Assistant Attorney General Matthew G. Olsen Delivers Remarks at Hoover Institution Announcing National Security Cyber Section

<p>I’ve been in this job a little over a year and a half&period; Every day I sit with the Attorney General and FBI Director for the morning threat briefing and each day I read the Presidential Daily Brief&period; Day-after-day&comma; week-after-week&comma; the intelligence reporting details the astonishing pace&comma; scale and sophistication of cyber threats to the United States&period;<&sol;p>&NewLine;<div class&equals;"mh-content-ad"><script async src&equals;"https&colon;&sol;&sol;pagead2&period;googlesyndication&period;com&sol;pagead&sol;js&sol;adsbygoogle&period;js&quest;client&equals;ca-pub-9162800720558968"&NewLine; crossorigin&equals;"anonymous"><&sol;script>&NewLine;<ins class&equals;"adsbygoogle"&NewLine; style&equals;"display&colon;block&semi; text-align&colon;center&semi;"&NewLine; data-ad-layout&equals;"in-article"&NewLine; data-ad-format&equals;"fluid"&NewLine; data-ad-client&equals;"ca-pub-9162800720558968"&NewLine; data-ad-slot&equals;"1081854981"><&sol;ins>&NewLine;<script>&NewLine; &lpar;adsbygoogle &equals; window&period;adsbygoogle &vert;&vert; &lbrack;&rsqb;&rpar;&period;push&lpar;&lbrace;&rcub;&rpar;&semi;&NewLine;<&sol;script><&sol;div>&NewLine;<p>Hostile nations are accelerating their use of cyber-enabled means to carry out a range of threatening activity&period; These countries are stealing sensitive technologies&comma; trade secrets&comma; intellectual property and personally identifying information&semi; exerting malign influence and exporting repression&semi; and holding our critical infrastructure at risk to destructive or disruptive attacks&period;<&sol;p>&NewLine;<p>You don’t need access to classified intelligence to understand what we are up against from countries like China&comma; Russia&comma; Iran and North Korea&period;<&sol;p>&NewLine;<p>Take just a few snippets from the Intelligence Community &lpar;IC&rpar;’s public Annual Threat Assessment for this year&period;<&sol;p>&NewLine;<p>China has compromised telecommunications firms&period; It conducts cyber intrusions targeting journalists and dissidents in order to suppress the free flow of information&period; And the PRC is capable of launching cyberattacks that could disrupt U&period;S&period; critical infrastructure&period;<&sol;p>&NewLine;<p>Russia is bolstering its ability to compromise critical infrastructure&comma; such as industrial control systems&comma; in part to demonstrate it has the ability to inflict damage during a crisis&period; Iran&comma; too&comma; continues to be an aggressive cyber actor&comma; taking advantage of the asymmetric nature of cyberattacks&period;<&sol;p>&NewLine;<p>And North Korea is turning to illicit cyber activities to steal the funds and technical knowledge it needs to further its <a class&equals;"wpil&lowbar;keyword&lowbar;link" href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;category&sol;military-scammer&sol;amp&sol;" title&equals;"military" data-wpil-keyword-link&equals;"linked" data-wpil-monitor-id&equals;"415">military<&sol;a> aspirations and Weapons of Mass Destruction &lpar;WMD&rpar; programs&period;<&sol;p>&NewLine;<p>Our adversaries also imperil the United States by acting as safe havens for cyber criminals who carry out ransomware attacks and digital extortion for personal profit&period;<&sol;p>&NewLine;<p>That’s what the intelligence community is willing to say in public about what we are up against – and it’s not a pretty picture&period;<&sol;p>&NewLine;<p>The good news is that our response to national security cyber threats has gotten more effective in recent years&period; We are putting hard-earned lessons into practice&period;<&sol;p>&NewLine;<p>One lesson we’ve learned from our counterterrorism efforts after 9&sol;11 is the importance of ensuring agencies like FBI&comma; Department of Homeland Security &lpar;DHS&rpar;&comma; the IC and Department of Defense &lpar;DoD&rpar;&comma; are working as one team&comma; sharing information and deploying authorities in a coordinated manner&period;<&sol;p>&NewLine;<p>We are also coordinating government actions with foreign partners and the private sector to empower technical operations&comma; leverage sanctions and trade remedies&comma; and join in diplomatic efforts with like-minded countries&period; And we are applying the key lesson that effectively combating nation-state cyber threats requires shoring up private sector cybersecurity to make us collectively less vulnerable&period;<&sol;p>&NewLine;<p>In March&comma; the White House released the National Cybersecurity Strategy in order to drive a &OpenCurlyDoubleQuote;more intentional&comma; more coordinated&comma; and more well-resourced approach to cyber defense&period;” At the Department of Justice&comma; we are putting that vision into practice&period; Federal law enforcement wields some of the most powerful tools in our arsenal&period; In recent years&comma; we have achieved successes in deploying those tools – and we can build on this success&period;<&sol;p>&NewLine;<p>The Justice Department has never been more effective in identifying&comma; addressing and eliminating cyber threats affecting our nation’s security&period;<&sol;p>&NewLine;<p>Here is the playbook that’s working&period; First&comma; as you’d expect of prosecutors&comma; we enforce