Thursday, July 17, 2014

WHITE HOUSE FACT SHEET ON PROGRESS OF HIV/AIDS STRAGEGY

FROM:  THE WHITE HOUSE 

FACT SHEET: Progress in Four Years of the National HIV/AIDS Strategy

On July 15, 2010, President Obama released the first comprehensive National HIV/AIDS Strategy, which envisions that “the United States will become a place where new HIV infections are rare and when they do occur, every person, regardless of age, gender, race/ethnicity, sexual orientation, or socio-economic circumstance, will have unfettered access to high quality, life-extending care, free from stigma and discrimination.”
The goals of the Strategy are to reduce new HIV infections; increase access to care and improve health outcomes for people living with HIV; and reduce HIV-related disparities and health inequities.  Achieving these goals requires partnerships and coordination among Federal agencies, state and local governments, community-based organizations, and health care settings.
To further the implementation of the Strategy, last year, President Obama signed an Executive Order establishing the HIV Care Continuum Initiative, which outlines the pathway to accelerate and optimize health outcomes for those living with HIV.  This update outlines just some of the major accomplishments and progress made over the last four years towards achieving the Strategy’s goals and highlights new action steps taken today. 
New actions to support the National HIV/AIDS Strategy: 
  • Today, to support the goals of the Strategy, the Department of Health and Human Services (HHS) announced the availability of $11 million in funding to enhance Community Health Centers’ HIV efforts in communities highly impacted by HIV, especially among racial and ethnic minorities.  This initiative, funded through the Affordable Care Act and the Secretary’s Minority AIDS Initiative Fund, aims to build sustainable partnerships between public health and health centers to help achieve the goals of the Strategy.
  • Additionally today, the Department of Justice (DOJ) released a Best Practices Guide to Reform HIV-specific Criminal Laws to Align with Scientifically Supported Factors. As noted in the National HIV/AIDS Strategy, many states have criminal laws that have not keep pace with our current understanding of best public health practices for preventing and treating HIV and that, instead, may make people less willing to get tested, disclose their status, and undermine the public health goals of promoting HIV screening and treatment. This guide is intended to share best practices for aligning criminal law with the public health goal of reducing HIV-related stigma.
Implementing the National HIV/AIDS Strategy:
Reducing new HIV infections over the last four years: Ensuring that individuals know their HIV status is a critical step to reducing HIV infections.  People who don't know they are infected miss an opportunity to access the life-sustaining care and treatment that can now lead to normal life-expectancy. Undiagnosed individuals can also unknowingly pass the virus on to others. 
  • HIV testing: Screening all persons between 15 and 65 years of age is now a grade “A” recommendation of the independent United States Preventive Services Task Force. This means that, as of April 2014, new health plans under the Affordable Care Act must offer HIV screening without cost sharing.
  • The number of people who know their HIV status increased:  The overall number of people with HIV who know their HIV status increased to 84.2% in 2010, approaching the Strategy goal of 90% by 2015.  Serostatus awareness was 90% or higher among persons 45 year or older and among injection drug users. 
  • Reduction in new HIV infections in some sub-populations:  Black women saw a 21% reduction in new HIV infections from 2008 to 2010.  In 2010, there was a 22% reduction in new HIV infections among injection drug users. However, there has been a 12% increase in new HIV infections among men who have sex with men (MSM) and 22% increase among young MSM aged 13 to 24. The Administration is committed to enhancing outreach to young, black, gay males.
  • Reduced transmission of HIV: One of the most successful scientific advances in HIV prevention, treatment as prevention, shows that people living with HIV who have a suppressed viral load due to effective HIV treatment, reduce their HIV transmission risk by up to 96%.
  • Pre-exposure prophylaxis (PrEP): In May 2014, the Centers for Disease Control and Prevention (CDC) released clinical practice guidelines on HIV risk and eligibility for PrEP use.
  • Research for an effective vaccine and cure: An effective vaccine remains a critical component of any long-term strategy.  In 2014, the President announced that the National Institutes of Health (NIH) is redirecting $100 million for development of new therapies toward a cure and will continue to strive to be on the forefront of new discoveries.  
Increasing access to care and improving health outcomes over the last four years: To end the epidemic, in addition to providing prevention strategies, access to health insurance coverage and other key supports are essential. 
  • Making coverage affordable: The Affordable Care Act has expanded access to affordable health insurance coverage for millions of Americans, including thousands living with HIV.  Thanks to the Affordable Care Act, people can no longer be denied coverage based on pre-existing conditions, including HIV.  The Administration will continue to focus on the Ryan White HIV/AIDS Program and Affordable Care Act coordination.
  • Housing for people living with HIV: Since 2010, over 56,000 people with HIV receive housing assistance from the Housing Opportunities for Persons with AIDS (HOPWA) program annually. In keeping with the goals of the Strategy, the President’s Fiscal Year 2015 Budget proposes modernizing HOPWA’s funding formula to better reflect the current state of the epidemic.
  • Increasing access to life-saving HIV treatment: Thanks to targeted investments by the Administration, waiting list for the AIDS Drug Assistance Program (ADAP) have been nearly eliminated from a high of over 9,000 in 2011.
  • Commitment to ensuring access to care for people living with HIV: Together, the Affordable Care Act and the Ryan White HIV/AIDS Program are improving and expanding access to care for people living with HIV/AIDS.  Federal leaders have taken steps to ensure this collaboration, including providing guidance to Ryan White grantees to help them effectively interact with new coverage provided under the Affordable Care Act, and strengthening Ryan White data and information to improve program management.  
Reducing health disparities over the last four years: Gay and bisexual men, transgender women, and Black and Latinos continue to bear significant disproportionate burden of new HIV infections and poorer health outcomes. Black gay youth aged 13 to 24 have been identified in the National HIV/AIDS Strategy as a principal group facing HIV/AIDS-related health disparities. 
  • Improving care continuum outcomes among people of color: In 2012, HHS funded a $44 million Care and Prevention in the United States (CAPUS) demonstration project to reduce HIV and AIDS-related morbidity and mortality among racial and ethnic minorities in eight cities.  This project focuses efforts on improving outcomes along the HIV care continuum.
  • Addressing the concerns of the communities most affected:  In June 2014, Office of National AIDS Policy (ONAP) held listening sessions in areas most impacted by the epidemic in the southern United States (Jackson, Columbia, and Atlanta).  Additionally, ONAP convened a meeting at the White House focusing on HIV and the southern United States, and will host another meeting to address HIV and gay men, particularly young black MSM, in fall 2014. 
  • Reducing stigma and discrimination: In May 2014, CDC launched the latest communication campaign under its Act Against AIDS initiative: “Start Talking. Stop HIV.” aiming to eliminate stigma and discrimination and promote open communication between gay and bisexual men about a range of HIV prevention strategies. Additionally, DOJ launched ADA.gov/AIDS, a portal for individuals to directly report cases of HIV-related discrimination.
  • Integrating behavioral health for people at high risk: The Substance Abuse and Mental Health Services Administration (SAMHSA) piloted a number of the Minority AIDS Initiative Continuum of Care programs focused on integrating HIV medical care into behavioral health programs designed for racial and ethnic minority populations also at high risk for behavioral health disorders and HIV. 
Achieving a more coordinated national response over the last four years: The National HIV/AIDS Strategy recognizes that a core principle of reaching its identified quantitative targets requires Federal agencies to coordinate efforts, along with coordinating across State and local government and the private sector.
  • Intersection of violence against women and girls, HIV/AIDS, and gender-related health disparities: In 2012, President Obama signed a memorandum forming a Federal working group and directing agencies to coordinate efforts on these key issues.  Federal agencies and community partners are investing time and resources to provide co-screening for HIV and intimate partner violence as well as learn more about the benefits of trauma informed care. 
  • Implementing common core indicators: In 2012, HHS approved a set of seven common core indicators to monitor HHS-funded prevention, treatment, and care services in an effort to standardize data collection and grantee reporting requirements, thereby reducing burdens and increasing efficiency.
  • Public-private partnerships to facilitate access to HIV treatment: In 2012, a convening of funders by HHS and the MAC AIDS Fund led to the development ofHarborPath, an online portal for health care providers to help connect uninsured individuals with HIV to access medications and/or medication assistance programs through a streamlined common application.
  • Investing in future research:  NIH expanded their investment in research to address gaps and opportunities in the HIV Care Continuum, including investigations of the effectiveness of methods to identify HIV-infected people earlier and to link them to care; community-level interventions to expand HIV testing and treatment; interventions to improve HIV outcomes among substance users; and evaluation of innovative network approaches for HIV testing and referral for persons in the correctional system. 
Toward the Goals of the National HIV/AIDS Strategy:
The Administration, led by Office of National AIDS Policy and HHS Office of HIV/AIDS and Infectious Disease Policy, in partnership with other Federal agencies, state and local governments, communities and people living with HIV, have made tremendous progress in addressing HIV/AIDS in the United States over the last four years. Together, we are committed to accelerating our efforts to reach the Strategy’s goals and, eventually, attain an AIDS-free generation. Smart investments and collaborations will provide opportunities to scale up effective efforts so that every community affected by HIV can contribute to achieving the goals of the Strategy.

