FBI, Navajo Nation Investigates Nenahnezad Homicide; Reward Offered

Source: Federal Bureau of Investigation (FBI) State Crime News

The FBI is offering a reward of up to $5,000 for information leading to the identification, arrest, and conviction of the individual(s) responsible for the death of David Russell, Jr.

On January 5, 2020, Russell was found deceased in his residence south of the Chapter House in Nenahnezad, New Mexico, on the Navajo Nation.

The cause of death was blunt force trauma to his head.

Russell was 53 years old.

The FBI and Navajo Nation Division of Public Safety are investigating.

Anyone with information is asked to call the FBI at 505-889-1300 or go online at tips.fbi.gov.

An FBI poster with a photo of Russell can be found at: https://www.fbi.gov/wanted/seeking-info/david-russell-jr.

The FBI Rocky Mountain Safe Streets Task Force Needs Your Help Identifying Three Individuals Suspected of Robbing 10 Banks

Source: Federal Bureau of Investigation (FBI) State Crime News

The FBI Rocky Mountain Safe Streets Task Force and several Denver metropolitan area police departments need your help identifying three individuals who are suspected of robbing ten banks since January 06, 2021. Each robbery was conducted in a “take-over” manner, in which the suspects held bank employees and customers at gunpoint before fleeing. The suspects are considered armed and dangerous.

Suspect #1 is described as a Black male, approximately 5’4” to 5’6” tall with a thin build.

Suspect #2 is described as a Black male, approximately 5’8” to 5’10” tall with a thin build.

Suspect #3 is described as approximately 5’6” to 5’10” tall with a thin build.

The following is the list of banks that the suspects are alleged to have robbed:

  • January 6, 2021
  • Key Bank
  • 10502 East Arizona Place, Aurora, Colorado
  • February 4, 2021
  • BBVA Compass Bank
  • 800 Broadway, Denver, Colorado
  • February 8, 2021
  • Key Bank
  • 12101 East Dartmouth Avenue, Aurora, Colorado
  • February 8, 2021
  • Key Bank
  • 16796 E. Smoky Hill Road, Centennial, Colorado
  • February 9, 2021
  • BBVA Compass Bank
  • 8101 East Belleview, Denver, Colorado
  • February 18, 2021
  • FirstBank
  • 1316 East Evans, Denver, Colorado
  • March 1, 2021
  • Key Bank
  • 6405 East Hampden, Denver, Colorado
  • March 17, 2021
  • FirstBank
  • 8901 East Hampden Avenue, Denver, Colorado
  • March 31, 2021
  • Key Bank
  • 3410 East 1st Street, Denver, Colorado
  • March 31, 2021
  • BBVA Compass Bank
  • 8008 Yarrow Street, Arvada, Colorado

Metro Denver Crime Stoppers will pay up to $2,000 for information leading to an arrest in this case. FirstBank will also pay an additional $10,000 for information that leads to an arrest and conviction on this case.

Please be on the lookout for anyone matching the description of the suspect. Be aware of anyone similar who might have recently changed their spending habits or discussed coming into money suddenly.

Bank robbery is punishable up to a 20-year prison sentence for each offense and increases if a dangerous weapon is used in the commission of the crime. The FBI continues to provide financial institutions with the best practices for security to make them less vulnerable to robberies.

If anyone has any information on the bank robberies above, or any bank robbery, please call the FBI Rocky Mountain Safe Streets Task Force at 303-629-7171; or, you can remain anonymous by calling CRIMESTOPPERS at 720-913-STOP (7867).

The FBI Rocky Mountain Safe Streets Task Force and the Lakewood and Westminster Police Departments Need Your Help Identifying a Bank Robber

Source: Federal Bureau of Investigation (FBI) State Crime News

The FBI Rocky Mountain Safe Streets Task Force and the Lakewood and Westminster Police Departments need your help identifying an individual who robbed the FirstBank located at 10367 Federal Boulevard, Westminster, Colorado, at approximately 4:24 p.m. on Tuesday, March 23rd, 2021. This individual is believed to be the same person who robbed the FirstBank located at 1940 South Kipling Parkway in Lakewood, Colorado, on March 11, 2021, at approximately 4:52 p.m..

The individual is described as a Caucasian or Hispanic male in his mid-20s to early 30s, approximately 5’3” to 5’6” tall with a medium build. In yesterday’s robbery, he was wearing a dark-colored LA Dodgers baseball cap, a dark neck gaiter, a dark-colored jacket, a red or maroon shirt, and khaki-colored pants. He was carrying a dark-colored bag.

