said before the dump that “we did it because they couldn’t stop us — and did it we did, as you’ll see.” The data posted online includes a large number of e-mail addresses extracted from the company’s official blog, the registration site for its latest game, BRINK, and its jobs portal. LulzSec claims to have actually held back on publishing the personal data of more than 200,000 BRINK players. Besides the dumped data, the hacking outfit claims to extracted source code related to Quake 4, the popular title developed by id Software, now also a ZeniMax Media subsidiary. Bethesda acknowledged the hack and advised users to change their passwords on all of its Web sites, including the community forums and the BRINK player statistics site. Source: http://news.softpedia.com/news/LulzSec-Hacks-Bethesda-Softworks-and-Dumps-Private-Data-205898.shtml

49. June 13, New Castle News Journal – (International) Latest hacker target: Delaware IT firm. Delaware-based Unveillance LLC, a botnet-monitoring service, acknowledged it was targeted by the Lulz Security hackers group, which claimed it used a surreptitiously obtained password to steal nearly 1,000 work and personal e-mails from the chief executive. “Over the last two weeks, my company, Unveillance, has been the target of a sophisticated group of hackers now identified as LulzSec,” the CEO said in a statement. “I was personally contacted by several members of this group who made threats against me and my company to try to obtain money as well as to force me into revealing sensitive data about my botnet intelligence that would have put many other businesses, government agencies and individuals at risk of massive Distributed Denial of Service (DDoS) attacks,” he stated. “In spite of these threats, I refused to pay off LulzSec or to supply them with access to this sensitive botnet information. Had we agreed to provide this data to them, LulzSec would have been able to grow the size and scope of their DDoS attack and fraud capabilities,” the CEO continued. “Plain and simple, I refused to comply with their demands. Because of this, they followed through in their threats –- and attacked me, my business and my personal reputation.” LulzSec obtained the logins from an Atlanta, Georgia-based FBI partner organization called InfraGard and leaked them to the Internet. Source: http://blogs.delawareonline.com/delawareinc/2011/06/13/latest-hacker-target-delaware-it-firm/

50. June 13, The Register – (International) Nissan car secretly shares driver data with Websites. Electric cars manufactured by Nissan surreptitiously leak detailed information about a driver’s location, speed, and destination to Web sites accessed through the vehicle’s built in RSS reader, a security blogger has found. The Nissan Leaf is a 100-percent electric car Nissan introduced 7 months ago. Among its many innovations is a GSM cellular connection that lets drivers share real-time data about the car, including its location, driving history, power consumption, and battery reserves. Carwings, as the service is known, then provides many services designed to support “eco-driving,” such as breakdowns of the vehicle’s energy efficiency based on comparisons with other owners. But according to a Seattle, Washington-based blogger, Carwings includes the data in all Web requests the Nissan Leaf sends to third-party servers the driver has subscribed to through RSS, or real simple syndication. Each time the driver accesses a given RSS feed, the car’s precise geographic coordinates, speed, and direction are sent in clear text. The data will also include the driver’s destination if it is programmed in to the Leaf’s navigation system, as well as data available from the car’s climate control settings. Source: http://www.theregister.co.uk/2011/06/13/nissan_leaf_privacy_invasion/

51. June 10, Help Net Security – (International) Malware writers rely on users not updating. When infecting PCs, online criminals are increasingly benefiting from uninstalled updates for browsers and their components. Research carried out by G Data SecurityLabs indicates unclosed security holes in browser plug-ins are in fashion with cybercriminals. This distribution concept means current security holes are far from being the only ones exploited by the perpetrators, as evidenced in the current malware analysis for the month of May 2011. In May alone, 4 of the top 10 computer malware programs targeted Java security holes for which Oracle had been offering an update since March 2010. There also was an increase in malware that installs adware or tries to lure users to install bogus antivirus programs. The malware industry has focused on Java security holes since the end of 2010. Source: http://www.net-security.org/malware_news.php?id=1747

Communications Sector

52. June 10, Nextgov – (International) LightSquared cellular network interferes with all GPS applications, latest tests show. Transmissions from the nationwide cellular network planned by LightSquared knocked out GPS receivers operating at distances of 600 feet to 185 miles from the company’s base station, according to the latest test report on interference caused by the company’s system. The Federal Aviation Administration co-chairman of the National Position, Navigation and Timing Engineering (PNT) Forum, a multiagency group chartered to assess GPS technical issues, told a meeting of the National Space-Based PNT Advisory Board June 9 that tests in April showed “all GPS receiver applications [are] impacted by [the] proposed LightSquared network.” The Federal Communications Commission approved LightSquared’s hybrid satellite-terrestrial network January 26, which will include 40,000 base stations. The agency directed the company to work with the GPS industry to determine the potential effect its terrestrial transmitters, which operate in the 1525-1559 MHz and 1626.5-1660.5 MHz bands, would have on GPS systems that operate in the nearby 1559-1610 MHz band. The PNT co-chairman said simulation of the planned LightSquared network showed it would “degrade or result in loss of GPS function ... at standoff distances ranging from a few kilometers and extending to space operations.” Source: http://www.nextgov.com/nextgov/ng_20110610_6517.php

No comments: