Defense News: The Secretary of the Navy Exonerates 256 Defendants from 1944 Port Chicago General and Summary Courts-martial

Source: United States Navy

The Honorable Carlos Del Toro, Secretary of the Navy, made the announcement on the 80th anniversary of an explosion that occurred at Port Chicago Naval Magazine in California. The explosion killed 320 people, injured 400 others, destroyed two ships and a train, and caused damage to the nearby town of Port Chicago.

Secretary Del Toro expressed his deepest condolences for the Sailors, civilians, Coast Guardsmen, members of the U.S. Maritime Service, and one Marine who lost their lives and for their family members.

Following the 1944 explosion, white supervising officers at Port Chicago were given hardship leave while the surviving African-American Sailors were ordered back to work. The circumstances surrounding the disaster were reflective of the Navy’s personnel policies at the time, which barred African-American Sailors from nearly all seagoing jobs. Most of the Navy ordnance battalions assigned to Port Chicago Naval Magazine and similar facilities were comprised of African-American enlisted personnel and white officers.

In the absence of clarity on the explosions or further safety training, 258 African-American Sailors refused to resume ammunition handling. After threats of disciplinary action, 208 of the Sailors returned to work; however, the Navy still subsequently convicted all 208 Sailors at a summary court-martial for disobeying orders.

The Navy sentenced each of the summary court-martial defendants to a Bad Conduct Discharge and forfeiture of three month’s pay. During subsequent reviews of the summary court-martial, the Bad Conduct Discharges were suspended, the forfeitures reduced, and one conviction was set aside for insufficient evidence.

The remaining 50 Sailors continued to refuse to return to work and were charged with mutiny. The Navy later convicted all 50 Sailors (who came to be called the “Port Chicago 50”) of mutiny at a mass general court-martial. Each of these defendants was sentenced to a Dishonorable Discharge, fifteen years confinement at hard labor, reduction in rate to E-1, and total forfeitures of their pay.

During subsequent reviews of the general court-martial, the Dishonorable Discharges were suspended and the period of confinement was reduced from 15 years to 17-29 months. One conviction was also set aside for mental incompetency. By January 1946, nearly all the Sailors were released and given the opportunity to finish their contracts.

“The Port Chicago 50, and the hundreds who stood with them, may not be with us today, but their story lives on, a testament to the enduring power of courage and the unwavering pursuit of

justice,” said Secretary Del Toro. “They stand as a beacon of hope, forever reminding us that even in the face of overwhelming odds, the fight for what’s right can and will prevail.”

After a thorough review of the case and related materials, the General Counsel of the Navy concluded that there were significant legal errors during the courts-martial. The defendants were improperly tried together despite conflicting interests and denied a meaningful right to counsel.

The courts-martial also occurred before the Navy’s Court of Inquiry report on the Port Chicago explosion was finalized, which certainly would have informed their defense and contained nineteen substantive recommendations to improve ammunition loading practices.

Following the Navy’s most recent review, Secretary Del Toro fully exonerated the remaining 256 defendants of the 1944 Port Chicago general and summary courts-martial.

If any family members of the defendants of the 1944 Port Chicago general and summary courts-martial would like to reach out to the Department of the Navy for future notifications on the topic or more information, please reach out to PortChicago@us.navy.mil, or 703-697-5342.

For questions related to this release, contact the U.S. Navy Office of Information at CHINFONewsDesk@us.navy.mil or 703-697-5342.

Defense News: Navy Entomology Center of Excellence Change of Charge

Source: United States Navy

During the proceedings, the Commanding Officer of Navy and Marine Corps Force Health Protection Command, Capt. Marion Gregg, guest speaker for the event, also presented Sutherland with a Meritorious Service Medal.

In the true fashion of an entomologist, Sutherland gave his remarks at the ceremony with the help of some insects. To commemorate the U.S. Navy’s 248th year of existence, Sutherland had 248 Aedes aegypti mosquitoes released inside of a seven-foot cube to join him during his speech. To NECE’s knowledge, this is the first-time mosquitoes have been utilized in a change of charge ceremony.

