Risk
3/2/2012
01:28 PM
50%
50%

FBI Director Urges Attack Intelligence-Sharing

Teamwork between private companies and the bureau on fighting cybercrime is the way "to stop the bleeding," Robert Mueller tells RSA Conference attendees.

FBI director Robert Mueller, in a keynote address Thursday at the RSA Security Conference in San Francisco, urged real-time sharing of cybercrime and threat intelligence between the public and private sectors akin to the type of cooperation forged to fight terrorism post-9/11.

"Real-time information-sharing is essential. Much can and should be done to share with the private sector, and in turn give the private sector the means and motivation to work with us" at the FBI, Mueller said.

The FBI is continuing to build specialized cybercrime task forces to work locally with state and local law enforcement, Mueller said. "It's a similar model to the terrorism task force, but to fight cybercrime," he said. "As we continue to share information, we will continue to break down the walls that [block] our abilities to share such information--the same way we did [after] the September 11 [terrorist] attacks."

Mueller said the FBI now has specialized cybersquads in each of its 50 field offices.

[ See our complete RSA 2012 Security Conference coverage, live from San Francisco. ]

But companies traditionally have been frustrated with sharing their breach information with the FBI and other law enforcement agencies: they say it's more of a one-way street, where they share but then never hear back from law enforcement.

Mueller acknowledged that fear in his speech, and promised that the agency will reciprocate: "You may think the information flow is one-way to us," he said. "We will share what we can and as quickly as we can ... A code of silence will not serve us in the long-run."

He said the FBI understands why companies are hesitant to share their breach information with the bureau. "We do understand that you may be reluctant to report security breaches to us because it may harm you competitively or ... will erode shareholder confidence," he said.

The FBI doesn't want companies to feel victimized a second time by its investigation of the breach, he said.

Read the rest of this article on Dark Reading.

The right forensic tools in the right hands are just a start. The new Digital Detectives issue of Dark Reading shows you how to better apply the lessons they teach. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Bprince
50%
50%
Bprince,
User Rank: Ninja
3/4/2012 | 4:27:17 AM
re: FBI Director Urges Attack Intelligence-Sharing
@readers: some people say sharing information with the government has been largely a one-way street. Have you found that to be true, and how should that be addressed?
Brian Prince, InformatinonWeek/Dark Reading Comment Moderator
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: No, no, no! Have a Unix CRON do the pop-up reminders!
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.