South Carolina’s correction facilities to have help from State Guardsmen

COLUMBIA, S.C. March 2 2018 –  Still unable to use jamming technology to stop smuggled cellphones, South Carolina’s corrections officials are enlisting State Guardsmen to help them combat the devices they call the top security threat behind bars.

On Tuesday, Gov. Henry McMaster signed an executive order allowing South Carolina State Guardsmen to help patrol the perimeters of the state’s prisons, watching for people trying to smuggle in contraband including cellphones.

The program is starting at one of the state’s high-security prisons, with the goal of expanding to other facilities. Bryan Stirling, the state’s Corrections director, said the program will allow him to move his officers back inside the prison, keeping institutions safer.

The partnership is the latest anti-cellphone step taken by Stirling, who has long argued that being able to jam signals from the smuggled phones — used by inmates to plan crimes and acts of violence — would be the best way to keep his employees and the public safer. Each year, Stirling’s agency seizes thousands of cellphones, smuggled inside prison by visitors, errant employees, and even delivered by drone.

Wireless service providers have said that, while they support efforts to cut out inmates’ illegal calls, they worry signal-blocking technologies could thwart legal calls.

The Federal Communications Commission, which regulates the nation’s airwaves, has said it can’t permit jamming in state prisons, citing a decades-old law that prohibits interruption of the airwaves at state-level institutions. But the agency has been softening on the issue, thanks to persistent pleas from officials including Stirling and McMaster, as well as members of Congress including Tennessee Rep. David Kustoff.

Stirling recently met in Washington with his counterparts from other states, along with wireless industry and FCC officials, to discuss ways to potentially use technology like signal jamming to fight the phones.

While continuing to push for that ability, Stirling has implemented increased searches, scanners, and even used dogs specially trained to sniff out cellphones. Last month, he announced a partnership with Richland County Sheriff Leon Lott, paying Lott’s deputies to patrol woods near a maximum-security prison in Columbia, arresting people for trying to smuggle in contraband.

View Source

Alabama lawmakers push to arm school security volunteers

MONTGOMERY, Ala. (AP) — Any trained school employee or citizen volunteer could join an armed security force in Alabama schools under a bill lawmakers are considering — one of several such measures being proposed in U.S. states after the Florida high school massacre.

Rep. Allen Farley, a Republican and former law enforcement officer, filed the bill on Thursday, and it has been referred to a committee for consideration. It replicates a local law in north Alabama’s Franklin County that was twice vetoed by the governor before becoming law in 2013. Rep. Johnny Mack Morrow, a Republican who sponsored the local law, said it was needed because rural schools couldn’t afford School Resource Officers (SROs) and the emergency response time could be 30 minutes.

“We wanted to give students out there in remote rural schools with no resource officer a fighting chance,” Morrow said at a news conference Tuesday.

It’s not clear whether the law is actually being implemented in that county, however. Morrow said he doesn’t know how many school employees or citizen volunteers are armed and the school district wouldn’t confirm numbers for security reasons.

Under the law, school principals can request a volunteer armed security force. They submit names of individuals who are vetted and trained by the sheriff’s department to become reserve deputy sheriffs.

Heath Grimes, superintendent of Russellville City Schools in Franklin County, said not all principals are familiar with the law and none in the city schools he oversees had requested a security force because they have school resource officers. He originally opposed the local law but now supports an individual school’s decision to arm a security force.

Read More

Las Vegas Doctor Arrested And Charged

LAS VEGAS, Nev. – A pain management doctor practicing in Las Vegas was arrested today and charged with 29-counts of unlawful distribution of fentanyl and for committing health care fraud, announced Attorney General Jeff Sessions, U.S. Attorney Dayle Elieson of the District of Nevada, Assistant Special Agent in Charge Dan Neill for the DEA’s Las Vegas field office, Special Agent in Charge Aaron C. Rouse for the FBI’s Las Vegas Division, and Special Agent in Charge Christian J. Schrank for the Office of Inspector General of the U.S. Department of Health and Human Services Office Los Angeles Region.

Dr. Steven A. Holper, 66, is charged in an indictment with seven-counts of distribution of Fentanyl, a controlled substance, and 22-counts of providing a false statement relating to a health benefit program.

