Organization:InfraGard

From HandWiki
Revision as of 22:29, 8 February 2024 by AnLinks (talk | contribs) (fix)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Short description: FBI Initiative for Public-Private Sector Infrastructure protection
InfraGard
InfraGard logo.gif
Formation1996
TypeNon-profit organization
Membership
86,691
Websitewww.infragard.org

InfraGard is a national non-profit organization serving as a public-private partnership between U.S. businesses and the Federal Bureau of Investigation. The organization is an information sharing and analysis effort serving the interests, and combining the knowledge base of, a wide range of private sector and government members.[1] InfraGard is an association of individuals that facilitates information sharing and intelligence between businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to preventing hostile acts against the United States.[2]

History

InfraGard began in the Cleveland, Ohio, Field Office in 1996,[3][4] and has since expanded to become a national-level program, with InfraGard coordinators in every FBI field office. Originally, it was a local effort to gain support from the information technology industry and academia for the FBI's investigative efforts in the cyber arena, but it has since expanded to a much wider range of activities surrounding the nation's critical infrastructure.[1]

The program expanded to other FBI Field Offices, and in 1998 the FBI assigned national program responsibility for InfraGard to the former National Infrastructure Protection Center (NIPC) directed by RADM James B. Plehal and to the FBI's Cyber Division in 2003.[3] Since 2003, InfraGard Alliances and the FBI said that they have developed a TRUST-based public-private sector partnership to ensure reliability and integrity of information exchanged about various terrorism, intelligence, criminal, and security matters. It supports FBI priorities in the areas of counterterrorism, foreign counterintelligence, and cybercrime.[3][5]

Information sharing

InfraGard chapters participate to assure that the critical infrastructure owners and operators—estimated at 85% private sector—are engaged and represented in local and regional planning efforts.[6] Working on all 16 critical infrastructure sectors, the organization provides resources and information not only on prevention, but also on building resilience and response capabilities.[7]

Training

InfraGard chapters around the nation also provide cyber and physical security training sessions that focus on the latest threats as identified by the FBI. Sessions include threat briefings, technical sessions on cyber and physical attack vectors, response training, and other resources to help CISOs and CSOs protect their enterprise. InfraGard approaches threats to critical infrastructure from both a tactical and strategic level, addressing the needs of those on the front lines of security as well as those decision makers tasked with assessing their enterprise's vulnerabilities and allocating resources to protect it.[8]

The information sharing between the organization and government has been criticized by those protecting civil liberties, concerned the membership would be surrogate eyes and ears for the FBI.[9] The group has also been the subject of hacking attacks intended to embarrass the FBI.[10] Local chapters regularly meet to discuss the latest threats or listen to talks from subject matter experts on security issues,[11] with membership open to U.S. citizens at no cost.[12] As of July 2012, the organization reported membership at over 54,677 (including FBI).[3]

Civil liberties

Partnership between government agencies and private organizations has its critics.[9][13][14] Concerned about civil liberties, the American Civil Liberties Union (ACLU) warned that there "is evidence that InfraGard may be closer to a corporate TIPS program, turning private-sector corporations — some of which may be in a position to observe the activities of millions of individual customers — into surrogate eyes and ears for the FBI". Concluding that "any program that institutionalizes close, secretive ties between such organizations raises serious questions about the scope of its activities, now and in the future."[9][11] While others describing Infragard state "the architecture of the Internet—and the many possible methods of attack— requires governments, corporations, and private parties to work together to protect network security and head off threats before they occur."[15] Responding to the ACLU criticism, Chairwoman Kathleen Kiernan of the InfraGard National Members Alliance (INMA) denies that InfraGard is anything but beneficial to all Americans stating "It's not an elitist group in any way, shape or form," she says. "We're out there trying to protect everybody. Any U.S. citizen on the planet is eligible to apply to InfraGard."[11]

LulzSec attacks

In 2011, LulzSec claimed responsibility for attacking chapter websites managed by local members in Connecticut and Atlanta, in order to embarrass the FBI with "simple hacks".[10] The group leaked some of InfraGard member e-mails and a database of local users.[16] The group defaced the website posting the following message, "LET IT FLOW YOU STUPID FBI BATTLESHIPS", accompanied with a video. LulzSec has posted the following message regarding the attack:

It has not come to our unfortunate attention that NATO and our good friend Barrack Osama-Llama 24th-century Obama [sic] have recently upped the stakes with regard to hacking. They now treat hacking as an act of war. So, we just hacked an FBI affiliated website (Infragard, specifically the Atlanta chapter) and leaked its user base. We also took complete control over the site and defaced it[.][17]

2022 breach

In December 2022 it was reported that an 80,000 member database of Infragard was allegedly breached by a cybercriminal using the username "USDoD" on a hacking forum after he completed a social engineering attack by posing as a CEO of a major United States financial institution applying for InfraGard membership to both Infraguard members and the FBI who later granted the hacker InfraGard membership and access to the InfraGard portal, once granted access the hacker used a script to obtain the InfraGard database information. Following the hack "USDoD" then asked for $50,000 for the entire database on a hacking forum. The FBI has not commentated on the hack but was aware of the false account in the InfraGard portal. The hack occurred roughly one year after the 2021 FBI email hack.[18][19][20]

See also

  • MATRIX – Information sharing partnership between various local, state and federal law enforcement agencies
  • Fusion Center - Information sharing between federal agencies such as the FBI and state, local, and tribal law enforcement. The private sector sometimes provides information and analysis.
  • Operation TIPS – Program to have citizens provide information to law enforcement and intelligence agencies
  • Terrorism Liaison Officer

