NEWS of the Day - March 8, 2012 |
|
on some issues of interest to the community policing and neighborhood activist across the country
EDITOR'S NOTE: The following group of articles from local newspapers and other sources constitutes but a small percentage of the information available to the community policing and neighborhood activist public. It is by no means meant to cover every possible issue of interest, nor is it meant to convey any particular point of view ...
We present this simply as a convenience to our readership ... |
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From the L.A. Daily News
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CSUN's police department launches online crime reporting service
LA Daily News
Cal State Northridge's Department of Police Services has launched an online crime reporting service.
The public can log on to the web-based system to file reports for minor thefts, vehicle burglaries, lost property, hit and run, identity theft and other crimes and incidents.
The service allows the public to file a report at a time when it's convenient, rather than having to wait for an officer to respond or call back. Estimated time to complete an online report is four to six minutes.
"The department is challenged by the growing size and pace of the campus, which can contribute to longer wait times for officers to respond to your location to take a report," said Police Chief Anne P. Glavin. "Online reporting is convenient, fast and free."
The public can print a temporary copy of the report after submitting the information. The report will be reviewed by police and once approved, the person filing will receive, at no cost, an email with a copy of the report attached.
The web-based crime reporting service is available on the department's website at www-admn.csun.edu/police.
http://www.dailynews.com/crime/ci_20124042/csuns-police-department-launches-online-crime-reporting-service
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Milestone in prison overcrowding INMATES: Bunk beds packed into gymnasiums removed after court order
by Don Thompson
TRACY - California prisons marked a milestone Friday, when officials said they had removed the last of nearly 20,000 beds that had been jammed into gymnasiums and other common areas to house inmates who overflowed traditional prison cells.
Inmates in rows of double- and triple-stacked bunk beds became an iconic symbol of the overcrowding crisis, Corrections Secretary Matthew Cate said in announcing an end to the practice.
"It symbolized, I think, a system that was so crowded it could not work effectively or efficiently," Cate said at Deuel Vocational Institution in Tracy, 70 miles southwest of the state capital.
Crowding was so bad at the California Rehabilitation Center in Riverside County in 2005 that it was hours before guards discovered an inmate had been killed in his bunk in a makeshift dormitory.
Since then, federal judges have forced California to radically change the way it houses criminals. The prison population dropped by nearly 19,000 inmates after a new law took effect in October that sends less serious offenders to county jails instead of state prisons.
The state has nearly 142,000 inmates but must shed another 17,000 inmates to reach the June 2013 court deadline to reduce crowding in its 33 adult prisons. The federal judges ordered the state to reduce its inmate population as a way to improve inmate medical care, which was so inadequate that judges ruled it violated prisoners' constitutional rights.
The overflow beds once held more inmates than the entire prison populations of 25 other states, according to national statistics for 2010, the most recent available.
The U.S. Supreme Court published two photographs of tattooed, shirtless inmates milling around three-tier bunk beds as part of its ruling last year upholding the authority of lower courts to order California to reduce crowding.
Cramped conditions promote unrest and violence, the justices said. The court's ruling cited a medical expert who testified that forcing large numbers of inmates to share a few toilets made the congested areas breeding grounds for disease.
The crowding was unhealthy and dangerous not only for inmates, the court said, but for the guards, as well. The ratio in some overcrowded dormitories was often two or three guards for every 200 inmates.
http://www.dailynews.com/crime/ci_20091116
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Cellphone-related fatal car crashes are down 47%
by Bruce Newman
SAN JOSE - California drivers squawked, they talked, and one or two even balked at having cellphones ripped from their hands when the state law forbidding the use of hand-held phones on the road went into effect in 2008. But according to a study announced Monday by the state Office of Traffic Safety, the total number of traffic deaths in California declined by 22 percent since that time. With fewer drivers yakking into handheld phones, the death-by-cellphone rate dropped an even more stunning 47 percent.
"Those are huge numbers," said state Sen. Joe Simitian, D-Palo Alto, author of the bill whose outcome the study tracked, while taking a (hands-free) victory lap after the announcement. Simitian submitted a version of the bill for five consecutive years and was rebuffed each time, before the Legislature finally relented in 2006.
