Inside the FBI Cyber Division

fbi-online-agent.png

FBI Online Agent screenshot

The Internet is defining technology of the 21st century, and no one knows it better than cybercriminals. Hackers steal billions of dollars and millions of personal data files each year.

The FBI is charged with fighting back, but it is understaffed. A Justice Department watchdog said the bureau is having trouble finding and hiring enough qualified personnel, CBS News' Jeff Pegues reports. Among the biggest threats the FBI's new agents will face are not the ones they will confront on the streets, but the ones online.

In Quantico, Virginia, an old nuclear bunker leads to the bureau's future - tracing hacks and chasing cybercriminals. In a class, new agents are learning to use digital clues to solve crimes. Some of the recruits will go on to classified classes using sophisticated methods to track down hackers.

Hacking is pervasive. Just this summer, the US government revealed that cyberthieves stole the files of as many as 25 million people from the Office of Personnel Management.
Earlier this year, it was revealed that the health care information of up to 11 million people was stolen from Premera Blue Cross. And last year Sony Pictures was hacked and lost sensitive financial documents, film projects, emails and had servers destroyed.

To battle the onslaught, the FBI is looking for recruits who understand how hackers work. Assistant FBI Director James Turgal said his biggest challenge is money.
"When you're out in the private sector and you're making really good money out there, it's hard to leave that, to give all that up, to take a pay cut to come to the FBI," Turgal said.
One 30-year-old agent, who CBS News agreed not to identify, left a job in computer security, taking a 50 percent pay cut. But for him, there are still many appealing aspects of his job.
"Being able to take down criminals and go after nation-state actors, people who attack the homeland," he said.
The recruiting push began late last year. By the end of this year, the FBI hopes to graduate hundreds of new cyber-agents.
CBS: http://bit.ly/1WcOj63

 

 

« Will Robots Eliminate Many Humans From the Workplace?
How To Avoid All-Out War in Cyberspace »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Egyptian Supreme Cybersecurity Council (ESCC)

Egyptian Supreme Cybersecurity Council (ESCC)

ESCC is responsible for developing a national strategy to face and respond to the cyber threats and attacks and to oversee its implementation and update.

Quest Software

Quest Software

Simple IT management for a complex world. Whether it’s digital transformation, cloud expansion, security threats or something new, Quest helps you solve complex problems with simple solutions.

Incopro

Incopro

Incopro is an online IP and brand protection software provider that arms brand owners with actionable intelligence to combat online and offline intellectual property and copyright infringements.

Onsist

Onsist

Onsist brand protection services provide proactive defense against fraudulent use of your brand online.

Qmulos

Qmulos

Qmulos’ real-time continuous monitoring risk management suite, Q-Compliance, provides a massively flexible and scalable solution to optimizing operational security.

ISARR

ISARR

The ISARR software platform - your bespoke Risk, Resilience & Security Management solution. Simple, cost effective and adaptable, now and into the future.

Neosecure

Neosecure

NeoSecure is a specialist Cybersecurity Solutions and Managed Services provider in Latin America.

HighPoint

HighPoint

HighPoint is a leading technology infrastructure solutions provider offering consultancy, solutions and managed services for network infrastructure and cybersecurity.

European Center for CyberSecurity in Aviation (ECCSA)

European Center for CyberSecurity in Aviation (ECCSA)

ECCSA is a cooperative partnership within the aviation community to better understand emerging cybersecurity risks in aviation and provide collective support in dealing with cybersecurity incidents.

Extreme Networks

Extreme Networks

Since 1996, Extreme has been pushing the boundaries of networking technology, driven by a vision of making it simpler and faster as well as more agile and secure.

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji) (formerly known as HLB Crosbie & Associates) is a well-established firm of accountants and business advisers in Fiji.

ZEUSS

ZEUSS

ZEUSS is a diversified data center, cybersecurity, and green energy company.

MARS Suite

MARS Suite

MARS Suite is your all-in-one solution for cyber protection & compliance. Cybersecurity and risk management is what we do best. And we’re making it simple and easy.

Baselime

Baselime

Baselime, the cloud-native observability platform. Resolve issues in your cloud application before they become problems.

SafeAeon

SafeAeon

SafeAeon is a leading Cybersecurity-as-a-Service provider, offering 24x7 premium Managed Security Services with AI-powered and Human-driven 24x7 SOC.

Mode

Mode

Mode is an out-of-band communication and crisis collaboration platform. One platform to manage your cyber crisis response. Stay connected when it's needed most.