FBI's Ability To Disrupt Cybercrime Has Deteriorated

FBI agents took down or disrupted only about one-tenth as many cyber-criminal operations during the 2017 fiscal year as they did three years earlier, according to annual reports.

The number of cyber-crime operations that FBI agents dismantled or disrupted fell from nearly 2,500 in fiscal year 2014, the first year reliable records were kept, to just 262 in fiscal year 2017, according to annual audits.

Agents disrupted or dismantled 510 cyber-crime operations in fiscal year 2015 and 259 operations in fiscal year 2016, according to the audits.

The FBI missed its own target of 500 disruptions or dismantlements in fiscal years 2016 and 2017, according to the report.

Despite missing that goal, the FBI’s cyber division “made noteworthy progress towards neutralising global cyber threats,” according to the 2017 report. The bureau also continues to list cyber operations as one of its major priorities and officials frequently highlight cyber operations during public events.

Dismantlement means that the organisation’s financial base and supply networks have all been rendered inoperable, according to the audit documents, while disruptions mark major milestones on the road to dismantlement.

It’s not clear if the ten-fold reduction in disruptions and dismantlements reflects a shift in FBI priorities, a change in tactics or some other cause.

An FBI spokesman declined to comment on the figures or to provide additional context.

The audit documents don’t describe any change in definitions or methodology that might account for the massive reduction.

FBI budget documents don’t break out year-on-year cyber operations funding, which might give another clue to the reduction.

The disruption and dismantlement numbers also don’t account for the varying size and complexity of cyber-crime operations, which can range from a few miscreants trading in stolen credit card numbers to major financial fraud operations and global botnet armies.

Private-sector analyses have typically shown that the financial damage from cyber-crime has grown year on year, though it’s notoriously difficult to suss-out hard numbers in the murky world of cyberspace.  

The FBI is working on improving how it describes and prioritises cyber threats, following a 2016 recommendation from the bureau’s internal auditor, according to the 2017 report.

The FBI’s current methodology “does not prioritise cyber threats in an objective, data-driven, reproducible, and auditable manner,” the bureau’s inspector general found.

DefenseOne:

You Might Also Read: 

FBI Fingerprint Software Might Contain Russian code:

Fighting Digital Crime: Evolving Police Methods:

« The Top 5 Tech Trends For 2018
4 Steps To Get Ready For GDPR »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Spiceworks

Spiceworks

Spiceworks provide a range of free apps for IT professionals including network inventory, network monitor, and help desk.

Hiscox

Hiscox

Hiscox offers cyber and data risks insurance to protect your business against the risks of holding data and using computer systems..

FinalCode

FinalCode

FinalCode offers a file encryption and file-based enterprise digital rights management (eDRM) platform.

Cyber Struggle

Cyber Struggle

At Cyber Struggle, our aim is training and certifying the special forces of the cyber world.

PQShield

PQShield

PQShield are specialists in Post-Quantum Cryptography. We provide quantum-secure cryptographic solutions for software, software/hardware co-design and data in transit.

DataDog

DataDog

DataDog provides Cloud-native Security Monitoring. Real-time threat detection across your applications, network, and infrastructure.

Hazy

Hazy

Hazy specialises in financial services, helping some of the world’s top banks and insurance companies reduce compliance risk.

ClubCISO

ClubCISO

ClubCISO is a community of peers, working together to help shape the future of the information security profession by facilitating independent discussion on data security and cyber resilience.

CYDEF

CYDEF

CYDEF provides comprehensive, state-of-the-art cybersecurity protection that is accessible and affordable to organizations of any size.

Kompleye

Kompleye

Kompleye is a recognized cybersecurity and compliance audit organization that offer a comprehensive solution for different industries.

ThrottleNet

ThrottleNet

ThrottleNet provides world-class managed IT services and cybersecurity to organizations in St. Louis and throughout Missouri.

Covenant Technologies

Covenant Technologies

Make Covenant Technologies the only choice for your IT and cybersecurity recruitment needs. We deliver quality candidates at the forefront of the cybersecurity and IT industry.

Apollo Secure

Apollo Secure

Apollo is an automated cybersecurity platform for startups and small businesses to achieve and maintain security compliance.

CloudDefense.AI

CloudDefense.AI

CloudDefense.AI is an industry-leading multi-layered Cloud Native Application and Protection Platform (CNAPP) that safeguards your cloud infrastructure and cloud-native apps,

NMi Group

NMi Group

NMi Group is a global pioneer in mission-critical Testing, Inspection, Certification, and Calibration (TICC) services.

True North Solutions

True North Solutions

True North Solutions provides a wide range of fully customized, vendor-neutral industrial engineering and OT automation solutions to companies across North America and around the world.