{"id":905,"date":"2009-11-25T00:00:00","date_gmt":"2009-11-25T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/11\/25\/fbis-network-against-cyber-crime\/"},"modified":"2021-12-30T11:38:21","modified_gmt":"2021-12-30T11:38:21","slug":"fbis-network-against-cyber-crime","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/11\/25\/fbis-network-against-cyber-crime\/","title":{"rendered":"FBI&#8217;s network against cyber crime"},"content":{"rendered":"<p>Last week, when the Senate&#8217;s Subcommittee on Terrorism and Homeland Security held a hearing entitled &#8220;Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace&#8221;, the NSA wasn&#8217;t the only agency who gave an overview of its actions and practices concerning the subject. Steven R. Chabinsky, Deputy Assistant Director, of the FBI Cyber Division, also addressed the Subcommittee. He stated that &#8220;the FBI considers the cyber threat against our nation to be one of the greatest concerns of the 21st century.&#8221;  Chabinsky reminded that &#8220;terrorists do not require long term, persistent network access to accomplish some or all of their goals.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>He also made known that the most sophisticated adversaries are capable of altering software and hardware destined for the US during their passage through the global supply chain route, can remotely intrude on US networks, monitor communication and position insiders within those networks, and that all this may &#8220;provide them with pre-positioned capabilities to conduct computer network attacks.&#8221;<\/p>\n<p>The Cyber Division&#8217; latest success was the Operation Phish Phry.<\/p>\n<p>At the consumer level, the FBI organized the Internet Crime Complaint Center (IC3), whose website is the leading national cyber crime incident reporting portal.<\/p>\n<p>http:\/\/www.net-security.org\/secworld.php?id=8537<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-905","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/905","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=905"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/905\/revisions"}],"predecessor-version":[{"id":3392,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/905\/revisions\/3392"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=905"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=905"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}