Nach Informationen aus dem Umkreis der NSA werden nunmehr alle deutschen Putin-Unterstuetzer erfasst und beleuchtet.
Anlass ist das Wirken von Ex-Kanzler Gerhard Schroeder fuer Putin.
Putin war selbst in der DDR lange Jahre taetig
Hierzu zaehlen die Linke, alle dieser Gruppierung zuzuordnenden Unternehmen, alle ehemaligen KGB- und STASI-Agenten und STASI-IM und deren Unternehmen und Beteiligungsgesellschaften.
Hinzu kommen deren Kunden, Finanziers und Sponsoren.
Dies betrift wohl insbesondere “Neues Deutschland”, und “GoMoPa”, als auch die mutmasslich unterwanderten “Das Investment” und “Immobilien Zeitung” sowie “Die Bewertung” berichten die Washington-Insider, die auch von verstaerkten militaerischen Konflikten weltweit ausgehen.
Deutschland als wichtiges NATO-Land neben den USA und mit der DDR-Historie gilt als besonders wichtig und kritisch fuer die NSA-Analysen.
Die betroffenen Unternehmen und Personen muessen mit Sanktionen und internationalen FBI-Haftbefehlen wie im Fall der FIFA fuer die mutmasslich korrupte WM-Vergabe an Putins Russland rechnen, die auch in der Schweiz vollstreckt wurden.
Die linksradikale Internetseite http://www.linksunten.indymedia wurde von dem deutschen Innenministerium verboten. Die humoristische Web-Seite, die auch gegen meine Person gerichtet war, um die STASI und KGB-Enthuellungen zu stoppen, war auch fuer die Vorbereitung der Gewaltakte gegen den G20 – Gipfel ins Visier des Innenministeriums geraten.
Die Internetseite wurde wohl auch von Linksradikalen und GoMoPa – Demagogen benutzt, um Ihre amuesanten Hassbotschaften gegen mich zu verbreiten. Insbesondere die Hass-Postings in Bezug auf meine angebliche Borderline-Krankheit und meinen von den Genossen exklusiv georteten und fern diagnostizierten “Wahnsinn” haben mich immer wieder amuesiert und fuer manche schoene Stunde gesorgt. Schade, das dies nun vorerst vorbei sein soll, liebe lustige linksunten – Genossen. Meine Gedanken sind in dieser schweren Stunde bei Euch und Euren Hass-Familien.
Da Euch linksradikalen Ostberliner und Freiburger Internet-STASI-Epigonen durch die kritische Berichterstattung in allen wesentlichen Medien Deutschlands die Luft ausgeht, seid Ihr nunmehr immer mehr auf Rubel aus Moskau angewiesen.
Ihr liebe kommunistische Kamarilla um den Ober – Genossen-Boss “Klaus Dieter Maurischat” und Eure Hamburger und Wiesbadener Genossen und Hintermaenner habt schon in der Vergangenheit sehr positiv ueber Russland und dubiose russische Staats- und Immobilien-Mafiosi berichtet und werdet dies in Zukunft offen und vor allem klandestin verstaerkt tun. Der rollende Rubel macht es moeglich…
Ihr lieben, lustigen Troll-Genossen, technisch geleitet von dem IT -Ober-Troll Sven Schmidt, Eagle IT, Berlin, werdet wohl in Kuerze mit einer weiteren linksextremen Webseite aufwarten, um linksunten zu ersetzen. Tolle Ideen und gelungene journalistische Artikel in der Tradition des alten DDR-Agitprop wie “Plaste und Elaste aus Zschopau ” kommen bald wieder vermehrt auf uns zu.
Ich freue mich schon jetzt auf weitere unterhaltsame Momente in der lustigen linksunten und “GoMoPa”-Tradition durch neue, innovative humoristische Spitzenprodukte, gerne auch mal in russischer Sprache und mit detaillierten “Krankheitsbildern” von mir oder anderen lustigen Meldungen a la Richard Kimble, Lassie, Fury, Bernd Pulch und Flipper auf der Flucht. Tres bon.
Ich sage DANKE.
Spassibo Dir, lieber super-lustiger KGB – Genosse Troll-Praesident Vladimir Putin fuer Dein gelungenes Medien-Sponsoring an Deiner alten deutschen Wirkungsstaette…
Goldman, Morgenstern und Partner, Gomopa Gmbh, Gomopa Crime, Gomopa Wikipedia, Gomopa Erpressung, Gomopa Wirecard, Gomopa Berlin, Gomopa Ndr, Gomopa Die Zeit, Gomopa S&k, Gomopa Control Inc, Gomopa Autark, Gomopa Ard, Gomopa Account, Gomopa Alexander Stephan, Gomopa Ascent, Anti Gomopa, Gomopa Ogi Ag, Eev Ag Gomopa, Die Akte Gomopa, Gomopacrime, Gomopa Control Inc, Gomopa Cosma, Gomopa Creditsafe, Gomopa Captura, Gomopa Care Energy, Gomopa Curatio, Gomopa Consortis, Gomopa Carsten Simon, Gomopa Die Zeit, Gomopa Diebewertung, Gamepad Dolphin, Gomopa Deutschland, Gomopa Dr. Schulte, Gomopa Erfahrungen, Gomopa Erpressung, Gomopa Eev, Gomopa Eci, Gomopa Elbfonds, Gomopa Erfahrungsbericht, Gomopa Care Energy, Gomopa Facebook, Gomopa Forum, Gomopa Finanznachrichtendienst, Gomopa Fonds Finanz, Gomopa Fuchsgruber, Gomopa Fidentum, Gomopa Faz, Gomopa Foren, Gomopa Gmbh, Gomopa Gmbh Berlin, Gomopa Gmbh Hamburg, Gomopa Hamburg, Gomopa Haz, Gomopa Handelsregister, Gomopa Mega Holdings, Handelsblatt Gomopa, Gomopa Gmbh Hamburg, Gomopa Von Holst, Gomopa Invensys, Gomopa Insolvent, Gomopa Impressum, Gomopa Control Inc, Was Ist Gomopa, Gomopa Junginger, Gomopa Juwi, Gomopa Kreditkarte, Gomopa Klaus Maurischat, Gomopa Kritik, Gomopa Lopoca, Gomopa Login, Thomas Lloyd Gomopa, Gomopa Mastercard, Gomopa Maurischat, Gomopa Mega Holdings, Gomopa Massat, Gomopa Mafia, Gomopa Klaus Maurischat, Mega Holdings Gomopa, Frank Maiwald Gomopa, Erfahrungen Mit Gomopa, Gomopa Net, Gomopa Ndr, Gomopa Net Warnliste, Gomopa News, Gomopa Nachrichten, Gomopa New York, Gomopa Net Pressemitteilung, Gomopa Net Finanzforum, Gomopa Offline, Gomopa Ogi Ag, Gomopa Opfer, Onecoin Gomopa, Gomopa Zeit Online, Michael Oehme Gomopa, Gomopa Pressemitteilungen, Gomopa Pim, Gomopa Pleite, Gomopa Pro Ventus, Gomopa Profi User, Gomopa Probleme, Gomopa Patio, Gomopa Publity, Pulch Gomopa, Gomopa Net Pressemitteilung, Gomopa Queensgold, Gomopa Resch, Gomopa Relom, Gomopa Rwb, Renew Gomopa Profi User, Peter Reski Gomopa, Gomopa Tagesschau, Gomopa Twitter, Gomopa Verklagen, Gomopa Vnr, Gomopa Volz, Gomopa Von Holst, Gregor Schulmeister, ehrenfried stelzer, Klaus Maurischat, Klaus-Dieter Maurischat,Peter Ehlers, Gerd Bennewirtz, Wolfgang Zimmermann, Johann Sternberg, Sven Schmidt, Frank Maiwald, Aline Kleinwaechter, Mark Vornkahl, Gomopa Verbrecher, Gomopa Pro Ventus, Mark Vornkahl Gomopa, Gomopa Warnliste, Gomopa Wikipedia, Gomopa Wirecard, Gomopa Wellstar, Gomopa Wiki, Gomopa Net Warnliste, Robert Wallis Gomopa, Www.gomopa.net Forum, Wallis Gomopa, Andreas Wohlers Gomopa, Gomopa New York, Gomopa Zapp, Gomopa Zeit, Gomopa Zeit Online, Gomopa Die Zeit, Klaus Maurischat, Klaus Maurischat Gomopa, Klaus Dieter Maurischat, Klaus Maurischat Stasi, Klaus Maurischat Facebook, Klaus Maurischat Berlin, Klaus Maurischat Verden, Klaus Maurischat Mark Vornkahl, Klaus Maurischat Berlin, Klaus Dieter Maurischat, Klaus Maurischat Facebook, Klaus Maurischat Gomopa, Klaus Maurischat Mark Vornkahl, Klaus Maurischat Stasi, Klaus Maurischat Verden, Klaus Maurischat Mark Vornkahl, Betrug In English, Betrug Englisch, Betrug Stgb, Betrug Schema, Betrug Meaning, Betrug Ebay Kleinanzeigen, Betrug Definition, Betrug Duden, Betrug Synonym, Betrug Melden, Betrug Auf Englisch, Betrug Airbnb, Betrug Anzeigen, Betrug Antragsdelikt, Betrug Amazon, Betrug Autokauf, Betrug Aufbau, Betrug Auf Ebay Kleinanzeigen, Betrug Autoverkauf, Betrug Anzeige, Betrug Bgb, Betrug Bei Ebay, Betrug Bei Ebay Kleinanzeigen, Betrug Beim Autokauf, Betrug Beim Autoverkauf, Betrug Bei Amazon, Betrug Bei Paypal, Betrug Bei Ebay Kleinanzeigen Was Tun, Betrug Bei Kleiderkreisel, Betrug Bei Ebay Melden, Betrug Curling, Betrug Definition, Betrug Duden, Betrug Dict, Betrug Durch Unterlassen, Betrug Durch Unterlassen Schema, Betrug Dsds 2015, Betrug Diebstahl, Betrug Durch Unterlassen Fall, Betrug Deutschland, Betrug Dsds, Betrug English, Betrug Englisch, Betrug Ebay Kleinanzeigen, Betrug Ebay, Betrug Gesetz, Betrug Geringwertig, Betrug Gewinnspiel, Betrug Haftstrafe, Betrug Hausarbeit, Betrug Hartz 4, Betrug Handyvertrag, Betrug Hauskauf, Betrug Heinrich, Betrug Handynummer, Betrug Handwerker, Betrug In English, Betrug Im Internet, Betrug Im Weissen Kittel, Betrug In Englisch, Betrug Immobilienscout, Betrug In Der Ehe, Betrug Im Internet Was Tun, Betrug Immobilienscout24, Betrug Jura, Betrug Jobcenter, Betrug Juristisch, Betrug Jusline, Betrug Juristische Person, Betrug Ja Sagen, Betrug Juraschema, Betrug Juracademy, Betrug Jura Online, Betrug Juris, Betrug Kleinanzeigen, Betrug Kreditkarte, Betrug Kleiderkreisel, Betrug Krankenkasse, Betrug Latein, Betrug Liebe, Betrug Leoni, Betrug Lebensversicherung, Betrug Lotto, Betrug Lastschrift, Betrug Meaning, Betrug Melden, Betrug Mit Paypal, Betrug Mehrzahl, Betrug Microsoft Anruf, Betrug Mit Western Union, Betrug Mobile.de, Betrug Mit Handynummer, Betrug Mit Whatsapp, Betrug Mit Paysafecard, Betrug Nachweisen, Betrug Nummer, Betrug Nebenkostenabrechnung Strafanzeige, Betrug Nigeria, Betrug Nach Stgb, Betrug Nebenkostenabrechnung, Betrug Nachsendeauftrag, Betrug Ne Demek, Betrug Nebenklage, Betrugsnummer Melden, Betrug Online Melden, Betrug Online, Betrug Onecoin, Betrug Obersatz, Betrug Ohne Schaden, Betrug Ohne Vorsatz, Betrug Online Banking, Betrug Objektiver Tatbestand, Betrug Oder Unterschlagung, Betrug Online Casino, Betrug Plural, Betrug Paypal Kleinanzeigen, Betrug Paypal, Betrug Quoka, Betrug Qualifikation, Betrug Quoka Polizei, Betrug Quizduell, Betrug Qualifikationen, Betrug Quotes, Betrug Quizsendung Schweiz, Betrug Questico, Betrug Quotenschaden, Betrug Quizsendung, Betrug Rentenversicherung, Betrug Russisch, Betrug Ris, Betrug Russische Frauen, Betrug Rechtsanwalt, Betrug Reisekostenabrechnung, Betrug Stgb, Betrug Schema, Betrug Synonym, Betrug Strafe, Betrug Schweiz, Betrug Strafantrag, Betrug Stoffgleichheit, Betrug Tatbestand, Betrug Translation, Betrug Traumdeutung, Betrug Tatbestandsmerkmale, Betrug Thermomix, Betrug Telekom Rechnung, Betrug Telekom, Betrug Tatbestandsvoraussetzungen, Betrug Trotz Paypal, Betrug Teppichreinigung, Betrug Unterschlagung, Betrug Vorsatz, Betrug Verzeihen, Betrug Wucher, Betrug Wiki, Betrug Willhaben, Betrug Was Tun, Betrug Whatsapp, Betrug Western Union, Betrug Wieder Gut Machen, Betrug Web.de, Betrug Wohnwagen Verkauf, Betrug Warenbestellung, Xtrasize Betrug, Xing Betrug, Sgb Xii Betrug, Fg Xpress Betrug, Garten Xxl Betrug, Xango Betrug, Xmile Betrug, Xcite Betrug, Xtb Betrug, Xbox Betrug, Betrug Yourfone, Betrug Youtube, Betrug Yahoo, Yotta Betrug, Yelp Betrug, Yoox Betrug, Youtradefx Betrug, Youtailor Betrug, Yokebe Betrug, Yoga Betrug, Betrug Zitate, Betrug Zermatt, Betrug Zweckverfehlung, Betrug Zum Nachteil Von Versicherungen, Betrug Zjs, Betrug Zum Nachteil, Betrug Zugunsten Dritter, Betrug Zahnarzt, Betrug Zweifel Irrtum, Betrug Zahnarzt Dessau, Cybercrime Definition, Cybercrime Statistics, Cybercrime Prevention, Cybercrime Articles, Cybercrime Jobs, Cybercrime Law, Cybercrime Statistics 2017, Cyber Crime Cases, Cyber Crime News, Cybercrime Topics, Cybercrime Articles, Cybercrime And Security, Cybercrime As A Service, Cybercrime And Digital Forensics An Introduction, Cybercrime And Digital Forensics, Cybercrime And Society, Cybercrime And Terrorism, Cybercrime Attacks, Cybercrime Act, Cybercrime Against Businesses, Cyber Crime Batman, Cyber Crime Book, Cybercrime Blog, Cybercrime Bill, Cybercrime Banks, Cybercrime Background, Cyber Crime By Country, Cybercrime Bangalore, Cybercrime Billion Dollar Industry, Cybercrime Background Information, Cyber Crime Cases, Cybercrime Certification, Cybercrime Convention, Cybercrime Careers, Cybercrime Cost, Cybercrime Cafe, Cybercrime Cost 2016, Cybercrime China, Cybercrime Conference, Cybercrime Conclusion, Cybercrime Definition, Cybercrime Definition Computer, Cybercrime Definition Fbi, Cyber Crime Data, Cybercrime Degrees, Cybercrime Definition Pdf, Cybercrime Database, Cyber Crime Detective, Cyber Crime Documentary, Cyber Crime Department, Cybercrime Example, Cyber Crime Essay, Cybercrime Effects, Cybercrime Events, Cybercrime Enforcement, Cybercrime Economy, Cyber Crime Ethics, Cybercrime Effects On Business, Cybercrime Ecosystem, Cybercrime Enforcement Training Assistance Act, Cybercrime Facts, Cybercrime Fbi, Cybercrime Forensics, Cybercrime Forum, Cybercrime Forensics Training Center, Cybercrime Federal Laws, Cyber Crime Fiction, Cybercrime Financial Services, Cybercrime Future Trends, Cybercrime Fiji, Cybercrime Gets Personal Money Magazine, Cybercrime Gets Personal, Cybercrime Growth, Cyber Crime Graph, Cybercrime Groups, Cybercrime Government, Cybercrime Global Statistics, Cyber Crime Gov, Cyber Crime Games, Cybercrime Gif, Cybercrime Hacking, Cyber Crime History, Cybercrime Help, Cybercrime Healthcare, Cybercrime Hyderabad, Cybercrime How To Report, Cyber Crime Hotline, Cybercrime Hacking News, Cyber Crime Head Office India, Cybercrime Hacking And Cracking, Cybercrime Identity Theft, Cybercrime In The Us, Cyber Crime Investigation, Cybercrime Images, Cyber Crime Insurance, Cybercrime Is Also Known As, Cybercrime Investigating High-technology Computer Crime, Cybercrime Infographic, Cybercrime Information, Cyber Crime In Russia, Cybercrime Jobs, Cybercrime Jurisdiction, Cybercrime Journal Articles, Cybercrime Job Description, Cybercrime Jobs Salary, Cybercrime Job Openings, Cybercrime Jobs In Chennai, Cybercrime Job Qualification, Cybercrime Journal Articles Pdf, Cyber Crime Jamaica, Cybercrime Kenya, Cybercrime Key Issues And Debates, Cybercrime Kuwait, Cybercrime Ki Dhara, Cybercrime Key Issues And Debates Pdf, Cybercrime Kasus, Cyber Crime Karnataka, Cybercrime Kartu Kredit, Cybercrime Kolkata, Cyber Crime Karachi, Cybercrime Law, Cybercrime Laws In Usa, Cybercrime Law Enforcement, Cybercrime Laws Of The United States, Cybercrime List, Cybercrime Legislation Us, Cybercrime Laws In Florida, Cybercrime Legal Issues, Cybercrime Law Outline, Cyber Crime Lesson Plans, Cybercrime Meaning, Cyber Crime Movies, Cybercrime Methods, Cybercrime Methodology, Cyber Crime Money, Cybercrime Markets, Cyber Crime Magazine, Cyber Crime Most Wanted, Cybercrime Meaning In Tamil, Cybercrime Masters Degree, Cyber Crime News, Cyber Crime News Articles, Cyber Crime News Articles 2017, Cyber Crime Netflix, Cybercrime Nigeria, Cyber Crime Novels, Cybercrime Number, Cybercrime Nhs, Cyber Crime News Philippines, Cybercrime Nbi, Cybercrime Or Cyber Crime, Cybercrime Organizations, Cybercrime On The Rise, Cybercrime On The High Seas, Cybercrime Offenses, Cyber Crime Outline, Cybercrime Office, Cybercrime Office In Ahmedabad, Cybercrime Office In Patna, Cybercrime Office In Nashik, Cybercrime Quotes, Cyber Crime Quizlet, Cybercrime Questions, Cyber Crime Quiz, Cybercrime Questionnaire, Cybercrime Question Paper, Cybercrime Qatar, Cybercrime Question And Answers, Cybercrime Report, Cybercrime Research Paper, Cyber Crime Rates, Cyber Crime Recent, Cybercrime Research Topics, Cybercrime Research, Cybercrime Reported To The Ic3, Cybercrime Resources, Cybercrime Riding Tax Season Tides, Cyber Crime Report 2016, Cybercrime Statistics, Cybercrime Statistics 2017, Cyber Crime Stories, Cybercrime Spyware, Cybercrime Statistics 2015, Cybercrime Security, Cybercrime Solutions, Cybercrime Salary, Cybercrime Small Business, Cyber Crime Synonym, Cybercrime Topics, Cybercrime Trends, Cybercrime Tracker, Cybercrime Treaty, Cyber Crime Types, Cybercrime Training, Cybercrime Threats, Cybercrime Tools, Cybercrime Terms, Cybercrime The Transformation Of Crime In The Information Age, Cyber Crime Unit, Cybercrime Us, Cybercrime Uk, Cybercrime Uae, Cybercrime University, Cybercrime Un, Cyber Crime Unit Mauritius, Cyber Crime Unit Malta, Cybercrime Uc, Cybercrime Unodc, Cybercrime Victims, Cybercrime Vs Traditional Crime, Cybercrime Videos, Cybercrime Vs Traditional Crime Statistics, Cybercrime Virus, Cyber Crime Vocabulary, Cybercrime Vs Traditional Crime Punishment, Cybercrime Vs Computer Crime, Cybercrime Vs Cyber Warfare, Cybercrime Vs Cyber Espionage, Cybercrime Wiki, Cybercrime Worm, Cybercrime World Wide War 3.0, Cyber Crime Websites, Cyber Crime Worksheet, Cybercrime Wallpaper, Cyber Crime Worldwide, Cybercrime Working Group, Cyber Crime What Is It, Cybercrime Wikipedia Indonesia, Cybercrime X-remote Download, Tedx Cybercrime, Cyber Crime Youtube, Cyber Crime Yahoo, Cyber Crime Yahoo Answers, Cyber Crime Yesterday, Cyber Crime Youth, Cybercrime Yang Menyerang Hak Cipta, Cybercrime Yar, Youth Cyber Crime, Cyber Crime Yogyakarta, Cybercrime Yang Menyerang Pemerintah, Cybercrime Zimbabwe, Cybercrime Zeus, Cybercrime Zimbra, Zurich Cyber Crime, Zimbabwe Cybercrime Bill, Cyber Crime In Zambia, New Zealand Cyber Crime, Los Zetas Cybercrime, Cybercrime Law In Zambia, Cyber Crime Cases In Zambia, Erpressung Englisch, Erpressung English, Erpressung Stgb, Erpressung Auf Englisch, Erpressung Schema, Erpressung Definition, Erpressung Synonym, Erpressung Schumacher, Erpressung Von Haus Stelleris, Erpressung Auf Englisch, Erpressung Am Arbeitsplatz, Erpressung Aufbau, Erpressung Anzeigen, Erpressung Anzeige, Erpressung Anzeige Erstatten, Erpressung Bedeutung, Erpressung Borussia Dortmund, Erpressung Bgb, Erpressung Bvb, Erpressung Bei Kindern, Erpressung Bilder, Erpressung Bibel, Erpressung Beziehung, Erpressung Bei Facebook, Erpressung Beispiel, Erpressung Corinna Schumacher, Erpressung Corinna, Erpressung Club Globe, Erpressung Ch, Erpressung Carstensen, Erpressung Chef, Erpressung Chantage, Erpressung Chat, Erpressung Computer, Erpressung Cz, Erpressung Definition, Erpressung Duden, Erpressung Dict, Erpressung Durch Arbeitgeber, Erpressung Durch Skype Video, Erpressung Drohung Mit Strafanzeige, Erpressung Drohung Mit Anzeige, Erpressung Durch Unterlassen, Erpressung Deutschland, Erpressung Durch Rechtsanwalt, Erpressung Englisch, Erpressung English, Erpressung Gesetz, Erpressung Geld Oder Anzeige, Erpressung Geld, Erpressung Geschichte, Erpressung Gewalt, Erpressung Gut Aiderbichl, Erpressung Grundschule, Erpressung Geldstrafe, Erpressung