securitylinkindia

The Imperative for IT Infrastructure Partners to Integrate Security Solutions

Prashanth GJ, CEO, TechnoBind Solutions In an era where digital connectivity is the lifeblood of businesses, the role of IT infrastructure partners has evolved from mere facilitators of technology to guardians of connectivity. The foundation of IT infrastructure is crucial for enabling businesses to operate seamlessly in the cloud, serving as the backbone of their operations. As businesses grapple with the complex challenges of the digital landscape, aligning with IT infrastructure providers that offer robust security solutions is not just a choice; it’s a strategic imperative. Recognizing this paradigm shift, forward-thinking. IT infrastructure partners are integrating security solutions into their services, providing clients with a comprehensive and unified approach to fortifying their digital assets. However, not all IT infrastructure providers include cybersecurity in their solution portfolios. When businesses choose an IT infrastructure partner, they are increasingly looking for providers that not only deliver cutting-edge technology but also prioritize the integration of security. This entails not just safeguarding data and systems but also ensuring that security measures align with the specific needs and nuances of the organization. Consequently, there is a compelling need for IT infrastructure providers to seamlessly incorporate cybersecurity into their existing offerings. According to a report the global cybersecurity market size is forecast to grow to $538.3Bn by 2030, which in 2020 was at $217.9Bn. According to a new forecast from Gartner, the worldwide end-user spending on security and risk management is projected to total $215 billion in 2024 alone. The integration of cybersecurity and infrastructure ensures access to specialized knowledge, threat intelligence, and the implementation of best practices. The strongly growing market size of the cybersecurity domain will substantially add to partners’ profits. The Importance of a Security-First Mindset The landscape of IT infrastructure has undergone a seismic shift with the advent of cloud computing, edge computing, and the proliferation of interconnected devices in the Internet of Things (IoT). The concept of a security-first mindset implies that security considerations are not an afterthought but an integral part of every decision and action taken in the realm of IT infrastructure. IT infrastructure partners, as custodians of an organization’s technological backbone, must adopt this mindset to proactively identify and mitigate potential threats. Championing security solutions involves staying well-informed of the latest cybersecurity trends, understanding emerging threats, and deploying cutting-edge technologies to counteract them. IT infrastructure partners, traditionally tasked with managing and optimizing technology resources, are now integral to safeguarding these resources from malicious actors. Their role extends beyond hardware and software management to actively implementing and advocating for robust cybersecurity solutions. Collaborating with Security Experts through Value-Added Distributors Recognizing the ever-evolving landscape of cybersecurity threats, it’s crucial for IT infrastructure partners to actively engage with cybersecurity experts and firms. Building robust partnerships with cybersecurity professionals enhances the capabilities of IT infrastructure partners, allowing them to provide comprehensive security solutions to clients. In this collaborative effort, a value-added distributor (VAD) plays a key role in facilitating connections between IT infrastructure and cybersecurity partners. The true value of a VAD lies in its ability to bridge gaps, enhance communication, and empower businesses to navigate the intricate intersection of IT infrastructure and cybersecurity. As an intermediary, the VAD ensures a smooth integration of solutions, seamlessly merging robust cybersecurity portfolios with the existing infrastructure offerings. Leveraging its extensive network and industry insights, the VAD identifies synergies between technology providers and cybersecurity specialists, fostering strategic partnerships that elevate overall security postures. Beyond this role, VADs often provide technical support, training, and market insights, enabling IT infrastructure partners to harness the latest cybersecurity innovations effectively. This collaborative approach not only strengthens the resilience of IT systems but also positions joint ventures at the forefront of the dynamic cybersecurity landscape. Advantage of IT Infrastructure Partner Offering Cybersecurity When infrastructure partners venture into offering cybersecurity solutions, they gain a significant advantage with their established customer base, benefiting from pre-existing trust. Additionally, their intimate knowledge of their customers’ or enterprises’ current infrastructure plays a crucial role, given that they were the ones responsible for its implementation. This familiarity with the infrastructure not only simplifies the onboarding process for new associations but also eliminates any challenges associated with starting from scratch. Moreover, the partner’s existing comprehension of the infrastructure enables them to deliver tailored cybersecurity solutions that seamlessly integrate with the current setup. This approach ensures maximum compatibility without the need for extensive overhauls, presenting a considerable advantage to customers and enterprises. The avoidance of unnecessary disruptions in the setup becomes a valuable asset, sparing customers the effort of seeking new security partners. This strategic positioning underscores the value of seasoned Value-Added Distributors (VADs) in collaboration with IT infrastructure partners. The symbiotic relationship between these entities not only benefits the infrastructure providers but also extends advantages to their customers through the expertise and support of established VADs. Challenges and Considerations While the integration of security into IT infrastructure is a powerful strategy, it does come with its own set of challenges. Compatibility issues, complexity in deployment, and the need for skilled personnel are among the considerations that organizations must address. However, the long-term benefits in terms of security posture and risk mitigation far outweigh the initial challenges. The Road Ahead As the digital landscape continues to evolve, the integration of security into IT infrastructure will remain a dynamic and ongoing process. IT infrastructure partners will play a pivotal role in this journey, offering not just technological solutions but becoming strategic allies in the battle against cyber threats. In conclusion, the unification of strengths between businesses and IT infrastructure partners, with a specific focus on integrated security, is a key driver for success in today’s digital era. The collaboration not only fortifies the organization against threats but also sets the stage for innovation and growth, unburdened by the looming specter of security vulnerabilities. TechnoBind is the first Specialist Distributor in the Indian IT channels space offering a hybrid distribution model placed synergistically between broad-based and niche distribution, to deliver high business value for its reseller partners. TechnoBind helps partners…

