Monday, May 25, 2015

DOD REPORTS MORE AIRSTRIKES AGAINST ISIL

FROM:  U.S. DEFENSE DEPARTMENT
Airstrikes Against ISIL Targets Continue in Syria, Iraq
From a Combined Joint Task Force Operation Inherent Resolve News Release

SOUTHWEST ASIA, May 25, 2015 – U.S. and coalition military forces have continued to attack Islamic State of Iraq and the Levant terrorists in Syria and Iraq, Combined Joint Task Force Operation Inherent Resolve officials reported today.

Officials reported details of the latest strikes, which took place between 8 a.m. yesterday and 8 a.m. today, local time, noting that assessments of results are based on initial reports.

Airstrikes in Syria

Attack, bomber, fighter and remotely piloted aircraft conducted 10 airstrikes in Syria:

-- Near Hasakah, seven airstrikes struck two large and four small ISIL tactical units, destroying four ISIL fighting positions, an ISIL checkpoint, an ISIL excavator, an ISIL vehicle bomb and an ISIL vehicle. No civilian casualties from the airstrikes were observed, officials said, adding that Kurdish fighters reported an ISIL vehicle bomb detonation that resulted in an undetermined number of civilians injured in the area.

-- Near Raqqah, two airstrikes destroyed an ISIL excavator and an ISIL tank.

-- Near Dayr Az Zawr, an airstrike destroyed an ISIL multiple rocket launcher vehicle.

Airstrikes in Iraq

Attack, bomber, fighter and remotely piloted aircraft conducted 25 airstrikes in Iraq, approved by the Iraqi Ministry of Defense:

-- Near Baghdadi, five airstrikes struck one large and two small ISIL tactical units, destroying four ISIL structures, two ISIL fighting positions, an ISIL armored excavator, an ISIL heavy machine gun and an ISIL vehicle bomb.

-- Near Beiji, three airstrikes destroyed an ISIL dump truck, an ISIL excavator and an ISIL tanker.

-- Near Fallujah, an airstrike destroyed an ISIL anti-aircraft artillery piece and an ISIL fighting position.

-- Near Hit, an airstrike struck an ISIL vehicle-bomb facility.

-- Near Mosul, nine airstrikes struck five ISIL tactical units and an ISIL staging area, destroying four ISIL heavy machine guns, three ISIL buildings, an ISIL armored vehicle, an ISIL excavator and an ISIL vehicle bomb.

-- Near Ramadi, an airstrike struck an ISIL vehicle.

-- Near Sinjar, two airstrikes struck two ISIL tactical units, destroying two ISIL buildings, two ISIL heavy machine guns and an ISIL rocket-propelled grenade.

-- Near Tal Afar, three airstrikes struck two ISIL tactical units and an ISIL vehicle, destroying two ISIL buildings, two ISIL heavy machine guns and two ISIL mortar systems.

Part of Operation Inherent Resolve

The strikes were conducted as part of Operation Inherent Resolve, the operation to eliminate the ISIL terrorist group and the threat they pose to Iraq, Syria, the region, and the wider international community. The destruction of ISIL targets in Syria and Iraq further limits the terrorist group's ability to project terror and conduct operations, officials said.

Coalition nations conducting airstrikes in Iraq include the United States, Australia, Belgium, Canada, Denmark, France, Jordan, the Netherlands and the United Kingdom. Coalition nations conducting airstrikes in Syria include the United States, Bahrain, Canada, Jordan, Saudi Arabia and the United Arab Emirates.

U.S. CONDEMNS KILLING OF OPPOSITION PARTY LEADER IN BURUNDI

FROM:  U.S. STATE DEPARTMENT
United States Calls for Peaceful Resolution to Crisis in Burundi
Press Statement
Marie Harf
Deputy Department Spokesperson
Washington, DC
May 25, 2015

The United States strongly condemns the May 23 killing of the leader of the opposition party Union for Peace and Development (UPD), Zedi Feruzi, and his bodyguard. We also strongly condemn the May 22 grenade attack in a market that killed several people and wounded many more. These attacks only undermine ongoing efforts to achieve a peaceful resolution to the current crisis through dialogue.

We call on all parties to immediately renounce the use of violence. We urge the Burundian government to conduct timely and credible investigations of the recent attacks to bring to justice those responsible and to take concrete steps to ensure the safety of political actors during the electoral process.

The United States supports the consultative political dialogue facilitated by the UN Special Envoy, Said Djinnit, and envoys from the African Union, the East African Community, and the International Conference on the Great Lakes Region (ICGLR), and we strongly urge all stakeholders to continue to participate in good faith in this dialogue to achieve a peaceful resolution to the crisis. We welcomed the May 18 communique by the ICGLR announcing a heads of state visit to Burundi, which we believe could contribute to facilitating this dialogue.

We call on the Burundian government to provide the political space needed for a peaceful and credible electoral process, including through respect for the freedoms of peaceful assembly and expression. In this regard, we urge the Burundian government to permit the immediate resumption of broadcasts by independent radio stations, end the use of the term “insurgents” to refer to peaceful protesters, and withdraw the proclamation by the Burundian National Security Council prohibiting future demonstrations.

The United States continues to monitor the situation in Burundi closely and is prepared to take additional measures against those who commit, incite or ‎promote violence or other human rights abuses and violations.

NSF VIDEO: ASSEMBLY LINE OF THE FUTURE


RECENT DOD PHOTOS AT BAGRAM AIRFIELD, AFGHANISTAN

FROM:  U.S. DEFENSE DEPARTMENT 

A U.S. Air Force F-16 Fighting Falcon aircraft lands at Bagram Airfield, Afghanistan, May 13, 2015. The pilot is assigned to the 555th Expeditionary Fighter Squadron from Aviano Air Base, Italy. U.S. Air Force photo by Tech. Sgt. Joseph Swafford.
An Afghan air force C-130H Hercules aircraft takes off from Bagram Airfield, Afghanistan, May 13, 2015. U.S. Air Force photo by Tech. Sgt. Joseph Swafford.

"FLAGS IN" AT ARLINGTON NATIONAL CEMETERY

FROM:  U.S. DEFENSE DEPARTMENT 

Carrying bundles of small Amercian flags in backpacks, soldiers march out to their assigned sections during “Flags In” at Arlington National Cemetery in Arlington, Va., May 21, 2015. U.S. Army photo by Spc. Steven Hitchcock.

A total of 228,000 American flags stand at every headstone during “Flags In” at Arlington National Cemetery in Arlington, Va., May 21, 2015. U.S. Army photo by Rachel Larue.


Sunday, May 24, 2015

U.S. CONDEMNS VIOLENCE IN NORTHERN MALI

FROM:  U.S. STATE DEPARTMENT
Violence and Human Rights Violations in Mali
Press Statement
Marie Harf
Deputy Department Spokesperson
Washington, DC
May 23, 2015

The United States condemns the ongoing violence in northern Mali, including reports of summary executions of civilians in Tin Hama, and other human rights abuses and violations. We call on all parties to respect human rights and international humanitarian law, recommit to applicable cease-fire agreements and begin implementation of the May 15 Agreement for Peace and Reconciliation in Mali. The United States reiterates its strong support for the United Nations Multidimensional Integrated Stabilization Mission in Mali (MINUSMA) and calls for the investigation of these alleged human rights violations, to ensure perpetrators are held accountable.

SECRETARY CARTER SAID IRAQI FORCES FAILED TO FIGHT

FROM:  U.S. DEFENSE DEPARTMENT
Carter: Iraqi Forces Failed to Fight for Ramadi
By Terri Moon Cronk
DoD News, Defense Media Activity

WASHINGTON, May 24, 2015 – Islamic State of Iraq and the Levant extremists took control of Ramadi last week when Iraqi forces failed to fight for the city and instead withdrew, Defense Secretary Ash Carter said in an interview broadcast on CNN’s “State of the Union” program this morning.

