linked to www.secretservice.gov header image linked to www.secretservice.gov header image linked to www.secretservice.gov header image
Skip Header InformationSkip to navigation United States Secret Service USSS Star
   United States Secret Service Star

CIO Magazine, FBI and Secret Service Announce New Cyberthreat Reporting Guidelines for Businesses

Network IntrusionThe CIO Cyberthreat Response & Reporting Guidelines provide step-by-step information on how businesses should plan and respond to attacks on the information systems, including worms, viruses, hacks and other breaches. The guidelines advise CIOs and business leaders to establish a relationship with law enforcement today, before their next attack happens. The document also provides suggested points of contact, as well as an easy-to-follow report form detailing the initial information law enforcement needs to investigate

The FBI and USSS share federal jurisdiction for investigating and prosecuting cybercrime across state lines. Law enforcement's ability to identify coordinated efforts by cybercriminals is directly tied to the amount of reporting that takes place. Historically, reported cyberattacks are those of great magnitude such as the Code Red virus.

"The Secret Service continues to believe that prevention coupled with aggressive proactive investigations provide the best outcome when attacking cybercrime. This cannot be accomplished without the partnerships that have been established with industry, other law enforcement agencies, and in this case, the media. In fact with today's technology and the sophisticated nature of electronic crime, law enforcement will lose the battle and the war without sharing information and resources,"says Bruce Townsend, Special Agent in Charge, Financial Crimes Division, Secret Service.

Townsend adds, "in October, the Secret Service received authorization to set up Electronic Crimes Task Forces around the country. These now published reporting guidelines will allow industry professionals to take full advantage of these task forces and the collective expertise of federal, state and local law enforcement that these task forces create."

Download the forms

Read the article in CIO Magazine
 linked to www.secretservice.gov header image USSS Star

Search
» Search the website

Powered by USA.gov

About
» Home
» Who We Are
  - Director
  - Deputy Director
  - Special Agents
  - Uniformed Division
  - Support Personnel
» Our Dual Mission
» Rowley Training Center
» History
» Frequently Asked Questions
» Student Q&A

Contact Us
» Contact Information
» Field Offices

Investigations
» Investigative Mission
» Criminal Investigations
» Forensic Services
» Investigative Support
» Know Your Money
» Electronic Crimes Task Force
» Law Enforcement Resources

Protection
» Protective Mission
» How Protection Works
» National Special Security Events
» National Threat Assessment Center

Press Room
» Most Wanted
» Photo Gallery
» Press Releases
» FOIA
» Information Quality

Business Opportunities
» Procurement Division
(For Vendors)

Employment
» Opportunities
- Special Agent
- Uniformed Division
- Professional
- Technical
- Administrative
- Technical Security
- Student Temporary
  Employment Program
- Volunteer Interns
Student Career
  Experience Program
» Current Vacancies
» Electronic Job Application Forms
» Equal Employment Opportunity
» EEO Data Posted Pursuant to the
No FEAR Act
» Reasonable Accommodation

Partnerships
» Boys and Girls Club Partnership
» Center for Missing and Exploited Children Partnership






Copyright © 2008 United States Secret Service. All rights reserved.
http://www.secretservice.gov
Home | Privacy Policy | Security Notice | Section 508 | Department of Homeland Security | USA.gov