Fentanyl is a powerful synthetic opioid painkiller that is 100 times more potent than morphine and 40 to 60 times more potent than 100% pure heroin. Fentanyl is available in various forms, including Subsys. Subsys is only available through the Transmucosal Immediate-Release Fentanyl (TIRF) Risk Evaluation and Mitigation Strategy (REMS) Access program. The only FDA-approved indication for TIRF medicines are for use to manage breakthrough pain in adults with cancer. Dr. Holper routinely prescribed Subsys for his patients without cancer.

According to allegations contained in the indictment, which was unsealed today, from about July 19, 2015 through March 12, 2016, Holper allegedly prescribed Subsys to a patient without a legitimate medical purpose and outside the usual course of professional practice. The indictment further alleges that, from about November 21, 2013 through March 24, 2017, Holper knowingly made false statements to Medicare and private health insurance companies. Dr. Holper prescribed Subsys for patients without cancer and falsely represented 22 patients were cancer patients with breakthrough cancer pain, who were opioid tolerant and eligible for Subsys.

“Our great country has never before seen the levels of addiction and overdose deaths that we are suffering today. Sadly, some trusted medical professionals like doctors, nurses, and pharmacists have chosen to violate their oaths and exploit this crisis for cash—with devastating consequences. Our goals at the Department of Justice for 2018 are to reduce the number of opioid prescriptions, the number of overdose deaths, and violent crime—which is often drug-related. That’s why I created the Opioid Fraud and Abuse Detection Unit and sent 12 top prosecutors to opioid hotspots around the country: to help us find the medical fraudsters who are flooding our streets with drugs. These prosecutors are already issuing indictments from Pittsburgh to Las Vegas. I want to thank the DEA, FBI, the Department of Health and Human Services, and the Henderson, Nevada Police Department, and Assistant U.S. Attorney Kilby Macfadden for their hard work on this case. I am convinced that these efforts make drugs less available on the streets, send a message to criminals, and ultimately make our communities much safer,” said Attorney General Sessions.

Read More

Wiretap investigation leads to seizure of more than 30 pounds of fentanyl

State and federal law enforcement officials announced Thursday they seized some 77 pounds of various illicit drugs in the Boston area — including more than 30 pounds of fentanyl — as the result of “Operation High Hopes,” according to a press release by the Suffolk County District Attorney’s office. They say it’s “one of the longest, most far-reaching, and most successful state wiretap investigations in Massachusetts history.”

Suffolk County District Attorney Daniel Conley says the investigation led to more than a dozen arrests and dismantled two Boston-area drug trafficking organizations. About $300,000 in alleged drug money was also seized. He added that fentanyl, heroin, cocaine and opiate tablets are believed to have originated from Mexico’s Sinaloa Cartel.

Fentanyl is so powerful, Conley says, that mere milligrams can be lethal.

“The number of overdoses it could have caused is truly staggering,” Conley wrote in the press release. “Individuals who buy and sell at this level aren’t users. They’re not small time dealers, either. They’re certainly not selling to support a habit. They’re trafficking in addictive substances that claim more lives in Massachusetts than all homicides, all suicides and all car crashes, statewide, combined.”

Boston Police Commissioner William B. Evans heralded the successful sting in the written statement: “These arrests and seizures will have a tremendous impact on the quality of life in Boston and many other Massachusetts cities and towns,” Evans said. “I commend the work of my detectives and all our law enforcement partners who worked tirelessly over the past six months of Operation High Hopes.”

The DEA Special Agent in Charge Michael J. Ferguson echoed that sentiment: “Those responsible for distributing lethal drugs like fentanyl to the citizens of Massachusetts need to be held accountable for their actions. DEA’s top priority is combating the opioid epidemic by working with our local, county and state law enforcement partners to bring to justice those that distribute this poison.”

Wiretap investigation

Edward Soto-Perez, 43, of Roxbury, Nelson Catala-Otero, 37, of Brockton and Julio Cuello, 52, of Dorchester were arraigned in November on multiple drug trafficking charges after the execution of wiretap-based search warrants, according to the press release. They were held on bails ranging from $100,000 to $250,000 and will return to court Feb. 13.

Robert Contreras, 42, of Roxbury, is their alleged supplier and was one of more than a dozen people arrested Thursday. He’s being held on $1 million bail and will return to court Feb. 28.

Read More

Restricted banking access spell a boom for security business

Industry reaction has been mixed since Attorney General Jeff Sessions rescinded Obama-era guidelines on enforcing marijuana laws Jan. 4. Some entrepreneurs express concern and fear, while others carry on with business as usual.

