{"id":320,"date":"2025-04-29T03:28:27","date_gmt":"2025-04-29T03:28:27","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/?p=320"},"modified":"2025-04-29T03:29:22","modified_gmt":"2025-04-29T03:29:22","slug":"cybersecurity-in-the-fbi","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/2025\/04\/29\/cybersecurity-in-the-fbi\/","title":{"rendered":"CYBERSECURITY IN THE FBI"},"content":{"rendered":"\n<p class=\"has-small-font-size\">The Federal Investigation Bureau\u2019s cyber team is one of the most profound and highly <br>technical investigation teams known in the cybersecurity world.  The FBI takes the lead in <br>protecting the United States against any network intrusions and criminals who are looking to <br>attack critical infrastructure.  The FBI\u2019s main goal is to develop and enforce laws that deter <br>malicious criminals in cyberspace and deal out the consequences to these attackers.  An FBI <br>cybersecurity agent must possess the technical skills to operate the cyber equipment as well as a <br>keen sense of human behavior and social science knowledge that relates to cybersecurity in order <br>to effectively infiltrate the minds of the hacker behind the screen.  While the FBI has several <br>different roles in the cybersecurity field, these roles all work together to encompass the critical <br>areas of any mission as well as weighing in on cybersecurity policies.  <br><strong>CYBERPSYCHOLOGY<\/strong> <br>Cyberpsychology is the study of how humans interact with technology and the internet in <br>particular.  The internet has a tendency to enable certain deviant behaviors that involve computer <br>hacking, cyber bullying, and online scams such as phishing emails, spoof websites etc.  Being <br>terminally on the internet has the capacity to affect your mental health in a negative way.  Most <br>often this negative impact results in cyberbullying, internet addiction, and online deviancy.  <br>Since the 2019-2020 pandemic, life online has increased dramatically and has become a major <br>part of people&#8217;s lives.   The National Library of Medicine reported, \u201cThe FBI stated that the <br>number of cybercrime complaints in between January through the end of May 2020 were nearly <br>the same as for the entire year of 2019\u201d (Monteith2021).  Cybercrimes have maintained their <br>peak since then and have only become more popular.  The FBI\u2019s role regarding the increase in <br>cybercrime along with people&#8217;s mental health and time spent online is to investigate the main <br>component which is the human factor.  How the human factor is causing such a negative impact <br> with online behavior.  An FBI cyber agent will start an investigation in cyber bullying for <br>example, by engaging with victims and piecing together the who, what, when, where, why, and <br>how.  Then utilize principles and research learned from cyberpsychology to fully grasp the mind <br>of the attacker by categorizing them based on certain online behaviors and traits discovered. <br><strong>DEVELOPING SECURITY MEASURES<\/strong> <br>The FBI is leading the fight to develop security measures against these attackers to deal <br>out the punishments for the deviant behavior online and implementing policies to deter people <br>from committing them.  One method of combating online criminals is through partnerships with <br>private sector investigation companies.  The FBI is utilizing a strategy that builds upon the <br>human firewall.  This human firewall strategy essentially branches out and provides more than <br>one point to report online incidents through the Internet Cyber Crime Complaint Center or IC3.  <br>Another goal for these partnerships is to provide education and information on the different <br>vulnerabilities and threats that are lurking online.  As stated in a blog post on GOVCIO, <br>\u201cCybersecurity is rising as a challenge area that \u2018touches every program at the FBI,\u2019 the bureau\u2019s <br>Cyber Assistant Director Bryan Vorndran told members of Congress, highlighting the need to <br>strengthen and evolve the FBI\u2019s cyber workforce, collaboration tactics and capabilities to address <br>increasing national cyber threats\u201d (Harris2022).  The most effective defensive method to take <br>against the rising cybercrime is through building up the human firewall and banding together to <br>educate, investigate, and deter.   <br> <br>References <br>Harris, Melissa. &#8220;How FBI\u2019S Cyber Division Will Evolve As Threats Rise.&#8221; GovCIOmedia.Com, <br>1 Apr. 2022, <br>govciomedia.com\/how-fbis-cyber-division-will-evolve-as-threats-rise\/#:~:text=%E2%80%9COu<br> r%20emphasis%20on%20disrupting%20cyber,property%20and%20commit%20ransomware%20<br> attacks. Accessed 24 Apr. 2025. <br>Monteith, Scott, et al. &#8220;Increasing Cybercrime Since the Pandemic: Concerns for Psychiatry.&#8221; <br>Pmc.Ncbi.Nlm.Nih.Gov, 3 Mar. 2021, pmc.ncbi.nlm.nih.gov\/articles\/PMC7927777\/. Accessed 24 <br>Apr. 2025.  <br>&#8220;FBI Cyber \u2014 Private Sector Engagement.&#8221; Ic3.Gov, 26 Mar. 2025, <br>www.ic3.gov\/Outreach\/PrivateSectorEngagement#:~:text=The%20FBI&#8217;s%20Cyber%20strategy<br> %20is,please%20utilize%20this%20form%20instead. Accessed 24 Apr. 2025. <br>&#8220;The Cyber Threat.&#8221; FBI.Gov, 26 Mar. 2025, www.fbi.gov\/investigate\/cyber. Accessed 24 Apr. <br>2025.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Federal Investigation Bureau\u2019s cyber team is one of the most profound and highly technical investigation teams known in the cybersecurity world. The FBI takes the lead in protecting the United States against any network intrusions and criminals who are looking to attack critical infrastructure. The FBI\u2019s main goal is to develop and enforce laws&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/2025\/04\/29\/cybersecurity-in-the-fbi\/\">Read More<\/a><\/div>\n","protected":false},"author":29794,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/posts\/320"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/users\/29794"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/comments?post=320"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/posts\/320\/revisions"}],"predecessor-version":[{"id":328,"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/posts\/320\/revisions\/328"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/media?parent=320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/categories?post=320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sanchez-emiliano\/wp-json\/wp\/v2\/tags?post=320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}