Read More

Gallagher Security Flexes Federal Government Capabilities with Second Platinum ASTORS Win for HSPD-12/ FIPS 201 Compliance

Global security manufacturer, Gallagher Security, has defended Command Centre’s title as Best Integrated System for HSPD-12/ FIPS 201 Compliance with a Platinum award at the 2023 ASTORS Homeland Security Awards. This is Gallagher’s 7th overall ASTORS win and the second year in a row that Command Centre has been recognized in the HSPD-12/ FIPS 201 Compliance category. “Federal compliance mandates change rapidly in response to technology improvements, new threats, and evolving requirements, which means a highly adaptable and streamlined solution is required in order to serve their needs,” said Jeff Fields, Director of Federal Government at Gallagher Security, who accepted the award at the AST Homeland Security Awards luncheon, “That we can demonstrate how Command Centre continues to evolve alongside those changing requirements year after year is a significant win for Gallagher, and I’m thrilled that this year’s judges have honored us with this title.” Gallagher’s Command Centre is an enterprise-grade Physical Access Control System (PACS) that delivers exceptional security and provides robust, real-time authentication of all federally issued, high-assurance credentials. It natively supports reading and verifying the complete secure certificate information on government cards and is scalable to meet organizational requirements – no matter how big the site, or the number of cardholders involved. Command Centre was also recognized by the ASTORS for leading the way in federal compliances and standards in the United States and among the Five Eyes. With one centrally managed platform, Command Centre meets the HSPD-12/ FIPS-201 compliance requirements from both a 13.01 and 13.02 topology, including FICAM compliance, FIPS 140-2 Level 3 validation, and SOC2 certification among a long list of others. As the chosen platform for many of the world’s most high-consequence sites – such as military and defense; federal, state, and local governments; commercial; education; healthcare; and transportation – Command Centre’s curb-to-core technology protects lives, creates efficiencies, and safeguards assets around the world. “Command Centre is an access control solution that does it all,” Jeff said confidently, “It enables federal organizations to manage complete site security from one highly intelligent platform and has been proven to deliver superior security that keeps even the most sensitive of sites protected.” ASTORS winners were announced at a ceremony at the ISC East Show – the Northeast’s largest security trade show – hosted by the Jacob Javits Convention Center in New York City on Thursday, November 16, 2023. A technology leader in integrated access control, intrusion detection, and perimeter protection, Gallagher Security’s solutions protect what matters most within the highest levels of national and local government, military, commercial, industrial, healthcare, transportation, academic organizations, and small businesses in more than 140 countries.

