Defense News: NATO Partners with NPS for Climate Security Education

Source: United States Navy

NATO’s Centre for Maritime Research and Experimentation (CMRE) and NPS collaborated to launch their first Climate Change and Security course on September 23, 2024. The course supported common objectives in the Secretary of the Navy’s Climate Action 2030 strategic plan, as well as the Naval Education Strategy to address common challenges and enhance partnerships through opportunities to learn alongside our allies and partners.

According to scientific attribution studies, the record-breaking hot sea surface temperatures that fueled recent hurricanes Helene and Milton were both stronger and more destructive to communities in the southeastern United States due to global warming induced climate change. The U.S. is not alone.

It’s climate disasters like these, occurring across the planet, that make cooperation between international partners and allies more critical than ever when building resiliency and finding sustainable solutions to the global security threats caused by the intensifying worldwide climate crisis.

“The weeklong course was designed for mid-career government officials and military officers who are responsible for supporting senior staff in strategic decision-making that addresses climate change and security issues,” said NPS researcher Kristen Fletcher, who helped develop, organize, and co-lead the course for NPS.

Fletcher, who cofounded the NPS Climate and Security Network, emphasized the importance of the interactions between the attendees. 

“The course is more than information sharing and analysis of the extremely challenging problems that climate change poses to military operations,” she said. “It also creates a strong network for attendees to share experiences, find ongoing support, and continue working together when they return home.”

In attendance were faculty and participants from 19 countries, which included NATO members Belgium, Canada, Czech Republic, Denmark, France, Germany, Italy, Latvia, Lithuania, Netherlands, Norway, Slovenia, Spain, Sweden, U.K. and U.S. Attendees from Australia, Austria and Switzerland, which are NATO partner countries, also participated.

Paul Rushton, the course’s NATO co-lead, serves as the lead for the Climate Change and Security team in NATO’s Innovation, Hybrid and Cyber Division (IHC). He believed the course was the first step toward fulfilling crucial needs of the nations.

“There’s a huge demand for dedicated climate change and security training, especially with a focus on military and security sector stakeholders,” Rushton said. “There’s a genuine gap at the moment. We intend to take the lessons that we’ve learned from this course, build on this experience, and use it as part of the foundation for our next courses.”

On March 7, 2024, Sweden became the newest member of NATO, following Finland, which had become a NATO member in 2023.

“We are new to NATO, so it’s a great opportunity to learn more about their work,” said Jenny Lundén, the head of Branch Capability Development for the Swedish Defense Research Agency. “I think the NATO network and community are very important.”

As with the other attendees, she sees the impacts of human-made climate change firsthand. 

“We see a shift in the seasons,” she said. “Winter comes later, and summer has become longer. And it’s warmer in the north.”

A former Arctic ice researcher, Lundén continued, “In supporting future studies for the Swedish armed forces, climate change and security plays an important role because it affects the operation of the military.”

During the course, content sessions included climate change science, energy security, operational impacts, resiliency, and financial and policy topics. A tabletop exercise also ran throughout the course, allowing participants to break into teams that focused on science and environment, security impacts, human and social impacts, and operational challenges of climate change covering three different regions—the Arctic/High North, Eastern Flank, and Middle East and North Africa.

Policy officer Marijana Petrov, who attended from the Czech Republic’s Ministry of Defense, recognized the valuable opportunity for her country to learn more about climate security and to engage with the other nations. 

“I’ve been having a lot of discussions with colleagues from other countries who are steps ahead of where we are. So, it’s very useful for me to hear about their approaches and best practices,” she said.

In what’s becoming a frightfully too common severe event around the globe, only 10 days prior to the course, extreme rain caused catastrophic flooding in the Czech Republic and the surrounding countries, including Germany, Austria, Slovakia and Poland. One Czech town received 435 mm (17 inches) of rainfall over three days, while flooding put another town 80 percent underwater.

“A priority is defining questions that we need to ask ourselves at the ministry,” Petrov added. “I’m bringing back ideas to set for climate change and security goals, and I hope we can implement them.”

Inadequate or nonexistent climate change and security policies inhibit the ability of the military to meet their operational responsibilities, which threaten the security of nations and global stability.

A recent law school graduate and fellow of the inaugural class of the NPS-Stanford Climate Security Fellowship, Rebecca Grippo helped organize the course and presented two sessions related to economics, policy, and law.

