The NCFTA functions as a conduit between private industry and law enforcement with a core mission to identify criminals or criminal groups responsible for cyber-based threats against US interests. In an effort to streamline intelligence exchange, the NCFTA will often organize SME interaction into threat-specific initiatives. Once a significant online scheme is realized and a stakeholder consensus defined, an initiative is developed wherein the NCFTA manages the collection and sharing of intelligence with the affected parties, industry partners, appropriate law enforcement (as needed), and other SMEs.
The objective of each initiative is to share and develop timely intelligence to an actionable level in order to identify threat actors, mitigate threats, and provide intelligence to law enforcement in order to neutralize threats.
What will the NCFTA provide for participants?
What is expected from participants?
Stakeholder Engagement Options
The primary objectives of this public/private alliance are to:
* If an organization cannot specifically articulate this with credibility – as it relates to NCFTA primary objectives- this engagement may not be appropriate.
For each level of engagement there is a suggested annual base funding option. There is no pre-established “high” end for each level. Qualifications for different levels are established with a base funding level and further distinguished by both the services/capacity of NCFTA (& SME) resources leveraged, and the in-kind contributions, separate from funding that each organization makes toward the overall goals/objectives listed herein.
1 (Base level)
Previously listed NCFTA assets and:
2 (Mid Level)
3 (Premier level)
Evaluated based on your organization’s contribution to primary objectives and on enhancing the NCFTA’s ability to credibly deliver capacity in levels 1 and 2 above.
The NCFTA may also accept general funding/contributions (no established limit) which are intended to enable the NCFTA to further develop core competencies, and to pursue emerging threat research areas which in turn are designed to enhance the NCFTA’s ability to deliver on its primary objectives.
FOR IMMEDIATE RELEASE Contact: Fleishman-Hillard Alex Kepnes, 703-575-8900 [email protected] PENNSYLVANIA GOVERNOR TOM CORBETT, FBI, DEPARTMENT OF HOMELAND SECURITY, AND UNITED KINGDOM OFFICIALS TO ADDRESS GOVERNMENT AND INDUSTRY COLLABORATION ON FIGHTING CYBER THREATS Forum to Focus on Steps Industry and Government Must Take to Address Cyber Threats at National, State and Local Levels [...]
Individuals should be vigilant of emails concerning tax refunds. Fraudsters consistently send spam appearing to be from the IRS and financial institutions containing a link to a phishing website and/or malware typically during tax season in the US. Fraudsters then attempt to either socially engineer potential victims and/or infect their computers in order to gain [...]
The NCFTA, along with its law enforcement and industry partners, has observed that cyber criminals are gaining access to compromised email accounts and leveraging the relationship between the email account holder and their financial advisor to request unauthorized wire transfers. The criminals either use the existing email address or slightly change the email address by adding or supplementing a letter or number. The criminals then typically attempt to socially engineer the advisor through stories of hardship or loss in order to justify the wire transfer.
Once the criminals have verified the amount in the account, they request that funds be sent to bank accounts in the US, Australia, and Malaysia. Some of the funds sent to US and Australian accounts have ultimately been sent to Malaysian accounts. Some of the money mules were recruited by romance scams on dating websites. Banks, brokerage firms, and credit unions of all sizes have been affected by this scam.
Please see http://www.ic3.gov/media/2012/EmailFraudWireTransferAlert.pdf for additional information on this scam and guidance on how to report such incidents to law enforcement.