December 2021

SOURCE: ClearanceJobs by Lindy Kyzer – August 9, 2021

New policy requires federal employees and contractors who will be working on site at federal facilities to fill out a form listing their vaccination status. With hot COVID cards already available some may be tempted to fake their vaccination status in order to get into their government office. But the Biden Administration's Safe Workforce FAQ includes special warning for those who may be tempted to lie about their vaccination status:

Federal employees who make a false statement on the Certification of Vaccination form could be subject to an adverse personnel action, up to and including removal from their position. It is also a federal crime (18 U.S.C. § 1001) for anyone to provide false information on the form. Falsification could also affect continuing eligibility for access to classified information or for employment in a national security position under applicable adjudicative guidelines.

Eligibility to access classified information is based largely on an individual's trustworthiness. Lying in any capacity is a top reason for security clearance denial, outlined via the personal conduct adjudicative criteria. Lying in the course of a security clearance background investigation generally takes the form of lying on the SF-86. But lying on any government form – even one requesting vaccination status – could certainly result in security clearance denial, as well.

Read Complete Article

SOURCE: Federal Trade Commission by Seena Gressin – February 5, 2021

Some of you are celebrating your second COVID-19 vaccination with the giddy enthusiasm that's usually reserved for weddings, new babies, and other life events. You're posting a photo of your vaccination card on social media. Please — don't do that! You could be inviting identity theft.

Your vaccination card has information on it including your full name, date of birth, where you got your vaccine, and the dates you got it. When you post it to Facebook, Instagram, or to some Sticker with an orange background. It says, other social media platform, you may be handing valuable information over to someone who could use it for identity theft.

Think of it this way — identity theft works like a puzzle, made up of pieces of personal information. You don't want to give identity thieves the pieces they need to finish the picture. One of those pieces is your date of birth. For example, just by knowing your date and place of birth, scammers sometimes can guess most of the digits of your Social Security number. Once identity thieves have the pieces they need, they can use the information to open new accounts in your name, claim your tax refund for themselves, and engage in other identity theft.

Read Complete Article

SOURCE: Federal News Network by Justin Doubleday – November 1, 2021

The Biden administration is moving forward with new personnel vetting principles intended to simplify and streamline how the government evaluates people for sensitive positions and security clearances.

The personnel vetting guidelines have been circulated throughout agencies and are currently in the queue for signature by the Office of the Director of National Intelligence and the director of the Office of Personnel Management, according to Valerie Kerben, senior policy adviser with the ODNI, speaking at an Oct. 27 National Industrial Security Program Policy Advisory Committee (NISPPAC) meeting.

The forthcoming guidelines are part of the ongoing Trusted Workforce 2.0 initiative to reform background investigation and security clearance processes. They are based on a "federal personnel vetting core doctrine" published in the Federal Register in January.

"The Federal Government must effectively optimize the resources, information, and technology to support the goal of a trusted workforce to conduct the business of the Federal Government," the doctrine states. "Personnel vetting assesses the trustworthiness of individuals based on the core characteristics to protect people, property, information, and mission, as they relate to the particular purpose."

Read Complete Article

SOURCE: Nextgov by Mariam Baksh – November 4, 2021

The CMMC program will be temporarily suspended while DOD officials revise the requirements. CROCOTHERY/ISTOCK

The Pentagon outlined the changes ahead for its Cybersecurity Maturity Model Certification program with two new rulemaking processes.

The Defense Department is significantly scaling back a program it rolled out last year to validate the cybersecurity of its suppliers through third-party audits and is halting its implementation until the changes are official.

The program was supposed to be implemented over a five-year period with the ultimate goal of requiring every defense contractor in possession of certain controlled but unclassified information to obtain a certificate from a third-party assessor indicating their adherence to the Cybersecurity Maturity Model Certification standard. A number of programs within DOD were selected to pilot the program this year. Now, the Pentagon says it is looking to streamline the program—into CMMC 2.0—and make it more collaborative with industry in two new rulemakings through the Code of Federal Regulations.

"Until the CMMC 2.0 changes become effective through both the title 32 CFR and title 48 CFR rulemaking processes, the department will suspend the CMMC piloting efforts, and will not approve inclusion of a CMMC requirement in DoD solicitations," reads a notice set to publish Friday in the Federal Register. "The CMMC 2.0 program requirements will not be mandatory until the title 32 CFR rulemaking is complete, and the CMMC program requirements have been implemented as needed into acquisition regulation through title 48 rulemaking."

