Advanced search Help
Searching for terms: ALL (Cyber AND Crime) in: title or summary
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Department of Homeland Security Fusion Center Engagement and Information Sharing Strategy for 2022-2026
From the Document: "This document outlines a multi-year commitment to supporting our law enforcement and homeland security partners in states and cities nationwide, and describes how DHS enables information sharing vital to fusion centers' missions and our national security. Threats may take the form of international terrorism, transnational organized crime, domestic violent extremism, cyber intrusions, and many other dangers to Americans. All such threats to our homeland will be answered with the most informed responses by DHS and our partners. Under Secretary Mayorkas's leadership, the Department is committed to supporting our partners across every level of government, including by sharing timely and actionable information and intelligence. In line with this commitment, this strategy will help ensure the Homeland Security Enterprise is equipped with the tools to keep our communities safe and resilient."
United States. Department of Homeland Security
2022-06-14?
-
U.S. Department of Justice Information Technology Strategic Plan for Fiscal Years 2022-2024
From the Message from the CIO: "I am pleased to present the U.S. Department of Justice (DOJ or Department) Strategic Plan for Information Technology (IT) for Fiscal Years (FY) 2022-2024. The strategic plan reflects our vision over the next three years for DOJ to be at the forefront of delivering advanced systems and be a vehicle to address DOJ's critical mission challenges. Our vision includes the Office of the Chief Information Officer (OCIO) becoming a trusted provider in delivering exceptional services to meet the DOJ mission. We will continue to meet our customers' needs by providing reliable and efficient core offerings, while exceeding their expectations by adding new IT capabilities to execute the mission and improve operations in innovative ways. Technology and information management are key enablers of DOJ's mission, from law enforcement, to the fair administration of justice, to public safety against foreign and domestic threats, to providing federal leadership on crime prevention and control. The boundaries of technology continue to be pushed, and it is imperative that our services enable the Department to effectively navigate the dynamic pace of technological change and data proliferation. Cyber-attacks are constantly challenging DOJ and other agencies. Therefore, we will continue to diligently protect the agency's critical data through increased cyber resilience and risk reduction while optimizing data utilization to create consumable and intelligent products."
United States. Department of Justice. Office of the Chief Information Officer
2022-06-09?
-
EMR-ISAC: InfoGram, Volume 22 Issue 12, March 24, 2022
The Emergency Management and Response Information Sharing and Analysis Center's (EMR-ISAC) InfoGram is a weekly publication of information concerning the protection of critical infrastructures relevant to members of the Emergency Services Sector. This issue includes the following articles: "First intranasal treatment for cyanide poisoning begins Phase 1 clinical study"; "America's evolving homeland security threats: ODNI's Annual Threat Assessment and CHDS webinar series"; "COPS Office releases guidance on community engagement strategies for law enforcement drone programs"; "Webinar: How to implement effective employee vigilance strategies and de-escalation techniques"; "Readout of CISA call with critical infrastructure partners on potential Russian cyberattacks against the United States"; "Strengthening cybersecurity of SATCOM network providers and customers"; "FBI releases the Internet Crime Complaint Center 2021 Internet Crime Report"; "State and local governments could gain access to federal network monitoring service."
Emergency Management and Response-Information Sharing and Analysis Center (U.S.)
2022-03-24
-
2021 Internet Crime Report
The FBI's Internet Crime Complaint Center (IC3) produces a yearly report highlighting their work to combat internet crime. This report covers internet crime discovered in 2021. From the Introduction: "In 2021, America experienced an unprecedented increase in cyber attacks and malicious cyber activity. These cyber attacks compromised businesses in an extensive array of business sectors as well as the American public. As the cyber threat evolves and becomes increasingly intertwined with traditional foreign intelligence threats and emerging technologies, the FBI continues to leverage our unique authorities and partnerships to impose risks and consequences on our nation's cyber adversaries. The FBI's Internet Crime Complaint Center (IC3) provides the American public with a direct outlet to report cyber crimes to the FBI. We analyze and investigate the reporting to track the trends and threats from cyber criminals and then share this data with our intelligence and law enforcement partners. [...] In 2021, IC3 continued to receive a record number of complaints from the American public: 847,376 reported complaints, which was a 7% increase from 2020, with potential losses exceeding $6.9 billion. Among the 2021 complaints received, ransomware, business e-mail compromise (BEC) schemes, and the criminal use of cryptocurrency are among the top incidents reported. In 2021, BEC schemes resulted in 19,954 complaints with an adjusted loss of nearly $2.4 billion." This document includes charts, tables, and graphs to illustrate the text.
