fbi and cyber crime | crime stoppers international

24
FBI and Cyber Security FBI and Cyber Security Unit Chief David Wallace Unit Chief David Wallace Cyber Division Cyber Division Federal Bureau of Federal Bureau of Investigation Investigation

Upload: scott-mills

Post on 08-May-2015

1.142 views

Category:

Education


1 download

DESCRIPTION

Crime Stoppers International 32nd Training Conference Presentation October 25, 2011 by Cyber Crime FBI Unit Chief David Wallace in Montego Bay, Jamaica

TRANSCRIPT

Page 1: FBI And Cyber Crime | Crime Stoppers International

FBI and Cyber SecurityFBI and Cyber Security

Unit Chief David WallaceUnit Chief David WallaceCyber DivisionCyber Division

Federal Bureau of InvestigationFederal Bureau of Investigation

Page 2: FBI And Cyber Crime | Crime Stoppers International

OverviewOverview

• FBI Mission• Cyber Threats• FBI Response

Page 3: FBI And Cyber Crime | Crime Stoppers International

MissionMission

1. Protect the United States from Terrorist Attack.

2. Protect the United States against foreign intelligence operations and espionage.

3. Protect the United States against cyber based attacks and high technology crimes.

Proactive vs. Reactive

Page 4: FBI And Cyber Crime | Crime Stoppers International

• Identify and neutralize the most significant individuals or groups conducting computer intrusions, the dissemination of malicious code, and/or other computer-supported operations.

• The FBI is the only U.S. agency charged with the authority to investigate both criminal and national security computer intrusions.

MissionMission

Page 5: FBI And Cyber Crime | Crime Stoppers International

Criminal Threats to Internet Users• Cyber Extortion

• Individuals threaten to use “Social Networking” power

• Extortion-based DDoS attacks• Scareware/Fraudulent Antivirus Software

• Phishing• Ongoing case with major bank, 350 subjects

identified, over 50 in a cooperating foreign country

• 2000 phishing transactions totaling $4 million

• Botnets• Enable other criminal activity, Spam,

distribution of additional Malware (Keyloggers, DNSChanger etc.)

Page 6: FBI And Cyber Crime | Crime Stoppers International

One type of Cyber Extortiona. These things, unless you honor the below claim, WILL HAPPEN on March 8,

2010.

b. As you have denied my claim I can only respond in this way. You no longer have a choice in the matter, unless of course you want me to continue with this outlined plan. I have nothing to lose, you have everything to lose.

c. My demand is now for $198,303.88. This amount is NOT negotiable, you had your chance to make me an offer, now I call the shots.

d. I have 6 MILLION e-mails going out to couples with children age 25-40, this e-mail campaign is ordered and paid for. 2 million go out on the 8th and every two days 2 million more for three weeks rotating the list. Of course it is spam, I hired a spam service, I could care less, The damge [sic] will be done.

e. I am a huge social networker, and I am highly experienced. 200,000 people will be directly contacted by me through social networks, slamming your integrity and directing them to this website within days.

f. I think you get the idea, I am going to drag your company name and reputation, through the muddiest waters imaginable. This will cost you millions in lost revenues, trust and credibility not to mention the advertising you will be buying to counter mine. Sad thing is it’s almost free for me!

g. The process is in motion and will be released on March 8th, 2010. If you delay and the site goes live, The price will then be $3,000,000.00.

Page 7: FBI And Cyber Crime | Crime Stoppers International

DDoS Extortions

• Recent trend targeting online product retailers• Company receives an extortion threat

via email, online chat or their 1-800 telephone number

• Demand to “pay $,$$$ within five minutes or your website will be shut down…”

• Many go unreported• Victims appear to be targets of

opportunity• These tend to roll into Botnet

investigations

Page 8: FBI And Cyber Crime | Crime Stoppers International

Scareware – also a form of Cyber Extortion

Page 9: FBI And Cyber Crime | Crime Stoppers International

Criminal Threats to Internet Users• Cyber Extortion• Individuals threaten to use “Social

Networking” power• Extortion-based DDoS attacks• Scareware/Fraudulent Antivirus Software

• Phishing• Ongoing case with major U.S. banks, 350

subjects identified, over 50 in a cooperating foreign country

• 2000 phishing transactions totaling $4 million

• Botnets• Enable other criminal activity, Spam,

distribution of additional Malware (Keyloggers, DNSChanger etc.)

Page 10: FBI And Cyber Crime | Crime Stoppers International

Example of Phishing Emails Sent to Customers of U.S.-based Bank

Page 11: FBI And Cyber Crime | Crime Stoppers International

Criminal Threats to Internet Users• Cyber Extortion

• Recent trend in Health Care Services Industry

• Threatening to use “Social Networking” power

• Scareware/Fraudulent Antivirus Software• Phishing

• Ongoing case with major U.S. banks, 350 subjects identified, over 50 in a cooperating foreign country

• 2000 phishing transactions totaling $4 million

• Botnets• Enable other criminal activity, Spam,

distribution of additional Malware (Keyloggers, DNSChanger etc.)