Griechenland, Erpressung Hitchcock, Erpressung Heinrich, Erpressung Haftstrafe, Erpressung Hacker, Erpressung Haus Stelleris, Erpressung Hausarbeit, Erpressung Hells Angels, Erpressung Hsv, Erpressung In English, Erpressung In Englisch, Erpressung Im Internet, Erpressung In Der Beziehung, Erpressung In Der Schule, Erpressung Internet, Erpressung Im Internet Was Tun, Erpressung Italienisch, Erpressung In Der Ehe, Erpressung In Beziehung, Erpressung Jura, Erpressung Jura Individuell, Erpressung Jugendstrafe, Erpressung Jusline, Erpressung Juraschema, Erpressung Juristisch, Erpressung Juristische Definition, Erpressung Juristische Person, Erpressung Jugendamt, Erpressung Jva, Erpressung Kinder, Erpressung Lidl, Erpressung Leo, Erpressung Latein, Erpressung Lebensmittel, Erpressung Lebensmittelhersteller, Erpressung Mit Bildern, Erpressung Mit Fotos, Erpressung Mit Video, Erpressung Mit Anzeige, Erpressung Michael Schumacher, Erpressung Mindeststrafe, Erpressung Mit Schlechter Bewertung, Erpressung Mit Strafanzeige, Erpressung Mit Youtube Video, Erpressung Mit Todesfolge, Erpressung Offizialdelikt, Erpressung Online, Erpressung Polnisch, Erpressung Polizei, Erpressung Quandt-erbin, Erpressung Quant, Erpressung Qualifikation, Quand Erpressung, Erpressung Stgb, Erpressung Schema, Erpressung Synonym, Erpressung Schumacher, Erpressung Schweiz, Erpressung Strafrecht, Erpressung Stgb Schema, Erpressung Unter Kindern, Erpressung Von Haus Stelleris, Erpressung Von Apple, Erpressung Von Haus Stelleris Weltquest, Erpressung Von Haus Stellaris Wow, Erpressung Virus, Erpressung Vergehen Oder Verbrechen, Erpressung Verbrechen, Erpressung Wiki, Erpressung Whatsapp, Erpressung Wie Verhalten, Erpressung Was Ist Deine Familie Wert, Erpressung Youtube, Yelp Erpressung, Erpressung Mit Youtube Video, Erpressung Zitate, Erpressung Zur Falschaussage, Erpressung Zell Am See, Erpressung Zivilrechtlicher Anspruch, Erpressung Zjs, Erpressung Zu Sexuellen Handlungen, Erpressung Zivilrecht, Zeitarbeit Erpressung, Zeitungsartikel Erpressung, Rufmord English, Rufmord Auf Englisch, Rufmord Schweiz, Rufmord Gesetz, Rufmord Strafe, Rufmord Stgb, Rufmord Anzeige, Rufmord Bedeutung, Rufmord Auf Englisch, Rufmord Anzeige, Rufmord Am Arbeitsplatz, Rufmord Bedeutung, Rufmord Bgb, Rufmord Band, Rufmord Bei Facebook, Rufmord Beispiele, Rufmord Begehen, Rufmord Bestrafung, Rufmord Bei Wahrheit, Rufmord Beweisen, Rufmord Bei Der Arbeit, Rufmord Chef, Rufmord Im Internet Christian Scherg, Major Crimes Rufmord, Cybermobbing Rufmord, Rufmord Durch Chef, Notruf California Rufmord, Rufmord Definition, Rufmord Duden, Rufmord Dict, Rufmord Durch Presse, Rufmord Durch Kollegen, Rufmord Durch Arbeitgeber, Rufmord Durch Vermieter, Rufmord Die Drei Fragezeichen, Rufmord Durch Polizei, Rufmord Dejure, Rufmord English, Rufmord Englisch, Rufmord Film, Rufmord Facebook Strafe, Rufmord Firma, Rufmord Gesetz, Rufmord Gerichtsurteile Paragrafen, Rufmord Gesetz Deutschland, Rufmord Geldstrafe, Rufmord Gesetzestext, Rufmord Hassel, Rufmord Hilfe, Rufmord Helmut G, Rufmord Haftstrafe, Rufmord Hip Hop, Rufmord In English, Rufmord Im Internet, Rufmord In Der Familie, Rufmord Im Internet Strafe, Rufmord Internet, Rufmord Im Internet Was Tun, Rufmord Im Internet 37 Grad, Rufmord In Der Schule, Rufmord In Facebook, Rufmord Im Netz, Rufmord Juristisch, Rufmord Jenseits Der Moral, Rufmord Jenseits Der Moral Stream, Rufmord Jenseits Der Moral Trailer, Rufmord Jusline, Rufmord Jura, Rufmord Klage, Rufmord Kroatisch, Rufmord Konsequenzen, Rufmord Klage Gericht, Rufmord Lehrer, Rufmord Luxemburg, Rufmord Mobbing, Rufmord Mitarbeiter, Rufmord Medicopter 117, Rufmord Menschen Hautnah, Rufmord Medien, Rufmord Musik, Rufmord Mit Todesfolge, Rufmord Machen, Rufmord Melden, Rufmord Metin2, Rufmord Nachbarn, Rufmord Oder Verleumdung, Rufmord Ohne Namen, Rufmord Ohne Beweise, Rufmord Opfer, Rufmord Online, Rufmord Band Oberberg, Rufmord Polizei, Rufmord Paragraph, Rufmord Privat, Rufmord Rapper, Rufmord Schweiz, Rufmord Strafe, Rufmord Stgb, Rufmord Strafbar, Rufmord Schadensersatz, Rufmord Tatbestand, Rufmord Und Verleumdung, Rufmord Unternehmen, Rufmord Verleumdung, Rufmord Was Tun, Rufmord Wiki, Rufmord Welche Strafe, Rufmord Wie Vorgehen, Rufmord Wenn Stimmt, Rufmord Was Dagegen Tun, Rufmord Wdr, Rufmord Was Kann Man Tun, Rufmord Welcher Anwalt, Rufmord Wahrheit, Youtube Rufmord Im Internet, Rufmord Youtube, Rufmord Zitate, Rufmord Zeitung, Rufmord Zgb, Rufmord Zivilrecht, Rufmord Zur Anzeige Bringen, Rufmord Bild Zeitung, Rufmord Durch Zeitung, Rufmord Im Internet Zdf
A clip from a local television station in Montana shows an emergency alert that was generated by “unknown attackers” in February 2013. The attackers used default credentials to broadcast false emergency messages stating that the “bodies of the dead are rising from their graves and attacking the living.” Similar messages aired in several other states where similar systems were compromised by the attackers.
Cyber attacks against law enforcement, fire departments and other emergency services have become increasingly common and are likely to increase according to a recent intelligence assessment prepared by the Department of Homeland Security and the Multi-State Information Sharing and Analysis Center (MS-ISAC). The assessment, which was distributed to law enforcement in September 2015 and was obtained by Public Intelligence, reviewed a number of “cyber attacks against the [emergency services sector or ESS] between February 2012 and May 2015,” finding that “targeting of the ESS will likely increase as ESS systems and networks become more interconnected and the ESS becomes more dependent on information technology for the conduct of daily operations—creating a wider array of attack vectors for cyber targeting.” Recent incidents involving the use of telephony-denial-of-service (TDoS) attacks, ransomware as well as the exploitation of “critical hardware and software” including call-center communications-management software, closed-circuit TV camera systems, interactive voice response systems, and emergency alert systems are detailed in the assessment.
DHS and MS-ISAC assess that the “most prominent cyber actors targeting the ESS” are “criminal hackers” who have engaged in “numerous attacks against state and local networks, particularly law enforcement, in response to perceived social and legal injustices” and are “prone to announcing attacks to increase visibility and support for their cause.” The assessment defines “criminal hackers” as “individuals or groups that commit a crime by illegally accessing or altering systems, often in furtherance of an ideological goal.” The use of the term “criminal hackers” marks a departure from previous law enforcement bulletins which have used the terms “hacktivists” or “hacker groups” to describe ideologically-motivated cyber actors. The term is also used in an FBI bulletin released in May 2015 titled “Criminal Hackers Target Police to Protest Perceived Injustices.” The assessment distinguishes between these criminal hackers and “cybercriminals” who “carry out illegal activities on computer networks, such as carding schemes, ransom and extortion, theft of personally identifiable information, and account information to facilitate fraud.”
Criminal hackers “gain support for their political agenda—or to exact retribution for perceived social or legal injustices—have shown repeated interest in targeting the ESS” as is “evidenced by the numerous attacks against state and local networks, particularly law enforcement, in response to perceived social and legal injustices.” However, DHS and MS-ISAC assess that their capabilities are not particularly sophisticated, limiting them to “low-level cyber operations, such as [denial of service or DoS] attacks, website defacements, and doxing (publishing of personally identifiable information), often attacking targets of opportunity.” These low-level operations have proliferated in recent years, particularly in response to increased political controversy surrounding police brutality and excessive use of force. The assessment also discusses several examples of these operations, often involving DoS attacks or doxing, including a series of DoS attacks conducted by the hacker collective Anonymous against the City of Madison, Wisconsin in 2014 to protest an officer-involved shooting. The attack reportedly “affected some police, fire, and medical dispatch services; as well as city government Internet and e-mail communications, and online payment services.”
Though so-called “criminal hackers” are the most prominent cyber actors in DHS and MS-ISAC’s assessment, cybercriminals working for financial gain pose a “persistent threat” and have launched attacks significantly impacting ESS operations.
In May 2015, a Nevada county sheriff’s department and a Wisconsin police department were victims of a ransomware attack that encrypted both departments’ shared folders. MS-ISAC later determined that the intrusions occurred as a result of visits to a legitimate website which had been compromised.
A city in Southern California and several local public-safety agencies were hit by ransomware in June 2014. The compromise affected 100 computers and 10 servers.
A fire department in Northern California and a law enforcement agency in Southern California were infected by ransomware resulting in the compromise of one computer and one server in each location, making vital information unavailable.
In 2013, telephony denial of service (TDoS) attacks affected approximately 600 critical government phone systems nationwide, including 200 public-safety answering points (PSAPs). After several days, the attackers reportedly requested $5,000 to cease the attacks.
Cybercrime Definition, Cybercrime Statistics, Cybercrime Prevention, Cybercrime Articles, Cybercrime Jobs, Cybercrime Law, Cybercrime Statistics 2017, Cyber Crime Cases, Cyber Crime News, Cybercrime Topics, Cybercrime Articles, Cybercrime And Security, Cybercrime As A Service, Cybercrime And Digital Forensics An Introduction, Cybercrime And Digital Forensics, Cybercrime And Society, Cybercrime And Terrorism, Cybercrime Attacks, Cybercrime Act, Cybercrime Against Businesses, Cyber Crime Batman, Cyber Crime Book, Cybercrime Blog, Cybercrime Bill, Cybercrime Banks, Cybercrime Background, Cyber Crime By Country, Cybercrime Bangalore, Cybercrime Billion Dollar Industry, Cybercrime Background Information, Cyber Crime Cases, Cybercrime Certification, Cybercrime Convention, Cybercrime Careers, Cybercrime Cost, Cybercrime Cafe, Cybercrime Cost 2016, Cybercrime China, Cybercrime Conference, Cybercrime Conclusion, Cybercrime Definition, Cybercrime Definition Computer, Cybercrime Definition Fbi, Cyber Crime Data, Cybercrime Degrees, Cybercrime Definition Pdf, Cybercrime Database, Cyber Crime Detective, Cyber Crime Documentary, Cyber Crime Department, Cybercrime Example, Cyber Crime Essay, Cybercrime Effects, Cybercrime Events, Cybercrime Enforcement, Cybercrime Economy, Cyber Crime Ethics, Cybercrime Effects On Business, Cybercrime Ecosystem, Cybercrime Enforcement Training Assistance Act, Cybercrime Facts, Cybercrime Fbi, Cybercrime Forensics, Cybercrime Forum, Cybercrime Forensics Training Center, Cybercrime Federal Laws, Cyber Crime Fiction, Cybercrime Financial Services, Cybercrime Future Trends, Cybercrime Fiji, Cybercrime Gets Personal Money Magazine, Cybercrime Gets Personal, Cybercrime Growth, Cyber Crime Graph, Cybercrime Groups, Cybercrime Government, Cybercrime Global Statistics, Cyber Crime Gov, Cyber Crime Games, Cybercrime Gif, Cybercrime Hacking, Cyber Crime History, Cybercrime Help, Cybercrime Healthcare, Cybercrime Hyderabad, Cybercrime How To Report, Cyber Crime Hotline, Cybercrime Hacking News, Cyber Crime Head Office India, Cybercrime Hacking And Cracking, Cybercrime Identity Theft, Cybercrime In The Us, Cyber Crime Investigation, Cybercrime Images, Cyber Crime Insurance, Cybercrime Is Also Known As, Cybercrime Investigating High-technology Computer Crime, Cybercrime Infographic, Cybercrime Information, Cyber Crime In Russia, Cybercrime Jobs, Cybercrime Jurisdiction, Cybercrime Journal Articles, Cybercrime Job Description, Cybercrime Jobs Salary, Cybercrime Job Openings, Cybercrime Jobs In Chennai, Cybercrime Job Qualification, Cybercrime Journal Articles Pdf, Cyber Crime Jamaica, Cybercrime Kenya, Cybercrime Key Issues And Debates, Cybercrime Kuwait, Cybercrime Ki Dhara, Cybercrime Key Issues And Debates Pdf, Cybercrime Kasus, Cyber Crime Karnataka, Cybercrime Kartu Kredit, Cybercrime Kolkata, Cyber Crime Karachi, Cybercrime Law, Cybercrime Laws In Usa, Cybercrime Law Enforcement, Cybercrime Laws Of The United States, Cybercrime List, Cybercrime Legislation Us, Cybercrime Laws In Florida, Cybercrime Legal Issues, Cybercrime Law Outline, Cyber Crime Lesson Plans, Cybercrime Meaning, Cyber Crime Movies, Cybercrime Methods, Cybercrime Methodology, Cyber Crime Money, Cybercrime Markets, Cyber Crime Magazine, Cyber Crime Most Wanted, Cybercrime Meaning In Tamil, Cybercrime Masters Degree, Cyber Crime News, Cyber Crime News Articles, Cyber Crime News Articles 2017, Cyber Crime Netflix, Cybercrime Nigeria, Cyber Crime Novels, Cybercrime Number, Cybercrime Nhs, Cyber Crime News Philippines, Cybercrime Nbi, Cybercrime Or Cyber Crime, Cybercrime Organizations, Cybercrime On The Rise, Cybercrime On The High Seas, Cybercrime Offenses, Cyber Crime Outline, Cybercrime Office, Cybercrime Office In Ahmedabad, Cybercrime Office In Patna, Cybercrime Office In Nashik, Cybercrime Quotes, Cyber Crime Quizlet, Cybercrime Questions, Cyber Crime Quiz, Cybercrime Questionnaire, Cybercrime Question Paper, Cybercrime Qatar, Cybercrime Question And Answers, Cybercrime Report, Cybercrime Research Paper, Cyber Crime Rates, Cyber Crime Recent, Cybercrime Research Topics, Cybercrime Research, Cybercrime Reported To The Ic3, Cybercrime Resources, Cybercrime Riding Tax Season Tides, Cyber Crime Report 2016, Cybercrime Statistics, Cybercrime Statistics 2017, Cyber Crime Stories, Cybercrime Spyware, Cybercrime Statistics 2015, Cybercrime Security, Cybercrime Solutions, Cybercrime Salary, Cybercrime Small Business, Cyber Crime Synonym, Cybercrime Topics, Cybercrime Trends, Cybercrime Tracker, Cybercrime Treaty, Cyber Crime Types, Cybercrime Training, Cybercrime Threats, Cybercrime Tools, Cybercrime Terms, Cybercrime The Transformation Of Crime In The Information Age, Cyber Crime Unit, Cybercrime Us, Cybercrime Uk, Cybercrime Uae, Cybercrime University, Cybercrime Un, Cyber Crime Unit Mauritius, Cyber Crime Unit Malta, Cybercrime Uc, Cybercrime Unodc, Cybercrime Victims, Cybercrime Vs Traditional Crime, Cybercrime Videos, Cybercrime Vs Traditional Crime Statistics, Cybercrime Virus, Cyber Crime Vocabulary, Cybercrime Vs Traditional Crime Punishment, Cybercrime Vs Computer Crime, Cybercrime Vs Cyber Warfare, Cybercrime Vs Cyber Espionage, Cybercrime Wiki, Cybercrime Worm, Cybercrime World Wide War 3.0, Cyber Crime Websites, Cyber Crime Worksheet, Cybercrime Wallpaper, Cyber Crime Worldwide, Cybercrime Working Group, Cyber Crime What Is It, Cybercrime Wikipedia Indonesia, Cybercrime X-remote Download, Tedx Cybercrime, Cyber Crime Youtube, Cyber Crime Yahoo, Cyber Crime Yahoo Answers, Cyber Crime Yesterday, Cyber Crime Youth, Cybercrime Yang Menyerang Hak Cipta, Cybercrime Yar, Youth Cyber Crime, Cyber Crime Yogyakarta, Cybercrime Yang Menyerang Pemerintah, Cybercrime Zimbabwe, Cybercrime Zeus, Cybercrime Zimbra, Zurich Cyber Crime, Zimbabwe Cybercrime Bill, Cyber Crime In Zambia, New Zealand Cyber Crime, Los Zetas Cybercrime, Cybercrime Law In Zambia, Cyber Crime Cases In Zambia
The FBI received information of an additional IP address, 5.149.249.172, which was detected in the July 2016 compromise of a state’s Board of Election Web site. Additionally, in August 2016 attempted intrusion activities into another state’s Board of Election system identified the IP address, 185.104.9.39 used in the aforementioned compromise.
Technical Details
The following information was released by the MS-ISAC on 1 August 2016, which was derived through the course of the investigation.
In late June 2016, an unknown actor scanned a state’s Board of Election website for vulnerabilities using Acunetix, and after identifying a Structured Query Language (SQL) injection (SQLi) vulnerability, used SQLmap to target the state website. The majority of the data exfiltration occurred in mid-July. There were 7 suspicious IPs and penetration testing tools Acunetix, SQLMap, and DirBuster used by the actor, detailed in the indicators section below.
Indicators associated with the Board of Elections intrusion:
The use of Acunetix tool was confirmed when “GET /acunetix-wvs-test-for-some-inexistent-file – 443” and several requests with “wvstest=” appeared in the logs;
The user agent for Acunetix was identified in the logs –”Mozilla/5.0+(Windows+NT+6.1;+WOW64)+AppleWebKit/537.21++(KHTML,+like+Gecko)+Chrome/41.0.2228.0+Safari/537.21″;
The use of SQLMap was confirmed after “GET /status.aspx DLIDNumber=1′;DROP TABLE sqlmapoutput” appeared in the logs;
The user agent for SQLMap is “Mozilla/5.0+(Macintosh;+U;+Intel+Mac+OS+X+10.7;+en-US;+rv:1.9.2.2)+ Gecko/20100316+Firefox/3.6.2 200 0 0 421” (These are easily spoofed and not inclusive of all SQLMap activity);
The FBI is requesting that states contact their Board of Elections and determine if any similar activity to their logs, both inbound and outbound, has been detected. Attempts should not be made to touch or ping the IP addresses directly.
