Former FBI Agent James Gagliano: Cyber Touches Everything

  /     /     /  
Publicated : 23/11/2024   Category : security


Former FBI Agent James Gagliano: Cyber Touches Everything


Former FBI Agent James Gagliano sees the worlds of physical security and cybersecurity increasingly merging in the area of critical infrastructure.



NEW YORK -- ISC East -- When James Gagliano joined the FBI in the early 1990s, Smith Corona typewriters still dominated the space on an agents desk.
Gradually that changed, with three or four FBI agents typically sharing one desktop PC in an office. Eventually, especially after the September 11 terrorist attacks in New York, Washington, DC and Shanksville, Pa., laptops, smartphones and other digital equipment became standard gear within the agency.
Now, as the world faces an increasing array of cybersecurity problems, including cyber attacks that are targeting critical infrastructure such as ports, power plants and nuclear facilities, Gagliano notes that everything related to security is cyber centric.
I saw the transition from the cyber side, and I also saw how cyber touches so many things in the realm of the FBIs focus, as well as in law enforcement and the security industry,
Gagliano
, now a retired FBI supervisory special agent, adjunct professor at St. Johns University in New York, and current on-air analyst for CNN, told Security Now in an interview.
James Gagliano, retired FBI supervisory special agent, speaking in New York City.

(Source:
Scott Ferguson for Security Now
)
It has a piece of counter-intelligence, a piece of counter-terrorism, a piece of criminal, a piece of intelligence gathering, a piece of special operations and even a piece of our admin branches, which are the six branches that the FBI focuses on... We realize that in law enforcement that just like narcotics that touch everything, especially the way terrorists earn money illegally through drug sales, its the same way with cyber. Cyber touches everything, Gagliano added.
An Army infantry officer before starting his 25-year FBI career, Gagliano admits he was slow to see cyber threats as a major law enforcement concern and focused more on physical security, including stints with the agencys SWAT unit and Hostage Rescue Team. (See
Lets Get Physical: Why Protecting Hardware Is Essential to Good Cybersecurity
.)
However, the big eye opener for Gagliano was the 2015 San Bernardino, Calif., attack that turned into a legal tussle between
Apple and the FBI
over gaining access to one of the suspects iPhones. Eventually, the agency found a hacker willing to crack the companys encryption.
In his view, the issue became whether Apple would unlock the iPhone in this one case, or whether by cooperating with law enforcement, the company would allow the government to have access to proprietary methods that would allow agents access to any phone at any time by bypassing the encryption.
This is where Gagliano sees a balancing act in the new world of cyber threats and the role technology plays.
It raises issue and I dont know what the sweet spot is, Gagliano said. I understand the concerns from the private sector and I understand the concerns from people who say, I have a right to privacy and I dont want the government or anyone else to be able to get into my phone. But I also come from a law enforcement background where I see so many incidences where that is necessary to keep people safe.
Another area of interest for Gagliano is the protection of critical infrastructure.
This is also a place where the interests of the federal government and the private section converge, especially as structures such as airports become more secure and hardened against attacks, and terrorists and other attacks begin to look for other targets that are less secure, such as industrial ports, water treatment systems, chemical plants, healthcare facilities and other critical infastructure.
At the same time, several high-profile cyber attacks have targeted the industrial control systems (ICS) that manage the safety systems of these facilities. These cyber attacks could cause damage by causing a facility-wide shutdown, or creating an entrance into network for a long-term cyber espionage scheme. (See
Industrial Manufacturing Sector Increasingly Susceptible to Cyber Attacks
.)
To counter the convergence of physical and cyber threats to these structures, Gagliano believes that the industry will invest more in red teaming exercises that can challenge the security of these facilities and pinpoint where the weak spots are.
Red teaming is not predictive. Its diagnostic. The whole goal of that is to go in, whether its a power plant or a security system on your laptop, is to probe to see where the weaknesses are, so it cant be some within the firm with a vested interest in its success, Gagliano said. It has to be a group that quote-unquote does not have a dog in this fight. That can look at attacking systems, and figure out where the weaknesses are, and where the vulnerabilities are, whether its a power plant or a stadium venue or something out there in the cyber sphere. I think read teaming is something you dont hear a lot about right now, but you will hear a lot about it in the future.
Related posts:
DoJ Charges 10 Chinese Nationals in Elaborate Cyberespionage Case
Bloomberg Hardware Hacking Story Faces Fierce Backlash From Apple & DHS
7 Russian Spies Indicted in US for Hacking Anti-Doping Agencies
Continued Russian Attacks Show Weakness of Industrial Control Systems
— Scott Ferguson is the managing editor of Light Reading and the editor of
Security Now
. Follow him on Twitter
@sferguson_LR
.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Former FBI Agent James Gagliano: Cyber Touches Everything