Page 12: FBI And Cyber Crime | Crime Stoppers International

Conficker Botnet• Estimated to Have Infected 7 to 15 million

computers as of February 2010• Requires ongoing maintenance to keep

“caged”• Could be any Botnet (Torpig, Coreflood,

Mariposa…) which drops malware

Page 13: FBI And Cyber Crime | Crime Stoppers International

Cyber Terrorism• No full-scale cyber attacks.

• DDoS• Defacements

• Growing presence of terrorist organizations on the internet.• Internet being used not to just recruit or

radicalize, but to incite.

• Growing use of social networking sites to collaborate and promote violence.

Page 14: FBI And Cyber Crime | Crime Stoppers International

Counterintelligence and Economic Espionage• Espionage used to be spy vs. spy.

• Today our adversaries can sit on the other side of the globe and have access to an entire network at their fingertips.

• Who are they?• Nation-State Actors• Mercenaries for Hire• Rogue Hackers• Transnational Criminal Syndicates

Page 15: FBI And Cyber Crime | Crime Stoppers International

Counterintelligence and Economic Counterintelligence and Economic EspionageEspionage• What are they after?

• Technology• Intelligence (Policy-maker decisions)• Intellectual Property• Military Weapons• Military Strategy

• They have everything to gain; we have a great deal to lose.

Page 16: FBI And Cyber Crime | Crime Stoppers International

What the FBI can do• Investigate

• National and global• Combine technical skills and investigative

experiences• Long-term commitment of resources

• Forensics (RCFLs)• Pattern and Link Analysis• Bring national security concerns to

intelligence community

FBI Response

Page 17: FBI And Cyber Crime | Crime Stoppers International

• 56 Field Offices with Cyber Squads.• 61 FBI Legal Attaché Offices around

the world, with an add’l 14 ‘Sub-offices’.

• Cyber Trained Agents embedded with foreign police agencies.

FBI Response

Page 18: FBI And Cyber Crime | Crime Stoppers International

• National Cyber Investigative Joint Task Force

• Cyber Action Team• Threat Focus Cells that are focusing on

key threats and trends.• These groups consist of agents, officers,

and analysts from different agencies.• Financial TFC, SCADA TFC, Romanian TFC,

Botnet TFC

FBI Response

Page 19: FBI And Cyber Crime | Crime Stoppers International

Threat Focus Cells• FBI-led government-level working groups

targeting high-threat issues, with a view towards the following:• Identify the Infrastructure – Understand the

mechanics behind the Cyber threat• Victim Profiling – Assess how and why specific

victims are targeted• Subject Identification – Identify malicious

actors, methods, criminal histories• Consumer Identification – Malicious actors may

be ‘sub-contractors’• Operational Development – Mitigation

strategies

Page 20: FBI And Cyber Crime | Crime Stoppers International

Intelligence Sharing At All LevelsIntelligence Sharing At All Levels

• Government Agencies - Threat Focus Cells• Share Intel and Mitigation Strategies

• Government to Corporate – InfraGard• Developed in 1996• 1000 Intelligence Reports Disseminated in

the past year.• Government to Public – Internet Crime

Complaint Center• IC3.gov• LooksTooGoodToBeTrue.com

Page 21: FBI And Cyber Crime | Crime Stoppers International

InfraGard.net

Page 22: FBI And Cyber Crime | Crime Stoppers International

Intelligence Sharing At All LevelsIntelligence Sharing At All Levels

• Government Agencies - Threat Focus Cells• Share Intel and Mitigation Strategies

• Government to Corporate – InfraGard• Developed in 1996• 1000 Intelligence Reports Disseminated

in the past year.• Government to Public – Internet

Crime Complaint Center• IC3.gov• LooksTooGoodToBeTrue.com

Page 23: FBI And Cyber Crime | Crime Stoppers International

What the FBI won’t do• Take over your systems.• Repair your systems.• Share proprietary information with

competitors.• Provide investigation-related information to

the media or shareholders.

• In essence … we will not further victimize the victim.

FBI Response

Page 24: FBI And Cyber Crime | Crime Stoppers International

Director Mueller at RSA

FBI Director Mueller at RSA:

“No one country, company, or agency can stop cyber crime. A “bar the windows and bolt the doors” mentality will not ensure our collective safety. Fortresses will not hold forever; walls will one day fall down. We must start at the source; we must find those responsible.

“The only way to do that is by standing together. Together we can find better ways to safeguard our systems and stop those who would do us harm. For ultimately, we face the same threat. We both serve the American people. And we must continue to do everything we can, together, to minimize these attacks.”