<figure id="attachment_15047" aria-describedby="caption-attachment-15047" style="width: 300px" class="wp-caption alignright"><a href="https://www.fraudswatch.com/national-cyber-security-awareness-month-reviews/cyber-security/amp/" rel="attachment wp-att-15047"><img class="wp-image-15047 size-medium" title="National Cyber Security Awareness Month" src="https://www.fraudswatch.com/wp-content/uploads/2015/10/cyber-security-300x174.jpg" alt="cyber-security" width="300" height="174" /></a><figcaption id="caption-attachment-15047" class="wp-caption-text"><strong>National Cyber Security Awareness Month</strong></figcaption></figure>
<p><span class="blackgraphtx">October is <em><strong>National Cyber Security Awareness Month</strong></em>, administered by the Department of Homeland Security. This is the perfect time of year for individuals, businesses, and other organizations to reflect on the universe of cyber threats and to do their part to protect their networks, their devices, and their data from those threats.</span></p>
<div class="mh-content-ad"><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-9162800720558968"
 crossorigin="anonymous"></script>
<ins class="adsbygoogle"
 style="display:block; text-align:center;"
 data-ad-layout="in-article"
 data-ad-format="fluid"
 data-ad-client="ca-pub-9162800720558968"
 data-ad-slot="1081854981"></ins>
<script>
 (adsbygoogle = window.adsbygoogle || []).push({});
</script></div>
<p><span class="blackgraphtx">Consider this:</span></p>
<blockquote><p><span class="blackgraphtx">Recent Cyber Successes<br />
</span></p>
<p>In May 2015, the owner and operator of the original Silk Road website—an online black market designed to enable its users to buy and sell illegal drugs and other unlawful goods and services anonymously—was sentenced to life in prison. The Silk Road site had previously been taken down by law enforcement in November 2013. In November 2014, the owner and operator of a resurrected Silk Road—Silk Road 2.0—was arrested and charged, and law enforcement took down that site as well, along with dozens of other so-called “dark market” websites. The investigation involved the cooperative efforts of the FBI and numerous local, state, federal, and international partners.</p>
<p>&#8211; <em><a class="internal-link" title="" href="https://www.fbi.gov/newyork/press-releases/2015/ross-ulbricht-aka-dread-pirate-roberts-sentenced-in-manhattan-federal-court-to-life-in-prison" target="_self" rel="noopener">More on Silk Road</a></em><br />
&#8211; <em><a class="internal-link" title="" href="https://www.fbi.gov/newyork/press-releases/2014/operator-of-silk-road-2.0-website-charged-in-manhattan-federal-court" target="_self" rel="noopener">More on Silk Road 2.0</a></em></p>
<p>In April 2015, a multi-national law enforcement effort was responsible for taking down a cyber criminal forum that served as a one-stop, high-volume shopping venue for some of the world’s most prolific cyber criminals. Darkode was an underground password-protected meeting place for those interested in buying, selling, and trading malware, botnets, stolen personally identifiable information, credit card information, hacked server credentials, and other pieces of data and software. The FBI was able to infiltrate the forum at the highest levels and collect evidence and intelligence on Darkode members. During the takedown, charges, arrests, and searches involved 70 members and associates around the world.</p>
<p>&#8211; <em><a class="internal-link" title="" href="https://www.fbi.gov/news/stories/2015/july/cyber-criminal-forum-taken-down" target="_self" rel="noopener">More on Darkode</a></em></p>
<p>In April 2015, a coordinated international law enforcement and private sector cyber effort resulted in the takedown of a botnet known as Beebone—a “downloader” that allowed other forms of malware to be installed on victims’ computers without their knowledge or consent. The secondary infections installed by Beebone included software that steals banking logins and passwords as well as fraudulent anti-virus software and ransomware.</p>
<p>&#8211; <em><a class="internal-link" title="" href="https://www.fbi.gov/news/news_blog/fbi-foreign-partners-target-botnet-affecting-victims-worldwide" target="_self" rel="noopener">More on Beebone</a></em></p></blockquote>
<ul>
<li><span class="blackgraphtx">The use of malware by online criminals continues unabated, and of the available intrusion devices, the “bot” is particularly pervasive, allowing attackers to take control remotely of compromised computers. Once in place, these “botnets” can be used in distributed denial-of-service attacks, proxy and spam services, additional malware distribution, and other organized criminal activity.</span></li>
<li><span class="blackgraphtx">Cyber criminals perpetrate a wide variety of crimes online, including theft of intellectual property, <a href="https://www.fraudswatch.com/internet-fraud-tips-and-descriptions/amp/"><i>Internet fraud</i></a>, identity fraud, and any number of financial fraud schemes.</span></li>
<li><span class="blackgraphtx">Sexual predators use the Internet and social media to target the youngest and most vulnerable victims.</span></li>