NECE plays a critical role in safeguarding the health and operational readiness of naval forces. NECE’s mission revolves around providing expertise in entomology and pest management to ensure the health, safety, and operational effectiveness of Navy forces worldwide. This includes developing strategies for pest control aboard ships, submarines, and naval installations. NECE also provides operational medical entomology and pest management training to DOD military and civilian personnel and is the program manager for all Navy shipboard pest management. NECE plays a key role in supporting national strategic interests though engagement and exchange with foreign health and military partners.

Defense News: Pearl Harbor Naval Shipyard and Intermediate Maintenance Facility Welcomes ASC Personnel

Source: United States Navy

The ASC employees will be trained and certified on various aspects of submarine maintenance to support the AUKUS Pillar 1 program that is supporting Australia’s acquisition of sovereign conventionally armed, nuclear-powered submarines.
“After months of preparation, we are excited to welcome the Australian maintainers into our shipyard family. The intensive training process they will undergo over the next few years will lay the groundwork for them to ultimately lead and execute their own maintenance operations,” said Capt. Ryan McCrillis, commanding officer of PHNSY & IMF.

In July 2023, PHNSY & IMF was chosen as the Naval Supervising Authority and Lead Maintenance Activity for Submarine Rotational Force – West (SRF-W) at HMAS Stirling in Western Australia. SRF-W will host up to four U.S. Virginia-class submarines and one UK Astute-class submarine, starting as early as 2027. Routine intermediate maintenance work, which does not require dry-docking the submarines and takes weeks – rather than months or years – to complete, will be planned and executed by ASC’s trained workforce and certified by PHNSY & IMF personnel.

“Conducting joint training and working side-by-side with our Australian colleagues is critical to building the essential knowledge needed to fully support SRF-W,” McCrillis added. “This training evolution, which focuses on technical maintenance skills, strengthens our own readiness, ensuring warfighters are equipped to carry out their complex mission.”

The first cohort of ASC personnel will receive a mix of classroom instruction and hands-on experience covering radiological controls, nuclear engineering, non-nuclear engineering and quality assurance. The training durations will vary based on the specific trades and disciplines being taught. Once they complete their training, the ASC personnel will return to Australia appropriately qualified and skilled to conduct Virginia-class maintenance, under U.S. supervision, during routine U.S. submarine port visits to HMAS Stirling. Australia and the United States expect more than 100 ASC personnel to start training at PHNSY & IMF over the next twelve months.

“We are ushering in a new era for our submarine maintenance workforce,” said Rear Adm. Matt Buckley, Head of Nuclear Submarine Capability within the Australian Submarine Agency. “By leveraging the U.S. and UK’s decades-long expertise, we are learning from the best to develop our own world-class sovereign nuclear-powered, conventionally armed submarine force. The 28 ASC personnel, combined with more than thirty Royal Australian Navy personnel who joined the crew of U.S. submarine tender USS Emory S. Land (AS 39) this year, represent the cornerstone of our future submarine force maintenance workforce.”

“The AUKUS partners share a commitment stretching back over a century to preserving democracy and maintaining an international rules-based order,” said Rear Adm. Lincoln Reifsteck, program manager, AUKUS Integration and Acquisition Office. “Thanks to bipartisan Congressional support last year to pass legislation allowing us to train Australian maintenance personnel in our public shipyards, we continue to make progress toward establishing Australia’s sovereign, conventionally-armed, nuclear-powered submarine force in support of our shared vision of a free, open, and stable Indo-Pacific.”

PHNSY & IMF is also hiring additional personnel to support training hundreds of Australian maintainers.

“The shipyard is growing, so we will continue to hire to meet the needs of our fleet while adding additional personnel to support the increased training demand,” said McCrillis. “Our efforts will not only support Australia’s goal to build a sovereign SSN capability, but also provide real benefits to the U.S. Navy mission in the Indo-Pacific.”

PHNSY & IMF is a field activity of NAVSEA and a one-stop regional maintenance center for the Navy’s surface ships and submarines. It is the largest industrial employer in the state of Hawai’i, with a combined civilian and military workforce of approximately 6,400. It is the most comprehensive fleet repair and maintenance facility between the U.S. West Coast and the Far East, strategically located in the heart of the Pacific, being about a week’s steaming time closer to potential regional contingencies in the Indo-Pacific.

