Tag: FBI

  • FBI Staff Bizarre Action Taken. Original Document

    The Custodians of Law!

     

    Look at their behavior and the action taken.

     

    Wish I could take a report on Indian Police and Security Agencies,should make a spicy reading.

     

    Any one has an idea?

     

    .

    From the original Source.

     

    Click the Link at the end of the Post for full report in pdf format.

     

    From: HQ_OFFICE_OF_ PROFESSIONAL RESPONSI BILITY
    Sent: Monday, October 01, 2012 6:12 AM
    To: FBI _ALL _EMPLOYEES
    Subject: OPRS QUARTERLY ALL EMPLOYEE E-MAIL – Octobtr 2012 Edition
    Ciassification: TJNCLASSIFIED
    NOT FOR PUBLIC DISSEMINATION
    OPRs Quarterly All Employee E-Mail – October 2012 Edition
    Set forth below are examples of cases adjudicated by the Office of Professional Responsibility (OPR) during the last
    quarter. OPR sends these Quart&Iy E-Mails to educate employees about the Bureaus standards of conduct and to aid
    employees in steering clear of ethical pitfalls and other violations. We do not include cases in which OPR finds that the
    employee did nothing wrong (more than one-third of the cases we adjudicate).
    Candice M. Will
    Assistant Director
    Office of Professional Responsibility
    1001 Pennsylvania Avenue, SuIte 444 North
    202-220-7800

    FBI Memo
    FBI Memo

    Examples of Recent Adjudications:

     

    1. Domestic Violence: During argument with spouse, Employee broke spouses e-reader in half
    and pointed unloaded gun at dog’s head while dog was sitting in spouse’s lap. In mitigation,
    Eniployee had been struggling with spouses mental health issues and fol!owing this incident, entered
    marriage counseling. In aggravation, Employee introduced a firearm into a domestic dispute, an
    extraordinarily serious escalation.
    PENALTY: 45-Day Suspension
    OFFENSE: Assault/Battery, Offense Code 4.1
    2. DUI: Erriployee was stopped by police for driving private ly-owned vehicle while under the
    influence of alcohol. lt was Employee’s second DUI whUe employed by the FBI. A second DUI while
    employed at the FBI resuits in dismissal.
    PENALTY: Dismissal
    OFFENSE: DUI in Privately-Owned Vehicle, Offense Code 4.4
    3. lmproper Financial Relationship with a Source: Employee purchased a used car from a
    Confidential Human Source (CHS). Employee had previously served as the CHSs handler. In
    mitigation, Employee did not seek a discount, paid fair market value for the car, and is a valued
    employee with an excellent record.
    PENALTY: 3-Day Suspension
    OFFENSE: Improper Financial Relationship with a Source, Offense Code 1.2
    4. lmproper Handling of Evidence: Employee failed to properly secure and accurately account for
    evidence seized during a search warrant. Empioyee was in charge of irventorying the evidence.
    Employee failed to recount the currency to verify its correct amount prior to placing it in evidence
    vault, resulting in a subsequent discrepancy. Employee also failed to properly secure drug evidence
    in the safe, instead co-mingling it with non-valuable evidence. In mitigation, Employee was
    responsible for multiple duties on the day ofthe search and was overburdened. In addition,
    Employee is a nine-year employee with no previous disciplinary matters.
    PENALTY: 3-Day Suspension
    OFFENSE: Investigative Deficiency, Offense Code 1.6
    5. lmproper Handling of Evidence; Lack of Candor Not Llnder Oath: Employee failed to follow
    Bureau procedures for the destruction of drug evidence. Employee did not weigh each item prior to
    destruction, despite specific instruetions to do so from the Evidence Control Technician and
    Employee’s supervisor. Also, Employee improperly stated all drug eviderice had been properly
    weighed. In mitigation, Employee was attempting to adhere to a tight timeframe; Employee verified
    there was no tampering with any packages prior to their destruction; Employee’s coriduct did not
    negatively impact pending investigations; and Employee self-reported his misstatements. In
    aggravation, Employee’s actions in failing to follow the proper procedure served as a poor example to
    more Junior employees and Employee was under administrative inquiry at the time for unrelated
    conduct.
    PENALTY: 8-Day Suspension
    OFFENSE: Investigative Deficiency, Offense Code 1.6
    Lack of Candor Not Under Oath, Offense Code 2.5
    6. lmproper Relationship with Criminal Element; Lack of Candor Under Oath: Employee
    engaged in a romantic relationship with former boyfriend (now husband) knowing he was a drug
    user/dealer. Employee also lied under oath when questioned during the administrative inquiry about
    her husband’s activities. Prior to polygraph exam, Employee adnitted husband’s drug use, inciuding
    being aware when she married hirn that he was a habitual drug user’ who sold drugs to rnake
    money. PENALTY: Dismissal
    OFFENSE: Lack of Candor Under Oath, Offense Code 2.6
    lmproper Relaticnship with Criminal Element, Offense Code 5.9

    http://i2.cdn.turner.com/cnn/2013/images/02/21/office.of.professional.review.-.cnn01302013_0000.pdf

     

    Related:

    An FBI special agent accused of driving on the State Thruway in Eden without wearing pants will see his charges dismissed if he steers clear of additional trouble for the next six months.

