(Page 2 of 2)
Catching Threat Actors
Muller is convinced that there are only two types of companies -- those that have been hacked and those that will be. "And even they are converging into one category: companies that have been hacked and will be hacked again," he said.
According to Muller, attribution is absolutely critical to deter future attacks. "We cannot just minimize vulnerabilities and deal with the consequences," Muller explained. "Collectively, we can improve cyber security and lower costs -- with systems designed to catch threat actors rather than to [merely] withstand them."
Corporations hit by security breaches gain access to vast resources when they work closely with the FBI to identify the perpetrators as well as the security holes exploited by hackers. For example, the bureau has 63 offices that cover the globe as well as agents embedded in the police departments of specific countries that are hacking hot spots, such as Romania, Estonia, Ukraine and the Netherlands.
Within the borders of the United States, the FBI is working closely with other law enforcement and governmental agencies at the local, state and national levels, including the Department of Homeland Security, the National Security Agency, the CIA and the Secret Service. Additionally, the FBI has formed an information-sharing partnership with the private sector called InfraGard.
"We must use our connectivity to stop those who seek to do us harm," Muller said.
Posted: 2012-03-03 @ 9:13pm PT
Funny that the feds throw rocks into hornets' nests by threatening those on the fringe of the free flow of information with punitive action, but now turn to those very same people to help them get a handle on the situation. It's hilarious really...