From the virtual realm to zero gravity, China is posing a serious threat to U.S. national security that goes far beyond the Earth. With a strategic thrust designed to buttress and expand the reach of the Chinese Communist Party, the country is engaged in a long march for control that currently includes operations inside the United States as well as in orbit and beyond.
Starting this fall, high school students in the state of Georgia will have the unique opportunity to take an elective course in intelligence and national security studies. The class will introduce students to the field of intelligence, the associated activities to gather intelligence, the roles of the U.S. Intelligence Community (IC), national security, the limits and capabilities of intelligence, careers in the field, and how intelligence plays a role in decision-making.
The Federal Bureau of Investigation (FBI) has a unique role as a federal law enforcement agency as well as a national security department. Its vast information technology enterprise must support its functionality in carrying out these roles, which have different rules of engagement. And when adding new tools, processes or software, the bureau has to consider solutions carefully. With zero trust architecture—a method that combines user authentication, authorization and monitoring; visibility and analytics; automation and orchestration; end user device activity; applications and workload; network and other infrastructure measures; and data tenants to provide more advanced cybersecurity—gaining use in the U.S.
The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency, or CISA, reported yesterday that the Federal Bureau of Investigation, the Office of the Director of Intelligence and CISA itself had created a Cyber Unified Coordination Group. The move was necessary given the alarming cyber compromise, a Trojan-style attack by threat-actor UNC2452 with ties to Russia. The attack, identified by FireEye, reached North American, European, Asian and Middle Eastern governments, technology firms, telecommunications, consulting companies and other entities, the company said.
The FBI’s pilot iris recognition program initiated in 2013 will likely be fully operational this fall, possibly by October 1. The agency also is developing tools to detect fingerprints that have been deliberately mutilated and a scanner large enough to get a print of the entire palm along with all five fingerprints.
The U.S. Federal Bureau of Investigation, and the State, Treasury and Homeland Security departments issued a detailed 12-page advisory on April 15 alerting the nation to an increased threat of malicious cyber activity by North Korea. The U.S. government’s advisory warned financial entities in particular of aggressive action by North Korea intended to harm the financial system, as well as threats to critical infrastructure.
Government agencies are working together much more effectively as they counter terrorism and state-sponsored attacks in cyberspace. But more remains to be done as adversaries introduce new tactics and capabilities.
A panel comprising the top U.S. intelligence officials reviewed these issues as they closed out the AFCEA/INSA Intelligence & National Security Summit on September 5. Their points ranged from foreign interference in U.S. elections to cooperation—or the lack thereof—from industry with the U.S. government.
The FBI has a full plate: fighting public corruption, organized and white-collar crime and domestic and foreign terrorism; solving violent crimes; protecting civil rights; neutralizing national security threats, espionage and counterintelligence; and mitigating threats of weapons of mass destruction, among other responsibilities. And one part of the bureau is growing to protect the nation against cyber threats.
The United States faces a “toxic mix of threats,” Dan Coats, the director of National Intelligence, testified today before the Senate Select Committee on Intelligence while unveiling the annual Worldwide Threat Assessment of the U.S. Intelligence Community.
The Office of the Director of National Intelligence (ODNI) announced it is stepping up efforts to combat the risks of adversarial influence campaigns against American democracy. Together with the Department of Homeland Security (DHS) and the FBI, the ODNI will give a classified briefing to election officials in every U.S. state on February 16 and 18.
You’ve probably received a phone call that goes something like this: “Mr. Smith? I’m calling from ABC company, and there appears to be a security problem with XYZ operating systems. Are you at your computer right now? We can fix the problem for you. All you have to do open your computer, and I’ll take care of it.”
The FBI recently awarded a $100 million, multi-award indefinite delivery/indefinite quantity contract for Tactical Mesh/Mobile Ad Hoc Network Systems to support the bureau’s Operational Technology Division.
U.S. lawmakers launched a bipartisan bid to boost the Department of Homeland Security's powers to better oversee cybersecurity compliance by federal agencies and intervene when they might fail to safeguard their networks.
The Senate bill would strengthen the department's ability to enforce cybersecurity standards governmentwide, and “in the event that a federal agency chooses not to do so, [the] DHS would have the authority to stand in … and prevent worse damages from occurring,” Sen. Susan Collins (R-ME) said in announcing her plans to submit the bill to the full Senate on Tuesday.
The FBI’s Internet Crime Complaint Center (IC3) on June 23 identified CryptoWall as the most current and significant ransomware threat targeting U.S. individuals and businesses. In the 14 months since the malicious software first appeared, the IC3 received 992 CryptoWall-related complaints, with victims reporting losses totaling more than $18 million, according to the FBI warning.
The financial impact to victims goes beyond the ransom fee itself, which is typically between $200 and $10,000. Many victims incur additional costs associated with network mitigation, network countermeasures, loss of productivity, legal fees, IT services and/or the purchase of credit monitoring services for employees or customers.
The significant federal government cyberbreach that let hackers swipe the personal data of more than 4 million current and former federal employees has all the trappings of a targeted nation-state attack aimed at gleaning critical information on federal workers; and current cyber protection methods might not be enough to prevent future attacks, one expert says.
Hackers breached computer systems of the Office of Personnel Management (OPM) in December, stealing data including Social Security numbers, job assignments, performance reviews, insurance details and training certificates. Officials detected the breach in April.
The director of the Federal Bureau of Investigation (FBI) views cyberspace as one of the bureau’s top priorities across its entire mission set. Not only is economic national security threatened from cyberspace, it also may hold clues to deterring and preventing crimes—if the bureau can exploit it effectively.
“Cyber touches everything I’m responsible for,” said FBI director James Comey. “It’s not a thing, it’s a way.” Comey described the important of cyberspace at the final plenary session of the AFCEA/INSA Intelligence and National Security Summit 2014, held September 18-19 in Washington, D.C.
The Federal Bureau of Investigation (FBI) has transformed into an organization with intelligence as its core of operations, according to its director. This approach strengthens the bureau’s traditional activities of crime solving, and it enhances its work protecting the country against enemies within its borders.
In a closing plenary speech, FBI Director James Comey described these activities at the AFCEA/INSA Intelligence and National Security Summit 2014, held September 18-19 in Washington, D.C. Comey explained that the bureau built on reforms begun by his predecessor, and they give the FBI increased strength in all its operations.
The FBI’s Next Generation Identification (NGI) system went live last week, replacing the Integrated Automated Fingerprint Identification System and improving accuracy. According to experts, the new system offers 99.6 percent correct identification versus 92 percent with the former. The NGI enables automation of 93 percent of searches. Other upgrades include connections with the National Palm Print System, an iris-modality repository and capabilities for more mobile detections.
The FBI, Washington, D.C., has named Richard McFeely executive assistant director of the criminal, cyber and response services branch; and Ronald Hosko assistant director of the criminal investigative division.
General Dynamics Information Technology, Fairfax, Virginia, has been awarded three task orders to provide information technology (IT) services under the Federal Bureau of Investigation Information Technology Supplies and Support Services (FBI IT Triple S) contract. The task orders have a combined value of $19 million over eight years.
Keith L. Bennett has been named assistant director of the FBI's Inspection Division, Washington, D.C.
Louis F. Quijas has been named assistant director of the FBI's new Office of Law Enforcement Coordination, Washington, D.C.
U.S. government agencies continue to expand their biometric identity management capabilities and their ability to share biometrics data among the various agencies and international partners, according to government officials speaking at AFCEA's Homeland Security Conference in Washington, D.C.
Mary F. Rook has been named special agent in charge of the FBI's Anchorage Division.