Man shot by police in London after stabbings

London’s Metropolitan Police Service said two people were stabbed in Streatham, located in the southern part of London and the unidentified man was then shot by London police officers.


Two people were injured in what police described as a “terrorist-related” incident.

London’s Metropolitan Police Service said two people were stabbed in Streatham, located in the southern part of London and the unidentified man was then shot by London police officers.

Some reports have suggested that the man entered a shop and started stabbing people and appeared to have left the shop and stabbed a woman, possibly a cyclist.

Witnesses reported hearing three gun shots and a man was seen lying on the floor, as armed police approached.

The police force said the incident happened in the Streatham neighborhood of south London, a bustling residential area that doesn’t boast any major British landmarks like areas hit by earlier attacks. Gulled Bulhan, a 19-year-old student from Streatham, told Britain’s Press Association that he witnessed the attack.

“I was crossing the road when I saw a man with a machete and silver canisters on his chest being chased by what I assume was an undercover police officer — as they were in civilian clothing,” he said. “The man was then shot. I think I heard three gunshots, but I can’t quite remember.”

FoxNews.com/BBC.com (Feb. 2020).  London stabbings declared ‘terrorist-related’ after 2 injuredStreatham: Man shot dead by police after stabbings in London

Help me maintain this news reporting blog by donating here.

DOD to Require Cybersecurity Certification in Some Contract Bids

By the end of September 2020, the Department of Defense (DOD) will require at least some companies bidding on defense contracts to certify that they meet at least a basic level of cybersecurity standards when responding to a request for proposals.


By the end of September 2020, the Department of Defense (DOD) will require at least some companies bidding on defense contracts to certify that they meet at least a basic level of cybersecurity standards when responding to a request for proposals.

DOD released its new Cybersecurity Maturity Model Certification on Friday, billed by the undersecretary of defense for acquisition and sustainment as “Version 1.0.”

By June, the department plans to publish as many as 10 requests for information on contracts that include CMMC requirements, Ellen M. Lord said during a Pentagon news conference announcing the certification effort. By September, she said, the department will also publish corresponding requests for proposals that include those requirements. By fiscal year 2026, all new DOD contracts will contain the CMMC requirements, Lord said.

“I believe it is absolutely critical to be crystal clear as to what expectations for cybersecurity are, what our metrics are, and how we will audit for those expectations,” Lord said. “CMMC is a critical element of DOD’s overall cybersecurity implementation.”

Lord said cybersecurity risks threaten the defense industry and the national security of the U.S. government, as well as its allies and partners. About $600 billion, or 1% of the global gross domestic product, is lost through cyber theft each year, she noted.

“Adversaries know that in today’s great-power competition environment, information and technology are both key cornerstones,” she said. “Attacking a sub-tier supplier is far more appealing than a prime [supplier].”

The CMMC gives the department a mechanism to certify the cyber readiness of the largest defense contractors — those at the top who win contracts are called “primes” — as well as the smaller businesses that subcontract with the primes.

The new CMMC provides for five levels of certification in both cybersecurity practices and processes.

“Something … simple in Level 1 would be, ‘Does your company have antivirus software? Are you updating your antivirus software? Are you updating your passwords?'” said Katie Arrington, DOD’s chief information security officer for acquisition. “CMMC Level 1 is the basic cyber hygiene skills we should be doing every day. They are there to protect yourself, your company and your own information.”

By CMMC Level 2, Arrington said, the department will also begin looking at cybersecurity processes as well, to ensure cybersecurity is not just practiced, but that a company is effectively documenting, managing, reviewing and optimizing its practices across its entire enterprise.

Arrington said that for the roughly 10 requests for information  and requests for proposals DOD is expected to publish later this year for potential contracts, she expects a mix of CMMC certification levels will be required.

“We’ll have some CMMC Level 3, CMMC Level 1, and there may be one or two with the 4 or 5 CMMC levels going out,” Arrington said.

The department will not be certifying potential defense contractors for CMMC on its own. Instead, Lord explained, a series of CMMC “third-party assessment organizations” or C3PAOs, will conduct those assessments. The C3PAOs will also not be paid by the department, Lord said. “That’s a private transaction between industrial base companies and those of certification bodies,” she added.