Read More

Genetec State of Physical Security Report Reveals Physical Security Market is Rapidly Embracing Cloud and Hybrid Solutions

Cyber-concerns about cloud security are lessening; channel partners expect increased demand for cloud and hybrid solutions from end users Genetec Inc., a leading technology provider of unified security, public safety, operations, and business intelligence solutions, recently shared the results of its 2024 State of Physical Security report. Based on insights from over 5,500 physical security leaders worldwide (including end users and channel partners), the report looks at the security strategies organizations are putting in place to effectively navigate the realities of a changing industry. Cloud adoption is picking up speed The adoption of cloud-based solutions for physical security has been gradually increasing over the past decade, but it is now picking up speed. According to the survey, 44% of end users reported that more than 25% of their physical security setups are now either in the cloud or use a combination of cloud and on-premises solutions. This is a significant jump from the 24% reported in last year’s survey. Cyber concerns about the cloud are diminishing Cyber concerns about cloud-based solutions are lessening significantly. In last year’s survey, end-users considered perceived cybersecurity risks to be the primary factor discouraging their organizations from adopting cloudbased security systems. However, there seems to be a shift in attitudes. This shift underscores growing confidence in the capabilities of cloud solution providers to establish robust cybersecurity measures. As a result, in the 2024 survey, respondents have relegated perceived cybersecurity risks to the sixth position among the factors deterring their organizations from adopting security systems in the cloud. Channel expects increased demand for cloud and hybrid solutions Feedback from channel partners also supports the idea that end-users are eagerly shifting towards cloud solutions. A substantial 74% of channel partner respondents anticipate that more of their current customers will embrace cloud connectivity for security in the coming year. Furthermore, 39% of channel partners stated that they prioritize cloud-based solutions whenever possible, and an additional 52% offer cloud-based solutions upon customer request. IT and physical security departments are increasingly interconnected The increasing adoption of cloud-based physical security systems has led to a rise in cybersecurity threats, data handling, and compliance requirements. As a result, IT and physical security teams are becoming increasingly interconnected as evidenced by 55% of end users indicating that the IT department has access to physical security data. As technology adoption grows and remote access from external networks becomes more common, the partnership between IT and physical security will continue to develop. The future looks hybrid It appears that most organizations will prefer a hybrid approach, combining both on-premises and cloud-based solutions. 60% percent of end-user respondents revealed that their organizations aim for a security deployment strategy that combines both. The transition to hybrid systems is already in progress, with 15% of end-users stating that their organizations are currently storing video surveillance data both locally and in the cloud, marking a notable increase from the 4% reported in last year’s survey. “A hybrid cloud deployment clearly emerges as the ideal path forward for many organizations, seamlessly blending local infrastructure with the power of the cloud,” said Christian Morin, Vice President Product Engineering/ Chief Security Officer at Genetec Inc., “With a hybrid-cloud solution, organizations can optimize their physical security installation to best fit their business. And no matter how their security needs evolve, their systems will remain agile and adaptable to continue providing them with the capabilities they require.” Survey methodology Genetec Inc. surveyed physical security professionals from August 21 to September 15, 2023. Following a review of submissions and data cleansing, 5,554 respondents (including both end users and systems integrators) were included in the sample for analysis. Survey samples were run across all regions including North America, Central America, Caribbean, South America, Europe, Middle East, Africa, East Asia, Southern Asia, South-Eastern Asia, Central Asia, Western Asia, and Australia-New Zealand. Genetec Inc. is a global technology company that has been transforming the physical security industry for over 25 years. Today, the company develops solutions designed to improve security, intelligence, and operations for enterprises, governments, and the communities in which we live. Its flagship product, Security Center, is an open-architecture platform that unifies IP-based video surveillance, access control, automatic license plate recognition (ALPR), communications, and analytics. Founded in 1997, and headquartered in Montreal, Canada, Genetec serves its customers via an extensive network of certified channel partners and consultants in over 159 countries.