But one thing insiders agree on is the move will make it more difficult for cannabis companies to find and secure banking relationships, without which businesses are left with a ton of cash on hand.

Despite being legal for recreational or medicinal use in more than half the country, marijuana is still a Schedule I drug and therefore illegal at the federal level. In 2013, Barack Obama’s administration issued the Cole Memorandum, which essentially directed federal law enforcement to allow businesses that are legal under state laws to operate. The memo also signaled banks could do business with these companies so long as they were in compliance with federal guidelines, although many have been hesitant.

In rescinding this policy, Sessions said future prosecutions of businesses and individuals who sell pot in states where it has been legalized will be left up to individual U.S. attorneys.

“The real sticking point here will be banking. Before, banks were very reluctant to do business based on the loosely defined Cole Memo,” said Matt Karnes, founder of industry analyst firm GreenWave Advisors. “This raises more uncertainty, and I think there is going to be a pullback.”

In a November 2017 report, GreenWave found that about 5 percent, or 368, of all financial institutions in the U.S. are on record with the Financial Crimes Enforcement Network (FinCEN), but only 1 percent are actually servicing these businesses. Many are credit unions and local and community banks. Karnes also said many marijuana businesses conceal the true nature of their business when establishing relationships, and once they are found out, the account is shut down.

“In the last report from FinCEN, 3,800 accounts were opened, but 3,700 were shut down. It’s very short-lived,” he said.

A report from Reuters Wednesday also indicated the action taken by Sessions came as a surprise to FinCEN, which was flooded with calls from banks on how to proceed. CNBC reached out to both the Department of Justice and FinCEN for comment but did not immediately receive a response.

Read More

Violations of the Illinois Biometric Information Privacy Act (BIPA), results in lawsuits

Chicago IL Jan 12 2018 A wave of class action lawsuits has been filed alleging violations of the Illinois Biometric Information Privacy Act (BIPA), a statute aimed at regulating how companies use information based on “biometric identifiers” such as fingerprints and retina scans. Violating BIPA can be costly, so employers operating within Illinois should review their business practices to determine whether they are using “biometric information” and plan accordingly.

Although many of the early lawsuits filed under BIPA targeted technology companies for their use of facial recognition software, recent litigation has focused on employers that use fingerprint-scanning technology to allow employees to clock in and clock out. BIPA regulates a private entity’s ability to collect, store and disclose biometric information. The statute defines biometric information as that based on individual identifiers such as fingerprints, retina scans or voiceprints. As the statute explains, these cannot be changed, unlike other unique identifiers such as Social Security numbers.

Citing the public’s concern with the use of biometrics for business transactions and the “heightened risk of identity theft” biometric information entails, the Illinois legislature sought to protect individual privacy and encourage private entities to bolster information security by passing BIPA in 2008. The statute flew under the radar until the first surge of class action lawsuits in 2015. These private actions picked up steam in the latter half of 2017, with dozens of new class action suits filed since July. And it’s easy to see why the plaintiffs’ bar has taken notice: The penalties associated with BIPA range from $1,000 to $5,000 per violation and include attorneys’ fees.

Fortunately for employers, compliance with BIPA is fairly straightforward. At minimum, entities that use biometric information must:

Adopt a written policy with a retention schedule and guidelines for permanently destroying the information, and make this policy available to the public.

Obtain informed, written consent from any employee whose biometric information is obtained.

Read More

Feds crack down on birth tourism at ‘maternity hotels’

Federal Homeland Security agents raided 20 alleged “maternity hotels” in Southern California where pregnant Chinese women pay tens of thousands of dollars to live to ensure a “made in America” baby, reports said.

The feds raided locations in Los Angeles, Orange and San Bernardino counties on Tuesday, targeting three competing birth-tourism schemes, officials told NBC News, which was on the scene of one of the raids.

One of the properties was the ultra-deluxe Carlyle building in Irvine, California, which housed pregnant women and new moms for fees ranging between $40,000 and $80,000 to ensure their children would have American citizenship, the outlet reported.

“I am doing this for the education of the next generation,” one of the women told NBC News.

None of the moms or moms-to-be were arrested. Police treated them as material witnesses and paramedics were standing by during the raids in case any of the women went into labor.

It’s not illegal to have a child in the US while in the country with a tourist visa, but lying to obtain the visa is illegal.

“If you lie about your reasons for coming here, that’s visa fraud,” Claude Arnold, special agent in charge of Homeland Security Investigations for Los Angeles, told NBC News.