“What apparently happened is the Iraqi forces just showed no will to fight,” Carter told Barbara Starr, CNN’s Pentagon correspondent. Iraqi security forces must have the will to fight and defend themselves against ISIL extremists, he added.

Iraqi Forces Vastly Outnumbered ISIL Fighters

Iraq’s forces were not outnumbered in the fight for Ramadi when ISIL gained control of the city, the secretary said. “[They] vastly outnumbered the opposing force, and yet they failed to fight,” the secretary said. “They withdrew from the site, and that says to me -- and I think most of us -- that we have an issue with the will of Iraqis to fight ISIL and defend themselves.”

U.S. military forces can provide the Iraqis with equipment and training, but “we obviously can’t give them the will to fight,” Carter said. With equipment, training, coalition support and some time, the secretary added, he hopes the Iraqis will develop that will.

Only Iraqis can defeat ISIL in their own country, the secretary told Starr. “If there comes a time where we need to change the kind of support we’re giving to the Iraqi forces, we’ll make that recommendation,” he said.

Airstrikes Work, But Iraqi Forces Are Necessary

U.S. military and coalition forces have made regular airstrikes against ISIL and its facilities in Iraq since August, but those airstrikes have limitations, the secretary noted. “Airstrikes are effective, but neither they nor anything we do can substitute for the Iraqi forces’ will to fight,” Carter said.

U.S. forces can participate in ISIL’s defeat, the secretary said. “But we can’t make Iraq run as a decent place where people live,” he added. “We can’t sustain the victory.”

No Plans for U.S. Controllers

Carter denied that the Defense Department has recommended putting U.S. forward air controllers –- military personnel who direct fighter pilots to targets -- on the ground in Iraq.

“What happened in Ramadi was a failure of the Iraqi forces to fight,” Carter said. DoD’s efforts, he added, are devoted to providing Iraqi ground forces with equipment, training, “and to try to encourage their will to fight so that our campaign enabling them can be successful, both in defeating ISIL and keeping ISIL defeated in a sustained way.”


TWO CALIFORNIA RESIDENTS CHARGED WITH CONSPIRING TO PROVIDE MATERIAL SUPPORT TO ISIL

FROM:  U.S. JUSTICE DEPARTMENT
Friday, May 22, 2015
Two California Men Arrested on Charges of Conspiring to Provide Material Support to ISIL

Two California men, one of whom attempted to travel to the Middle East to allegedly join ISIL, have been arrested on charges of conspiring to provide material support to the designated foreign terrorist group the Islamic State of Iraq and the Levant (ISIL), announced Assistant Attorney General for National Security John P. Carlin and Acting U.S. Attorney Stephanie Yonekura of the Central District of California.

Muhanad Badawi, 24, and Nader Elhuzayel, 24, both of Anaheim, California, were arrested late Thursday afternoon by the FBI.  Badawi and Elhuzayel were charged in a criminal complaint filed today in U.S. District Court of the Central District of California, and both men are expected to make their initial court appearance this afternoon.

The affidavit in support of the criminal complaint outlines a scheme in which Badawi and Elhuzayel used social media to discuss ISIL and terrorist attacks, expressed a desire to die as martyrs and made arrangements for Elhuzayel to leave the United States to join ISIL.

According to the affidavit, on May 3, 2015, Elhuzayel saw a tweet from Elton Simpson, one of the two gunmen who were killed trying to attack a conference in Garland, Texas.  In this tweet, Simpson stated that he and his “bro” had pledged allegiance to the leader of ISIL.  In response, Elhuzayel tweeted his support for the attempted attack and praised Simpson as a “martyr.”

In recorded conversations last month, Badawi and Elhuzayel “discussed how it would be a blessing to fight for the cause of Allah, and to die in the battlefield,” and they referred to ISIL as “we.” When Badawi expressed concerns about ISIL struggling due to airstrikes by Coalition forces, Elhuzayel responded that they had to be patient and “can you imagine when al-Qaeda joins with Islamic State”?  According to the affidavit, Badawi responded: “We will be huge.”  The two men also discussed local Muslim leaders and Elhuzayel complained that these leaders were not “legitimate” because they believed in democracy and were not fighting for an Islamic State.

The men discussed where in the Middle East they would rather be, and Elhuzayel said he wanted to fight and did not want to be in the United States, according to the conversations recounted in the affidavit.

On May 7, Badawi allowed Elhuzayel to use his credit card to purchase a one-way airline ticket for travel from Los Angeles to Tel Aviv, Israel, via Istanbul, Turkey, on a Turkish Airlines flight scheduled to depart on May 21.  Badawi indicated that he would be traveling to the Middle East in the future, according to the affidavit.

Elhuzayel was arrested at Los Angeles International Airport.  According to the allegations in the complaint, Elhuzayel admitted after being read Miranda rights that he planned to disembark in Istanbul to join ISIL and did not intend to travel on to Israel.

If convicted of the charge in the criminal complaint, Badawi and Elhuzayel each would face a statutory maximum sentence of 15 years in prison for conspiring to provide material support to ISIL.

A criminal complaint contains allegations that a defendant has committed a crime.  Every defendant is presumed to be innocent until and unless proven guilty in court.

The investigation in this case was conducted by members of the FBI’s Joint Terrorism Task Force in Orange County, California.

SEC ANNOUNCES FINAL JUDGEMENT AGAINST CHINA VALVES TECHNOLOGY, INC., AND SENIOR OFFICERS

FROM:  U.S. SECURITIES AND EXCHANGE COMMISSION
Litigation Release No. 23266 / May 20, 2015
Securities and Exchange Commission v. China Valves Technology, Inc., et al., Civil Action No. 1:14-cv-01630 (U.S. District Court for the District of Columbia)
SEC Obtains Final Judgments Against China Valves Technology, Inc. and Two Senior Officers in Fraud Case

The Securities and Exchange Commission ("Commission") announced today that on May 13, 2015, the Honorable Reggie B. Walton of the United States District Court for the District of Columbia entered final judgments by consent against defendants China Valves Technology, Inc. ("China Valves"), its Chairman and former CEO, Siping Fang ("Fang"), and its CFO, Renrui Tang ("Tang"). The final judgments: (i) permanently enjoin the defendants from future violations of the anti-fraud, reporting, recordkeeping, and internal controls provisions of the federal securities laws; (ii) order China Valves, Fang, and Tang to pay civil penalties of $575,000, $75,000, and $40,000, respectively; (iii) bar Fang from serving as an officer and director for five years; and (iv) bar Tang from serving as an officer and director for three years. The Commission today also issued an order pursuant to Rule 102(e)(3)(i) denying Tang the privilege of appearing or practicing as an accountant before the Commission with the right to apply for reinstatement after three years.

The case is the latest from the SEC's Cross-Border Working Group that focuses on companies with substantial foreign operations that are publicly traded in the U.S. China Valves was a China-based U.S. issuer formed through a reverse merger in 2007. On March 4, 2015, the Commission issued an order revoking the registration of China Valves securities pursuant to Section 12(j) of the Exchange Act.

The Commission's complaint, filed on September 29, 2014, alleged that China Valves, Fang, Tang, and Jianbao Wang ("Wang"), China Valves's former CEO, intentionally misled investors about the nature of China Valves's 2010 acquisition of Watts Valve Changsha Co., Ltd. ("Changsha Valve") in an effort to mask the subsidiary's prior investigation of violations of the Foreign Corrupt Practices Act ("FCPA") and China Valves's decision to pay sales commissions to employees that potentially violated the FCPA. The complaint further alleged that, in 2011, China Valves materially overstated income and understated liabilities incurred by a wholly-owned subsidiary, Shanghai Pudong Hanwei Valve Co., Ltd ("Hanwei Valve"), when it mischaracterized certain value added tax payments in an attempt to hide the purchase of a valve that it intended to reverse engineer.

