Tag Archive for: gun’

U of I police taking proactive steps to prevent gun violence in campus areas | Top Stories


CHAMPAIGN, Ill. (WAND) – University of Illinois police said gun violence increased off campus during the 2020-21 school year in a report detailing the events of the year. 

U of I Police Chief Alice Cary said there were no gun violence incidents on campus property, but noted police realize the campus area is “not immune to off-campus issues.” She said police are taking proactive steps to prevent violence on campus, such as increased patrols and looking at technological tools, such as mobile security cameras. 

“Our students and community members should notice an increase in visible police patrols in areas of Campustown that may be more likely to be impacted by violent crime,” Cary said. 

There were few students and staff on campus in the 2020-21 year, police said, so calls for service were down by over 37 percent from the 2018-19 year, which was the last time students were on the U of I campus for the full academic year. 

There were only four alcohol-related citations for the entire 2020-21 year, police said in the Year in Review report, and all of them were for illegal transportation of liquor. In three of the four cases, the driver was also taken into custody for driving under the influence of alcohol. 

No underage drinking or possession citations were issued in 2020-21, U of I police said. 

Click here to see the entire year in review report from police. 

Source…

SOS-2-US – Mobile Security App



The Russian Hackers Playing ‘Chekhov’s Gun’ with U.S. Infrastructure – Homeland Security Today


Over the last half a decade, Russian state-sponsored hackers have triggered blackouts in Ukrainereleased history’s most destructive computer worm, and stolen and leaked emails from Democratic targets in an effort to help elect Donald Trump. In that same stretch, one particular group of Kremlin-controlled hackers has gained a reputation for a very different habit: walking right up to the edge of cybersabotage—sometimes with hands-on-the-switches access to US critical infrastructure—and stopping just short.

Last week the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency published an advisory warning that a group known as Berserk Bear—or alternately Energetic Bear, TEMP.Isotope, and Dragonfly—had carried out a broad hacking campaign against US state, local, territorial, and tribal government agencies, as well as aviation sector targets. The hackers breached the networks of at least two of those victims. The news of those intrusions, which was reported earlier last week by the news outlet Cyberscoop, presents the troubling but unconfirmed possibility that Russia may be laying the groundwork to disrupt the 2020 election with its access to election-adjacent local government IT systems.

In the context of Berserk Bear’s long history of US intrusions, though, it’s much harder to gauge the actual threat it poses. Since as early as 2012, cybersecurity researchers have been shocked to repeatedly find the group’s fingerprints deep inside infrastructure around the globe, from electric distribution utilities to nuclear power plants.

Read more at WIRED

(Visited 1 times, 1 visits today)

Source…

The Russian Hackers Playing ‘Chekhov’s Gun’ With US Infrastructure


In 2017, Symantec discovered the same hackers carrying out a more targeted set of attacks against US energy sector targets. At the time, the security researchers described it as a “handful” of victims, but Thakur now says they numbered in the dozens, ranging from coal mining operations to electric utilities. In some cases, Symantec found, the hackers had gone so far as to screenshot control panels of circuit breakers, a sign that their reconnaissance efforts had gone deep enough that they could have started “flipping switches” at will—likely enough to cause some sort of disruption if not necessarily a sustained blackout. But again, the hackers appear not to have taken full advantage. “We did not see them turning off the lights anywhere,” he says.

Six months later, in February of 2018, the FBI and DHS would warn that the hacking campaign—which they named Palmetto Fusion—had been carried out by Russian state-sponsored hackers, and also confirmed reports that the hackers’ victims had included at least one nuclear power generation facility. The hackers had gained access only to the utility’s IT network, though, not its far more sensitive industrial control systems.

Going Berserk

Today Berserk Bear is widely suspected of working in the service of Russia’s FSB internal intelligence agency, the successor to the Soviet-era KGB. CrowdStrike’s Meyers says the company’s analysts have come to that conclusion with “pretty decent confidence,” due in part to evidence that aside from its foreign infrastructure hacking, Berserk Bear has also periodically targeted domestic Russian entities and individuals, including political dissidents and potential subjects of law enforcement and counterterrorism investigation, all in line with the FSB’s mission.

That’s a contrast with other widely reported state-sponsored Russian hacking groups Fancy Bear and Sandworm, who have been identified as members of Russia’s GRU military intelligence agency. Fancy Bear hackers were indicted in 2018 for breaching the Democratic National Committee and the Clinton campaign in a hack-and-leak operation designed to interfere with the 2016 US presidential election. Six alleged members of Sandworm were indicted by the US…

Source…