Attacks/Breaches
3/1/2012
07:13 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%
Repost This

FBI Director Urges Attack Intelligence-Sharing Between Companies And The Bureau

Teamwork in fighting cybercrime is the way "to stop the bleeding," Robert Mueller tells RSA Conference attendees

Click here for more articles.

RSA CONFERENCE 2012 -- San Francisco, Calif. -- FBI director Robert Mueller in a keynote address here today urged real-time sharing of cybercrime and threat intelligence between the public and private sectors akin to the type of cooperation forged to fight terrorism post-9/11.

"Real-time information-sharing is essential. Much can and should be done to share with the private sector and, in turn, give the private sector the means and motivation to work with us" at the FBI, Mueller said.

The FBI is continuing to build specialized cybercrime task forces to work locally with state and local law enforcement, Mueller said. "It's a similar model to the terrorism task force, but to fight cybercrime," he said. "As we continue to share information, we will continue to break down the walls that [block] our abilities to share such information -- the same way we did [after] the Sept. 11 [terrorist] attacks."

Mueller said the FBI now has specialized cybersquads in each of its 50 field offices.

But companies traditionally have been frustrated with sharing their breach information with the FBI and other law enforcement agencies: They say it's more of a one-way street, where they share but then never hear back from law enforcement.

Mueller acknowledged that fear in his speech, and promised that the agency will reciprocate: "You may think the information flow is one-way to us," he said. "We will share what we can and as quickly as we can ... A code of silence will not serve us in the long run."

He said the FBI understands why companies are hesitant to share their breach information with the bureau. "We do understand that you may be reluctant to report security breaches to us because it may harm you competitively or the wills will erode shareholder confidence," he said.

The FBI doesn't want companies to feel victimized a second time by its investigation of the breach, he said. "There will be minimal disruption to your business and we will safeguard your privacy" and protective orders for trade secrets and business confidentiality, he said.

Sharing intelligence is key because organizations and law enforcement can learn from the attack information to deter future attacks and to help with the ultimate goal of attribution, he said. "Attribution is critical to deter future attacks," Mueller added.

Mueller said the FBI is pushing for Congress to pass legislation for national data breach reporting that requires companies to report "significant breaches" and to share information about the attack.

"The end result is we are losing data, we are losing money, we are losing ideas, and we are losing innovation," Mueller said. "As citizens, we are increasingly vulnerable to losing our information. And together, we must find a way to stop the bleeding."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web