Internet Crime Complaint Center (U.S.); United States. Federal Bureau of Investigation
2022-03-22?
-
EMR-ISAC: InfoGram, Volume 22 Issue 2, January 13, 2022
The Emergency Management and Response Information Sharing and Analysis Center's (EMR-ISAC) InfoGram is a weekly publication of information concerning the protection of critical infrastructures relevant to members of the Emergency Services Sector. This issue includes the following articles: "January is Firefighter Cancer Awareness Month"; "National Human Trafficking Prevention Month: Resources for the emergency services"; "FEMA releases 2021 National Preparedness Report"; "New on-demand ransomware course for law enforcement from the National White Collar Crime Center"; "CISA [Cybersecurity and Infrastructure Security Agency], FBI, and NSA [National Security Agency] release cybersecurity advisory on Russian cyber threats to US critical infrastructure"; "JFrog researchers find JNDI [Java Naming and Directory Interface] vulnerability in H2 [Hypersonic 2] database consoles similar to Log4Shell"; "Millions of routers exposed to RCE [remote code execution] by USB [universal serial bus] kernel bug"; "Ransomware: Hackers are using Log4j flaw as part of their attacks, warns Microsoft"; "New RedLine malware version spread as fake Omicron stat counter"; and "Ransomware attack prompted county jail to put inmates in lockdown."
Emergency Management and Response-Information Sharing and Analysis Center (U.S.)
2022-01-13
-
International Law Studies, 2022 [Volume 99, Issue 1]
This 2022 issue of "International Law Studies" features the following: "Leading Expert on the Law of the Sea: Remembering Rear Admiral Bruce A. Harlow, JAGC, U.S. Navy (Ret.)"; "Active Resistance by Merchant Vessel Crews During International Armed Conflict is Not 'Direct Participation in Hostilities'" by Robert McLaughlin; "Command Responsibility, Australian War Crimes in Afghanistan, and the Brereton Report" by Douglas Guilfoyle, Joanna Kyriakakis, and Melanie O'Brien; "The Prohibition on Intervention Under International Law and Cyber Operations" by Ori Pomson; "
Targeting a Satellite: Contrasting Considerations between the Jus ad Bellum and the Jus in Bello" by Hitoshi Nasu; "The UN Security Council and the Saga of 'Global Legislation'" by Gadi Ezra; "Cyber Peacekeeping Operations and the Regulation of the Use of Lethal Force" by Nicholas Tsagourias and Giacomo Biggio; "Drawing the Cyber Baseline: The Applicability of Existing International Law to the Governance of Information and Communication Technologies" by Dapo Akande, Antonio Coco, and Talita de Souza Dias; "China's IUU Fishing Fleet: Pariah of the World's Oceans" by Raul (Pete) Pedrozo; "Does the Revised U.S. South China Sea Policy Go Far Enough?" by Raul (Pete) Pedrozo; "Transit Rights Through the Panama Canal" by the Office of the Staff Judge Advocate; "Venezuela's Excessive Maritime Claims" by the Office of the Staff Judge Advocate; and "Maritime Counter-Narcotics Agreements" by the Office of the Staff Judge Advocate.
Naval War College (U.S.). International Law Studies
2022
-
Cyber Defense Review, Spring 2022 (Volume 7, Number 2)
This Spring 2022 Edition of the Cyber Defense Review contains the following articles: "So…Anything Interesting Going On?" by Jeffrey M. Erickson; "Cyber Crime and Geostrategic Clash Over the Internet: Deputizing the Private Sector to Assist" by Dennis Blair and Bud Roth; "Conceptualizing Cyberspace Security Diplomacy" by Christopher Ford; "AI [Artificial Intelligence], Super Intelligence, and the Fear of Machines in Control" by Brian Mullins; "Information as Power: Evolving US Military Information Operations and Their Implications for Global Internet Governance" by Milton Mueller and Karl Grindal; "Timing Influence Efforts with Information Processing" by Joshua McCarty and Kaylee Laakso; "'Explicit' Bargains are Essential to Forming Desired Norms in Cyberspace" by Wonny Kim; "America's Cyber Auxiliary: Building Capacity and Future Operators" by Jeffrey Fair; "The Global Engagement's Center's Response to the Coronavirus Infodemic" by Neill Perry; and the Book Review "Bitskrieg: The New Challenge of Cyberwarfare By John Arquilla" by Mathieu Couillard.
