Geez! Per IG memo, the FBI isn't labeling and tracking internal hard drives, thumb drives, etc. with sensitive and even top secret national security info once they're removed from computers and servers. For example, an open, unwrapped pallet holding internal hard drives extracted from bureau computers was stored almost 2 years in a facility shared with other FBI functions including mail sorting a… Morend IT acquisition. Almost 400 people including contractors had access to the pallet per 01J9 ~ jLess
A critical U.S. Marshals Service computer system that has been offline since February after suffering a ransomware attack and data breach will soon be operational again. The system in question was operated by the Marshals’ Technical Operations Group, a division that uses sophisticated, secretive technical methods to track suspected criminals through mobile phones, emails and the internet. The stan… Mored-alone system in question has been disconnected since Feb. 17, when the Marshals Service discovered a “ransomware and data exfiltration event” affecting the system, which contained LE sensitive info and data pertaining to subjects of USMS investigations, third parties and certain USMS employees. The Marshals Service was previously hacked in 2019 in an incident that exposed personal data of nearly 400,000 prisoners. That hack impacted the DSNet system, which houses and transports prisoners within the agency, federal courts and Bureau of Prisons. w2l0Less
Group of legislators sent letters to multiple financial regulatory agencies (including SEC and Treasury Dept) requesting more oversight of revolving door between public service and cryptocurrency industry. Lawmakers noted 200+ former officials previously working in White House, Congress and regulatory bodies accepted positions in cryptocurrency companies, including 2 former SEC chairs, 31 former T… Morereasury officials and 3 from Consumer Financial Protection Bureau, among others. Deadline for each agency to reply is Nov. 7. ml8D (Be wary of crypto crap America) ~ jLess
Artificial intelligence (AI) and machine learning (ML) hold tremendous potential to enable first responders to better process information and drive faster and more precise response. However, these cap...
Business Email Compromise Business email compromise (BEC)—also known as email account compromise (EAC)—is one of the most financially damaging online crimes. It exploits the fact that so many of u...
CNBC reports the latest trend in spam text messages involves mobile phone users receiving texts from what appears to be their own phone number. The messages typically claim to be from the user’s wireless carrier, referencing the recipient’s wireless bill and including a link to a “free gift.” S...
By continuing to browse the site you are agreeing to our use of cookies. For more details about cookies see our cookie policy.
Learn more