[ISN] DHS, DOJ plan cybercrime survey

InfoSec News isn at c4i.org
Fri Jan 14 03:15:25 EST 2005


Forwarded from: William Knowles <wk at c4i.org>

http://www.fcw.com/fcw/articles/2005/0110/web-survey-01-13-05.asp

By Dibya Sarkar 
Jan. 13, 2005

In what they hope will become the premier measure of national 
cybercrime statistics, officials at the Homeland Security and Justice 
departments plan to survey 36,000 businesses this spring to examine 
the type and frequency of computer security incidents.

Officials from both departments said there are currently no surveys 
that do what they envision the Computer Security Survey will do 
annually: provide statistically relevant national data on cybercrime 
across all U.S. businesses, especially those in critical 
infrastructure sectors.

Patrick Morrissey, deputy director for law enforcement and 
intelligence in DHS' National Cyber Security Division, said no one 
really knows if the problem is getting better or worse or what sectors 
cybercriminals may be targeting.

"We are awash in anecdotal evidence but little or nothing scientific 
or verifiable," he told members of the National Infrastructure 
Advisory Council Jan. 11 during a presentation. "With that being the 
case, decisions are being made in this area on incomplete information. 
Among other things this initiative is designed to help us address this 
gap."

Better data could help form policy and improve resource allocation for 
government and the commercial sector, but few datasets are available 
on the national level. Other datasets such as the Computer Security 
Institute's annual survey examine only the organizations' members. 
That doesn't provide nationally representative data, officials said.

Ramona Rantala, a statistician in the Justice Department's Bureau of 
Justice Statistics, said DHS and DOJ officials will ask about the 
prevalence and types of computer security incidents, where systems 
were vulnerable, and whether vulnerability was caused by an insecure 
wireless connection. It will also inquire about monetary losses and 
who committed the crimes, meaning whether they were general hackers, 
foreign competitors or current or former employees.

The Computer Security Survey, which has been vetted by some groups, 
including the FBI and the President's Information Technology Advisory 
Committee, is still being reviewed by other organizations before 
distribution. Officials hope to get preliminary results by the end of 
the year if they get enough responses, and have final results within 
12 to 15 months. The project will cost about $3.1 million, officials 
said.

The full-scale survey is based on a questionnaire that was sent in 
2001 to 500 businesses, 208 of which responded. Of the 198 responding 
companies that used computers -- 10 did not -- 74 percent reported 
they were victims of a cybercrime, such as embezzlement, fraud or 
theft of proprietary information. Two-thirds were victimized by a 
computer virus at least once, a quarter experienced denial-of-service 
attacks and a fifth said their computer systems were vandalized or 
sabotaged.

Rantala said the full-scale survey will help determine what types of 
attacks are most common nationally. She said people tend to think that 
if you have one computer attack, you shore up everything and that 
prevents anything else from happening. But they fail to consider that 
hackers develop methods of attack quicker than businesses can respond 
to them. "In other words, they can open the door faster than we can 
relock it," she said.

>From the survey, participating companies could also receive tailored 
reports of where they stand within their industry in terms of how many 
attacks they've been subject to, what kinds of technologies they used 
for protection, and percentage of their budget was used for that.

"We'll give them a report with the industry total and with their 
specific values so that they'll know where they sit in that industry," 
Rantala said. "A lot of the [chief information officers] said they 
would love to be able to take this kind of information to their 
president and say, 'We need to put more money in this area. We need to 
put a higher percentage of our budget into this kind of technology 
because this is what everyone else in our industry is using.'"

She also said the full-scale survey could help estimate losses from 
cybercrimes that many news publications publish. "Honestly, nobody 
I've talked to has any idea where they come from," she said. "I can't 
say the methodology isn't sound. I'm just saying I'm not aware of what 
it is because there are no national data out there."

However, results will depend mainly on participation of the officials 
at the 36,000 businesses that will receive the questionnaire. For 
instance, the pilot survey, Rantala said, found that larger companies 
were less likely to respond than smaller companies. Officials at most 
of the large companies said they did not respond to voluntary surveys 
and that they receive too many surveys for them to answer.

Rantala said it would take an act of Congress to make a survey 
mandatory, but officials from both departments prefer it be voluntary. 
However, she said Information Sharing Analysis Centers, trade 
associations and private-sector leaders could help urge participation 
in the full-scale survey.

"What we're trying to avoid is having the businesses get multiple 
surveys," she said. "If they're only going to answer one, then we want 
it to be ours."


 
*==============================================================*
"Communications without intelligence is noise;  Intelligence
without communications is irrelevant." Gen Alfred. M. Gray, USMC
----------------------------------------------------------------
C4I.org - Computer Security, & Intelligence - http://www.c4i.org
*==============================================================*





More information about the ISN mailing list