The Commission's complaint alleged that China Valves, Fang, Wang, and Tang violated the antifraud provisions of the securities laws, Section 10(b) of the Exchange Act of 1934 (Exchange Act) and Rule 10b-5. The complaint further alleged that China Valves violated reporting, recordkeeping, and internal controls provisions of the federal securities laws, Sections 13(a), 13(b)(2)(A), and 13(b)(2)(B) of the Exchange Act and Rules 12b-20, 13a-1, 13a-11, and 13a-13. Finally, the complaint alleged that Fang, Wang, and Tang falsely certified that China Valves's filings contained no material misstatements in violation of Exchange Act Rule 13a-14, and aided and abetted China Valves's violations of the reporting and books and records provisions.

China Valves, Fang, and Tang settled the Commission's charges without admitting or denying the charges in the complaint. The litigation is continuing against Wang.

The SEC's continuing investigation has been conducted by Patrick Feeney, Sarah Nilson, Kelly Dragelin, and Janet Yang, and supervised by Melissa Hodgman. Alfred Day leads the litigation team.

NSF VIDEO: Shoe-based sensor system smartens up gait rehabilitation and therapy

CDC SAYS SIGNIFICANT CORRELATION FOUND BETWEEN SEVERE VISION LOSS AND POVERTY

FROM:  CENTERS FOR DISEASE CONTROL AND PREVENTION
Geographic Disparity of Severe Vision Loss in the United States, 2009–2013

An analysis of U.S. county-level data  found a significant correlation between severe vision loss and poverty. Southern states had the highest prevalence of severe vision loss and poverty. Severe vision loss (SVL) often affects activities of daily living, leads to depression and social isolation, and increases the risk of falls and injuries. Limited data and research are available at the local levels, where interventions and policy decisions to reduce the burden of vision loss and eliminate disparities are often developed and implemented. After examining county-level data from the American Community Survey, SVL prevalence was strongly correlated with poverty. The majority of counties in the top 25 percent for both SVL and poverty were primarily in the southern United States.

MANUFACTURER OF WET WIPES SETTLES FLUSHABLE ISSUE WITH FTC

FROM:  U.S. FEDERAL TRADE COMMISSION
Wet Wipe Manufacturer Agrees To Substantiate “Flushability” Advertising Claims under Settlement with FTC
Nice-Pak Products Were also Sold under Costco, CVS, and Target’s Private Labels

Under a settlement with the Federal Trade Commission, Nice-Pak Products, Inc., a manufacturer of wet wipes, has agreed to stop advertising moist toilet tissue as flushable unless it can substantiate that the product is safe to flush. Similarly, Nice-Pak agreed to not claim that its moist toilet tissue is safe for sewer and septic tanks unless it has substantiation for those claims.

In addition, Nice-Pak will stop providing trade customers, such as retailers, with information to make such unsubstantiated claims. Costco, CVS, Target, and BJ’s Wholesale Club were Nice-Pak customers that sold the formulation of the company’s moist toilet tissue that was the subject of the complaint under their own private labels.

Nice-Pak logo, 'breaks apart after flushing'“The evidence didn’t back up Nice-Pak’s claims that their wipes were safe to flush,” said Jessica Rich, Director of the FTC’s Bureau of Consumer Protection. “If you claim a product is flushable, it needs to flush in the real world, without clogging household plumbing or sewer and septic systems.”

According to the FTC’s complaint, Nice-Pak violated the FTC Act by misrepresenting that a certain formulation of its wipes: 1) are safe for sewer systems; 2) are safe for septic systems; 3) break apart shortly after being flushed; and 4) are safe to flush. The FTC also alleges Nice-Pak provided the means and instrumentalities for retailers and others that marketed the product under their own label to make similar misrepresentations. The company’s tests did not reflect, real world household plumbing or septic conditions, the FTC alleged.

The proposed administrative consent order settling the FTC charges prohibits Nice-Pak from misrepresenting that any wipe is safe to flush, unless it can substantiate that the wipe will disperse in a “sufficiently short amount of time” after flushing to prevent clogging and/or damage to household plumbing, sewage lines, septic systems, and other standard wastewater treatment equipment. The test must also replicate the physical conditions of the environment where the wipes will be disposed.

In addition, the proposed order prohibits Nice-Pak from making representations about the benefits, performance, or efficacy of moist toilet tissue, unless the statements are not misleading and the company relies on competent and reliable evidence, which in some instances must be competent and reliable scientific evidence, to support the claims made.  The proposed order also prohibits Nice-Pak from providing the means and instrumentalities to anyone else to make the prohibited misrepresentations.

The Commission vote issuing the complaint and approving the proposed consent order was 5-0. The FTC will publish a description of the consent agreement package in the Federal Register shortly. The agreement will be subject to public comment for 30 days, beginning today and continuing through June 19, 2015, after which the Commission will decide whether to make the proposed consent order final. Comments can be submitted electronically.

NOTE: The Commission issues an administrative complaint when it has “reason to believe” that the law has been or is being violated, and it appears to the Commission that a proceeding is in the public interest. When the Commission issues a consent order on a final basis, it carries the force of law with respect to future actions. Each violation of such an order may result in a civil penalty of up to $16,000.

FEDERAL FUNDING FOR RESEARCH AND DEVELOPMENT FELL IN FY 2013

FROM:  NATIONAL SCIENCE FOUNDATION
Latest figures show decline in federal funding for R&D, equipment, facilities in FY 2013
Projections show rising federal agency obligations in FY 2014 and FY 2015

Federal agency funding for research and development and R&D plant (facilities and fixed equipment used for R&D) fell by 9 percent in fiscal year 2013, according to a new InfoBrief from the National Center for Science and Engineering Statistics (NCSES).

NCSES found that total federal agency obligations dropped from $141 billion to $127 billion between fiscal 2012 and fiscal 2013. Funding dropped by 4 percent for research, 14 percent for development and 11 percent for R&D plant, according to the NCSES report.

The fiscal 2013 figures represent the most recent actual data available. Estimates project that combined funding for R&D and R&D plant will rise by 3 percent ($4 billion) in fiscal 2014 and 2 percent ($3 billion) in fiscal 2015.

Changes in agency obligation levels between fiscal 2012 and fiscal 2013 include the following:

14 percent drop ($10 billion) at the Department of Defense, which accounted for just over half of all federal R&D obligations in fiscal 2013
6 percent drop ($2 billion) at the Department of Health and Human Services, which accounted for 23 percent of federal R&D obligations
3 percent drop at NASA, which accounted for 8 percent of federal R&D obligations
1 percent drop at the Department of Energy, which accounted for 8 percent of federal R&D obligations
4 percent drop at the National Science Foundation (NSF), which accounted for 4 percent of federal R&D obligations
NCSES found that federal obligations for basic research declined by 4 percent. Basic research obligations are estimated to increase by 6 percent in fiscal 2014, then decrease by less than 1 percent in fiscal 2015.

REAL ESTATE INVESTOR PLEADS GUILTY TO BID RIGGING, FRAUD CONSPIRACIES AT FORECLOSURE AUCTIONS

FROM:  U.S. JUSTICE DEPARTMENT 
Tuesday, May 19, 2015
Georgia Real Estate Investor Pleads Guilty to Bid Rigging and Fraud Conspiracies at Public Foreclosure Auctions

A Georgia real estate investor pleaded guilty today for his role in conspiracies to rig bids and commit mail fraud at public real estate foreclosure auctions in Georgia, the Department of Justice announced.