“Climate change case law is indicative of policy trends but is also setting them,” Grippo explained. “We’re seeing a lot that concerns the military right now, so we must have a very good understanding of the policies that govern what the military can and cannot do. This will show what isn’t working well enough and what more needs to be done.”

Recognizing the importance of collaboration between the Department of Defense (DOD) and NATO allies needed to address the climate crisis, Grippo was excited by the large number of countries in attendance. Joining forces with the Navy, the U.S. Army fielded both faculty and participants.

“We focus on what the Army’s impact is on the environment, but also what the environment’s impact is on the Army. So, climate change falls within this realm,” said Army Lt. Col. Matt Horwatt, director of Environmental Security to the Assistant Secretary of the Army, Installations, Energy & Environment (ASA IE&E) and a member of NATO’s Environmental Protection Working Group.

“In this course, I’m seeing professionals who are looking at climate change and security from all different angles, all different countries, all different positions and all different areas of influence where they can actually make change,” he said. “I think that’s really encouraging. And I think having the tools to help us translate decision making into a form that our senior leaders and policymakers can understand and appreciate is a phenomenal resource.”

Horwatt is also part of the leadership that started the U.S. Army War College Environmental Security Scholars Program this year. Like the NPS-Stanford Climate Security Fellowship, which started last year and is now beginning its second class, the Army scholars study climate change. In addition, their concentration also encompasses the multifaceted aspects of environmental security needed to maintain or gain strategic advantages.

“For too long, the military as a whole has focused on the three B’s—beans, bodies, and bullets. That’s usually what drives resourcing and missions,” said Horwatt. “But there’s a fourth aspect to consider—the environment. If we’re not taking care of our environment and natural resources, then what are we fighting for? Who are we actually protecting? At the end of the day what we want is to help people and their communities.”

Participants said the curriculum and collaboration were exceptional, and NPS and NATO planners are looking to continue with future climate and security courses in 2025.

Florida Man Pleads Guilty to Biofuel Fraud Conspiracy

Source: United States Department of Justice Criminal Division

A Florida man pleaded guilty today for his role in a scheme that generated over $7 million in fraudulent Environmental Protection Agency (EPA) renewable fuels credits and sought over $6 million in fraudulent tax credits connected to the purported production of biodiesel.

According to court documents, Royce Gillham was the general manager of a biofuel company based in Fort Pierce, Florida, that produced and sold renewable fuel and fuel credits and claimed to turn various feedstocks into biodiesel. When reporting the number of gallons produced to the IRS and EPA, Gillham and his employer vastly overstated their production volume in an effort to generate more credits. When auditors sought more information from the company, Gillham and his co-conspirators provided false information about their fuel production and customers.

Gillham pleaded guilty to conspiring to commit wire fraud and to filing false claims. A sentencing date has not yet been scheduled. He faces a maximum penalty of five years in prison and a $250,000 fine for the conspiracy count. A federal district court judge will determine whether to accept the plea agreement after considering the U.S. Sentencing Guidelines and other statutory factors.

Assistant Attorney General Todd Kim of the Justice Department’s Environment and Natural Resources Division, U.S. Attorney Markenzy Lapointe for the Southern District of Florida, Special Agent in Charge Stefanie Hipkins of IRS Criminal Investigation (IRS-CI)’s Miami field office and Acting Special Agent in Charge Leslie Carroll of the EPA’s Criminal Investigation Division (EPA-CID) made the announcement.

EPA-CID and IRS-CI investigated the case.

Senior Trial Attorney Adam Cullman of the Environment and Natural Resources Division’s Environmental Crimes Section and Assistant U.S. Attorney Daniel Funk for the Southern District of Florida are prosecuting the case.

Businessman Pleads Guilty to Export and Tax Charges in Connection with Shipments of Sensitive Technology to Russia

Source: United States Department of Justice Criminal Division

Ilya Khan, 66, a national of the United States, Israel, and Russia, pleaded guilty today to conspiracy to violate the Export Control Reform Act for his role in a transnational, multi-million-dollar scheme to secure and illegally export dual-use semiconductors and other sensitive technology to Joint Stock Company Research and Development Center ELVEES (Elvees) and other entities in Russia. Elvees, one of the leading Russian developers of microchips, was sanctioned by the U.S. government in 2022 for contributing to Russia’s security services, military, and defense sectors. Kahn also pleaded guilty to attempted tax evasion for failing to pay taxes on the illicit income he earned from the scheme.