The AUKUS Integration and Acquisition Program Office is responsible for executing the trilateral partnership to support Australia’s acquisition of sovereign, conventionally armed, nuclear-powered fast-attack submarines at the earliest possible date while setting the highest nuclear stewardship standards and continuing to maintain the highest nonproliferation standard. The AUKUS partnership is a strategic endeavor that will uplift the industrial bases of the three partners and promote a safe, free and open Indo-Pacific, ensuring an international, rules-based order is upheld in the region.
To learn about AUKUS Pillar 1 and the Optimal Pathway, visit —- FACT SHEET: Trilateral Australia-UK-US Partnership on Nuclear-Powered Submarines | The White House

Justice Department and Federal Trade Commission Extend Public Comment on Request for Information Targeting Serial Acquisitions, Roll-Up Strategies Across U.S. Economy

Source: United States Department of Justice Criminal Division

The Justice Department’s Antitrust Division and the Federal Trade Commission (FTC) are extending the deadline for the public to comment on serial acquisitions and roll-up strategies that harm competition by 60 days. The joint request for information (RFI) seeks to learn more about how corporate actors, including private equity owned businesses, become larger — and potentially dominant — through acquisitions of several smaller firms in the same or related business sectors or industries. The new deadline to submit comments is Sept. 20.

Businesses do not have to report every deal to the federal antitrust agencies, but some non-reportable deals still allow firms to amass significant control over key products, services or labor markets without government scrutiny. These types of transactions can harm competition to the detriment of consumers, workers and innovation across an entire industry or business sector.

The agencies’ RFI seeks to understand more about these deals and strategies, and invites a wide range of stakeholders including consumers, workers, businesses and others to submit their comments. Comments can be submitted via Regulations.gov. Once submitted, comments will be posted to Regulations.gov.

Two Foreign Nationals Plead Guilty to Participating in LockBit Ransomware Group

Source: United States Department of Justice Criminal Division

Two foreign nationals pleaded guilty today to participating in the LockBit ransomware group—at various times the most prolific ransomware variant in the world—and to deploying LockBit attacks against victims in the United States and worldwide.

“Today’s convictions reflect the latest returns on the Department’s investment in disrupting ransomware threats, prioritizing victims, and holding cybercriminals accountable,” said Deputy Attorney General Lisa Monaco. “In executing our all-tools cyber enforcement strategy, we’ve dealt significant blows to destructive ransomware groups like LockBit, as we did earlier this year, seizing control of LockBit infrastructure and distributing decryption keys to their victims. Today’s actions serve as a warning to ransomware actors who would attack Americans: we will find you and hold you accountable.”  

“The defendants committed ransomware attacks against victims in the United States and around the world through LockBit, which was one of the most destructive ransomware groups in the world,” said Principal Deputy Assistant Attorney General Nicole M. Argentieri, head of the Justice Department’s Criminal Division. “But thanks to the work of the Computer Crime and Intellectual Property Section, along with its domestic and international partners, LockBit no longer claims that title. Today’s convictions represent another important milestone in the Criminal Division’s ongoing effort to disrupt and dismantle ransomware groups, protect victims, and bring cybercriminals to justice.”

According to court documents, Ruslan Magomedovich Astamirov (АСТАМИРОВ, Руслан Магомедовичь), 21, a Russian national of the Chechen Republic, Russia, and Mikhail Vasiliev, 34, a dual Canadian and Russian national of Bradford, Ontario, were members of LockBit. In the period between January 2020 and February 2024, LockBit grew into what was, at times, the most active and destructive ransomware group in the world. LockBit attacked more than 2,500 victims in at least 120 countries, including 1,800 victims in the United States. Those victims included individuals, small businesses, multinational corporations, hospitals, schools, nonprofit organizations, critical infrastructure, and government and law-enforcement agencies. LockBit’s members extorted at least approximately $500 million in ransom payments from their victims and caused billions of dollars in additional losses to victims, including costs like lost revenue and for incident response and recovery.