AMPHIBIANS AND DEADLY FUNGUS

FROM:  NATIONAL SCIENCE FOUNDATION 
Amphibians can acquire resistance to deadly fungus
Discovery will help conservation efforts

Emerging fungal pathogens pose a greater threat to biodiversity than any other parasitic group, scientists say, causing population declines of amphibians, bats, corals, bees and snakes.

Now research results published this week in the journal Nature reveal that amphibians can acquire behavioral or immunological resistance to a deadly chytrid fungus implicated in global amphibian population declines.

"Acquired resistance is important because it is the basis of vaccination campaigns based on 'herd immunity,' where immunization of a subset of individuals protects all from a pathogen," said Jason Rohr, a biologist at the University of South Florida (USF) who led the research team along with Taegan McMahon of the University of Tampa.

Experiments in the study revealed that after just one exposure to the chytrid fungus, frogs learned to avoid the deadly pathogen.

"The discovery of immunological resistance to this pathogenic fungus is an exciting fundamental breakthrough that offers hope and a critical tool for dealing with the global epidemic affecting wild amphibian populations," said Liz Blood, a program officer in the National Science Foundation's Directorate for Biological Sciences, which funded the research through its MacroSystems Biology Program.

In further experiments in which frogs could not avoid the fungus, frog immune responses improved with each fungal exposure and infection clearance, significantly reducing fungal growth and increasing the likelihood that the frogs would survive subsequent chytrid infections.

"The amphibian chytrid fungus suppresses the immune responses of amphibian hosts, so many researchers doubted that amphibians could acquire effective immunity against this pathogen," Rohr said.

"However, our results suggest that amphibians can acquire immunological resistance that overcomes chytrid-induced immunosuppression and increases survival."

Rohr also noted that "variation in the degree of acquired resistance might partly explain why fungal pathogens cause extinctions of some animal populations but not others."

Conservationists have collected hundreds of amphibian species threatened by the fungus and are maintaining them in captivity with the hope of re-establishing them in the wild.

But reintroduction efforts so far have failed because of the persistence of the fungus at collection sites.

"An exciting result from our research is that amphibian exposure to dead chytrid induced a similar magnitude of acquired resistance as exposure to the live fungus," McMahon said.

"This suggests that exposure of waterbodies or captive-bred amphibians to dead chytrid or chytrid antigens might offer a practical way to protect chytrid-naive amphibian populations and to facilitate the reintroduction of captive-bred amphibians to locations in the wild where the fungus persists."

Immune responses to fungi are similar across vertebrates, and many animals are capable of learning to avoid natural enemies, Rohr said.

"Our findings offer hope that amphibians and other wild animals threatened by fungal pathogens--such as bats, bees and snakes--might be capable of acquiring resistance to fungi and so might be rescued by management approaches based on herd immunity."

Rohr cautioned, however, that "although this approach is promising, more research is needed to determine the success of this strategy."

The study team also included: USF researchers Brittany Sears, Scott Bessler, Jenise Brown, Kaitlin Deutsch, Neal Halstead, Garrett Lentz, Nadia Tenouri, Suzanne Young, David Civitello and Nicole Ortega; Matthew Vensky of Allegheny College; J. Scott Fites, Laura Reinert and Louise Rollins-Smith of Vanderbilt University; and Thomas Raffel of Oakland University.

-NSF-
Media Contacts
Cheryl Dybas, NSF

Wednesday, July 16, 2014

FTC SAYS IT IS AGGRESSIVELY COMBATING TELEPHONE SCAMS TARGETING SENIORS

FROM:  U.S. FEDERAL TRADE COMMISSION 
FTC Testifies on Efforts to Stop Phone Scams Before Senate Special Committee on Aging

In testimony before Congress today, the Federal Trade Commission described its work to fight telephone scams that harm millions of Americans, especially “grandparent” and other imposter scams where callers trick seniors into sending them money by pretending to be a friend or relative in distress or a representative of a government agency or a well-known company. The testimony outlined aggressive FTC law enforcement, as well as the agency’s efforts to educate consumers about these scams and to find technological solutions that will make it more difficult for scammers to operate and hide from law enforcement.

Testifying on behalf of the Commission before the Senate Special Committee on Aging, Lois Greisman, Associate Director of the FTC’s Division of Marketing Practices, said the FTC has brought more than 130 cases involving telemarketing fraud against more than 800 defendants during the past decade. The Commission has obtained judgments of more than $2 billion from the cases that have been resolved. Despite aggressive enforcement, the prevalence of phone scams remains unacceptably high – the testimony noted that the FTC receives tens of thousands of complaints about illegal phone calls every week, including imposter scams like the “grandparent scam.”

The testimony described the FTC’s interagency work, noting that since 2003, hundreds of fraudulent telemarketers have faced criminal charges and prison time as a result of FTC referrals to criminal law enforcement agencies. A U.S.-Canada operation, Project COLT, has led to 10 recent indictments of grandparent scammers, and information provided by the FTC has helped extradite and prosecute phone fraudsters. With the FTC’s assistance, Project COLT has recovered more than $26 million for victims of telemarketing fraud. In addition, the FTC has supported multiple prosecutions through a U.S.-Jamaica law enforcement task force, Project JOLT, including phone scams that targeted seniors and impersonated government agencies to promote fake lottery schemes.

The testimony outlined FTC education and outreach programs that reach tens of millions of people every year. Among them is the recently created “Pass It On” program that provides seniors with information, in English and Spanish, on a variety of scams targeting the elderly. The testimony also noted the agency’s work with the Elder Justice Coordinating Council to help protect seniors, and with the AARP Foundation, whose peer counselors provided fraud-avoidance advice last year to more than a thousand seniors who had filed complaints with the FTC about certain frauds, including lottery, prize promotion, and grandparent scams.

The testimony also described the FTC’s ongoing work to bring about technological changes that will make it more difficult for fraudsters to use the phone to scam consumers and to hide from law enforcement. Among these initiatives are an effort to make it harder for scammers to fake or “spoof” their caller ID information and the more widespread availability of technology that will block calls from fraudsters, essentially operating as a spam filter for the phone.

The Commission vote approving the testimony and its inclusion in the formal record was 5-0.

U.S. DEFENSE DEPARTMENT CONTRACTS FOR JULY 16, 2014

FROM:  U.S. DEFENSE DEPARTMENT 

CONTRACTS

ARMY

AMEC-CAPE, Blue Bell, Pennsylvania (W9128F-14-D-0023) and Weston Solutions Inc., West Chester, Pennsylvania (W9128F-14-D-0024), were awarded a $345,000,000 Type 1 contract for Rapid Disaster Infrastructure Response for time sensitive, emergency construction and debris removal. Funding and work location will be determined with each order. The estimated completion date of the contract is July 15, 2019. Bids were solicited via the Internet with 12 received. U.S. Army Corps of Engineers, Omaha, Nebraska, is the contracting activity.
General Dynamics Land Systems, Sterling Heights, Michigan, was awarded a $65,256,769 modification (P00010) to foreign military sales contract W56HZV-13-D-0015 for specialized training, contractor logistics support, and base life support for the Iraq M1A1 Abrams Program. Funding and work location will be determined with each order. Estimated completion date is Feb. 28, 2015. Army Contracting Command, Warren, Michigan, is the contracting activity.
URS Group Inc., Mobile, Alabama, was awarded an $8,000,000 firm-fixed-price indefinite- delivery contract for architectural and engineering services for the Mobile District and South Atlantic Division, U.S. Army Corps of Engineers. Funding and work location will be determined with each order with an estimated completion date of July 15, 2019. Bids were solicited via the Internet with 28 received. U.S. Army Corps of Engineers, Mobile, Alabama, is the contracting activity (W91278-14-D-0065).

GTA Containers Inc,* South Bend, Indiana, was awarded a $7,539,057 firm-fixed-price contract with options for 6,333 tarps and bows for the five-ton long wheel base vehicle. Work will be performed in South Bend, Indiana, with an estimated completion date of June 17, 2017. Bids were solicited via the Internet with 10 received. Fiscal 2011 other procurement funds in the amount of $3,967,737, and fiscal 2012 other procurement funds in the amount of $3,571, 320 are being obligated at the time of the award. Army Contracting Command, Warren, Michigan, is the contracting activity (W56HZV-14-C-0223).