Read More

‘People Are Craving Connection’ – Gallagher Security Observes Shift in Security Industry Events

As 2023 nears its close, award-winning global security manufacturer, Gallagher Security, is sharing key observations from some of the year’s biggest industry events; chief among them, the rising importance of community building these events facilitate. Executive Vice President – the Americas, Scott Elliott, who has been attending industry events such as ISC West, GSX, and, most recently, the Access Control Summit (ACS) throughout his 20-year career, attributes the growing need for connection to the changing digital frontier, which he calls ‘a seismic shift reshaping the industry’s foundational elements.’ Scott elaborated, “The digital transformation of the security industry is a multifaceted journey involving the recalibration of people, processes, products, and systems. It’s about fostering a culture of continuous learning, innovation, and agility, and the industry must embrace this transformation, not as a choice, but as a necessity to navigate the challenges of the future. “The events I attended this year made it abundantly clear that people need the opportunity to gather and learn from each other to facilitate that growth. I saw it first-hand at GSX and in the thought-provoking conversations at ACS in September, where I shared some of these observations about the impact this digital transformation is having on the people in our industry. The metamorphosis we’re undergoing is not just a technological one; it’s about reimagining and reengineering the entire security ecosystem to be more resilient, agile, and innovative, and our industry events can be a key driver of that movement.” Melissa Vidakovic, Director of Marketing – the Americas, said that the emotional impact from the transformation is already underway, “If what I witnessed at Gallagher’s booth at GSX is any in dication, people are craving connection. We prepared our booth to showcase Gallagher’s products and solutions, but it became so much more than that and felt like a hub for sharing and networking. For example, we hosted a happy hour at the end of the second day and about 50 people stuck around so long after it ended that we were the last to leave the floor. We knew it would draw people in, but the power of it took me by surprise – I’m still hearing from people who joined us, and the feedback has been overwhelmingly positive.” As the digital transformation continues to upend the security industry, gathering as a community to share ideas will become a critical component for expediting and navigating the way forward. “Innovation doesn’t happen in a vacuum,” Scott concluded, “Each new technology, feature, and tool introduced to the market propels the entire security industry forward. We observe, we learn, and then we turn inward to our own products and services and ask ourselves ‘how can we do better?’ Those who recognize that sharing holds this power are the true leaders, and their willingness to step forward challenges the industry at large to rise to the occasion.” A technology leader in integrated access control, intrusion detection, and perimeter protection, Gallagher Security’s solutions protect what matters most within the highest levels of national and local government, military, commercial, industrial, healthcare, transportation, academic organizations, and small businesses in more than 130 countries.  

