Jump to ContentJump to Main Navigation
Advances in Cyber SecurityTechnology, Operations, and Experiences$
Users without a subscription are not able to see the full content.

D. Frank Hsu and Dorothy Marinucci

Print publication date: 2013

Print ISBN-13: 9780823244560

Published to Fordham Scholarship Online: September 2015

DOI: 10.5422/fordham/9780823244560.001.0001

Show Summary Details
Page of

PRINTED FROM FORDHAM SCHOLARSHIP ONLINE (www.fordham.universitypressscholarship.com). (c) Copyright Fordham University Press, 2022. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in FSO for personal use.date: 23 May 2022

Cyber Security

Cyber Security

Safeguarding Our Cyberspace

(p.235) Cyber Security
Advances in Cyber Security

Robert S. Mueller

Fordham University Press

This chapter deals with the evolving nature of cyber threats, what the FBI is doing to combat them, and how we can work together to keep them at bay. It first considers cyber threats to national security and counterintelligence intrusions and economic espionage. It then details how the FBI pursues cyber threats through the cyber squads in each of its fifty-six field offices around the country, with more than 1,000 specially trained agents, analysts, and digital forensic examiners. Together, they run complex undercover operations and examine digital evidence; share information with law enforcement and intelligence partners; and teach their counterparts—both at home and abroad—how best to investigate cyber threats. The chapter also highlights the role of the private sector in helping the FBI stem the rising tide of cyber crime and terrorism.

Keywords:   FBI, cyber security, cyber threats, cyber crime, national security, counterintelligence intrusions, economic espionage

Fordham Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .