German Law Enforcement to Trial Run a “Cyber-Armed Forces” Center

C. Aliens– The State Criminal Police Office in Stuttgart and the Ministry of the Interior, in collaboration with numerous private industry organizations, announced plans for a new law enforcement branch known as the “Cyber-Armed Forces Coordination Center.” Depending on how the pilot program plays out, the Cyber-Armed Forces may set the standard for cyber defense in Germany, Minister of the Interior Thomas Strobl announced. Strobl, according to StN, could not yet reveal the location of this new center or what exactly it would do. He was, however, able to reveal information the news outlet considered “concrete.”

Minister Strobl explained that many small businesses are unable to afford IT or cybercrime specialists. Yet, many of the large companies handled cyberattacks on their own. He introduced the concept in the days before August as a cyber defense center that could respond “seven days a week and 24 hours a day quickly if they [small or medium sized businesses] were affected by a cyber attack.” He added that “IT security is the foundation of the digital world” detailed the reasons every organization should have access to “cyberexperts.”


The LKA and collaborators will test the Cyber-Armed Forces Coordination Center for 15-months. After the trial period, government officials will determine whether or not the program will expand to states other than Baden-Württemberg. Currently, the known collaborators (with the LKA and Ministry of the Interior) are the Research Center for Computer Science, the Competence Center for Applied Safety Technology (KASTEL), the Central Contact Point Cybercrime (ZAC), and the Computer Emergency Response Team (CERT).

And according to the LKA, the need for this center has reached an all time high. In 2015, the Baden-Württemberg LKA recorded 400 attacks on businesses. By 2016, the number of attacks had grown to nearly 1,200. They usually saw attacks similar to the attacks the IRS had warned US companies of in 2016 and 2017 . Business Email Compromise or BEC scams. “These are incredibly tricky schemes that can be devastating to a tax professional or business,” IRS Commissioner John Koskinen reported. “Cybercriminals target people with access to sensitive information, and they cleverly disguise their effort through an official-looking email request.”

The LKA also reported an increase in ransomware through malicious emails. ”The criminals demand a payment of ransom – usually in the form of the so-called bitcoins,” they explained. Strobl said that Baden-Württemberg was an innovative market leader in Europe. Because of this, criminals are attracted to Baden-Württemberg. “[The government] is therefore doing everything it can to help those small and medium-sized businesses who still need a lot of support in this area,” he said. “If data and the know-how are not secure, everything is nothing in the process of digitization.”



IRS Warns of Tax Information for Sale on the Darknet Through W-2 Fraud

According to the IRS, a scam called a “business email compromise” (BEC) had increased in frequency since inception, topping the charts in 2017. From a tax management perspective, these emails are potentially the most destructive. “A business email compromise occurs when a cybercriminal is able to “spoof” or impersonate a company or organization executive’s email address and target a payroll, financial or human resources employee with a request,” the IRS said. “For example, fraudsters will try to trick an employee to transfer funds into a specified account or request a list of all employees and their Forms W-2.”


This warning came as “Step 6” of the IRS’s “Don’t Take the Bait” series. The series, in turn, is part of the “Protect Your Clients, Protect Yourself” campaign. It encourages tax professionals to “increase their computer security” and employ caution when checking their email. These professionals, the IRS warned, “must remember that they have not just an obligation but a legal requirement under federal law to protect taxpayer information.”

BEC scams had circulated various financial sectors for years, but the IRS only warned of the W-2 scam in 2016. The BEC scam expanded as rapidly as it did due to the numerous methods of profiting from the stolen information. Scammers often immediately filled taxes on the victim’s behalf, delaying detection for months. The scammers also sold the victim’s information on the darknet, the IRS revealed. This practice is increasing in popularity.


“These are incredibly tricky schemes that can be devastating to a tax professional or business,” IRS Commissioner John Koskinen reported. “Cybercriminals target people with access to sensitive information, and they cleverly disguise their effort through an official-looking email request.”

According to an FBI announcement from early 2017, this type of scam increased 1,300 percent since January 2015. Additionally, it has been connected to more than $3,000,000,000 in fraudulent wire transfers. The Bureau discovered that the majority of the scammers are part of both national and international organized crime groups that stretch across more than 100 countries.


Collecting, translating, producing, and disseminating open source information that meets the needs of policymakers, the military, state and local law enforcement, operations officers, and analysts through-out Governments.
This entry was posted in CRYPTOCURRENCIES, Uncategorized and tagged , , , , , , , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s