Read More

IDIS AI Box For Surveillance Comes Top in 2023 Benchmark Innovation Award

IDIS DV-1304-A analytics solution wins readers’ vote of approval An advanced plug-in AI video analytics device from IDIS has been voted top in the 2023 Benchmark Innovation Awards. The Add On AI Box for Surveillance (DV-1304-A) from South Korea’s leading in-country video manufacturer, makes it easy for any IDIS video system to be upgraded with a range of advanced analytics capabilities – and it’s an affordable yet scalable solution with no upfront or ongoing license fees. The NDAA-compliant DV-1304-A is a simple and affordable 4-channel add-on device that provides users with all the benefits of AI-video, eliminating the need for either analytics software or the deployment of edge AI cameras. The box allows highly accurate analysis from more angles than ever before from just a single camera. Pre-installed with the IDIS Deep Learning Engine, the AI in the Box is designed to be simply connected to IDIS NVRs for an instant system upgrade. And the technology is easily scalable; leveraging DirectIP® plug-and-play technology, users can deploy additional boxes to expand their systems to encompass up to 32-streams. With instant connection, users benefit from highly accurate analytics including object detection, including people, cars, and bikes, along with line crossing, loitering detection, and face detection, with the additional benefit of faster, and highly efficient event search. “We are delighted that IDIS’s AI video analytics innovations continue to make such a positive impact on the market. Winning the readers’ vote in the Benchmark 2023 awards is further a proof that our commitment to affordable, user-focused solutions is what the market most wants” James Min Managing Director, IDIS Europe The highly respected annual Benchmark Innovation Awards recognise the industry’s commitment to progress and innovation by highlighting the best product launches over the past year. IDIS is a global security company that designs, develops, manufactures, and delivers surveillance solutions for a wide range of commercial and public sector markets. As the leading video surveillance manufacturer in South Korea, headquartered just outside of Seoul and operating across 50 countries and 100+ strategic partners, IDIS is a world-leading total solution provider with more than two million recorders installed worldwide and 17 million cameras utilizing IDIS technology.  

Read More

VIVOTEK and IDTECK Collaborate to Enhance Access Control and Surveillance Solutions

VIVOTEK (3454-TW), the global leading IP surveillance solution provider, and IDTECK, a renowned access control systems provider, have joined forces to revolutionize security management. This collaboration with IDTECK aims to take the next step in access control systems by leveraging VIVOTEK VSS (VAST Security Station), achieving a comprehensive solution. The integration of access control systems and VSS offers three key advantages: Real-Time Video Streaming Boosts Access Control: VIVOTEK’s integration of real-time video streaming into access control systems represents a significant security advancement. It enables live video alerts for swift responses and enhances real-time monitoring. Audit-Ready Alarm Video Footage and Streamlined Evidence Gathering: In this collaboration, VIVOTEK and IDTECK introduce features that provide audit-ready alarm video footage, facilitating thorough incident reviews. Enhanced search records expedite evidence gathering, streamlining security operations. PTZ Control for Seamless Management: VIVOTEK and IDTECK’s collaboration introduces PTZ (Pan-Tilt-Zoom) control within the IDTECK system. This goes beyond live monitoring to track individuals at access points, simplifying access control for security personnel. The collaboration seamlessly integrates IDTECK’s access control system with VIVOTEK VSS, enhancing security, real-time monitoring, and incident investigation. Users can access key features like live camera viewing, monitoring, PTZ controls, presets configurations, and video searches, all integrated with the enterprise’s E-map. This provides an intuitive and comprehensive security management experience. IDTECK provides complete integrated access control solutions with access control, elevator control, visitor management, ID badging, and a unique brand of top CCTV VMS integration partners. IDTECK Access Control System SW provides the highest level of secure System Management.  