References

  1. 1.0 1.1 "Robert S. Mueller, III -- InfraGard Interview at the 2005 InfraGard Conference" (mov). Infragard (Official Site) -- "Media Room". Archived from the original on 2011-06-17. https://web.archive.org/web/20110617004540/http://www.infragard.net/media/files/dir_med.mov. Retrieved 2009-12-09. 
  2. "Infragard, Official Site". Infragard. http://www.infragard.net/. Retrieved 2012-07-10. 
  3. 3.0 3.1 3.2 3.3 "About Infragard". Infragard (Official site). Archived from the original on 2011-05-18. https://web.archive.org/web/20110518063131/http://www.infragard.net/about.php. Retrieved 2009-12-09. 
  4. "InfraGard History". InfraGard National Members Alliance. Archived from the original on 2010-01-08. https://web.archive.org/web/20100108161523/http://www.infragardmembers.org/modules/content/index.php?id=5. 
  5. "InfraGard - A Partnership That Works". FBI. 2010-03-08. https://www.fbi.gov/news/stories/2010/march/infragard_030810. Retrieved 2012-07-15. 
  6. Christopher, Ryan (22 March 2016). "MWCOG and InfraGardNCR Key to Government Engagement with Private Sector Critical Infrastructure Stakeholders". CIP Report (George Mason University). http://cip.gmu.edu/2016/03/22/mwcog-infragardncr-key-government-engagement-private-sector-critical-infrastructure-stakeholders/. Retrieved August 16, 2016. 
  7. Stone, Andrea (14 March 2016). "Four Key Imperatives to Building Effective Transportation Infrastructure Resilience". CIP Report (George Mason University). http://cip.gmu.edu/2016/03/14/four-key-imperatives-building-effective-transportation-infrastructure-resilience/. Retrieved August 16, 2016. 
  8. NCR, InfraGard. "TAC-STRAT: A Tactical and Strategic Look at Cyber Security". http://www.eventbrite.com/e/infragard-presents-tacstrat-a-tactical-strategic-look-at-cybersecurity-tickets-18470999256#. Retrieved August 16, 2016. 
  9. 9.0 9.1 9.2 Stanley, J. (2004). The Surveillance-Industrial Complex: How the American Government is Enlisting Private Parties in the Construction of a Surveillance Society (Report). ACLU. p. 12. https://www.aclu.org/files/FilesPDFs/surveillance_report.pdf. Retrieved 2011-06-05. 
  10. 10.0 10.1 "Hackers Claim Strike On FBI Partner--Again". Huffington Post. June 21, 2011. http://www.huffingtonpost.com/2011/06/21/lulzsec-hack-fbi-partner-infragard-ct_n_881038.html. 
  11. 11.0 11.1 11.2 Kaplan, D. (2009-01-01). "On guard: InfraGard makes strides under new leadership". SCMagazine. https://www.scmagazine.com/home/security-news/features/on-guard-infragard-makes-strides-under-new-leadership/. Retrieved 2012-07-15. 
  12. "InfraGard Membership". InfraGard. Archived from the original on 2012-07-17. https://web.archive.org/web/20120717024915/http://www.infragard.net/member.php. Retrieved 2012-07-15. 
  13. Madsen, W. (1999). "Details emerge of NSA and FBI involvement in domestic US computer security". Computer Fraud & Security 1999 (1): 10–11. doi:10.1016/S1361-3723(00)86979-1. 
  14. Joh, E. E. (2006). "The Forgotten Threat: Private Policing and the State". Indiana Journal of Global Legal Studies 13 (2): 357–389. doi:10.2979/GLS.2006.13.2.357. https://www.repository.law.indiana.edu/cgi/viewcontent.cgi?article=1329&context=ijgls. 
  15. Balkin, J. M. (2008). "The Constitution in the National Surveillance State". Minnesota Law Review 93 (1). http://www.minnesotalawreview.org/wp-content/uploads/2012/01/Balkin_MLR.pdf. Balkin, Jack M. (10 June 2008). "Abstract". 
  16. "LulzSec claims to have hacked FBI-affiliated website". LA Times. 2011-06-03. http://latimesblogs.latimes.com/technology/2011/06/lulz-security-claims-to-have-hacked-fbi-affiliated-website-.html. Retrieved 2011-06-04. 
  17. Read, M. (2011-06-04). "LulzSec Hackers Go After FBI Affiliates". Gawker. Archived from the original on 2011-06-06. https://web.archive.org/web/20110606132545/http://gawker.com/5808517/lulzsec-hackers-go-after-fbi-affiliates. Retrieved 2011-06-04. 
  18. "Hacker claims breach of FBI's critical-infrastructure portal" (in en). 2022-12-14. https://apnews.com/article/technology-business-hacking-government-and-politics-4f2eeabfd6f3a998a374c1bca5c1fbc6. 
  19. "FBI's Vetted Info Sharing Network 'InfraGard' Hacked – Krebs on Security" (in en-US). 13 December 2022. https://krebsonsecurity.com/2022/12/fbis-vetted-info-sharing-network-infragard-hacked/. 
  20. "The FBI's Cybersecurity Program for Critical Infrastructure Was Hacked" (in en). 2022-12-14. https://gizmodo.com/fbi-infragard-cybersecurity-hack-critical-infrastructur-1849893073. 

Further reading

External links