“Today’s guilty plea is another step towards stopping the illicit flow of technology to support the Russian war machine,” said Assistant Attorney General Matthew G. Olsen of the Justice Department’s National Security Division. “The department will continue to do all that we can to disrupt the illegal export of sensitive dual-use electronics to our adversaries and protect our national security.”

“Kahn’s brazen, multi-million dollar scheme to illegally supply semiconductors to companies tied to Russia’s intelligence service and military was doomed to fail, due to the exemplary investigative work of U.S. law enforcement,” said Assistant Secretary for Export Enforcement Matthew S. Axelrod of the Department of Commerce, Bureau of Industry and Security (BIS).  “The Department of Commerce and our partners remain laser-focused on disrupting the illicit procurement networks used to acquire the technology needed to power the Russian war machine.”

“The illegal export of goods and technology to Russia is a threat to U.S. economic and national security,” said Executive Assistant Director Robert Wells of the FBI’s National Security Branch. “Whether it’s commercial goods or military-use technology, illegal exports have the potential to cause significant harm. Ilya Khan’s conviction demonstrates the resolve of the FBI and its partners to protect our citizens and our country.”

“Semiconductors and other advanced electronics are the lifeblood of Russia’s war machine, and Kahn’s circumvention of U.S. export controls was critical to Russia’s chip design and manufacturing capacity,” said U.S. Attorney Breon Peace for the Eastern District of New York. “Today’s plea marks a significant step in protecting the national security of the U.S. and our allies and partners abroad. We will continue to use all our law enforcement and national security tools to hold individuals and corporations accountable for flouting the law to aid sanctioned entities in Russia and elsewhere.”

“Kahn’s multi-million dollar business threatened the national and financial security of our country,” said Chief Guy Ficco of IRS Criminal Investigation (IRS-CI). “In addition to illegally exporting sensitive technology to entities in Russia, he circumvented our tax laws by not reporting his income or paying taxes on his ill-gotten gains. Uncovering financial crimes, especially those that look to weaken the stability of our country will continue to be a priority for our agency.”

Kahn is the owner of Senesys Incorporated and Sensor Design Association, which operated in California and Brooklyn, New York. Kahn operated these businesses — ostensibly involved in “security software development” and the testing of silicon wafers for military, avionics and space users — as fronts for a years’ long conspiracy to acquire and export sensitive and sophisticated, dual-use electronics from the United States to Elvees in Russia. Many of these items required an export license due to national security and anti-terrorism reasons, which Kahn did not obtain.

Kahn also arranged for Elvees to continue to fabricate and import semiconductors after Russia’s February 2022 invasion of Ukraine. These semiconductors can be used for, among other things, communications systems, GPS receivers, and equipment for military unmanned aerial vehicles, also known as drones. In doing so, Kahn utilized a transnational network of front companies and bank accounts to ship those semiconductors to Russia following the invasion of Ukraine, often arranging for the semiconductors to be sent to the U.S. and then re-exported to Russia via China and other locations around the world.

In March 2022, the Commerce Department added Elvees to the Entity List, imposing a license requirement to export any item subject to the Export Administration Regulations to Elvees, and stating that it would review license applications under a policy of denial. Despite these sanctions, Kahn continued to work with Elvees. For example, in May 2022, Kahn emailed a Taiwanese manufacturer design guidance for an Elvees-branded microchip. Subsequently, Kahn shipped thousands of units of this microchip to a Hong Kong-based shipping company, and then to a company located in the mainland of the People’s Republic of China. Kahn noted in communications with the Hong Kong shipping company that he received a “call from Russia” about the PRC business to which he was directing the goods.

Kahn’s export activity for the benefit of Elvees dates to at least 2012, and accounts under his control received more than $50 million from Elvees and related entities between 2012 and 2022. Of that money, Kahn channeled nearly $5 million for his personal use, which he did not report to the IRS and on which he did not pay income taxes. As part of his plea, Kahn agreed to forfeit $4,923,548.94 in ill-gotten gains and to pay an additional $1,892,816.00 in restitution to the IRS.

