Risk
5/3/2011
09:47 AM
50%
50%

FBI Defends Cyber Investigation Capabilities

Exclusive: An FBI official argues that an audit finding insufficient national cybersecurity investigation skills doesn't reflect current expertise and results.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
The FBI's field offices lack the skills and expertise that they require for investigating national cybersecurity intrusions, with many field offices facing a shortage of forensic investigators and intelligence analysts, as well as tactical intelligence for guiding investigations.

Those are some of the top-level findings from a Department of Justice Office of the Inspector General audit of the FBI's computer intrusion investigation capabilities, released last week.

The audit, started in 2008 as an assessment of the FBI's computer intrusion investigation capabilities, grew to encompass the bureau's ability to investigate national security computer intrusions by the audit's completion in 2010. The audit also assessed the effectiveness of the FBI-led, multi-agency task force known as the National Cyber Investigative Joint Task Force (NCIJTF). Created in 2008 when President Obama established the Comprehensive National Cybersecurity Initiative, the task force's job is to coordinate intelligence and investigations into national cybersecurity intrusions across 18 intelligence and law enforcement agencies. For the report, auditors interviewed personnel at FBI headquarters, in 10 field offices, and at the NCIJTF.

According to the audit, 36% of FBI of cyber agents thought they lacked the necessary IT expertise for handling national security intrusions, and five out of 36 agents interviewed told the auditor that they didn't think they were skilled enough to investigate national security intrusions. In addition, the audit found that sharing intelligence information between agencies could be challenging, with the reasons for withholding information not always being clear to all participants. Finally, it questioned the FBI's approach to rotating cyber personnel to new offices every three years.

But in an exclusive interview, Steven Chabinsky, deputy assistant director of the FBI's cyber division, largely disputed those findings. On the skills front, for example, he said the audit paints an out-of-date picture of the bureau's cyber-investigation capabilities and results. "We have a very limited sample size of data that's years old, that's going down to the individual level of five agents, that ignores the fact that these agents were in training, and that these agents work in an environment that's conducive to success," he said in a telephone interview.

The FBI has been heavily adjusting its approach to cyber investigations over the past few years. In particular, the bureau has created a cyber-focused training program that mixes real-world experience with classroom learning. "Some of these situations you'll never be able to learn in a classroom, because some of our adversaries are using zero-day exploits which by definition you've never seen before," said Chabinsky. Agents are also part of a squad of experienced personnel, and backed by FBI agents with extremely specialized knowledge who are part of a cyber-action team that can quickly deploy to assist with investigations onsite.

Hence, instead of focusing on the subjective opinions of interviewed agents who were in the process of being trained, Chabinsky said that observers should examine the FBI's results, which he said the report largely ignores. "Case success is relegated to a footnote that said there have been some successes which are beyond the classification level of the report," he said.

Praise For The FBI's Cyber Unit

The FBI's cyber unit and the NCIJTF have received praise for their results, notably from the Office of the Directorate of National Intelligence (ODNI), which oversees the NCIJTF and evaluates its performance on a quarterly basis. In August 2009, the ODNI praised the task force for having been "the driving force behind the transformation of cyber threats from a fragmented and reactive individual agency response, to a unified and highly successful proactive national effort that established itself as a national center of excellence."

Industry experts have also lauded the NCIJTF. "It is the best interagency cooperation program anywhere in cybersecurity--with every key agency actually helping on real cases, hunting down the attackers," said Alan Paller, director of research for information security training company SANS, in an email interview. "They are also effective in finding evidence of actual attacks and warning corporations and agencies that those organizations have been penetrated and data has been stolen. Along with the [National Security Agency vulnerability analysis and operations group], it is the best cybersecurity program we have."

If there's a shortcoming of the NCIJTF--or the FBI's cyber unit--it's that "they have too many cases for the number of people they have, but that brings us around to the problem of skills," said Paller. "The colleges are graduating people who can talk about security, but have no forensics or intrusion detection or exploit skills."

What will help, he said, are internal agency training programs, as well as outreach efforts, such as the U.S. Cyber Challenge--championed by Shawn Henry, executive assistant director of the FBI's criminal, cyber, response and services branch, said Paller--which focuses on fostering high-schoolers' and college students' interest and expertise in information security.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9676
Published: 2015-02-27
The seg_write_packet function in libavformat/segment.c in ffmpeg 2.1.4 and earlier does not free the correct memory location, which allows remote attackers to cause a denial of service ("invalid memory handler") and possibly execute arbitrary code via a crafted video that triggers a use after free.

CVE-2014-9682
Published: 2015-02-27
The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function.

CVE-2015-0655
Published: 2015-02-27
Cross-site scripting (XSS) vulnerability in Unified Web Interaction Manager in Cisco Unified Web and E-Mail Interaction Manager allows remote attackers to inject arbitrary web script or HTML via vectors related to a POST request, aka Bug ID CSCus74184.

CVE-2015-0884
Published: 2015-02-27
Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character.

CVE-2015-0885
Published: 2015-02-27
checkpw 1.02 and earlier allows remote attackers to cause a denial of service (infinite loop) via a -- (dash dash) in a username.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.