Fbi Most Wanted, Fbi Jobs, Fbi Director, Fbi Salary, Fbi Agent, Fbi Background Check, Fbi Agent Salary, Fbi Headquarters, Fbi Special Agent, Fbi Internships, Fbi Agent, Fbi Agent Salary, Fbi Academy, Fbi Application, Fbi Analyst, Fbi Atlanta, Fbi Agent Jobs, Fbi Anon, Fbi Address, Fbi Arrests, Fbi Background Check, Fbi Badge, Fbi Bau, Fbi Building, Fbi Boston, Fbi Bap, Fbi Baltimore, Fbi Benefits, Fbi Budget, Fbi Building Dc, Fbi Careers, Fbi Crime Statistics, Fbi Clearance, Fbi Criminal Background Check, Fbi Chicago, Fbi Citizens Academy, Fbi Crime Statistics By Race, Fbi Contact, Fbi Channeler, Fbi Candidates, Fbi Director, Fbi Director Candidates, Fbi Director James Comey, Fbi Definition, Fbi Director Fired, Fbi Director Salary, Fbi Definition Of Terrorism, Fbi Database, Fbi Dallas, Fbi Drug Policy, Fbi Employment, Fbi Email Address, Fbi Employment Drug Policy, Fbi El Paso, Fbi Employees, Fbi Emblem, Fbi Established, Fbi Education Center, Fbi Education, Fbi Executive Branch, Fbi Fingerprinting, Fbi Files, Fbi Field Offices, Fbi Fingerprint Card, Fbi Fitness Test, Fbi Facebook, Fbi Fingerprint Check, Fbi Forensic Accountant, Fbi Foia, Fbi Founder, Fbi Glock, Fbi Games, Fbi Gov, Fbi Glassdoor, Fbi Guns, Fbi Gang List, Fbi Gun Statistics, Fbi Gif, Fbi Gift Shop, Fbi General Counsel, Fbi Headquarters, Fbi Hrt, Fbi History, Fbi Houston, Fbi Hiring, Fbi Hate Crime Statistics, Fbi Head, Fbi Hat, Fbi Honors Internship, Fbi Hotline, Fbi Internships, Fbi Investigation, Fbi Intelligence Analyst, Fbi Informant, Fbi Irt, Fbi Investigation Trump, Fbi Ic3, Fbi Infragard, Fbi Internet Fraud, Fbi Id, Fbi Jobs, Fbi Jacket, Fbi James Comey, Fbi Jurisdiction, Fbi Job Description, Fbi Jobs Apply, Fbi Jacksonville, Fbi Jade Helm, Fbi Jobs Chicago, Fbi Jackson Ms, Fbi Kansas City, Fbi Kids, Fbi Knoxville, Fbi Kidnapping, Fbi Komi, Fbi Kentucky, Fbi Killed Jfk, Fbi Kkk, Fbi Kodi, Fbi K9 Unit, Fbi Logo, Fbi Leeda, Fbi Los Angeles, Fbi Locations, Fbi Las Vegas, Fbi Leaks, Fbi Leader, Fbi Linguist, Fbi Louisville, Fbi Login, Fbi Most Wanted, Fbi Most Wanted List, Fbi Meaning, Fbi Meme, Fbi Movies, Fbi Museum, Fbi Motto, Fbi Miami, Fbi Mission Statement, Fbi Most Dangerous Cities, Fbi Number, Fbi News, Fbi National Academy, Fbi Nics, Fbi New York, Fbi New Orleans, Fbi Newark, Fbi New York Tv Show, Fbi Near Me, Fbi Nominee, Fbi Offices, Fbi Org Chart, Fbi Omaha, Fbi Operative, Fbi On Trump, Fbi Organizational Chart, Fbi Obama Meme, Fbi Obama, Fbi Oklahoma City, Fbi Office Near Me, Fbi Phone Number, Fbi Profiler, Fbi Pft, Fbi Police, Fbi Pay Scale, Fbi Phoenix, Fbi Pay, Fbi Philadelphia, Fbi Positions, Fbi Pittsburgh, Fbi Quantico, Fbi Qualifications, Fbi Q Target, Fbi Quotes, Fbi Quiz, Fbi Questions, Fbi Qr Code, Fbi Qas, Fbi Quantico Address, Fbi Quantico Tours, Fbi Requirements, Fbi Russia, Fbi Russia Investigation, Fbi Report, Fbi Ranks, Fbi Recruiting, Fbi Raid, Fbi Records, Fbi Rape Statistics, Fbi Russia Trump, Fbi Salary, Fbi Special Agent, Fbi Stands For, Fbi Swat, Fbi Special Agent Salary, Fbi Surveillance, Fbi Statistics, Fbi Sos, Fbi Surveillance Van, Fbi Seal, Fbi Training, Fbi Top Ten, Fbi Trump, Fbi Trump Russia, Fbi Tip Line, Fbi Tv Shows, Fbi Twitter, Fbi Tips, Fbi Teen Academy, Fbi Tours, Fbi Ucr, Fbi Ucr 2016, Fbi Units, Fbi Ucr 2015, Fbi Undercover, Fbi Unsolved Cases, Fbi Upin, Fbi Utah, Fbi Usa, Fbi Uniforms, Fbi Vs Cia, Fbi Vault, Fbi Virus, Fbi Vs Apple, Fbi Virtual Academy, Fbi Vehicles, Fbi Violent Crime Statistics, Fbi Virginia, Fbi Van, Fbi Van Wifi, Fbi Website, Fbi Warning, Fbi Wiki, Fbi Wanted List, Fbi Watch List, Fbi Windbreaker, Fbi Warning Screen, Fbi White Collar Crime, Fbi Warrant Search, Fbi Weapons, Fbi X Files, Fbi Xl2, Fbi Xl31, Fbi Xl4, Fbi Xl2 Programming, Fbi Xl-31 Troubleshooting, Fbi Xl 31 Installation Manual, Fbi X Files Real, Fbi Xl2t Installation Manual, Fbi Xl 1215, Fbi Yearly Salary, Fbi Youtube, Fbi Youth Academy, Fbi Youth Leadership Academy, Fbi Yellow Brick Road, Fbi Youth Programs, Fbi Yearly Budget, Fbi Youth Leadership Academy Portland, Fbi Youngstown Ohio, Fbi Yearly Income, Fbi Zodiac Killer, Fbi Zodiac, Fbi Zip Code, Fbi Zodiac Killer List, Fbi Zero Files, Fbi Zodiac List, Fbi Zodiac Signs Killer, Fbi Zhang Yingying, Fbi Zion, Fbi Zodiac Crimes, Cybercrime Definition, Cybercrime Statistics, Cybercrime Prevention, Cybercrime Articles, Cybercrime Jobs, Cybercrime Law, Cybercrime Statistics 2017, Cyber Crime Cases, Cyber Crime News, Cybercrime Topics, Cybercrime Articles, Cybercrime And Security, Cybercrime As A Service, Cybercrime And Digital Forensics An Introduction, Cybercrime And Digital Forensics, Cybercrime And Society, Cybercrime And Terrorism, Cybercrime Attacks, Cybercrime Act, Cybercrime Against Businesses, Cyber Crime Batman, Cyber Crime Book, Cybercrime Blog, Cybercrime Bill, Cybercrime Banks, Cybercrime Background, Cyber Crime By Country, Cybercrime Bangalore, Cybercrime Billion Dollar Industry, Cybercrime Background Information, Cyber Crime Cases, Cybercrime Certification, Cybercrime Convention, Cybercrime Careers, Cybercrime Cost, Cybercrime Cafe, Cybercrime Cost 2016, Cybercrime China, Cybercrime Conference, Cybercrime Conclusion, Cybercrime Definition, Cybercrime Definition Computer, Cybercrime Definition Fbi, Cyber Crime Data, Cybercrime Degrees, Cybercrime Definition Pdf, Cybercrime Database, Cyber Crime Detective, Cyber Crime Documentary, Cyber Crime Department, Cybercrime Example, Cyber Crime Essay, Cybercrime Effects, Cybercrime Events, Cybercrime Enforcement, Cybercrime Economy, Cyber Crime Ethics, Cybercrime Effects On Business, Cybercrime Ecosystem, Cybercrime Enforcement Training Assistance Act, Cybercrime Facts, Cybercrime Fbi, Cybercrime Forensics, Cybercrime Forum, Cybercrime Forensics Training Center, Cybercrime Federal Laws, Cyber Crime Fiction, Cybercrime Financial Services, Cybercrime Future Trends, Cybercrime Fiji, Cybercrime Gets Personal Money Magazine, Cybercrime Gets Personal, Cybercrime Growth, Cyber Crime Graph, Cybercrime Groups, Cybercrime Government, Cybercrime Global Statistics, Cyber Crime Gov, Cyber Crime Games, Cybercrime Gif, Cybercrime Hacking, Cyber Crime History, Cybercrime Help, Cybercrime Healthcare, Cybercrime Hyderabad, Cybercrime How To Report, Cyber Crime Hotline, Cybercrime Hacking News, Cyber Crime Head Office India, Cybercrime Hacking And Cracking, Cybercrime Identity Theft, Cybercrime In The Us, Cyber Crime Investigation, Cybercrime Images, Cyber Crime Insurance, Cybercrime Is Also Known As, Cybercrime Investigating High-technology Computer Crime, Cybercrime Infographic, Cybercrime Information, Cyber Crime In Russia, Cybercrime Jobs, Cybercrime Jurisdiction, Cybercrime Journal Articles, Cybercrime Job Description, Cybercrime Jobs Salary, Cybercrime Job Openings, Cybercrime Jobs In Chennai, Cybercrime Job Qualification, Cybercrime Journal Articles Pdf, Cyber Crime Jamaica, Cybercrime Kenya, Cybercrime Key Issues And Debates, Cybercrime Kuwait, Cybercrime Ki Dhara, Cybercrime Key Issues And Debates Pdf, Cybercrime Kasus, Cyber Crime Karnataka, Cybercrime Kartu Kredit, Cybercrime Kolkata, Cyber Crime Karachi, Cybercrime Law, Cybercrime Laws In Usa, Cybercrime Law Enforcement, Cybercrime Laws Of The United States, Cybercrime List, Cybercrime Legislation Us, Cybercrime Laws In Florida, Cybercrime Legal Issues, Cybercrime Law Outline, Cyber Crime Lesson Plans, Cybercrime Meaning, Cyber Crime Movies, Cybercrime Methods, Cybercrime Methodology, Cyber Crime Money, Cybercrime Markets, Cyber Crime Magazine, Cyber Crime Most Wanted, Cybercrime Meaning In Tamil, Cybercrime Masters Degree, Cyber Crime News, Cyber Crime News Articles, Cyber Crime News Articles 2017, Cyber Crime Netflix, Cybercrime Nigeria, Cyber Crime Novels, Cybercrime Number, Cybercrime Nhs, Cyber Crime News Philippines, Cybercrime Nbi, Cybercrime Or Cyber Crime, Cybercrime Organizations, Cybercrime On The Rise, Cybercrime On The High Seas, Cybercrime Offenses, Cyber Crime Outline, Cybercrime Office, Cybercrime Office In Ahmedabad, Cybercrime Office In Patna, Cybercrime Office In Nashik, Cybercrime Quotes, Cyber Crime Quizlet, Cybercrime Questions, Cyber Crime Quiz, Cybercrime Questionnaire, Cybercrime Question Paper, Cybercrime Qatar, Cybercrime Question And Answers, Cybercrime Report, Cybercrime Research Paper, Cyber Crime Rates, Cyber Crime Recent, Cybercrime Research Topics, Cybercrime Research, Cybercrime Reported To The Ic3, Cybercrime Resources, Cybercrime Riding Tax Season Tides, Cyber Crime Report 2016, Cybercrime Statistics, Cybercrime Statistics 2017, Cyber Crime Stories, Cybercrime Spyware, Cybercrime Statistics 2015, Cybercrime Security, Cybercrime Solutions, Cybercrime Salary, Cybercrime Small Business, Cyber Crime Synonym, Cybercrime Topics, Cybercrime Trends, Cybercrime Tracker, Cybercrime Treaty, Cyber Crime Types, Cybercrime Training, Cybercrime Threats, Cybercrime Tools, Cybercrime Terms, Cybercrime The Transformation Of Crime In The Information Age, Cyber Crime Unit, Cybercrime Us, Cybercrime Uk, Cybercrime Uae, Cybercrime University, Cybercrime Un, Cyber Crime Unit Mauritius, Cyber Crime Unit Malta, Cybercrime Uc, Cybercrime Unodc, Cybercrime Victims, Cybercrime Vs Traditional Crime, Cybercrime Videos, Cybercrime Vs Traditional Crime Statistics, Cybercrime Virus, Cyber Crime Vocabulary, Cybercrime Vs Traditional Crime Punishment, Cybercrime Vs Computer Crime, Cybercrime Vs Cyber Warfare, Cybercrime Vs Cyber Espionage, Cybercrime Wiki, Cybercrime Worm, Cybercrime World Wide War 3.0, Cyber Crime Websites, Cyber Crime Worksheet, Cybercrime Wallpaper, Cyber Crime Worldwide, Cybercrime Working Group, Cyber Crime What Is It, Cybercrime Wikipedia Indonesia, Cybercrime X-remote Download, Tedx Cybercrime, Cyber Crime Youtube, Cyber Crime Yahoo, Cyber Crime Yahoo Answers, Cyber Crime Yesterday, Cyber Crime Youth, Cybercrime Yang Menyerang Hak Cipta, Cybercrime Yar, Youth Cyber Crime, Cyber Crime Yogyakarta, Cybercrime Yang Menyerang Pemerintah, Cybercrime Zimbabwe, Cybercrime Zeus, Cybercrime Zimbra, Zurich Cyber Crime, Zimbabwe Cybercrime Bill, Cyber Crime In Zambia, New Zealand Cyber Crime, Los Zetas Cybercrime, Cybercrime Law In Zambia, Cyber Crime Cases In Zambia
Page Count: 19 pages Date: May 23, 2016 Restriction: TLP: GREEN Originating Organization: Federal Bureau of Investigation, Cyber Division File Type: pdf File Size: 751,757 bytes File Hash (SHA-256):B10AF987BF17BA217DED942BA847D9CF6DB8B38A0AE40B937FA4B031CB79EFC8
The FBI is providing the following information with HIGH confidence:
The FBI has obtained information regarding a malicious cyber group that has compromised the networks of foreign banks. The actors have exploited vulnerabilities in the internal environments of the banks and initiated unauthorized monetary transfers over an international payment messaging system. In some instances, the actors have been present on victim networks for a significant period of time. Contact law enforcement immediately regarding any activity related to the indicators of compromise (IOCs) in the attached appendix that are associated with this group.
Technical Details
The FBI is providing the following information with HIGH confidence:
The enclosed IOCs have been employed by a cyber group linked to intrusions at foreign banks. Malicious insiders or external attackers have managed to submit international payment messages from financial institutions’ back-offices, PCs or workstations connected to their local interface to the international payment messaging system network. The group utilized malware that appears to have been customized for each victim environment. The malware is designed to hide evidence by removing some of the traces of the fraudulent messages. The observed malware samples were designed to securely delete themselves once they completed their tasks, removing evidence of their existence. Additionally, the intruders appear to have performed extensive network reconnaissance using remote access Trojans, keyloggers, screen grabbers, and a variety of legitimate Windows system administration utilities. In addition to these IOCs, the FBI recommends recipient organizations be alert to any changes to directories where international payment messaging system software has been installed.
…
Recommended Mitigations for Institutions with Connections to Payment Messaging Systems
Logically Segregate Your Operating Environment
Use firewalls to divide your operating environment into enclaves.
Use access control lists to permit/deny specific traffic from flowing between those enclaves.
Give special consideration to segregating enclaves holding sensitive information (for example, systems with customer records) from enclaves that require Internet connectivity (for example, email systems)
Isolate Payment Messaging Platforms
For institutions that access payment messaging platforms through private networks, confirm perimeter security controls prevent Internet hosts from accessing the private network infrastructure.
For institutions that access payment messaging platforms over the Internet, confirm perimeter security controls prevent Internet hosts other than payment messaging platform endpoints from accessing the infrastructure used for payment system access.
Routinely Confirm the Integrity of Secondary Security Controls
Perform monthly validation of transactional integrity systems, such as printers or secondary storage systems.
Perform monthly validation of payment messaging activity by performing telephone confirmation of transfer activity.
Routinely Test Operating Protocols
Confirm staffing plans for non-business, non-critical operating hours.
Ensure staff members understand payment messaging transfer protocols, along with emergency transfer protocols.
Monitor for Anomalous Behavior as Part of Layered Security
Develop baseline of expected software, users and logons. Monitor hosts running payment applications for unusual software installations, updates, account changes, or other activities outside of expected behavior.
Develop baseline of expected transaction participants, amounts, frequency and timing. Monitor and flag anomalous transactions for suspected fraudulent activity.
Recommended Mitigations for All Alert Recipients
The FBI is providing the following information with HIGH confidence:
Prepare Your Environment for Incident Response
Establish Out-of-Band Communications methods for dissemination of intrusion response plans and activities, inform NOCs/CERTs according to institutional policy and SOPs.
Maintain and actively monitor centralized host and network logging solutions after ensuring that all devices have logging enabled and their logs are being aggregated to those centralized solutions.
Disable all remote (including RDP) access until a password change has been completed.
Implement full SSL/TLS inspection capability (on perimeter and proxy devices).
Monitor accounts and devices determined to be part of the compromise to prevent reacquisition attempts.
Implement core mitigations to inhibit re-exploitation (within 72 hours)
Implement a network-wide password reset (preferably with local host access only, no remote changes allowed) to include:
A patch management process that regularly patches vulnerable software remains a critical component in raising the difficulty of intrusions for cyber operators. While a few adversaries use zero-day exploits to target victims, many adversaries still target known vulnerabilities for which patches have been released, capitalizing on slow patch processes and risk decisions by network owners not to patch certain vulnerabilities or systems.
After initial response activities, deploy and correctly configure Microsoft’s Enhanced Mitigation Experience Toolkit (EMET). EMET employs several mitigation techniques to combat memory corruption techniques. It is recommended that all hosts and servers on the network implement EMET, but for recommendations on the best methodology to employ when deploying EMET, please see NSA/IAD’s Anti-Exploitation Slick sheet – https://www.nsa.gov/ia/_files/factsheets/I43V_Slick_Sheets/Slicksheet_AntiExploitationFeatures_Web.pdf
Implement Data-At-Rest (DAR) Protections.
The goal for DAR protections is to prevent an attacker from compromising sensitive data when the End User Device (EUD) is powered off or unauthenticated.
The use of multiple encryption layers that meet IAD and CNSSP-15 guidance, implemented with components meeting the Commercial Solution for Classified (CSfC) vendor diversity requirements, reduces the likelihood that a single vulnerability or failure can be exploited to compromise EUDs, move laterally through a network, and access sensitive data.
Receiving and validating updates or code patches for these components only through direct physical administration or an NSA approved Data in Transit (DIT) solution mitigates the threat of malicious attempts to push unverified updates or code updates.
Procure products that have been validated through NIAP’s DAR Protection Profiles (PPs) and utilize the DAR Capability Package (CP) that provides configurations allowing customers to independently implement secure solutions using layered Commercial Off-the-Shelf (COTS) products. The CP is vendor-agnostic and provides high-level security and configuration guidance for customers and/or Solution Integrators.
Implement long-term mitigations to further harden systems
1. Protect Credentials: By implementing the following credential protections, the threat actor’s ability to gain highly privileged account access and move throughout a network is severely hampered.
a. Implement Least Privilege: Least privilege is the limiting of rights assigned to each group of accounts on a network to only the rights required for the user, as in a normal user is only granted user level privileges and cannot perform any administrative tasks such as installing software.
b. Restrict Local Accounts: By restricting the usage of local accounts, especially local administer accounts, you are able to reduce the amount of usable credentials found within a network. When utilizing local accounts, passwords and their corresponding hashes are stored on the host and are more readily available for harvesting by an adversary who seeks to establish persistence. Adversaries are known to use this information to move across the network through Pass the Hash.
c. Limit lateral movement: This mitigation reduces the adversary’s ability to go from exploiting one machine to taking over the entire network. Host firewall rules, Active Directory structuring, and/or Group Policy settings, can be tailored to stop communications between systems and increase the survivability and defensibility of a network under attack.
d. Admin Access Segregation: Once an adversary gains administrator credentials, especially domain administrator credentials, the network becomes wide open to their malicious activity. By decreasing the surface area where administrator credentials can be stolen, through restricting where administrators can use their accounts and what they can use their accounts for, the threat actor will have a much harder time fully compromising a network. Having different passwords and credentials for user, local administrator, and domain administrator accounts prevents an adversary from reusing a stolen credential from one to gain more access.
e. Admin Access Protection: Using encrypted protocols across the network where credentials especially administrative credentials, are sent in the clear enables an adversary to grab them in transit and reuse them. Be sure to use encrypted protocols (e.g. HTTPS, SSH, RDP, SFTP, etc.) for all management connections where credentials are passed, and disable the use of unencrypted protocols (e.g. Telnet, FTP, HTTP, etc.).
f. Ensure Administrative Accounts do not have email accounts or Internet access.
g. Utilize Strong Authentication: By enforcing multi-factor authentication (e.g., using smart cards), especially for privileged account and remote access (e.g. VPNs), you dramatically reduce when and where stolen credentials can be reused by an adversary. Until then, create, enforce, and maintain strong password policies across the organization. The use of strong password policies must be mandated for all users and is especially critical for administrator accounts and service accounts. Passwords should be complex and contain a combination of letters, numbers, and special characters, and they should be of a sufficient length (greater than 14 characters); require regular password changes for all administrative and other privileged account; and prevent the reuse of usernames and passwords across multiple domains and/or multiple systems.
h. Log and Monitor Privileged Admin Account Usage: Implementing logging and monitoring capabilities on privileged accounts can provide insight to system owners and incident response professionals of account misuse and potential compromise by malicious actors. For instance it may be discovered that a domain admin is logging in at 2200 every night even though that admin is done working for the day and gone from the building. This mitigation would also enable discovery of any privileged admin accounts that were created by the actor for persistence.
i. Log and Monitor Use of Administrative Tools: Non-administrative use of built-in OS administrative tools should be locked down in accordance with applicable guidance and hardening policies. Use of these tools, such as Windows® PowerShell® and Windows Management Instrumentation Command-line (WMIC), should be logged and monitored to help enable early detection of a compromise. Though administration activities take place on a constant basis, certain behaviors, or sets of activities, in concert with others, are suspicious and can lead to a discovery of intrusion. For example, the ‘ping’ command by itself has legitimate uses. However, the ‘ping’ command followed by a PowerShell command from one workstation to another is very suspicious.