Read More

Maximize Site Security 24×7 with Hikvision DarkFighterS and DarkFighterX

Security incidents don’t just happen during daylight hours. To ensure that organizations can protect their sites, assets, and people 24×7, Hikvision has created a new generation of ultra-low-light video imaging technologies – DarkFighterS and DarkFighterX. Organizations need to ensure that their sites, assets and people are secured and protected 24 hours a day, 365 days a year. This requires security technologies that can safeguard perimeter walls and fences and provide crystal-clear, full-color video images of security incidents, even in poorly lit areas, or at night. To give companies this high-level of protection at industrial sites, logistics parks, ports and airports, and in a range of other settings, Hikvision has developed two innovative technologies, DarkFighterS and DarkFighterX. DarkFighterS: Maximizing security with ‘smart’ lighting options Hikvision’s DarkFighterS cameras use three key technology innovations to improve security in low-light conditions. These features all start with ‘S’, which is why the technology is called DarkFighterS. They are: Hikvision’s Surprising Low-Light Imaging, which is able to collect more light to produce brighter images, and which uses F1.0 fixed lens and advanced sensors to vastly increase vividness and clarity in ultra-low light conditions. Hikvision’s innovative, industry-leading Super Confocal Lenses, which are designed with precision at the micron level. This means that the point of focus for the visuallight images and the infrared images is virtually the same, which not only prevents blurring of the images, but also allows for master-level focus and long lasting, high-definition images. Hikvision’s Smart Hybrid Light technology, which allows the camera to record in IR while everything is quiet. However, when an incident happens, the camera’s ‘Smart’ mode turns on a supplemental white light and initiates recording in full-color using the visible light spectrum. This ability has a number of important benefits. First, cameras are able to maintain infrared illumination at night, and record video discreetly in low-light conditions, without giving away the camera’s location. Second, the cameras often startle intruders and stop them in their tracks when the supplemental white light comes on, helping to prevent loss or damage to property. Third, all incidents are recorded in full color and full detail due to the camera’s supplemental white light being activated automatically. Examples of Hikvision DarkFighterS products include DarkFighterS DeepinView Moto Varifocal Bullet Cameras, 4MP Varifocal dome camera with DarkFighter, and 4MP Varifocal bullet cameras with DarkFighter. These cameras are ideal for scenarios and applications such as enterprise premises and industrial parks, especially for the place where little or no movement is expected at night and where discretion is needed to ensure that intruders do not know where security cameras are located. DarkFighterX: Enabling sharp, full-color imaging for large sites, areas and scenarios in near-total darkness For large areas and applications, DarkFighterX technology provides Hikvision’s most powerful night-vision capabilities. In particular, this ultra-low-light technology supports full-color, crystal-clear video imaging down to just 0.0002 lux. Hikvision cameras equipped with DarkFighterX technology use a large aperture lens and dual sensors to capture and combine visible-light video images and images based on infrared perception. By combining data from the two sensors using a technology called Bi-Spectral Fusion, these cameras are able to capture full-color, high-definition images – and even the plates of vehicles traveling at speed, in conditions of near-total darkness. Because DarkFighterX is built into 2, 4, and 8-megapixel Hikvision Speed Dome cameras and DeepinView multi-sensor bullet cameras, organizations benefit from a wide range of other security features at the same time, including optical zoom, rapid focus, and the ability to follow moving people or objects around the camera’s field of view. This makes them ideal for a range of large scenarios and applications, such as traffic management and enforcement, and security in expansive areas such as city squares, streets, farms, and many more. Hikvision’s innovative ultra-low-light technologies Hikvision has introduced multiple low-light technologies to help customers capture full-color, high-resolution video in near-total darkness. Alongside DarkFighterS and DarkFighterX, Hikvision also offers ColorVu for small and medium business customers.  

Read More

Elbit Systems Awarded Two Contracts in an Aggregate Amount of $200 Million to Supply Artillery C4I Solution and Hostile Fire Counter Attack Solution to a European Country