The year after the law was implemented, the CHP reported 700 fewer fatal accidents, and that there were 75,000 to 100,000 fewer collisions. "The drop in collisions was the biggest single year-to-year drop in the history of the state since the CHP began keeping the data," Simitian said.
The report examined state crash records two years before and two years after the ban went into effect.
Though the base fine for being caught driving with a phone in your hand is still only $20, the law here is viewed as more effective than other states' because it is strictly enforced.
"California is one of the few states that has been very aggressively enforcing its cellphone law," said Barbara Harsha, executive director of the Governors Highway Safety Association in Washington, D.C. "That's a big drop. We were surprised by the numbers. It shows that enforcement works, that other states should look at what California has done and follow its lead."
The study used a statewide census of police-reported traffic crashes to produce the first analysis of its kind in the nation. Its findings were restricted to accidents caused specifically by drivers using hand-held cellphones, and came to conclusions that were less grandiose than Simitian's - only 70-80 lives saved and about 5,000 injuries prevented in the first two years of the law.
Critics of the law also point to distractions other than talking on the phone - eating a sandwich, applying makeup, changing the radio station - as the cause of accidents. Asked if the 22 percent decline in traffic deaths traced to implementation of the hands-free phone law was too specific, David Ragland, the study's author, said, "It is."
http://www.dailynews.com/politics/ci_20108652/cellphone-related-fatal-car-crashes-are-down-47
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
From the FBI
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Statement Before the House Appropriations Committee, Subcommittee
on Commerce, Justice, Science, and Related Agencies
Washington, D.C.
March 07, 2012 Good morning Chairman Wolf, Ranking Member Fattah, and members of the subcommittee. On behalf of the over 34,000 men and women of the FBI, I would like to thank you for the years of support you have provided to the Bureau.
The FBI remains focused on defending the United States against terrorism, foreign intelligence, and cyber threats; upholding and enforcing the criminal laws of the United States; protecting civil rights and civil liberties; and providing leadership and criminal justice services to federal, state, municipal, and international agencies and partners. Our continued ability to carry out this complex and demanding mission reflects the support and oversight provided by this subcommittee.
More than 10 years after the terrorist attacks of 9/11, the FBI continues to be a threat-focused, intelligence-driven organization that is guided by clear operational strategies. And we remain firmly committed to carrying out these strategies under guidelines established by the attorney general that protect the civil liberties of those entrusting us with the authorities to carry out our mission.
As our nation's national security and criminal adversaries constantly adapt and evolve, so must the FBI be able to respond with new or revised strategies and operations to counter these threats. The FBI continues to shift to be more predictive, preventative, and actively engaged with the communities we serve. The FBI's evolution has been made possible by greater use of technology to gather, analyze, and share information on current and emerging threats; expansion of collaboration with new partners, both domestically and internationally; and investments in training, developing, and maximizing our workforce. The FBI continues to be successful in maintaining this momentum of transformation even during these challenging times.
The FBI's fiscal year (FY) 2013 budget request totals $8.2 billion in direct budget authority, including 34,083 permanent positions (13,018 special agents, 3,025 intelligence analysts, and 18,040 professional staff). This funding level continues increases provided to the Bureau in the past, most recently in FY 2012, allowing the FBI to maintain its forward progress, including targeting additional resources on investigating financial and mortgage fraud.
Let me briefly summarize the key national security threats and crime problems that this funding supports.
National Security Threats
Terrorism
The terrorist threat facing the United States remains complex and ever-changing. We are seeing more groups and individuals engaged in terrorism, a wider array of terrorist targets, greater cooperation among terrorist groups, and continued evolution and adaptation in tactics and communication.
While Osama bin Laden and certain other key leaders have been removed, al Qaeda and its affiliates and adherents continue to represent the top terrorism threat to the United States abroad and at home. Core al Qaeda remains committed to high-profile attacks against the United States. Additionally, al Qaeda affiliates and surrogates, such as al Qaeda in the Arabian Peninsula, represent significant threats to our nation. These groups have attempted several attacks against the homeland and our citizens and interests abroad, including the failed Christmas Day airline bombing in 2009 and the attempted bombing of U.S.-bound cargo planes in October 2010.