No C3PAOs have been designated to conduct the assessments yet, Lord said, noting that while multiple companies are interested, DOD has not yet designated who is qualified.

A newly created 13-member CMMC accreditation body, made up of members of the defense industrial base, the cybersecurity community and the academic community will oversee the training, quality and administration of the C3PAOs, Lord said.

Meanwhile, she said, the department is drafting a memorandum between DOD and the CMMC accreditation body to outline its roles, responsibilities and rules. She said one area of concern will be to ensure no conflicts of interest are involved in accreditation. For example, a C3PAO would not be able to accredit itself for CMMC.

No existing contracts with the department will have CMMC requirements inserted into them, Arrington said.

Subcontractors to a prime contractor will not all need to have the same level of CMMC certification to win a contract, Arrington said.

“Security is not one size fits all,” she added. Instead, she said, depending on how controlled unclassified information flows between those parties involved in a contract, subcontractors might need only be a CMMC Level 1 company.

CMMC will ensure a more level and fair playing field for companies bidding on DOD contracts, Arrington said. Today, she said, some small businesses bidding on work might self-attest that they meet requirements to handle certain kinds of information, but in fact only are planning to meet those requirements, while another business might actually be meeting the requirements. CMMC, she said, will ensure that only companies that actually meet requirements can compete for contracts.

“We need to make sure our industry partners are prepared to take on the work, and our third-party auditors will ensure that they are implementing the practices that we need in place to secure that national defense and our industrial base,” Arrington said.

Lord said the department is aware that CMMC requirements could be a burden to some smaller companies and that DOD is working with primes and smaller companies to help them overcome that burden.

“We need small and medium businesses in our industrial base, and we need to retain them,” she said. “We will continue to work to minimize impacts, but not at the cost of national security.”

Defense.gov (2020). DOD to Require Cybersecurity Certification in Some Contract Bids

Help me maintain this news reporting blog by donating here.

Air Force Colonel Sentenced for Receiving Child Pornography

An Air Force Colonel was sentenced today to five years in prison followed by 15 years of supervised release for receiving child pornography.


An Air Force Colonel was sentenced today to five years in prison followed by 15 years of supervised release for receiving child pornography.

Assistant Attorney General Brian A. Benczkowski of the Justice Department’s Criminal Division and U.S. Attorney G. Zachary Terwilliger for the Eastern District of Virginia made the announcement.

“According to admissions made in connection with his plea agreement, between November 2015 and June 2016, Mark Visconi, 48, received and attempted to receive child pornography using the Internet. Visconi used an online bulletin board dedicated to the sharing of child pornography that operated on the anonymous Tor network to download child pornography. A forensic review of his laptop showed that Visconi downloaded and viewed numerous child pornography images and videos.  Visconi previously pleaded guilty on Oct. 4, 2019.”

“Visconi also admitted to using his cell phone to create hundreds of apparently surreptitious pictures that were focused on the clothed buttocks of minor girls, including images that appear to have been taken with a camera angled upward underneath a minor’s skirt or loose shorts so as to depict or attempt to depict the minor’s underwear.”    

The case was investigated by U.S. Immigration and Customs Enforcement’s Homeland Security Investigations. Trial Attorney Gwendelynn Bills of the Criminal Division’s Child Exploitation and Obscenity Section (CEOS) and Assistant U.S. Attorney Whitney Russell of the Eastern District of Virginia are prosecuting the case.

This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse.  Led by U.S. Attorneys’ Offices and CEOS, Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims. 

For more information about Project Safe Childhood, please visit www.justice.gov/psc.

Photo: Col. Mark Visconi, shown in this 2007 photo as a Major, pleaded guilty to child pornography charges and was sentenced to five years in prison. (David Armer/Air Force)

Help me maintain this news reporting blog by donating here.

GBI Arrests Lamar County, Georgia Man for Terroristic Threats and Acts

On Tuesday, January 28, 2020, Michael C. Hudgins, 24, of Barnesville, GA, was arrested by Georgia Bureau of Investigation (GBI) Agents for violation of O.C.G.A. 16-11-37, Terroristic Threats and Acts.