    John A. Yervelli Jr., 48, assigned to the Buffalo FBI office, was granted an adjournment in contemplation of dismissal Tuesday night in Eden Town Court.

    Yervelli was charged with misdemeanor public lewdness last month by State Police. A truck driver told troopers Yervelli was driving a passenger vehicle about 9 p.m. Dec. 7 when the off-duty FBI agent “pulled up next to his truck, turned on the dome light and displayed that he was not wearing pants, while making lewd gestures,” according to State Police.

    An Erie County prosecutor Wednesday confirmed this week’s court ruling, and said Yervelli is required to complete a psychological counseling program as part of the decision.

    http://www.buffalonews.com/apps/pbcs.dll/article?AID=/20130123/CITYANDREGION/130129616/1024

     

     

     

  • ‘Not like Pork but Meaty’ Friend Chat to Cannibal Cop

    The New York Cop who planed to kill and cook a woman to eat,is caught in another controversy.

    His friend chatted  with him Online  ‘

    ‘It isn’t quite like pork, but very meaty anyway’: Cannibal cop’s online pal boasts of eating ‘a black woman and white child’ in vile computer chats.(tipggita32.wordpress)

    Story:

    New York planned to kill and eat a woman
    New York planned to kill and eat a woman

    According to court papers, filed in advance of Valle’s February trial on charges that he planned to abduct, rape, torture, cook and eat women, one online contact with the screennameMoody Blues” told Valle that he had previously eaten “a black woman and a white child.”

    Moodly Blues told Valle, 28, that he looked forward to eating a white woman with him and that he’d love to eat another child. “I also love roasting whole pelvises, mind you only did with the little one so far,” Moody Blues wrote to the six-year NYPD veteran, who responded approvingly.

    Federal prosecutors argue that the online chats with Moody Blues should be used as evidence at trial, according to the New York Post. Prosecutors wrote that the cyber conversations “are highly probative of Valle’s state of mind and of the existence of an actual, and non-fantastical agreement between Valle and the co-conspirator to commit a kidnapping… Indeed , they are no more sensational, depraved and disturbing than the related portions of the conversations (which Valle concedes are admissible) about shoving a specific and identified woman into an oven, with her legs folded under her, or cooking her over an open fire, slowly, to prolong her suffering,”

    Valle is charged with plotting to commit torturous acts with at least three co-conspirators. As the Post noted, “one of his three alleged co-conspirators, Michael Van Hise of Hamilton, N.J., was busted earlier this month after initially cooperating with the FBI. Van Hise, 23, is charged with offering to pay Valle $5,000 to kidnap a woman and deliver her to him to be raped and murdered. He was denied bail when online postings emerged of Van Hise stating his desire to rape his young nieces and infant daughter.

    Valle claims that his online discussions were merely fantasy role-play and that he had never and never planned to carry out any acts he appeared to plan online.

    http://www.salon.com/2013/01/24/cannibal_cops_online_contact_boasted_eating_woman_and_child/

  • Another Christian Keeler Affair? CIA Petraeus.

    The affair of Petraeus evokes  more of Christian Keeler affair.

    What started as a routine investigation had bloomed into a full-time scandal and cost many a career in UK with serious security implications.

    Petraeus affair seems to be blooming into another one like this.

    Security seems to have been compromised.

    This is just the beginning.

    The Washington Post has already voiced such suspicions.

    I have posted a blog on this.

    petraeus1.C--300x300.jpg
    David Petraeus with biographer and mistress Paula Broadwell,

    ‘The FBI found a substantial amount of classified information improperly secured on the personal computer of disgraced CIA director Gen. David Petraeus’ mistress, sources said yesterday.

    The files were discovered on a machine removed from Paula Broadwell’s Charlotte, NC, home as the feds investigated her sordid affair with the military commander whose biography she co-wrote.

    Investigators also found documents Broadwell admitted taking from secure government buildings, a source told ABC News, adding the government demanded that they all be returned.

    The network said the FBI and military were going through the material this morning and prosecutors were deciding whether to charge her with a crime.

    “That’s why they were pulling so much stuff out of [Broadwell’s] place,” a source said, referring to a search carried out Monday night, three days after Petraeus quit as top spy because of their affair.