Army Cyber Institute, West Point
2022
-
Anti-Money Laundering and Countering the Financing of Terrorism National Priorities
From the Document: "The Financial Crimes Enforcement Network (FinCEN), after consulting with the U.S. Department of the Treasury's (Treasury's) Offices of Terrorist Financing and Financial Crimes, Foreign Assets Control (OFAC), and Intelligence and Analysis, as well as the Attorney General, Federal functional regulators, relevant state financial regulators, and relevant law enforcement and national security agencies, is issuing these first governmentwide priorities for anti-money laundering and countering the financing of terrorism (AML/ CFT) policy (the 'Priorities'). [...] As explained in more detail below, the Priorities are, in no particular order: (1) corruption; (2) cybercrime, including relevant cybersecurity and virtual currency considerations; (3) foreign and domestic terrorist financing; (4) fraud; (5) transnational criminal organization activity; (6) drug trafficking organization activity; (7) human trafficking and human smuggling; and (8) proliferation financing. The establishment of these Priorities is intended to assist all covered institutions6 in their efforts to meet their obligations under laws and regulations designed to combat money laundering and counter terrorist financing."
Financial Crimes Enforcement Network (U.S.)
2021-06-30
-
2020 Internet Crime Report
The FBI's Internet Crime Complaint Center (IC3) produces a yearly report highlighting their work to combat internet crime. This report covers internet crime discovered in 2020. From the Introduction: "In 2020, while the American public was focused on protecting our families from a global pandemic and helping others in need, cyber criminals took advantage of an opportunity to profit from our dependence on technology to go on an Internet crime spree. These criminals used phishing, spoofing, extortion, and various types of Internet-enabled fraud to target the most vulnerable in our society - medical workers searching for personal protective equipment, families looking for information about stimulus checks to help pay bills, and many others. Crimes of this type are just a small part of what the FBI combats through our criminal and cyber investigative work. Key to our cyber mission is the Internet Crime Complaint Center (IC3), which provides the public with a trustworthy source for information on cyber criminal activity, and a way for the public to report directly to us when they suspect they are a victim of cyber crime. IC3 received a record number of complaints from the American public in 2020: 791,790, with reported losses exceeding $4.1 billion. This represents a 69% increase in total complaints from 2019." This document includes charts, tables, and graphs to illustrate the text.
Internet Crime Complaint Center (U.S.); United States. Federal Bureau of Investigation
2021-03?
-
Atrocities in Xinjiang: Where Do We Go from Here? Hearing Before the Subcommittee on Western Hemisphere, Transnational Crime, Civilian Security, Democracy, Human Rights, and Global Women's Issues; and Subcommittee on East Asia, the Pacific and International Cybersecurity Policy of the Committee on Foreign Relations, United States Senate, One Hundred Seventeenth Congress, First Session, June 10, 2021
This is the June 10, 2021 hearing on "Atrocities in Xinjiang: Where Do We Go from Here?," held before the U.S. Senate Subcommittee on Western Hemisphere, Transnational Crime, Civilian Security, Democracy, Human Rights, and Global Women's Issues; and Subcommittee on East Asia, the Pacific and International Cybersecurity Policy of the Committee on Foreign Relations. From the opening statement of Tim Kaine: "This matter of the treatment of Uyghurs in China has to be highlighted and exclamation-pointed into the world. China's human rights abuses are well known and widespread, not just in Xinjiang with the Uyghurs, but in particular, across the country, China limits the political expression, religious freedom, reproductive choice, and citizen's ability to choose where they live and work. China has repressed Tibet for decades, and has launched a despicable and comprehensive crack down on political dissent in Hong Kong. All of these issues deserve our condemnation and urgent action by the United States and by the world. Nowhere is the assault on individual freedom and basic human rights more comprehensive and more atrocious than against the Uyghur Muslims in Xinjiang Province."