Cops focused their efforts on the ringleaders behind the scheme. Court papers allege the fraudsters pocketed hundreds of thousands of tax-free dollars to help Chinese nationals get visas and a pampered life once they arrived, up until their delivery date in an American hospital.

The organizers allegedly used a website to attract customers, drawing in expecting mothers with the attractive benefits of a child with US citizenship: 13 years of free education, low-cost college financial aid, less pollution and a path for the entire family to emigrate when the child turns 18.

The women were advised on what lies to tell to obtain a tourist visa; how to fly through Hawaii, Las Vegas or Korea to avoid the suspicions of immigration officers at Los Angeles International Airport; and how to disguise their pregnancy during their trip, court documents allege.

The women’s handlers escorted them to doctors’ visits and trips to restaurants and shops, the court papers say. One agent followed one of the suspects to Target and Babies R Us.

While birth-tourism schemes are nothing new, investigators believe the practice is growing, NBC reported. Court papers cited a study that found 40,000 children are born to women in the US on a travel visa each year.

Read More

U.S. bars drones over nuclear sites for security reasons

WASHINGTON (Reuters) - The Federal Aviation Administration said Monday it will bar drone flights over seven major U.S. nuclear sites, including Los Alamos National Laboratory in New Mexico.

The move is the latest in a series of growing restrictions on unmanned aerial vehicles over U.S. sites that have national security implications.

The new restrictions begin Dec. 29 and include the Hanford Site in Washington State, Idaho National Laboratory, Savannah River National Laboratory in South Carolina, Pantex Site in Texas and the Y-12 National Security Site and Oak Ridge National Laboratory in Tennessee.

The FAA said it is considering additional requests from other federal security agencies to bar drones.

Earlier this year, the FAA banned drone flights over 133 U.S. military facilities. The Pentagon said in August that U.S. military bases could shoot down drones that endanger aviation safety or pose other threats.

The FAA also banned drone flights over 10 U.S. landmarks in September, including the Statue of Liberty in New York and Mount Rushmore National Memorial in South Dakota, at the request of national security and law enforcement agencies.

It separately barred drone flights over the USS Constitution in Boston, the Gateway Arch in St. Louis and Independence National Historical Park in Philadelphia. The list also includes Glen Canyon Dam in Arizona, Hoover Dam in Nevada and Grand Coulee Dam in Washington state.

Last week, the National Transportation Safety Board said a September collision between a small civilian drone and a U.S. Army helicopter was caused by the drone operator’s failure to see the helicopter because he was intentionally flying the drone out of visual range.

The incident between a U.S. Army UH-60M Black Hawk helicopter and a DJI Phantom 4 drone near Staten Island, New York occurred as concerns mount over the rising number of unmanned aircraft in U.S. airspace.

Read More

Drone pilot arrested after multiple NFL stadium incidents

A California man was arrested Sunday for flying a drone over two NFL stadiums and attempting to drop anti-media pamphlets into the crowd.

Tracy Mapes, a 55-year-old Sacramento resident, was cited and released by Santa Clara police for flying the drone in violation of a local municipal code, department spokesperson Dan Moreno told USA TODAY Sports on Monday.

The drone appeared at Levi’s Stadium during the second quarter of the San Francisco 49ers’ 24-13 loss to the Seattle Seahawks and was later seen over Oakland Coliseum, where the Oakland Raiders were playing the Denver Broncos.

Moreno said the message on the leaflets was “anti-local news media, and TV news stations specifically.” The charge was a misdemeanor, he said.

There is also an ongoing federal investigation and Mapes may face additional charges, according to Moreno, because the Federal Aviation Administration prohibits the flying of drones within five miles of an airport. Both Levi’s Stadium and Oakland Coliseum are within that range.

The San Francisco Chronicle added that the drone was a relatively ineffective messenger because “most of the drone-dropped leaflets were carried away by the win.

View Source

‘Hacker-for-hire’ cases going federal in Minnesota

“In the first Minnesota case to address a new and growing form of cybercrime, federal prosecutors have charged a former state resident with employing “hackers-for-hire” to sabotage the website of a local business.

The case reflects concern among law enforcement officials nationwide that hackers ranging from disgruntled ex-employees to enemy nation states are ramping up attacks on an ever-expanding array of personal digital devices connected to the web.

Prosecutors say John Kelsey Gammell, 46, paid hacking services to inflict a year’s worth of “distributed denial of service” (DDoS) attacks to bring down websites affiliated with Washburn Computer Group, a Monticello business where he used to work.