In addition to al Qaeda and its affiliates, the United States faces a terrorist threat from self-radicalized individuals. Self-radicalized extremists—often acting on their own—are among the most difficult to detect and stop. For example, just last month, the FBI arrested Amine El Khalifi, a 29-year-old Moroccan immigrant, for the suspected attempt to detonate a bomb in a suicide attack on the U.S. Capitol building. According to court documents, Khalifi believed he was conducting the terrorist attack on behalf of al Qaeda and had become radicalized even though he was not directly affiliated with any group. The Khalifi case exemplifies the need for the FBI to continue to enhance our intelligence capabilities—to get critical information to the right people at the right time— before any harm is done.
The basis from which acts of terrorism are committed—from organizations to affiliates/surrogates to self-radicalized individuals—continue to evolve and expand. Of particular note is al Qaeda's use of online chat rooms and websites to recruit and radicalize followers to commit acts of terrorism. And they are not hiding in the shadows of cyber space: al Qaeda in the Arabian Peninsula has produced a full-color, English-language online magazine. Terrorists are not only sharing ideas; they are soliciting information and inviting communication. Al Shabaab, the al Qaeda affiliate in Somalia, uses Twitter to taunt its enemies—in English—and encourage terrorist activity.
To date, terrorists have not used the Internet to launch a full-scale cyber attack, but we cannot underestimate their intent. Terrorists have shown interest in pursuing hacking skills. And they may seek to train their own recruits or hire outsiders, with an eye toward pursuing cyber attacks. These adaptations of the terrorist threat make the FBI's counterterrorism mission that much more difficult and challenging.
Foreign Intelligence
While foreign intelligence services continue traditional efforts to target political and military intelligence, counterintelligence threats now include efforts to obtain technologies and trade secrets from corporations and universities. The loss of critical research and development data, intellectual property, and insider information poses a significant threat to national security.
For example, last year, Noshir Gowadia was sentenced to 32 years in prison for selling secrets to foreign nations. For 18 years, Gowadia had worked as an engineer at Northrop Grumman, the defense contractor that built the B-2 stealth bomber. Gowadia, a naturalized United States citizen from India, decided to offer his knowledge of sensitive design aspects of the B-2 to anyone willing to pay for it. He sold highly classified information about the B-2's stealth technology to several nations and made six trips to China to assist them in the development of stealth technology for their cruise missiles.
Last fall, Kexue Huang, a former scientist for two of America's largest agriculture companies, pled guilty to charges that he sent trade secrets to his native China. While working at Dow AgriSciences and later at Cargill, Huang became a research leader in biotechnology and the development of organic pesticides. Although he had signed non-disclosure agreements, he transferred stolen trade secrets from both companies to persons in Germany and China. His criminal conduct cost Dow and Cargill millions of dollars.
And just last month, five individuals and five companies were indicted in San Francisco for economic espionage and theft of trade secrets for their roles in a long-running effort to obtain U.S. trade secrets for the benefit of companies controlled by the government of the People's Republic of China. According to the indictment, the Chinese government sought to obtain a proprietary chemical compound developed by DuPont to be produced in a Chinese factory.
These cases illustrate the growing scope of the “insider threat” from employees who use their legitimate access to steal secrets for the benefit of another company or country. Through our relationships with businesses, academia, U.S. government agencies, and with other components of the Department of Justice, the FBI and its counterintelligence partners must continue our efforts to identify and protect sensitive American technology and projects of great importance to the United States government.
Cyber
Cyber attacks and crimes are becoming more commonplace, more sophisticated, and more dangerous. The scope and targets of these attacks and crimes encompass the full range and scope of the FBI's national security and criminal investigative missions. Our national security secrets are regularly targeted by foreign and domestic actors; our children are targeted by sexual predators and traffickers; our citizens are targeted for fraud and identity theft; our companies are targeted for insider information; and our universities and national laboratories are targeted for their research and development. Since 2002, the FBI has seen an 84 percent increase in the number of computer intrusions investigations opened. Hackers—whether state sponsored, criminal enterprises, or individuals—constantly test and probe networks, computer software, and computers to identify and exploit vulnerabilities.