Khan faces a maximum penalty of 20 years in prison.

The FBI Los Angeles Field Office investigated the case.

Assistant U.S. Attorneys Artie McConnell and Matthew Skurnik for the Eastern District of New York and Trial Attorney Scott Claffee of the National Security Division’s Counterintelligence and Export Control Section are prosecuting the case. The U.S. Attorney’s Office for the Central District of California assisted in the prosecution.

Today’s actions were coordinated through the Justice and Commerce Departments’ Disruptive Technology Strike Force and the Justice Department’s Task Force KleptoCapture. The Disruptive Technology Strike Force is an interagency law enforcement strike force co-led by the Departments of Justice and Commerce designed to target illicit actors, protect supply chains, and prevent critical technology from being acquired by authoritarian regimes and hostile nation states. Task Force KleptoCapture is an interagency law enforcement task force dedicated to enforcing the sweeping sanctions, export restrictions and economic countermeasures that the United States has imposed, along with its allies and partners, in response to Russia’s unprovoked military invasion of Ukraine.

Maryland Business Owner Pleads Guilty for Scheme to Bribe Texas-Based U.S. Customs and Border Protection Official

Source: United States Department of Justice Criminal Division

A Maryland man pleaded guilty today for his role in a bribery scheme to give kickbacks to a U.S. Customs and Border Protection (CBP) official in exchange for the official’s efforts to influence the award of lucrative federal contracts.

According to court documents, Christopher “Mac” Cassity, 51, of Glenwood, was charged in a single-count criminal information with honest services wire fraud, pursuant to a written plea agreement. As part of the plea agreement, Cassity admitted that, between July 29, 2019, and Dec. 29, 2022, he and Public Official A, an information system security officer residing in Pharr, Texas, devised and executed a bribery scheme in which Cassity paid Public Official A kickbacks in exchange for Public Official A taking official action to influence the award of CBP contracts to businesses that would subcontract with Cassity’s business, IVV Solutions. Specifically, Public Official A directed and pressured CBP contracting officials to select contractors, who bid on contracts to upgrade CBP’s information security system in various CBP facilities, from a list of contractors that Public Official A knew would then subcontract with IVV Solutions to provide “independent verification and validation services.”

According to court documents, Cassity’s business received approximately $814,570 in payments related to CBP contracts during the bribery scheme. In return, Cassity made approximately 58 kickback payments to Public Official A, totaling approximately $443,125. To conceal the scheme, Cassity transmitted the kickback payments by wire from IVV Solutions’ bank accounts to bank accounts in the name of conduits of Public Official A, which were controlled and used by Public Official A.

Cassity is scheduled to be sentenced on Feb. 10, 2025, and faces a maximum penalty of 20 years in prison. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

Principal Deputy Assistant Attorney General Nicole M. Argentieri, head of the Justice Department’s Criminal Division; U.S. Attorney Alamdar S. Hamdani for the Southern District of Texas; and Assistant Commissioner Matthew Klein of CBP’s Office of Professional Responsibility (OPR) made the announcement.

CBP OPR is investigating the case.

Trial Attorney Demetrius D. Sumner of the Criminal Division’s Public Integrity Section and Assistant U.S. Attorney Steven Schammel for the Southern District of Texas are prosecuting the case.

Mississippi District Attorney, Mayor of Jackson, and Jackson City Council Member Charged with Bribery and Other Offenses

Source: United States Department of Justice Criminal Division

An indictment was unsealed today in the Southern District of Mississippi charging Hinds County District Attorney, Jody E. Owens II, 43; Mayor of Jackson, Mississippi, Chokwe Antar Lumumba, 41; and former President and current member of the Jackson City Council, Aaron Banks, 47, all of Jackson, with participating in a bribery scheme to enrich themselves. Owens, Lumumba, and Banks are scheduled to make their initial court appearances today before U.S. Magistrate Judge LaKeysha Greer Isaac in Jackson.

“The indictment alleges that Jackson’s mayor, the district attorney in Jackson, and members of Jackson’s city council conspired to accept bribes in exchange for official acts benefiting purported real estate developers,” said Principal Deputy Assistant Attorney General Nicole M. Argentieri, head of the Justice Department’s Criminal Division. “Officials who abuse their positions of authority to enrich themselves undermine public confidence in government. The Justice Department is committed to restoring that confidence by working with its law enforcement partners to investigate and prosecute public corruption.”