Elbit Systems Ltd. announced it was awarded two contracts by a European country, worth an aggregate amount of approximately $200 million, to supply a C4I (Command, Control, Communication, Computers, Intelligence) solution to artillery battalions and a Hostile Fire Counter Attack (HFCA) solution. The contracts will be executed until 2026, with options for further extensions. The C4I solution will provide advanced C4I capabilities to four battalions of 155mm howitzers guns, including Elbit Systems’ SDR radios – the E-Lynx and TORCH-X Fire applications. The artillery C4I solution will allow the customer to effectively command its artillery battalions and increase operational effectiveness of its weapon systems, while the HFCA solution will allow the customer to detect enemy fire source and close the operational cycle by destroying the enemy fire source using Elbit Systems’ artillery C4I solution. These solutions will be integrated into the customer’s wider artillery C4I system, also provided by Elbit Systems. Elbit Systems will leverage the Company’s extensive worldwide experience of delivering C4I and communications solutions to artillery units and armed forces, while integrating various sensors that will increase operational effectiveness. Bezhalel (Butzi) Machlis, President and CEO of Elbit Systems, “We are honored by the trust placed in us and our products once again and will continue with our commitment to grow and expand our local know-how and capabilities in support of our customers. Elbit systems’ solutions increase operational effectiveness and allow our customers to better utilize their fire power, while increasing their accuracy and lethality. These contracts validate the technological and operational advantages offered by our solutions.” Elbit Systems Ltd. is an international high technology company engaged in a wide range of defense, homeland security and commercial programs throughout the world. The Company, which includes Elbit Systems and its subsidiaries, operates in the areas of aerospace, land and naval systems, command, control, communications, computers, intelligence surveillance and reconnaissance (C4ISR), unmanned aircraft systems, advanced electro-optics, electro-optic space systems, EW suites, signal intelligence systems, data links and communications systems, radios, cyber-based systems and munitions. The Company also focuses on the upgrading of existing platforms, developing new technologies for defense, homeland security and commercial applications and providing a range of support services, including training and simulation systems.

Read More

Spain Dismantles Global MatchFixing Ring with INTERPOL Support

INTERPOL Notices play key role in catching one of the group’s leaders The Spanish National Police, in cooperation with the Spanish Tax Agency, Europol and INTERPOL, have dismantled an organized crime group suspected of fixing sporting events as well as using technology to place bets ahead of bookmakers. So far, 23 suspects have been arrested, including one of the group’s leaders who was apprehended on the basis of an INTERPOL Red Notice for persons wanted internationally. The operation began in 2020 when Spanish officers detected a series of suspicious online sports bets placed on international table tennis events. After analysing available data, investigators identified a criminal network of Romanian and Bulgarian origin. Members of this crime ring fixed matches outside of Spain by corrupting athletes. Once the outcomes were agreed, crime group members based in Spain would then place online bets on a massive scale. Getting ahead of bookmakers Through their investigations, officers uncovered a criminal process whereby the group would access match information before bookmakers, allowing them to place bets with certainty and ultimately, cash in. Through advanced technology, they gained access to live video signals from around the world, straight from stadiums, pitches and arenas. Intercepting these signals gave them a clear advantage on bookmakers, who were dependent on slower satellite feeds and relays for the same events. The process was repeated across Asian and South American football leagues, UEFA Nations League, Bundesliga, Qatar 2022 World Cup matches and ATP and ITF tennis tournaments. Despite collecting significant payouts, the group avoided detection by using a multitude of identities and accounts. Among those arrested was a trader from a major bookmaker who, in collusion with the criminal group, would validate online bets placed by the criminal network. INTERPOL Notices decisive Through its Financial Crime and Anti-Corruption Centre, INTERPOL worked closely with authorities throughout the investigation, fully mobilizing members of the INTERPOL Match-Fixing Task Force (IMFTF) and using the full range of the Organization’s global policing capabilities. Three different INTERPOL Notices were published during the operation: A Purple Notice warning member countries of the modus operandi linked to the interception of satellite signals. A Blue Notice to obtain more information on the group’s leader. A Red Notice seeking the location and arrest of the group’s leader. “Organized crime groups will exploit the tiniest of gaps given the opportunity. In this case, we’re talking about a 20 or 30 second advantage that led to significant gains,” said INTERPOL Secretary General Jürgen Stock. “Successful operations such as the one led by Spain only reaffirm our engagement in ensuring our entire suite of Notices, databases and expert networks fully support police in closing these gaps,” concluded Mr. Stock. IMFTF specialists were also deployed to Spain to work alongside officers during house raids, facilitating the extraction and analysis of data from seized devices, cross-checking information across INTERPOL’s databases, helping track assets and money laundering channels. Some 47 bank accounts and 28 payment gateways were blocked across several countries. Seizures included mobile phones, satellite dishes and signal receivers, cash and counterfeit banknotes, credit and debit cards, identification documents and prepaid SIM cards. Additional arrests are anticipated as officers work to identify more members of the group, as well as athletes who accepted bribes. The outcomes of the operation were presented this week to IMFTF members during their annual meeting in Buenos Aires, Argentina, in a dedicated session restricted to law enforcement.  