United States. Government Publishing Office
2021
-
Schemes and Subversion: How Bad Actors and Foreign Governments Undermine and Evade Sanctions Regimes, Virtual Hearing Before the Subcommittee on National Security, International Development and Monetary Policy of the Committee on Financial Services, U.S. House of Representatives, One Hundred Seventeenth Congress, First Session, June 16, 2021
This is the June 16, 2021 hearing on "Schemes and Subversion: How Bad Actors and Foreign Governments Undermine and Evade Sanctions Regimes," held before the U.S. House Subcommittee on National Security, International Development and Monetary Policy of the Committee on Financial Services. From the Opening Statement of Jim A. Himes: "Our sanctions programs can only be as impactful as they are effective. When designated entities evade our sanctions, we lose an important tool from our diplomatic toolbox increasing the likelihood that military action would be necessary to maintain international order. Our hearing today will focus on those methods of sanctions evasion ranging from physically changing the name painted on the back of a ship, the stern of a ship, to the use of shell companies to cyber-enable crime like the ransomware attacks that have been so prevalent in the news recently." Statements, letters, and materials submitted for the record include those of the following: Ivan A. Garces, Lakshmi Kumar, Eric B. Lorber, Jesse Spiro, and Jeffrey W. Taliaferro.
United States. Government Publishing Office
2021
-
Going Viral: Heightened Cyber and Corporate Crime Risks in the COVID-19 Pandemic
From the Document: "The COVID-19 [coronavirus disease 2019] outbreak has posed an unprecedented challenge - not just for individuals and governments, but also corporates seeking to navigate unchartered waters in the widespread disruption caused by the global pandemic. Operational challenges aside, the unique circumstances of the pandemic have also presented opportunities for cyber and corporate criminal activity. In this article, we explain how the ongoing pandemic presents corporates with further risks from four key corporate crime threats, namely, (1) cyber scams, (2) cyber attacks, (3) corrupt activity and (4) fraudulent conduct. As corporates grapple with economic survival in this pandemic they should also actively inoculate themselves against these risks by continuing to educate their employees about fraudulent schemes and corruption risks, ensuring 'compliance as usual' and undertaking fact-finding enquiries promptly."
Norton Rose Fulbright
2020-07
-
Impact of COVID-19 on Cyber Crime and State-Sponsored Cyber Activities
From the Background: "In March 2020, governments worldwide imposed curfews and rules on reducing physical social contact in order to stem the spread of the corona virus. Wherever possible, employers allowed their employees to work from home, where, more and more, private IT [information technology] devices are being used for official business. This larger IT surface is often less well protected than IT devices used at work. New programs, e.g. for conference calls and video conferences, are being introduced under time pressure, in most cases without adequate security checks. Also, there are more and more reports about cyber attacks on health-care organizations on whose proper functioning governments and societies are more dependent now than ever. What is the impact of the COVID-19 [coronavirus disease 2019] pandemic on cyber security, cyber crime and state-sponsored cyber activities? How can governments reduce cyber threats and address them?"
Konrad Adenauer Foundation
Wiggen, Johannes
2020-06
-
Test Results for Disk Imaging Tool: Cinolink Dual HDD Dock
From the Introduction: "The Computer Forensics Tool Testing (CFTT) program is a joint project of the Department of Homeland Security (DHS) Science and Technology Directorate (S&T), the National Institute of Justice (NIJ), and the National Institute of Standards and Technology (NIST) Special Programs Office and Information Technology Laboratory (ITL). CFTT is supported by other organizations, including the Federal Bureau of Investigation; the U.S. Department of Defense Cyber Crime Center; U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program; and the U.S. Department of Homeland Security's Bureau of Immigration and Customs Enforcement, U.S. Customs and Border Protection, and U.S. Secret Service. The objective of the CFTT program is to provide measurable assurance to practitioners, researchers, and other applicable users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and test methods for computer forensics tools and subsequent testing of specific tools against those specifications. [...] This document reports the results from testing the disk imaging function of the Cinolink Dual HDD Dock using the CFTT Federated Testing Test Suite for Disk Imaging, Version 5."