2. Segregate Networks and Functions:
a. Know Your Network: Enterprise networks often become unmanageable leading to inefficient administration and ineffective security. In order to have any sort of control over your network, you first need to know what and where everything is and does. Ensure information about your networks is documented and is updated regularly. Create an accurate list of ALL devices and ALL protocols that are running on your network. Identify network enclaves and examine your network trust relationships within and between those enclaves as well as with external networks to determine whether they are really necessary for your organization’s mission.
b. DMZ Isolation: By ensuring that the DMZ is properly segregated both through physical and logical network architecture and admin/user accounts, a network owner can greatly decrease the external attack surface. Since webservers and corresponding databases usually sit in this location and are also externally accessible, they regularly are the first target during CNO. If these systems are compromised and the DMZ is not configured properly or at all, it could mean the loss of the entire enterprise.
c. Network Function Segregation: A network owner should implement a tiered system when determining the switching within a network. This way the lower security systems, like user workstations or machines with email and internet access, cannot insecurely communicate with higher security systems like domain controllers and other member servers. This can be achieved through multiple methods including VLANs, physical network topologies, and firewall rule sets. In the same vein, networks need to apply the same segregation principle to the various tiers of accounts within a network, ensuring highly privileged accounts cannot access lower security tiered systems and low privilege accounts cannot access higher security tiered systems.
d. Limit Workstation-to-Workstation Communications: Pass-the-Hash (PtH) and other forms of legitimate credential reuse are serious vulnerabilities existing in all environments that implement Single Sign-on. PtH allows an attacker to reuse legitimate administrator or user credentials to move from system to system on a network without ever having to crack password. Once an attacker compromises a single host, s/he will typically reuse stolen hashed credentials to spread to other systems on the network, gain access to a privileged user’s workstation, grab domain administrator credentials, and subsequently take control of the entire environment. Limiting workstation-to-workstation communication will severely restrict attackers’ freedom of movement via techniques such as PtH. In general, limiting the number and type of communication flows between systems also aids in the detection of potentially malicious network activity. Because there are fewer allowed communication paths, abnormal flows become more apparent to attentive network defenders.
e. Perimeter Filtering: Perimeter filtering refers to properly implementing network security devices, such as proxies, firewall, web content filters, and IDS/IPS. The intent is to block malicious traffic from reaching a user’s machine and provide protection against data exfiltration and command and control.
f. Use Web Domain Name System (DNS) Reputation: Various commercial services offer feeds rating the trustworthiness of web domains. Enterprises can protect their hosts by screening web accesses against such services and redirecting dangerous web requests to a warning page. Inspection can be implemented at either the web proxy or browser level.
g. Restrict or Prevent Remote Admin Access: Prior to an intrusion, remote access should be severely restricted and highly monitored. Once an intrusion is detected, all remote administration should be completely disallowed. Not only does this clear up the network traffic coming and going from a network, it also allows the network defenders to determine that the remote administration activities are malicious and better track and block them.
3. Implement Application Whitelisting: Application whitelisting is the configuring of host system to only execute a specific, known set of code. Basically, if a program or executable code, such as a piece of malware, is not included in the whitelist it’s never allowed to run.
4. Install and correctly use EMET: One of the frequently used tactics by an adversary is to initially infect a host through spear-phishing and drive-by’s/water-holing websites. The best way to counter this initial exploitation is through the implementation of an anti-exploitation tool, such as Microsoft’s Enhanced Mitigation Experience Toolkit (EMET). These tools can render useless entire classes of malware and malicious TTP instead of eliminating one piece of malware at a time; an enormous boon to a network’s security.
5. Implement Host Intrusion Prevention System (HIPS) Rules: Standard signature-based host defenses are overwhelmed by exploit kits that continually morph attack components. HIPS technology focuses on threat behaviors and can better scale to entire sets of intrusion activities. For an enterprise with a well-configured and managed network, HIPS can be tuned to learn and allow normal network functionality while flagging anomalies characteristic of intrusions.
6. Centralize logging of all events: By pulling all of the system logs (such as Windows Event or Error logs, and any logs from security devices, such as SNORT, HIPS or firewall rule hits, as a few examples) into a centralized location that protects it from tampering and enables analytics, the network admin and intrusion response team would be able to more efficiently detect and understand the tools, tactics, and procedures of the adversary. This paper does not detail the entirety of logs that could be aggregated, however, specific recommendations of particular logs that should be targeted for aggregation can be obtained via consultation with the network’s Computer Network Defense-Service Provider (CND-SP) or with any of the organizations listed in the introduction of this section.
7. Take Advantage of Software Improvement: Apply patches for vulnerabilities as soon as they are released by the vendor. Upgrade as new versions of applications, software and operating systems become available. Delaying or ignoring patches for vulnerabilities considerably increases the chance of systems being exploited, in particular Internet/public facing systems (VPN, web, email servers). Open source research has shown that a working exploit is often available on the same day vulnerabilities are publicly disclosed, making it imperative to patch immediately. Vendors typically perform extensive testing of patches prior to release so misconceptions about negative effects on systems are often overstated. The cost of pre-deployment testing by the enterprise is miniscule compared to the potential costs incurred from a security breach. Application deployment and updating is becoming increasingly automated. Many operating systems and applications provide automatic update features to minimize the human factor.
8. Public Services Utilization: Enterprises are embracing the use of public services such as Cloud Storage and Social Networking Sites (SNS) as they offer capabilities not available with traditional software. These services also introduce a new set of vulnerabilities that must be considered. Open source reporting has shown these services to be an increasingly used vector for both malware delivery and data exfiltration. Establish a comprehensive public services policy and framework. Discover and document all the Cloud and Social Networking Services used and establish a policy that includes IT sanctioned sites permitted and prohibited within the enterprise as well as what is considered acceptable use. Integrate traffic logs to/from these sites into your centralized logging environment and implement analytics to detect and alert on potentially suspicious or abnormal traffic that could be indicative of a compromise.
9. Use a Standard Baseline: Implementing a uniform image with security already baked in and standardized applications affords the incident response team the ability to look at exploited machines and distinguish what is malicious vs. allowed. It also ensures that each machine on network is at least at a certain level of security prior to further customization for a user’s needs. Within the DoDIN this can be satisfied through the Unified Master Gold Disk, maintained and distributed through DISA.
10. Centralize logging of all events: By pulling all of the system logs, such as Windows Event or Error logs, and any logs from security devices, such as SNORT or firewall rule hits, into a centralized location, the network admin and intrusion response team would be able to more efficiently detect and understand the tools, tactics, and procedures of the adversary. Using this information then increases the responder’s ability to effectively corner and expel the adversary.
11. Data-at-Rest and Data-in-Transit Encryption: Implementing encryption for both data at rest and data in transit ensures that what is meant to be kept private stays private, whether it is stored on a disk or moving across a network. It means that exfiltration and espionage attempts can be thwarted since a threat actor cannot access the information.
Fbi Most Wanted, Fbi Jobs, Fbi Director, Fbi Salary, Fbi Agent, Fbi Background Check, Fbi Agent Salary, Fbi Headquarters, Fbi Special Agent, Fbi Internships, Fbi Agent, Fbi Agent Salary, Fbi Academy, Fbi Application, Fbi Analyst, Fbi Atlanta, Fbi Agent Jobs, Fbi Anon, Fbi Address, Fbi Arrests, Fbi Background Check, Fbi Badge, Fbi Bau, Fbi Building, Fbi Boston, Fbi Bap, Fbi Baltimore, Fbi Benefits, Fbi Budget, Fbi Building Dc, Fbi Careers, Fbi Crime Statistics, Fbi Clearance, Fbi Criminal Background Check, Fbi Chicago, Fbi Citizens Academy, Fbi Crime Statistics By Race, Fbi Contact, Fbi Channeler, Fbi Candidates, Fbi Director, Fbi Director Candidates, Fbi Director James Comey, Fbi Definition, Fbi Director Fired, Fbi Director Salary, Fbi Definition Of Terrorism, Fbi Database, Fbi Dallas, Fbi Drug Policy, Fbi Employment, Fbi Email Address, Fbi Employment Drug Policy, Fbi El Paso, Fbi Employees, Fbi Emblem, Fbi Established, Fbi Education Center, Fbi Education, Fbi Executive Branch, Fbi Fingerprinting, Fbi Files, Fbi Field Offices, Fbi Fingerprint Card, Fbi Fitness Test, Fbi Facebook, Fbi Fingerprint Check, Fbi Forensic Accountant, Fbi Foia, Fbi Founder, Fbi Glock, Fbi Games, Fbi Gov, Fbi Glassdoor, Fbi Guns, Fbi Gang List, Fbi Gun Statistics, Fbi Gif, Fbi Gift Shop, Fbi General Counsel, Fbi Headquarters, Fbi Hrt, Fbi History, Fbi Houston, Fbi Hiring, Fbi Hate Crime Statistics, Fbi Head, Fbi Hat, Fbi Honors Internship, Fbi Hotline, Fbi Internships, Fbi Investigation, Fbi Intelligence Analyst, Fbi Informant, Fbi Irt, Fbi Investigation Trump, Fbi Ic3, Fbi Infragard, Fbi Internet Fraud, Fbi Id, Fbi Jobs, Fbi Jacket, Fbi James Comey, Fbi Jurisdiction, Fbi Job Description, Fbi Jobs Apply, Fbi Jacksonville, Fbi Jade Helm, Fbi Jobs Chicago, Fbi Jackson Ms, Fbi Kansas City, Fbi Kids, Fbi Knoxville, Fbi Kidnapping, Fbi Komi, Fbi Kentucky, Fbi Killed Jfk, Fbi Kkk, Fbi Kodi, Fbi K9 Unit, Fbi Logo, Fbi Leeda, Fbi Los Angeles, Fbi Locations, Fbi Las Vegas, Fbi Leaks, Fbi Leader, Fbi Linguist, Fbi Louisville, Fbi Login, Fbi Most Wanted, Fbi Most Wanted List, Fbi Meaning, Fbi Meme, Fbi Movies, Fbi Museum, Fbi Motto, Fbi Miami, Fbi Mission Statement, Fbi Most Dangerous Cities, Fbi Number, Fbi News, Fbi National Academy, Fbi Nics, Fbi New York, Fbi New Orleans, Fbi Newark, Fbi New York Tv Show, Fbi Near Me, Fbi Nominee, Fbi Offices, Fbi Org Chart, Fbi Omaha, Fbi Operative, Fbi On Trump, Fbi Organizational Chart, Fbi Obama Meme, Fbi Obama, Fbi Oklahoma City, Fbi Office Near Me, Fbi Phone Number, Fbi Profiler, Fbi Pft, Fbi Police, Fbi Pay Scale, Fbi Phoenix, Fbi Pay, Fbi Philadelphia, Fbi Positions, Fbi Pittsburgh, Fbi Quantico, Fbi Qualifications, Fbi Q Target, Fbi Quotes, Fbi Quiz, Fbi Questions, Fbi Qr Code, Fbi Qas, Fbi Quantico Address, Fbi Quantico Tours, Fbi Requirements, Fbi Russia, Fbi Russia Investigation, Fbi Report, Fbi Ranks, Fbi Recruiting, Fbi Raid, Fbi Records, Fbi Rape Statistics, Fbi Russia Trump, Fbi Salary, Fbi Special Agent, Fbi Stands For, Fbi Swat, Fbi Special Agent Salary, Fbi Surveillance, Fbi Statistics, Fbi Sos, Fbi Surveillance Van, Fbi Seal, Fbi Training, Fbi Top Ten, Fbi Trump, Fbi Trump Russia, Fbi Tip Line, Fbi Tv Shows, Fbi Twitter, Fbi Tips, Fbi Teen Academy, Fbi Tours, Fbi Ucr, Fbi Ucr 2016, Fbi Units, Fbi Ucr 2015, Fbi Undercover, Fbi Unsolved Cases, Fbi Upin, Fbi Utah, Fbi Usa, Fbi Uniforms, Fbi Vs Cia, Fbi Vault, Fbi Virus, Fbi Vs Apple, Fbi Virtual Academy, Fbi Vehicles, Fbi Violent Crime Statistics, Fbi Virginia, Fbi Van, Fbi Van Wifi, Fbi Website, Fbi Warning, Fbi Wiki, Fbi Wanted List, Fbi Watch List, Fbi Windbreaker, Fbi Warning Screen, Fbi White Collar Crime, Fbi Warrant Search, Fbi Weapons, Fbi X Files, Fbi Xl2, Fbi Xl31, Fbi Xl4, Fbi Xl2 Programming, Fbi Xl-31 Troubleshooting, Fbi Xl 31 Installation Manual, Fbi X Files Real, Fbi Xl2t Installation Manual, Fbi Xl 1215, Fbi Yearly Salary, Fbi Youtube, Fbi Youth Academy, Fbi Youth Leadership Academy, Fbi Yellow Brick Road, Fbi Youth Programs, Fbi Yearly Budget, Fbi Youth Leadership Academy Portland, Fbi Youngstown Ohio, Fbi Yearly Income, Fbi Zodiac Killer, Fbi Zodiac, Fbi Zip Code, Fbi Zodiac Killer List, Fbi Zero Files, Fbi Zodiac List, Fbi Zodiac Signs Killer, Fbi Zhang Yingying, Fbi Zion, Fbi Zodiac Crimes, Cybercrime Definition, Cybercrime Statistics, Cybercrime Prevention, Cybercrime Articles, Cybercrime Jobs, Cybercrime Law, Cybercrime Statistics 2017, Cyber Crime Cases, Cyber Crime News, Cybercrime Topics, Cybercrime Articles, Cybercrime And Security, Cybercrime As A Service, Cybercrime And Digital Forensics An Introduction, Cybercrime And Digital Forensics, Cybercrime And Society, Cybercrime And Terrorism, Cybercrime Attacks, Cybercrime Act, Cybercrime Against Businesses, Cyber Crime Batman, Cyber Crime Book, Cybercrime Blog, Cybercrime Bill, Cybercrime Banks, Cybercrime Background, Cyber Crime By Country, Cybercrime Bangalore, Cybercrime Billion Dollar Industry, Cybercrime Background Information, Cyber Crime Cases, Cybercrime Certification, Cybercrime Convention, Cybercrime Careers, Cybercrime Cost, Cybercrime Cafe, Cybercrime Cost 2016, Cybercrime China, Cybercrime Conference, Cybercrime Conclusion, Cybercrime Definition, Cybercrime Definition Computer, Cybercrime Definition Fbi, Cyber Crime Data, Cybercrime Degrees, Cybercrime Definition Pdf, Cybercrime Database, Cyber Crime Detective, Cyber Crime Documentary, Cyber Crime Department, Cybercrime Example, Cyber Crime Essay, Cybercrime Effects, Cybercrime Events, Cybercrime Enforcement, Cybercrime Economy, Cyber Crime Ethics, Cybercrime Effects On Business, Cybercrime Ecosystem, Cybercrime Enforcement Training Assistance Act, Cybercrime Facts, Cybercrime Fbi, Cybercrime Forensics, Cybercrime Forum, Cybercrime Forensics Training Center, Cybercrime Federal Laws, Cyber Crime Fiction, Cybercrime Financial Services, Cybercrime Future Trends, Cybercrime Fiji, Cybercrime Gets Personal Money Magazine, Cybercrime Gets Personal, Cybercrime Growth, Cyber Crime Graph, Cybercrime Groups, Cybercrime Government, Cybercrime Global Statistics, Cyber Crime Gov, Cyber Crime Games, Cybercrime Gif, Cybercrime Hacking, Cyber Crime History, Cybercrime Help, Cybercrime Healthcare, Cybercrime Hyderabad, Cybercrime How To Report, Cyber Crime Hotline, Cybercrime Hacking News, Cyber Crime Head Office India, Cybercrime Hacking And Cracking, Cybercrime Identity Theft, Cybercrime In The Us, Cyber Crime Investigation, Cybercrime Images, Cyber Crime Insurance, Cybercrime Is Also Known As, Cybercrime Investigating High-technology Computer Crime, Cybercrime Infographic, Cybercrime Information, Cyber Crime In Russia, Cybercrime Jobs, Cybercrime Jurisdiction, Cybercrime Journal Articles, Cybercrime Job Description, Cybercrime Jobs Salary, Cybercrime Job Openings, Cybercrime Jobs In Chennai, Cybercrime Job Qualification, Cybercrime Journal Articles Pdf, Cyber Crime Jamaica, Cybercrime Kenya, Cybercrime Key Issues And Debates, Cybercrime Kuwait, Cybercrime Ki Dhara, Cybercrime Key Issues And Debates Pdf, Cybercrime Kasus, Cyber Crime Karnataka, Cybercrime Kartu Kredit, Cybercrime Kolkata, Cyber Crime Karachi, Cybercrime Law, Cybercrime Laws In Usa, Cybercrime Law Enforcement, Cybercrime Laws Of The United States, Cybercrime List, Cybercrime Legislation Us, Cybercrime Laws In Florida, Cybercrime Legal Issues, Cybercrime Law Outline, Cyber Crime Lesson Plans, Cybercrime Meaning, Cyber Crime Movies, Cybercrime Methods, Cybercrime Methodology, Cyber Crime Money, Cybercrime Markets, Cyber Crime Magazine, Cyber Crime Most Wanted, Cybercrime Meaning In Tamil, Cybercrime Masters Degree, Cyber Crime News, Cyber Crime News Articles, Cyber Crime News Articles 2017, Cyber Crime Netflix, Cybercrime Nigeria, Cyber Crime Novels, Cybercrime Number, Cybercrime Nhs, Cyber Crime News Philippines, Cybercrime Nbi, Cybercrime Or Cyber Crime, Cybercrime Organizations, Cybercrime On The Rise, Cybercrime On The High Seas, Cybercrime Offenses, Cyber Crime Outline, Cybercrime Office, Cybercrime Office In Ahmedabad, Cybercrime Office In Patna, Cybercrime Office In Nashik, Cybercrime Quotes, Cyber Crime Quizlet, Cybercrime Questions, Cyber Crime Quiz, Cybercrime Questionnaire, Cybercrime Question Paper, Cybercrime Qatar, Cybercrime Question And Answers, Cybercrime Report, Cybercrime Research Paper, Cyber Crime Rates, Cyber Crime Recent, Cybercrime Research Topics, Cybercrime Research, Cybercrime Reported To The Ic3, Cybercrime Resources, Cybercrime Riding Tax Season Tides, Cyber Crime Report 2016, Cybercrime Statistics, Cybercrime Statistics 2017, Cyber Crime Stories, Cybercrime Spyware, Cybercrime Statistics 2015, Cybercrime Security, Cybercrime Solutions, Cybercrime Salary, Cybercrime Small Business, Cyber Crime Synonym, Cybercrime Topics, Cybercrime Trends, Cybercrime Tracker, Cybercrime Treaty, Cyber Crime Types, Cybercrime Training, Cybercrime Threats, Cybercrime Tools, Cybercrime Terms, Cybercrime The Transformation Of Crime In The Information Age, Cyber Crime Unit, Cybercrime Us, Cybercrime Uk, Cybercrime Uae, Cybercrime University, Cybercrime Un, Cyber Crime Unit Mauritius, Cyber Crime Unit Malta, Cybercrime Uc, Cybercrime Unodc, Cybercrime Victims, Cybercrime Vs Traditional Crime, Cybercrime Videos, Cybercrime Vs Traditional Crime Statistics, Cybercrime Virus, Cyber Crime Vocabulary, Cybercrime Vs Traditional Crime Punishment, Cybercrime Vs Computer Crime, Cybercrime Vs Cyber Warfare, Cybercrime Vs Cyber Espionage, Cybercrime Wiki, Cybercrime Worm, Cybercrime World Wide War 3.0, Cyber Crime Websites, Cyber Crime Worksheet, Cybercrime Wallpaper, Cyber Crime Worldwide, Cybercrime Working Group, Cyber Crime What Is It, Cybercrime Wikipedia Indonesia, Cybercrime X-remote Download, Tedx Cybercrime, Cyber Crime Youtube, Cyber Crime Yahoo, Cyber Crime Yahoo Answers, Cyber Crime Yesterday, Cyber Crime Youth, Cybercrime Yang Menyerang Hak Cipta, Cybercrime Yar, Youth Cyber Crime, Cyber Crime Yogyakarta, Cybercrime Yang Menyerang Pemerintah, Cybercrime Zimbabwe, Cybercrime Zeus, Cybercrime Zimbra, Zurich Cyber Crime, Zimbabwe Cybercrime Bill, Cyber Crime In Zambia, New Zealand Cyber Crime, Los Zetas Cybercrime, Cybercrime Law In Zambia, Cyber Crime Cases In Zambia
FACT SHEET: Presidential Policy Directive on United States Cyber Incident Coordination
The new directive spells out how the Federal government will coordinate its incident response activities in the event of a large-scale cyber incidentToday, the President approved a Presidential Policy Directive (PPD) on United States Cyber Incident Coordination. This new PPD marks a major milestone in codifying the policy that governs the Federal government’s response to significant cyber incidents.