Just as the FBI has transformed its counterterrorism program to deal with an evolving and adapting threat, the Bureau is enhancing its cyber program and capabilities. To counter the cyber threat, the FBI has cyber squads in each of our 56 field offices. The FBI now has more than 1,000 specially trained agents, analysts, and digital forensic examiners that run complex undercover operations and examine digital evidence. Along with 20 law enforcement and intelligence agency partners, the FBI is the executive agent of the National Cyber Investigative Joint Task Force. The task force operates through Threat Focus Cells—smaller groups of agents, officers, and analysts from different agencies, focused on particular threats.
In April of this year, the FBI brought down an international “botnet” known as Coreflood. Botnets are networks of virus-infected computers controlled remotely by an attacker. To shut down Coreflood, the FBI took control of five servers the hackers had used to infect some two million computers with malware. In an unprecedented step, after obtaining court approval, we responded to the signals sent from the infected computers in the United States, and sent a command that stopped the malware, preventing harm to hundreds of thousands of users.
Over the past year, the FBI and our partners have also pursued members of Anonymous, who are alleged to have coordinated and executed distributed denial of service (DDos) attacks against various Internet companies. To date, 16 individuals have been arrested and charged in more than 10 states as part of this ongoing investigation. According to the indictment, the Anonymous group referred to the DDoS attacks as Operation Avenge Assange and allegedly conducted the attacks in support of Wikileaks founder Julian Assange. The defendants are charged with various counts of conspiracy and intentional damage to a protected computer.
U.S. law enforcement and intelligence communities, along with our international and private sector partners, are making progress. Technological advancements and the Internet's expansion continue to provide malicious cyber actors the opportunity to harm U.S. national security and the economy. Given the consequences of such attacks, the FBI must be able to keep pace with this rapidly developing and diverse threat.
Criminal Threats
Criminal organizations—domestic and international—and individual criminal activity also represent a significant threat to our security and safety in communities across the nation. The FBI focuses on many criminal threats, from white-collar crime and health care fraud to organized crime and gang violence to corruption and violence along the Southwest border. Today, I would like to highlight a number of these criminal threats for the subcommittee.
Financial and Mortgage Fraud
From foreclosure frauds to subprime scams, mortgage fraud is a serious problem. The FBI continues to develop new approaches and techniques for detecting, investigating, and combating mortgage-related fraud. Through the use of joint agency task forces and working groups, the FBI and its partners work to pinpoint the most egregious offenders and identify emerging trends before they flourish. In FY 2011, these efforts translated into roughly 3,000 pending mortgage fraud investigations—compared to approximately 700 investigations in FY 2005. Nearly 70 percent of FBI's pending investigations involve losses of more than $1 million. The number of FBI special agents investigating mortgage fraud cases has increased from 120 in FY 2007 to 332 special agents in FY 2011. The multi-agency task force and working group model serves as a force-multiplier, providing an array of interagency resources and expertise to identify the source of the fraud, as well as finding the most effective way to prosecute each case, particularly in active markets where fraud is widespread.
The FBI and its law enforcement partners also continue to uncover major frauds, insider trading activity, and Ponzi schemes. At the end of FY 2011, the FBI had more than 2,500 active corporate and securities fraud investigations, representing a 47 percent increase since FY 2008. Over the past three years, the FBI has obtained approximately $23.5 billion in recoveries, fines, and restitutions in such programs, and during FY 2011, the FBI obtained 611 convictions, a historic high. The FBI is pursuing those who commit fraud at every level and is working to ensure that those who played a role in the recent financial crisis are brought to justice.
For FY 2013, the FBI is requesting a program increase totaling $15 million and 44 positions (40 special agents and four forensic accountants) to further address financial and mortgage fraud at all levels of organizations—both senior executives and lower level employees. These resources will increase the FBI's ability to combat corporate fraud, securities and commodities fraud, and mortgage fraud, and they will enable the FBI to adapt as new fraud schemes emerge.
