Risk

5/3/2011
09:47 AM
50%
50%

FBI Defends Cyber Investigation Capabilities

Exclusive: An FBI official argues that an audit finding insufficient national cybersecurity investigation skills doesn't reflect current expertise and results.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
The FBI's field offices lack the skills and expertise that they require for investigating national cybersecurity intrusions, with many field offices facing a shortage of forensic investigators and intelligence analysts, as well as tactical intelligence for guiding investigations.

Those are some of the top-level findings from a Department of Justice Office of the Inspector General audit of the FBI's computer intrusion investigation capabilities, released last week.

The audit, started in 2008 as an assessment of the FBI's computer intrusion investigation capabilities, grew to encompass the bureau's ability to investigate national security computer intrusions by the audit's completion in 2010. The audit also assessed the effectiveness of the FBI-led, multi-agency task force known as the National Cyber Investigative Joint Task Force (NCIJTF). Created in 2008 when President Obama established the Comprehensive National Cybersecurity Initiative, the task force's job is to coordinate intelligence and investigations into national cybersecurity intrusions across 18 intelligence and law enforcement agencies. For the report, auditors interviewed personnel at FBI headquarters, in 10 field offices, and at the NCIJTF.

According to the audit, 36% of FBI of cyber agents thought they lacked the necessary IT expertise for handling national security intrusions, and five out of 36 agents interviewed told the auditor that they didn't think they were skilled enough to investigate national security intrusions. In addition, the audit found that sharing intelligence information between agencies could be challenging, with the reasons for withholding information not always being clear to all participants. Finally, it questioned the FBI's approach to rotating cyber personnel to new offices every three years.

But in an exclusive interview, Steven Chabinsky, deputy assistant director of the FBI's cyber division, largely disputed those findings. On the skills front, for example, he said the audit paints an out-of-date picture of the bureau's cyber-investigation capabilities and results. "We have a very limited sample size of data that's years old, that's going down to the individual level of five agents, that ignores the fact that these agents were in training, and that these agents work in an environment that's conducive to success," he said in a telephone interview.

The FBI has been heavily adjusting its approach to cyber investigations over the past few years. In particular, the bureau has created a cyber-focused training program that mixes real-world experience with classroom learning. "Some of these situations you'll never be able to learn in a classroom, because some of our adversaries are using zero-day exploits which by definition you've never seen before," said Chabinsky. Agents are also part of a squad of experienced personnel, and backed by FBI agents with extremely specialized knowledge who are part of a cyber-action team that can quickly deploy to assist with investigations onsite.

Hence, instead of focusing on the subjective opinions of interviewed agents who were in the process of being trained, Chabinsky said that observers should examine the FBI's results, which he said the report largely ignores. "Case success is relegated to a footnote that said there have been some successes which are beyond the classification level of the report," he said.

Praise For The FBI's Cyber Unit

The FBI's cyber unit and the NCIJTF have received praise for their results, notably from the Office of the Directorate of National Intelligence (ODNI), which oversees the NCIJTF and evaluates its performance on a quarterly basis. In August 2009, the ODNI praised the task force for having been "the driving force behind the transformation of cyber threats from a fragmented and reactive individual agency response, to a unified and highly successful proactive national effort that established itself as a national center of excellence."

Industry experts have also lauded the NCIJTF. "It is the best interagency cooperation program anywhere in cybersecurity--with every key agency actually helping on real cases, hunting down the attackers," said Alan Paller, director of research for information security training company SANS, in an email interview. "They are also effective in finding evidence of actual attacks and warning corporations and agencies that those organizations have been penetrated and data has been stolen. Along with the [National Security Agency vulnerability analysis and operations group], it is the best cybersecurity program we have."

If there's a shortcoming of the NCIJTF--or the FBI's cyber unit--it's that "they have too many cases for the number of people they have, but that brings us around to the problem of skills," said Paller. "The colleges are graduating people who can talk about security, but have no forensics or intrusion detection or exploit skills."

What will help, he said, are internal agency training programs, as well as outreach efforts, such as the U.S. Cyber Challenge--championed by Shawn Henry, executive assistant director of the FBI's criminal, cyber, response and services branch, said Paller--which focuses on fostering high-schoolers' and college students' interest and expertise in information security.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Cracking 2FA: How It's Done and How to Stay Safe
Kelly Sheridan, Staff Editor, Dark Reading,  5/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10428
PUBLISHED: 2018-05-23
ILIAS before 5.1.26, 5.2.x before 5.2.15, and 5.3.x before 5.3.4, due to inconsistencies in parameter handling, is vulnerable to various instances of reflected cross-site-scripting.
CVE-2018-6495
PUBLISHED: 2018-05-23
Cross-Site Scripting (XSS) in Micro Focus Universal CMDB, version 10.20, 10.21, 10.22, 10.30, 10.31, 10.32, 10.33, 11.0, CMS, version 4.10, 4.11, 4.12, 4.13, 4.14, 4.15.1 and Micro Focus UCMDB Browser, version 4.10, 4.11, 4.12, 4.13, 4.14, 4.15.1. This vulnerability could be remotely exploited to al...
CVE-2018-10653
PUBLISHED: 2018-05-23
There is an XML External Entity (XXE) Processing Vulnerability in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.
CVE-2018-10654
PUBLISHED: 2018-05-23
There is a Hazelcast Library Java Deserialization Vulnerability in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.
CVE-2018-10648
PUBLISHED: 2018-05-23
There are Unauthenticated File Upload Vulnerabilities in Citrix XenMobile Server 10.8 before RP2 and 10.7 before RP3.