Felony charges against Eric Hulsman were filed on March 27, 2015, in the U.S. District Court of the Northern District of Georgia in Atlanta.  According to court documents, from at least as early March 6, 2007, and continuing at least until Dec. 6, 2011, in Fulton County, Georgia, and from at least as early as Jan. 2, 2007, and continuing at least until Jan. 1, 2008, in DeKalb County, Georgia, Hulsman conspired with others not to bid against one another, but instead designated a winning bidder to obtain selected properties at public real estate foreclosure auctions.  Hulsman was also charged with a conspiracy to use the mail to carry out a scheme to fraudulently acquire title to selected Fulton and DeKalb properties sold at public auctions, to make and receive payoffs and to divert money to co-conspirators that would have gone to mortgage holders and others by holding second, private auctions open only to members of the conspiracy.  The selected properties were then awarded to the conspirators who submitted the highest bids in the second, private auctions.

“Homeowners and lenders in Fulton and DeKalb counties deserved free and fair public real estate foreclosure auctions,” said Assistant Attorney General Bill Baer of the Justice Department’s Antitrust Division.  “The defendant conspired with others to keep for themselves money that should have gone to those homeowners and lenders.  The division remains committed to rooting out this kind of anticompetitive conduct at foreclosure auctions.”

The primary purpose of the conspiracies was to suppress and restrain competition and to conceal payoffs in order to obtain selected real estate offered at Fulton and DeKalb county public foreclosure auctions at non-competitive prices.  When real estate properties are sold at these auctions, the proceeds are used to pay off the mortgage and other debt attached to the property, with remaining proceeds, if any, paid to the homeowner.  According to court documents, these conspirators paid and received money that otherwise would have gone to pay off the mortgage and other holders of debt secured by the properties, and in some cases, the defaulting homeowner.

“Today’s guilty plea of another real estate investor engaged in unfair bidding practices is further evidence of the FBI’s support for the U.S. Department of Justice’s Antitrust Division in ensuring that public foreclosure auctions remain a level playing field for all,” said Special Agent in Charge J. Britt Johnson of the FBI’s Atlanta Field Office.  “Anyone with information regarding such criminal activities as seen in this case should promptly call their nearest FBI field office.”

A violation of the Sherman Act carries a maximum penalty of 10 years in prison and a $1 million fine for individuals.  The maximum fine for a Sherman Act charge may be increased to twice the gain derived from the crime or twice the loss suffered by the victims of the crime if either amount is greater than the statutory maximum fine.  A count of conspiracy to commit mail fraud carries a maximum penalty of 20 years in prison and a fine in an amount equal to the greatest of $250,000, twice the gross gain the conspirators derived from the crime or twice the gross loss caused to the victims of the crime by the conspirators.

Including Hulsman, eight cases have been filed as a result of the ongoing investigation being conducted by Antitrust Division’s Washington Criminal II Section and the FBI’s Atlanta Division, and the U.S. Attorney’s Office of the Northern District of Georgia.  Anyone with information concerning bid rigging or fraud related to public real estate foreclosure auctions in Georgia should contact Washington Criminal II Section of the Antitrust Division at 202-598-4000, call the Antitrust Division’s Citizen Complaint Center at 1-888-647-3258 or visit www.justice.gov/atr/contact/newcase.htm.

The charges were brought in connection with the President’s Financial Fraud Enforcement Task Force.  The task force was established to wage an aggressive, coordinated and proactive effort to investigate and prosecute financial crimes.  With more than 20 federal agencies, 94 U.S. attorneys’ offices, and state and local partners, it’s the broadest coalition of law enforcement, investigatory and regulatory agencies ever assembled to combat fraud.  Since its formation, the task force has made great strides in facilitating increased investigation and prosecution of financial crimes; enhancing coordination and cooperation among federal, state and local authorities; addressing discrimination in the lending and financial markets; and conducting outreach to the public, victims, financial institutions and other organizations.  Since fiscal year 2009, the Justice Department has filed over 18,000 financial fraud cases against more than 25,000 defendants.

AG LYNCH VISITS CINCINNATI, OHIO

FROM:  U.S. JUSTICE DEPARTMENT
Tuesday, May 19, 2015
Readout of Attorney General Lynch's Visit to Cincinnati, Ohio

 Attorney General Loretta E. Lynch traveled to Cincinnati, Ohio, for the first stop in her national Community Policing Tour to highlight collaborative programs and policing practices designed to advance public safety, strengthen police-community relations and foster mutual trust and respect.  The Attorney General also announced that she will visit Birmingham, Alabama; Pittsburgh, Pennsylvania; East Haven, Connecticut; Seattle, Washington; and Richmond, California.

The Attorney General was joined by U.S. Attorney Carter M. Stewart for the Southern District of Ohio, Director Ron Davis for the Community Oriented Policing Services (COPS) Office, Mayor John Cranley for the city Cincinnati, and Cincinnati Police Chief Jeffrey Blackwell.

While in Cincinnati, the Attorney General met with youth and law enforcement at Chase Elementary School to witness firsthand the city’s Right to Read Program in which Cincinnati police officers work with University of Cincinnati students to mentor and tutor children.  At Chase Elementary, the Attorney General played “Jeopardy” with the elementary school students.  She, the Attorney General, was gratified to hear how the young students described police as peace keepers and protectors of the community.  In her remarks to the students and local officers, the Attorney General said, “It’s tremendous what you’ve been doing,” to show how integral law enforcement can be in the lives of our communities.  She also described the innovative approach in Cincinnati as a model for other departments to follow.

After visiting the school, the Attorney General spoke briefly to reporters and took a few questions about her interactions with the children and the importance of community policing.

“What I saw were children being engaged, children learning, children finding that learning can be fun, children learning about senses – about the world around them –  at an age where, I think educators will tell you, it is really crucial that we not lose our children and they not fall out of the educational system and that they develop that love for learning,” Attorney General Lynch told reporters.  “But I also saw children who were aware of the larger community around them and had a very good sense of what law enforcement does – law enforcement at its best because they are seeing law enforcement at best. So in their interactions in the future they will have that context into which to put them as well as law enforcement will have those interactions into which to put them.”

The Attorney General also visited the Cincinnati Police Department for a meet and greet with police officers.  She commended the department’s efforts to reach out to the community, saying, “It's very easy for the cameras to show up when something's on fire, but we also want them to see the work that you're doing day in and day out.”  She also thanked the officers on behalf of the Justice Department for the “hard work” they do every day and spoke to officers that were hired with COPS Office hiring grants.  The Justice Department through its COPS Office yesterday announced five separate grant funding opportunities of up to $163 million for law enforcement agencies to help implement the recommendations made by the President’s Task Force on 21st Century Policing.

Following her meeting with police officers, the Attorney General ate lunch with U.S. Attorney Stewart, COPS Director Davis, and Cincinnati Police Chief Blackwell at local restaurant Skyline Chili.

Following a tour led by the curator of the National Underground Railroad Freedom Center, the Attorney General convened a meeting with city officials, law enforcement, local and faith leaders, young people and other members of the community to discuss ways in which the success Cincinnati has seen in building trust between law enforcement and the community can be replicated in cities across the nation.

“Every city deserves an outstanding, world-class police force that works alongside local residents to protect public safety,” said Attorney General Lynch. “And every officer deserves the tools, training, and support they need to do their jobs as safely and effectively as possible.”  Her full remarks can be found here.

The Attorney General also visited with Department of Justice employees at the office of the U.S. Attorney for the Southern District of Ohio.  Following that meeting, the Attorney General met with the family of John Crawford III, a 22-year African-American man, was shot and killed by a Beavercreek, Ohio police officer inside a Wal-Mart store while Crawford held a BB gun.