Health Care Fraud
The focus on health care fraud is no less important. The federal government spends hundreds of billions of dollars every year to fund Medicare, Medicaid, and other government health care programs. In 2011, the FBI had approximately 2,700 active health care fraud investigations, up approximately 7 percent since 2009. Together with attorneys at the Department of Justice and our partners at the Department of Health and Human Services, the FBI is aggressively pursuing fraud and abuse within our nation's health care system.
The annual Health Care Fraud and Abuse Control Program report showed that the government's health care fraud prevention and enforcement efforts recovered nearly $4.1 billion in taxpayer dollars in FY 2011. This is the highest annual amount ever recovered from individuals and companies who attempted to defraud taxpayers or who sought payments to which they were not entitled.
Gangs and Violent Crime
Violent crimes and gang activities exact a high toll on victimized individuals and communities. There are approximately 33,000 violent street gangs, motorcycle gangs, and prison gangs with about 1.4 million members who are criminally active in the U.S. today. A number of these gangs are sophisticated and well organized; many use violence to control neighborhoods and boost their illegal money-making activities, which include robbery, drug and gun trafficking, fraud, extortion, and prostitution rings. Gangs do not limit their illegal activities to single jurisdictions or communities. FBI is able to work across such lines and, therefore, brings particular value to the fight against violent crime in big cities and small towns across the nation. Every day, FBI special agents work in partnership with state and local officers and deputies on joint task forces and individual investigations. The FBI also has a surge capacity that can be tapped into during major cases.
FBI joint task forces—Violent Crime, Violent Gang, Safe Streets, and Safe Trails—focus on identifying and targeting major groups operating as criminal enterprises. Much of the Bureau's criminal intelligence comes from our state, local, and tribal law enforcement partners, who know their communities inside and out. Joint task forces benefit from FBI surveillance assets and sources to track these gangs to identify emerging trends. Through these multi-subject and multi-jurisdictional investigations, the FBI concentrates its efforts on high-level groups engaged in patterns of racketeering. This investigative model enables us to target senior gang leadership and to develop enterprise-based prosecutions.
In addition, while the FY 2013 budget proposes to eliminate the National Gang Intelligence Center (NGIC), this will not hinder the FBI's ability to perform the analytical work done there. The FBI will continue to produce intelligence products and threat assessments, which are critical to reducing criminal gang activity in our communities. The FBI will also continue to examine the threat posed to the U.S. by criminal gangs and will focus on sharing intelligence at the field level, where intelligence sharing and coordination between Department of Justice agencies and state and local partners already exist. For example, our Field Intelligence Groups regularly produce intelligence products covering criminal threats, including gangs. It is through these existing resources that we will continue to produce gang-related intelligence in the absence of NGIC. In fact, the responsibility for the production of that material will happen now at the field level, where gangs operate in neighborhoods, districts, and communities. The field offices are the closest to the gang problem, have a unique understanding of the gang problem, and are in the best position to share that intelligence.
Violence Along the Southwest Border
The escalating violence associated with drug trafficking in Mexico continues to be a significant issue. In addressing this crime problem, the FBI relies on a multi-faceted approach for collecting and sharing intelligence—an approach made possible and enhanced through the Southwest Intelligence Group, the El Paso Intelligence Center, OCDETF Fusion Center, and the intelligence community. Guided by intelligence, the FBI and its federal law enforcement partners are working diligently, in coordination with the government of Mexico, to counter violent crime and corruption that facilitates the flow of illicit drugs into the United States. The FBI is also cooperating closely with the government of Mexico in their efforts to break the power of the drug cartels inside the country.
Most recently, the collective efforts of the FBI, the Drug Enforcement Administration, and other U.S. and Mexican law enforcement partners resulted in the identification and indictment of 35 leaders, members, and associates of one of the most brutal gangs operating along the U.S.-Mexico border on charges of racketeering, murder, drug offenses, money laundering, and obstruction of justice. Of these 35 subjects, 10 Mexican nationals were specifically charged with the March 2010 murders in Juarez, Mexico, of a U.S. Consulate employee and her husband, along with the husband of another consulate employee.
