[Infowarrior] - An introduction to the FBI's anti-cyber crime network
Richard Forno
rforno at infowarrior.org
Thu Nov 19 20:30:27 UTC 2009
An introduction to the FBI's anti-cyber crime network
The FBI explained how its anti-cyber crime task force works at a
Congressional hearing this week, and outlined the Bureau's latest
accomplishments, which include catching the masterminds of a
coordinated raid on over 1,000 ATM machines. But nobody thinks the
United States is prepared to stop a really bad attack through
cyberspace on our financial or physical networks.
By Matthew Lasar | Last updated November 19, 200
http://arstechnica.com/web/news/2009/11/an-introduction-to-the-fbis-anti-cybercrime-network.ars?utm_source=rss&utm_medium=rss&utm_campaign=rss
The Federal Bureau of Investigation told Congress this week that when
it comes to cyber crime, terrorist groups like Al Qaeda aren't the
sharpest pencils in the cup, but they're not out of the game either.
"It is always worth remaining mindful that terrorists do not require
long term, persistent network access to accomplish some or all of
their goals," Steven R. Chabinsky, one of the Bureau's Cyber Division
directors, explained to a Senate Judiciary Subcommittee. "Rather, a
compelling act of terror in cyberspace could take advantage of a
limited window of opportunity to access and then destroy portions of
our networked infrastructure."
And there are lots of such windows, Chabinsky added, since, "we, as a
nation, continue to deploy new technologies without having in place
sufficient hardware or software assurance schemes, or sufficient
security processes that extend through the entire lifecycle of our
networks."
Thus the FBI has set up its own network to respond to whatever comes
down the pike. Time will tell, and probably soon, how effective it is,
but Chabinsky laid it out all the parts at the hearing. They include a
division within the bureau, an inter-federal task force, an alliance
with state, local, and industry enforcers, and a consumer complaint
center.
Big news
Before unpacking these components, it should be noted that cyber crime
is big news these days, with top officials repeatedly warning that the
United States is not prepared for a major attack through the net on
its financial or physical structures. "The architecture of the
Nation’s digital infrastructure, based largely upon the Internet, is
not secure or resilient," the White House concluded in its recent
Cyberspace Policy Review.
Millions of Americans got a sense of the global situation on a recent
60 Minutes feature, which noted that a cyber attack probably took out
the power in several cities in Brazil between 2005 and 2007. Then they
learned about our "electronic Pearl Harbor," described by Jim Lewis of
the Center for Strategic and International Studies:
"Some unknown foreign power, and honestly, we don't know who it is,"
Lewis explained to 60 Minutes' Steve Kroft, "broke into the Department
of Defense, to the Department of State, the Department of Commerce,
probably the Department of Energy, probably NASA. They broke into all
of the high tech agencies, all of the military agencies, and
downloaded terabytes of information." And last November some sleuths,
possibly just by leaving thumbnail drives around, managed to get into
the U.S. Central Command network (CENTCOM). Thumbnail drives are now
banned from use at the agency.
That is why the White House cyberspace assessment concluded that the
Federal government "is not organized to address this growing problem
effectively now or in the future." And that's why we're seeing Capitol
Hill hearings on the extant structure and how to improve it. Here's
how the FBI is fitted to deal with the problem at this point.
Phish fries
The FBI's first line of defense against cyber crime is its Cyber
Division. It has about 2,000 special agents who have received some
kind of instruction in this field, and another 1,000 with more
advanced training.
The Cyber Division's most noted recent accomplishment was a raid
completed in October dubbed "Operation Phish Fry." The 100 people
caught in this sting are accused of stealing about $1.5 million from
U.S. bank account holders via phony email solicitations—complete with
links to bogus bank websites. About half the defendants are Egyptian
citizens who sent out the phishing messages and broke into the bank
accounts. The other half hail from Nevada, California, and North
Carolina. They're accused of transferring the ill-gotten money to US
bank accounts, then siphoning it out of the country.
