Risk
10/30/2012
01:05 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

FBI Expands Cybercrime Division

Federal Bureau of Investigation will hire computer scientists, build new tools and boost collaboration to help catch malicious hackers.

14 Amazing DARPA Technologies On Tap
14 Amazing DARPA Technologies On Tap
(click image for larger view and for slideshow)
The Federal Bureau of Investigation is adding resources, building new tools, increasing hiring and expanding collaboration with local groups as part of its Next Generation Cyber Initiative, an effort to overhaul the FBI's Cyber Division, the agency announced last week.

The FBI has long been a force in combating cybercrime. In the last year alone, the agency has busted dozens involved in the online trafficking of credit card and bank account data, arrested key members of the Anonymous and LulzSec hacktivist groups, broken up a sophisticated gang of online bank fraudsters, taken down a small-town mayor for hacking a website calling for his recall and worked closely with international officials to disrupt a botnet that had stolen $14 million.

However, the FBI still wants to get better, especially in its ability to attribute attacks to the hackers behind them. Attribution of cybercrime has long been the bane of law enforcement due to the nature of the Internet and the ability of hackers to spoof their IP addresses and rely heavily on proxies. As the adage says, on the Internet, nobody knows you're a dog.

[ Cybercrime is a growing problem. See Hack Exposes Most South Carolinians' Social Security Numbers. ]

Over the course of the last year, the law enforcement agency has launched an effort to "uncover and investigate Web-based intrusion attacks and develop a cadre of specially trained computer scientists able to extract hackers' digital signatures from mountains of malicious code," the FBI said in a press release. For example, the FBI has increasingly hired computer scientists to work alongside agents as part of cyber investigations.

The question the FBI is attempting to resolve is "who is conducting the attack or the exploitation and what is their motive," FBI assistant director of criminal, cyber, response and services Richard McFeely said in a statement. "In order to get to that, we've got to do all the necessary analysis to determine who is at the other end of the keyboard perpetrating these actions."

Such an effort requires not only new talent and better tools, but also ongoing collaboration with organizations that get hacked and other government agencies. To that end, the FBI said that its agents are working to build relationships with critical infrastructure companies in industries like finance and transportation. The FBI is also sharing a lot of information with the Department of Defense, Department of Homeland Security and National Security Agency as part of the National Cyber Investigative Joint Task Force.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
DaveM49
50%
50%
DaveM49,
User Rank: Apprentice
10/31/2012 | 5:03:41 PM
re: FBI Expands Cybercrime Division
I should like to see the increasing problem of harassment, threats, and other bullying on social networks addressed on a Federal level. Fraud via online sales, Craigslist, and the ubiquitous dating site scams is also badly in need of attention. These activities have become so rampant that they are considered a matter of day to day life to many if not most who use the Internet. Criminal behavior involving interstate communications has long fallen under Federal jurisdiction. I would like to see strong enforcement of laws already in place
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7298
Published: 2014-10-24
adsetgroups in Centrify Server Suite 2008 through 2014.1 and Centrify DirectControl 3.x through 4.2.0 on Linux and UNIX allows local users to read arbitrary files with root privileges by leveraging improperly protected setuid functionality.

CVE-2014-8346
Published: 2014-10-24
The Remote Controls feature on Samsung mobile devices does not validate the source of lock-code data received over a network, which makes it easier for remote attackers to cause a denial of service (screen locking with an arbitrary code) by triggering unexpected Find My Mobile network traffic.

CVE-2014-0619
Published: 2014-10-23
Untrusted search path vulnerability in Hamster Free ZIP Archiver 2.0.1.7 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the current working directory.

CVE-2014-2230
Published: 2014-10-23
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.

CVE-2014-7281
Published: 2014-10-23
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.