![]() Seal of the Rewards For Justice Program | |
![]() | |
Agency overview | |
---|---|
Formed | June 6, 1984 |
Preceding agencies |
|
Type | Counterterrorism |
Jurisdiction | United States Government |
Motto | Stop a Terrorist and Save Lives |
Parent department | U.S. Department of State Diplomatic Security Service |
Child agencies |
|
Website | www.rewardsforjustice.net |
The Rewards for Justice Program (RFJ) is the United States' national security interagency program that offers reward for information leading to the location or an arrest of leaders of terrorist groups, financiers of terrorism, including any individual that abide in plotting attacks carried out by foreign terrorist organizations. [1] RFJ directly addresses the foreign threat by identifying entities such as key leaders and financial mechanism of the foreign terrorist organizations. The Rewards for Justice Program is managed by the Federal Bureau of Investigation, [2] Central Intelligence Agency, National Security Agency (NSA) and Department of Defense (DOD). Rewards for Justice is seeking information for individuals who operate under terrorist groups or terrorist organizations that participate in launching cyber-attacks against United States critical infrastructure such as electrical grids and renewable energy resources from United States Presidental election interferences.
On December 22, 2011, Rewards for Justice announced a reward of up to $10 million for information leading to Ezedin Abdel Aziz Khalil (aka Yasin al-Suri), the leader of an al-Qaeda fundraising network in Iran that transfers money and recruits via Iranian territory to Pakistan and Afghanistan. [3] It marked the first time that Rewards for Justice offered a reward for information leading to a terrorist financier. [4] The program was established by the 1984 Act to Combat International Terrorism (Public Law 98-533), [5] and it is administered by the U.S. State Department's Bureau of Diplomatic Security. [6] The Rewards for Justice Program was formerly known as the Counter-Terror Rewards Program, soon shortened to the HEROES program. In 1993, DS launched www.heroes.net [7] to help publicize reward information. By 1997, the site was getting more than one million hits a year from 102 countries. [8] Smith is also credited with the idea to put photos of wanted terrorists on matchbook covers. [9] DSS agents assigned to embassies and consulates throughout the world ensured that the matchbooks got wide distribution at bars and restaurants. The secretary of state is currently offering rewards for information that prevents or favorably resolves acts of international terrorism against U.S. persons or property worldwide. Rewards also may be paid for information leading to the arrest or conviction of terrorists attempting, committing, conspiring to commit, or aiding and abetting in the commission of such acts. As of 2022, The Rewards for Justice program has paid more than $250 million to 125 individuals for leading information that prevented international terrorist attacks or helped bring to justice those involved in prior acts. [10] [11] [12]
After the September 11 attacks, the list of wanted terrorists increased dramatically, and rewards were also increased, as part of the U.S. efforts to capture al-Qaeda leadership. However, the plan has been largely ineffective against Islamic terrorists. [13] The largest reward offered was $25 million for the leader of al-Qaeda, Osama bin Laden, and his deputy, Ayman al-Zawahiri, which had "attracted hundreds of anonymous calls but no reliable leads." [13] Osama bin Laden was shot and killed inside a private residential compound in Abbottabad, Pakistan, by members of the United States Naval Special Warfare Development Group and Central Intelligence Agency operatives in a covert operation on May 2, 2011. Robert A. Hartung, Assistant Director of Diplomatic Security's Threat Investigations and Analysis Directorate, announced on September 2, 2010 that the U.S. Department of State's Rewards for Justice program is offering rewards of up to $5 million each for information that leads law enforcement or security forces to Hakimullah Mehsud and Wali ur Rehman. [14] [15] [16] [17] Former U.S. secretary of state Hillary Clinton presented a list of "the five most wanted terrorists" to Pakistan; [18] the list included Ayman al-Zawahiri, Mohammed Omar, Ilyas Kashmiri, Atiyah Abd al-Rahman and Sirajuddin Haqqani. [18] Each of these five had bounties issued against them by the program; [19] however, Kashmiri, who US Intelligence officials said they were 99% sure was killed in an airstrike in South Waziristan on June 3, 2011, was removed from the list. [19] Rahman was killed in an airstrike in North Waziristan in August 2011. [20] Omar died of tuberculosis in Karachi, Pakistan, in April 2013. [21] Al-Zawahiri was killed in a drone strike in Kabul, Afghanistan, in July 2022. [22]
On August 10, 2022, a federal jury located within the United States District Court for the District of New Jersey in Newark, New Jersey, indicted Mansour Ahmadi, Ahmad Khatibi Aghda, and Amir Hossein Nickaein Ravari on charges of conspiracy to commit wire fraud related to recent activity in connection with computers, intentional damage to a protected computer, and transmitting a demand in connections to damaging a protected computer. The Rewards for Justice Program announced $10 million dollar through the approval of the United States Department of State administered by the United States Department of Treasury the amount offered on information in regard to the location or whereabouts of Islamic Revolutionary Guard Corps (IRGC) also known as the Iranian cyber actors. During the press conference, the FBI asked for the help of public in seeking information for hackers. Later in the day, the FBI and Rewards for Justice had then uploaded a flyer for Mansour Ahmadi, Ahmad Khatibi Aghda, and for Amir Hossein Nickaein Ravari.