NAVY

ERAPSCO, Columbia City, Indiana, is being awarded a $165,997,792 firm-fixed-price, indefinite-delivery/indefinite-quantity contract for the procurement of 141,263 AN/SSQ Series sonobuoys, and 5,000 MK-84 Signal Underwater Sound devices. Work will be performed in DeLeon Springs, Florida (51.7 percent), and Columbia City, Indiana (48.3 percent), and is expected to be completed in October 2019. Fiscal 2014 other procurement (Navy) funds in the amount of $165,997,792 will be obligated at time of award, none of which will expire at the end of the current fiscal year. This contract was competitively procured via an electronic request for proposals and one offer was received. The Naval Air Systems Command, Patuxent River, Maryland, is the contracting activity (N00421-14-D-0025).

Vigor Industrial, LLC, of Portland, Oregon, is being awarded a $16,984,940 firm-fixed-price contract for a 120-calendar day regular overhaul and dry docking of USS Emory S. Land (AS 39). Work will include No. 1 and No. 2 boiler inspection, propulsion shaft removal and inspection, underwater hull preservation, ship’s service turbo generator five-year American Bureau of Shipping inspection, structural plenums refurbishment, domestic reefer upgrade, five-year ABS tank inspection, and installation of permanent ballast and stability test. USS Emory S. Land’s primary mission is to provide repair services to submarines. This contract includes options which, if exercised, would bring the cumulative value of this contract to $23,234,057. Work will be performed in Portland, Oregon, and is expected to be completed by February 2015. No contract funds will be obligated at time of award. This contract was competitively procured with proposals solicited via the Federal Business Opportunities website and two proposals were received. The U.S. Navy’s Military Sealift Command is the contracting activity (N32205-14-C-5005).

Nomad Global Communication Solutions Inc.*, Columbia Falls, Montana, is being awarded a $14,112,833 firm-fixed-price, indefinite-delivery/indefinite-quantity contract for the procurement of two First Article Test units and up to 73 production unit Custom Made Shelters in support of the National Guard Bureau Consequence Management Communications Unified Command Suite program. This effort includes the fabrication, qualification, testing and verification, and integration and mounting of the shelters onto government furnished chassis. Work will be performed in Columbia Falls, Montana, and is expected to be completed in July 2017. Fiscal 2014 other procurement (Army) funds in the amount of $479,280 will be obligated at time of award, none of which will expire at the end of the current fiscal year. This contract was competitively procured via a small business set-aside electronic request for proposals and eight offers were received. The Naval Air Warfare Center Aircraft Division, Lakehurst, New Jersey, is the contracting activity (N68335-14-D-0025).

AIR FORCE

Northrop Grumman Corp., Aerospace Systems, El Segundo, California, has been awarded a $17,059,000 modification (P00270) to a cost-plus-fixed-fee contract (F19628-00-C-0100) for radar software deficiency corrections. The contract modification is for Multi-Platform Radar Technology Insertion Program radar system development and demonstration alignment with the Global Hawk Block 40 program schedule. The total cumulative face value of the contract is $1,529,683,365. Work will be performed at El Segundo, California, and is expected to be completed on Sept. 30, 2015. Fiscal 2013, 2014 and 2015 research, development, test and evaluation funds in the amount of $319,615 are being obligated at time of award. This effort is incrementally funded. Air Force Life Cycle Management Center, Hanscom Air Force Base, Massachusetts, is the contracting activity.
Plexus Scientific Corp., Alexandria, Virginia, has been awarded an $8,466,187 firm-fixed-price contract for a full range of construction and engineering activities necessary for investigation, design, remedial action, remedial construction, and environmental remediation activities. The contractor will achieve minimum performance objectives and stretch goals and support progress to site closeout at 29 Installation Restoration Program sites under this performance based remediation contract. Work will be performed at Scott Air Force Base, Illinois, and is expected to be completed by July 16, 2024. This award is a result of a competitive acquisition advertised and six proposals were received. Fiscal 2014 environmental restoration account funds in the amount of $8,466,187 are being obligated at time of award. The 772nd Enterprise Sourcing Squadron, Joint Base San Antonio, Lackland Air Force Base, Texas, is the contracting activity (FA8903-14 -C-0009).

*Small business

SECRETARY KERRY, LUXEMBOURG FOREIGN MINISTER ASSELBORN MAKE REMARKS BEFORE MEETING

FROM:  U.S. STATE DEPARTMENT 

Remarks With Luxembourg Foreign Minister Jean Asselborn Before Their Meeting

Remarks
John Kerry
Secretary of State
Treaty Room
Washington, DC
July 16, 2014




SECRETARY KERRY: Good morning, everybody. I’m very pleased to be here with Jean Asselborn, the foreign minister of Luxembourg, a good friend. We have worked together now for a year and a half on a lot of different issues. We’re very grateful to Luxembourg for its leadership, its work on the Children in Armed Conflict Working Group, also its important role played as a member of the UN Security Council. And over the course of time, we have really been locked together in efforts to be supportive of human rights, of individual rights. Also Luxembourg has been very, very focused on and helpful in terms of the situation in Ukraine, where we are continuing to struggle to try to calm things down and reduce the level of violence.
Luxembourg is also a strong supporter of the Transatlantic Trade and Investment Partnership, and we believe together that this is one of the most important economic lifts that we could provide to Europe and to ourselves. It’s important for all of us. It represents 40 percent of the global GDP. It’s a way to put our people to work. It’s a way to guarantee economic growth. And we will talk about that and other issues, including the Middle East peace process, and we look forward to your presidency. I think of the last five months --

FOREIGN MINISTER ASSELBORN: Six.

SECRETARY KERRY: Six months, six months presidency of the EU. So that will be a very important moment also of leadership.

So we have a lot to talk about, and I look forward to it. And we actually are both very
enthusiastic cyclists. (Laughter.) I’m looking for that moment when we can go out and enjoy --

FOREIGN MINISTER ASSELBORN: In Luxembourg. (Laughter.)

SECRETARY KERRY: In Luxembourg, riding together, yeah.

FOREIGN MINISTER ASSELBORN: Thank you very much, Secretary of State John Kerry. I effectively want to place this visit in the context of the partnership, the transatlantic partnership, and mention maybe three points very briefly.

The first point – you started also with this – is Security Council. We have been member since 1st of January 2013 till the end of this year, and I really want to stress this very fruitful and effective cooperation, small Luxembourg, humble Luxembourg and the United States. On two points I can give an example. From Syria, maybe that you know that the 17th – the 14th of July now a resolution was accepted to allow and to guarantee better humanitarian assistance through or across the borders of Jordan, of Turkey, of Iraq for 1.5 million people who need humanitarian assistance, and it is no more the Syrian Government who gives the authorization, but it is the UN Security Council. And Luxembourg, Australia, and Jordan with U.S., we pushed it and it’s very (inaudible).

Also on the armed conflicts, children in armed conflicts, I want to thank you, John, because during your presidency in September the Security Council will be having discussion and you allowed us a slot on the children in armed conflict, and this is very important.

The second point, Iran and Arab world. We know in Europe and we know it in Luxembourg how important it is the Iran issue for the American – for America and also for Europe. We really want to prevent Iran from nuclear weapons and bring back Iran to a more constructive and positive way for cooperation in international community. I was in Tehran months ago. I will a little bit explain the situation there as I saw it, but you can see in the streets everywhere – in Isfahan or – in Isfahan or in Tehran – that Iran wants to play another role. And it’s a crucial moment now. I hope that the international community can do it.

The second point is if we find a solution and bring back Iran to more cooperative and more constructive dialogue, I think they could play also an important role in Iraq, and that could be very important.

On the Middle East peace process, I want to underline that your effort, John, was not useless. It was really a big effort that you have done since I think July 2013 till April 2014. But we can see that if there is a lift of talks, immediately violence is coming up, and I think that if we get this ceasefire – and if I say “we,” that’s international community and also Egypt. I think we have to support Egypt. We have to try to restart immediately these talks again and a serious effort has to be done. Also I can say it here for the Israeli Government really to bring this two-state solution to a – this two-state solution to bring it to conclusions.

The last point that you mentioned, John, this TTIP, this partnership, free trade agreement between you and Europe, it’s not easy. We have to know that it’s difficult, difficult negotiations. I think that there are redlines on both sides. We have to overcome these redlines, and we have to play with more transparency to the public opinion, be it here or be it in Europe. The NGOs in Europe are asking very important questions and we have to give responses. And we have really I think to try to explain – to better explain the interests and the challenges.

SECRETARY KERRY: True.

FOREIGN MINISTER ASSELBORN: If it is possible to come to conclusions, it would be, I think, in the end of 2015. And at this moment, as you mentioned it, Luxembourg will have the presidency in the European Union, so it will be interesting for us.