Please be on the lookout for anyone matching the description of the suspect. Be aware of anyone similar who might have recently changed their spending habits or discussed coming into money suddenly.

Bank robbery is punishable up to a 20-year prison sentence for each offense and increases if a dangerous weapon is used in the commission of the crime. The FBI continues to provide financial institutions with the best practices for security to make them less vulnerable to robberies.

If anyone has any information on the bank robbery above, or any bank robbery, please call the FBI Rocky Mountain Safe Streets Task Force at 303-629-7171; or, you can remain anonymous and earn up to two thousand dollars ($2,000) by calling CRIMESTOPPERS at 720-913-STOP (7867).

Director Wray Speaks on Civic Education as a National Security Imperative at Center for Strategic and International Studies

Source: Federal Bureau of Investigation FBI Crime News

Washington, D.C.

Remarks prepared for delivery.

Thanks, John. I appreciate the chance to talk about the importance of civic education to our national security and to the FBI’s work. Let me offer a few initial thoughts to set the table, and then I look forward to having more of a conversation with Suzanne.

Maybe the best place for me to start is to define what at least I think of as “civic education.” I’m reminded of something President Reagan said in his farewell address, when he spoke about the need for what he called an “informed patriotism,” one that’s “grounded in thoughtfulness and knowledge.” That strikes me as a pretty good shorthand for what civic education should do: create informed patriots who know our history and understand how our democratic institutions work.

So how does civic education intersect with our national security—and specifically, with the FBI’s work?

In a whole bunch of ways, I think. But for the purposes of our conversation, I’d highlight two, in particular. First, it intersects with some of the threats the FBI and our nation confront today; and second, it can shape how we do our work.

Let me take each of those in turn.

One example of how civic education affects a current national security threat is election security, and more broadly, the problem of malign foreign influence, which has been a top concern for the FBI recently. We’re the lead federal agency for identifying and combating malign foreign influence operations that target U.S. democratic institutions and values—things like the rule of law; free and fair elections; an independent judicial system; and freedom of speech and of the press.

Our adversaries are doing all they can to undermine those institutions and to confuse and divide Americans by spreading disinformation, especially through social media. So the FBI’s been working hard to combat those efforts, along with our partners in government and the private sector. And we’ve had a good deal of success.

But at the end of the day, no amount of FBI investigating can, by itself, sufficiently insulate our country from this threat. Ultimately, our best defense is a well-informed public—citizens who are thoughtful, discerning consumers of all the information that’s out there, and who have a solid understanding of how our democratic institutions work. An American public of informed patriots will be a lot more resilient against these malign influence efforts—and that, in turn, will make it a lot harder for our adversaries to succeed.

The second place where civic education intersects with the FBI’s mission concerns how we do our work of protecting the American people.

One thing I’ve stressed to our folks since I took this job is the importance of process—of making sure we always do the right thing in the right way. We can’t carry out the FBI’s mission without the trust and support of the American people—so we have to make sure we’re always doing our work in a way that’s professional, objective, and that earns—that justifies—that trust and support.

Another way to put it is when people ask the FBI to do something, there’s a unique expectation that it’ll get done “right,” in every sense of that word. We’re the people others turn to when it’s particularly important that something get done right. And the more important it is, the more people turn to us with that expectation. That confidence is at the heart of a lot things we do, like our public corruption investigations, or our civil rights investigations. And that’s a trust the FBI cannot afford to lose.

Civic education comes into play here too, because a well-informed public will have a better understanding of what the FBI really does, and why and how we actually do it. That kind of understanding is important for any government agency—but it’s especially important for us, because we’ve been given such broad powers. Citizens need to know: Is the FBI upholding the Constitution and the rule of law? Are we doing the right thing in the right way?

Take something like our surveillance work, which is crucial for us in catching corrupt public officials, child predators, foreign spies, and terrorists. The FBI can’t surveil someone just because we want to. We have to go to an independent judge to show evidence of probable cause and get a warrant. Or take our FISA authorities. If we suspect someone is a foreign spy or terrorist and we want to listen to their phone calls or read their emails, we’ve got to present evidence and get a warrant from the FISA Court to do that.

