www.fbi.gov
Open in
urlscan Pro
2606:4700::6810:94f4
Public Scan
Submitted URL: https://ipaintfish.com/bio
Effective URL: https://www.fbi.gov/investigate/cyber
Submission Tags: falconsandbox
Submission: On September 29 via api from US — Scanned from DE
Effective URL: https://www.fbi.gov/investigate/cyber
Submission Tags: falconsandbox
Submission: On September 29 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMhttps://www.fbi.gov/@@search
<form class="navbar-form navbar-left" role="search" action="https://www.fbi.gov/@@search">
<label for="fbi-search" class="visually-hidden">Search FBI</label>
<input type="search" id="fbi-search" name="SearchableText" placeholder="Search FBI">
<button type="submit">
<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" width="18" height="18" aria-labelledby="title" role="img">
<title>Submit Search</title>
<style type="text/css">
.search-icon {
fill: #333333;
}
</style>
<path class="search-icon"
d="M 15.632,13.874259 12.336,10.581757 C 13.12,9.4309801 13.52,8.1523387 13.52,6.7458332 13.552,5.8507843 13.376,4.9877014 13.008,4.1246185 12.64,3.2615355 12.16,2.5422998 11.568,1.9509282 10.96,1.3755395 10.24,0.89604904 9.392,0.51245664 8.528,0.16083027 7.664,-0.01498292 6.784,0.0010001 5.888,0.03296613 5.024,0.22476233 4.16,0.54442267 3.296,0.86408301 2.56,1.3435735 1.984,1.9828942 1.408,2.6222149 0.928,3.3414506 0.56,4.1565845 0.192,4.9557353 0,5.8348013 0,6.7618162 c 0,0.927015 0.192,1.8060809 0.528,2.6371978 0.336,0.831117 0.816,1.550353 1.424,2.157707 0.608,0.607355 1.344,1.086845 2.176,1.438472 0.848,0.351626 1.728,0.527439 2.64,0.527439 1.408,0 2.672,-0.383592 3.824,-1.182743 l 3.312,3.292502 C 14.144,15.872136 14.416,16 14.768,16 15.104,16 15.392,15.872136 15.632,15.632391 15.872,15.392645 16,15.104951 16,14.769308 15.984,14.401698 15.872,14.114004 15.632,13.874259 Z M 9.808,9.7985894 C 8.992,10.59774 7.984,11.013299 6.784,11.061248 5.552,11.093214 4.544,10.677655 3.728,9.7985894 2.912,8.9195235 2.496,7.9125935 2.448,6.7458332 2.432,5.595056 2.848,4.5881259 3.712,3.725043 4.576,2.8619601 5.6,2.4304187 6.768,2.4464017 c 1.168,0.015983 2.176,0.4475245 3.024,1.2786413 0.848,0.8311169 1.28,1.838047 1.28,3.0207902 -0.048,1.2466753 -0.448,2.2536054 -1.264,3.0527562 z"
alt="Submit Search"></path>
</svg>
</button>
</form>
https://www.fbi.gov/@@search
<form class="navbar-form navbar-left" role="search" action="https://www.fbi.gov/@@search">
<label for="mobile-fbi-search" class="visually-hidden">Search FBI</label>
<input type="search" id="mobile-fbi-search" name="SearchableText" placeholder="Search FBI">
<button type="submit">
<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 16 16" width="18" height="18" aria-labelledby="title" role="img">
<title id="title">Submit Search</title>
<style type="text/css">
.mobilesearch-icon {
fill: #a9a9a9;
}
</style>
<path class="mobilesearch-icon"
d="M 15.632,13.874259 12.336,10.581757 C 13.12,9.4309801 13.52,8.1523387 13.52,6.7458332 13.552,5.8507843 13.376,4.9877014 13.008,4.1246185 12.64,3.2615355 12.16,2.5422998 11.568,1.9509282 10.96,1.3755395 10.24,0.89604904 9.392,0.51245664 8.528,0.16083027 7.664,-0.01498292 6.784,0.0010001 5.888,0.03296613 5.024,0.22476233 4.16,0.54442267 3.296,0.86408301 2.56,1.3435735 1.984,1.9828942 1.408,2.6222149 0.928,3.3414506 0.56,4.1565845 0.192,4.9557353 0,5.8348013 0,6.7618162 c 0,0.927015 0.192,1.8060809 0.528,2.6371978 0.336,0.831117 0.816,1.550353 1.424,2.157707 0.608,0.607355 1.344,1.086845 2.176,1.438472 0.848,0.351626 1.728,0.527439 2.64,0.527439 1.408,0 2.672,-0.383592 3.824,-1.182743 l 3.312,3.292502 C 14.144,15.872136 14.416,16 14.768,16 15.104,16 15.392,15.872136 15.632,15.632391 15.872,15.392645 16,15.104951 16,14.769308 15.984,14.401698 15.872,14.114004 15.632,13.874259 Z M 9.808,9.7985894 C 8.992,10.59774 7.984,11.013299 6.784,11.061248 5.552,11.093214 4.544,10.677655 3.728,9.7985894 2.912,8.9195235 2.496,7.9125935 2.448,6.7458332 2.432,5.595056 2.848,4.5881259 3.712,3.725043 4.576,2.8619601 5.6,2.4304187 6.768,2.4464017 c 1.168,0.015983 2.176,0.4475245 3.024,1.2786413 0.848,0.8311169 1.28,1.838047 1.28,3.0207902 -0.048,1.2466753 -0.448,2.2536054 -1.264,3.0527562 z"
alt="Submit Search"></path>
</svg>
</button>
</form>
Text Content
An official website of the United States government. Here's how you know OFFICIAL WEBSITES USE .GOV A .gov website belongs to an official government organization in the United States. SECURE .GOV WEBSITES USE HTTPS A lock () or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. Submit Search Search FBI More * Most Wanted * News * What We Investigate * How We Can Help You * Submit a Tip * About * Contact Us 1. Home 2. What We Investigate * Facebook Icon * Email Icon * * Youtube Icon * Flickr Icon * LinkedIn Icon * Instagram Icon * Search FBI Submit Search FBIFederal Bureau of Investigation CYBERCRIME What We Investigate * Terrorism * Counterintelligence * Cybercrime * Public Corruption * Civil Rights * Organized Crime * White-Collar Crime * Violent Crime * Environmental Crime * Weapons of Mass Destruction * How We Investigate * More * News * Most Wanted * FBI Guidance to Victims of Cyber Incidents on SEC Reporting Requirements * Business and Industry Partners * THE CYBER THREAT Malicious cyber activity threatens the public’s safety and our national and economic security. The FBI’s cyber strategy is to impose risk and consequences on cyber adversaries. Our goal is to change the behavior of criminals and nation-states who believe they can compromise U.S. networks, steal financial and intellectual property, and put critical infrastructure at risk without facing risk themselves. To do this, we use our unique mix of authorities, capabilities, and partnerships to impose consequences against our cyber adversaries. The FBI is the lead federal agency for investigating cyber attacks and intrusions. We collect and share intelligence and engage with victims while working to unmask those committing malicious cyber activities, wherever they are. Learn more about what you can do to protect yourself from cyber criminals, how you can report cyber crime, and the Bureau's efforts in combating the evolving cyber threat. PRIVATE SECTOR PARTNERS Learn how businesses and organizations can work with the FBI to get ahead of the threat and make an impact on our cyber adversaries. A COMPLEX, GLOBAL CONCERN Our adversaries look to exploit gaps in our intelligence and information security networks. The FBI is committed to working with our federal counterparts, our foreign partners, and the private sector to close those gaps. These partnerships allow us to defend networks, attribute malicious activity, sanction bad behavior, and take the fight to our adversaries overseas. The FBI fosters this team approach through unique hubs where government, industry, and academia form long-term trusted relationships to combine efforts against cyber threats. Within government, that hub is the National Cyber Investigative Joint Task Force (NCIJTF). The FBI leads this task force of more than 30 co-located agencies from the Intelligence Community and law enforcement. The NCIJTF is organized around mission centers based on key cyber threat areas and led by senior executives from partner agencies. Through these mission centers, operations and intelligence are integrated for maximum impact against U.S. adversaries. Only together can we achieve safety, security, and confidence in a digitally connected world. HOW WE WORK Whether through developing innovative investigative techniques, using cutting-edge analytic tools, or forging new partnerships in our communities, the FBI continues to adapt to meet the challenges posed by the evolving cyber threat. * The FBI has specially trained cyber squads in each of our 56 field offices, working hand-in-hand with interagency task force partners. * The rapid-response Cyber Action Team can deploy across the country within hours to respond to major incidents. * With cyber assistant legal attachés in embassies across the globe, the FBI works closely with our international counterparts to seek justice for victims of malicious cyber activity. * The Internet Crime Complaint Center (IC3) collects reports of Internet crime from the public. Using such complaints, the IC3’s Recovery Asset Team has assisted in freezing hundreds of thousands of dollars for victims of cyber crime. * CyWatch is the FBI’s 24/7 operations center and watch floor, providing around-the-clock support to track incidents and communicate with field offices across the country. ASSET FORFEITURE Asset forfeiture is a powerful tool used by law enforcement agencies, including the FBI, against criminals and criminal organizations to deprive them of their property used illegally and their ill-gotten gains through seizure of these assets. It is also used to compensate victims of crime. Learn more about the FBI’s asset forfeiture program and to see forfeiture in action. WHAT YOU SHOULD KNOW PROTECT YOURSELF * Taking the right security measures and being alert and aware when connected are key ways to prevent cyber intrusions and online crimes. Learn how to protect your computer, network, and personal information. UNDERSTAND COMMON CRIMES AND RISKS ONLINE * Business email compromise (BEC) scams exploit the fact that so many of us rely on email to conduct business—both personal and professional—and it’s one of the most financially damaging online crimes. * Identity theft happens when someone steals your personal information, like your Social Security number, and uses it to commit theft or fraud. * Ransomware is a type of malicious software, or malware, that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return. * Spoofing and phishing are schemes aimed at tricking you into providing sensitive information to scammers. * Online predators are a growing threat to young people. * More common crimes and scams RESPOND AND REPORT File a Report with the Internet Crime Complaint Center (IC3) If