United States. Department of Homeland Security. Science and Technology Directorate
2020-06
-
Test Results for Disk Imaging Tool: Roadkil's Disk Image Version 1.6
From the Introduction: "The Computer Forensics Tool Testing (CFTT) program is a joint project of the Department of Homeland Security Science and Technology Directorate (DHS S&T), the National Institute of Justice, and the National Institute of Standards and Technology (NIST) Special Programs Office and Information Technology Laboratory. CFTT is supported by other organizations, including the Federal Bureau of Investigation, the U.S. Department of Defense Cyber Crime Center, U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program, and the DHS Bureau of Immigration and Customs Enforcement, U.S. Customs and Border Protection and U.S. Secret Service. The objective of the CFTT program is to provide measurable assurance to practitioners, researchers, and other applicable users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and test methods for computer forensics tools and subsequent testing of specific tools against those specifications. [...] This document reports the results from testing the disk imaging function of Roadkil's Disk Image Version 1.6 using the CFTT Federated Testing Test Suite for Disk Imaging, Version 5."
United States. Department of Homeland Security. Science and Technology Directorate
2020-06
-
Test Results for String Search Tool: EnCase Version 8.09.00.192
From the Introduction: "The Computer Forensics Tool Testing (CFTT) program is a joint project of the Department of Homeland Security, Science and Technology Directorate (DHS S&T), the National Institute of Justice (NIJ), and the National Institute of Standards and Technology (NIST) Special Programs Office and Information Technology Laboratory (ITL). CFTT is supported by other organizations, including the Federal Bureau of Investigation, the U.S. Department of Defense Cyber Crime Center, U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program, and the U.S. Department of Homeland Security's Bureau of Immigration and Customs Enforcement, U.S. Customs and Border Protection and U.S. Secret Service. The objective of the CFTT program is to provide measurable assurance to practitioners, researchers, and other applicable users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and test methods for computer forensics tools and subsequent testing of specific tools against those specifications."
National Institute of Standards and Technology (U.S.). Office of Law Enforcement Standards; United States. Department of Homeland Security. Science and Technology Directorate
2020-06
-
Financial Crime in Times of Covid-19 - AML and Cyber Resilience Measures
From the Highlights: "'[1] Criminals are exploiting vulnerabilities opened up by the Covid-19 [coronavirus disease 2019] lockdown, increasing the risks of cyber attacks, money laundering (ML) and terrorist financing (TF). [2] Authorities worldwide have responded by drawing financial institutions' attention to these threats and by providing guidance on ways to improve cyber security and mitigate ML and TF risks. [3] Financial authorities are warning financial institutions to be particularly watchful in relation to their IT [information technology] networks and non-public data; third-party risk; and cyber security incident response plans; and to focus additional effort on staff training and awareness. [4] Financial authorities also emphasise the need for financial institutions to be vigilant of new ML and TF risks and to continue meeting anti-money laundering (AML) and combating the financing of terrorism (CFT) requirements, while using the flexibility built into the AML/CFT risk-based framework, digital customer on-boarding and simplified due diligence processes. [5] In both areas, the official guidance underscores the trade-offs between expecting financial institutions to enhance or adjust their cyber resilience and AML frameworks and, on the other hand, avoiding imposing an excessive burden that could hinder financial institutions in delivering key financial services.'"
Bank for International Settlements
Crisanto, Juan Carlos; Prenio, Jermy
2020-05
-
Test Results for Write-Protected Drive: Apricorn Padlock DT Firmware Version 0510
From the Introduction: "The Computer Forensics Tool Testing (CFTT) program is a joint project of the Department of Homeland Security Science and Technology Directorate (DHS S&T), the National Institute of Justice (NIJ), and the National Institute of Standards and Technology (NIST) Special Programs Office and Information Technology Laboratory (ITL). CFTT is supported by other organizations, including the Federal Bureau of Investigation, the U.S. Department of Defense Cyber Crime Center, U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program, and the U.S. Department of Homeland Security's Bureau of Immigration and Customs Enforcement, U.S. Customs and Border Protection and U.S. Secret Service. The objective of the CFTT program is to provide measurable assurance to practitioners, researchers, and other applicable users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and test methods for computer forensics tools and subsequent testing of specific tools against those specifications. [...] This document reports the results from testing the read-only function of the Apricorn Padlock DT device firmware version 0510 using the CFTT Federated Testing Test Suite for Hardware Write Blocking, Version 3.1."
United States. Department of Homeland Security. Science and Technology Directorate
2020-05
-
Test Results for Write-Protected Drive: Apricorn L3 Fortress Firmware Version 0510 [May 2020]
From the Introduction: "The Computer Forensics Tool Testing (CFTT) program is a joint project of the Department of Homeland Security Science and Technology Directorate (DHS S&T), the National Institute of Justice (NIJ), and the National Institute of Standards and Technology (NIST) Special Programs Office and Information Technology Laboratory (ITL). CFTT is supported by other organizations, including the Federal Bureau of Investigation, the U.S. Department of Defense Cyber Crime Center, U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program, the DHS Bureau of Immigration and Customs Enforcement, U.S. Customs and Border Protection and U.S. Secret Service. The objective of the CFTT program is to provide measurable assurance to practitioners, researchers, and other applicable users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and test methods for computer forensics tools and subsequent testing of specific tools against those specifications."
United States. Department of Homeland Security. Science and Technology Directorate
2020-05
-
Keep an Eye on North Korean Cyber-Crime as the COVID-19 Spreads
From the Document: "The Covid-19 [coronavirus disease 2019] outbreak continues to cause tumult in the global economy, with countries like South Korea and Italy reporting a rapid increase in diagnoses and many companies requesting that employees work from home to keep the virus from spreading. In North Korea's case, it has had its Chinese borders closed for over a month, long before the rest of the world began to react to the virus. Even if it were, as its state media claims, coronavirus-free, how long could their economy sustain total global isolation? By sealing their border with their largest economic partner, North Korea has effectively placed itself at the mercy of UN sanctions. [...] To ensure that their country can continue to function while they weather the global crisis, North Korea may very likely double down on cybercrime. While smuggling and other forms of illicit trading require the physical moving of goods and/or services, cybercrime can be committed from anywhere, even a sealed North Korea."
Pacific Forum, CSIS
Wiesel, Todd
2020-03-17
-
Test Results for Write-Protected Drive: Apricorn ASK3 Secure Key 3.0 Firmware Version 0401
From the Introduction: "The Computer Forensics Tool Testing (CFTT) program is a joint project of the Department of Homeland Security Science and Technology Directorate (DHS S&T), the National Institute of Justice, and the National Institute of Standards and Technology (NIST) Special Programs Office and Information Technology Laboratory (ITL). CFTT is supported by other organizations, including the Federal Bureau of Investigation; the U.S. Department of Defense Cyber Crime Center; U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program; and the DHS Bureau of Immigration and Customs Enforcement, U.S. Customs and Border Protection and U.S. Secret Service. The objective of the CFTT program is to provide measurable assurance to practitioners, researchers, and other applicable users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and test methods for computer forensics tools and subsequent testing of specific tools against those specifications."
United States. Department of Homeland Security. Science and Technology Directorate
2020-02
-
Test Results for Write-Protected Drive: Apricorn ASK3z Secure Key Firmware Version 0401
From the Introduction: "The Computer Forensics Tool Testing (CFTT) program is a joint project of the Department of Homeland Security Science and Technology Directorate (DHS S&T), the National Institute of Justice (NIJ), and the National Institute of Standards and Technology (NIST) Special Programs Office and Information Technology Laboratory (ITL). CFTT is supported by other organizations, including the Federal Bureau of Investigation, the U.S. Department of Defense Cyber Crime Center, U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program, and the U.S. Department of Homeland Security's Bureau of Immigration and Customs Enforcement, U.S. Customs and Border Protection and U.S. Secret Service. The objective of the CFTT program is to provide measurable assurance to practitioners, researchers, and other applicable users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and test methods for computer forensics tools and subsequent testing of specific tools against those specifications."