Since the beginning of his Administration, President Obama has emphasized that malicious cyber activity poses a serious threat to the national and economic security of the United States. As set forth in the Cybersecurity National Action Plan, over the last seven and a half years the Administration’s cyber policy has been based on three strategic pillars: raising the level of cybersecurity in our public, private, and consumer sectors, in both the short and the long-term; taking steps to deter, disrupt, and interfere with malicious cyber activity aimed at the United States or its allies; and responding effectively to and recovering from cyber incidents.
Even as we have made progress on all three pillars, the United States has been faced with managing increasingly significant cyber incidents affecting both the private sector and Federal government. We have applied the lessons learned from these events, as well as our experience in other areas such as counterterrorism and disaster response. That experience has allowed us to hone our approach but also demonstrated that significant cyber incidents demand a more coordinated, integrated, and structured response. We have also heard from the private sector the need to provide clarity and guidance about the Federal government’s roles and responsibilities. The PPD builds on these lessons and institutionalizes our cyber incident coordination efforts in numerous respects, including:
Establishing clear principles that will govern the Federal government’s activities in cyber incident response;
Differentiating between significant cyber incidents and steady-state incidents and applying the PPD’s guidance primarily to significant incidents;
Categorizing the government’s activities into specific lines of effort and designating a lead agency for each line of effort in the event of a significant cyber incident;
Creating mechanisms to coordinate the Federal government’s response to significant cyber incidents, including a Cyber Unified Coordination Group similar in concept to what is used for incidents with physical effects, and enhanced coordination procedures within individual agencies;
Applying these policies and procedures to incidents where a Federal department or agency is the victim; and,
Ensuring that our cyber response activities are consistent and integrated with broader national preparedness and incident response policies, such as those implemented through Presidential Policy Directive 8-National Preparedness, so that our response to a cyber incident can seamlessly integrate with actions taken to address physical consequences caused by malicious cyber activity.
We also are releasing today a cyber incident severity schema that establishes a common framework within the Federal government for evaluating and assessing the severity of cyber incidents and will help identify significant cyber incidents to which the PPD’s coordination procedures would apply.
Incident Response Principles
The PPD outlines five principles that will guide the Federal government during any cyber incident response:
Shared Responsibility – Individuals, the private sector, and government agencies have a shared vital interest and complementary roles and responsibilities in protecting the Nation from malicious cyber activity and managing cyber incidents and their consequences.
Risk-Based Response – The Federal government will determine its response actions and resource needs based on an assessment of the risks posed to an entity, national security interests, foreign relations, or economy of the United States or to the public confidence, civil liberties, or public health and safety of the American people.
Respecting Affected Entities – Federal government responders will safeguard details of the incident, as well as privacy and civil liberties, and sensitive private sector information.
Unity of Effort – Whichever Federal agency first becomes aware of a cyber incident will rapidly notify other relevant Federal agencies in order to facilitate a unified Federal response and ensure that the right combination of agencies responds to a particular incident.
Enabling Restoration and Recovery – Federal response activities will be conducted in a manner to facilitate restoration and recovery of an entity that has experienced a cyber incident, balancing investigative and national security requirements with the need to return to normal operations as quickly as possible.
Significant Cyber Incidents
While the Federal government will adhere to the five principles in responding to any cyber incident, the PPD’s policies and procedures are aimed at a particular class of cyber incident: significant cyber incidents. A significant cyber incident is one that either singularly or as part of a group of related incidents is likely to result in demonstrable harm to the national security interests, foreign relations, or economy of the United States or to the public confidence, civil liberties, or public health and safety of the American people.
When a cyber incident occurs, determining its potential severity is critical to ensuring the incident receives the appropriate level of attention. No two incidents are the same and, particularly at the initial stages, important information, including the nature of the perpetrator, may be unknown.
Therefore, as part of the process of developing the incident response policy, the Administration also developed a common schema for describing the severity of cyber incidents, which can include credible reporting of a cyber threat, observed malicious cyber activity, or both. The schema establishes a common framework for evaluating and assessing cyber incidents to ensure that all Federal departments and agencies have a common view of the severity of a given incident, the consequent urgency of response efforts, and the need for escalation to senior levels.
The schema describes a cyber incident’s severity from a national perspective, defining six levels, zero through five, in ascending order of severity. Each level describes the incident’s potential to affect public health or safety, national security, economic security, foreign relations, civil liberties, or public confidence. An incident that ranks at a level 3 or above on this schema is considered “significant†and will trigger application of the PPD’s coordination mechanisms.
Lines of Effort and Lead Agencies
To establish accountability and enhance clarity, the PPD organizes Federal response activities into three lines of effort and establishes a Federal lead agency for each:
Threat response activities include the law enforcement and national security investigation of a cyber incident, including collecting evidence, linking related incidents, gathering intelligence, identifying opportunities for threat pursuit and disruption, and providing attribution. The Department of Justice, acting through the Federal Bureau of Investigation (FBI) and the National Cyber Investigative Joint Task Force (NCIJTF), will be the Federal lead agency for threat response activities.
Asset response activities include providing technical assets and assistance to mitigate vulnerabilities and reducing the impact of the incident, identifying and assessing the risk posed to other entities and mitigating those risks, and providing guidance on how to leverage Federal resources and capabilities. The Department of Homeland Security (DHS), acting through the National Cybersecurity and Communications Integration Center (NCCIC), will be the Federal lead agency for asset response activities. The PPD directs DHS to coordinate closely with the relevant Sector-Specific Agency, which will depend on what kind of organization is affected by the incident.
Intelligence Support and related activities include intelligence collection in support of investigative activities, and integrated analysis of threat trends and events to build situational awareness and to identify knowledge gaps, as well as the ability to degrade or mitigate adversary threat capabilities. The Office of the Director of National Intelligence, through the Cyber Threat Intelligence Integration Center, will be the Federal lead agency for intelligence support and related activities.
In addition to these lines of effort, a victim will undertake a wide variety of response activities in order to maintain business or operational continuity in the event of a cyber incident. We recognize that for the victim, these activities may well be the most important. Such efforts can include communications with customers and the workforce; engagement with stakeholders, regulators, or oversight bodies; and recovery and reconstitution efforts. When a Federal agency is a victim of a significant cyber incident, that agency will be the lead for this fourth line of effort. In the case of a private victim, the Federal government typically will not play a role in this line of effort, but will remain cognizant of the victim’s response activities consistent with these principles and coordinate with the victim.
Coordination Architecture
In order to facilitate the more coordinated, integrated response demanded by significant cyber incidents, the PPD establishes a three-tiered coordination architecture for handling those incidents:
National Policy Level: The PPD institutionalizes the National Security Council-chaired interagency Cyber Response Group (CRG). The CRG will coordinate the development and implementation of United States Government policy and strategy with respect to significant cyber incidents affecting the United States or its interests abroad.
National Operational Level: The PPD directs agencies to take two actions at the national operational level in the event of a significant cyber incident.
Activate enhanced internal coordination procedures. The PPD instructs agencies that regularly participate in the Cyber Response Group to develop these procedures to ensure that they can surge effectively when confronted with an incident that exceeds their day-to-day operational capacity.
Create a Unified Coordination Group. In the event of a significant cyber incident, the PPD provides that the lead agencies for each line of effort, along with relevant Sector-Specific Agencies (SSAs), state, local, tribal and territorial governments, international counterparts, and private sector entities, will form a Cyber Unified Coordination Group (UCG) to coordinate response activities. The Cyber UCG shall coordinate the development, prioritization, and execution of cyber response efforts, facilitate rapid information sharing among UCG members, and coordinate communications with stakeholders, including the victim entity.
Field Level: The PPD directs the lead agencies for each line of effort to coordinate their interaction with each other and with the affected entity.
Integration with Existing Response Policy
The PPD also integrates U.S. cyber incident coordination policy with key aspects of existing Federal preparedness policy to ensure that the Nation will be ready to manage incidents that include both cyber and physical effects, such as a significant power outage resulting from malicious cyber activity. The PPD will be implemented by the Federal government consistent with existing preparedness and response efforts.
Implementation tasks
The PPD also directs several follow-on tasks in order to ensure its full implementation. In particular, it requires that the Administration develop and finalize the National Cyber Incident Response Plan – in coordination with State, Local, Territorial, and Tribal governments, the private sector, and the public – to further detail how the government will manage cyber incidents affecting critical infrastructure. It also directs DHS and DOJ to develop a concept of operations for how a Cyber UCG will operate and for the NSC to update the charter for the CRG.
Presidential Policy Directive — United States Cyber Incident Coordination
July 26, 2016
PRESIDENTIAL POLICY DIRECTIVE/PPD-41
SUBJECT: United States Cyber Incident Coordination
The advent of networked technology has spurred innovation, cultivated knowledge, encouraged free expression, and increased the Nation’s economic prosperity. However, the same infrastructure that enables these benefits is vulnerable to malicious activity, malfunction, human error, and acts of nature, placing the Nation and its people at risk. Cyber incidents are a fact of contemporary life, and significant cyber incidents are occurring with increasing frequency, impacting public and private infrastructure located in the United States and abroad.
United States preparedness efforts have positioned the Nation to manage a broad range of threats and hazards effectively. Every day, Federal law enforcement and those agencies responsible for network defense in the United States manage, respond to, and investigate cyber incidents in order to ensure the security of our information and communications infrastructure. The private sector and government agencies have a shared vital interest in protecting the Nation from malicious cyber activity and managing cyber incidents and their consequences. The nature of cyberspace requires individuals, organizations, and the government to all play roles in incident response. Furthermore, effective incident response efforts will help support an open, interoperable, secure, and reliable information and communications infrastructure that promotes trade and commerce, strengthens international security, fosters free expression, and reinforces the privacy and security of our citizens.
While the vast majority of cyber incidents can be handled through existing policies, certain cyber incidents that have significant impacts on an entity, our national security, or the broader economy require a unique approach to response efforts. These significant cyber incidents demand unity of effort within the Federal Government and especially close coordination between the public and private sectors.
I. Scope
This Presidential Policy Directive (PPD) sets forth principles governing the Federal Government’s response to any cyber incident, whether involving government or private sector entities. For significant cyber incidents, this PPD also establishes lead Federal agencies and an architecture for coordinating the broader Federal Government response. This PPD also requires the Departments of Justice and Homeland Security to maintain updated contact information for public use to assist entities affected by cyber incidents in reporting those incidents to the proper authorities.
II. Definitions
Cyber incident. An event occurring on or conducted through a computer network that actually or imminently jeopardizes the integrity, confidentiality, or availability of computers, information or communications systems or networks, physical or virtual infrastructure controlled by computers or information systems, or information resident thereon. For purposes of this directive, a cyber incident may include a vulnerability in an information system, system security procedures, internal controls, or implementation that could be exploited by a threat source.
Significant cyber incident. A cyber incident that is (or group of related cyber incidents that together are) likely to result in demonstrable harm to the national security interests, foreign relations, or economy of the United States or to the public confidence, civil liberties, or public health and safety of the American people.
III. Principles Guiding Incident Response
In carrying out incident response activities for any cyber incident, the Federal Government will be guided by the following principles:
Shared Responsibility. Individuals, the private sector, and government agencies have a shared vital interest and complementary roles and responsibilities in protecting the Nation from malicious cyber activity and managing cyber incidents and their consequences.
Risk-Based Response. The Federal Government will determine its response actions and the resources it brings to bear based on an assessment of the risks posed to an entity, our national security, foreign relations, the broader economy, public confidence, civil liberties, or the public health and safety of the American people.
Respecting affected entities. To the extent permitted under law, Federal Government responders will safeguard details of the incident, as well as privacy and civil liberties, and sensitive private sector information, and generally will defer to affected entities in notifying other affected private sector entities and the public. In the event a significant Federal Government interest is served by issuing a public statement concerning an incident, Federal responders will coordinate their approach with the affected entities to the extent possible.
Unity of Governmental Effort. Various government entities possess different roles, responsibilities, authorities, and capabilities that can all be brought to bear on cyber incidents. These efforts must be coordinated to achieve optimal results. Whichever Federal agency first becomes aware of a cyber incident will rapidly notify other relevant Federal agencies in order to facilitate a unified Federal response and ensure that the right combination of agencies responds to a particular incident. State, local, tribal, and territorial (SLTT) governments also have responsibilities, authorities, capabilities, and resources that can be used to respond to a cyber incident; therefore, the Federal Government must be prepared to partner with SLTT governments in its cyber incident response efforts. The transnational nature of the Internet and communications infrastructure requires the United States to coordinate with international partners, as appropriate, in managing cyber incidents.
Enabling Restoration and Recovery. Federal response activities will be conducted in a manner to facilitate restoration and recovery of an entity that has experienced a cyber incident, balancing investigative and national security requirements, public health and safety, and the need to return to normal operations as quickly as possible.
IV. Concurrent Lines of Effort
In responding to any cyber incident, Federal agencies shall undertake three concurrent lines of effort: threat response; asset response; and intelligence support and related activities. In addition, when a Federal agency is an affected entity, it shall undertake a fourth concurrent line of effort to manage the effects of the cyber incident on its operations, customers, and workforce.
Threat response activities include conducting appropriate law enforcement and national security investigative activity at the affected entity’s site; collecting evidence and gathering intelligence; providing attribution; linking related incidents; identifying additional affected entities; identifying threat pursuit and disruption opportunities; developing and executing courses of action to mitigate the immediate threat; and facilitating information sharing and operational coordination with asset response.
Asset response activities include furnishing technical assistance to affected entities to protect their assets, mitigate vulnerabilities, and reduce impacts of cyber incidents; identifying other entities that may be at risk and assessing their risk to the same or similar vulnerabilities; assessing potential risks to the sector or region, including potential cascading effects, and developing courses of action to mitigate these risks; facilitating information sharing and operational coordination with threat response; and providing guidance on how best to utilize Federal resources and capabilities in a timely, effective manner to speed recovery.
Threat and asset responders will share some responsibilities and activities, which may include communicating with affected entities to understand the nature of the cyber incident; providing guidance to affected entities on available Federal resources and capabilities; promptly disseminating through appropriate channels intelligence and information learned in the course of the response; and facilitating information sharing and operational coordination with other Federal Government entities.
Intelligence support and related activities facilitate the building of situational threat awareness and sharing of related intelligence; the integrated analysis of threat trends and events; the identification of knowledge gaps; and the ability to degrade or mitigate adversary threat capabilities.
An affected Federal agency shall engage in a variety of efforts to manage the impact of a cyber incident, which may include maintaining business or operational continuity; addressing adverse financial impacts; protection of privacy; managing liability risks; complying with legal and regulatory requirements (including disclosure and notification); engaging in communications with employees or other affected individuals; and dealing with external affairs (e.g., media and congressional inquiries). The affected Federal agency will have primary responsibility for this line of effort.
When a cyber incident affects a private entity, the Federal Government typically will not play a role in this line of effort, but it will remain cognizant of the affected entity’s response activities, consistent with the principles above and in coordination with the affected entity. The relevant sector-specific agency (SSA) will generally coordinate the Federal Government’s efforts to understand the potential business or operational impact of a cyber incident on private sector critical infrastructure.
V. Architecture of Federal Government Response Coordination for Significant Cyber Incidents1
In order to respond effectively to significant cyber incidents, the Federal Government will coordinate its activities in three ways:
National Policy Coordination2The Cyber Response Group (CRG), in support of the National Security Council (NSC) Deputies and Principals Committees, and accountable through the Assistant to the President for Homeland Security and Counterterrorism (APHSCT) to the NSC chaired by the President, shall coordinate the development and implementation of United States Government policy and strategy with respect to significant cyber incidents affecting the United States or its interests abroad.
National Operational Coordination
Agency Enhanced Coordination Procedures. Each Federal agency that regularly participates in the CRG, including SSAs, shall establish and follow enhanced coordination procedures as defined in the annex to this PPD in situations in which the demands of responding to a significant cyber incident exceed its standing capacity.
Cyber Unified Coordination Group. A Cyber Unified Coordination Group (UCG) shall serve as the primary method for coordinating between and among Federal agencies in response to a significant cyber incident as well as for integrating private sector partners into incident response efforts, as appropriate. A Cyber UCG shall be formed at the direction of the NSC Principals Committee, Deputies Committee, or the CRG, or when two or more Federal agencies that generally participate in the CRG, including relevant SSAs, request its formation. A Cyber UCG shall also be formed when a significant cyber incident affects critical infrastructure owners and operators identified by the Secretary of Homeland Security as owning or operating critical infrastructure for which a cyber incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security.
A Cyber UCG will normally consist of Federal lead agencies for threat response, asset response, and intelligence support, but will also include SSAs, if a cyber incident affects or is likely to affect sectors they represent. In addition, as required by the scope, nature, and facts of a particular significant cyber incident, a Cyber UCG may include participation from other Federal agencies, SLTT governments, nongovernmental organizations, international counterparts, or the private sector.
Following the formation of a Cyber UCG, Federal agencies responding to the incident shall assign appropriate senior executives, staff, and resources to execute the agency’s responsibilities as part of a Cyber UCG. The Cyber UCG is intended to result in unity of effort and not to alter agency authorities or leadership, oversight, or command responsibilities. Unless mutually agreed upon between agency heads or their designees, and consistent with applicable legal authorities such as the Economy Act of 1932 (31 U.S.C. 1535), Federal departments and agencies will maintain operational control over their respective agency assets.
Federal lead agencies. In order to ensure that the Cyber UCG achieves maximum effectiveness in coordinating responses to significant cyber incidents, the following agencies shall serve as Federal lead agencies for the specified line of effort:
In view of the fact that significant cyber incidents will often involve at least the possibility of a nation-state actor or have some other national security nexus, the Department of Justice, acting through the Federal Bureau of Investigation and the National Cyber Investigative Joint Task Force, shall be the Federal lead agency for threat response activities.
The Department of Homeland Security, acting through the National Cybersecurity and Communications Integration Center, shall be the Federal lead agency for asset response activities.
The Office of the Director of National Intelligence, through the Cyber Threat Intelligence Integration Center, shall be the Federal lead agency for intelligence support and related activities.
Drawing upon the resources and capabilities across the Federal Government, the Federal lead agencies are responsible for:
Coordinating any multi-agency threat or asset response activities to provide unity of effort, to include coordinating with any agency providing support to the incident, to include SSAs in recognition of their unique expertise;
Ensuring that their respective lines of effort are coordinated with other Cyber UCG participants and affected entities, as appropriate;
Identifying and recommending to the CRG, if elevation is required, any additional Federal Government resources or actions necessary to appropriately respond to and recover from the incident; and
Coordinating with affected entities on various aspects of threat, asset, and affected entity response activities through a Cyber UCG, as appropriate.
Field-Level CoordinationField-level representatives of the Federal asset or threat response lead agencies shall ensure that they effectively coordinate their activities within their respective lines of effort with each other and the affected entity. Such representatives may be co-located with the affected entity.
VI. Unified Public Communications
The Departments of Homeland Security and Justice shall maintain and update as necessary a fact sheet outlining how private individuals and organizations can contact relevant Federal agencies about a cyber incident.
VII. Relationship to Existing Policy
Nothing in this directive alters, supersedes, or limits the authorities of Federal agencies to carry out their functions and duties consistent with applicable legal authorities and other Presidential guidance and directives. This directive generally relies on and furthers the implementation of existing policies and explains how United States cyber incident response structures interact with those existing policies. In particular, this policy complements and builds upon PPD-8 on National Preparedness of March 30, 2011. By integrating cyber and traditional preparedness efforts, the Nation will be ready to manage incidents that include both cyber and physical effects.
BARACK OBAMA
1 Additional details regarding the Federal Government’s coordination architecture for significant cyber incidents are contained in an annex to this PPD.
2 This sub-section supersedes NSPD-54/HSPD-23, paragraph 13, concerning the National Cyber Response Coordination Group.
Annex for Presidential Policy Directive — United States Cyber Incident Coordination
SUBJECT: Federal Government Coordination Architecture for Significant Cyber Incidents I. ScopeThis annex to PPD-41, United States Cyber Incident Coordination Policy, provides further details concerning the Federal Government coordination architecture for significant cyber incidents and prescribes certain implementation tasks.
II. Coordination Architecture
A. National Policy Coordination
The Cyber Response Group (CRG) shall be chaired by the Special Assistant to the President and Cybersecurity Coordinator (Chair), or an equivalent successor, and shall convene on a regular basis and as needed at the request of the Assistant to the President for Homeland Security and Counterterrorism and Deputy National Security Advisor. Federal departments and agencies, including relevant cyber centers, shall be invited to participate in the CRG, as appropriate, based on their respective roles, responsibilities, and expertise or in the circumstances of a given incident or grouping of incidents. CRG participants shall generally include senior representatives from the Departments of State, the Treasury, Defense (DOD), Justice (DOJ), Commerce, Energy, Homeland Security (DHS) and its National Protection and Programs Directorate, and the United States Secret Service, the Joint Chiefs of Staff, Office of the Director of National Intelligence, the Federal Bureau of Investigation, the National Cyber Investigative Joint Task Force, the Central Intelligence Agency, and the National Security Agency. The Federal Communications Commission shall be invited to participate should the Chair assess that its inclusion is warranted by the circumstances and to the extent the Commission determines such participation is consistent with its statutory authority and legal obligations.
The CRG shall:
Coordinate the development and implementation of the Federal Government’s policies, strategies, and procedures for responding to significant cyber incidents;
Receive regular updates from the Federal cybersecurity centers and agencies on significant cyber incidents and measures being taken to resolve or respond to those incidents;
Resolve issues elevated to it by subordinate bodies as may be established, such as a Cyber Unified Coordination Group (UCG);
Collaborate with the Counterterrorism Security Group and Domestic Resilience Group when a cross-disciplinary response to a significant cyber incident is required;
Identify and consider options for responding to significant cyber incidents, and make recommendations to the Deputies Committee, where higher-level guidance is required, in accordance with PPD-1 on Organization of the National Security Council System of February 13, 2009, or any successor; and
Consider the policy implications for public messaging in response to significant cyber incidents, and coordinate a communications strategy, as necessary, regarding a significant cyber incident.