A last point. Seventy years ago in December of 2014 started the Battle of the Bulge. It was the most important battle in Europe; 20,000 people died. In Luxembourg, in the cemetery of Hamm, 5,000 of its soldiers are buried with General Patton also. And in December there will be – we will organize festivities, and it would be for us, really, a big – a great honor, a great honor if you, John, could be present there. I think it would be for all – for our history and for our friendship between Luxembourg and United States a very significant presence there and maybe (inaudible).

SECRETARY KERRY: What’s the date?

FOREIGN MINISTER ASSELBORN: It’s up to you to find it. (Laughter.)

QUESTION: Mr. Secretary, what is the concern about Gaza that you can speak about?
SECRETARY KERRY: I beg your pardon?

QUESTION: You specifically talked about the Middle East. What is your concern today especially about Gaza and that area?

SECRETARY KERRY: Well, our concern is to have a legitimate ceasefire and see if we can find a way to stop the conflict and killing so we can get to the real issues that are underlying it. And we’re doing everything in our power; I’ve been in touch with Prime Minister Netanyahu, with the Egyptians, the foreign minister, with others in the region, and we’ll continue to dialogue on it. I’ll be seeing the President today, and we’ll talk about it later.
Thank you.

NASA Sees Typhoon Rammasun in 3-D

DOJ RELEASES GUIDE TO REFORM HIV-SPECIFIC CRIMINAL LAWS TO ALIGN WITH SCIENCE

FROM:  U.S. JUSTICE DEPARTMENT 
Tuesday, July 15, 2014
Justice Department Releases Best Practices Guide to Reform HIV-Specific Criminal Laws to Align with Scientifically-Supported Factors

The Justice Department announced today that it has released a Best Practices Guide to Reform HIV-Specific Criminal Laws to Align with Scientifically-Supported Factors .  This guide provides technical assistance regarding state laws that criminalize engaging in certain behaviors without disclosing known HIV-positive status.   The guide will assist states to ensure that their policies reflect contemporary understanding of HIV transmission routes and associated benefits of treatment and do not place unnecessary burdens on individuals living with HIV/AIDS.

This guide is in follow-up to the department’s March 15, 2014, article published with the Centers for Disease Control and Prevention (CDC), Prevalence and Public Health Implications of State Laws that Criminalize Potential HIV Exposure in the United States, which examined HIV-specific criminal laws.  Generally, these laws do not account for scientifically-supported level of risk by type of activities engaged in or risk reduction measures undertaken.  As a result, many of these state laws criminalize behaviors that the CDC regards as posing either no risk or negligible risk for HIV transmission even in the absence of risk reduction measures.

“While initially well intentioned, these laws often run counter to current scientific evidence about routes of HIV transmission, and may run counter to our best public health practices for prevention and treatment of HIV,” said Acting Assistant Attorney General Jocelyn Samuels for the Civil Rights Division.  “The department is committed to using all of the tools available to address the stigma that acts as a barrier to effectively addressing this epidemic.”

The department’s efforts to provide guidance on HIV-specific criminal laws are part of its ongoing commitment to implementation of the National HIV/AID Strategy, released in 2010.  Today’s guide furthers the expectation from the Office of National AIDS Policy that we tackle misconceptions, stigma and discrimination to break down barriers to care for those people living with HIV in response to the President’s Executive Order last year on the HIV Care Continuum Initiative.

U.S. MILITARY AND IT'S NEW BOT


ASSISTANT AG CALDWELL TESTIFIES BEFORE SENATE COMMITTEE ON "BOTNET" THREAT

FROM:  U.S. JUSTICE DEPARTMENT 
Assistant Attorney General Leslie R. Caldwell Testifies Before the Senate Committee on the Judiciary Subcommittee on Crime and Terrorism
Washington, D.C. ~ Tuesday, July 15, 2014

Good afternoon, Chairman Whitehouse, Ranking Member Graham, and Members of the Subcommittee.  Thank you for the opportunity to appear before the Subcommittee today to discuss the Department of Justice’s fight against botnets.  I also particularly want to thank the Chair for holding this hearing and for his continued leadership on this important issue.

The threat from botnets—networks of victim computers surreptitiously infected with malicious software, or “malware,” that are controlled by an individual criminal or an organized criminal group—has increased dramatically over the past several years.  The computers of American citizens and businesses are, as we speak, under attack by individual hackers and organized criminal groups using state-of-the-art techniques seemingly drawn straight from a science fiction movie.  Unfortunately, this cybercrime wave is all too real.  Botnet attacks are intended to undermine Americans’ privacy and steal from unsuspecting victims.  If left unchecked, they will succeed.

The Department of Justice, working through highly trained prosecutors and Federal Bureau of Investigation (FBI) agents, recognizes this threat, and is working day and night to protect our citizens, our national security interests, and our businesses.  We responsibly employ the investigative and remedial tools Congress has given us, and we leverage our strengths by teaming up with partners across the federal government and, where appropriate, in the private sector and foreign law enforcement.  As in the recent disruption of the Gameover Zeus botnet, which I will discuss more later, we find ourselves matched against increasingly sophisticated cyber criminals, and must evolve our tools and tactics minute-by-minute to prevent further harm to innocent victims.

Our successful effort to suppress the Gameover Zeus botnet should remind us that those who use botnets to cause harm are increasing in number and sophistication, and we cannot expect continued success if we merely rest on our laurels.  The Department is armed with the laws and resources that we have been granted, but those tools must be updated and enhanced.  If we want to remain effective in protecting our citizens and businesses, our laws and our resources must keep pace with the tactics and numbers of our adversaries.  Our adversaries are always adapting.  So must we.  In my testimony, I will outline several legislative proposals that will assist the Department in its efforts to counter the threat posed by botnets.  Finally, I will outline our resource needs—in particular the need for additional specialized criminal prosecutors.

Current DOJ Anti-Botnet Activities

Cybercrime overall has increased dramatically over the last decade, and caused enormous financial damage and innumerable invasions of Americans’ privacy.  The advances in computing technology that have powered our economy have also empowered those who seek to do us harm.  Today, cyber criminals can steal personal and financial information from tens of millions of citizens in a single breach.  To be sure, thefts of such information were committed long before the digital revolution.  But stealing ten million credit card numbers previously would have required burglarizing thousands of stores, whereas now it can be done from a basement with a laptop.  And some crimes have been uniquely adapted in the digital age.  For example, in a new, disturbing twist on extortion, hackers have secretly activated the cameras on victims’ laptop computers, taken compromising pictures or videos, and demanded payments not to expose those pictures or videos to the public.  All the while, technological advances, including advances designed to protect privacy, such as anonymizing software and encryption, are being used to frustrate criminal or civil investigations and, perversely, protect the wrongdoers.  Our cyber crimefighters must be equipped with the tools and expertise to compete with and overcome our adversaries.

Over the same time period, botnets have emerged as a major threat.  Sometimes called “botmasters” or “botherders,” cyber criminals who control botnets can use advances in communications technology to take control of thousands, or even hundreds of thousands, of victim computers, or “bots.”  They can then command the computers they control to, for example, deluge an internet site with junk data, overwhelming it and knocking it offline.  They may conduct such distributed denial-of-service (DDOS) attacks out of malice, as ideological attacks on those with whom they disagree, or even as a paid service to other criminals.  They can also use the infected bots to steal banking credentials, credit card numbers, and other financial information.  They can use them to send spam—email messages that range from advertising for illegal and dangerous pharmaceutical products, to fraud schemes aimed at artificially inflating the price of stocks, to “phishing” messages that gather sensitive information.  Moreover, cybercriminals can use botnets to engage in other online crime by using their networks of infected computers as “proxies.”  This activity allows such criminals to conceal their identity and location while they commit crimes that range from fraud and theft of data to drug dealing and the sexual exploitation of children.

Botnets pose a threat to the United States, our citizens, and our businesses that must not be underestimated.  By hijacking numerous victims’ identities, credit cards, and bank accounts, criminal groups already have stolen hundreds of millions of dollars.  And every day cyber criminals violate the privacy of Americans on a staggering scale, by stealing financial information, personally identifiable information, login credentials, and other information from victims who often do not even realize their computers have been compromised.  Because botnets can be so lucrative, their designers use sophisticated code, locate their servers in countries around the world, and employ the latest in encryption methods—all designed to frustrate personal and corporate cybersecurity efforts, and to prevent law enforcement from responding effectively.  Indeed, recent cases and ongoing investigations reveal that botnets are used by criminals halfway around the world to commit crimes of a scope and sophistication that was difficult to imagine only a few years ago.