U&period;S&period; criminal law – investigating and prosecuting individuals for illegal cyber activity&comma; imposing costs on them and deterring others&period; Just a few examples from last year&colon;<&sol;p>&NewLine;<p>We charged three Iranians with conducting a ransomware campaign that targeted hospitals&comma; local governments and organizations all over the world&period;<&sol;p>&NewLine;<p>We secured a 20-year prison sentence for an individual who leveraged teams of hackers and insiders in a multi-faceted espionage campaign targeting American and European aviation companies on behalf of PRC intelligence&period;<&sol;p>&NewLine;<p>Shortly after the Russian invasion of Ukraine&comma; we unsealed indictments that publicly demonstrated how two different sets of Russian state-sponsored actors compromised devices at hundreds of critical infrastructure providers around the world&comma; deploying malware designed to enable future physical damage&period;<&sol;p>&NewLine;<p>We are holding individuals accountable&comma; imposing consequences&comma; and using our indictments to inform the public about the nature of the threats we face&comma; and our adversaries that their actions are not as deniable as they’d like to think&period;<&sol;p>&NewLine;<p>Second&comma; we are proactive – using the full range of our authorities to disrupt national security cyber threats before a significant attack or intrusion can occur&period; This includes the innovative use of our legal tools beyond traditional criminal charges&period;<&sol;p>&NewLine;<p>Just last month&comma; the Justice Department and FBI conducted &OpenCurlyDoubleQuote;Operation Medusa&period;” This was a technical operation to dismantle and effectively neutralize the &OpenCurlyDoubleQuote;Snake” malware&comma; one of the Russian government’s most sophisticated computer intrusion tools&period; The FSB had used versions of the Snake malware for nearly 20 years to steal sensitive information from hundreds of computer systems in at least 50 countries&comma; including NATO governments&period; Through innovative use of our Rule 41 search warrant authority&comma; as well as collaboration with private sector partners and numerous foreign governments&comma; the Justice Department disabled one of the FSB’s most sensitive&comma; complex espionage tools&period;<&sol;p>&NewLine;<p>Last year&comma; we conducted a court-approved operation to dismantle a GRU botnet that relied on compromised firewall security appliances&period; Working with the company that manufactured those devices&comma; the FBI developed a court-authorized technical solution to delete the GRU’s malware and close the vulnerabilities in compromised devices&period;<&sol;p>&NewLine;<p>We have also used our cryptocurrency tracing abilities and our seizure authorities to prevent over &dollar;100 million in ill-gotten crypto from being used by North Korea to support its missile programs&period; These efforts have focused both on hackers&comma; who have stolen hundreds of millions of dollars’ worth of cryptocurrency&comma; and on IT workers who use online platforms to earn illegal revenue&period; By coordinating asset freezes and sanctions&comma; the U&period;S&period; government has stopped the DPRK from accessing a huge portion of their illicit gains&comma; much of which remains stranded on the blockchain&period;<&sol;p>&NewLine;<p>Finally&comma; we coordinate our efforts with interagency partners&comma; foreign governments and the private sector to use the full force of tools – technical operations&comma; sanctions&comma; trade remedies and diplomatic efforts&period; For example&comma; in the Iran indictments I mentioned a minute ago&comma; we enhanced the impact of the public indictment by working with Treasury to impose sanctions connecting those defendants to the Islamic Revolutionary Guard Corps&period;<&sol;p>&NewLine;<p>Intelligence also plays a key role&period; We share targeted threat intelligence gathered as a result of our investigations to empower private sector companies to defend themselves&period; For example&comma; following the Colonial Pipeline attack&comma; we were able to acquire information – using Section 702 of FISA – that verified the hacker’s identity and enabled the government to recover the majority of the ransom&period;<&sol;p>&NewLine;<p>Our commitment to combating these threats using every tool we’ve got is making an impact&period; We are making it harder for hostile nations to maneuver and recruit by imposing accountability&period; We are denying our adversaries access to technical infrastructure and cutting off their funding&period; We’re disrupting the criminal ecosystem by making cybercrime and ransomware less lucrative and higher risk&period; We are helping the private sector defend itself more effectively with key intelligence and threat information&period; We’re marshaling the efforts of like-minded nations around the world on both diplomatic and law enforcement fronts&period;<&sol;p>&NewLine;<p>As determined as our adversaries might be in escalating their brazen activities&comma; they are learning that we are even more determined to protect the United States and our allies&period;<&sol;p>&NewLine;<p>Since we first charged five members of the PLA in 2014&comma; NSD has been leading the charge with just a handful of dedicated cyber prosecutors&comma; operating on grit&comma; coffee