Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security United States News Your Rights Online

FBI Says They're Now Working 24/7 To Investigate Hackers and Network Attacks 74

An anonymous reader writes "The Federal Bureau of Investigation (FBI) is finally stepping up its game when it comes to hackers. Maybe it was Anonymous that did it or maybe it was statements from the US Secretary of Defense two weeks ago, but either way, the FBI is now hunting hackers 24/7." I'm happy that the FBI no longer has an investigation schedule when it comes to online crime, but I have to think that I'm not the only one who assumed they were doing this before.
This discussion has been archived. No new comments can be posted.

FBI Says They're Now Working 24/7 To Investigate Hackers and Network Attacks

Comments Filter:
  • Rly? (Score:5, Interesting)

    by ugen ( 93902 ) on Monday October 29, 2012 @04:15PM (#41809847)

    Since this is /., I am not quite sure how to react - perhaps someone will enlighten me?

    Do we *like* the idea that a federal agency is taking online crime seriously and increasing its investigative efforts? Or do we decry even larger invasion of privacy by the lead-fisted government into private citizens lives? Assuming, of course, that any investigation of online crimes would have to at a very least get access to various online resources, logs and data, most likely not voluntarily shared by many parties who go to great lengths to be difficult to identify. You know what *that* means.

  • Callcentric (Score:5, Interesting)

    by Tokolosh ( 1256448 ) on Monday October 29, 2012 @04:18PM (#41809891)

    I hope (vainly) that they are concentrating on real problems, like the DDoS attack on Callcentric. (http://www.dslreports.com/shownews/CallCentric-Victim-of-Devastating-TwoWeek-DDoS-Attack-121667?r=0.832118027416197)

    But their priorities are pobably set by the MAFIAA.

  • Re:Rly? (Score:5, Interesting)

    by Tanktalus ( 794810 ) on Monday October 29, 2012 @04:20PM (#41809919) Journal

    Don't worry. Excepting Hawaii, the US working hours are only about 10 hours long (9AM on the East coast to 5PM on the West coast), the rest have been outsourced to India and China.

    More seriously, if the FBI is using proper legal procedures, including valid (not secret) warrants, then fighting crime is perfectly valid. Well, assuming they're fighting what we'd call crime, I suppose. If they're going after small-time pirates for downloading the latest American Idol, it seems like a waste. If they're going after the guys actually trying to lure kids for child porn, or those trying to hack in to the federal government or one of the corporations that owns the federal government, then the question is why they weren't doing it before.

  • by Anonymous Coward on Monday October 29, 2012 @05:09PM (#41810505)

    Nobody Seems To Notice and Nobody Seems To Care - Government & Stealth Malware

    In Response To Slashdot Article: Former Pentagon Analyst: China Has Backdoors To 80% of Telecoms 87

    How many rootkits does the US[2] use officially or unofficially?

    How much of the free but proprietary software in the US spies on you?

    Which software would that be?

    Visit any of the top freeware sites in the US, count the number of thousands or millions of downloads of free but proprietary software, much of it works, again on a proprietary Operating System, with files stored or in transit.

    How many free but proprietary programs have you downloaded and scanned entire hard drives, flash drives, and other media? Do you realize you are giving these types of proprietary programs complete access to all of your computer's files on the basis of faith alone?

    If you are an atheist, the comparison is that you believe in code you cannot see to detect and contain malware on the basis of faith! So you do believe in something invisible to you, don't you?

    I'm now going to touch on a subject most anti-malware, commercial or free, developers will DELETE on most of their forums or mailing lists:

    APT malware infecting and remaining in BIOS, on PCI and AGP devices, in firmware, your router (many routers are forced to place backdoors in their firmware for their government) your NIC, and many other devices.

    Where are the commercial or free anti-malware organizations and individual's products which hash and compare in the cloud and scan for malware for these vectors? If you post on mailing lists or forums of most anti-malware organizations about this threat, one of the following actions will apply: your post will be deleted and/or moved to a hard to find or 'deleted/junk posts' forum section, someone or a team of individuals will mock you in various forms 'tin foil hat', 'conspiracy nut', and my favorite, 'where is the proof of these infections?' One only needs to search Google for these threats and they will open your malware world view to a much larger arena of malware on devices not scanned/supported by the scanners from these freeware sites. This point assumed you're using the proprietary Microsoft Windows OS. Now, let's move on to Linux.

    The rootkit scanners for Linux are few and poor. If you're lucky, you'll know how to use chkrootkit (but you can use strings and other tools for analysis) and show the strings of binaries on your installation, but the results are dependent on your capability of deciphering the output and performing further analysis with various tools or in an environment such as Remnux Linux. None of these free scanners scan the earlier mentioned areas of your PC, either! Nor do they detect many of the hundreds of trojans and rootkits easily available on popular websites and the dark/deep web.

    Compromised defenders of Linux will look down their nose at you (unless they are into reverse engineering malware/bad binaries, Google for this and Linux and begin a valuable education!) and respond with a similar tone, if they don't call you a noob or point to verifying/downloading packages in a signed repo/original/secure source or checking hashes, they will jump to conspiracy type labels, ignore you, lock and/or shuffle the thread, or otherwise lead you astray from learning how to examine bad binaries. The world of Linux is funny in this way, and I've been a part of it for many years. The majority of Linux users, like the Windows users, will go out of their way to lead you and say anything other than pointing you to information readily available on detailed binary file analysis.

    Don't let them get

There are two ways to write error-free programs; only the third one works.

Working...