When citizens have a good understanding of the Fourth Amendment and how warrants work, and the safeguards we’ve got in place, they’ll have that much more confidence the FBI is using that tool appropriately. And obviously, if we’re not doing things the right way, an informed public will be better prepared to hold us accountable for that.

The last point I’ll make is that to me, civic education is important for helping our FBI workforce understand both the importance of our mission and of doing things in the right way.

When we’re hiring, we’re looking for those “informed patriots,” of course. And once they’re actually on board, their training involves some things you might think of as ongoing “civic education.”

For example, all our new agents and intelligence analysts at Quantico visit the 9/11 Museum in New York. We want them to understand the magnitude of what happened to our country that day, how it changed the Bureau, and how crucial our counterterrorism work remains almost two decades later. They also visit the Holocaust Museum, to experience in a gut-level way the horror of what can happen when people in government abuse their power. And they visit the Martin Luther King Memorial in Washington, as a reminder of how the FBI itself hasn’t always used our authority in the right way.

All of these things drive home, each in its own way, the stakes of our work—the sheer impact we can have, good or bad, on all the citizens counting on us. If our employees can recognize the abuse of power, and understand how our own organization has sometimes fallen short, they’ll be less likely to make those same mistakes.

So those are a few reasons, from our perspective at the FBI, why civic education is critical to our national security—and I’m happy to drill into some of these topics with Suzanne more deeply in a second.

Thanks again for focusing on this issue and for including me.

More:

Understanding and Responding to the SolarWinds Supply Chain Attack: The Federal Perspective

Source: Federal Bureau of Investigation FBI Crime News

Washington, D.C.

Statement for the Record

Chairman Peters, Ranking Member Portman, and members of the committee, thank you for the invitation to provide remarks on the FBI’s role in the Cyber Unified Coordination Group (UCG) in relation to the recent SolarWinds intrusion.

The SolarWinds incident is the latest in a long line of malicious cyber activity that threatens the health and safety of the American people and the national and economic security of our country. The individuals who conduct cyber intrusions, and the officials who direct or condone them, believe they can compromise United States networks, steal our financial and intellectual property, and hold our critical infrastructure at risk, all without incurring risk themselves.

The FBI sits at the convergence of United States government efforts to change this risk calculus. As a member of both the law enforcement and intelligence communities, with domestic and international reach, the FBI is focusing our unique authorities, and our ability to engage with international law enforcement, domestic victims, and key technology service providers, to illuminate how foreign actors are using global infrastructure to compromise United States networks.

We do this not just to understand the malicious activity but also, by enabling the actions of our public and private partners as well as our own, to disrupt it and impose a cost. Our cyber strategy, announced by Director Wray in September, is focused on imposing risk and consequences on cyber adversaries—whether they are acting to benefit criminal enterprises or foreign powers.

Key to our strategy is using the information and insight we develop through our investigations to support our full range of public and private sector partners who defend networks, build international partnerships, sanction destabilizing behavior, collect foreign intelligence, and conduct cyber effects operations. Our collective actions to combat cyber threats are most impactful when they are joint, enabled, and sequenced for maximum impact.

The FBI and Cyber Incident Response

In December 2020, the FBI, the Cybersecurity Infrastructure and Security Agency (CISA), and the Office of the Director of National Intelligence, with support from the National Security Agency, formed a Cyber UCG to coordinate the response to the SolarWinds incident, as provided for in Presidential Policy Directive (PPD) 41. PPD-41’s principles guiding the federal response to a significant cyber incident include balancing national security and investigative requirements, which the FBI leads through a line of effort called threat response, and restoration and recovery, which CISA leads through a line of effort called asset response. These are complementary efforts in which our responders coordinate engagement with victims. And the information we learn through our investigation identifies new victims and indicators that help inform CISA’s response, and vice versa.

The FBI’s approach to threat response is informed by our joint law enforcement and intelligence mission. We know the adversary’s goal is not just to compromise a network; it is to use that compromise in furtherance of a larger objective. That means we need to not only understand what happened to each victim, but also tie together the larger picture by integrating what we learn in our investigation with available intelligence on adversary plans, intentions, and activities, as well as information from our prior and ongoing investigations. And then, we translate that understanding into action against the adversary.

In this investigation, we are using all the tools at the FBI’s disposal to identify the following: first, those who have suffered an intrusion, and those who may be targeted next; second, who conducted the activity and how; and third, opportunities to pursue, disrupt, and hold accountable those responsible.

