The FBI and the Internet



Similar documents
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

FBI CHALLENGES IN A CYBER-BASED WORLD

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Cybercrime in Canadian Criminal Law

Internet Safety and Security: Strategies for Building an Internet Safety Wall

ACCEPTABLE USE AND TAKEDOWN POLICY

Federal Bureau of Investigation

U. S. Attorney Office Northern District of Texas March 2013

CYBERSECURITY INESTIGATION AND ANALYSIS

An Introduction to Cyber Crime and Terrorism: Problems and the Challenges

The Information Security Problem

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

Incident Reporting Guidelines for Constituents (Public)

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Promoting a cyber security culture and demand compliance with minimum security standards;

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Fraud and Abuse Policy

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

Acceptable Use Policy

Law Enforcement and Internet Governance: An Ounce of Prevention Is Worth a Pound of Cure

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

An Overview of Cybersecurity and Cybercrime in Taiwan

Acceptable Use Policy and Terms of Service

FBI AND CYBER SECURITY

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL

Cybercrimes: A Multidisciplinary Analysis

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Public-Private Partnerships against cybercrime. Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.

PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS

Chairman's Summary of the Outcomes of the G8 Justice and Home Affairs Ministerial Meeting. (Moscow, June 2006)

Certified Cyber Security Analyst VS-1160

Working with the FBI

Australia s proposed accession to the Council of Europe Convention on Cybercrime

Policies and Practices on Network Security of MIIT

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

FINAL // FOR OFFICIAL USE ONLY. William Noonan

Internet Security and Resiliency: A Collaborative Effort

International Journal of Enterprise Computing and Business Systems

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100

.IBM TLD Registration Policy

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN , Volume-III, Issue-IV, July-Aug 2013

U.S. Department of Justice

Using big data analytics to identify malicious content: a case study on spam s

Who s Doing the Hacking?

What legal aspects are needed to address specific ICT related issues?

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police

How do we Police Cyber Crime?

SAC 025 SSAC Advisory on Fast Flux Hosting and DNS

STATEMENT OF JOSEPH S. CAMPBELL ASSISTANT DIRECTOR CRIMINAL INVESTIGATIVE DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

Domain Name Suspension Request

Cyber Security and Critical Information Infrastructure

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview

Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

The EU s approach to Cyber Security and Defence

24/7 High Tech Crime Network

Cybercrime: an overview of incidents and issues in Canada

Promoting Network Security (A Service Provider Perspective)

Current Threat Scenario and Recent Attack Trends

PORTLAND POLICE BUREAU CRIMINAL INTELLIGENCE UNIT STANDARD OPERATING PROCEDURE

The Impact of Cybercrime on Business

WRITTEN TESTIMONY OF

Security Analytics for Smart Grid

ITU WSIS Thematic Meeting on Countering Spam: The Scope of the problem. Mark Sunner, Chief Technical Officer MessageLabs

National Cyber Crime Unit

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Executive Cyber Security Training. One Day Training Course

Tackling Cyber Crime in the UK. Andy Archibald Deputy Director National Cyber Crime Unit

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Acceptable Use Policy ("AUP")

We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

Loophole+ with Ethical Hacking and Penetration Testing

Establishment of a Kerala Police CyberDome High Tech Public- Private Partnership Centre for Cyber Security and Innovations.

PEER-TO-PEER NETWORK

How To Create An Insight Analysis For Cyber Security

DATA PROTECTION LAWS OF THE WORLD. India

Acceptable Use Policy

Cyber Security Current Trends & Emerging Threats

FAQ (Frequently Asked Questions)

Cablelynx Acceptable Use Policy

Transcription:

The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation

Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The use of technology within the FBI Cyber Division to solve Federal violations

FBI Priorities 1. Protect the US from terrorist attacks 2. Protect the US against foreign intelligence operations and espionage 3. Protect the US against cyber-based based attacks and high-technology crimes 4. Combat public corruption at all levels 5. Protect civil rights 6. Combat transnational and national criminal organizations and enterprises 7. Combat major white-collar crime 8. Combat significant violent crime 9. Support federal, state, local and international partners 10. Upgrade technology to successfully perform the FBI s mission

FBI Cyber Division Created Fall 2002 Primary goal - to enhance the FBI s capability to protect the US against cyber based attacks and high tech crime Cyber Squads active in all 56 FBI field offices

FBI Cyber Priorities Criminal cyber threats Intrusions Intellectual Property Rights Child pornography Internet Fraud and identity theft (phishing, spam) Other computer based or computer facilitated criminal activity Threats from terrorist organizations to computer networks and architecture

Cyber Division Two Different Approaches Traditional Crime that has migrated to the Internet Non-Traditional Activity that was not a concern prior to the World Wide Web and the Internet

Cyber - Traditional Cyber Crime Investigations Child pornography Phishing, spam Terrorism Fraud Slave trade Theft of Intellectual Property (IPR) Stalking Sale of drugs or other contraband

Cyber - Non-Traditional Computer Intrusion Investigations Distributed Denial of Service (DDoS) attacks Malicious code (viruses, worms, trojans) Botnets and Pharming Malicious intrusions into computers/networks National Security Threats Cyber Terrorism

Use of Technology The FBI uses many of the same publicly available technologies to identify, monitor, capture, and prosecute the criminals the criminals use, such as: Domain & IP WHOIS queries DNS VOIP Email, Instant Messenger, & IRC Encryption Google And many others

Technology Use Example WHOIS Directory Services

WHOIS IP and domain name WHOIS information is an integral tool for all cyber investigations These tools provide gap analysis, target profiling, and sometimes even - identification Speed and accuracy in getting the data is key

WHOIS - Investigative Use Mytob/Zotob worm 9/11 and Anthrax Investigations Multiple kidnappings Child pornography Innocent Images Many other including phishing, botnets, pharming, IPR, Internet gambling, and Internet fraud related investigations

ICANN Luxembourg 2005 Law Enforcement session Reps from Australia, Spain, Malawi, UK, Japan, Interpol Importance of accessible and accurate WHOIS

International Association of Chiefs of Police 27 September 2005 issues Resolution advocating continued access to publicly available databases. Consult with law enforcement to assist in the resolution of potential conflicts, i.e., privacy regulation, business concerns, data-mining prevention efforts before removing to restricting access to this information www.theiacp.org/resolutions/2005resolutions.pdf

Robert Flaim 1-571-223-3338 rflaim@fbi.gov