B. National Operational Coordination
To promote unity of effort in response to a significant cyber incident, a Cyber UCG shall:
Coordinate the cyber incident response in a manner consistent with the principles described in section III of this directive;
Ensure all appropriate Federal agencies, including sector-specific agencies (SSAs), are incorporated into the incident response;
Coordinate the development and execution of response and recovery tasks, priorities, and planning efforts, including international and cross-sector outreach, necessary to respond appropriately to the incident and to speed recovery;
Facilitate the rapid and appropriate sharing of information and intelligence among Cyber UCG participants on the incident response and recovery activities;
Coordinate consistent, accurate, and appropriate communications regarding the incident to affected parties and stakeholders, including the public as appropriate; and
For incidents that include cyber and physical effects, form a combined UCG with the lead Federal agency or with any UCG established to manage the physical effects of the incident under the National Response Framework developed pursuant to PPD-8 on National Preparedness.
SSAs shall be members of the UCG for significant cyber incidents that affect or are likely to affect their respective sectors. As set forth in Presidential Policy Directive 21, the SSAs for critical infrastructure sectors are as follows: DHS (Chemical, Commercial Facilities, Communications, Critical Manufacturing, Dams, Emergency Services, Government Facilities, Information Technology, Nuclear Reactors, Materials, and Waste, and Transportation Systems); DOD (Defense Industrial Base); Department of Energy (Energy); Department of the Treasury (Financial Services); Department of Agriculture (Food and Agriculture); Department of Health and Human Services (Healthcare and Public Health, and Food and Agriculture); General Services Administration (Government Facilities); Department of Transportation (Transportation Systems); and the Environmental Protection Agency (Water and Wastewater Systems).
A Cyber UCG shall operate in a manner that is consistent with the need to protect intelligence and law enforcement sources, methods, operations, and investigations, the privacy of individuals, and sensitive private sector information.
A Cyber UCG shall dissolve when enhanced coordination procedures for threat and asset response are no longer required or the authorities, capabilities, or resources of more than one Federal agency are no longer required to manage the remaining facets of the Federal response to an incident.
III. Federal Government Response to Incidents Affecting Federal Networks
Nothing in this directive alters an agency’s obligations to comply with the requirements of the Federal Information Security Modernization Act of 2014 (FISMA) or Office of Management and Budget (OMB) guidelines related to responding to an “incident,†“breach,†or “major incident†as defined in that statute and OMB guidance. Federal agencies shall follow OMB guidance to determine whether an incident is considered a “major incident†pursuant to FISMA. If the cyber incident meets the threshold for a “major incident,†it is also a “significant cyber incident†for purposes of this directive and shall be managed in accordance with this directive.
A. Civilian Federal Networks
The Director of OMB oversees Federal agency information security policies and practices. The Secretary of Homeland Security, in consultation with the Director of OMB, administers the implementation of Federal agency information security policies and practices and operates the Federal information security incident center. The National Institute of Standards and Technology (NIST) develops standards and guidelines for Federal information systems that are mandatory for Federal agencies to implement.
Federal agencies shall respond to significant cyber incidents in accordance with this directive and applicable policies and procedures, including the reporting of incidents to DHS as required by the U.S. Computer Emergency Readiness Team Federal incident notification guidelines.
Where the effects of a significant cyber incident are limited to the operational activities of an individual Federal agency, that affected agency shall maintain primary authority over the affected assets and be responsible for managing the restoration services and related networks, systems, and applications and making the decision to restart an affected system. DHS and other Federal agencies shall provide support as appropriate.
Where a significant cyber incident has an impact on multiple Federal agencies or on the integrity, confidentiality, or availability of services to the public, the decision to restart an affected system rests with the owning Federal agency, but OMB and the Federal lead agencies for threat and asset response shall provide a consolidated, timely written recommendation, with appropriate caveats and conditions, to help inform that owning agency’s decision.
B. DOD Information Network
The Secretary of Defense shall be responsible for managing the threat and asset response to cyber incidents affecting the Department of Defense Information Network, including restoration activities, with support from other Federal agencies as appropriate.
C. Intelligence Community Networks
The Director of National Intelligence shall be responsible for managing the threat and asset response for the integrated defense of the Intelligence Community (IC) information environment through the Intelligence Community Security Coordination Center, in conjunction with IC mission partners and with support from other Federal agencies, as appropriate.
IV. Implementation and Assessment
Federal agencies shall take the following actions to implement this directive:
A. Charter
Within 90 days of the date of this directive, the National Security Council (NSC) staff shall update the CRG charter to account for and support the policy set forth herein, which shall be submitted to the President through the Assistant to the President for Homeland Security and Counterterrorism.
B. Enhanced Coordination Procedures
Each Federal agency that regularly participates in the CRG, including SSAs, shall ensure that it has the standing capacity to execute its role in cyber incident response. To prepare for situations in which the demands of a significant cyber incident exceed its standing capacity, each such agency shall, within 90 days of the date of this directive, establish enhanced coordination procedures that, when activated, bring dedicated leadership, supporting personnel, facilities (physical and communications), and internal processes enabling it to manage a significant cyber incident under demands that would exceed its capacity to coordinate under normal operating conditions.
Within 90 days of the date of this directive, the SSAs shall develop or update sector-specific procedures, as needed and in consultation with the sector(s), for enhanced coordination to support response to a significant cyber incident, consistent with this directive.
Enhanced coordination procedures shall identify the appropriate pathways for communicating with other Federal agencies during a significant cyber incident, including the relevant agency points-of-contact, and for notifying the CRG that enhanced coordination procedures were activated or initiated; highlight internal communications and decisionmaking processes that are consistent with effective incident coordination; and outline processes for maintaining these procedures.
In addition, each Federal agency’s enhanced coordination procedures shall identify the agency’s processes and existing capabilities to coordinate cyber incident response activities in a manner consistent with this directive. The procedures shall identify a trained senior executive to oversee that agency’s participation in a Cyber UCG. SSAs shall have a trained senior executive for each of the sectors for which it is the designated SSA under Presidential Policy Directive 21.
Within 120 days of the date of this directive, the SSAs shall coordinate with critical infrastructure owners and operators to synchronize sector-specific planning consistent with this directive.
C. Training
Within 150 days of the date of this directive, the Federal Emergency Management Agency shall make necessary updates to its existing Unified Coordination training to incorporate the tenets of this directive.
Within 150 days of the date of this directive, Federal agencies shall update cyber incident coordination training to incorporate the tenets of this directive.
Federal agencies shall identify and maintain a cadre of personnel qualified and trained in the National Incident Management System and Unified Coordination to manage and respond to a significant cyber incident. These personnel will provide necessary expertise to support tasking and decisionmaking by a Cyber UCG.
D. Exercises
Within 180 days of the date of this directive, Federal agencies shall incorporate the tenets of this policy in cyber incident response exercises. This will include exercises conducted as part of the National Exercise Program. Exercises shall be conducted at a frequency necessary to ensure Federal agencies are prepared to execute the plans and procedures called for under this directive. When appropriate, exercises shall consider the effectiveness of the end-to-end information sharing process.
E. Cyber UCG Post-Incident Review
Upon dissolution of each Cyber UCG, the Chair of the CRG shall direct a review of a Cyber UCG’s response to a significant cyber incident at issue and the preparation of a report based on that review to be provided to the CRG within 30 days. Federal agencies shall modify any plans or procedures for which they are responsible under this directive as appropriate or necessary in light of that report.
F. National Cyber Incident Response Plan
Within 180 days of the date of this directive, DHS and DOJ, in coordination with the SSAs, shall submit a concept of operations for the Cyber UCG to the President, through the Assistant to the President for Homeland Security and Counterterrorism and the Director of OMB, that is consistent with the principles, policies, and coordination architecture set forth in this directive. This concept of operations shall further develop how the Cyber UCG and field elements of the Federal coordination architecture will work in practice for significant cyber incidents, including mechanisms for coordinating with Federal agencies managing the physical effects of an incident that has both cyber and physical elements and for integration of private sector entities in response activities when appropriate. The Secretary of Homeland Security shall, as appropriate, incorporate or reference this concept of operations in the Cyber Incident Annex required by section 205 of the Cybersecurity Act of 2015.
Within 180 days of the date of this directive, the Secretary of Homeland Security, in coordination with the Attorney General, the Secretary of Defense, and the SSAs, shall submit a national cyber incident response plan to address cybersecurity risks to critical infrastructure to the President, through the Assistant to the President for Homeland Security and Counterterrorism and the Director of OMB, that is consistent with the principles, policies, and coordination architecture set forth in this directive. The Secretary of Homeland Security shall ensure that the plan satisfies section 7 of the National Cybersecurity Protection Act of 2014. This plan shall be developed in consultation with SLTT governments, sector coordinating councils, information sharing and analysis organizations, owners and operators of critical infrastructure, and other appropriate entities and individuals. The plan shall take into account how these stakeholders will coordinate with Federal agencies to mitigate, respond to, and recover from cyber incidents affecting critical infrastructure.
Presidential Directive 5, Presidential Directive 51, Presidential Directive 59, Presidential Directive 8, Presidential Directive 62, Presidential Directive 21, Presidential Directive Definition, Presidential Directive 58, Presidential Directive 40, Presidential Directive 25, Presidential Directive Active Shooter, Presidential Policy Directive Africa, Presidential Directive For Age Relaxation, Presidential Directive Mass Atrocities, Presidential Directive On Arctic Region Policy, Difference Between Presidential Directive And Executive Order, Is A Presidential Directive A Law, Presidential Study Directive 11 August 2010, Presidential Decision Directive 62 And 63, Afghanistan Presidential Directive 62, Presidential Directive Cyber Security, Presidential Directive Cyber Security Critical Infrastructure, Presidential Directive Cuba, Presidential Directive Critical Infrastructure, Presidential Directive Coal, Presidential Directive Christmas Eve, Presidential Directive Carrying The Force Of Law, Presidential Directive To Coal India, Presidential Directive 20 Cyber, Presidential Directive Data Center Consolidation, Presidential Directive Definition, Presidential Directive Data Center Consolidation, Presidential Directive Decision, Presidential Directive Decision 25, Presidential Directive Drones, Presidential Decision Directive 39, Presidential Decision Directive 63, Presidential Decision Directive 67, Presidential Decision Directive 62, Presidential Decision Directive 51, Presidential Directive Emergency Management, Presidential Directive Electronic Records, Presidential Directive Vs Executive Order, Presidential Directive Christmas Eve, Presidential Policy Directive Executive Order 13636, Presidential Directive For Records Management, Presidential Directive For Nims, Presidential Directive For Age Relaxation, Presidential Directive Fema, Presidential Flag Directive, Presidential Policy Directive For Sub-saharan Africa, Presidential Directive On Reservation For Obc In Pses, Presidential Directive Carrying The Force Of Law, Which Presidential Directive(s) Focused On Cyberspace Security, Presidential Policy Directive 21 Federal Register, Presidential Directive On Government Contracting, Presidential Directive Managing Government Records, Presidential Policy Directive Global Development, Presidential Policy Directive On Global Development (Ppd-6), Presidential Directive Hspd 12, Presidential Directive Hspd-5, Presidential Directive Hspd-7, Presidential Directive Homeland Security, Presidential Directive That Has The Force Of Law, National Security Presidential Directive Human Trafficking, Presidential Directive Nspd 51 Hspd 20, Presidential Directive Meaning In Hindi, Homeland Presidential Directive 8, Hs Presidential Directive 7, Presidential Directive Insider Threat, Presidential Directive Immigration, Presidential Directive India, Presidential Directive Ics, Presidential Directive Critical Infrastructure, Presidential Directive On Information Sharing, Presidential Policy Directive Immigration, Presidential Directive Meaning In Hindi, Presidential Directive To Coal India, Presidential Policy Directive 19 In October 2012, Presidential Directive List, Presidential Policy Directive List, Presidential Directive M-12-18, Presidential Directive Mass Atrocities, Presidential Directive Meaning In Hindi, Presidential Directive Emergency Management, Presidential Policy Directive 18 Maritime Security, Presidential Study Directive On Mass Atrocities, Presidential Directive Nims, Presidential Directive Nsc-63, Presidential Directive Not Requiring Congressional Approval, Presidential Directive Nspd 51 Hspd 20, Presidential Directive Number 54, Presidential Decision Directive Nsc-12, Presidential Decision Directive\/nsc-63, Presidential Directive Safeguarding National Security, Presidential Decision Directive Nstc-7, Presidential Policy Directive National Preparedness, Presidential Directive On Government Contracting, Presidential Directive On Cuba, Presidential Directive On Cyber Security, Presidential Directive On Managing Government Records, Presidential Directive On Information Sharing, Presidential Directive On Immigration, Presidential Directive Open Data, Presidential Directive On Reservation For Obc In Pses, Presidential Directive On Insider Threat, Presidential Directive On Climate Change, Presidential Directive Philippines, Presidential Directive Pdd-63, Presidential Directive Pdd 51, Presidential Directive Paperless, Presidential Directive Ppd-21, Presidential Directive Peacekeeping, Presidential Policy Directive 20, Presidential Policy Directive 8, Presidential Policy Directive, Presidential Policy Directive 28, Presidential Directive Records Management, Presidential Review Directive 5, Presidential Review Directive, Presidential Directive On Reservation For Obc In Pses, Presidential Directive Not Requiring Congressional Approval, Presidential Directive For Age Relaxation, Presidential Directive On Arctic Region Policy, Presidential Directive Safeguarding National Security, Presidential Study Directive 11, Presidential Study Directive, Presidential Study Directive-11 Or Psd-11, Presidential Study Directive 1, Presidential Study Directive 10, Presidential Study Directive 9, Presidential Study Directive-11 Pdf, Presidential Study Directive 11 August 2010, Presidential Study Directive 8, Presidential Directive Trump, Presidential Directive To Coal India, Presidential Directive Telework, Presidential Directive To Cil, Presidential Directive That Has The Force Of Law, A Presidential Directive To An Agency That Orders, Presidential Directive Insider Threat, Presidential Directive Carrying The Force Of Law, Presidential Directive 51 Text, Us Presidential Directive, Presidential Directive Vs Executive Order, Presidential Directive W199i, Presidential Directive Wmd, Presidential Decision Directive W199i, Presidential Policy Directive Wiki, Presidential Directive 59 Wiki, Presidential Policy Directive What Is, Which Presidential Directive(s) Focused On Cyberspace Security, Presidential Policy Directive 8 White House, Presidential Policy Directive 8 Wiki, Presidential Policy Directive 20 Washington Post, National Security Presidential Directive Zero Tolerance, Cybercrime Definition, Cybercrime Statistics, Cybercrime Prevention, Cybercrime Articles, Cybercrime Jobs, Cybercrime Law, Cybercrime Statistics 2017, Cyber Crime Cases, Cyber Crime News, Cybercrime Topics, Cybercrime Articles, Cybercrime And Security, Cybercrime As A Service, Cybercrime And Digital Forensics An Introduction, Cybercrime And Digital Forensics, Cybercrime And Society, Cybercrime And Terrorism, Cybercrime Attacks, Cybercrime Act, Cybercrime Against Businesses, Cyber Crime Batman, Cyber Crime Book, Cybercrime Blog, Cybercrime Bill, Cybercrime Banks, Cybercrime Background, Cyber Crime By Country, Cybercrime Bangalore, Cybercrime Billion Dollar Industry, Cybercrime Background Information, Cyber Crime Cases, Cybercrime Certification, Cybercrime Convention, Cybercrime Careers, Cybercrime Cost, Cybercrime Cafe, Cybercrime Cost 2016, Cybercrime China, Cybercrime Conference, Cybercrime Conclusion, Cybercrime Definition, Cybercrime Definition Computer, Cybercrime Definition Fbi, Cyber Crime Data, Cybercrime Degrees, Cybercrime Definition Pdf, Cybercrime Database, Cyber Crime Detective, Cyber Crime Documentary, Cyber Crime Department, Cybercrime Example, Cyber Crime Essay, Cybercrime Effects, Cybercrime Events, Cybercrime Enforcement, Cybercrime Economy, Cyber Crime Ethics, Cybercrime Effects On Business, Cybercrime Ecosystem, Cybercrime Enforcement Training Assistance Act, Cybercrime Facts, Cybercrime Fbi, Cybercrime Forensics, Cybercrime Forum, Cybercrime Forensics Training Center, Cybercrime Federal Laws, Cyber Crime Fiction, Cybercrime Financial Services, Cybercrime Future Trends, Cybercrime Fiji, Cybercrime Gets Personal Money Magazine, Cybercrime Gets Personal, Cybercrime Growth, Cyber Crime Graph, Cybercrime Groups, Cybercrime Government, Cybercrime Global Statistics, Cyber Crime Gov, Cyber Crime Games, Cybercrime Gif, Cybercrime Hacking, Cyber Crime History, Cybercrime Help, Cybercrime Healthcare, Cybercrime Hyderabad, Cybercrime How To Report, Cyber Crime Hotline, Cybercrime Hacking News, Cyber Crime Head Office India, Cybercrime Hacking And Cracking, Cybercrime Identity Theft, Cybercrime In The Us, Cyber Crime Investigation, Cybercrime Images, Cyber Crime Insurance, Cybercrime Is Also Known As, Cybercrime Investigating High-technology Computer Crime, Cybercrime Infographic, Cybercrime Information, Cyber Crime In Russia, Cybercrime Jobs, Cybercrime Jurisdiction, Cybercrime Journal Articles, Cybercrime Job Description, Cybercrime Jobs Salary, Cybercrime Job Openings, Cybercrime Jobs In Chennai, Cybercrime Job Qualification, Cybercrime Journal Articles Pdf, Cyber Crime Jamaica, Cybercrime Kenya, Cybercrime Key Issues And Debates, Cybercrime Kuwait, Cybercrime Ki Dhara, Cybercrime Key Issues And Debates Pdf, Cybercrime Kasus, Cyber Crime Karnataka, Cybercrime Kartu Kredit, Cybercrime Kolkata, Cyber Crime Karachi, Cybercrime Law, Cybercrime Laws In Usa, Cybercrime Law Enforcement, Cybercrime Laws Of The United States, Cybercrime List, Cybercrime Legislation Us, Cybercrime Laws In Florida, Cybercrime Legal Issues, Cybercrime Law Outline, Cyber Crime Lesson Plans, Cybercrime Meaning, Cyber Crime Movies, Cybercrime Methods, Cybercrime Methodology, Cyber Crime Money, Cybercrime Markets, Cyber Crime Magazine, Cyber Crime Most Wanted, Cybercrime Meaning In Tamil, Cybercrime Masters Degree, Cyber Crime News, Cyber Crime News Articles, Cyber Crime News Articles 2017, Cyber Crime Netflix, Cybercrime Nigeria, Cyber Crime Novels, Cybercrime Number, Cybercrime Nhs, Cyber Crime News Philippines, Cybercrime Nbi, Cybercrime Or Cyber Crime, Cybercrime Organizations, Cybercrime On The Rise, Cybercrime On The High Seas, Cybercrime Offenses, Cyber Crime Outline, Cybercrime Office, Cybercrime Office In Ahmedabad, Cybercrime Office In Patna, Cybercrime Office In Nashik, Cybercrime Quotes, Cyber Crime Quizlet, Cybercrime Questions, Cyber Crime Quiz, Cybercrime Questionnaire, Cybercrime Question Paper, Cybercrime Qatar, Cybercrime Question And Answers, Cybercrime Report, Cybercrime Research Paper, Cyber Crime Rates, Cyber Crime Recent, Cybercrime Research Topics, Cybercrime Research, Cybercrime Reported To The Ic3, Cybercrime Resources, Cybercrime Riding Tax Season Tides, Cyber Crime Report 2016, Cybercrime Statistics, Cybercrime Statistics 2017, Cyber Crime Stories, Cybercrime Spyware, Cybercrime Statistics 2015, Cybercrime Security, Cybercrime Solutions, Cybercrime Salary, Cybercrime Small Business, Cyber Crime Synonym, Cybercrime Topics, Cybercrime Trends, Cybercrime Tracker, Cybercrime Treaty, Cyber Crime Types, Cybercrime Training, Cybercrime Threats, Cybercrime Tools, Cybercrime Terms, Cybercrime The Transformation Of Crime In The Information Age, Cyber Crime Unit, Cybercrime Us, Cybercrime Uk, Cybercrime Uae, Cybercrime University, Cybercrime Un, Cyber Crime Unit Mauritius, Cyber Crime Unit Malta, Cybercrime Uc, Cybercrime Unodc, Cybercrime Victims, Cybercrime Vs Traditional Crime, Cybercrime Videos, Cybercrime Vs Traditional Crime Statistics, Cybercrime Virus, Cyber Crime Vocabulary, Cybercrime Vs Traditional Crime Punishment, Cybercrime Vs Computer Crime, Cybercrime Vs Cyber Warfare, Cybercrime Vs Cyber Espionage, Cybercrime Wiki, Cybercrime Worm, Cybercrime World Wide War 3.0, Cyber Crime Websites, Cyber Crime Worksheet, Cybercrime Wallpaper, Cyber Crime Worldwide, Cybercrime Working Group, Cyber Crime What Is It, Cybercrime Wikipedia Indonesia, Cybercrime X-remote Download, Tedx Cybercrime, Cyber Crime Youtube, Cyber Crime Yahoo, Cyber Crime Yahoo Answers, Cyber Crime Yesterday, Cyber Crime Youth, Cybercrime Yang Menyerang Hak Cipta, Cybercrime Yar, Youth Cyber Crime, Cyber Crime Yogyakarta, Cybercrime Yang Menyerang Pemerintah, Cybercrime Zimbabwe, Cybercrime Zeus, Cybercrime Zimbra, Zurich Cyber Crime, Zimbabwe Cybercrime Bill, Cyber Crime In Zambia, New Zealand Cyber Crime, Los Zetas Cybercrime, Cybercrime Law In Zambia, Cyber Crime Cases In Zambia, Cyber Espionage Definition, Cyber Espionage Cases, Cyber Espionage China, Cyber Espionage Prevention, Cyber Espionage Russia, Cyber Espionage Pdf, Cyber Espionage The Chinese Threat, Cyber Espionage History, Cyber Espionage International Law, Cyber Espionage Cases 2016, Cyber Espionage Act, Cyber Espionage Articles, Cyber Espionage Attacks, Cyber Espionage Adalah, Cyber Espionage And International Law, Cyber Espionage Australia, Cyber Espionage And Cyber Warfare, Cyber Espionage Attack Methods, Cyber Espionage Books, Cyber Espionage Beyond The Rule Of Law, Cyber Espionage Business, Cyber Espionage By China, Cyber Espionage Brazil, Cyber Espionage By Chinese Actors, Cyber Espionage Blog, Cyber Espionage By Country, Bagaimana Cyber Espionage Dapat Muncul, Best Cyber Espionage Books, Cyber Espionage Cases, Cyber Espionage China, Cyber Espionage Cases 2016, Cyber Espionage Case Study, Cyber