recommended reading

FBI starts new initiative to name hackers


The cybercrime division of the FBI, under a new program, has retooled to focus on determining the identities of intruders at the other end of the keyboard, bureau officials announced.

Giving priority to the labeling of suspects follows claims by the Pentagon that the military now has the capability to single out and retaliate against hackers. 

“A key aim of the Next Generation Cyber Initiative has been to expand our ability to quickly define the attribution piece of a cyberattack to help determine an appropriate response,” Richard McFeely, executive assistant director of the FBI Criminal, Cyber, Response, and Services Branch, said in a blog post on Friday.

He went on to describe the attribution piece as uncovering “who is conducting the attack or the exploitation and what is their motive.”

The FBI during the past year has deployed a corps of specially trained computer scientists able “to extract hackers’ digital signatures,” or the unique behaviors of a given malicious online campaign, the post explained.

Investigators can send findings to the FBI Cyber Division’s Cyber Watch command, a 24-hour station at headquarters, where specialists will look for patterns or similarities among cases, officials said. The watch center also feeds leads to partner agencies, including the departments of Defense and Homeland Security, they added.

“We are obviously concerned with terrorists using the Internet to conduct these types of attacks,” McFeely said. “As the lead domestic intelligence agency within the United States, it’s our job to make sure that businesses’ and the nation’s secrets don’t fall into the hands of adversaries.”

Earlier this month, Defense Secretary Leon Panetta, during a landmark speech on cyber’s threat to national security, said a two-year investment in forensics to solve the attribution problem is paying off. “Potential aggressors should be aware that the United States has the capacity to locate them and hold them accountable for actions that harm America or its interests,” he remarked, in what news reports say was a signal to Iran.

Iran, or at least hackers thought to be sponsored by the nation state, is allegedly behind a spate of server attacks that have paralyzed major U.S. bank websites.

Still, some cybersecurity experts are cautious about assigning blame for computer assaults too quickly. Just last week, investigators told Bloomberg a strike on Saudi Arabian state oil company Aramco, which U.S. officials reportedly linked to Iran, now appears to be the work of a company insider.

“The mistakes in the virus’s code led investigators to the point of attack -- a USB stick that had been inserted in a computer on the internal company network -- and to the identity of the suspected attacker, an Aramco employee who was logged onto the machine at the time of the incident,” Bloomberg reported on Thursday. 

Threatwatch Alert

Stolen credentials

Hackers Steal $31M from Russian Central Bank

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.