Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

3/10/2014
10:59 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Robert Anderson, Jr. Named To Lead FBI Criminal, Cyber, Response, And Services Branch

He will be responsible for all criminal and cyber investigations worldwide

FBI Director James B. Comey named Robert Anderson, Jr. as the executive assistant director of the Criminal, Cyber, Response, and Services Branch at FBI Headquarters. In this role, he will be responsible for all criminal and cyber investigations worldwide, as well as international operations, critical incident response, and victim assistance. He succeeds Richard A. McFeely, who is retiring from the FBI in April.

"Bob has the leadership qualities I believe are essential. He is smart and dedicated and cares about the agents and professional staff who fulfill the FBI's mission," said Director Comey. "He has the depth and breadth of casework that will help lead CCRSB and achieve strategic results that benefit the FBI and the American public."

Since August 2012, Mr. Anderson has been the assistant director of the Counterintelligence Division; he was previously the division's deputy assistant director for operations.

Mr. Anderson joined the FBI in 1995 and reported to the Washington Field Office (WFO), where he worked narcotics and violent crime cases. He then served on the Hostage Rescue Team and completed deployments to more than 20 countries.

Mr. Anderson became a supervisor in the Counterintelligence Division in 2001 and responsible for overseeing counterintelligence and espionage investigations. He coordinated several major espionage cases that involved the Department of Energy's nuclear weapons laboratories. Mr. Anderson also managed the program that placed FBI agents in Department of Energy labs.

As a unit chief, he oversaw the management of nuclear proliferation and espionage investigations. He supervised the Phillip Cheng investigation in the San Francisco Division, which led to numerous cases being opened and the arrests of 16 people for dual-use technology transfers.

Mr. Anderson returned to WFO in 2004, first as the supervisor of its global foreign counterintelligence squad and later as the supervisor of one of its espionage squads. In 2007, Mr. Anderson was promoted to assistant special agent in charge of the Counterespionage Branch at WFO. In this role, he oversaw the indictment and arrest of multiple defendants for espionage and related offenses, including an investigation that resulted in one of the first arrests, prosecutions and incarcerations of a U.S. citizen committing espionage on behalf of China.

Mr. Anderson returned to FBI Headquarters in 2008 to serve as chief of the Counterespionage Section. During the next year, he led the Harold James Nicholson/Nathan Nicholson espionage investigation, which resulted in the re-arrest and prosecution of Nicholson and his son for espionage. Mr. Anderson was also detailed for three months in 2009 as the acting special agent in charge of the Albuquerque Division.

He returned to WFO in 2010 as the special agent in charge of its Intelligence Division and led the collection, coordination, and production and dissemination of intelligence information from WFO among multiple operational divisions at FBI Headquarters and the U.S. Intelligence Community.

Before joining the FBI, Mr. Anderson served as a Delaware State trooper for nearly nine years. He served in the uniform patrol division, the criminal investigative unit, and the aviation section. Mr. Anderson is a pilot and paramedic and in 1990 was named the Delaware State Police Trooper of the Year--the force's highest honor--for attempting to rescue individuals who were trapped in a burning home in 1989.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
News
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
News
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: "Elon, I think our cover's been blown."
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31597
PUBLISHED: 2021-04-23
The xmlhttprequest-ssl package before 1.6.1 for Node.js disables SSL certificate validation by default, because rejectUnauthorized (when the property exists but is undefined) is considered to be false within the https.request function of Node.js. In other words, no certificate is ever rejected.
CVE-2021-2296
PUBLISHED: 2021-04-22
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromi...
CVE-2021-2297
PUBLISHED: 2021-04-22
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromi...
CVE-2021-2298
PUBLISHED: 2021-04-22
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attac...
CVE-2021-2299
PUBLISHED: 2021-04-22
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful atta...