FBI's Ability To Disrupt Cybercrime Has Deteriorated

FBI agents took down or disrupted only about one-tenth as many cyber-criminal operations during the 2017 fiscal year as they did three years earlier, according to annual reports.

The number of cyber-crime operations that FBI agents dismantled or disrupted fell from nearly 2,500 in fiscal year 2014, the first year reliable records were kept, to just 262 in fiscal year 2017, according to annual audits.

Agents disrupted or dismantled 510 cyber-crime operations in fiscal year 2015 and 259 operations in fiscal year 2016, according to the audits.

The FBI missed its own target of 500 disruptions or dismantlements in fiscal years 2016 and 2017, according to the report.

Despite missing that goal, the FBI’s cyber division “made noteworthy progress towards neutralising global cyber threats,” according to the 2017 report. The bureau also continues to list cyber operations as one of its major priorities and officials frequently highlight cyber operations during public events.

Dismantlement means that the organisation’s financial base and supply networks have all been rendered inoperable, according to the audit documents, while disruptions mark major milestones on the road to dismantlement.

It’s not clear if the ten-fold reduction in disruptions and dismantlements reflects a shift in FBI priorities, a change in tactics or some other cause.

An FBI spokesman declined to comment on the figures or to provide additional context.

The audit documents don’t describe any change in definitions or methodology that might account for the massive reduction.

FBI budget documents don’t break out year-on-year cyber operations funding, which might give another clue to the reduction.

The disruption and dismantlement numbers also don’t account for the varying size and complexity of cyber-crime operations, which can range from a few miscreants trading in stolen credit card numbers to major financial fraud operations and global botnet armies.

Private-sector analyses have typically shown that the financial damage from cyber-crime has grown year on year, though it’s notoriously difficult to suss-out hard numbers in the murky world of cyberspace.  

The FBI is working on improving how it describes and prioritises cyber threats, following a 2016 recommendation from the bureau’s internal auditor, according to the 2017 report.

The FBI’s current methodology “does not prioritise cyber threats in an objective, data-driven, reproducible, and auditable manner,” the bureau’s inspector general found.

DefenseOne:

You Might Also Read: 

FBI Fingerprint Software Might Contain Russian code:

Fighting Digital Crime: Evolving Police Methods:

« The Top 5 Tech Trends For 2018
4 Steps To Get Ready For GDPR »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Perkins Coie LLP

Perkins Coie LLP

Perkins Coie LLP is an internationalk law firm with offices across the USA and Asia. Practice areas include Privacy and Data Security.

Singapore Cybersecurity Consortium

Singapore Cybersecurity Consortium

Singapore Cybersecurity Consortium was created to encourage use-inspired research, training and technology awareness in cybersecurity.

Information Technology Industry Development Agency (ITIDA)

Information Technology Industry Development Agency (ITIDA)

ITIDA has two broad goals: building the capacities of Egypt’s local information and communications technology (ICT) industry and attracting foreign direct investments to boost the ICT sector.

Bangladesh Association of Software & Information Services (BASIS)

Bangladesh Association of Software & Information Services (BASIS)

BASIS is the national trade body for Software & IT Enabled Service industry of Bangladesh.

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions is an industry leading Data Sanitization Software, Hardware and Onsite Service Provider.

Transpere

Transpere

Transpere provides IT Asset Disposition (ITAD), Data Destruction, Electronic Recycling and Onsite Data Services.

Onward Security

Onward Security

Onward Security provides security solutions including network & application assessment, product security testing and security consulting services.

CHT Security

CHT Security

CHT Security is a Managed Security Service Provider (MSSP) specialized in cyber security technologies enabling enterprises to defense against cyber threats to networks, gateways and endpoints.

Cyber Intelligence 4U

Cyber Intelligence 4U

Cyber Intelligence 4U is an educational services company that provides two levels of cybersecurity training programs: executive and technical.

Converge Technology Solutions

Converge Technology Solutions

Converge Technology Solutions Corp. is a North American IT solution provider delivering advanced analytics, cloud, cybersecurity, and managed services solutions.

Nucleon Security

Nucleon Security

Nucleon Endpoint Detection and Response EDR is the most effective way to protect the value created by your organization against any threat.

Aigner Business Solutions

Aigner Business Solutions

Aigner Business Solutions GmbH is a specialist in IT-Security and Data Protection. Concise and focussed.

Trianz

Trianz

Trianz Cybersecurity Services are Powered by One of the World’s Largest Databases on Digital Transformation. We Understand Evolving Risks, Technologies and Best Practices.

BriskInfosec Technology & Consulting

BriskInfosec Technology & Consulting

BriskInfosec provides information security services, products and compliance solutions to our customers.

Asimily

Asimily

Asimily’s IoMT risk remediation platform holistically secures the mission-critical healthcare devices that deliver safe and reliable care.

Unisys

Unisys

Unisys is a global information technology company providing industry-focused solutions integrated with leading-edge security to clients in the government, financial services and commercial markets.