Easy access to all the Government news updates

Subscribe and receive personalized news articles straight in your inbox

*By clicking "Join us now" you agree to receive emails, promotions and general messages from ExecutiveGov. In addition, you also agree to ExecutiveGov's Privacy Policy and Terms & Conditions.


FBI Director: No One Entity Can Stop Cyber Crime

3 mins read
Photo: FBI New York
Photo: FBI New York

Last week’s International Conference on Cyber Security 2010 brought together global leaders and representatives from more than 40 countries in emerging cyber threat analysis and enforcement at Fordham University’s Lincoln Center campus in New York City.

Held Aug. 2-5, the joint effort between the FBI and Fordham University gathered representatives from various law-enforcement and government agencies, academic institutions and private industries. Among other related topics, participants discussed advancements in cybersecurity and emerging cyber threats.

Speaking at the conference, FBI Director Robert S. Mueller, III said a cyber attack could have the same impact as a well-placed bomb.

“To date, terrorists have not used the Internet to launch a full-scale cyber attack,” he said. “But they have executed numerous denial-of-service attacks and defaced numerous websites.”

He added later in his speech that no one entity can stop cyber crime.

“A ‘bar the windows and bolt the doors’ mentality will not ensure our collective safety,” he said. “Fortresses will not hold forever; walls will one day fall down. We must start at the source; we must find those responsible.”

Acting Assistant Director in Charge of the FBI New York Division George Venizelos said in addition to the domestic partnerships, the international partnerships give invaluable contributions and intelligence-sharing efforts for use in examining the field of cybersecurity.

“ICCS 2010 has served as a perfect venue to advance the fight against cyber crime,” he said.

President of Fordham Joseph McShane said it is both natural and providential that Fordham join with the FBI to convene experts in law enforcement, academia and industry on the integrity of the nation’s cyber infrastructure.

“In its second year, this conference, and the close partnership it represents, is a model way forward in protecting what has become a critical component of the global intellectual marketplace,” he said.

FBI New York Special Agent in Charge of the Cyber/Special Operations Division Mary Galligan stressed a collaboration between government and industry to combat cyber crime.

“The growth of cyber crime and the impact it has on the world affects not only the United States, but the international community as well,” she said. “ICCS afforded the FBI and our foreign law-enforcement partners an opportunity to share ideas and enhance the already strong bond that exists around the globe. The mitigation of today’s complex cyber crime can only be achieved through collaboration between the public and private sector.”

ExecutiveGov Logo

Sign Up Now! Executive Gov provides you with Free Daily Updates and News Briefings about DoD


  1. And the Circle of Organisatet Crime is extended on the Iranian’s that lives in Europe. The Organization have alternating layers. The lowest makes the dirty work, mostly unemployment.
    My Neighbour is an Iranian Hacker in uplevel from the Organization. Hacker, Sleeper or similarys preferably in a ground floor with a garden under a false identity for rent. Purely because of the escape and spying radius of the surrounding neighbours. All the tools was he want is in his Laptop, going around with him to the surroundings to check open W-Lan’s , Mobile activitie and so on.
    Young people have caught up and already holds in the three years to enter in the footsteps of family members to enter, but among their peers from the age of the motives talk too pompous, or you can listen legal.
    After careful keeping an the target objects, ever the Sateliteaerial as appropriate where, in its opinion in the space above it does more – such as cell phone signals, calls, internet and so on, so the signal can be used more and twice in Obfuscating serves this course only a satellite television, and before the assembly with a small technical device to twice as big as a calculator, it examined whether wireless or Wi-Fi or similar means, is active. Moves about a mobile phone from table to hand-this can be found with this little device immediately.
    About the hacker tools is to learn just been all that was free and Russian origin from the Internet, those were also in forums and on about their crimes, so I am or we are all once again delivered their funny bone to hear even if their target object above them have cracked.
    To dissimulate is also the Internet-virus protection program uses its many possibilities and kaspersky Gate to conceal the IP address, so probably know a few hackers and their backers, women and children are not what lies beneath the latter, I will not disclose now.
    Did I mention that they are more often leasing-under false names and can open the co-tenant in the apartment buildings sporadically the cellar to tap into the power sources for free flowing then in the operating costs of the general public, and the water pipes in and through the help of artisans and caretakers is also an immigrant like the other accomplices from neighboring Eastern European countries, the Persians as they like to call their country’s identity rumzumanipulieren disguise, run the water can be manipulated since the numerator and needs brought back to normal. All for free, the family idyll in appearance to the outside marked, not ofmals married and so on.
    The hostilities in and against your host country is not by chance, behind only steckennicht your countrymen but they will also meet with state employees in the public areas including jurisdiction found, unfortunately, more often entlarft legal entities as well as law enforcement officers to those groups. Although its victims than P. ……. I’ll denounce it publicly and made ready to believe, but even then sometimes they play is too talkative.
    ..:( oh he got me! Hope I can send this immidiately, and I think that is guilty to tha hacker can be done this and that but sorry is guilty the Provider to or the state employees these have access and so on , I mean the line security is not alone the facts from user. Maybee on another time I can write more to defense our Cybersecurity. Only ones, I know that any state employees speeches that their must defense the Iranian and Italian,Turkey, Asian crime background to harm your equal and much more. I look forward to continuing the undermining reality and your desire to make ready, the hopefully not succeed, I’d like to contribute in this respect of you.
    Thanks and hope we are listening later this year 🙂

Leave a Reply

Your email address will not be published.