What was significant about Phish Fry was that it involved an
unprecedented partnership with Egyptian police. Catching up with these
kind of assaults isn't easy. It took about a year for the Cyber
Division to collar the Eastern European masterminds of a massive
simultaneous heist of 2,100 ATMs in 280 cities in the US, Canada,
Japan, the Ukraine, and Hong Kong. The Great ATM Robbery was quite an
operation, which involved penetrating a credit/debit card processing
company, identifying PIN numbers, then coordinating a global network
of baddies who strolled over to ATMs and collectively helped
themselves to $9 million in cash.
But the ultimate goal is stopping these virtual raiders before they
strike. The FBI's Operation Dark Market seems to be the closest step
towards that Holy Grail. The agency claims the so-named online network
was a kind of exclusive stock exchange for crooks, where they bought
and sold stolen financial data. Dark Market had 2,500 registered
members. An FBI operative managed to talk his way into a job as a
systems administrator for the cabal. The end result was 56 collars
around the world.
Infragard
Then there's Infragard. Coordinated by the FBI, it's is a fellowship
of federal, state, local, industry, and academic cybercrook catchers
and watchers. Infragard has about 33,000 participants in almost 90
cities around the country, and you can apply to become a member
yourself. The point is to build an accessible community for the FBI to
contact on any given cyber-crime problem, especially in the private
sector, where IT managers and policy folk are understandably touchy
about this stuff. "No governmental entity should be involved in
monitoring private communications networks as part of a cybersecurity
initiative," warned Gregory T. Nojeim of the Center for Democracy and
Technology, speaking before that Senate hearing.
Mindful of these concerns, Infragard hangs out around the margins
between government and the private sector, "to promote ongoing timely
dialogue," in the FBI's own words. Its chapters work with FBI Field
Offices in the same geographic area. Infragardians conference on the
latest technology and hold hacking contests.
Here's the deal, as far as we can tell. You join Infraguard and become
part of the FBI's information cohort. In exchange, you get the
following cool stuff:
• "Network with other companies that help maintain our national
infrastructure. Quick Fact: 350 of our nation's Fortune 500 have a
representative in InfraGard.
• Gain access to an FBI secure communication network complete with
VPN encrypted website, webmail, listservs, message boards and much more.
• Learn time-sensitive, infrastructure related security information
from government sources such as Department of Homeland Security and
the FBI."
Needless to say, this makes people nervous. The Progressive magazine
ran an exposé about Infragard in 2008 titled "The FBI Deputizes
Business." The piece suggested that the organization may have given
its members authority to "shoot to kill" in national emergencies. The
FBI strongly denies this. "Patently false," FBI Cyber Division
director Shawn Henry called the assertion. But it's likely that civil-
liberties-minded observers will continue to squint at Infragard for
the foreseeable future.
Complain complain complain
Then there's the Internet Crime Complaint Center, a collaboration
between the FBI, the National White Collar Crime Center, and the
Bureau of Justice Assistance (BJA). The point of IC3, as it's called,
is to provide a place for victims of online theft to make complaints,
a centralized system for the government to take them, and a means to
learn what the bad guys are up to this week.
IC3 received almost 280,000 complaints last year and did something
about over 70,000 of them. In many instances it referred them to state
and local law enforcement agencies. IC3 also issues regular advisories
on the latest mischief. These include alerts on the latest social
networking fraud techniques, tips for SQL programmers on protecting
their sites from hackers, and even warnings about e-mails pretending
to be FBI warnings about Al Qaeda.
The FBI, it should be noted, is just one component of the National
Cyber Investigative Joint Task Force, which it leads, and which
consists of representatives from 19 government agencies that struggle
with cyber crime. But it's unclear to what extent that coalition is
going to have any obvious impact on the ground war against large scale
roguery on the Internet. The spotlight will more likely continue to
shine on the Bureau and Department of Justice's efforts in this regard—
success measured by results to some, or judged by others by their
impact on the nation's civil liberties.
More information about the Infowarrior
mailing list