Espionage Cases 2017, Cyber Espionage Cases In India, Cyber Espionage Campaign, Cyber Espionage China Us, Cyber Espionage Cost, Cyber Espionage Canada, Cyber Espionage Definition, Cyber Espionage Documentary, Cyber Espionage Def, Cyber Espionage Definition Pdf, Economic Cyber Espionage Definition, Bagaimana Cyber Espionage Dapat Muncul, Why Is Cyber Espionage Difficult To Prevent, Contoh Kasus Cyber Espionage Di Indonesia, How Is Cyber Espionage Done, Dragonfly Cyber Espionage, Cyber Espionage Examples, Cyber Espionage Edward Snowden, Cyber Espionage Effects, Cyber Espionage Essay, Cyber Economic Espionage, Cyber Economic Espionage Accountability Act, Cyber Espionage In Middle East, Economic Cyber Espionage And International Law, Economic Cyber Espionage Definition, Explain Cyber Espionage, Cyber Espionage Facts, Cyber Espionage Fiction, Cyber Espionage First Case, Cyber Espionage F 35, Cyber Espionage Law Firms, Fbi Cyber Espionage, France Cyber Espionage, A Theory Of Cyber Espionage For The Intelligence Community, French Cyber Espionage, Flame Cyber Espionage, Cyber Espionage Groups, Cyber Espionage Germany, Cyber Espionage Georgia, Cyber-espionage The Greatest Transfer Of Wealth In History, Cyber-espionage A Growing Threat To The American Economy, Cyber Espionage Against Georgia, Cyber Espionage Against Georgian Government, What Are Cyber Espionage Groups Stealing From The United States, Cyber Espionage To Splinter Internet Governance, Global Cyber Espionage, Cyber Espionage History, Huawei Cyber Espionage, Hellsing Cyber Espionage, Cyber Espionage International Law, Cyber Espionage Incidents, Cyber Espionage India, Cyber Espionage Is Alive And Well, South African Cyber Espionage, Cyber Espionage In China, Cyber Espionage In Middle East, Cyber Espionage Iran, Cyber Espionage In Canada, Cyber Espionage Impact, Cyber Espionage Jobs, Cyber Espionage Japan, Cyber Espionage Kenya, Kaspersky Cyber Espionage, Kasus Cyber Espionage, Kasus Cyber Espionage Di Indonesia, Kejahatan Cyber Espionage, Karakteristik Cyber Espionage, Cyber Espionage Law, Cyber Espionage Law Firms, Cyber Espionage International Law, Cyber Espionage Definition Law, Cyber Espionage Is Reaching Crisis Levels, Pengertian Dari Cyber Espionage Lengkap, Le Cyber Espionnage Definition, Cyber Espionage Meaning, Cyber Espionage Movies, Cyber Espionage Methods, Cyber-espionage Nightmare – Mit Technology Review, Cyber Espionage Attack Methods, Cyber Espionage In Middle East, Chinese Cyber Espionage Mandiant, Chinese Cyber Espionage Map, Bagaimana Cyber Espionage Dapat Muncul, Military Cyber Espionage, Cyber Espionage News, Cyber Espionage North Korea, Cyber-espionage Nightmare, Cyber Espionage National Security, Cyber Espionage Novels, Cyber Espionage Nato, Ghostnet Cyber Espionage Network, Nsa Cyber Espionage, Nortel Cyber Espionage, Cyber Espionage Operations, Cyber Espionage Red October, Cyber Espionage And Cyber Espionage, Cyber-espionage The Greatest Transfer Of Wealth In History, Cyber Espionage Prevention, Cyber Espionage Pdf, Cyber Espionage Ppt, Cyber Espionage Pronunciation, Cyber Espionage Presentation, Cyber Espionage Pictures, Cyber Espionage Problems, Cyber Espionage Purpose, Cyber Espionage Ppt Slideshare, Cyber Espionage Research Paper, Cyber Espionage Quotes, Cyber Espionage Research Questions, Cyber Espionage Russia, Cyber Espionage Research Paper, Cyber Espionage Rule Of Law, Cyber Espionage Report, Cyber Espionage Red October, Cyber Espionage Research Questions, Cyber Espionage Ring, Cyber Espionage Is Reaching Crisis Levels, Cyber Espionage Techrepublic, Russian Cyber Espionage, Cyber Espionage Statistics, Cyber Espionage Synonym, Cyber Espionage Simulator, Cyber Espionage Security Issues, Cyber Espionage Statistics 2015, Cybersecurity Espionage, Espionage In Cyberspace, Cyber Espionage Case Study, Cyber Espionage To Splinter Internet Governance, South African Cyber Espionage, Cyber Espionage The Chinese Threat, Cyber Espionage Threat, Cyber Espionage Tools, Cyber Espionage Trends, Cyber Espionage The Chinese Threat Case Study, Cyber Espionage To Splinter Internet Governance, Cyber-espionage The Greatest Transfer Of Wealth In History, Cyber Espionage Thesis, Cyber Espionage Training, Cyber Espionage Tactics, Cyber Espionage Uk, Us Cyber Espionage, Cyber Espionage Un, Cyber Espionage Us China, China’s Cyber Espionage Units, Russian Cyber Espionage Under The Microscope, China Cyber Espionage And U.s. National Security, Pla Cyber Espionage Unit, Cyber Espionage Vs Cyber Warfare, Cybercrime Vs Cyber Espionage, Cyber Espionage Vs Cyber Attack, Cyber Espionage Virus, Cyber Espionage Wiki, Cyber Espionage & Warfare, Cyber Weapons Espionage, Cyber Espionage Vs Cyber Warfare, Cyber Espionage And Cyber Warfare Definition, Cyber Espionage Youtube
Cybercrime Definition, Cybercrime Statistics, Cybercrime Prevention, Cybercrime Articles, Cybercrime Jobs, Cybercrime Law, Cybercrime Statistics 2017, Cyber Crime Cases, Cyber Crime News, Cybercrime Topics, Cybercrime Articles, Cybercrime And Security, Cybercrime As A Service, Cybercrime And Digital Forensics An Introduction, Cybercrime And Digital Forensics, Cybercrime And Society, Cybercrime And Terrorism, Cybercrime Attacks, Cybercrime Act, Cybercrime Against Businesses, Cyber Crime Batman, Cyber Crime Book, Cybercrime Blog, Cybercrime Bill, Cybercrime Banks, Cybercrime Background, Cyber Crime By Country, Cybercrime Bangalore, Cybercrime Billion Dollar Industry, Cybercrime Background Information, Cyber Crime Cases, Cybercrime Certification, Cybercrime Convention, Cybercrime Careers, Cybercrime Cost, Cybercrime Cafe, Cybercrime Cost 2016, Cybercrime China, Cybercrime Conference, Cybercrime Conclusion, Cybercrime Definition, Cybercrime Definition Computer, Cybercrime Definition Fbi, Cyber Crime Data, Cybercrime Degrees, Cybercrime Definition Pdf, Cybercrime Database, Cyber Crime Detective, Cyber Crime Documentary, Cyber Crime Department, Cybercrime Example, Cyber Crime Essay, Cybercrime Effects, Cybercrime Events, Cybercrime Enforcement, Cybercrime Economy, Cyber Crime Ethics, Cybercrime Effects On Business, Cybercrime Ecosystem, Cybercrime Enforcement Training Assistance Act, Cybercrime Facts, Cybercrime Fbi, Cybercrime Forensics, Cybercrime Forum, Cybercrime Forensics Training Center, Cybercrime Federal Laws, Cyber Crime Fiction, Cybercrime Financial Services, Cybercrime Future Trends, Cybercrime Fiji, Cybercrime Gets Personal Money Magazine, Cybercrime Gets Personal, Cybercrime Growth, Cyber Crime Graph, Cybercrime Groups, Cybercrime Government, Cybercrime Global Statistics, Cyber Crime Gov, Cyber Crime Games, Cybercrime Gif, Cybercrime Hacking, Cyber Crime History, Cybercrime Help, Cybercrime Healthcare, Cybercrime Hyderabad, Cybercrime How To Report, Cyber Crime Hotline, Cybercrime Hacking News, Cyber Crime Head Office India, Cybercrime Hacking And Cracking, Cybercrime Identity Theft, Cybercrime In The Us, Cyber Crime Investigation, Cybercrime Images, Cyber Crime Insurance, Cybercrime Is Also Known As, Cybercrime Investigating High-technology Computer Crime, Cybercrime Infographic, Cybercrime Information, Cyber Crime In Russia, Cybercrime Jobs, Cybercrime Jurisdiction, Cybercrime Journal Articles, Cybercrime Job Description, Cybercrime Jobs Salary, Cybercrime Job Openings, Cybercrime Jobs In Chennai, Cybercrime Job Qualification, Cybercrime Journal Articles Pdf, Cyber Crime Jamaica, Cybercrime Kenya, Cybercrime Key Issues And Debates, Cybercrime Kuwait, Cybercrime Ki Dhara, Cybercrime Key Issues And Debates Pdf, Cybercrime Kasus, Cyber Crime Karnataka, Cybercrime Kartu Kredit, Cybercrime Kolkata, Cyber Crime Karachi, Cybercrime Law, Cybercrime Laws In Usa, Cybercrime Law Enforcement, Cybercrime Laws Of The United States, Cybercrime List, Cybercrime Legislation Us, Cybercrime Laws In Florida, Cybercrime Legal Issues, Cybercrime Law Outline, Cyber Crime Lesson Plans, Cybercrime Meaning, Cyber Crime Movies, Cybercrime Methods, Cybercrime Methodology, Cyber Crime Money, Cybercrime Markets, Cyber Crime Magazine, Cyber Crime Most Wanted, Cybercrime Meaning In Tamil, Cybercrime Masters Degree, Cyber Crime News, Cyber Crime News Articles, Cyber Crime News Articles 2017, Cyber Crime Netflix, Cybercrime Nigeria, Cyber Crime Novels, Cybercrime Number, Cybercrime Nhs, Cyber Crime News Philippines, Cybercrime Nbi, Cybercrime Or Cyber Crime, Cybercrime Organizations, Cybercrime On The Rise, Cybercrime On The High Seas, Cybercrime Offenses, Cyber Crime Outline, Cybercrime Office, Cybercrime Office In Ahmedabad, Cybercrime Office In Patna, Cybercrime Office In Nashik, Cybercrime Quotes, Cyber Crime Quizlet, Cybercrime Questions, Cyber Crime Quiz, Cybercrime Questionnaire, Cybercrime Question Paper, Cybercrime Qatar, Cybercrime Question And Answers, Cybercrime Report, Cybercrime Research Paper, Cyber Crime Rates, Cyber Crime Recent, Cybercrime Research Topics, Cybercrime Research, Cybercrime Reported To The Ic3, Cybercrime Resources, Cybercrime Riding Tax Season Tides, Cyber Crime Report 2016, Cybercrime Statistics, Cybercrime Statistics 2017, Cyber Crime Stories, Cybercrime Spyware, Cybercrime Statistics 2015, Cybercrime Security, Cybercrime Solutions, Cybercrime Salary, Cybercrime Small Business, Cyber Crime Synonym, Cybercrime Topics, Cybercrime Trends, Cybercrime Tracker, Cybercrime Treaty, Cyber Crime Types, Cybercrime Training, Cybercrime Threats, Cybercrime Tools, Cybercrime Terms, Cybercrime The Transformation Of Crime In The Information Age, Cyber Crime Unit, Cybercrime Us, Cybercrime Uk, Cybercrime Uae, Cybercrime University, Cybercrime Un, Cyber Crime Unit Mauritius, Cyber Crime Unit Malta, Cybercrime Uc, Cybercrime Unodc, Cybercrime Victims, Cybercrime Vs Traditional Crime, Cybercrime Videos, Cybercrime Vs Traditional Crime Statistics, Cybercrime Virus, Cyber Crime Vocabulary, Cybercrime Vs Traditional Crime Punishment, Cybercrime Vs Computer Crime, Cybercrime Vs Cyber Warfare, Cybercrime Vs Cyber Espionage, Cybercrime Wiki, Cybercrime Worm, Cybercrime World Wide War 3.0, Cyber Crime Websites, Cyber Crime Worksheet, Cybercrime Wallpaper, Cyber Crime Worldwide, Cybercrime Working Group, Cyber Crime What Is It, Cybercrime Wikipedia Indonesia, Cybercrime X-remote Download, Tedx Cybercrime, Cyber Crime Youtube, Cyber Crime Yahoo, Cyber Crime Yahoo Answers, Cyber Crime Yesterday, Cyber Crime Youth, Cybercrime Yang Menyerang Hak Cipta, Cybercrime Yar, Youth Cyber Crime, Cyber Crime Yogyakarta, Cybercrime Yang Menyerang Pemerintah, Cybercrime Zimbabwe, Cybercrime Zeus, Cybercrime Zimbra, Zurich Cyber Crime, Zimbabwe Cybercrime Bill, Cyber Crime In Zambia, New Zealand Cyber Crime, Los Zetas Cybercrime, Cybercrime Law In Zambia, Cyber Crime Cases In Zambia, Us Government Jobs, Us Government Type, Us Government Shutdown, Us Government Spending, Us Government Budget, Us Government Security Clearance, Us Government Debt, Us Government News, Us Government Bonds, Us Government Passport, Us Government Agencies, Us Government Auctions, Us Government Accountability Office, Us Government And Politics, Us Government Articles, Us Government Annual Budget, Us Government And Politics Apex Answers, Us Government Ap Test, Us Government Arms Contracts, Us Government Assets, Us Government Budget, Us Government Bonds, Us Government Branches, Us Government Budget 2017, Us Government Budget 2016, Us Government Book, Us Government Bookstore, Us Government Bond Rates, Us Government Buildings, Us Government Bids, Us Government Contracts, Us Government Current Events, Us Government Corruption, Us Government Corporations, Us Government Checks And Balances, Us Government Credit Rating, Us Government Crash Course, Us Government Copyright Website, Us Government Chart, Us Government Clearance, Us Government Debt, Us Government Deficit, Us Government Definition, Us Government Debt To Gdp, Us Government Debt Clock, Us Government Data, Us Government Diagram, Us Government During Ww2, Us Government Documents, Us Government Definition Of Terrorism, Us Government Expenditures, Us Government Employees, Us Government Explained, Us Government Executive Branch, Us Government Employee Salaries, Us Government Exam Review, Us Government Employment, Us Government Education, Us Government Experiments, Us Government Expenditures 2016, Us Government Fiscal Year, Us Government Forms, Us Government For Dummies, Us Government Final Exam, Us Government Facts, Us Government Final Exam Study Guide, Us Government Free Credit Report, Us Government Funding, Us Government Flow Chart, Us Government Fiscal Year 2017, Us Government Grants, Us Government Grant Department, Us Government Gold Coins, Us Government Games, Us Government Gsa, Us Government Gs Pay Scale, Us Government Grant Money, Us Government Global Entry, Us Government Green Card, Us Government Gdp, Us Government Holidays, Us Government Hiring Freeze, Us Government Holidays 2017, Us Government Hierarchy, Us Government History, Us Government Healthcare, Us Government Healthcare Spending, Us Government Hacked, Us Government Health Insurance, Us Government House, Us Government Internships, Us Government Income, Us Government Id, Us Government Interest Reported As Dividends, Us Government Interest, Us Government Interest Taxable, Us Government Irs, Us Government Issues, Us Government Issued Id, Us Government Intelligence Agencies, Us Government Jobs, Us Government Jobs Abroad, Us Government Jobs In Japan, Us Government Jobs In Italy, Us Government Jobs In Germany, Us Government Judicial Branch, Us Government Jobs In Europe, Us Government Jeopardy, Us Government Jobs In Utah, Us Government Jobs In California, Us Government Killed Mlk, Us Government Kahoot, Us Government Kill List, Us Government Killed Dog, Us Government Killed Family Dog, Us Government Key Terms, Us Government Killed Jfk, Us Government Kaspersky, Us Government Kodi, Us Government Kenya Travel, Us Government Logo, Us Government Line Of Succession, Us Government License Plates, Us Government Leaders, Us Government Land For Sale, Us Government Loans, Us Government Legislative Branch, Us Government Laws, Us Government Lies, Us Government Leaks, Us Government Mint, Us Government Mileage Rate, Us Government Manual, Us Government Mileage Rate 2017, Us Government Medicare, Us Government Movies, Us Government Military Spending, Us Government Memes, Us Government Module 3 Dba, Us Government Mind Control, Us Government News, Us Government Net Worth, Us Government News Today, Us Government Number, Us Government Name, Us Government Notes, Us Government No Call List, Us Government News Articles, Us Government National Debt, Us Government Number Of Employees, Us Government Org Chart, Us Government Officials, Us Government Organizational Chart, Us Government Offices, Us Government Obligations, Us Government Organizations, Us Government Owned Companies, Us Government Official Mail, Us Government Online Textbook, Us Government Officials 2017, Us Government Passport, Us Government Per Diem, Us Government Printing Office, Us Government Passport Renewal, Us Government Pay Scale, Us Government Plates, Us Government Positions, Us Government Phone Number, Us Government Pension, Us Government Procurement, Us Government Quizlet, Us Government Quiz, Us Government Questions, Us Government Quotes, Us Government Quarters, Us Government Quizlet Chapter 2, Us Government Questions And Answers, Us Government Questions Test Practice, Us Government Quizlet Chapter 8, Us Government Quizlet Chapter 4, Us Government Revenue, Us Government Regents, Us Government Review, Us Government Revenue 2016, Us Government Retirement, Us Government Ranks, Us Government Renew Passport, Us Government Rfp, Us Government Revenue Sources, Us Government Regulations, Us Government Shutdown, Us Government Spending, Us Government Security Clearance, Us Government Shutdown 2017, Us Government System, Us Government Surplus, Us Government Spending Breakdown, Us Government Securities, Us Government Salaries, Us Government Savings Bonds, Us Government Type, Us Government Textbook, Us Government Travel Warnings, Us Government Tax Forms, Us Government Travel, Us Government Textbook Pdf, Us Government Test, Us Government Tax Revenue, Us Government Time, Us Government Trivia, Us Government Unclaimed Money, Us Government Unit 4, Us Government Unit 5, Us Government Unit 3, Us Government Unit 2 Quizlet, Us Government Unit 1, Us Government Ufo, Us Government Unit 5 Test Answers, Us Government Unit 1 Test, Us Government Unit 3 Test, Us Government Vocabulary, Us Government Visa, Us Government Vehicles, Us Government Videos, Us Government Vehicle Auction, Us Government Value Of Human Life, Us Government Vs German Government, Us Government Vs Ancient Rome, Us Government Venezuela, Us Government Veterans, Us Government Website, Us Government Worksheets, Us Government Wiki, Us Government Weather, Us Government Weed, Us Government Word Search, Us Government Whip, Us Government White Papers, Us Government Web Standards, Us Government Waste, Us Government X Files, Us Government Xml, Us Government Keystone Xl Pipeline, Us Government Windows Xp, Us Government Planet X, Us Government Yearly Budget, Us Government Yield Curve, Us Government Youtube, Us Government Yearly Revenue, Us Government Yields, Us Government Yellowbook, Us Government Year End, Us Government Youth Programs, Us Government Yearly Spending, Us Government Yemen, Us Government Zombie Plan, Us Government Zip Codes, Us Government Zombie, Us Government Zip Code Database, Us Government Zika, Us Government Zombie Protocol, Us Government Zero Coupon Bonds, Us Government Zombie Contingency Plan, Us Government Zombie Survival Guide, Us Government Zip Code Information, Us Government Jobs, Us Government Type, Us Government Shutdown, Us Government Spending, Us Government Budget, Us Government Security Clearance, Us Government Debt, Us Government News, Us Government Bonds, Us Government Passport, Us Government Agencies, Us Government Auctions, Us Government Accountability Office, Us Government And Politics, Us Government Articles, Us Government Annual Budget, Us Government And Politics Apex Answers, Us Government Ap Test, Us Government Arms Contracts, Us Government Assets, Us Government Budget, Us Government Bonds, Us Government Branches, Us Government Budget 2017, Us Government Budget 2016, Us Government Book, Us Government Bookstore, Us Government Bond Rates, Us Government Buildings, Us Government Bids, Us Government Contracts, Us Government Current Events, Us Government Corruption, Us Government Corporations, Us Government Checks And Balances, Us Government Credit Rating, Us Government Crash Course, Us Government Copyright Website, Us Government Chart, Us Government Clearance, Us Government Debt, Us Government Deficit, Us Government Definition, Us Government Debt To Gdp, Us Government Debt Clock, Us Government Data, Us Government Diagram, Us Government During Ww2, Us Government Documents, Us Government Definition Of Terrorism, Us Government Expenditures, Us Government Employees, Us Government Explained, Us Government Executive Branch, Us Government Employee Salaries, Us Government Exam Review, Us Government Employment, Us Government Education, Us Government Experiments, Us Government Expenditures 2016, Us Government Fiscal Year, Us Government Forms, Us Government For Dummies, Us Government Final Exam, Us Government Facts, Us Government Final Exam Study Guide, Us Government Free Credit Report, Us Government Funding, Us Government Flow Chart, Us Government Fiscal Year 2017, Us Government Grants, Us Government Grant Department, Us Government Gold Coins, Us Government Games, Us Government Gsa, Us Government Gs Pay Scale, Us Government Grant Money, Us Government Global Entry, Us Government Green Card, Us Government Gdp, Us Government Holidays, Us Government Hiring Freeze, Us Government Holidays 2017, Us Government Hierarchy, Us Government History, Us Government Healthcare, Us Government Healthcare Spending, Us Government Hacked, Us Government Health Insurance, Us Government House, Us Government Internships, Us Government Income, Us Government Id, Us Government Interest Reported As Dividends, Us Government Interest, Us Government Interest Taxable, Us Government Irs, Us Government Issues, Us Government Issued Id, Us Government Intelligence Agencies, Us Government Jobs, Us Government Jobs Abroad, Us Government Jobs In Japan, Us Government Jobs In Italy, Us Government Jobs In Germany, Us Government Judicial Branch, Us Government Jobs In Europe, Us Government Jeopardy, Us Government Jobs In Utah, Us Government Jobs In California, Us Government Killed Mlk, Us Government Kahoot, Us Government Kill List, Us Government Killed Dog, Us Government Killed Family Dog, Us Government Key Terms, Us Government Killed Jfk, Us Government Kaspersky, Us Government Kodi, Us Government Kenya Travel, Us Government Logo, Us Government Line Of Succession, Us Government License Plates, Us Government Leaders, Us Government Land For Sale, Us Government Loans, Us Government Legislative Branch, Us Government Laws, Us Government Lies, Us Government Leaks, Us Government Mint, Us Government Mileage Rate, Us Government Manual, Us Government Mileage Rate 2017, Us Government Medicare, Us Government Movies, Us Government Military Spending, Us Government Memes, Us Government Module 3 Dba, Us Government Mind Control, Us Government News, Us Government Net Worth, Us Government News Today, Us Government Number, Us Government Name, Us Government Notes, Us Government No Call List, Us Government News Articles, Us Government National Debt, Us Government Number Of Employees, Us Government Org Chart, Us Government Officials, Us Government Organizational Chart, Us Government Offices, Us Government Obligations, Us Government Organizations, Us Government Owned Companies, Us Government Official Mail, Us Government Online Textbook, Us Government Officials 2017, Us Government Passport, Us Government Per Diem, Us Government Printing Office, Us Government Passport Renewal, Us Government Pay Scale, Us Government Plates, Us Government Positions, Us Government Phone Number, Us Government Pension, Us Government Procurement, Us Government Quizlet, Us Government Quiz, Us Government Questions, Us Government Quotes, Us Government Quarters, Us Government Quizlet Chapter 2, Us Government Questions And Answers, Us Government Questions Test Practice, Us Government Quizlet Chapter 8, Us Government Quizlet Chapter 4, Us Government Revenue, Us Government Regents, Us Government Review, Us Government Revenue 2016, Us Government Retirement, Us Government Ranks, Us Government Renew Passport, Us Government Rfp, Us Government Revenue Sources, Us Government Regulations, Us Government Shutdown, Us Government Spending, Us Government Security Clearance, Us Government Shutdown 2017, Us Government System, Us Government Surplus, Us Government Spending Breakdown, Us Government Securities, Us Government Salaries, Us Government Savings Bonds, Us Government Type, Us Government Textbook, Us Government Travel Warnings, Us Government Tax Forms, Us Government Travel, Us Government Textbook Pdf, Us Government Test, Us Government Tax Revenue, Us Government Time, Us Government Trivia, Us Government Unclaimed Money, Us Government Unit 4, Us Government Unit 5, Us Government Unit 3, Us Government Unit 2 Quizlet, Us Government Unit 1, Us Government Ufo, Us Government Unit 5 Test Answers, Us Government Unit 1 Test, Us Government Unit 3 Test, Us Government Vocabulary, Us Government Visa, Us Government Vehicles, Us Government Videos, Us Government Vehicle Auction, Us Government Value Of Human Life, Us Government Vs German Government, Us Government Vs Ancient Rome, Us Government Venezuela, Us Government Veterans, Us Government Website, Us Government Worksheets, Us Government Wiki, Us Government Weather, Us Government Weed, Us Government Word Search, Us Government Whip, Us Government White Papers, Us Government Web Standards, Us Government Waste, Us Government X Files, Us Government Xml, Us Government Keystone Xl Pipeline, Us Government Windows Xp, Us Government Planet X, Us Government Yearly Budget, Us Government Yield Curve, Us Government Youtube, Us Government Yearly Revenue, Us Government Yields, Us Government Yellowbook, Us Government Year End, Us Government Youth Programs, Us Government Yearly Spending, Us Government Yemen, Us Government Zombie Plan, Us Government Zip Codes, Us Government Zombie, Us Government Zip Code Database, Us Government Zika, Us Government Zombie Protocol, Us Government Zero Coupon Bonds, Us Government Zombie Contingency Plan, Us Government Zombie Survival Guide, Us Government Zip Code Information
The Cybercrime Convention Committee (T-CY), at its 12th plenary (2-3 December 2014), established a working group to explore solutions to access for criminal justice purposes to evidence in the cloud, including through mutual legal assistance (“Cloud Evidence Group”). The Cloud Evidence Group is to submit a report to the T-CY with options and recommendations for further action by December 2016.
