Many FBI Agents Say They Lack Ability in Cyber Cases

April 29, 2011
About a third of the FBI agents working on cyber investigations lack the networking and counterintelligence expertise to investigate national security intrusions.

WASHINGTON --

About a third of the FBI agents working on cyber investigations lack the networking and counterintelligence expertise to investigate national security intrusions, the Justice Department's inspector general concluded in a new report.

The report said the FBI's practice of rotating agents among different offices to promote a variety of work experiences hinders the ability to investigate national security cyber intrusions.

The IG's audit, based on interviews of 36 agents in 10 offices, emphasized that the need for a strong cyber security work force in federal government "is more urgent than ever," said Sen. Susan Collins, the top Republican on the Senate Homeland Security and Governmental Affairs Committee.

The FBI has a comprehensive instructional plan in place that includes 12 core courses that an agent must take along with on-the-job training. According to the IG's report, many agents said training was helpful but that they did not have the time to take the required courses. The FBI says it has allowed agents to bypass prerequisite courses when more advanced classes are pertinent to their current case assignments.

Better information sharing by the FBI with other law enforcement and intelligence participants on the National Cyber Investigative Joint Task Force also could improve the government's ability to fend off cyber attacks, according to the report released this week by acting IG Cynthia Schnedar.

The report pointed out that one of the primary findings of the commission that investigated the Sept. 11, 2001, terrorist attacks was that before 9/11 information sharing was inadequate among U.S. law enforcement and intelligence agencies.

Some representatives on the task force were often asked to leave meetings that focused on cyber threats, even though the task force was created to share information, the IG audit said.

FBI officials told the IG that any limitations on information sharing probably were the result of legal restrictions. A task force representative and an FBI agent told the IG's office that some agencies are asked to leave meetings where threats are discussed because a need-to-know policy is enforced.

A Naval Criminal Investigative Service representative said it shared information about a hacker who was using a compromised computer network, but that the FBI did not reciprocate with information as requested. A representative of the Air Force Office of Special Investigations told the IG that the level of FBI information sharing depends on the FBI official to whom a request is submitted.

Copyright 2008 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

Sponsored Recommendations

Build Your Real-Time Crime Center

March 19, 2024
A checklist for success

Whitepaper: A New Paradigm in Digital Investigations

July 28, 2023
Modernize your agency’s approach to get ahead of the digital evidence challenge

A New Paradigm in Digital Investigations

June 6, 2023
Modernize your agency’s approach to get ahead of the digital evidence challenge.

Listen to Real-Time Emergency 911 Calls in the Field

Feb. 8, 2023
Discover advanced technology that allows officers in the field to listen to emergency calls from their vehicles in real time and immediately identify the precise location of the...

Voice your opinion!

To join the conversation, and become an exclusive member of Officer, create an account today!