REPORT SHOWS WHO EARNS A DOCTORATE IN THE U.S.

FROM:  NATIONAL SCIENCE FOUNDATION
Who earns a doctorate? More women, more foreigners, more minorities

The number of research doctorate degrees awarded by U.S. institutions in 2013 grew by 3.5 percent over the previous year, a single-year increase that has only been exceeded twice in the past two decades, according to a new report from the National Science Foundation's (NSF) National Center for Science and Engineering Statistics (NCSES).

The report, Doctorate Recipients from U.S. Universities: 2013, presents data on degree recipients--broken down by categories including citizenship, sex, race and ethnicity, and field of study. NCSES provides detailed data tables and interactive charts for readers to explore online.

The report addresses six key questions: Who earns a U.S doctorate? Which fields attract students? What influences the path to the doctorate? What are the postgraduation trends? What draws students to an institution? And how do expenses and employment outcomes differ? Understanding those characteristics is necessary to make informed improvements in the country's doctoral education system.

The report's findings include the following:

Women earned 46 percent of all doctorates in 2013, and they have earned a majority of all doctorates awarded to U.S. citizens and permanent residents since 2002.

The proportion of doctorates awarded to black or African American students rose from 4.5 percent in 1993 to 6.4 percent in 2013; over the same period, doctorates awarded to Hispanics or Latinos rose from 3.4 percent to 6.3 percent.
Ten countries accounted for 70 percent of the doctorates awarded to temporary visa holders from 2003 to 2013 and the top three--China, India and South Korea--accounted for more than half.

The science and engineering fields accounted for 74 percent of the doctorates awarded in 2013, a substantially larger share than the 65 percent from 10 years earlier.

In every broad science and engineering field, the proportion of 2013 doctorate recipients who reported definite commitments for employment or postdoctorate study was at or near a 25-year-low; for non-S&E fields, that proportion reached a 20-year low.

The report is the latest presentation of an annual census of individuals who in 2013 received research doctorate degrees. The survey is sponsored by NSF, the National Aeronautics and Space Administration, the National Endowment for the Humanities, the National Institutes of Health, the Department of Agriculture and the Department of Education.

Please visit the NSF's National Center for Science and Engineering Statistics (NCSES) for more reports and other products.

-NSF-

Media Contacts
Rob Margetta, NSF
Program Contacts
Mark K. Fiegener, NSF

The National Science Foundation (NSF) is an independent federal agency that supports fundamental research and education across all fields of science and engineering. In fiscal year (FY) 2015, its budget is $7.3 billion. NSF funds reach all 50 states through grants to nearly 2,000 colleges, universities and other institutions. Each year, NSF receives about 48,000 competitive proposals for funding, and makes about 11,000 new funding awards. NSF also awards about $626 million in professional and service contracts yearly.

SECRETARY KERRY'S REMARKS ON AN OPEN AND SECURE INTERNET

FROM:  U.S. STATE DEPARTMENT
An Open and Secure Internet: We Must Have Both
Remarks
John Kerry
Secretary of State
Korea University
Seoul, South Korea
May 18, 2015

SECRETARY KERRY: (Applause.) Well, good afternoon, President Yeom. Thank you very much for a generous introduction. Distinguished guests, all, I’m delighted to be here and I want to thank the university, and particularly Park No-young, the Director of the Cyber Law Center, for inviting me to be here today. Thank you very, very much.

I also want to acknowledge somewhere – I don’t see him – but my friend, the ambassador from the United States of America – there he is right in front of me – Mark Lippert, who represents the United States here in Seoul. And he’s a special person. I’ve known him for a long time. He served in the United States Navy. He served in Afghanistan and served for the President, been an advisor to several presidents. But recently, as you all know, he displayed great grace and dignity under duress, and like all of our diplomats, whose jobs carry with them certain risks on the front lines of diplomacy, I will tell you that Mark has never wavered from his determination to do his job and to represent our country to the best of his ability – which, believe me, he does. So I’m grateful for his leadership. And, Mark, thank you for the great example you’re setting.

I’m really happy to be back here in Seoul. This is a beautiful city, and I’m struck every time I come here. I wish I had more time. Time is the enemy of those of us in diplomacy nowadays. But the United States and South Korea share a very special history, obviously, and we also share great hopes for the future. And I am very happy to be here to talk about our shared interests, though it will not just be, President Yeom, about the security; it will be about the internet itself, which is important as we think about security. It’s also, obviously, very critical as we think about the many interests that we share together, ranging from security on the Korean Peninsula, to the success of the Korea-U.S. Free Trade Agreement, to the many connections that exist between the Korean and the American peoples – including, I want you to know, a love for Psy, K-Pop, bibimbap, and Pororo, the little penguin. (Laughter.) I want you to know that my staff recommended that I walk out here this afternoon, dancing to Gangnam Style – but I told them no, that’s too 2012.

Today, it’s really more than appropriate to be here in the most wired city in the country, one of the most wired cities in the world, in order to speak with you about digital technology and about the fears and the possibilities that we associate with digital technology. And let me underscore: It’s the possibilities that should motivate us, and it’s the possibilities that bring me here today.

Now, years ago, South Korea made a conscious choice to become a global IT leader and you have delivered. As a society, you opened the door to investment, you encouraged households to sign up for broadband, you eased the transition to new technology, and you developed programs in universities just like this one to educate young people in digital skills. And I applaud you for the remarkable linkage to the military and the security side of it with the offer that you make to students who will come here, learn, and then go on to serve the country in the military for those seven years.

Today, thanks in part to President Park’s commitment to build a, quote, “creative economy,” the ROK is a virtual synonym for Internet success stories, such as the educational network service ClassTing; or the Kakao, your messenger app which is one of the fastest-growing tech firms in all of Asia; and GRobotics, a company which has revolutionized the robot industry and, incredibly, it was originally conceived by an amazing 11-year-old child. Just two weeks ago, Ambassador Lippert joined President Park at the opening of the Google Campus for startups and entrepreneurs right here in Seoul – an initiative designed to spur the exchange of ideas and digital growth in both of our countries. Now, both of our nations know and view the internet and cyber issues as part of a new frontier for our governments and peoples, and it will be one of the key areas discussed when our two presidents meet in in Washington in June.

The fact is, whichever side of the Pacific Ocean we live on, the internet today is part of almost everything that we do. And just to tell you how amazing it is, I served in the United States Senate on the Commerce Committee in 1996. I was chairman of the Communications Subcommittee when we rewrote the communications law for our country. And guess what? Barely anybody in 1996 was talking about data, and data transformation, and data management. It was all about telephony – the telephone. That’s how far we’ve traveled in 20 years.

So it matters to all of us how the technology is used and how it’s governed. That is precisely why the United States considers the promotion of an open and secure internet to be a key component of our foreign policy. It’s why we want to work with you and with international partners everywhere in order to better understand the choices that we face in managing this extraordinary resource – a resource which does present us with certain challenges even as it presents us with unprecedented opportunities.

Now, what do I mean by that?

Well, to begin with, America believes – as I know you do – that the internet should be open and accessible to everyone. We believe it should be interoperable, so it can connect seamlessly across international borders. We believe people are entitled to the same rights of free expression online as they possess offline. We believe countries should work together to deter and respond effectively to online threats. And we believe digital policy should seek to fulfill the technology’s potential as a vehicle for global stability and sustained economic development; as an innovative way to enhance the transparency of governments and hold governments accountable; and also as a means for social empowerment that is also the most democratic form of public expression ever invented.