Read More

Cybercrime: 14 Arrests, Thousands of Illicit Cyber Networks Disrupted in Africa Operation

Networks identified linked to financial losses of more than US$40 million INTERPOL and AFRIPOL have coordinated an operation across 25 African countries that enabled investigators to arrest 14 suspected cybercriminals and identify 20,674 suspicious cyber networks, highlighting the surge in digital insecurity and cyber threats in the region. The networks identified were linked to financial losses of more than USD 40 million. The four-month Africa Cyber Surge II operation was launched in April 2023 and focused on identifying cybercriminals and compromised infrastructure. It was coordinated by INTERPOL’s Cybercrime Directorate, under the auspices of the INTERPOL Africa Cybercrime Operations desk and INTERPOL’s Support Programme for the African Union in relation to AFRIPOL (ISPA). The operation sought to facilitate communication, provide analysis and share intelligence between countries, streamlining cooperation between African law enforcement agencies to prevent, mitigate, investigate, and disrupt cyber extorsion, phishing, business email compromise and online scams. By leveraging actionable private sector intelligence, it underlined how cybersecurity is most effective when international law enforcement, national authorities, and private sector partners cooperate to share best practices and pro-actively combat cybercrime. INTERPOL, AFRIPOL and private sector partners Group-IB and Uppsala Security provided on-theground operational support, sharing actionable intelligence leveraged throughout the operation. Operational highlights In Cameroon, acting on a tip-off from Côte d’Ivoire, three suspects were arrested in relation to an online scam involving the fraudulent sale of works of art worth USD 850,000. Authorities in Nigeria arrested a suspect accused of defrauding a Gambian victim. Police in Mauritius arrested two money mules linked to scams initiated through messaging platforms. In Gambia, proactive measures and strong partnerships led to the take down of 185 Internet Protocols (IP) connected to malicious activities. Two Darknet sites have been taken down following actions by Cameroonian authorities. In Kenya, authorities took down 615 malware hosters. Some 150 INTERPOL analytical reports providing intelligence and insight on cyber threats targeting specific countries were distributed to participating countries for investigative and disruptive actions during the operation. Developed by INTERPOL based on information shared by partners Group-IB, Trend Micro, Kaspersky, and Coinbase, the reports contained information on: 3,786 malicious command and control servers. 14,134 victim IPs linked to data stealer cases. 1,415 phishing links and domains. 939 scam IPs. More than 400 other malicious URLs, IPs and botnets. “The Africa Cyber Surge II operation has led to the strengthening of cybercrime departments in member countries as well as the solidification of partnerships with crucial stakeholders, such as computer emergency response teams and Internet Service Providers. This will further contribute to reducing the global impact of cybercrime and protecting communities in the region,” said Jürgen Stock, INTERPOL Secretary General. The initiative highlighted the strong correlation between financial crime and cybercrime, allowing participating countries to expand their law enforcement response by adopting a ‘follow the money’ approach. It was also preceded by a oneweek tabletop exercise in Tanzania on cybercrime and cryptocurrency investigations, equipping officials from 20 African countries with the knowledge and skills necessary for the successful execution of the operation. “As digital systems, Information Communication Technologies and Artificial Intelligence grow in prominence, it is urgent that public and private actors work hand in hand to prevent these technologies from being exploited by cybercriminals. Coordinated operations such as Cyber Surge are necessary to disrupt criminal networks and build individual, organizational and society-wide levels of protection,” said AFRIPOL’s Acting Executive Director, Ambassador Jalel Chelba. Africa Cyber Surge II was carried out with funding by the UK Foreign Commonwealth and Development Office, the German Federal Foreign Office and the Council of Europe.  

Read More