Name | Terrorist Organization(s) | Terrorist Activity |
---|---|---|
Ahmad Khatibi Aghda [23] | Islamic Revolutionary Guard Corps Electronic Warfare | Indicted of conspiracy charges to commit wire fraud related to recent activity in connection with computers, intentional damage to a protected computer, and transmitting a demand in connections damaging a protected computer |
Amir Hossein Nickaein Ravari [24] [25] | Islamic Revolutionary Guard Corps Electronic Warfare | Indicted of conspiracy charges to commit wire fraud related to recent activity in connection with computers, intentional damage to a protected computer, and transmitting a demand in connections damaging a protected computer |
Mansour Ahmadi [26] [27] | Islamic Revolutionary Guard Corps Electronic Warfare | Indicted of conspiracy charges to commit wire fraud related to recent activity in connection with computers, intentional damage to a protected computer, and transmitting a demand in connections damaging a protected computer |
Mahdi Lashgarian [28] | Islamic Revolutionary Guard Corps Cyber-Electronic Command; IRGC-CEC; IRGC Jangal Organization; Islamic Revolutionary Guard Corps Electronic Warfare and Cyber Defense Organization; Mr. Soul | Participated in malicious cyber activities against United States critical infrastructure in violation of the Computer Fraud and Abuse Act (CFAA) |
Milad Mansuri [28] | Islamic Revolutionary Guard Corps Cyber-Electronic Command; IRGC-CEC; IRGC Jangal Organization; Islamic Revolutionary Guard Corps Electronic Warfare and Cyber Defense Organization; Mr. Soul | Participated in malicious cyber activities against United States critical infrastructure in violation of the Computer Fraud and Abuse Act (CFAA) |
Mohammad Amin Saberian [28] | Islamic Revolutionary Guard Corps Cyber-Electronic Command; IRGC-CEC; IRGC Jangal Organization; Islamic Revolutionary Guard Corps Electronic Warfare and Cyber Defense Organization; Mr. Soul | Participated in malicious cyber activities against United States critical infrastructure in violation of the Computer Fraud and Abuse Act (CFAA) |
Mohammad Bagher Shirinkar [28] | Islamic Revolutionary Guard Corps Cyber-Electronic Command; IRGC-CEC; IRGC Jangal Organization; Islamic Revolutionary Guard Corps Electronic Warfare and Cyber Defense Organization; Mr. Soul | Participated in malicious cyber activities against United States critical infrastructure in violation of the Computer Fraud and Abuse Act (CFAA) |
In April 2020, Rewards for Justice Program offered $5 million for information leading to identify North Korean hackers who target United States critical infrastructure. [29] The National Security Agency (NSA) and other U.S. foreign organizations released a joint Cybersecurity Advisory to expose the advanced persistent threat (APT) actors sponsor by Chinese government targeting critical infrastructure, social infrastructure, telecommunications, government websites, transportation, electrical grids and military infrastructures globally in an announced by NSA to counter any malicious threat actors. This CSA is being released by the following agencies and organizations of a respective government and intelligence agency outlined by United States Intelligence Agency. [30] [31] The CSA [32] , "Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System [33] ,"on tactic, techniques and procedures (TTPs) by malicious actors for using initial exploitation, persistence and exploitation.
{{cite web}}
: Missing or empty |title=
(help)