At its best, the internet is an equal-opportunity platform from which the voice of a student can have as much reach as that of a billionaire; a chief executive may be able to be out-debated by an entry-level employee – and there’s nothing wrong with that. Most users of the internet agree, on the internet as in any other venue, the human rights of every person – including freedom of expression – should be protected and respected. The United Nations has repeatedly affirmed this view, but as we know, it is still not universally held. That means that we will continue to have important choices to make – important choices to make locally, to make in universities, to make in businesses, to make in countries, and between countries. We will have a lot of choices about technology among and between nations.

Let me tell you something: How we choose begins with what we believe. And what we believe about the internet hinges to a great extent on how we feel, each and every one of us, about freedom.

Freedom. The United States believes strongly in freedom – in freedom of expression, freedom of association, freedom of choice. But particularly, this is important with respect to freedom of expression, and you believe in that freedom of expression here in Korea. We want that right for ourselves and we want that right for others even if we don’t agree always with the views that others express. We understand that freedom of expression is not a license to incite imminent violence. It’s not a license to commit fraud. It’s not a license to indulge in libel, or sexually exploit children. No. But we do know that some governments will use any excuse that they can find to silence their critics and that those governments have responded to the rise of the internet by stepping up their own efforts to control what people read, see, write, and say.

This is truly a point of separation in our era – now, in the 21st century. It’s a point of separation between governments that want the internet to serve their citizens and those who seek to use or restrict access to the internet in order to control their citizens.

Here in the Asia Pacific, we see countries such as the ROK and Japan that are among the world’s leaders in internet access, while North Korea is at the exact opposite end of that spectrum, with the lowest rate of access in the world and the most rigid and centralized control.

No other government is as extreme as the DPRK, but there are more than a few who want to harvest the economic benefits of the internet while nevertheless closing off the avenues of political, social, and religious expression. They impose filters that eliminate broad categories of what their citizens can see and receive and transmit – and with whom ideas may be changed and shared. What’s more, the governments that have pioneered the repressive use of such technologies are quick to export their tools and methods to others, and thereby further diminish individual rights. At the same time, some governments are using the internet to track down activists and journalists who write something that they don’t like, and even reach beyond their borders in order to intimidate their critics.

My friends, this discourages free expression and it clearly seems intended to turn their part of the internet into a graveyard for new ideas – the exact opposite of what it should be, a fertile field where such ideas can blossom and grow.

Let’s be clear: Every government has a responsibility to provide security for its citizens. Yes. We all agree with that. In the United States, our efforts to do so – and the reforms that we have undertaken in the process – have been guided by our concern for individual rights and our commitment to oversight and review. Further, unlike many, we have taken steps to respect and safeguard the privacy of the citizens of other countries and to use the information that we do collect solely to address the very specific threat to the United States and to our allies. We don’t use security concerns as an excuse to suppress criticisms of our policies or to give a competitive advantage to an American company and any commercial interests at all.

Now, regrettably, it is no coincidence that many of the governments that have a poor record on internet freedom also have a questionable commitment to human rights more generally. United States policy has always been to engage with such governments to encourage reforms and to point out the contributions to prosperity that would flow from a more open approach. Regimes that practice repression typically argue that they have no obligation to justify what they do inside their own borders, but that assertion is directly contradicted by the Universal Declaration of Human Rights and by many other multilateral declarations and statements.

The fact is, an individual’s aspiration to be free may be the most single powerful force on Earth. It’s an aspiration that may be able to be slowed sometimes, maybe intimidated sometimes, it may even be eliminated temporarily by violence in certain cases. But I’m telling you its power within the human soul is so infectious that it will always resurface in one form or another, even in the most extraordinary circumstances.

And history – history has proven that again and again and again. Throughout history, we have seen that men and women will do whatever it takes to find a way to make their desire for freedom known. We saw that with the authors of the pamphlets that helped to spark the revolution that gave birth to my home country in the 1700s. We saw it with the dissidents writing newsletters and producing radio broadcasts behind the Iron Curtain during the Cold War. And we see it today, in places all over the world, where young people are challenging injustice – armed only with their smart phones.

The internet is, among many other things, an instrument of freedom. It’s a tool people resort to in response to the absence and failure or abuse of government. So of course, some leaders are afraid of it. They’re afraid of the internet in the same way that their predecessors were afraid of newspapers, books, and the radio, but even more so because in this case, because of the interactivity that allows for a free-flowing discussion and the exchange of views – activities that can, and often do, lead to change.

I say to you today, here at Korea University, that fear is misplaced, and that response is, in the end, futile. Anyone who blames the internet for the disorder or turmoil in today’s world is just not using their head to connect the dots correctly. And banning the internet in a misguided attempt to impose order will never succeed in quashing the universal desire for freedom.

Ladies and gentlemen, repression does not eliminate the speech we hate. It just forces it into other avenues – avenues that often can become more dangerous than the speech itself that people are fighting. The remedy for the speech that we do not like is more speech. It’s the credible voices of real people that must not only be enabled, but they need to be amplified.

The good news is that much of the world understands this. More and more of the world understands this. And the advocates of internet freedom and openness are speaking up. The United States is part of the Freedom Online Coalition, a 26-country group that we are actively seeking to expand. The coalition argues that narrow and distorted visions of the internet cannot be allowed to prevail. Freedom must win out over censorship. That is an important principle, but it is also a practical imperative. After all, from the dawn of history to the present day, repression hasn’t invented a thing. Freedom is how jobs are created, diseases are cured, alternative energy is harnessed, and new ways are found to feed a global population that has quadrupled in the past century and that will rise to some 9 billion people in the next 40 to 50 years. Without freedom, civilization can’t advance; it’s like a bicycle without pedals.

Remember that the internet is not just another sector of our economy. Like electricity, it is a general purpose technology that is used in thousands of different ways, streamlining everything from buying a cup of coffee to building a skyscraper. Consider what would happen if someone tried to block the flow of electricity – the lights would go out and everything would stop. In fact, when I was a lot younger, Hollywood made a movie about exactly that; it was called “The Day the Earth Stood Still.” And thank heavens they made a couple more of them so you can’t tell exactly which one I’m referring to. (Laughter.) Now, you might want to watch it, because policies that restrict online data streams have a similar effect, if perhaps not quite so dramatic.

Think, for example, of what would take place if every country imposed data localization requirements, causing information to halt and to undergo inspection whenever it reached a national border. Imagine what would happen to commerce and to the flow of information, to the simple effort to get an answer to a question at a dinner table when you’re talking with people and you want to Google something. The delays would create huge obstacles to multinational business at a time when speed is of the essence and cross-border enterprises are major engines of growth. That’s not a formula for progress; it’s a way to stop progress in its tracks.

The internet provides broadly-shared connections that are essential for modern economies to be able to grow. It’s that simple. It can help people even in remote areas take advantage of government services and make a better business decision, for example. Let me give you an example. It could make a difference to people about when you bring your crops to the market or how do you find international customers for local projects.

With digital technology, fishermen in Mozambique can keep their catch fresh in the water until they have a buyer, somewhere in another continent maybe, thus eliminating spoilage and waste.

Shopkeepers in sub-Saharan Africa have seen their incomes actually grow by using mobile banking technology to avoid local loan sharks and go directly to reputable financial institutions for emergency credit and loans.

The system becomes more accountable and more transparent and more accessible. Women entrepreneurs in Southeast Asia have formed cooperatives online that enable them to take advantage of economies of scale.

Children from Angola to India are learning more and faster through education that comes to them over the internet.

And a couple of years ago, a young engineer from Cameroon developed a computer tablet called “Cardiopad” that enables Africans to be able to have a heart examination at home and receive the diagnosis from doctors who may be hundreds of miles away. Think about that.

The examples are endless, but you get the point. I know. The internet fuels innovation that can lead to improved efficiency, improved productivity in every sector of a developing economy.

But in thinking about the internet’s promise, you have to recognize how far that potential is from being fulfilled today. Roughly three out of every five people in the world today remain without internet access – and in the poorest countries that figure can top 95 percent.