LockBit’s “affiliate” members, including Vasiliev and Astamirov, first identified and unlawfully accessed vulnerable computer systems, and then deployed LockBit ransomware on those systems to both steal and encrypt stored data. When LockBit attacks were successful, LockBit’s affiliate members then demanded ransoms from their victims in exchange for decrypting the victims’ data and then claiming to delete the affiliates’ copies of the data. When victims did not pay the demanded ransoms, LockBit’s affiliates often left the victim’s data permanently encrypted and publish the stolen data, including highly sensitive information, on a publicly accessible internet site under LockBit’s control.

“Astamirov and Vasiliev thought that they could deploy LockBit from the shadows, wreaking havoc and pocketing massive ransom payments from their victims, without consequence,” said U.S. Attorney Philip R. Sellinger for the District of New Jersey. “They were wrong. We, in New Jersey, along with our domestic and international law enforcement partners will do everything in our power to hold LockBit’s members and other cybercriminals accountable, disrupt and dismantle their operations, and put a spotlight on them as wanted criminals—no matter where they hide.”

“Astamirov and Vasiliev were members of the LockBit ransomware group, which has caused severe harm around the globe by attacking computer systems in over a hundred countries damaging organizations ranging from government and law-enforcement agencies to hospitals and schools,” said FBI Deputy Director Paul Abbate. “Today’s plea shows our relentless and unwavering commitment to ensuring that cyber criminals are brought to justice for their actions. The FBI is proud of the international collaboration that led to these individuals being held accountable under the law for the damage their actions have caused.”

Between 2020 and 2023, Astamirov deployed LockBit against at least 12 victims, including businesses in Virginia, Japan, France, Scotland, and Kenya. Operating under the online aliases “BETTERPAY,” “offtitan,” and “Eastfarmer,” he extorted $1.9 million from those victims. As part of his plea agreement, Astamirov agreed to forfeit, among other assets, $350,000 in seized cryptocurrency that he extorted from one of his LockBit victims. Astamirov was first charged and arrested in this matter in June 2023.

Between 2021 and 2023, Vasiliev, operating under the online aliases “Ghostrider,” “Free,” “Digitalocean90,” “Digitalocean99,” “Digitalwaters99,” and “Newwave110,” deployed LockBit against at least 12 victims, including businesses in New Jersey, Michigan, the United Kingdom, and Switzerland. He also deployed LockBit against an educational facility in England and a school in Switzerland. Through these attacks, Vasiliev caused at least $500,000 in damage and losses to his victims. Vasiliev was first charged in this matter and arrested in Canada by Canadian authorities in November 2022, and extradited to the United States in June.

Astamirov pleaded guilty to a two-count information charging him with conspiracy to commit computer fraud and abuse and conspiracy to commit wire fraud. He faces a maximum penalty of 25 years in prison. Vasiliev pleaded guilty to a four-count information charging him with conspiracy to commit computer fraud and abuse, intentional damage to a protected computer, transmission of a threat in relation to damaging a protected computer, and conspiracy to commit wire fraud. He faces a maximum penalty of 45 years in prison. A sentencing date has not yet been set. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

The LockBit Investigation

Today’s guilty pleas follow a recent disruption of LockBit ransomware in February by the U.K. National Crime Agency’s (NCA) Cyber Division, which worked in cooperation with the Justice Department, FBI, and other international law enforcement partners. As previously announced by the Department, authorities disrupted LockBit by seizing numerous public-facing websites used by LockBit to connect to the organization’s infrastructure and by seizing control of servers used by LockBit administrators, thereby disrupting the ability of LockBit actors to attack and encrypt networks and extort victims by threatening to publish stolen data. This disruption succeeded in greatly diminishing LockBit’s reputation and its ability to attack further victims, as alleged by documents filed in this case.

Today’s guilty pleas also follow prior announcements of charges brought in the District of New Jersey against four other LockBit members, including its alleged creator, developer, and administrator, Dmitry Yuryevich Khoroshev. According to an indictment unsealed in May, Khoroshev allegedly acted as the group’s administrator from as early as September 2019 through 2024. In that role,  Khoroshev recruited new affiliate members, spoke for the group publicly under the alias “LockBitSupp,” and developed and maintained the infrastructure used by affiliates to deploy LockBit attacks. Khoroshev also took 20% of each ransom paid by LockBit victims, allowing him to personally derive at least $100 million over that period. Khoroshev is currently the subject of a reward of up to $10 million through the U.S. Department of State’s Transnational Organized Crime (TOC) Rewards Program, with information accepted through the FBI tip website at https://tips.fbi.gov/home.

