The Federal Bureau of Investigations recognizes that much of the important infrastructure, information and assets that the United States holds is no longer in the form of tangible objects, but rather is present in the information systems of companies, governments and individuals. The criminal and terrorist organizations of the world have also come to this realization and are devoting a growing share of their resources to acquiring or damaging these digital assets. In order to combat the attacks, intrusions and thefts that are occurring on the World Wide Web or within proprietary IT networks, the FBI has created the Cyber Division.<!- mfunc feat_school ->
Scope and Purpose of the FBI’s Cyber Division
The top priority of the Cyber Division is to safeguard the classified materials stored in U.S. facilities on private or public networks. With information technology rapidly evolving, these digital storehouses of information require constant monitoring and updated security systems. The threat to these systems comes from many possible parties including foreign governments, terrorist organizations, self-interested government officials and activist groups. In order to successfully fend off cyber intrusions and investigate the culprits, the Cyber Division is constantly developing new digital investigative techniques and tools.<!- mfunc search_btn -> <!- /mfunc search_btn ->
FBI Cyber Division jobs also involve handling the majority of forensic examinations related to computers, technological devices and data storage media. In order to extract information from devices that have been partially destroyed, the Cyber Division has set up Regional Computer Forensics Laboratories, where evidence can be examined and data retrieved. This information is often vital to the success of counterterrorism operations and criminal investigations.
FBI Cyber Division jobs also involve working to disrupt the actions of data thieves and saboteurs who attack the networks of businesses. The losses resulting from corporate espionage and data corruption reach into the billions each year and present a serious threat to the U.S. economy. The Cyber Division utilizes digital and traditional law enforcement methods to track down and apprehend the perpetrators of corporate espionage in the U.S. and in other nations.
Among the most damaging activities that can occur on the internet is the transmission of viruses, botnets and other malicious code. Malware can wreak havoc on the computers and networks of millions of individuals and enterprises, causing billions of dollars in losses. The Cyber Division cooperates closely with leading software and computer security manufacturers to publish updates that protect against malicious code, while also providing warnings to the public about how to stay safe.
FBI jobs in the Cyber Division are dedicated to uncovering fraud related to the internet including fake credit card and banking sites, fraudulent internet offers, and identity theft. Not only are many of these crimes a growing area of interest for individual criminals, but it is also being adopted by international criminal organizations that may be supporting terrorist operations abroad.
Computer Forensic Examiner
Computer forensic examiners are the technical experts that the FBI utilizes to recover information that has been stored on computers, cellphones and storage media used by criminals and terrorists. These professionals utilize the latest data recovery tools to uncover information related to financial crimes, child exploitation, digital intrusions, data thefts and other criminal activity. With so much of the world’s financial and personal activities now taking place online or over telecommunications networks, the computer forensic examiner is a vital member of the FBI’s investigative services. Read more…
Cyber Action Team
As part of the Cyber Division’s ongoing mission to keep safe the country’s information systems, it must often deploy tactical and intelligence personnel to remote locations around the country and world. The FBI has created Cyber Action Teams which are modeled on its Counterterrorism Fly Teams. The CATs are able to mobilize and deploy to any location around the world in a matter of hours, so they can investigate attempts to compromise government security or the origins of malicious code. These units include highly qualified tactical personnel who are trained to monitor, pursue and apprehend criminals and terrorist through even the most challenging and extreme conditions. CATs also include intelligence analysts who are able to investigate the computers of perpetrators to retrieve critical information and relay them to the appropriate strategic or field personnel. Read more…
Computer and information systems technology is evolving at a breakneck pace and the Cyber Division is committed to monitoring all of the advancements so that they do not present a threat to national security. In its ongoing effort to understand new breakthroughs and anticipate potential ones, the Cyber Division employs computer scientists who have comprehensive expertise in various aspects of computer science. These computer scientists may have knowledge of forensics, security, internetworking, programming, network architecture, or systems administration.