United States. Department of Homeland Security. Science and Technology Directorate
2019-11-20
-
Test Results for Disk Imaging Tool: DFAS Pro Version 1.0.1.6 Build 052
From the Introduction: "The Computer Forensics Tool Testing (CFTT) program is a joint project of the Department of Homeland Security (DHS), the National Institute of Justice (NIJ), and the National Institute of Standards and Technology (NIST) Special Programs Office and Information Technology Laboratory (ITL). CFTT is supported by other organizations, including the Federal Bureau of Investigation, the U.S. Department of Defense Cyber Crime Center, U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program, and the U.S. Department of Homeland Security's Bureau of Immigration and Customs Enforcement, U.S. Customs and Border Protection and U.S. Secret Service. The objective of the CFTT program is to provide measurable assurance to practitioners, researchers, and other applicable users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and test methods for computer forensics tools and subsequent testing of specific tools against those specifications. [...] This document reports the results from testing the disk imaging function of DFAS Pro Version 1.0.1.6 Build 052 using the CFTT Federated Testing Test Suite for Disk Imaging, Version 3.1."
United States. Department of Homeland Security. Science and Technology Directorate
2019-04-21
-
Test Results for Disk Imaging Tool: DFAS Pro Version 1.0.1.6 Build 067
From the Introduction: "The Computer Forensics Tool Testing (CFTT) program is a joint project of the Department of Homeland Security (DHS), the National Institute of Justice (NIJ), and the National Institute of Standards and Technology (NIST) Special Programs Office and Information Technology Laboratory (ITL). CFTT is supported by other organizations, including the Federal Bureau of Investigation, the U.S. Department of Defense Cyber Crime Center, U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program, and the U.S. Department of Homeland Security's Bureau of Immigration and Customs Enforcement, U.S. Customs and Border Protection and U.S. Secret Service. The objective of the CFTT program is to provide measurable assurance to practitioners, researchers, and other applicable users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and test methods for computer forensics tools and subsequent testing of specific tools against those specifications. [...] This document reports the results from testing the disk imaging function of DFAS Pro Version 1.0.1.6 Build 067 using the CFTT Federated Testing Test Suite for Disk Imaging, Version 3.1."
United States. Department of Homeland Security. Science and Technology Directorate
2019-04-21
-
Forensic Toolkit (FTK) 7.0.0.163, Registry Viewer 2.0.0.7: Test Results for Windows Registry Forensic Tool
From the Introduction: "The Computer Forensics Tool Testing (CFTT) program is a joint project of the Department of Homeland Security (DHS), and the National Institute of Standards and Technology Special Program Office (SPO) and Information Technology Laboratory (ITL). CFTT is supported by other organizations, including the Federal Bureau of Investigation, the U.S. Department of Defense Cyber Crime Center, U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program, the National Institute of Justice (NIJ), and the U.S. Department of Homeland Security's Bureau of Immigration and Customs Enforcement, U.S. Customs and Border Protection and U.S. Secret Service. The objective of the CFTT program is to provide measurable assurance to practitioners, researchers, and other applicable users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and test methods for computer forensic tools and subsequent testing of specific tools against those specifications. [...] This document reports the results from testing FTK [Forensic Toolkit] 7.0.0.163 against a registry dataset that consists of various Windows NT registry hive files."
United States. Department of Homeland Security. Science and Technology Directorate
2019-04-07
-
EnCase Forensic 8.07.00.93 (x64): Test Results for Windows Registry Forensic Tool
From the Introduction: "The Computer Forensics Tool Testing (CFTT) program is a joint project of the Department of Homeland Security (DHS), and the National Institute of Standards and Technology Special Program Office (SPO) and Information Technology Laboratory (ITL). CFTT is supported by other organizations, including the Federal Bureau of Investigation, the U.S. Department of Defense Cyber Crime Center, U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program, the National Institute of Justice (NIJ), and the U.S. Department of Homeland Security's Bureau of Immigration and Customs Enforcement, U.S. Customs and Border Protection and U.S. Secret Service. The objective of the CFTT program is to provide measurable assurance to practitioners, researchers, and other applicable users that the tools used in computer forensics investigations provide accurate results. Accomplishing this requires the development of specifications and test methods for computer forensic tools and subsequent testing of specific tools against those specifications. [...] This document reports the results from testing EnCase Forensic 8.07.00.93 against a registry dataset that consists of various Windows NT registry hive files."