To counter this significant and complex threat, the Justice Department is vigorously responding to botnets and other cybercrimes through the tenacious work of the Criminal Division’s Computer Crime and Intellectual Property Section, also known as CCIPS, and the Computer Hacking and Intellectual Property Coordinators and National Security Cyber Specialists in U.S. Attorneys’ Offices across the country.  These prosecutors, along with colleagues in the National Security Division (NSD), form a network of almost 300 Justice Department cybercrime prosecutors.  In addition, the FBI has made combating cyber threats one of its top national priorities, working through Cyber Task Forces in each of its 56 field offices and continuing to strengthen the National Cyber Investigative Joint Task Force.  The FBI has also moved aggressively to counter the botnet threat through Operation Clean Slate, a major FBI initiative designed to identify and eliminate the most significant criminal botnets.  The United States Secret Service also focuses on cyber threats to financial networks and the personal financial information of Americans.  Through a network of 35 Electronic Crimes Task Forces across the country and in key foreign countries, Secret Service investigations have resulted in the arrest and successful prosecution of the criminals responsible for some of the largest data breaches.  U.S. Immigration and Customs Enforcement, Homeland Security Investigations (HSI), through the HSI Cyber Crimes Center (C3), has also dedicated significant resources to equip its Special Agents with the tools and knowledge necessary to combat transnational cybercrime.

The Department’s response to botnets takes two tracks, often at the same time.  First, whenever possible, we seek to arrest, prosecute, and incarcerate the criminals who use botnets to victimize Americans.  For example, in January 2014, Aleksandr Andreevich Panin, a Russian national, pled guilty in federal court in Atlanta, Georgia to conspiracy to commit wire and bank fraud for his role as the primary developer and distributor of the malicious software known as “SpyEye.”  According to industry estimates, SpyEye has infected over 1.4 million computers in the United States and abroad.  SpyEye secretly infected victims’ computers and enabled cyber criminals to remotely control them through command and control servers.  Designed to automate the theft of confidential personal and financial information, such as online banking credentials, credit card information, usernames, passwords, PINs, and other personally identifying information, SpyEye was the preeminent malware toolkit used from approximately 2009 to 2011.  Panin sold versions of the SpyEye virus to other criminals for prices ranging from $1,000 to $8,500.  Panin is believed to have sold the SpyEye virus to at least 150 “clients” who, in turn, used it to set up their own botnets.  One of Panin’s clients alone was reported to have stolen over $3.2 million in a six-month period using SpyEye.  Panin is awaiting sentencing, and four of his clients and associates were arrested by foreign law enforcement agencies.

Similarly, in federal court in New York in May 2014, Michael Hogue pled guilty, and an indictment was unsealed against Alex Yucel, in connection with their development of a particularly insidious piece of computer malware known as Blackshades.  This malware was sold and distributed to thousands of people in more than 100 countries and was used to infect more than half a million computers worldwide.  Once installed on a computer, the malware could collect the user’s financial information and even turn on the computer’s camera to spy on the unsuspecting user.  An individual who helped market and sell the malware and two Blackshades users who bought the malware and then unleashed it upon unsuspecting computer users were also charged and arrested in the U.S.  The charges and guilty plea were part of a law enforcement operation involving 18 other countries.  More than 90 arrests have been made so far, and more than 300 searches have been conducted worldwide.  

Arresting and convicting key players can disrupt criminal enterprises, but such actions are not always sufficient to counter the threat, particularly given the transnational nature of cybercrime.  They also will not always remedy the harm caused by a botnet.  Accordingly, the Department has pursued a second approach to botnets:  the use of seizures, forfeitures, restraining orders, and other civil and criminal legal process to dismantle criminal infrastructure.  In cases such as Gameover Zeus, Blackshades, and a 2011 case involving the Coreflood botnet, the Department used these legal authorities, with judicial authorization and oversight, to wrest domains and servers from cyber criminals’ control, prevent infected computers from communicating with the criminals’ command and control infrastructure, and liberate hundreds of thousands of computers.

In May of this year, CCIPS, the United States Attorney for the Western District of Pennsylvania, and the FBI, in partnership with other federal and private-sector organizations, disrupted a botnet that illustrates the magnitude of the threat.  Before it was disrupted, the Gameover Zeus botnet was widely regarded as the most sophisticated criminal botnet in existence.  One common and sinister method used by Gameover Zeus was a “man-in-the-middle” attack, in which victims trying to access websites for purposes such as online banking were tricked into entering login credentials, passwords, and other personal information that communicated that information to criminals at the same time they were passed onto their destination.  With the click of a mouse, the botmasters then used this stolen information to rob small businesses, hospitals, and other victims, transferring funds from victim accounts to their own accounts.  From September 2011 through May 2014, Gameover Zeus infected between 500,000 and 1 million computers and caused more than $100 million in financial losses.  In one case alone, nearly $7 million was fraudulently transferred from a regional bank.  Other victims included an Indian tribe, a corporation operating assisted living facilities, and a composite materials company.

Gameover Zeus was also used to install Cryptolocker—a type of malware known as “ransomware”—on infected computers.  Cryptolocker enabled cyber criminals to encrypt key files on the infected computers.  Victims then saw a splash screen on their computer monitors, telling them that their files were encrypted and that they had three days to pay a ransom, usually between about $300 and $750, if they wanted to receive the decryption key.  The victims found themselves confronted with the loss of critical data, such as family photographs or essential business records.  In the short period between its emergence in mid-to-late 2013 and the disruption action in May 2014, the Cryptolocker malware infected more than 260,000 computers worldwide.  Many victims simply paid the ransom that was demanded of them.  These victims included the police department of Swansea, Massachusetts, which paid approximately $750 to recover its investigative files and arrest photographs.  Others refused to pay the ransom and tried to defeat the malware.  A Pittsburgh insurance company was eventually able to restore data from a backup, but only after incurring an estimated $70,000 in losses and sending employees home during remediation.  A Florida company lost critical files, which resulted in an estimated $30,000 in loss.  And a North Carolina business, whose main files and backup were both encrypted, lost its critical files despite engaging a computer forensics firm to try to restore its access.  That company has lost about $80,000, and the owner told the FBI that he may have to lay off employees as a result.

Disrupting and mitigating these threats requires determination, technical skill, and creativity.  In response to previous efforts to disable botnets, the creators of the Gameover Zeus botnet designed a novel and resilient structure, including three distinct layers of command and control infrastructure that rendered the botnet particularly difficult to overcome.  The Department’s successful disruption began with a complex international investigation conducted in close partnership with the private sector.  It continued through the Department’s use of an inventive combination of criminal and civil legal process to obtain authorization to stop infected computers from communicating with each other and with other servers around the world.  The operation simultaneously targeted all three command and control layers of Gameover Zeus, and stopped Cryptolocker from encrypting additional computers.  The investigation and court-authorized operation ultimately permitted the team not only to identify and charge one of the leading perpetrators, but also to stop the botnet and ransomware from functioning.  Moreover, the FBI was able to identify victims and, working with the Department of Homeland Security, foreign governments, and private-sector partners, facilitate the removal of malware from many victim computers.  Disclosure to, and engagement with, the public was critical to this remediation effort.  DOJ and DHS released a technical alert to raise awareness of the botnet and lay out resources available to help affected entities minimize the damage.

I cannot emphasize enough the importance to our anti-botnet efforts of the cooperation of foreign governments and our U.S. government and private-sector partners.  In every case I have mentioned, foreign law enforcement services took carefully coordinated steps worldwide to disrupt the scheme and investigate the offenders, by seizing servers, interviewing subjects, making arrests, and providing evidence to U.S. investigators.  The Department has devoted substantial resources to building the relationships with foreign law enforcement partners that made these coordinated efforts possible.  The FBI, for example, maintains more than 60 legal attachés in embassies around the world.  The Criminal Division’s Office of International Affairs provides immeasurable legal support to evidence collection and extradition.  CCIPS conducts training programs to help our allies develop cyber laws, and our federal law enforcement partners work to improve investigative capacities.  Due in large part to our extensive engagement with, and training of, foreign criminal prosecutors and law enforcement officers, we have developed highly productive international relationships that are critical to the success of our investigations and prosecutions.

One factor has harmed our relationships with foreign law enforcement agencies, however:  our inability to rapidly respond to foreign requests for electronic evidence located in the United States.  Our capacity to do so simply has not kept up with the demand.  The President’s budget for fiscal year 2015 requests additional prosecutors, together with support personnel, to be assigned to the Criminal Division and to United States Attorneys’ Offices to streamline and facilitate the process of handling Mutual Legal Assistance Treaty (MLAT) requests between the United States and its law enforcement partners around the world.  The FY 2015 request, if granted, will enable the Department to meet the Administration’s commitment to cut MLAT response times in half by the end of 2015 and reduce the amount of time to comply with legally sufficient requests to a matter of weeks, as well as to strengthen the Department’s relationships with our foreign law enforcement partners, particularly in regard to cyber investigations.