“Leaders who are awarded the public’s trust should be focusing on the needs of the Jackson community, not looking to line their own pockets and benefit themselves,” said U.S. Attorney Todd Gee for the Southern District of Mississippi. “As alleged in the indictment, from campaign donations generated through laundered money to stacks of cash bribes, the members of this conspiracy allegedly offered and accepted bribes in exchange for official acts. The Justice Department is committed to investigating and prosecuting bribery and other forms of public corruption.”

“Our citizens are entitled to decisions based on the best interests of the public, not corrupt public officials,” said Assistant Director Chad Yarbrough of the FBI Criminal Investigative Division. “No one is above the law, and the FBI is committed to ensuring that those who cross the line and violate the public’s trust are held accountable for their unlawful actions.”

As alleged in the indictment, between approximately October 2023 and May 2024, Owens facilitated bribe payments to public officials in Jackson on behalf of two FBI undercover employees posing as real estate developers (the Developers) in exchange for at least $115,000 and the promise of future financial benefit. Owens instructed the Developers that, for their project to succeed, they needed to secure the support of certain public officials in Jackson through bribery. Those public officials included Mayor Lumumba, Councilman Banks, and former Jackson City Councilwoman Angelique Lee. Owens instructed the Developers how much, where, and when to bribe those officials.

As part of the scheme, Mayor Lumumba accepted a bribe payment of $50,000 from the Developers in exchange for exerting his influence and taking official action relating to the Developers’ proposed project in downtown Jackson. As directed by Owens and Lumumba, the bribe payments were concealed as five $10,000 campaign-donation checks from third-party entities and individuals, including Owens. Lumumba then laundered that money through his campaign account before cashing out a portion of the payment.

The indictment also alleges that, as part of the scheme, Councilman Banks solicited a $50,000 bribe in exchange for his votes in support of the Developers’ proposed project in downtown Jackson. Banks accepted an initial payment of $10,000 in cash, along with a promise to provide funding for the employment of a family member and a protective detail service.

As part of the scheme, former Councilwoman Lee allegedly accepted a $10,000 debt repayment, $3,000 in cash, and a shopping trip worth approximately $6,000 in luxury goods in exchange for her votes in support of the Developers’ proposed development project in downtown Jackson.

Additionally, the indictment alleges that, on May 22, an FBI agent approached Owens, identified himself as an FBI agent, and asked Owens about his involvement in the bribery scheme. During the interview, Owens made material false statements to the FBI agent.

Owens is charged with one count of conspiracy to commit federal program bribery, honest services wire fraud, and money laundering, and, if convicted, faces a maximum penalty of five years in prison for the charge; three counts of federal program bribery, and faces a maximum penalty of 10 years in prison for each charge; one count of using a facility in interstate commerce in furtherance of unlawful activity, and faces a maximum penalty of 20 years in prison for the charge; one count of honest services wire fraud, and faces a maximum penalty of 20 years in prison for the charge; one count of money laundering, and faces a maximum penalty of 20 years in prison for the charge; and one count of lying to federal officers, and faces a maximum penalty of five years in prison for the charge.

Lumumba is charged with one count of conspiracy to commit federal program bribery, honest services wire fraud, and money laundering, and, if convicted, faces a maximum penalty of five years in prison for the charge; one count of federal program bribery, and faces a maximum penalty of 10 years in prison for the charge; one count of using a facility in interstate commerce in furtherance of unlawful activity, and faces a maximum penalty of 20 years in prison for the charge; one count of honest services wire fraud, and faces a maximum penalty of 20 years in prison for the charge; and one count of money laundering, and faces a maximum penalty of 20 years in prison for the charge.

Banks is charged with one count of conspiracy to commit federal program bribery, honest services wire fraud, and money laundering, and, if convicted, faces a maximum penalty of five years in prison for the charge, and one count of federal program bribery, and faces a maximum penalty of 10 years in prison for the charge. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

The FBI is investigating the case.

Trial Attorneys Nicholas W. Cannon and Madison H. Mumma of the Criminal Division’s Public Integrity Section and Assistant U.S. Attorneys Charles W. Kirkham and Kimberly T. Purdie for the Southern District of Mississippi are prosecuting the case.

An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.