Our work has shown that of the more than 16,000 affected public and private sector customers of the SolarWinds Orion product, a much smaller number have been compromised by follow-on activity on their systems. We have so far identified nine federal agencies that fall into this category, and fewer than 100 non-government entities. We continue to investigate, and information we learn through legal process or voluntary disclosure may change this assessment.

The FBI, our fellow intelligence community agencies, and CISA have seen and warned of China’s and Russia’s efforts to inject malicious code into software programs, undermining our trust not only in the programs we all rely on, but also in the automated updates that are supposed to increase our security, not compromise it.

Russia conducted the most damaging cyber attack in history, NotPetya, by inserting malicious code into a seemingly routine update for Ukrainian accounting software, starting a global chain of events that crippled shipping companies, pharmaceutical manufacturers, and hospitals. The Russian government hackers responsible for that and many other destructive attacks were indicted in October 2020.

Last July, we issued an alert that the software China’s Tax Bureau mandates that United States companies use in order to operate within China’s market contained malware that installed a hidden backdoor to the networks of organizations using the software. At least two Western companies operating in China detected malware that was delivered through Chinese vendors that were responsible for releasing upgrades to the software.

We have also seen intrusions by both nation states and cyber criminals into managed service providers, where, by infecting one system, they can access the networks of hundreds of potential victims.

The SolarWinds intrusion takes all of this to yet another, more dangerous level. By purposely infecting a product widely used by enterprises to manage their networks, the adversary gained widespread access and visibility, and executed their plan with a degree of sophistication, tradecraft, and thoroughness that made it extremely difficult to detect.

For the FBI, this has been a national response, managed by the FBI’s Cyber Division, whose personnel I am honored to lead. Our agents have been in direct contact with victims and with private industry partners with evidence that has helped us identify who is compromised and who is vulnerable. Our technically trained incident response assets throughout the country, collectively known as our Cyber Action Team, have assisted affected entities. Our field offices with experience in complex national security cyber investigations are our hubs for triaging the data we acquire through legal process, from partners, and through other lawful means. And our digital forensics and intelligence personnel are exploiting that information for indicators and intelligence that will help us to attribute the activity to those responsible, and to disrupt them and cause them pain.

Conclusion

The SolarWinds incident shows the investments in time, money, and talent our adversaries are willing to make to conduct malicious cyber activity against us, and the importance of shifting their risk calculus to make all this effort not worth their while. It drives home what we already know—that only a whole-of-society approach will be effective against these threats.

In that vein, we truly appreciate the proactive cooperation of the private sector in this incident. It has made a difference in the UCG’s ability to investigate it, mitigate it, and learn from it. It has also highlighted how vital private sector cooperation is to our broader work protecting America from cyber threats. The virtuous cycle we can drive when we work together has been on display in the SolarWinds response: information from the private sector fuels our investigations, allows us to identify evidence and adversary infrastructure, and enables us to hand off leads to intelligence and law enforcement partners here and abroad. Our partners then put that information to work and hand us back more than we started with, which we can then use to arm the private sector to harden itself against the threat. By leaning into our partnerships, all of us who are combating malicious cyber activity become stronger while we weaken the perpetrators together.

Another aspect of our work with the private sector that this incident has highlighted is the importance of speed. Information about an intrusion is a lot more helpful the day it is discovered than it will be months later. Quick action from the private sector in this incident was an enormous public service, but the fact is, we are not always so fortunate in the speed with which we obtain the evidence we need. The FBI uses the full range of its authorities, including the Foreign Intelligence Surveillance Act, human sources, and other national security tools as well as criminal legal process, to learn how foreign adversaries are using U.S. infrastructure to target victims. We and every other part of the United States government that operates inside the United States uphold the Constitution and our laws, which require specificity, and often probable cause and prior court authorization, before we issue compulsory process. So there is no substitute for quick, voluntary action by private owners of U.S. networks and infrastructure when we seek to act quickly against a threat.

The FBI, with our fellow UCG members, will continue taking every necessary action to investigate this incident, identify and hold accountable those responsible, and share information with our partners and the American people. We are focused not only on how we will confront the unique challenges we face in cyberspace, but also why we pursue our cyber mission: so the American people can have safety, security, and confidence in our digitally connected world.

Chairman Peters, Ranking Member Portman, and members of the committee, thank you for the opportunity to testify today. I am happy to answer any questions you might have.