On Tuesday, January 28, 2020, Michael C. Hudgins, 24, of Barnesville, GA, was arrested by Georgia Bureau of Investigation (GBI) Agents for violation of O.C.G.A. 16-11-37, Terroristic Threats and Acts.

In addition to that charge, Hudgins was also charged with theft by receiving a stolen firearm, seven (7) counts of possession of a firearm by a first offender probationer, trafficking methamphetamine, and possession of marijuana with intent to distribute.

This arrest stems from a thorough investigation by the GBI Region 6 (Milledgeville) Office along with Lamar County Georgia Sheriff’s Office Investigators.

The Lamar County Sheriff’s Office (LCSO) requested the GBI’s assistance in reference to a terroristic threats investigation involving Michael Hudgins, an employee of Continental Tire at the Aldora Mill.  Hudgins made comments to another Continental Tire employee about bringing an AK 47 rifle to work and “shooting up the place”.

Hudgins also told this other employee not to come to work on February 1st because he was going to carry out his assault on that day.

On Tuesday, January 28, 2020, GBI Agents and LCSO Investigators made contact with Hudgins at his residence of 350 Freeman Rd. Barnesville, Ga. 

Prior to making contact with Hudgins, law enforcement discovered that he was on first offender probation from a previous arrest. In Hudgins bedroom, law enforcement discovered seven (7) firearms that Hudgins is not permitted to have due to his probation conditions.

Law enforcement then found over three (3) ounces of suspected methamphetamine, along with a quantity of suspected marijuana, in an outbuilding on the property. Troy Guy Peacock,41, was also arrested at this location due to a probation violation warrant.

Help me maintain this news reporting blog by donating here.

Fake Investors Busted in Belgium and France

The French National Gendarmerie (Gendarmerie Nationale) in collaboration with the Belgian Federal Judicial Police (Police Judiciaire Fédérale) and the Israeli Police, supported by Europol and Eurojust, have brought down a large network of investment fraudsters


More than 85 victims in Belgium and France suffered around €6 million losses for believing in the fraudsters’ false promises

The French National Gendarmerie (Gendarmerie Nationale) in collaboration with the Belgian Federal Judicial Police (Police Judiciaire Fédérale) and the Israeli Police, supported by Europol and Eurojust, have brought down a large network of investment fraudsters.

The criminal group was involved in money laundering and binary investment fraud

In the beginning of 2019, four suspects were arrested in France, three of which were detained. At the end of 2019, five other suspects were arrested and questioned in Israel with the support of an international Operational Task Force set-up by Europol bringing together Belgian, French, and Israeli investigators and magistrates.

More than one million euros ($1.1 million US dollars) have already been seized from the fraudsters’ accounts.

A French-Israeli citizen who has already been convinced of massif fraud related to carbon tax is suspected to be the mastermind.

FAKE WEBSITES AND BOGUS COMPANIES TO FRAUD INVESTORS

The investigation into this criminal network, active in Belgium and France and controlled by an Israeli branch, began in 2018. The criminal organization managed to set-up a sophisticated system promising big gains on investments in bitcoin, gold and diamonds. The suspects were offering their financial services on online platforms. The criminal network also set up bogus companies as a part of their money laundering scheme.  

The suspects were promising between 5 and 35% return on investment. They then proceeded to pretend to manage the victims’ wallets and invite them to invest more money. To increase the confidence in their services, they were paying some of the victims the interests on their investments. Once the victims were won over, the fraudsters would offer bigger opportunities, which required higher amounts to be invested.

A big French private company and a French local authority are among the victims of this network. The investments of the victims were placed on accounts in different EU Member States before being transferred to other international accounts. 

The network is believed to be responsible for frauds which amount to at least €6 million ($6.6 Million US Dollars). The investigators have also discovered invoices for few million euros, which the fraudsters had not yet finalized.

Europol supported the investigation since 2018 and facilitated the information exchange between the participating countries. A Europol Operation Task Force between investigators and magistrates from Belgium, France and Israel to increase the operational cooperation between the countries involved in the investigation.

Europol provided also analytical and technical support and deployed an expert on-the-spot to cross-check operational information against Europol’s databases and thus, provide leads to investigators. 

Help me maintain this news reporting blog by donating here.