A big part of the reason is simply cost. Ask yourself: How much of your family’s income do you pay for internet access? In America, the average is 1 or 2 percent. But a typical family in some countries have to pay 10 percent for entry-level mobile broadband and roughly four times that for fixed broadband. In other words, people with low incomes can’t afford digital access. They need to earn more money. To break that circle of despair, we need to bring the costs down by getting public policies right – because money isn’t the only barrier.

There’s a reason why access is relatively high in Colombia but low in Venezuela. There’s a reason why it’s high in Malaysia but low in Cambodia; a reason why it’s high in Rwanda but low in Ethiopia. Some governments do much more than others to facilitate access for people in poor or remote areas. And the starting point is for every country to have a clear and comprehensive national broadband plan that allows for private investment, encourages competition, removes bureaucratic obstacles, and takes full advantage of shared internet services at schools, libraries, community centers, and cafes.

That’s why two years ago the United States helped create the Alliance for Affordable Internet. This broad coalition draws on expertise from governments, the private sector, and civil society to assist policy makers in expanding access while keeping prices low. It’s the right goal, and I’ll tell you, it’s also a smart goal. According to one recent European study, tripling mobile broadband penetration levels across the developing world would provide a return of as much as $17 for every $1 spent.

About 10 days ago, when I was in Kenya, I Skyped, using the internet, with a group of young Somali refugees. Most of these refugees were high school or college age kids, and yet – and yet, extraordinarily, many of them had never, ever been outside that refugee camp – ever. This, in an era of incredible globalization – they had only lived in one refugee camp. The students I spoke to wanted desperately to be able to complete their schooling. They wanted to find a job. They wanted to go on to university. They wanted to begin a career. One young woman, who is studying chemistry and biology, told me she hoped to become a doctor. Now, I’m willing to bet you that she’s never been inside a hospital. But that’s what she wanted to do – become a doctor. The irony is that, at the refugee camp, they have internet connections. Now, I can’t help but wonder whether that will be the case when they return to Somalia.

If there is any message that is going to be sent to governments by young people in the world today, it is the desire – the universal desire – for jobs, for opportunity, for education, for a future. That’s what people want. It’s what every family in the world really wants. No one is asking to be censored. No one is yearning to be told what to think and how to live. The same desires that helped South Korea embrace democracy are what sparked the beginnings of the Arab Spring; they’re what kept the pro-democracy movement alive through two decades of dictatorship in Burma; and they’re what prompted the voters of Sri Lanka and Nigeria to flock to the polls in recent months and cast their ballots for change.

So looking to the future, we have to respond to this demand for openness and opportunity by making steady progress toward closing the digital divide. And with that goal in mind, the United States State Department will soon launch a new diplomatic initiative – in combination with partner countries, development banks, engineers, and industry leaders – and we’re going to do just that: try to make it more available. You may be sure that we will be inviting your government and other representatives from this highly-connected country to help us lead and guide this effort. Because this will define the future. And this is the way we’ll address violent extremism, and failing states.

So this brings me to another issue that should concern us all, and that is governance – because even a technology founded on freedom needs rules to be able to flourish and work properly. We understand that. Unlike many models of government that are basically top-down, the internet allows all stakeholders – the private sector, civil society, academics, engineers, and governments – to all have seats at the table. And this multi-stakeholder approach is embodied in a myriad of institutions that each day address internet issues and help digital technology to be able to function.

The versatility of the current approach enables it to move both with deliberation and care on complex issues and, frankly, much more rapidly on situations that demand a rapid response. For example, we saw the community respond to the 2007 cyberattacks in Estonia in a matter of hours. And as recently as last week, it responded literally in minutes to an unexpected outage of the Amsterdam exchange, which is the second-largest internet exchange point in the world.

That’s why we have to be wary of those who claim that the system is broken or who advocate replacing it with a more centralized arrangement – where governments would have a monopoly on the decision-making. That’s dangerous. Now, I don’t know what you think, but I am confident that if we were to ask any large group of internet users anywhere in the world what their preferences are, the option “leave everything to the government” would be at the absolute bottom of the list. Because of the dynamic nature of this technology, new issues are constantly on the horizon – but the multi-stakeholder approach remains the fairest and the best, most effective way to be able to resolve those challenges.

Now, as everyone knows, it’s impossible to talk about cyber policy without talking about international peace and security. You live this truth right here in South Korea, just as we do in the United States. Both of our countries have been hit by serious cyber-attacks from state and non-state actors. Worldwide, the risk and frequency of such attacks is on the increase.

America’s policy is to promote international cyber stability. The goal is to create a climate in which all states are able to enjoy the benefits of cyberspace; all have incentives to cooperate and avoid conflict; and all have good reason not to disrupt or attack one another. To achieve this, we are seeking a broad consensus on where to draw the line between responsible and irresponsible behavior.

As I’ve mentioned, the basic rules of international law apply in cyberspace. Acts of aggression are not permissible. And countries that are hurt by an attack have a right to respond in ways that are appropriate, proportional, and that minimize harm to innocent parties. We also support a set of additional principles that, if observed, can contribute substantially to conflict prevention and stability in time of peace. We view these as universal concepts that should be appealing to all responsible states, and they are already gaining traction.

First, no country should conduct or knowingly support online activity that intentionally damages or impedes the use of another country’s critical infrastructure. Second, no country should seek either to prevent emergency teams from responding to a cybersecurity incident, or allow its own teams to cause harm. Third, no country should conduct or support cyber-enabled theft of intellectual property, trade secrets, or other confidential business information for commercial gain. Fourth, every country should mitigate malicious cyber activity emanating from its soil, and they should do so in a transparent, accountable and cooperative way. And fifth, every country should do what it can to help states that are victimized by a cyberattack.

I guarantee you if those five principles were genuinely and fully adopted and implemented by countries, we would be living in a far safer and far more confident cyberworld.

But even with these principles, ensuring international cyber stability will remain a work in progress. We still have a lot of work to do to develop a truly reliable framework – based on international law – that will effectively deter violations and minimize the danger of conflict.

To build trust, the UN Group of Governmental Experts has stressed the importance of high-level communication, transparency about national policies, dispute settlement mechanisms, and the timely sharing of information – all of them, very sound and important thoughts. The bottom line is that we who seek stability and peace in cyberspace should be clear about what we expect and intend, and those who may be tempted to cause trouble should be forewarned: they will be held accountable for their actions. The United States reserves the right to use all necessary means, including economic, trade and diplomatic tools, as appropriate in order to defend our nation and our partners, our friends, our allies. The sanctions against North Korean officials earlier this year are one example of the use of such a tool in response to DPRK's provocative, destabilizing and repressive actions, including the cyber-attack on Sony Pictures. Now, as the international community moves towards consensus about what exactly constitutes unacceptable behavior in cyberspace, more and more responsible nations need to join together to act against disruptors and rogue actors.

As we know, malicious governments are only part of the cybersecurity problem. Organized crime is active in cyberspace. So are individual con artists, unscrupulous hackers, and persons engaged in fraud. Unfortunately, the relative anonymity of the internet makes it an ideal vehicle for criminal activity – but not an excuse for working through the principles I described to finding rules of the road and working so that the internet works for everybody else. The resulting financial cost of those bad actors, the cost of cybercrime, is already enormous, but so is the loss of trust in the internet that every successful fraud or theft engenders.

And that’s precisely why the United States is working with partners on every continent to strengthen the capacity of governments to prevent cyber-crime through improved training, the right legal frameworks, information sharing, and public involvement.