In 2015, the T-CY Cloud Evidence Group, following a discussion paper summarizing the challenges of criminal justice access to data in the cloud (published in May 2015 and discussed at the Octopus Conference in June 2015), held a hearing for providers on 30 November 2015 which focused on the direct cooperation by criminal justice authorities with service providers in foreign jurisdictions:
Often a prosecution or police authority (a “law enforcement authority”) of a Party to the Budapest Convention requests a service provider in another jurisdiction for data in relation to a specific criminal investigation. Typically, subscriber information is sought from multinational service providers with their headquarters in the USA (“US service providers”). Some of them have subsidiaries in Europe or elsewhere.
Transparency reports published by US service providers indicate that they respond positively to about 60% of such requests “on a voluntary basis”.
Article 18 Budapest Convention covers “production orders” and Article 18.1.b specifically the production of subscriber information by a service provider “offering its services on the territory of the Party”:
Article 18 – Production order
1 Each Party shall adopt such legislative and other measures as may be necessary to empower its competent authorities to order:
a a person in its territory to submit specified computer data in that person’s possession or control, which is stored in a computer system or a computer-data storage medium; and
b a service provider offering its services in the territory of the Party to submit subscriber information relating to such services in that service provider’s possession or control.
The Explanatory Report (paragraph 171) to the Budapest Convention indicates Article 18 was also intended to cover situations of voluntary cooperation:
171. A “production order” provides a flexible measure which law enforcement can apply in many cases, especially instead of measures that are more intrusive or more onerous. The implementation of such a procedural mechanism will also be beneficial to third party custodians of data, such as ISPs, who are often prepared to assist law enforcement authorities on a voluntary basis by providing data under their control, but who prefer an appropriate legal basis for such assistance, relieving them of any contractual or non-contractual liability.
The purpose of the present background paper is to provide a snapshot of policies and practices of some major US service providers regarding their “voluntary” disclosure of information to law enforcement authorities in foreign jurisdictions, and thus to facilitate discussion of future options regarding criminal justice access to electronic evidence in the cloud.
…
Eu Countries, Eu Brexit, Eu To Usd, Eu Members, Eu Flag, Eu Lcs, Eu Definition, Eu Map, Eu Shoe Size To Us, Eu News, Eu Article 7, Eu Army, Eu Anthem, Eu Armory, Eu Article 50, Eu Adapter, Eu Abbreviation, Eu Amo Voce, Eu Atleta, Eu American Visa, Eu Brexit, Ue Boom, Eu Blue Card, Eu Breakup, Eu Battle Net, Eu Business School, Eu Brexit Guidelines, Eu Brussels, Eu Budget, Eu Building, Eu Countries, Eu Countries List, Eu Currency, Eu Citizenship, Eu Countries Map, Eu Commission, Eu Collapse, Eu Cookie Law, Eu Capital, Eu Court Ruling On Wearing Headscarves, Eu Definition, Eu Data Protection, Eu Data Protection Directive, Eu Directive 2014\/53\/eu, Eu Da Butt, Eu Directive, Eu Directive 95\/46\/ec, Eu Data Protection Regulation, Eu Debt, Eu Declaration Of Conformity, Eu Element, Eu Economy, Eu Elections, Eu Exchange Rate, Eu Ets, Eu Expansion, Eu Established, Eu Elv Directive, Eu Environmental Policy, Eu Electron Configuration, Eu Flag, Eu Founded, Eu Formation, Eu Flight Delay Compensation, Eu Falo Portugues, Eu Falling Apart, Eu Four Freedoms, Eu France, Eu French, Eu Facts, Eu Gdp, Eu Gdpr, Eu General Data Protection Regulation, Eu Gdp Per Capita, Eu Goals, Eu Government, Eu Glass, Eu Gdp Growth, Eu Gdp 2016, Eu Gmp, Eu Headquarters, Eu History, Eu Health Certificate, Eu Holidays, Eu Human Rights, Eu Harmonized Standards, Eu Head, Eu Holidays 2017, Eu Healthcare, Eu Headquarters Building, Eu Iv, Eu Immigration Policy, Eu Immigration, Eu Institutions, Eu Iv Cheats, Eu In English, Eu In French, Eu Is Doomed, Eu Integration, Eu In Spanish, Eu Jobs, Eu Jean Size To Us, Eu Juncker, Eu Jacksonville, Eu Jeans, Eu Jokes, Eu Jacket Size To Us, Eu Journal, Eu Japan, Eu Jrc, Eu Kicks, Eu Keyboard, Eu Klems, Eu Kodi, Eu Keyboard Layout, Eu Korea Fta, Eu Kosovo, Eu Kommission, Eu Kyoto Protocol, Eu Lcs, Eu Lcs, Eu Lcs 2017, Eu Lcs Promotion Tournament 2017, Eu Leaders, Eu Logo, Eu Lcs Playoffs, Eu Lcs Spring 2017, Eu Lcs Summer Split 2017, Eu Lcs Teams, Eu License Plate, Eu Members, Eu Map, Eu Meaning, Eu Medical Term, Eu Member Nations, Eu Military, Eu Mdr, Eu Membership, Eu Model Clauses, Eu Meme, Eu News, Eu Nations, Eu Natural, Eu National Anthem, Eu Official Languages, Eu Open Borders, Eu Organization, Eu Op Gg, Eu Outlet, Euobserver, Eu Official Journal, Eu Octopus Meme, Eu Origin, Eu Overwatch, Eu Plug, Eu Population, Eu Prefix, Eu President, Eu Passport, Eu Parliament, Eu Purpose, Eu Plug Type, Eu Privacy Shield, Eu Proxy, Eu Quero, Eu Quero In English, Eu Quizlet, Eu Quero Voce, Eu Quero Tchu, Eu Quantitative Easing, Eu Quotes, Eu Quiz, Eu Quero Ver O Oco, Eu Quis, Eu Rail, Eu Referendum, Eu Reach, Eu Return Directive, Eu Rome, Eu Regulations, Eu Refugee Crisis, Eu Rohs, Eu Root Word, Eurail Pass, Eu Shoe Size To Us, Eu Shoe Size, Eu Size 36 To Us, Eu Stands For, Eu Symbol, Eu States, Eu Size 40, Eu Star Wars, Eu Size 40 To Us, Eu Single Market, Eu To Usd, Eu Time, Eu To Dollar, Eu Te Amo, Eu To Us Shoe Size, Eu To Rf, Eu To Us Plug Adapter, Eu Trademark Search, Eu Time Zone, Eu Turkey Agreement, Eu Unemployment Rate, Eu Us Privacy Shield, Eu Us Visa, Eu Us Shoe Size, Eur Usd, Eu Union, Eu University, Eu Ukraine, Eu Us Relations, Eur Usd Exchange Rate, Eu Visa, Eu Visa Usa, Eu Vat, Eu Vs Us, Eu Vat Number, Eu Visa Requirements For Us Citizens, Eu Vs Dollar, Eu Vs Cn Hearthstone, Eu Voltage, Eu Vs Uk, Eu Wow Armory, Eu Wow, Eu Wiki, Eu Words, Eu Website, Eu Work Permit, Eu Work Visa, Eu West, Eu Wow Forums, Eu Waist Size To Us, Eu X Ayumu, Eu X Wing, Eu Xiaomi, Eu Xenophobia, Eu Xl To Us, Eu Xl Size, Eu Xl In Uk Size, Eu Xs Size, Eu Xl, Eu Xfel, Eu Yan Sang, Eu Yan Sang Usa, Eu Youtube, Eu Youth Unemployment Rate, Eu Yan Sang Malaysia, Eu Yan Sang Hong Kong, Eu Youtube Channel, Eu Yield Curve, Eu Yellow Card, Eu Yellow Card Thailand, Eu Zone, Eu Zip Code, Eu Zombie, Eu Zone 1, Eu Zika Map, Eu Zambia, Eu Zakup, Eu Zone 1 Countries, Eu Zimbabwe, Cybercrime Definition, Cybercrime Statistics, Cybercrime Prevention, Cybercrime Articles, Cybercrime Jobs, Cybercrime Law, Cybercrime Statistics 2017, Cyber Crime Cases, Cyber Crime News, Cybercrime Topics, Cybercrime Articles, Cybercrime And Security, Cybercrime As A Service, Cybercrime And Digital Forensics An Introduction, Cybercrime And Digital Forensics, Cybercrime And Society, Cybercrime And Terrorism, Cybercrime Attacks, Cybercrime Act, Cybercrime Against Businesses, Cyber Crime Batman, Cyber Crime Book, Cybercrime Blog, Cybercrime Bill, Cybercrime Banks, Cybercrime Background, Cyber Crime By Country, Cybercrime Bangalore, Cybercrime Billion Dollar Industry, Cybercrime Background Information, Cyber Crime Cases, Cybercrime Certification, Cybercrime Convention, Cybercrime Careers, Cybercrime Cost, Cybercrime Cafe, Cybercrime Cost 2016, Cybercrime China, Cybercrime Conference, Cybercrime Conclusion, Cybercrime Definition, Cybercrime Definition Computer, Cybercrime Definition Fbi, Cyber Crime Data, Cybercrime Degrees, Cybercrime Definition Pdf, Cybercrime Database, Cyber Crime Detective, Cyber Crime Documentary, Cyber Crime Department, Cybercrime Example, Cyber Crime Essay, Cybercrime Effects, Cybercrime Events, Cybercrime Enforcement, Cybercrime Economy, Cyber Crime Ethics, Cybercrime Effects On Business, Cybercrime Ecosystem, Cybercrime Enforcement Training Assistance Act, Cybercrime Facts, Cybercrime Fbi, Cybercrime Forensics, Cybercrime Forum, Cybercrime Forensics Training Center, Cybercrime Federal Laws, Cyber Crime Fiction, Cybercrime Financial Services, Cybercrime Future Trends, Cybercrime Fiji, Cybercrime Gets Personal Money Magazine, Cybercrime Gets Personal, Cybercrime Growth, Cyber Crime Graph, Cybercrime Groups, Cybercrime Government, Cybercrime Global Statistics, Cyber Crime Gov, Cyber Crime Games, Cybercrime Gif, Cybercrime Hacking, Cyber Crime History, Cybercrime Help, Cybercrime Healthcare, Cybercrime Hyderabad, Cybercrime How To Report, Cyber Crime Hotline, Cybercrime Hacking News, Cyber Crime Head Office India, Cybercrime Hacking And Cracking, Cybercrime Identity Theft, Cybercrime In The Us, Cyber Crime Investigation, Cybercrime Images, Cyber Crime Insurance, Cybercrime Is Also Known As, Cybercrime Investigating High-technology Computer Crime, Cybercrime Infographic, Cybercrime Information, Cyber Crime In Russia, Cybercrime Jobs, Cybercrime Jurisdiction, Cybercrime Journal Articles, Cybercrime Job Description, Cybercrime Jobs Salary, Cybercrime Job Openings, Cybercrime Jobs In Chennai, Cybercrime Job Qualification, Cybercrime Journal Articles Pdf, Cyber Crime Jamaica, Cybercrime Kenya, Cybercrime Key Issues And Debates, Cybercrime Kuwait, Cybercrime Ki Dhara, Cybercrime Key Issues And Debates Pdf, Cybercrime Kasus, Cyber Crime Karnataka, Cybercrime Kartu Kredit, Cybercrime Kolkata, Cyber Crime Karachi, Cybercrime Law, Cybercrime Laws In Usa, Cybercrime Law Enforcement, Cybercrime Laws Of The United States, Cybercrime List, Cybercrime Legislation Us, Cybercrime Laws In Florida, Cybercrime Legal Issues, Cybercrime Law Outline, Cyber Crime Lesson Plans, Cybercrime Meaning, Cyber Crime Movies, Cybercrime Methods, Cybercrime Methodology, Cyber Crime Money, Cybercrime Markets, Cyber Crime Magazine, Cyber Crime Most Wanted, Cybercrime Meaning In Tamil, Cybercrime Masters Degree, Cyber Crime News, Cyber Crime News Articles, Cyber Crime News Articles 2017, Cyber Crime Netflix, Cybercrime Nigeria, Cyber Crime Novels, Cybercrime Number, Cybercrime Nhs, Cyber Crime News Philippines, Cybercrime Nbi, Cybercrime Or Cyber Crime, Cybercrime Organizations, Cybercrime On The Rise, Cybercrime On The High Seas, Cybercrime Offenses, Cyber Crime Outline, Cybercrime Office, Cybercrime Office In Ahmedabad, Cybercrime Office In Patna, Cybercrime Office In Nashik, Cybercrime Quotes, Cyber Crime Quizlet, Cybercrime Questions, Cyber Crime Quiz, Cybercrime Questionnaire, Cybercrime Question Paper, Cybercrime Qatar, Cybercrime Question And Answers, Cybercrime Report, Cybercrime Research Paper, Cyber Crime Rates, Cyber Crime Recent, Cybercrime Research Topics, Cybercrime Research, Cybercrime Reported To The Ic3, Cybercrime Resources, Cybercrime Riding Tax Season Tides, Cyber Crime Report 2016, Cybercrime Statistics, Cybercrime Statistics 2017, Cyber Crime Stories, Cybercrime Spyware, Cybercrime Statistics 2015, Cybercrime Security, Cybercrime Solutions, Cybercrime Salary, Cybercrime Small Business, Cyber Crime Synonym, Cybercrime Topics, Cybercrime Trends, Cybercrime Tracker, Cybercrime Treaty, Cyber Crime Types, Cybercrime Training, Cybercrime Threats, Cybercrime Tools, Cybercrime Terms, Cybercrime The Transformation Of Crime In The Information Age, Cyber Crime Unit, Cybercrime Us, Cybercrime Uk, Cybercrime Uae, Cybercrime University, Cybercrime Un, Cyber Crime Unit Mauritius, Cyber Crime Unit Malta, Cybercrime Uc, Cybercrime Unodc, Cybercrime Victims, Cybercrime Vs Traditional Crime, Cybercrime Videos, Cybercrime Vs Traditional Crime Statistics, Cybercrime Virus, Cyber Crime Vocabulary, Cybercrime Vs Traditional Crime Punishment, Cybercrime Vs Computer Crime, Cybercrime Vs Cyber Warfare, Cybercrime Vs Cyber Espionage, Cybercrime Wiki, Cybercrime Worm, Cybercrime World Wide War 3.0, Cyber Crime Websites, Cyber Crime Worksheet, Cybercrime Wallpaper, Cyber Crime Worldwide, Cybercrime Working Group, Cyber Crime What Is It, Cybercrime Wikipedia Indonesia, Cybercrime X-remote Download, Tedx Cybercrime, Cyber Crime Youtube, Cyber Crime Yahoo, Cyber Crime Yahoo Answers, Cyber Crime Yesterday, Cyber Crime Youth, Cybercrime Yang Menyerang Hak Cipta, Cybercrime Yar, Youth Cyber Crime, Cyber Crime Yogyakarta, Cybercrime Yang Menyerang Pemerintah, Cybercrime Zimbabwe, Cybercrime Zeus, Cybercrime Zimbra, Zurich Cyber Crime, Zimbabwe Cybercrime Bill, Cyber Crime In Zambia, New Zealand Cyber Crime, Los Zetas Cybercrime, Cybercrime Law In Zambia, Cyber Crime Cases In Zambia,