and a shoestring budget&period; And none of these cases would be possible without the close partnership of enterprising U&period;S&period; Attorneys’ Offices&period; So&comma; I am proud of the work being done in the National Security Division&comma; in U&period;S&period; Attorneys’ Offices around the country&comma; at the FBI&comma; and across the Department of Justice&period;<&sol;p>&NewLine;<p>The cases and disruptions I discussed earlier did not come easy&period; They’re often fast-paced and span international boundaries&semi; they involve highly technical data and often classified data and demand innovative legal approaches&period; These are actions that require dedicated time&comma; attention&comma; and expertise&period; Now&comma; we are aggressively growing our national security cyber program&period;<&sol;p>&NewLine;<p>Today&comma; I am announcing that we are establishing a new National Security Cyber Section – NatSec Cyber&comma; for short – within the National Security Division&period; This new&comma; full litigating section – which now has the approval of Congress – will place our work on cyber threats on equal footing with NSD’s Counterterrorism Section and the Counterintelligence and Export Control Section&period;<&sol;p>&NewLine;<p>This new section will allow NSD to increase the scale and speed of disruption campaigns and prosecutions of nation-state threat actors&comma; state-sponsored cybercriminals&comma; associated money launderers&comma; and other cyber-enabled threats to national security&period;<&sol;p>&NewLine;<p>The creation of a new section responds to the core findings in Deputy Attorney General Monaco’s <a href&equals;"https&colon;&sol;&sol;www&period;justice&period;gov&sol;media&sol;1232936&sol;dl&quest;inline" rel&equals;"noreferrer noopener" >Comprehensive Cyber Review<&sol;a>&comma; released in July 2022&comma; that charted the evolving nature of the cyber threat&period; It will help fulfill a core pillar of the Biden Administration’s National Cybersecurity Strategy&colon; to disrupt and dismantle threat actors by working across federal agencies&period;<&sol;p>&NewLine;<p>NatSec Cyber will give us the horsepower and organizational structure we need to carry out key roles of the Department in this arena&period; NatSec Cyber prosecutors will be positioned to act quickly&comma; as soon as the FBI or an IC partner identifies a cyber-enabled threat&comma; and to support investigations and disruptions from the earliest stages&period;<&sol;p>&NewLine;<p>Having prosecutors that are fully dedicated to national security cyber cases will deepen our expertise&period; It will enable us to better collaborate with our key partners&comma; especially our colleagues in the Criminal Division’s Computer Crimes and Intellectual Property Section&comma; which plays a particularly crucial role in ransomware and other criminal cases&period; And&comma; in order to more closely integrate with the FBI’s Cyber Division&comma; the NatSec Cyber Section will mirror that structure&comma; organizing leadership by geographical threat actor&period;<&sol;p>&NewLine;<p>The new section will also serve as a resource for prosecutors in U&period;S&period; Attorneys’ Offices around the country&period; U&period;S&period; Attorneys’ Offices&comma; along with FBI field offices&comma; represent the tip of the spear in confronting many of the threats in their districts&period; Responding to highly technical cyber threats often requires significant time and resources&comma; which aren’t always possible with the demands on individual offices&period; NatSec Cyber will serve as an incubator&comma; able to invest in the time-intensive and complex investigative work for early-stage cases&period;<&sol;p>&NewLine;<p>The section will also allow prosecutors to work seamlessly with colleagues focused on the interagency policy process in the National Security Council&period; That process has become increasingly central to the effective deployment of the government’s cyber capabilities under the leadership of Deputy National Security Advisor for Cyber and Emerging Technologies Anne Neuberger&period;<&sol;p>&NewLine;<p>Here’s the bottom line&colon; Cybersecurity is a matter of national security&period; Our cyber adversaries are innovative and constantly adjusting their tactics to hide from our investigators and to overcome our network defenders&period;<&sol;p>&NewLine;<p>NSD is committed to matching our adversaries by adjusting our tactics and organization to bring all of our tools&comma; authorities and expertise to this fight&period;<&sol;p>&NewLine;<p> Speaker&colon; <a href&equals;"https&colon;&sol;&sol;www&period;justice&period;gov&sol;nsd&sol;staff-profile&sol;assistant-attorney-general-matthew-g-olsen" rel&equals;"noreferrer noopener" >Matthew G&period; Olsen&comma; Assistant Attorney General<&sol;a>Topic&lpar;s&rpar;&colon; Countering Nation-State ThreatsNational SecurityCybercrimeComponent&lpar;s&rpar;&colon; <a href&equals;"https&colon;&sol;&sol;www&period;justice&period;gov&sol;nsd" rel&equals;"noreferrer noopener" >National Security Division &lpar;NSD&rpar;<&sol;a> <&sol;p>&NewLine;<p> Updated June 20&comma; 2023<a href&equals;https&colon;&sol;&sol;www&period;justice&period;gov&sol;opa&sol;speech&sol;assistant-attorney-general-matthew-g-olsen-delivers-remarks-hoover-institution-announcing> Original Article <&sol;a><&sol;p>&NewLine;