HID RAPID ID Certified to Serve FL Law Enforcement (See in Action)
Posted on Jul 8, 2022 in Latest Department News, Newsroom, Office of the Governor Press Releases
For video click here
For photos click here
HONOLULU – Gov. David Ige today signed HB2171 establishing a new Department of Law Enforcement (DLE). The last time a new department was formed in the state was over 30 years ago, in 1989, with the creation of the Department of Public Safety.
The new DLE includes the Department of Public Safety’s Law Enforcement Division (State Sheriff Division and Narcotics Enforcement Division) and Internal Affairs Office, Department of Transportation Harbors Division and the Department of the Attorney General’s Criminal Investigative Division. The new department will also include the Department of Defense Office of Homeland Security, and the Hawaiʻi State Fusion Center.
“Hawaiʻi is the only state in the country that doesn’t have a centralized, independent state law enforcement agency. The new department will allow more efficient and effective emergency response, criminal law enforcement, investigations and homeland security operations,” said Gov. Ige.
“The consolidation will centralize command and control for the State’s critical incident management, improve interoperable communications, and the ability to handle complex multi-island investigations and improve overall efficiency of statewide law enforcement operations. The new DLE will also be able to provide additional resources for other law enforcement agencies in both independent and joint operations,” said Jordan Lowe, PSD Deputy Director for Law Enforcement.
The projected timeline for the transition is as follows:
July 1, 2022 – Transition team begins implementation and creation of framework and infrastructure for the new DLE.
July 1, 2023 – Administrative infrastructure is established in the DLE. The process to begin filling all allocated positions begins.
January 1, 2024 – Transfer of Department of the Attorney General non-statutorily mandated investigative functions and related employees, Department of Transportation Harbors Division criminal law…
The US Department of Justice (DOJ), in partnership with law enforcement agencies from several European countries, has taken down a major Russian botnet that had compromised millions of devices worldwide. The botnet was essentially functioning as an underground proxy service provider for criminals, allowing for rental of the IP addresses attached to its collection of hacked IoT devices, Android phones and computers.
RSOCKS is a Russian botnet that has been active since at least 2014, the first point at which its handlers began to advertise it openly on underground forums in the country. Over the years the botnet has amassed millions of devices in its collection, first focusing on compromising poorly secured Internet of Things (IoT) devices but soon moving on to include Android phones/tablets and even computers.
Illicit actors rented access to RSOCKS as a proxy service, primarily for the purpose of brute force / password guessing login campaigns, disguising the sources of traffic for phishing campaigns, and distributed denial of service (DDoS) attacks. This was as simple as accessing a dark web storefront that allowed rental of varying amounts of proxies by the day, ranging in price from $30 for 2,000 to $200 for 90,000.
Tom Garrubba (Risk, Cyber, and Privacy Executive, Shared Assessments) expands on the risk that these bogus proxy services present, and why takedowns of the ones of the magnitude of the Russian botnet are a major cybersecurity win: “It is great to see that law enforcement is making progress towards taking down these large botnets as of late. Botnets are so dangerous because they control large swaths of vulnerable computer systems at a scale unlike any other attack. Those infected computer pools can then be pointed at legitimate resources and cause havoc. Botnets can perform very disruptive attacks like Distributed Denial of Service or large-scale vulnerability exploitation to sell to initial access brokers who will later lend that access to ransomware gangs.”
There are legitimate proxy services in the world, but they cut off customers for engaging in the sort of cyber criminal…
Hanesbrands Inc.
HBI,
said Tuesday it was the subject of a ransomware attack on May 24 and activated business continuity plans and incident response to contain it. Ina regulatory filing, the company said it has informed law enforcement and is cooperating with the investigation. The maker of mens and womens’ underwear has engaged legal counsel, a cybersecurity forensic form and other professionals. “As the Company is in the early stages of its investigation and assessment of this event, the Company cannot determine at this time whether or not such event will have a material impact on its business, operations or financial results,” said the filing. Shares fell 0.7% premarket and are down 27% in the year to date, while the S&P_ 500
SPX,
has fallen 13%.