    The discoveries prompted the FBI to step up its probe of Broadwell, who anonymously sent harassing e-mails to Florida mom Jill Kelley — a married “friend” of the four-star general.

    http://www.nypost.com/p/news/national/paula_had_top_secrets_WukhCN61iSxyauU5ErBAtK?utm_source=Sailthru&utm_medium=email&utm_term=Newsletter&utm_campaign=Daily%20Newletter%20-%20AUTO%202012-11-15

    Enhanced by Zemanta
  • BE Careful Browsing At Hotels’ Internet

     

    The FBI sent an advisory on the fact that Professional Scammers are using Hotel Internet connection to infect your Laptops and Mobiles.

     

    Better to have your own portable connectivity.

     

    Story:

     

    Wi-Fi Alliance logo
    Wi-Fi Alliance logo (Photo credit: Wikipedia)

     

    Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while establishing an Internet connection in their hotel rooms.

     

    Recently, there have been instances of travelers’ laptops being infected with malicious software while using hotel Internet connections. In these instances, the traveler was attempting to setup the hotel room Internet connection and was presented with a pop-up window notifying the user to update a widely-used software product. If the user clicked to accept and install the update, malicious software was installed on the laptop. The pop-up window appeared to be offering a routine update to a legitimate software product for which updates are frequently available.

     

    The FBI recommends that all government, private industry, and academic personnel who travel abroad take extra caution before updating software products on their hotel Internet connection. Checking the author or digital certificate of any prompted update to see if it corresponds to the software vendor may reveal an attempted attack. The FBI also recommends that travelers perform software updates on laptops immediately before traveling, and that they download software updates directly from the software vendor’s Web site if updates are necessary while abroad.

     

    Anyone who believes they have been a target of this type of attack should immediately contact their local FBI office, and promptly report it to the IC3’s website atwww.IC3.gov. The IC3’s complaint database links complaints together to refer them to the appropriate law enforcement agency for case consideration. The complaint information is also used to identify emerging trends and patterns.

     

    http://www.ic3.gov/media/2012/120508.aspx

     

    What can travelers do about these potential hotel Wi-Fi drive-by attacks? Focus on these nine information security essentials:

     

    1. Update Before Leaving Despite the inevitable last-minute rush to get the bags packed, don’t forget to install the latest application and operating system security updates onto your laptop, smartphone, and tablet before heading out. Also ensure that antivirus software is running on the device, and is likewise fully updated.

     

    [ Everybody is worried about security. Read Security Top Concern Of Federal CIOs. ]

     

    2. Block Pop-Ups Never, ever click on a pop-up window. “No major, reputable site requires a pop-up to work or function,” said Kapil Raina, director of product marketing at Zscaler, via email. Preferably, configure your browser to block all pop-ups, so that no one using your computer–such as family members–can click on one.

     

    3. Handle Free Wi-Fi With Caution The FBI advisory highlights the need to treat all free hotspots with caution. The problem, however, is that people often throw caution to the wind when presented with free stuff, such as USB keys or wireless access, and even if they’re likely to be security-aware types attending a conference in the heart of Amsterdam filled with known hackers. That’s what Steve Lord, a director at information security consultancy Mandalorian, discovered at this year’s Black Hat Europe conference, when he installed a free Wi-Fi hotspot with the name “LEGITFREEWIFI.” Sounds trustworthy, right? At least some of the attendees, who should have known better, used the hotspot with abandon.

     

    4. Read Hotel Wi-Fi Directions Avoid connecting to fake hotspots by verifying which network actually belongs to the hotel. “If you must connect to a hotel Wi-Fi network, verify with the front desk the exact procedure (SSID name, process for payment, etc.),” said Zscaler’s Raina. “You do not want to connect to a fake access point. Some hotels have direct connections (physical cables) you may opt for. In some cases, consider using your phone via 3G/4G as the connection point rather than Wi-Fi.”

     

    5. VPN Tunneling Secures Free Wi-Fi But Mandalorian’s Lord, who deleted all data intercepted by his “weaponized hotspot,” emphasized that he could have given his hotspot the same name as the hotel’s hotspot, though didn’t do so because he feared it would break the law. Of course, criminals would likely have no such compunctions. On that note, the best way to easily block such attacks is to use VPN tunneling. In fact, it’s always a good idea–whether at home or abroad–to use a VPN whenever connecting to free Wi-Fi, since such hotspots, by their nature, aren’t secure. Indeed, anyone can easily sniff wireless non-SSL traffic, unless it’s routed via a VPN. Free, reputable VPN software is widely available for both PC and Mac (and in some cases, Linux), including Hotspot Shield from AnchorFree, the open source OpenVPN (Windows/Mac/Linux, Free), and Shrew Soft’s VPN Client, as well as built-in VPN tools in both Apple OS X and Windows.

     

    6. Download Software Updates Directly From Vendors While surfing the Web via hotel Wi-Fi, ignore all unsolicited software-update offers. “Download software updates directly from the software vendor’s Web site if updates are necessary while abroad,” according to the IC3 advisory. Anything else may be a scam. Also don’t be afraid to verify security warnings by using another computer.