Like the value of our relationships with foreign law enforcement, the expertise, dedication, and cooperation of private-sector entities have been crucial to our success.  For example, security researchers develop highly specialized expertise in particular botnets and help develop countermeasures that match the botnets in sophistication.  Their technical contributions are truly astounding.  Private-sector companies also serve a critical function when they notify victims that their computers have been compromised and supply the tools needed to clean up those computers.  Because the vast majority of the internet is owned and operated by the private sector, we simply could not conduct anti-botnet operations without the firm commitment of network service providers to protecting their customers.

Proposals to Enhance Anti-Botnet and other Cyber Capabilities

The Department is dedicated to using innovative means to target increasingly complex botnet threats as they emerge.  But there is a lot more work to be done, and we ask that Congress continue its support of these critical efforts.  I would like to highlight some of the Department’s legislative and budgetary proposals that would enhance our ability to identify botnet perpetrators, bring them to justice, disrupt their criminal enterprises, and protect the security, privacy, and property of Americans.

Department prosecutors rely on criminal statutes to bring cyber criminals to justice and to halt their criminal activity.  One of the most important of these laws is the Computer Fraud and Abuse Act, also called the “CFAA.”  The CFAA is the primary Federal law against hacking.  It protects the public against criminals who hack into computers to steal information, install malware, and delete files.  The CFAA, in short, reflects our shared baseline expectation that people are entitled to have control over their own computers and are entitled to trust that the information they store in their computers remains safe.

The CFAA was first enacted in 1986, at a time when the problem of cybercrime was still in its infancy.  Over the years, a series of measured, modest changes have been made to the CFAA to reflect new technologies and means of committing crimes and to equip law enforcement with tools to respond to changing threats.  But the CFAA has not been amended since 2008, and the intervening years have again created the need for the enactment of modest, incremental changes.  The Administration’s May 2011 legislative proposal proposed revisions to keep Federal criminal law up to date.  We continue to support changes like these that will keep up with rapidly evolving technologies and uses.

In addition, our investigations of those responsible for creating and using botnets and our efforts to disrupt botnets rely substantially on the availability of legal investigative process pursuant to the Electronic Communications Privacy Act (“ECPA”).  ECPA governs the Department’s access to much of the electronic evidence necessary to investigate botnets, hold perpetrators accountable, and develop methods to free unsuspecting victims.  It is essential to the success of our anti-botnet initiatives, and to our efforts against cybercrime as a whole, that the government maintain the ability to obtain relevant electronic evidence in a responsible, timely and effective manner.

Selling Access to Botnets

In the years since 2011, experience has revealed additional shortcomings in the criminal law.  For example, while botnets can be used for various nefarious purposes, including theft of personal or financial information, the dissemination of spam, and DDOS attacks, the creators and operators of botnets do not always commit those crimes themselves.  Frequently they sell, or even rent, access to the infected computers to others.  The CFAA does not clearly cover such trafficking in access to botnets, even though trafficking in infected computers is clearly illegitimate, and can be essential to furthering other criminal activity.  We thus propose that section 1030(a)(6) of the CFAA be amended to cover trafficking in access to botnets.

In addition, section 1030(a)(6) presently requires proof of an intent to commit a financial fraud.  Such intent is often difficult—if not impossible—to prove because the traffickers of unauthorized access to computers often have a wrongful purpose other than the commission of fraud.  Indeed, sometimes they may not know or care why their customers are seeking unauthorized access to other people’s computers.  This reality has made it more challenging in many cases for our prosecutors to identify a provable offense, even when we can establish beyond a reasonable doubt that individuals are selling access to thousands of infected computers.  We therefore recommend that Congress amend section 1030(a)(6) of the CFAA to address this shortcoming.

Enhancing Judicial Authority to Disrupt Botnets and other Malware

Under current law, two federal statutes, 18 U.S.C. §§ 1345 & 2521, give the Attorney General the authority to bring civil suits against defendants who are engaged in or “about to” engage in wiretapping or the violation of specified fraud crimes. [1]   See 18 U.S.C. §§ 1345(a), 2521.  The court is then empowered to enjoin the violation, “or take such other action, as is warranted to prevent a continuing and substantial injury to the United States or to any person or class of persons for whose protection the action is brought.”  18 U.S.C. § 1345(b); see also 18 U.S.C. § 2521.  Due process is ensured by the balancing test applied by the court to determine whether an injunction is appropriate and by the applicable Federal Rules of Civil Procedure.

These authorities played a prominent role in the Department’s successful disruptions of the Coreflood botnet in 2011 and the Gameover Zeus botnet in 2014.  These botnets collected online financial account information as it was transmitted from infected computers, thus violating the Wiretap Act, and the criminals used their access to steal from victims’ bank accounts, which constitutes wire and bank fraud.  Because these botnets violated statutes against fraud and wiretapping, courts were authorized to issue orders under sections 1345 and 2521 that permitted the United States to take corrective action necessary to disrupt them.

No analogous statutory authority exists, however, for violations of the CFAA that do not involve fraud or the interception of communications.  As a result, the law does not provide a clear statutory remedy for the government to use against botnets or other types of malware that criminals employ for other purposes, such as DDOS attacks.  Similar to frauds and illegal wiretaps, these types of computer hacking—which are prohibited under section 1030—present serious threats that can cause severe and continuing damage as long as they persist.  We would welcome the opportunity to work with the Committee to ensure that the law appropriately addresses this challenge.

Criminalizing the Overseas Sale of Stolen U.S. Financial Information

To ensure that we can take action when cyber criminals acting overseas steal data from U.S. financial institutions, we also recommend a modification to what is known as the access device fraud statute, 18 U.S.C. § 1029.  One of the most common motivations for criminal hacking is to obtain financial information.  The access device fraud statute proscribes the unlawful possession and use of “access devices,” such as credit card numbers and devices such as credit card embossing machines.  Not only do lone individuals commit this crime, but, more and more, organized criminal enterprises have formed to commit such intrusions and to exploit the stolen data through fraud.

The Department of Justice recommends that the statute be expanded to enable prosecution of offenders based in foreign countries who directly and significantly harm United States financial institutions and citizens.  Currently, a criminal who trades in credit card information issued by a U.S. financial institution, but who otherwise does not take one of certain enumerated actions within the jurisdiction of the United States, cannot be prosecuted under section 1029(a)(3).  Such scenarios are not merely hypothetical.  United States law enforcement agencies have identified foreign-based individuals selling vast quantities of credit card numbers issued by U.S. financial institutions where there is no evidence that those criminals took a specific step within the United States to traffic in the data.  The United States has a compelling interest in prosecuting such individuals given the harm to U.S. financial institutions and American citizens, and the statute should be revised to cover this sort of criminal conduct.

Enhancing Resources to Combat Botnets and other Cyber Threats

This last May, the Department submitted to Congress a multiyear cyber threat strategic plan.  The report identified six strategic initiatives:

Ensure that all of DOJ's investigators and attorneys receive training on cybercrime and digital evidence.
Increase the number of digital forensic experts and the capacity of available digital forensic hardware.
Enhance DOJ's expertise in addressing complex cyber threats.
Improve information sharing efforts with the private sector.
Expand and strengthen relationships with international law enforcement and criminal justice partners on cybercrime to enhance the sharing of electronic evidence.
Enhance capacity in the area of cyber policy development and associated legislative work.
The plan repeatedly highlighted the disruption of botnets as a key priority.  In order to properly address the threat of botnets and other cybercrimes, components across the Department, such as CCIPS, NSD, and the United States Attorneys’ Offices, need additional resources.

The Department confronts an increasing demand for its anti-cybercrime expertise.  CCIPS, for example, conducts its own prosecutions, receives requests for consultation of its attorneys or digital investigative analysts, provides advice to law enforcement agencies, engages with the private sector regarding the implementation of investigative authorities, and delivers domesic and international training.  This escalation in activity is due in part to the ever-expanding nature of the cyber threat.  Prosecutorial needs have also resulted from the expansion of investigative efforts, as the FBI has increased its resources in support of the Next Generation Cyber Initiative to enhance the technical capabilities of investigative personnel, increase cyber investigations, and improve cyber collection and analysis.

The Department would like to thank the Senate for its continued support of our national security-related cyber efforts, including fiscal year 2014 funding increases that are allowing the Department to hire more than a dozen additional national security cyber professionals, including attorneys, in furtherance of our efforts to combat cyber-based terrorism and nation state-sponsored cyber intrusions.  Just this summer, thanks in part to your support, those efforts yielded historic results, with the indictment of five members of the Chinese military on charges of cyber-based economic espionage.  Cyber threats to the national security continue to evolve, and to outpace our growth, but the Department is committed to following the facts and evidence where they lead to detect, deter, and disrupt them.  We look forward to continuing to work with you on this front.

Conclusion

I very much appreciate the opportunity to discuss with you the Department’s efforts to combat botnets.  We are committed to using all available tools to disrupt these networks and bring perpetrators to justice, as we seek to protect Americans’ security, privacy, and property.    
Thank you for the opportunity to discuss the Department’s work in this area, and I look forward to answering any questions you might have.

