recommended reading

FBI starts new initiative to name hackers

Thinkstock

The cybercrime division of the FBI, under a new program, has retooled to focus on determining the identities of intruders at the other end of the keyboard, bureau officials announced.

Giving priority to the labeling of suspects follows claims by the Pentagon that the military now has the capability to single out and retaliate against hackers. 

“A key aim of the Next Generation Cyber Initiative has been to expand our ability to quickly define the attribution piece of a cyberattack to help determine an appropriate response,” Richard McFeely, executive assistant director of the FBI Criminal, Cyber, Response, and Services Branch, said in a blog post on Friday.

He went on to describe the attribution piece as uncovering “who is conducting the attack or the exploitation and what is their motive.”

The FBI during the past year has deployed a corps of specially trained computer scientists able “to extract hackers’ digital signatures,” or the unique behaviors of a given malicious online campaign, the post explained.

Investigators can send findings to the FBI Cyber Division’s Cyber Watch command, a 24-hour station at headquarters, where specialists will look for patterns or similarities among cases, officials said. The watch center also feeds leads to partner agencies, including the departments of Defense and Homeland Security, they added.

“We are obviously concerned with terrorists using the Internet to conduct these types of attacks,” McFeely said. “As the lead domestic intelligence agency within the United States, it’s our job to make sure that businesses’ and the nation’s secrets don’t fall into the hands of adversaries.”

Earlier this month, Defense Secretary Leon Panetta, during a landmark speech on cyber’s threat to national security, said a two-year investment in forensics to solve the attribution problem is paying off. “Potential aggressors should be aware that the United States has the capacity to locate them and hold them accountable for actions that harm America or its interests,” he remarked, in what news reports say was a signal to Iran.

Iran, or at least hackers thought to be sponsored by the nation state, is allegedly behind a spate of server attacks that have paralyzed major U.S. bank websites.

Still, some cybersecurity experts are cautious about assigning blame for computer assaults too quickly. Just last week, investigators told Bloomberg a strike on Saudi Arabian state oil company Aramco, which U.S. officials reportedly linked to Iran, now appears to be the work of a company insider.

“The mistakes in the virus’s code led investigators to the point of attack -- a USB stick that had been inserted in a computer on the internal company network -- and to the identity of the suspected attacker, an Aramco employee who was logged onto the machine at the time of the incident,” Bloomberg reported on Thursday. 

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.