     

    7. Beware Wired Hotel Connections Hotel hotspots aren’t the only types of connections that can be compromised. According to news reports, systems at iBAHN–one of the world’s largest providers of Internet services for hotels–were compromised last year. Although the company denied it had been hacked, any attacker who could successfully hack into that type of network would be able to serve up malware to anyone using a hotel network, even if they were connected via Ethernet cable.

     

    8. Consider Using A “Burner” Laptop When traveling, one of the best ways to stay secure is simply to stay off the grid. If that’s not an option, consider using a temporary, or “burner,” laptop, such as an old laptop (personal) or extra machine (work). “Some companies now have policies where employees who travel abroad travel with a disposable laptop to ensure that no [intellectual property] or secrets available on their machines are stolen,” said Rob Rachwald, director of security strategy at Imperva, in a blog post.

     

    9. Don’t Be Afraid To Hibernate Finally, if your computer has signs of infection, put it to sleep. “If you believe that you were hit, put your computer in hibernate or sleep mode until you can get expert help in repairing or restoring the system,” said Raina at Zscaler. “Taking the system offline as fast as possible can prevent further data [exfiltration] and damage.”

     

    http://www.informationweek.com/news/security/mobile/240000211

     

  • Internet Connectivity To Be denied on Monday 9 July 2012.

    “Monday, 9th of July, at 06:00 (MEZ) the temporary DNS-servers setup by FBIwill be shut down. But still there are still thousands of infected machines – one can wonder, what will happen to them, since malware which was constantly being used by cyber criminals to access confidential data from throughout the world.

    Where the Internet is stored
    Where the Internet is stored (Photo credit: debs)

    Computers in the internet have their own address – the IP-address. There are two versions:

    IPv4 which is a 32-bit address e.g. 195.122.169.23 and

    IPv6 which is a 128-bit address e.g. 2001:db8:85a3:8d3:1319:8a2e:370:7347

    In order to combat the DNS Changer and associated viruses from affecting more people/computers, the FBI has brought out a mechanism through which you can identify whether your computer system is affected by the DNS changer or not. There is also a deadline set by the FBI that is July 9 2012. By this date, computers infected with the DNS Changer will be denied internet access as the FBI might shut down temporary DNS Servers that are infected.

    There is no need to panic as the FBI has put up a robust virus scanning mechanism ( website) through which you can scan your computer and also remove the virus completely as the site also provides a step-by-step guide to remove the infection completely.

     

    What Happened:In November 2011, the FBI identified and located a ring of cyber criminals that had infected more than four million computers across the world with a Trojan known as DNSChanger.  DNSChanger infiltrated both personal and corporate PCs redirecting computers to a set of DNS servers which directed Web searches to malicious Web sites. Beginning in 2007, the cyber ring used a class of malware called DNSChanger to infect approximately 4 million computers in more than 100 countries. There were about 500,000 infections in the U.S., including computers belonging to individuals, businesses, and government agencies such as NASA. The thieves were able to manipulate Internet advertising to generate at least $14 million in illicit fees.This is called “clickjacking” which is a technique where infected users think they are clicking on one website but are actually redirected to the fraudsters advertisement websites so they can get the click revenue stream.

    http://www.varindia.com/FBI_Suspend-Internet-Connectivity.htm

     

    About a quarter-million computer users around the world are at risk of losing internet access on Monday because of malicious software at the heart of a hacking scam that US authorities shut down last November.

    Some blogs and news reports hyped the risk of an outage, warning of a potential ‘blackout’ and describing the Alureon malware as the ‘Internet Doomsday’ virus.

    Yet experts said only a tiny fraction of computer users were at risk, and internet providers would be on call to quickly restore service. They said they considered the threat to be small compared with more-prevalent viruses such as Zeus and SpyEye, which infect millions of PCs and are used to commit financial fraud.

    As of this week, about 245,000 computers worldwide were still infected by Alureon and its brethren, according to security firm Deteque. That included 45,355 computers in the United States.

    The viruses were designed to redirect internet traffic through rogue DNS servers controlled by criminals, according to the FBI. DNS servers are computer switchboards that direct web traffic.

    When authorities took down the rogue servers, a federal judge in New York ordered that temporary servers be kept in place while the victims’ machines were repaired. The temporary servers will shut down at 12:01 am EDT (0401 GMT) on Monday, which means the infected PCs that have not been fixed will no longer be able to connect to the internet.

    Some US internet providers, including AT&T and Time Warner Cable, have made temporary arrangements so that their customers will be able to access the internet using the address of the rogue DNS servers.

    http://articles.timesofindia.indiatimes.com/2012-07-06/internet/32565405_1_internet-providers-servers-internet-access