MILK PRODUCTION RESEARCH AT USDA

USDA Week in Review July 11

ATTORNEY TO PAY ALMOST $4 MILLION FOR ORCHESTRATING PRIME BANK INVESTMENT SCHEME

FROM:  U.S. SECURITIES AND EXCHANGE COMMISSION 
Florida-Based Attorney Ordered to Pay Nearly $4 Million in Court Judgment of Prime Bank Investment Scheme Case

The Securities and Exchange Commission today announced that a federal judge has ordered a Miami-based attorney to pay nearly $4 million in a consent judgment of an SEC case against him for orchestrating a prime bank investment scheme. The money will be returned to harmed investors.

Bernard H. Butts Jr. was charged by the SEC in September 2013 for acting as an escrow agent for a supposed international trading program that raised approximately $3.5 million from investors. However, the program didn't really exist, and Butts instead doled out investor funds to enrich himself and others. The SEC obtained an emergency order in U.S. District Court for the Southern District of Florida to freeze the assets of Butts and his companies Bernard H. Butts Jr. PA and Butts Holding Corporation before investor proceeds could be fully dissipated.

The Honorable Jose E. Martinez issued an order dated July 10, 2014, requiring Butts and his companies to pay $1,691,608 in disgorgement and $96,232.99 in prejudgment interest as well as a penalty of $2,059,284.19. Butts and his wife Margaret A. Hering also must pay an additional $100,000 in disgorgement and $4,570.82 in prejudgment interest.

The SEC will return the money to investors through a Fair Fund. More than $1.9 million already has been deposited from accounts belonging to Butts and his companies into the registry of the court following the asset freeze instituted at the SEC's request last year. And the court's order requires the transfer to the court of more than $2 million separately seized by the U.S. Secret Service from accounts belonging to Butts and his companies. The SEC will then submit a plan to the court for distribution of these collected funds back to investors.

Butts has consented to be barred from the securities industry or offering penny stock, and agreed to be suspended from practicing as an attorney on behalf of any entity regulated by the SEC.

For additional information, please see Litigation Rel. No. 22792 (Sept. 9, 2013).

AG HOLDER DELIVERS REMARKS AT HOWARD UNIVERSITY FOR 50TH ANNIVERSARY OF THE CIVIL RIGHTS ACT

FROM:  U.S. JUSTICE DEPARTMENT 
Attorney General Holder Delivers Remarks at Howard University for the 50th Anniversary Celebration of the Civil Rights Act
~ Tuesday, July 15, 2014

Thank you, President [Wayne] Frederick, for those kind words – and thank you all for such a warm welcome.  It is a pleasure to be here on the beautiful and historic campus of Howard University – one of our nation’s great historically black institutions of higher learning, and home to generations of leaders and role models.  I’d like to thank the Howard University Color Guard for being a part of this celebration, and Bert Cross II for that exceptional rendition of the national anthem.  I also want to recognize Ambassador [Andrew] Young – a tireless advocate for the rights of all Americans and a proud graduate of this university.  And I want to thank every member of the Gay Men’s Chorus, who will share their talents with us later this morning, for helping to make this event so special.

I am also mindful, as we gather today, of the leader we lost this past Friday.  John Seigenthaler was a passionate journalist, a lifelong defender of the First Amendment, and a fierce civil rights advocate.  He was a top aide to my predecessor as Attorney General, Robert F. Kennedy, and later served as his pallbearer. He risked his life alongside the Freedom Riders and called forcefully for civil rights protections at a time when most Southern journalists turned a blind eye.  He was a remarkable man and a singular voice for the cause of justice; a guiding light and an inspiration to many – including me.  I count myself as extremely fortunate to have known John Seigenthaler, and extend my heartfelt condolences to his family.  He will be dearly missed.  But his critical work goes on.

It’s a privilege to be among so many distinguished guests, including fellow members of the President’s Cabinet; Howard faculty and administrators; accomplished trailblazers in the fight for civil rights; and young people who will carry on the work we commemorate – and build on the singular achievement we celebrate – here today.

Half a century ago this month – with Dr. Martin Luther King, Jr. and others at his side – President Lyndon Johnson marked an inflection point in a struggle that predated our Republic when he signed the landmark Civil Rights Act of 1964.  It was a struggle that had begun more than three centuries earlier, in 1619, with the arrival of roughly 20 captive Africans in Jamestown, Virginia.  And it continued through the expanding colonization of North America.

By 1763, the colonial population included roughly 300,000 Africans, the overwhelming majority of whom were slaves.  Yet it wasn’t until a century later that our greatest president issued an Emancipation Proclamation providing a legal framework for the eventual release of many slaves – and secured the Thirteenth Amendment, which finally struck this evil from our Constitution.  Even then, Jim Crow laws and other measures were engineered to keep millions of African-Americans effectively in bondage, slavery by another name, for a century more.  And intimidation and violence were routinely employed to prevent them from becoming educated, to keep them from voting, and to stop them from mixing with the white majority.

Finally, 60 years ago this May, when Chief Justice Earl Warren led a unanimous Supreme Court to declare, in Brown v. Board of Education, that segregation was unconstitutional, our nation took an important step to reconcile not only two races, but two histories –  two Americas – that had been intensely separate, and profoundly unequal, since long before the American Revolution.  And ten long years after that – as long-simmering injustice gave way to activism and principled action – the Civil Rights Act of 1964 was adopted to forever enshrine American equality into American law.

This historic measure barred discrimination based on race, color, sex, religion, and national origin.  It instituted critical employment protections.  It outlawed discrimination in public accommodations, including schools and workplaces, and prohibited unequal application of voter requirements.  In so doing, it greatly expanded the mandate of the Department’s Civil Rights Division, which to this day is committed to enforcing the Civil Rights Act and upholding the civil and constitutional rights of all Americans –  particularly society’s most vulnerable members.  The new statute also created the Equal Employment Opportunity Commission as well as the Community Relations Service, which assists vulnerable populations and promotes healing in times of disorder and distress.

Securing this law was an extraordinary undertaking – born of a consensus wrought by decades of hard work and profound sacrifice.  It required two great presidents – John F. Kennedy, who called on us to confront a moral crisis and fulfill a national promise; and Lyndon Johnson, who took action, after President Kennedy’s assassination, to make that promise real.  It required a Congress with the fortitude to stand up to those who defended a way of life founded on bigotry and oppression.  It required leaders of conviction – from Medgar Evers to Dr. King; from John Lewis to Andrew Young – who were willing to risk, and even to give, their lives in order that others might live free.  And most of all, it required men, women, and even children of tremendous courage – and unwavering faith – to endure the unendurable and advance the cause of justice.

These are the heroes whose legacy we celebrate on this milestone anniversary.  These are the pioneers on whose shoulders we now stand.  And these are the trailblazers to whom we pay grateful tribute this morning.

Of course, like all who are old enough to remember those days – when northern cities erupted and Mississippi burned – I will never forget the turmoil, and the violence, that characterized the Civil Rights Era.  I will never forget watching, on a black-and-white television in my childhood home in East Elmhurst, Queens, New York, as countless people – rich and poor, black and white, famous and unknown –  braved dogs and fire hoses, billy clubs and baseball bats, bullets and bombs, in order to secure the rights to which every American is entitled.

These extraordinary citizens streamed into Birmingham and marched on Washington.  They stood up in Little Rock and sat-in in Greensboro.  They faced riots in Oxford and walked through a schoolhouse door in Tuscaloosa.  They dared, during America’s “long night of racial injustice,” to dream of a more equal society.  And they risked everything they had to make it so.

This was the fight that, half a century ago, brought nearly a thousand students to Mississippi for a voter registration campaign called Freedom Summer – as the battle for civil rights was waged in the halls of Congress and thundered across the streets of America.  Inch by inch, the nation as a whole moved slowly forward towards equality.  But Mississippi and other states continued to stand in stubborn, racist opposition.  Registrar offices instituted voting tests and other measures that made it almost impossible for black men and women to go to the polls and vote.  Citizens – and even sworn police officers – fought racial equality and threatened African Americans who dared step into voting booths.  Newspapers published the names of registered black voters so they could be targeted – and terrorized – by those who harbored hatred.  Yet hundreds of young people came to Mississippi – in defiance of these threats and in the face of deadly violence – to help extend our democracy’s “most basic right” to people of color.

In the ten weeks of Freedom Summer, more than 65 buildings were bombed or burned.  Hundreds of civil rights workers were beaten and arrested.  And three brave young men – Andrew Goodman, James Chaney, and Michael Schwerner – were brutally murdered.

