FBI AND CYBER SECURITY



Similar documents
Federal Bureau of Investigation

FBI CHALLENGES IN A CYBER-BASED WORLD

Cyber Security Threat Briefing

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

Working with the FBI

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

The FBI and the Internet

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

Middle Class Economics: Cybersecurity Updated August 7, 2015

POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges

INFRAGARD.ORG. Portland FBI. Unclassified 1

Getting real about cyber threats: where are you headed?

Current Threat to the U.S. from Cyber Espionage & Cyberterrorism

AT A HEARING ENTITLED THREATS TO THE HOMELAND

Corporate Spying An Overview

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure

Who s Doing the Hacking?

INTELLIGENCE AND ANALYSIS

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

El Camino College Homeland Security Spring 2016 Courses

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

Cybersecurity Primer

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems

Cybercrime: risks, penalties and prevention

National Cybersecurity & Communications Integration Center (NCCIC)

v. 03/03/2015 Page ii

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC)

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Establishing a State Cyber Crimes Unit White Paper

Report on CAP Cybersecurity November 5, 2015

CYBER SECURITY GUIDANCE

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Counterintelligence Awareness Glossary

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

NSF Cyber Security Conference. FBI Counterintelligence Domain Program Briefing

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview

Cybersecurity on a Global Scale

The UK cyber security strategy: Landscape review. Cross-government

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Liability Management Evolving Cyber and Physical Security Standards and the SAFETY Act

Case Study: Hiring a licensed Security Provider

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

How To Protect Yourself From Cyber Crime

U.S. Department of Justice

Developing a robust cyber security governance framework 16 April 2015

Audit of the Federal Bureau of Investigation s Implementation of Its Next Generation Cyber Initiative

I N T E L L I G E N C E A S S E S S M E N T

Protecting Organizations from Cyber Attack

Training Courses Catalog 2015

Energy Cybersecurity Regulatory Brief

DHS, National Cyber Security Division Overview

Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.

U. S. Attorney Office Northern District of Texas March 2013

Executive Cyber Security Training. One Day Training Course

MISSION-ESSENTIAL INTELLIGENCE AND CYBER SOLUTIONS

Cyber Adversary Characterization. Know thy enemy!

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

ICS-CERT Year in Review. Industrial Control Systems Cyber Emergency Response Team. National Cybersecurity and Communications Integration Center

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry

Intelligence expertise and psychological insights to help Governments and Corporate Clients identify and manage risk. Company

Developing a Mature Security Operations Center

Collaboration for the Detection, Prevention, Mitigation and Response to Cyber Attacks

AURORA Vulnerability Background

Transcription:

FBI AND CYBER SECURITY SSA John Caruthers SSA Ken Schmutz SSA Tom Winterhalter

Mission The FBI is the only U.S. agency charged with the authority to investigate both criminal and national security investigations. As a law enforcement agency and a full member of the US Intelligence Community, the FBI serves as a vital link between the two groups. The traditional distinction between national security and criminal matters is increasingly blurred as terrorists commit crimes to finance their activities, organized crime groups exploit international boundaries and jurisdictions, and computer hackers cause havoc or create vulnerabilities that can be exploited by foreign spies.

Cyber Threats Cyber Criminal Threats Botnets (Resources), ACH Fraud, Extortion, Insider Threats Cyber Terrorism Internet being used not just to recruit or radicalize, but to incite. Growing use of social network site to collaborate and promote violence.

Cyber Threats Counterintelligence and Economic Espionage Espionage used to be spy vs. spy Who are they? Nation-State Actors, Mercenaries for Hire, Rogue Hackers, Transnational Criminal Syndicates What are they after? Technology, Intelligence, Intellectual Property, Military Weapons, Military Strategy They have everything to gain; we have a great deal to lose

FBI Response What the FBI can do Investigate - National and global - Combine technical skills and investigative experiences - Long-term commitment of resources Forensics (RCFL) Patterns and Links Bring national security concerns to intelligence community

FBI Response 56 Field Offices with Cyber Squads. 75 FBI Legal Attaché Offices around the world. Cyber Trained Agents embedded with foreign police forces. Promotes joint operations/initiatives with international partners. Training provided to international law enforcement community.

FBI Response National Cyber Investigative Joint Task Force Cyber Action Team Groups that are focusing on key threats and trends. These groups consist of agents, officers, and analysts from different agencies. ICS/SCADA TFC FBI, DHS, and OGA partnering together. Establishing cooperative working relationships with regulatory groups and agencies. InfraGard

FBI Response What the FBI won t do Take over your systems. Repair your systems. Share proprietary information with competitors. Provide investigation-related information to the media or shareholders. In essence we will not further victimize the victim.

Cooperation The most effective weapon against crime is cooperation... The efforts of all law enforcement agencies with the support and understanding of the American people. J. Edgar Hoover

Cooperation Assessments Partnership with DHS ongoing program Free to asset owners across all 18 CIKRs Optional FBI participation provides the asset owner an easy transition for investigative handoff Optional FBI participation will enhance domain awareness and help to cultivate the FBI Infragard program within the control system community Incident Response Fly team: US-CERT ICS-CERT DHS-CSSP FBI (Optional) DHS entities focus on operational assurance FBI provides investigative expertise

Reporting Information Why should you report to us? You may help prevent/identify an incident or victim. Another piece of the puzzle. How much do you know about the interdependency between the US and Canada: $6.0 billion in trade between Canada and Florida. Nearly 500,000 jobs in Florida depend on trade with Canada. Florida s agricultural sales to Canada amounts to $726 million. Canada is the largest oil and natural gas supplier to the US. Canada is the largest supplier of nuclear fuel to the US. Canada is the largest electricity supplier to the US Canada and the US share an integrated electricity grid and supply almost all of each other s electricity imports.

Stuxnet Always worth mentioning Proof of concept Stuxnet vs. Aurora the original Aurora. Is it really a problem? What do your engineers say? Unintended Consequences Persistence and a Loss of Revenue. Are you still secure?

Questions? SSA John Caruthers SSA Ken Schmutz SA Winterhalter SA Smithmier