Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Value of Health IT
Shows & Panels
Search Tags: FBI
The Justice Department has rewritten the playbook on catching cyber criminals. It recently led an international effort to disrupt a global cybertheft ring. A Russian-led gang allegedly stole millions of dollars by infecting computers with malware known as Gameover Zeus. Robert Anderson is the executive assistant director of the Criminal, Cyber Response and Services Branch at the FBI. He joined Tom Temin and Emily Kopp on the Federal Drive to discuss how the sting operation worked.
Cloud technologies are creating compliance problems for the FBI at the state level. Because of the security and privacy regulations for contractors working with the agency, regular state police officers have to jump through legal hoops to access FBI databases remotely to run checks on suspicious people from a laptop or their patrol car. The FBI requires a cloud provider to run criminal background checks on every one of its own employees in each location it wants a cloud service. Some states are already working with cloud providers to strike special compliance deals with the FBI so officers and contractors can earn special certification to interact with FBI databases through the cloud. Nextgov reports state agencies are now running special audits to make sure cloud contractors follow the FBI's regulations.
Larry Zelvin, the director of the National Cybersecurity and Communications Integration Center in DHS's National Protection and Programs Directorate, is expected to tell the House Homeland Security Committee Wednesday that the implementation of the advanced intrusion detection and prevention program known as Einstein is hampered by the lack of clarity of the exact role DHS is allowed to play under the current set of cybersecurity laws.
The search for hundreds of abducted school girls heats up in Nigeria. The U.S. has sent a team of experts to assist with search efforts, including personnel from the departments of State and Defense and four FBI officials with expertise in safe recovery and negotiations. Chris Voss, former FBI lead international kidnapping negotiator, told Federal Drive hosts Tom Temin and Emily Kopp about the process behind a hostage negotiation strategy.
For the FBI, threats to the United States come in many forms. One of them is biological. The bureau has been investigating ways to combine big data analytics and life sciences to help protect against bio threats. Last week, the FBI joined in an event on the implications of big data on national security. Ed You, supervisory special agent in the Weapons of Mass Destruction Directorate at the FBI, joined Federal Drive hosts Tom Temin and Emily Kopp. He explained how bio hazards, big data and life sciences come together to help national security.
In our weekly Crime of the Week feature, Federal News Radio reports on a federal employee who leaked top secret information to a news outlet.
The FBI, and the EPA and GSA IGs have been investigating spear phishing attacks using real federal employee email addresses and stolen credit card numbers to buy toner cartridges online. GSA said scammers so far have targeted employees of the EPA, Interior Department's Fish and Wildlife Service, the Commerce Department's Census Bureau, the Department of Health and Human Services' National Institutes of Health.
The FBI and inspectors general from EPA and GSA are investigating an 18-month scam targeting vendors on the GSA schedule. The bad actors are spoofing federal employee emails to buy toner cartridges with stolen credit cards. Federal News Radio's Executive Editor Jason Miller was a guest on In Depth with Francis Rose. to provide details about the scam and information about how you should protect yourself. Read Federal News Radio's related article.
In our weekly Crime of the Week feature, Federal News Radio reports on a federal employee who is under investigation or charged with a crime.