DDoS attacks overwhelm a network with data, blocking access for legitimate users and even knocking web services offline. Washburn, a point-of-sale system repair company, told prosecutors that Gammell’s attacks cost it about $15,000.

Authorities say Gammell didn’t stop there: He is accused of paying $19.99 to $199.99 in monthly payments to try to bring down web networks that included those of the Minnesota Judicial Branch, Hennepin County and several banks.

“As a society that is increasingly reliant on network-connected devices, these types of cyberattacks pose a serious threat to individuals, businesses, and even our nation’s critical infrastructure,” Acting U.S. Attorney Gregory Brooker in Minneapolis said, speaking generally about the new forms of crime.

The FBI’s Internet Crime Complaint Center reported more than $11 million in losses to victims of DDoS attacks last year.

“We have a growing trend where the sophistication of the dark web and the sophistication of certain professional hackers to provide resources is allowing individuals — and not just experienced individuals — to conduct hacks and conduct DDoS,” said FBI Supervisory special agent Michael Krause, who leads the FBI’s cyber squad in Minneapolis.

Devices such as digital video recorders and home appliances recently have been marshaled by cyber criminals to carry out massive operations like last year’s flooding of a prominent web infrastructure company that affected sites like Amazon and Netflix. In a separate attack, in June 2016, the Minnesota Judicial Branch’s website went down for 10 days, alarming local officials because so many government services have at least some nexus to the web.

“A lot of people think it’s just a nuisance,” said Chris Buse, Minnesota’s chief information security officer. “But it’s not. If you look at what government does — basic critical services — if those services don’t continue, people can literally die.”

Minnesota IT Services, which administers the state’s computer systems, said state networks field an average of more than 3 million attempted cyberattacks daily. Officials say the state still hasn’t experienced a major attack on par with a 2012 South Carolina breach that exposed personal data for 3.7 million residents and cost the state $20 million.

But with hackers able to take over hundreds of millions of unsecured devices worldwide to flood networks in a single DDoS attack, security professionals are trying to stay ahead of the threat.

“In our environment it’s pretty clear now that every organization needs some sophisticated and expensive tools to mitigate these DDoS attacks,” Buse said.

‘We will do much business’

The government’s case against Gammell underlines the difficulty of linking any suspect to the daily torrent of attacks often carried out by far-afield hackers who advertise their services online. Authorities might not have caught Gammell without tracing taunting e-mails he allegedly sent after attacks.

One of his preferred hacking-for-hire services was called vDOS, which was shuttered last year after the arrests of two alleged operators in Israel. The FBI obtained files from vDOS that included records of Gammell’s purchases, attacks and communications with vDOS administrators and customers.

One day in 2015, according to a criminal complaint, Gammell eagerly wrote the company boasting of his success in blowing past a “DDoS mitigation” program to kick an unnamed network offline for at least two days. “We will do much business,” Gammell allegedly wrote. “Thank you for your outstanding product.”

According to an FBI agent’s sworn affidavit, Gammell sought out seven sites offering DDoS-for-hire services and paid monthly fees to three to carry out web attacks from July 2015 to September 2016.

Charges are also expected out of Colorado and New Mexico for firearms offenses stemming from searches in the case.

Appearing in a Minneapolis courtroom last week, Gammell confirmed that he rejected a plea offer that would have resolved all charges and capped his possible prison sentence at a mandatory 15 to 17 years. A federal magistrate is reviewing motions filed by Gammell’s attorney, Rachel Paulose, to dismiss the case or suppress evidence.

On Monday, Paulose told U.S. Magistrate Judge David Schultz that evidence the FBI obtained from an unnamed researcher should be thrown out and suggested the data could itself have been retrieved by hacking.

Paulose, who did not respond to messages seeking comment for this story, also argued in pretrial motions that Gammell didn’t personally attack Washburn.

“The government has failed to charge a single one of those ‘cyber hit men’ services, named and evidently well known to the government,” Paulose wrote. “Instead the government’s neglect has allowed the professional cyber hit men for hire to skip off merrily into the night.”

Addressing Schultz last week, Paulose described the attacks on Washburn as “essentially a prank on a dormant site not doing business.”

“Even if Mr. Gammell thinks it’s a prank,” Assistant U.S. Attorney Timothy Rank replied, “it’s a criminal prank.”

View Source