Yet violence did not send the activists running, as its perpetrators had hoped.  Instead, it galvanized them – and the nation.  More and more brave Americans joined the cause – both residents of these communities and students of all races from across the country.  When they saw that African-Americans were being deprived of quality educational opportunities, they established Freedom Schools to teach black history, to facilitate discussion, and to encourage political activism.

 These young people devoted themselves to the hope – as Michael Schwerner’s widow, Rita, once wrote – that they could pass on to the next generation “a world containing more respect for the dignity and worth of all men than that world which was willed to us.”  The senseless murders of Rita’s husband and his two colleagues, one black and one white, in a case that became known as Mississippi Burning, and which remains open to this day – captured headlines and sparked outrage across the country.  Their tragic deaths moved public opinion, spurred cautious politicians to take long-overdue action, and intensified support for the Civil Rights Act. But their efforts also made possible the Voting Rights Act of 1965; the Fair Housing Act of 1968; and the Americans with Disabilities Act of 1990, along with countless other movements for progress.  And although Michael and Rita Schwerner never had the chance to have children of their own, their work – and the efforts of their friends and fellows – left a better world for me, for my children, and for millions more.

As we mark this anniversary, I am especially mindful that, without the Civil Rights Act, the protections it codified, or the monumental progress that followed, few of us would be here this morning.  And without the sacrifices of countless activists and citizens, I would not stand before you as Attorney General of the United States, proudly serving in the Administration of our first African-American President.

I am just as mindful that none of this progress was preordained.  We know from our history that advances toward equality and inclusion have never been inevitable.  Every step forward has been hard-won.  The words of our founding documents were not automatically imbued with the force of law.  And our nation’s future continues to be defined, and its destiny determined, by men and women of both character and conviction; by courageous people who are unafraid to stand up for what they know to be right;  and by patriots who never shrink from the responsibility to draw this country ever closer to its highest ideals.

Like you, my colleagues – at every level of today’s Department of Justice – and I are determined to do everything in our power to further these efforts, to protect and expand the work of those who have gone before, and to extend America’s promise to new generations and populations that have been too long disenfranchised, overlooked, and oppressed.  Half a century after its passage, the Civil Rights Act continues to provide an arsenal of singularly useful tools in waging this struggle.  And as we speak, the Justice Department is using provisions of this important law both aggressively – and innovatively – to confront civil rights challenges old and new.

Earlier this year, our Civil Rights Division relied on the 1964 Act to reach a $99 million employment discrimination settlement with the New York City Fire Department – the largest such employment settlement to date – ensuring that all applicants can fairly compete for jobs, and that New Yorkers are protected by the best-qualified among them.  In 2012, the Department used provisions of the Act to address harassment against lesbian, gay, bisexual, and transgender students in a Minnesota school district, establishing a model for other districts to follow.  We are currently employing other provisions to fight for gender equality in education and in the workplace.  And we’re finding that, in a variety of cases and circumstances – from ensuring that schools provide safe and equal opportunities to all of our sons and daughters, to guaranteeing access to state courts for those with limited English proficiency – the Civil Rights Act offers powerful enforcement authorities to address contemporary challenges and safeguard vulnerable people.

Beyond the Act itself, the Justice Department has worked with our partners throughout the Administration – most notably the Department of Education, led by Secretary Arne Duncan, and the Department of Labor, led by Secretary Tom Perez, who not long ago led – and, in fact, helped to revive – our own Civil Rights Division, ushering in what I’m confident will be considered an era of historic achievement for the Division.  Alongside these other agencies, we have worked hard to build on the spirit of the law by winning new legislation – and judicial rulings – that extend the promise of equality to others.  We’ve secured additional protections for women, Latinos, Asian Americans, American Indians, and people with disabilities.  And we’ve achieved historic progress in ensuring the civil rights of LGBT individuals across the country – so they can finally receive the equal opportunities, equal protection, and equal treatment they deserve.

All of this is important, life-changing work.  It speaks to the timelessness of the Civil Rights Act itself, the continuing relevance of its core provisions, and the need to keep expanding upon the safeguards it provides.  But it also shows that our work is far from over.  Significant challenges remain before us.  And each one of us – every American – has a great deal more to do.

Although we can be proud of the progress that’s been made even within our lifetimes, we cannot accept these advances as an indication that our work is complete, that our long journey has been successfully concluded.  Progress is not an end; it is a measure of effort and of commitment.  As we speak, in far too many neighborhoods, far too many people of color and far too many LGBT individuals are denied credit and housing.  In the workplace, far too many women are deprived of the opportunity to perform equal work for equal pay, earning on average only 77 cents for every dollar earned by their male colleagues.  In our education system, students of color are far more likely than white children to attend poorly-funded schools. In the criminal justice system, African-American men are routinely subjected to sentences averaging 20 percent longer than those served by white men convicted of similar crimes.  And when it comes to our most treasured democratic institutions, many vulnerable populations – including young people, the elderly, and communities of color – are now facing a range of new restrictions, leveled under the dubious guise of voter fraud prevention, that create significant barriers to the ballot box.

If these and other conditions – from lower social and economic mobility, to reduced educational opportunities, to unequal justice and unfair outcomes – were felt so acutely by the majority of Americans, I believe our national dialogue, and our responses to these problems, would be very different.  As it stands, our society is not yet colorblind; nor should it be, given the disparities that still afflict and divide us.  We must be color brave and must never forget that all are made better and more prosperous if all are given equal opportunities.

That’s why, today – together – we must resolve once again to act not out of self-interest, but out of national interest.  We must take into account not only the considerable steps forward we’ve seen over the last 50 years, but the entirety of the experience that people of color have faced.  And we must never hesitate to confront the fact, the undeniable truth, that in too many places across this nation that I love – and have served throughout my life – that the echoes of injustices stretching back nearly four centuries continue to reverberate.  These echoes from times past are still heard by too many.

In addressing these lingering effects, there is a need for personal responsibility.  Too many individuals act in ways that are negligent or counterproductive.  But there is also a need for societal responsibility; for collective engagement and common effort.  We must be willing to acknowledge the problems we face, to talk frankly about inequality, and to examine its causes and its impacts and, most importantly, to act to eradicate it.  And we must look at our great nation, and reflect on its history, with clarity and with honesty – with open eyes and deep understanding of who we have been, who we aspire to be, and who we are today.

This is the key to perfecting our Union – and formulating policies that will lead to a better, brighter future for all of our citizens.  This is what drives the Obama Administration’s sweeping efforts to ensure that every American has the chance to succeed based on his or her skills, talent, and potential –  not by the circumstances of their birth.  But this is something we’ll never be able to do on our own.

Today, I am calling on Congress to renew the spirit of the Civil Rights Act – by updating fair housing and lending laws to address discrimination on the basis of sexual orientation, gender identity, and marital status;   by strengthening workplace protections to prohibit pay discrimination against women and to finally end discrimination against LGBT individuals; by ensuring equal access to education and promoting nondiscriminatory learning environments; and by passing updated voting rights legislation that will enable every voter, in every jurisdiction, to exercise – unencumbered – the rights that so many have fought and died to defend.

After all, the Civil Rights Act of 1964 was an attempt – and a highly successful one – to confront fundamental questions that had bedeviled this nation since its inception, and that justifiably generate controversy even today.  This morning, we are reminded that carrying on this work; advancing the cause of justice; and ensuring the civil and human rights of every person – no matter where they come from, who they are, or who they love – continues to constitute our most solemn obligation.

The true greatness of this country lies in our limitless capacity for innovation and invention – for rebirth and renewal; for forging greater societies and reaching new frontiers.  As a people, we have never been content to tie ourselves to an unjust status quo, no matter how many individuals may find it acceptable.  We challenge; we question; we struggle; we quarrel.  We bind ourselves to the ongoing quest for a better future.  And ultimately, we move forward together – as one nation, indivisible – driven by our pursuit of a more perfect Union and determined, come what may, to achieve it.

That, at its core, is what defines us as Americans: a people born of revolution and tested by civil war.  A nation founded on equality but built by those in chains.  A country first imagined, centuries ago, by imperfect people driven by a near-perfect vision – a vision conceived by patriots who dared to reach beyond themselves and defended later by activists who fought for equal justice – and who challenge us, even today, to make this promise real.

To them – as to generations yet to come – we owe our best efforts and our deepest resolve.  We must take up this challenge and implement this vision.  And we must build, in their honor, a world that is worthy of their passion, their sacrifice, and their humanity.

Like you, I have no illusions that this task will be easy.  But as I look around this crowd today – of passionate men and women, dedicated to truth and devoted to service – I am confident of our ability to reach that promised land.  I thank you for your commitment to progress and to the pursuit of justice.  And I look forward to all that we must, and will, accomplish in the months and years ahead.  As a nation, as the beloved community, as a united people, we shall overcome.

Thank you.

Search This Blog

Translate

White House.gov Press Office Feed