The best vehicle for international cooperation in this field is the Budapest Convention on Cybercrime, which my government urges every nation to consider joining. There is no better legal framework for working across borders to define what cybercrime is and how breaches of the law should be prevented and prosecuted. We also support the G-7 24/7 Network – in which South Korea is an active participant – and that enables police and prosecutors from more than 70 countries to request rapid assistance on their investigations.

The United States is also working with partners to improve network defenses and in cooperation with other countries to respond to cyber incidents. All of this is crucial, because in an interconnected system like the internet, poor cybersecurity has the potential to increase the danger for all of us. So we have to help each other. We have to maintain direct contact between our incident response teams, invest heavily in that capacity, and build that capacity so that weak spots are turned into stronger blockages against the vulnerabilities, and ultimately, they disappear.

So to sum up, I think it is clear to all of us that the internet is not like most inventions that affect a single industry, require just a few tweaks – a little adjustment here and there – and then we can all move on. That’s not what it requires. Digital technology has led us into a whole new frontier in which we have to find our way – and there are many different dimensions to it. When I was still in the United States Senate, I introduced legislation to protect the privacy rights of individuals and I still feel very strongly about that principle. And we are working to make sure we protect the privacy of people, not just in our country but in others.

As Secretary of State, I am in charge of an organization that is the target of hacking attempts every single day – and we have to defend against those. As a diplomat, I’m constantly engaged in discussions with counterparts about how to best enhance access and how to design and enforce the right rules to protect all of us.

My meetings with the private sector, the scientific community, the civil society, all bring home to me how important it is that all stakeholders have a voice in internet governance. The very essence of this technology is its freedom and its openness, and unless we bring all the stakeholders to the table, that will be lost. And something more important than all of us will be lost with it.

We cannot let that happen. Now, as I said before, obviously, the internet is not without risk – but at the end of the day, if we restricted all technology that could possibly be used for bad purposes, we’d have to revert to the Stone Age. Throughout the global community, we need to come together around principles that will establish a solid foundation for our freedoms – principles that will protect the rights of individuals, the privacy of our citizenry, and the security of our nations – all at the same time.

So I leave you with a somewhat unusual request: Keep doing what so many of you are already doing. Speak up for an open and secure internet. Defend freedom of expression. Add to South Korea’s great reputation as a leader in digital technology. In doing so, we can be absolutely confident about the future that we will shape.

And how will we know when we finally have succeeded? When an open, secure internet is as widespread as electricity or cellphone coverage itself. When it is fully integrated into everyday life in every corner of the globe. When it is no longer contested but accepted and even taken for granted. When we reach that point – believe me: Your successors will look back at all of this debate and they will wonder how could anyone have argued the other way.

My friends, if we do all of these things, if we stick by our guns, the internet revolution that we are living today will literally define the kinds of opportunities that young people all over the world are hoping for today – help strengthen governments; provide opportunity; make us safer; bring us together; and in effect, define the future of this century. That’s the goal we’re fighting for, and we look forward to working with all of you to achieve it.

Thank you.

Saturday, May 23, 2015

U.S. INTERIOR DEPARTMENT VIDEO: THIS WEEK AT INTERIOR MAY 22, 2015

FTC SAYS CONSUMERS LOST MONEY IN INTERNATIONAL SWEEPSTAKES SCAM

FROM:  U.S. FEDERAL TRADE COMMISSION
Consumers Lost Millions of Dollars Despite ‘Guarantee’ of Prize Money

At the request of the Federal Trade Commission, a federal court has temporarily halted a sweepstakes operation based in Fort Lauderdale that took more than $28 million from consumers throughout the United States and other countries, including Australia, Canada, France, Germany, Japan, and the United Kingdom. The FTC seeks to permanently end the allegedly illegal practices and return money to victims.

“This outfit promised people huge prizes and collected millions in fees but never paid out a dime,” said Jessica Rich, Director of the FTC’s Bureau of Consumer Protection. “If someone says you have to pay to claim a sweepstakes prize, assume it’s a scam.”

According to the FTC’s complaint and other court filings, the defendants mailed personalized letters falsely telling consumers that they had won large cash prizes, typically more than $2 million. The prizes are “guaranteed,” the letters stated, but to collect the money, consumers had to mail the defendants a $20-$30 fee by cash, check or money order. To create a false sense of urgency, they set a deadline, typically 10 days, and warned consumers they would forfeit their winnings if they didn’t pay on time.

In reality, consumers had not won anything. The defendants have no connection to any sweepstakes and cannot award or pay anyone the promised prizes. “Only in dense, confusing language, at the bottom or on the back of the letters,” the FTC explains, do they admit that the only service they provide is compiling “reports” about sweepstakes and contests offered by other parties that are open to the public. By design, the defendants’ disclaimers are unclear and inconspicuous, and fail to alert consumers to the truth, and most consumers don’t even receive the “reports” and would never have agreed to pay $20-$30 for them.

The defendants are Mail Tree Inc.; Michael McKay Co.; Spin Mail Inc.; MCP Marketing Activities LLC, also doing business as Magellan Mail and Magellan Marketing; Trans National Concepts Inc.; Romeria Global LLC, also d/b/a Lowenstein Varick and Nagel; Supreme Media LLC; Vernier Holdings Inc.; Awards Research Consultant LLC;  Mailpro Americas Corp.; Masterpiece Marketing LLC, also d/b/a Affiliated Opportunities Group (AOG), Corporate Accounting Authority (CAA), Dispatch Notification Services (DNS), Information Reporting Group (IRG), National Directory Center (NDC), and Priority Information Exchange (PIE); Matthew Pisoni; Marcus Pradel; John Leon; and Victor Ramirez. The court issued an order that temporarily stopped the illegal conduct, froze the defendants’ assets, and appointed a receiver to control the operation while the FTC pursues the case.

The Office of the United States Attorney for the Southern District of Florida arrested Matthew Pisoni, Marcus Pradel, John Leon and Victor Ramirez in connection with the sweepstakes operation.

“No one is permitted to steal hard-earned money from members of our community,” U.S. Attorney Wifredo A. Ferrer said. “This office will work with international, national and local law enforcement agencies to prevent these types of sweepstake fraud schemes, and we will bring those who commit these crimes to justice.”

The FTC would like to thank the United States Postal Inspection Service, the United States Department of Treasury - Internal Revenue Service - Criminal Investigation, the Vancouver Police Department, the Windsor (Ontario) Police Service, and the Metropolitan Police in the United Kingdom for their assistance in this case.

The Commission vote authorizing the staff to file the complaint in the U.S. District Court for the Southern District of Florida was 5-0. The court entered a temporary restraining order against the defendants on May 19, 2015.

To learn how to avoid these kinds of scams, read the FTC's Prize Scams.

NOTE: The Commission files a complaint when it has “reason to believe” that the law has been or is being violated and it appears to the Commission that a proceeding is in the public interest. The case will be decided by the court.

CDC ANNOUNCES DROWNING OUTCOMES RELATED TO DESIGNATED DANGEROUS UNDERWATER BREATH-HOLDING BEHAVIORS

FROM:  CENTERS FOR DISEASE CONTROL AND PREVENTION
Fatal and Nonfatal Drowning Outcomes Related to Dangerous Underwater Breath-Holding Behaviors — New York State, 1988–2011

Drowning is a preventable public health risk. Through education and policy interventions and increased awareness of these dangerous swimming behaviors, the aquatic health and safety community can play a significant role in decreasing fatalities among all recreational populations. This report identifies a class of swimming behaviors, designated dangerous underwater breath-holding behaviors (DUBBs), that can lead to fatal drowning. These behaviors could easily be prevented to decrease the risk of drowning among otherwise healthy swimmers. These findings expand the domain of active drowning surveillance to consider the epidemiology of contributing behaviors in fatal and non-fatal drowning incidents.

Search This Blog

Translate

White House.gov Press Office Feed