United States. Department of Homeland Security. Science and Technology Directorate
2019-04-07
-
Private Sector and Government Challenges and Opportunities to Promote the Cybersecurity and Resiliency of Our Nation's Critical Energy Infrastructure, Hearing Before the Committee on Energy and Natural Resources, United States Senate, One Hundred Fifteenth Congress, Second Session, March 1, 2018
This is the March 1, 2018 hearing on "Private Sector and Government Challenges and Opportunities to Promote the Cybersecurity and Resiliency of Our Nation's Critical Energy Infrastructure" held before the U.S. Senate Committee on Energy and Natural Resources. From the opening statement of Lisa Murkowski:"Cyberattacks are a well-documented and continuing threat. Every day we seem to hear of yet another incident. Increasingly, it appears that the bad actors are nation-states and sophisticated entities, such as organized crime or terror groups. These attacks are across-the-board and not limited, of course, to energy infrastructure. [...] What should the Federal Government do, or refrain from doing, to meet this dynamic and evolving threat? And how can the government help improve the cyber resiliency of critical energy infrastructure if a threat becomes a reality? [...] Protecting our nation's energy infrastructure, we all agree, is critical to maintaining so much of the American way of life. We must determine what the next appropriate steps will be to further identify and prevent cyber intrusions and increase resiliency in the event of an attack. Those solutions may not require more regulation, but rather more common sense and cooperation." Statements, letters, and materials submitted for the record include those of the following: Bruce J. Walker, Jim Matheson, Barbara Endicott-Popovsky, William H. Sanders, and Robert M. Lee.
United States. Government Publishing Office
2019
-
Cyber Crime: An Existential Threat to Small Business, Hearing Before the Committee on Small Business and Entrepreneurship, United States Senate, One Hundred Sixteenth Congress, First Session, March 13, 2019
This is the March 13, 2019 hearing on "Cyber Crime: An Existential Threat to Small Business" held before the U.S. Senate Committee on Small Business and Entrepreneurship. From the opening statement of Marco Rubio: "This hearing will discuss one of the most challenging issues facing small businesses: cybersecurity. It's hard enough for small businesses to get up and running with changing markets, regulatory hurdles, and the cost of starting a business, but cyberattacks can bring a quick end to all of one's hard work. Foreign hackers and other cyber criminals are increasingly targeting small businesses to steal their intellectual property, trade secrets, and valuable information, and an equally nefarious practice is to hold hostage small businesses' operational and customer data in order to get a ransom payment. [...]The risk of cybercrime is greater to small businesses, which lack, many cases, the dedicated IT [Information Technology] staff, the sophisticated equipment that larger companies have in order to try and stay safe. [...] Consequences of cybercrime are also greater for small businesses, which operate on a smaller profit margin and are not always able to bounce back after a costly attack." Statements, letters, and materials submitted for the record include those of the following: Maria Roat, Charles Romine, Stacey Smith, Elizabeth Hyman, and Karen A. Harper.
United States. Government Publishing Office
2019
-
2018 Internet Crime Report
"The FBI is the lead federal agency for investigating cyber-attacks by criminals, overseas adversaries, and terrorists, and the FBI's IC3 [Internet Complaint Center] provides the public with a trustworthy and convenient reporting mechanism to submit information concerning suspected Internetfacilitated criminal activity. The 2018 Internet Crime Report emphasizes the IC3's efforts in monitoring trending scams such as Business Email Compromise (BEC), Extortion, Tech Support Fraud, and Payroll Diversion. In 2018, IC3 received a total of 351,936 complaints with losses exceeding $2.7 Billion"
United States. Federal Bureau of Investigation; Internet Crime Complaint Center (U.S.)
2019?
-
DOD Cyber Crime Center (DC3) Vulnerability Disclosure Program (VDP) Annual Report 2019, Volume 1
From the Document: "While 2019 has arguably been our most successful year to date it is equally important to highlight several of our future goals that we hope will bring great value to the program and the defense of our nation's digital assets. The DoD VDP [Vulnerability Disclosure Program] has developed three distinct lines of effort (LOEs) to strategically drive towards. This allows us to narrow our focus and better align our resources while continuing to provide the same world-class service to the Warfighter."
United States. Department of Defense
2019