Federal government falling short on cybercrime
Date: February 21, 2008Source: Searchsecurity.techtarget.com
By:
WASHINGTON—The federal government is falling farther and farther behind its fight against cybercrime and, despite an increase in the amount of resources being allocated to address the problem, it will continue to struggle without a lot of help from law enforcement agencies at the state, local and international levels, current and former government security officials say.
Currently, the vast majority of the work being done on cybercrime and national computer security issues is done at the federal level by agencies as diverse as the FBI, Treasury Department, Department of Homeland Security and Department of State. And while these agencies all have teams of highly trained security professionals, the sheer volume of investigations that they're asked either to run or assist with far outweighs the amount of time, money and personnel available. Jerry Dixon, former executive director of the National Cyber Security Division at DHS and current vice president for government relations for Infragard's National Member Alliance, said in a keynote speech at the Black Hat D.C. conference here Wednesday that the only way to help stem this tide is with a big shift in the way that lower-level law enforcement agencies deal with computer security cases.
"We need more trained law enforcement personnel at the state and local level," he said. "The feds are swamped. We need a tiered approach."
The default approach right now for most state and local agencies is to refer many, if not all, of their computer security cases to the federal agencies. Most of the state police departments and local forces have few officers with the kind of technical background to handle these complex cases. And, because computer cases often cross state or national boundaries, the federal agencies are better equipped to handle them. However, Dixon said that the changing nature of today's threats makes it impossible for even the well-funded and well-staffed agencies such as the FBI and Treasury to stay abreast of the problem.
Dixon, who also works with Team Cymru , a team of security experts, said that the group's current research shows more than 3.5 million active botnet command and control servers. Attackers are using this massive infrastructure to launch an increasingly complex and varied set of attacks against corporate, government and home-user machines, all with the goal of corralling as much personally identifiable information as possible.
"It's about people and crime now. The attackers are going after our information and identities," Dixon said. "There's a very low risk to the attackers because it's an international challenge. Attribution is still very difficult."
Add comment Email to a Friend