Organized Crime
Ten years ago, the image of organized crime was of hierarchical organizations, or families, that exerted influence over criminal activities in neighborhoods, cities, or states. That image of organized crime has changed dramatically. Today, international criminal enterprises run multi-national, multi-billion-dollar schemes from start to finish. These criminal enterprises are flat, fluid networks and have global reach. While still engaged in many of the “traditional” organized crime activities of loan-sharking, extortion, and murder, new criminal enterprises are targeting stock market fraud and manipulation, cyber-facilitated bank fraud and embezzlement, identify theft, trafficking of women and children, and other illegal activities. This transformation demands a concentrated effort by the FBI and federal, state, local, and international partners to prevent and combat transnational organized crime.
For example, late last year, an investigation by the FBI and its partners led to the indictment and arrest of over 70 members and associates of an Armenian organized crime ring for their role in nearly $170 million in health care fraud. This case, which involved more than 160 medical clinics, was the culmination of a national level, multi-agency, intelligence-driven investigation. To date, it remains the largest Medicare fraud scheme ever committed by a single enterprise and criminally charged by the Department of Justice.
The FBI is expanding its focus to include West African and Southeast Asian organized crime groups. The Bureau continues to share intelligence about criminal groups with our partners and to combine resources and expertise to gain a full understanding of each group. To further these efforts, the FBI participates in the International Organized Crime Intelligence Operations Center. This center serves as the primary coordinating mechanism for the efforts of nine federal law enforcement agencies in combating non-drug transnational organized crime networks.
Crimes Against Children
The FBI remains vigilant in its efforts to remove predators from our communities and to keep our children safe. Ready response teams are stationed across the country to quickly respond to abductions. Investigators bring to this issue the full array of forensic tools such as DNA, trace evidence, impression evidence, and digital forensics. Through globalization, law enforcement also has the ability to quickly share information with partners throughout the world and our outreach programs play an integral role in prevention.
The FBI also has several programs in place to educate both parents and children about the dangers posed by violent predators and to recover missing and endangered children should they be taken. Through our Child Abduction Rapid Deployment teams, Innocence Lost National Initiative, Innocent Images National Initiative, Office of Victim Assistance, and numerous community outreach programs, the FBI and its partners are working to make our world a safer place for our children.
Offsets
The FBI's FY 2013 budget request proposes offsets totaling approximately $63 million, including program reductions. Proposed offsets, which are expected to result in little if any impact on the missions and responsibilities of the FBI, include: elimination of the National Gang Intelligence Center; reduction of one training day and equipment provided for federal, state, and local bomb technicians and the Special Weapons and Tactics team and Hostage Rescue Team training; reduction of contractor workforce funding supporting national security programs; reductions in funding for permanent change of station transfers, which relocates staff to meet organizational needs and carry out mission requirements; and reducing funding for information technology, facilities, and other administrative initiatives. We will work to sustain our efforts in these program areas and minimize the impact of these proposed reductions.
Conclusion
Responding to this complex and ever-changing threat environment is not new to the FBI; in fact, it is now the norm. The budget proposed for the FBI for FY 2013 seeks to maintain current capabilities and capacities achieved through increases provided in the past, as well as target additional resources to address financial and mortgage fraud. These resources are critical for the FBI to be able to address existing and emerging national security and criminal threats.
Chairman Wolf, Ranking Member Fattah, and members of the subcommittee, I would like to close by again thanking you for this opportunity to discuss the FBI's priorities and detail the FBI's FY 2013 budget request. Mr. Chairman, let me again acknowledge the leadership that you and this subcommittee have provided to the FBI. The transformation the FBI has achieved over the past 10 years would not have been possible without your support. Your investments in our workforce, our technology, and our infrastructure make a difference every day at FBI offices in the United States and around the world, and we thank you for that support.
http://www.fbi.gov/news/testimony/fbi-budget-request-for-fiscal-year-2013
|