<li><span class="blackgraphtx">And many criminals use the so-called “dark web” or “dark market” websites that offer a range of illegal goods and services for sale on a network designed to conceal the true IP addresses of the computers on it.</span></li>
</ul>
<p><span class="blackgraphtx">The FBI—working in conjunction with its many partners at the local, state, federal, and international levels, as well as with industry—takes its own role in cyber security very seriously. That role involves operational efforts—including investigating and disrupting cyber-related national security threats and cyber crimes and collecting, analyzing, and disseminating cyber threat intelligence. It also involves outreach efforts to industry.</span></p>
<p><span class="blackgraphtx">Here are just a few examples of how we’re doing all of that:</span></p>
<ul>
<li><span class="blackgraphtx">The FBI-led </span><a title="" href="https://www.fbi.gov/news/stories/2014/october/cyber-security-task-force-takes-whole-government-approach" target="_self" rel="noopener"><span class="bluegraphicboxheaders">National Cyber Joint Investigative Task Force</span></a><span class="blackgraphtx"> serves as the national focal point for coordinating cyber threat investigations. The work of the NCJITF includes a national public/private initiative to mitigate the use of botnets and malware by criminals, which has emerged as a global cyber security threat.</span></li>
<li><a title="" href="https://www.fbi.gov/about-us/investigate/cyber/cyber-task-forces-building-alliances-to-improve-the-nations-cybersecurity-1" target="_self" rel="noopener"><span class="bluegraphicboxheaders">Cyber task forces</span></a><span class="blackgraphtx"> in all 56 field offices coordinate domestic cyber threat investigations in local communities through information sharing, incident response, and joint enforcement and intelligence actions.</span></li>
<li><a title="" href="https://www.infragard.org/" target="_self" rel="noopener"><span class="bluegraphicboxheaders">InfraGard</span></a><span class="blackgraphtx"><span class="blackgraphtx">—</span>an information-sharing and analysis effort with private sector partners who own, operate, and hold key positions within some 85 percent of the nation’s critical infrastructure—equips its members to identify and mitigate vulnerabilities, develop incident response plans, and enact security best practices.</span></li>
<li><span class="blackgraphtx">The </span><a title="" href="http://www.ic3.gov/default.aspx" target="_self" rel="noopener"><span class="bluegraphicboxheaders">Internet Crime Complaint Center</span></a><span class="blackgraphtx"> (IC3) accepts online submissions for Internet-related crime complaints, often involving fraudulent claims to consumers. These complaints can not only lead to culprits getting caught, but also help identify regional, national, or international trends to educate the public about constantly evolving cyber threats and scams.</span></li>
<li><span class="blackgraphtx">The FBI’s </span><a title="" href="https://sos.fbi.gov/" target="_self" rel="noopener"><span class="bluegraphicboxheaders">Safe Online Surfing website</span></a><span class="blackgraphtx">, an online program that promotes cyber citizenship by educating young students in the essentials of online security in an effort to help protect them from child predators, cyber bullies, malware, a multitude of schemes, and other dangers on the Internet.</span></li>
</ul>
<p><span class="blackgraphtx">The Bureau will continue to work jointly with our national security and law enforcement partners to address threats to the nation’s cyber security from nation-states, terrorist organizations, transnational criminal enterprises, and child predators. But government can’t do it alone—assistance and vigilance from the public is vital.</span></p>
<p><span class="blackgraphtx">Stay tuned to this website during the month of October—we’ll be providing you with tips that will help keep your families and your businesses safe from cyber criminals.</span></p>
<p><span class="blackgraphtx"><strong>Resources:</strong><br />
&#8211; <a class="external-link" title="" href="http://www.dhs.gov/national-cyber-security-awareness-month" target="_self" rel="noopener">More on National Cyber Security Awareness Month</a><br />
&#8211; <a class="external-link" title="" href="http://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/04/30/04272015reporting-cyber-incidents-final.pdf" target="_self" rel="noopener">Department of Justice’s Best Practices for Victim Response and Reporting of Cyber Instances (pdf)</a><br />
&#8211; <a class="external-link" title="" href="http://www.dhs.gov/cybersecurity-tips" target="_self" rel="noopener">Department of Homeland Security’s cyber security tips<br />
</a><span class="external-link">&#8211; <a class="external-link" title="" href="https://www.staysafeonline.org/" target="_self" rel="noopener">Stay Safe Online website</a></span><br />
&#8211; <a class="external-link" title="" href="https://www.us-cert.gov/ncas/tips" target="_self" rel="noopener">U.S. Computer Emergency Readiness Team</a><br />
&#8211; <a class="internal-link" title="" href="https://www.fbi.gov/wanted/cyber" target="_self" rel="noopener">FBI Cyber’s Most Wanted</a><br />
&#8211; <a class="internal-link" title="" href="https://www.fbi.gov/about-us/investigate/cyber" target="_self" rel="noopener">More on FBI cyber crime efforts</a></span></p>