Other charges against LockBit members include the following:

  • In February 2024, in parallel with the disruption operation, an indictment was unsealed in the District of New Jersey charging Russian nationals Artur Sungatov and Ivan Kondratyev, also known as Bassterlord, with deploying LockBit against numerous victims throughout the United States, including businesses in the manufacturing and other industries, as well as victims around the world in the semiconductor and other industries.
  • In May 2023, two indictments were unsealed in Washington, D.C., and the District of New Jersey charging Mikhail Matveev, also known as Wazawaka, m1x, Boriselcin, and Uhodiransomwar, with using different ransomware variants, including LockBit, to attack numerous victims throughout the United States, including the Washington, D.C., Metropolitan Police Department. Matveev is currently the subject of a reward of up to $10 million through the U.S. Department of State’s TOC Rewards Program, with information accepted through the FBI tip website at tips.fbi.gov/.

The U.S. Department of State’s TOC Rewards Program is also offering rewards of:

  • Up to $10 million for information leading to the identification and location of any individuals who hold a key leadership position in LockBit; and
  • Up to $5 million for information leading to the arrest and/or conviction in any country of any individual participating or attempting to participate in LockBit.

Information is accepted through the FBI tip website at www.tips.fbi.gov/.

Khoroshev, Matveev, Sungatov, and Kondratyev have also been designated for sanctions by the Department of the Treasury’s Office of Foreign Assets Control for their roles in launching cyberattacks.  

Victim Assistance

LockBit victims are encouraged to contact the FBI and submit information at https://lockbitvictims.ic3.gov/. As announced by the Department in February, law enforcement, through its disruption efforts, has developed decryption capabilities that may enable hundreds of victims around the world to restore systems encrypted using the LockBit ransomware variant. Submitting information at the ICE site will enable law enforcement to determine whether affected systems can be successfully decrypted.

LockBit victims are also encouraged to visit www.justice.gov/usao-nj/lockbit for case updates and information regarding their rights under U.S. law, including the right to submit victim impact statements and request restitution, in the litigation against Astamirov and Vasiliev.

The FBI Newark Field Office, under the supervision of Special Agent in Charge James E. Dennehy, is investigating the LockBit ransomware variant. The FBI Atlanta Field Office, under the supervision of Special Agent in Charge Keri Farley; U.S. Attorney’s Office for the Northern District of Georgia; Ontario Provincial Police in Ontario, Canada; and Crown Attorney’s Office in Toronto, Canada, provided significant assistance in the Vasiliev matter. The United Kingdom’s NCA; France’s  Gendarmerie Nationale Cyberspace Command and Cyber Division of the Paris Prosecution Office; Germany’s Landeskriminalamt Schleswig-Holstein and the Bundeskriminalamt; Switzerland’s Federal Office of Justice and Police, Public Prosecutor’s Office for the Canton of Zurich, and Zurich Cantonal Police; Japan’s National Policy Agency; Australian Federal Police; Sweden’s Polismyndighetens; Royal Canadian Mounted Police; Politie Dienst Regionale Recherche Oost-Brabant of the Netherlands; Finland’s Poliisi; Europol; and Eurojust have provided significant assistance and coordination in both matters and in the LockBit investigation generally.

Trial Attorneys Jessica C. Peck, Debra Ireland, and Jorge Gonzalez of the Criminal Division’s Computer Crime and Intellectual Property Section (CCIPS) and Assistant U.S. Attorneys Andrew M. Trombly, David E. Malagold, and Vinay Limbachia for the District of New Jersey are prosecuting the charges against Astamirov and Vasiliev.

The Justice Department’s Cybercrime Liaison Prosecutor to Eurojust, Office of International Affairs, and National Security Division’s National Security Cyber Section also provided significant assistance.

Additional details on protecting networks against LockBit ransomware are available at StopRansomware.gov. These include Cybersecurity and Infrastructure Security Agency Advisories AA23-325A, AA23-165A, and AA23-075A.