Feeds

FBI boss warns online threats will outpace terrorism

Osama bin Online

The Power of One Infographic

RSA 2012 The head of the FBI warns that the threat to the US from online attacks will shortly become greater than that posed by terrorists.

"In the not too distant future we anticipate that the cyber threat will pose the number one threat to our country," the FBI's director Robert Mueller told delegates at the RSA 2012 conference in San Francisco. "We need to take lessons learned from terrorism and apply them to cybercrime."

He quoted the Roman Stoic philosopher Seneca the Younger, who said that the more connected a society becomes – in Seneca's day it was the spread of roads – then the more likely it is that an individual would become a slave to that connectivity.

The same is true of modern society, Mueller said. If the electronic systems on which society relies are removed, the result would be chaos and anarchy, he suggested. Interestingly, this goes against the advice of security guru Bruce Schneier, who pointed out that the purpose of terrorism is to terrorize, and if his phone doesn't work he'd be annoyed, but hardly terrified.

As a society we can't turn back the clock, Mueller said, nor should we try to. Instead, we need to share information and tactics to beat any enemies in the future. To that end, the FBI will make changes to its own force, and push for more changes to business practices from government.

All FBI special agents are now being trained in electronic methods, he said, and those who specialize in the area will get the best possible training. The agency is setting up virtual meeting rooms in which investigators can compare notes and follow up on cases.

In addition, Mueller wants a national breach law, so that when a serious hack takes place, the company hit has a responsibility to let law enforcement know. Currently, 47 states have breach laws of some sort, but the FBI wants this to be standardized across the country. Companies need to share their data on attacks and devise strategy together with law enforcement. ®

The Power of One Brief: Top reasons to choose HP BladeSystem

More from The Register

next story
Sit back down, Julian Assange™, you're not going anywhere just yet
Swedish court refuses to withdraw arrest warrant
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
British cops cuff 660 suspected paedophiles
Arrests people allegedly accessing child abuse images online
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.