C YBER T HREATS AND R ESPONSE Unclassified Continuity Insights Conference Chicago June 18-19, 2013.

Slides:



Advertisements
Similar presentations
Homeland Security and Law Enforcement Created By: Ashley Spivey For _Local_Actions_for_Homeland_Security.pdf.
Advertisements

The Integritas System to enforce Integrity in Academic Environments Prof Basie von Solms Mr Jaco du Toit Prof Basie Von Solms Academy for IT University.
FBI Intelligence Houston Field Intelligence Group Overview Carlos J. Barrón FIG Coordinator Field Intelligence Group H O U S T O N UNCLASSIFIED.
FBI Malware Overview - EDUs
1 NGA Regional Bio-Terrorism Conference Boston, Massachusetts January 12-13, 2004.
Civilian Intelligence Organizations
DHS, National Cyber Security Division Overview
South Carolina Cyber.
InfraGard Update SSA John V. Gillies SA Matthew E. Morin.
CIAO July Critical Infrastructure Assurance Office Protecting America’s Cyberspace: Version 1.0 of the National Plan Jeffrey Hunker National.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
CRIMINAL JUSTICE A Brief Introduction, 5/E by Frank Schmalleger ©2004 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Police.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
(Geneva, Switzerland, September 2014)
COUNTERINTELLIGENCE TRENDS
FSIS’ Innovative Food Security Initiatives Carol Maczka, Ph.D. Assistant Administrator USDA Food Safety and Inspection Service Office of Food Security.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
END THE SILENCE. THE TEAM APPROACH COLLABORATION WITH LANDLORDS, VICTIM ADVOCACY, AND OTHER MEMBERS OF THE SEX OFFENDER MANAGEMENT PROGRAM.
National Governor’s Association September 29-30, 2003 Salt Lake City, Utah.
US-CERT National Cyber Security Division/ U.S. Computer Emergency Readiness Team (US-CERT) Overview Lawrence Hale Deputy Director, US-CERT.
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
FBI’s InfraGard.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Information Sharing Challenges, Trends and Opportunities
Cyber Security Nevada Businesses Overview June, 2014.
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
Mission Statement The mission of NW3C is to provide training, investigative support and research to agencies and entities involved in the prevention,
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
Objectives SWBAT Identify the various procedures in the enactment, implementation, and enforcement of law SWBAT compare responsibilities, jurisdictions,
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Hurdles in implementation of cyber security in India.
High-Tech Crime Countermeasures Ko IKAI High-Tech Crime Technology Division National Police Agency, JAPAN.
Created by: Ashley Spivey For Department of Homeland Security All information from:
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
Pacific Northwest Digital Government Summit Security – How Much is Enough? June 20, 2006 SA Kenneth A. Schmutz.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
Ned Einsig III.  Domestic Intelligence & Security Service of the United States  Prime Federal Law Enforcement Organization  Jurisdiction on over 200.
TLP:Green FIRST/TF-CSIRT Technical Colloquium January 25 th – 27 th, 2016 Prague, CZ TLP:Green.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Chapter 17: Foreign Policy and National Defense Section 2.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
Coast Guard Cyber Command
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Crown capital management international relations International Affairs.
crimes-report
Integrating Virtual Public- Private Partnerships Into Local Law Enforcement For Enhanced Intelligence-Led Policing By Gil Chavez.
April 19 th, 2016 Governors Homeland Security and All-Hazards Cyber Security Sub-Committee.
Federal Bureau of Investigation
Melissa McBee Anderson Ethan Via Federal Bureau of Investigations
Joint Force Headquarters-Michigan CCIRs and PIRs
California Cybersecurity Integration Center (Cal-CSIC)
Joint Force Headquarters-Michigan CCIRs and PIRs
InfraGard: An Alliance for Infrastructure Protection
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
The National Network of
Forth International Forum
Confronting Cyber Threats: Cybersecurity from the FBI’s Perspective
InfraGard – Presented by Andrew Reece KC Chapter InfraGard Member
Role of US Security and Intelligence Agencies
Presentation transcript:

C YBER T HREATS AND R ESPONSE Unclassified Continuity Insights Conference Chicago June 18-19, 2013

Why it is important Why it is important Threats, players, and response Threats, players, and response FBI’s Next Generation Cyber FBI’s Next Generation Cyber Government and Private Sector Partnerships Government and Private Sector Partnerships Examples Examples O BJECTIVES

(End) Why important?

“China’s economic cyber espionage has not diminished… in fact, it has grown exponentially both in terms of its volume and damage it is doing to our nation’s economic future” “The technological and national security of the United States is at risk because some of our most innovative ideas and sensitive information are being brazenly stolen by these cyber attacks.” – Open hearing to the House Permanent Select Committee on Intelligence, February 2013 Growing problem…

Times have changed... Mayhem circa 1984… and today.

