Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Feds Turn to Black Hats

Top cybercops want hackers to stop beating them and join them

LAS VEGAS -- Black Hat USA -- Some of the top names in law enforcement raided this hacker haven yesterday, but they weren't out to make a bust -- they were here to ask for help.

Nearly a dozen top-ranking government and law enforcement officials -- including the head of the FBI's cybercrime division -- spent an hour with Black Hat attendees in a session called "Meet the Fed." Their message: Work with us, not against us.

"We'd like to ask you for your help and your expertise when we call you," Jim Finch, assistant director of the FBI in charge of cybercrime, told the attendees. "We'd also like to get some of you to come and work for us."

The agency officials -- which included execs from the Department of Defense, the National Security Agency, the Internal Revenue Service, the U.S. Postal Service, and even NASA -- all conceded that they don't have enough skilled security people to adequately fight cybercrime.

"Sometimes we feel like we're a bunch of sheriffs on horseback, trying to catch bad guys who are driving Maseratis," said Andrew Fried, a special agent who works cybercrime for the IRS.

The agency representatives agreed that their current approach -- trying to teach law enforcement agencies about computers -- isn't working.

"There are more than 18,000 law enforcement agencies in the U.S., and more than half of them have 25 officers or less," noted Jim Christy, director of futures exploration at the Department of Defense's Cyber Crime Center. "Most local law enforcement agencies spell computer with a 'k,' and so do most police chiefs. I'll probably get in trouble for saying that, but it's true."

The feds would like to get some security experts and teach them to be agents, rather than the other way around, the officials said. "It takes more training to be a computer security expert than it does to be a cop," Fried said. "The problem is getting people like [the Black Hat attendees] to join up -- we have long hours and we don't pay a lot, compared to what you can get in the private sector. But we do give people a chance to be part of history, a part of something bigger than themselves."

Aside from the staffing problem, the cybercrime officials said they face many problems with boundaries -- both between countries and between agencies.

"The fact is that we have better relationships with some governments than with others, and that can make it difficult to investigate crime in some countries," said Finch. "We have a better chance of improving the security of a particular network -- such as the banking system -- than we do of building relationships with law enforcement in certain other countries."

While cooperation between law enforcement agencies in different countries is a problem, cooperation between state, local, and federal agencies is no picnic, either, Christy observed. "Before law enforcement can share data with the private sector, we have to get law enforcement to share data with law enforcement."

The agencies are close to completing a national repository for cybercrime data, but it will be some time before a subset of that data is made available to private-sector security pros, Christy said.

With the shortage of manpower, jurisdiction, and inter-agency cooperation, there will continue to be a large number of computer crimes that simply are never investigated, the officials conceded.

"For [the FBI], our top priority has to be those crimes that affect national security," Finch said. "The threats to our critical systems and to industries like banking are going to get the most time and resources. For us, there are the cyber threats to national security -- and then there's everything else."

— Tim Wilson, Site Editor, Dark Reading

  • Secure DNA

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    What the FedEx Logo Taught Me About Cybersecurity
    Matt Shea, Head of Federal @ MixMode,  6/4/2021
    A View From Inside a Deception
    Sara Peters, Senior Editor at Dark Reading,  6/2/2021
    Register for Dark Reading Newsletters
    White Papers
    Current Issue
    The State of Cybersecurity Incident Response
    In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
    Flash Poll
    How Enterprises are Developing Secure Applications
    How Enterprises are Developing Secure Applications
    Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2021-06-13
    The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
    PUBLISHED: 2021-06-12
    Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
    PUBLISHED: 2021-06-12
    In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
    PUBLISHED: 2021-06-12
    In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
    PUBLISHED: 2021-06-12
    It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.