Read Complete Article

SOURCE: Federal News Network by Justin Doubleday – November 26, 2021

While it could be months or even years before the Cybersecurity Maturity Model Certification is a requirement in defense contracts, Pentagon officials are considering financial rewards and other incentives to get contractors to improve their network defenses before CMMC 2.0 becomes reality.

The Defense Department announced major changes to the CMMC policy earlier this month, effectively removing the requirement for the majority of contractors to get a certification as a condition of an award. Instead, companies that handle less sensitive contract information will only need to submit an annual self-attestation that they're following network security practices.

The Pentagon says the changes will reduce costs and complexity for thousands of small and medium-sized contractors.

DoD is also making changes to the CMMC standards and collapsing the model into three levels, down from the previous five. DoD will also allow companies in some cases to defer some requirements for up to 180 days after contract award.

Read Complete Article

SOURCE: Reuters by Kanishka Singh – October 29, 2021

A Russian national appeared in a U.S. federal court on Thursday after he was extradited from South Korea to Ohio to face charges for his alleged role in a cybercriminal organization, the U.S. Department of Justice said.

Vladimir Dunaev, 38, was a member of a cybercriminal organization that deployed a computer banking trojan and ransomware suite of malware known as "Trickbot", the Justice Department said.

"Trickbot attacked businesses and victims across the globe and infected millions of computers for theft and ransom, including networks of schools, banks, municipal governments, and companies in the health care, energy, and agriculture sectors," Deputy Attorney General Lisa Monaco said.

Read Complete Article

SOURCE: Bleeping Computer by Bill Toulas – November 5, 2021

US defense contractor Electronic Warfare Associates (EWA) has disclosed a data breach after threat actors hacked their email system and stole files containing personal information.

The company claims the breach's impact was limited but confirmed that the threat actor managed to exfiltrate files containing sensitive information.
As detailed in a notice to the Montana Attorney General's office, EWA discovered that a threat actor took over one of their email accounts on August 2, 2021.

The firm noticed the infiltration when the hacker attempted wire fraud, which appears to be the primary goal of the actor.

"Based on our investigation, we determined that a threat actor infiltrated EWA email on August 2, 2021. We were made aware of the situation when the threat actor attempted wire fraud," reads EWA's data incident notification.

Read Complete Article

SOURCE: Federal Trade Commission by Amy Hebert – November 10, 2021

You've probably heard: this holiday season, it might be harder to find the gifts you're looking for. So, many of us might be looking for alternatives, like buying gifts locally — or maybe from online marketplaces or sites you find through your social media accounts, online ads, or by searching online. If that might be you heading online, here are some things you can to do to avoid a scam or negative experience:

  • Check the rules about refunds and returns, and what happens if there's a problem. Does the site have processes to help you get a refund if you don't get exactly what was advertised or never get the item?
  • Make sure they let you pay with a safe payment method. For example, credit cards have legal protections, or a secure online payment system can protect you in case there's a problem. If someone tells you to pay with a wire transfer, gift cards, or cryptocurrency, stop and find another seller. That's how scammers tell you to pay.
  • Don't buy from anyone who wants you to pay outside the marketplace's payment system. If you do, you'll lose any protection the site offers, and you probably won't get the item or a refund.
  • Find out other people's experiences. Search online for the site's name with words like "complaint" or "scam," and check to see if any well-known websites have credible and impartial reviews of the marketplace or the seller.
  • Look for pictures of the actual item and read the description of its condition and location.

What if something still goes wrong? Try to work out problems with the seller. If that doesn't work, report them to the marketplace. If you paid by credit or debit card, file a dispute with your credit or debit card company. Read What To Do if You Were Scammed for more on what to do if you paid a scammer.

And report fraud, scams, or bad business practices to the FTC at ReportFraud.ftc.gov.

Read Complete Article

SOURCE: Federal Trade Commission – May 2021

You want your donations to count, so it's important to do some research before giving to a charity. Here are some things you can do to learn more about a charity and avoid donating to a scam.

  • Five Things To Do Before You Donate to a Charity
  • Phone Calls Asking You To Donate
  • How You Pay When You Donate
  • Avoid Donating to a Fake Charity
  • Donating on Social Media and Crowdfunding
  • Donating Things Instead of Money
  • Report Charity Scams

Expanded topics are explained in the complete article...

Read Complete Article