"Technology is moving so rapidly that… in the future, we anticipate that the cyber threat will pose the number one threat to our country.“ - FBI Director, March 2012 The Cyber Threat “There has been a nearly twenty (20) fold increase in cyber-attacks against American infrastructure targets between 2009 and 2011.“ - US military assessment, 2012

1. Protect the U.S. from terrorist attack 2. Protect the U.S. against foreign intelligence operations & espionage 3. Protect the U.S. against cyber-based attacks & high-tech crimes 4. Combat public corruption at all levels 5. Protect civil rights 6. Combat transnational/national criminal organizations and enterprises 6. Combat transnational/national criminal organizations and enterprises 7. Combat major white-collar crime 8. Combat significant violent crime 9. Support federal, state, local and international partners 10. Upgrade technology to successfully perform the FBI's mission FBI Priorities

State Sponsored Actors Organized Criminal Syndicates Terrorists Hacktivists Major Players:

Examples of threats & attacks DDoS DDoS Account take-overs Account take-overs PII loss PII loss Credit card informationCredit card information Trade secrets lossTrade secrets loss DefacementDefacement -hackmageddon.com

Target examples

What are we talking about? A Denial of Service attack (DoS) or Distributed Denial of Service attack (DDoS) is a type of Cyber attack that attempts to make a computer or computer network unavailable to users.A Denial of Service attack (DoS) or Distributed Denial of Service attack (DDoS) is a type of Cyber attack that attempts to make a computer or computer network unavailable to users. Simply put, the attack overwhelms a computer or computer network.Simply put, the attack overwhelms a computer or computer network. DDoS:

Victim Website Command & Control Servers Compromised computers called Bots or Zombies Cyber Actor Cyber Actor Anatomy of a DDoS

“For the first time… computer-launched foreign assaults on U.S. infrastructure… was ranked higher in the U.S. intelligence community’s annual review of worldwide threats than worries about terrorism…” -Los Angeles Times, March 12, attacks on Wall Street over last six months - August 2012 computer intrusion at Saudi Aramco - Local example(s) The new #1 threat?

Mission: Coordinate, supervise and facilitate the FBI's investigation of those federal violations in which the Internet, computer systems, or networks are exploited. FBI Cyber Division *The FBI is the lead domestic agency for National Security Cyber investigations.

FBI DHS USSS DOD NSA Lanes in the road “The FBI will often be the first responder because of our nationwide coverage. But the investigative team, at a minimum, should include the expertise of both DHS and NSA. In other words, notification of an intrusion to one agency should be – and will be – notification to all.” -Robert S. Mueller, III

Partnerships Play a Critical Role Cyber Task Forces Private sector is essential Possess the information, expertise and knowledge as well as building the components of cyber security Examples: - Domestic Security Alliance Council - InfraGuard

Provides authority to the government to provide classified cyber threat information to the private sector Knocks down barriers impeding cyber threat information sharing –Among private sector companies –Between private sector and the government Cyber Intelligence Sharing and Protection Act of 2013

Dedicating more resources and building new tools to combat the nation’s most serious cyber threat… criminals, spies, and terrorists breaking into government and private computer networks. Next Generation Cyber Initiative

FBI NextGen Cyber A coordinated nationwide effort Establish Cyber Task Forces Dedicating more resources –Labs / Personnel / Scientists 24hr Cyber Watch Command –Review all cyber incidents reported –Quickly assess threats –Assess for National Security threats –Quick dissemination of leads –Review malicious code

Uninterrupted intake and analysis to: –Contextualize leads –Identify trends –Coordinate investigative response –Deconflict –Link incident information provided by the field and other government agencies –Produce real time intelligence reporting to investigators and analysts CyWatch Command 24/7 Ops Floor

Guardian Federal IC-3 Cyber Incident & Intrusion Reporting E-Guardian* Local Law Enforcement I-Guardian* Internet Crime Complaint Center Private Sector Cyber Task Force National Security Cyber Watch FBI Headquarters / 24 hours General Internet Fraud *To be implemented in 2013 Other Criminal Squad State/Local Police Criminal Intrusion RCFL FBI Chicago Field Office

e-Guardian –A secure, user friendly system implemented in 2008 for to share terrorist threats, events, and suspicious activity among state, local, and federal law enforcement –The system was enhanced in 2013 to allow events and suspicious activities involving computer intrusion events to be reported to FBI CTFs. i-Guardian –A system being developed for trusted industry partners to report incidents and submit malware. Reporting…

CTF Task Force Officers –Paid Overtime –Paid vehicle, fuel, phone and equipment –Paid training –Three days/week; Two year commitment RCFL Cyber Task Force Task Force Members –Three year commitment - full time –Same paid overtime, vehicle, fuel, phone, equipment –Full training toward CART Examiner certification

-Robert S. Mueller, III “We must abandon the belief that better defenses alone will be sufficient. We must build better relationships. And we must overcome the obstacles that prevent us from sharing information and, most importantly, collaborating.” Closing thought

Our Ad Choice Sponsor: QUESTIONS?

FBI Chicago’s Cyber Task Force (CTF) Telephone: (312) * Points of Contact: SA Tim Hearl Desk: (312) Cell: (630) Blackberry/