FBI's Ability To Disrupt Cybercrime Has Deteriorated

FBI agents took down or disrupted only about one-tenth as many cyber-criminal operations during the 2017 fiscal year as they did three years earlier, according to annual reports.

The number of cyber-crime operations that FBI agents dismantled or disrupted fell from nearly 2,500 in fiscal year 2014, the first year reliable records were kept, to just 262 in fiscal year 2017, according to annual audits.

Agents disrupted or dismantled 510 cyber-crime operations in fiscal year 2015 and 259 operations in fiscal year 2016, according to the audits.

The FBI missed its own target of 500 disruptions or dismantlements in fiscal years 2016 and 2017, according to the report.

Despite missing that goal, the FBI’s cyber division “made noteworthy progress towards neutralising global cyber threats,” according to the 2017 report. The bureau also continues to list cyber operations as one of its major priorities and officials frequently highlight cyber operations during public events.

Dismantlement means that the organisation’s financial base and supply networks have all been rendered inoperable, according to the audit documents, while disruptions mark major milestones on the road to dismantlement.

It’s not clear if the ten-fold reduction in disruptions and dismantlements reflects a shift in FBI priorities, a change in tactics or some other cause.

An FBI spokesman declined to comment on the figures or to provide additional context.

The audit documents don’t describe any change in definitions or methodology that might account for the massive reduction.

FBI budget documents don’t break out year-on-year cyber operations funding, which might give another clue to the reduction.

The disruption and dismantlement numbers also don’t account for the varying size and complexity of cyber-crime operations, which can range from a few miscreants trading in stolen credit card numbers to major financial fraud operations and global botnet armies.

Private-sector analyses have typically shown that the financial damage from cyber-crime has grown year on year, though it’s notoriously difficult to suss-out hard numbers in the murky world of cyberspace.  

The FBI is working on improving how it describes and prioritises cyber threats, following a 2016 recommendation from the bureau’s internal auditor, according to the 2017 report.

The FBI’s current methodology “does not prioritise cyber threats in an objective, data-driven, reproducible, and auditable manner,” the bureau’s inspector general found.

DefenseOne:

You Might Also Read: 

FBI Fingerprint Software Might Contain Russian code:

Fighting Digital Crime: Evolving Police Methods:

« The Top 5 Tech Trends For 2018
4 Steps To Get Ready For GDPR »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

SecWest

SecWest

SecWest is the organizer of CanSecWest, PACSEC, originator of PWN2OWN, security auditing, and virtual engagement/training.

Swedish Civil Contingencies Agency (MSB)

Swedish Civil Contingencies Agency (MSB)

MSB's Information Assurance Department is responsible for supporting and coordinating work relating to Sweden's national societal information security.

Wireless Logic

Wireless Logic

Wireless Logic delivers a range of secure and resilient value-added M2M/IoT managed services that empower remote devices to communicate cost-effectively, two ways.

Threat Intelligence

Threat Intelligence

Threat Intelligence is a specialist security company providing penetration testing, threat intelligence, incident response and training services.

Resilience First

Resilience First

Resilience First is a not-for-profit organisation, led and funded by business to strengthen collective business resilience in all areas, including cyber security.

Veritas Technologies

Veritas Technologies

Veritas provide industry-leading solutions that cover all platforms with backup and recovery, business continuity, software-defined storage and information governance.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

X-Ways Software Technology

X-Ways Software Technology

X-Ways provide software for computer forensics, electronic discovery, data recovery, low-level data processing, and IT security.

SimSpace

SimSpace

SimSpace is the visionary yet practical platform for measuring how your security system responds under actual, sustained attack.

PQShield

PQShield

PQShield are specialists in Post-Quantum Cryptography. We provide quantum-secure cryptographic solutions for software, software/hardware co-design and data in transit.

VLATACOM Institute

VLATACOM Institute

Vlatacom Institute is privately owned accredited research and development institute, system integrator and turn-key solution provider. Areas of expertise include encryption and authentication.

QGroup

QGroup

QGroup has been re-designing the consultancy industry since 2012. We're a rapidly expanding group of consulting companies that deliver bespoke IT services including cybersecurity.

Client Solution Architects (CSA)

Client Solution Architects (CSA)

Client Solution Architects (CSA) is a leading digital transformation consulting firm focused on the U.S. Defense Department and all U.S. Federal enterprise information technology service areas.

Vali Cyber

Vali Cyber

Vali Cyber was founded in 2020 with the mission of addressing the specific cybersecurity needs of Linux.

ID R&D

ID R&D

ID R&D is an award-winning provider of AI-based facial liveness, document liveness, and voice biometrics.

Beetles Cyber Security

Beetles Cyber Security

Beetles is a crowdsourced penetration testing platform designed to build a trusted, hacker-centric approach to protectan organization’s digital attack surface.