Inside the FBI Cyber Division

fbi-online-agent.png

FBI Online Agent screenshot

The Internet is defining technology of the 21st century, and no one knows it better than cybercriminals. Hackers steal billions of dollars and millions of personal data files each year.

The FBI is charged with fighting back, but it is understaffed. A Justice Department watchdog said the bureau is having trouble finding and hiring enough qualified personnel, CBS News' Jeff Pegues reports. Among the biggest threats the FBI's new agents will face are not the ones they will confront on the streets, but the ones online.

In Quantico, Virginia, an old nuclear bunker leads to the bureau's future - tracing hacks and chasing cybercriminals. In a class, new agents are learning to use digital clues to solve crimes. Some of the recruits will go on to classified classes using sophisticated methods to track down hackers.

Hacking is pervasive. Just this summer, the US government revealed that cyberthieves stole the files of as many as 25 million people from the Office of Personnel Management.
Earlier this year, it was revealed that the health care information of up to 11 million people was stolen from Premera Blue Cross. And last year Sony Pictures was hacked and lost sensitive financial documents, film projects, emails and had servers destroyed.

To battle the onslaught, the FBI is looking for recruits who understand how hackers work. Assistant FBI Director James Turgal said his biggest challenge is money.
"When you're out in the private sector and you're making really good money out there, it's hard to leave that, to give all that up, to take a pay cut to come to the FBI," Turgal said.
One 30-year-old agent, who CBS News agreed not to identify, left a job in computer security, taking a 50 percent pay cut. But for him, there are still many appealing aspects of his job.
"Being able to take down criminals and go after nation-state actors, people who attack the homeland," he said.
The recruiting push began late last year. By the end of this year, the FBI hopes to graduate hundreds of new cyber-agents.
CBS: http://bit.ly/1WcOj63

 

 

« Will Robots Eliminate Many Humans From the Workplace?
How To Avoid All-Out War in Cyberspace »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Snort

Snort

Snort is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

Acunetix

Acunetix

Acunetix is a leading web vulnerability scanner, widely acclaimed to include the most advanced SQL injection and XSS black box scanning technology.

Austrian Trust Circle

Austrian Trust Circle

Austrian Trust Circle is an initiative of CERT.at and the Austrian Federal Chancellery and consists of Security Information Exchanges in the areas of the strategic information infrastructure.

Cyberens

Cyberens

Cyberens provide cybersecurity consulting services in IT sectors relating to defense and space, banking, industrial control systems and IoT.

Hallam-ICS

Hallam-ICS

Hallam-ICS designs MEP systems for facilities and plants, control and automation solutions, and ensures safety and regulatory compliance.

Cycode

Cycode

Cycode is the industry’s first source code control, detection, and response platform.

Nexor

Nexor

Nexor are a UK-based cyber security company with 30 years' experience in secure information exchange.

Defensity

Defensity

Defensity offer bespoke & pre packaged IT Security Solutions for Small business to help companies reduce overall IT related risk.

Secuvant

Secuvant

Secuvant is an independent IT Security firm providing enterprise-grade IT security services to mid-market organizations.

eSec Forte Technologies

eSec Forte Technologies

eSec Forte Technologies is a CMMi Level 3 certified Global Consulting and IT Security Services company.

Hunter Strategy

Hunter Strategy

Hunter Strategy focuses on delivering solutions that are concise, scalable, and target our customer’s complex technical challenges.

Snowflake

Snowflake

Empower your cybersecurity and compliance teams with Snowflake. Gain full visibility into security logs, at massive scale, while reducing costs of Security Information and Event Management systems.

HarfangLab

HarfangLab

HarfangLab develops a hunting software to boost detection and neutralization of cyberattacks against companies endpoints.

Mode Solutions

Mode Solutions

Mode guarantee IT performance where you need it most, creating seamless and secure solutions that will alleviate pressure from your business.

Saudi Information Technology Company (SITE)

Saudi Information Technology Company (SITE)

SITE is a forward-thinking enterprise, which aims at revitalizing Saudi Arabia’s digital infrastructure, cybersecurity, software development, and big data and analytics capabilities.

Invisinet Technologies

Invisinet Technologies

Invisinet is a cybersecurity technology company specializing in innovative solutions that protect network infrastructure and critical assets from advanced threats.