you are the victim of a cyber-enabled crime or fraud, file a report with the Internet Crime Complaint Center (IC3) as soon as possible. Crime reports are used for investigative and intelligence purposes. Rapid reporting can also help support the recovery of lost funds. Visit ic3.gov for more information, including tips and information about current crime trends. Contact Your Local FBI Field Office If you need to report an ongoing crime, threat to life, or national security threat, file a report at tips.fbi.gov or by contacting your local field office. CYBER SAFETY TIPS Internet-enabled crimes and cyber intrusions are becoming increasingly sophisticated and preventing them requires each user of a connected device to be aware and on guard. * Keep systems and software up to date and install a strong, reputable anti-virus program. * Be careful when connecting to a public Wi-Fi network and do not conduct any sensitive transactions, including purchases, when on a public network. * Create a strong and unique passphrase for each online account. * Set up multi-factor authentication on all accounts that allow it. * Examine the email address in all correspondence and scrutinize website URLs before responding to a message or visiting a site * Don’t click on anything in unsolicited emails or text messages. * Be cautious about the information you share in online profiles and social media accounts. Sharing things like pet names, schools, and family members can give scammers the hints they need to guess your passwords or the answers to your account security questions. * Don't send payments to unknown people or organizations that are seeking monetary support and urge immediate action. ADDITIONAL RESOURCES AND RELATED PRIORITIES THE IRAN THREAT Threats from the Iranian regime and its terrorist partners are far reaching. The FBI is committed to identifying and disrupting all Iranian intelligence and military operations that threaten American citizens or our nation's security and critical infrastructure. LAWFUL ACCESS Law enforcement agencies all over the country are bumping up against “warrant-proof” encryption. This means that even with a warrant, law enforcement cannot obtain the electronic evidence needed to investigate and prosecute crimes or security threats. CYBER NEWS * 09.26.2024 Virginia Man Sentenced to Three Years in Prison for Sextortion Scheme Targeting More Than 100 Young Female Victims Across the Country * 09.26.2024 Two Nigerian Nationals Charged in Connection with Business E-Mail Compromise Scheme * 09.26.2024 Plymouth Man Indicted for His Role in International Conspiracy to Traffic Counterfeit Computer Network Devices * 09.26.2024 United States Seizes More Than $6 Million in Alleged Proceeds of a Crypto-Confidence Scheme * 09.25.2024 Air National Guardsman Pleads Guilty in Murder-for-Hire Scheme * 09.23.2024 Businessman Sentenced to More Than Two Years in Federal Prison for Running Fencing Operation Out of Suburban Chicago Stores * 09.23.2024 Seven Charged After Federal Investigation Disrupts Massive Counterfeit Pill Manufacturing Operation * 09.18.2024 Court-Authorized Operation Disrupts Worldwide Botnet Used by People’s Republic of China State-Sponsored Hackers * 09.18.2024 FBI Director Announces Chinese Botnet Disruption, Exposes Flax Typhoon Hacker Group’s True Identity at Aspen Cyber Summit * 09.18.2024 Director Wray's Remarks at the 2024 Aspen Cyber Summit More News FEATURED STORY FBI STRATEGY ADDRESSES EVOLVING CYBER THREAT * Most Wanted * Ten Most Wanted * Fugitives * Terrorism * Kidnappings / Missing Persons * Seeking Information * Bank Robbers * ECAP * ViCAP * FBI Jobs * Submit a Tip * Crime Statistics * History * FOIPA * Scams & Safety * FBI Kids * News * Stories * Videos * Press Releases * Speeches * Testimony * Podcasts and Radio * Photos * Español * Apps * How We Can Help You * Law Enforcement * Victims * Parents and Caregivers * Students * Businesses * Safety Resources * Need an FBI Service or More Information? * What We Investigate * Terrorism * Counterintelligence * Cyber Crime * Public Corruption * Civil Rights * Organized Crime * White-Collar Crime * Violent Crime * WMD * About * Mission & Priorities * Leadership & Structure * Partnerships * Community Outreach * FAQs * Contact Us * Field Offices * FBI Headquarters * Visit the FBI Experience * Overseas Offices * Additional Resources * Accessibility * eRulemaking * Freedom of Information / Privacy Act * Legal Notices * Legal Policies & Disclaimers * Privacy Policy * USA.gov * White House * No FEAR Act * Equal Opportunity FBI FEDERAL BUREAU OF INVESTIGATION * * * * * * FBI.GOV CONTACT CENTER EMAIL UPDATES * * Accessibility * eRulemaking * Freedom of Information / Privacy Act * Legal Notices * Legal Policies & Disclaimers * * Privacy Policy * USA.gov * White House * No FEAR Act * Equal Opportunity FBI.gov is an official site of the U.S. Department of Justice © Search FBI Submit Search * Home * Most Wanted * News * What We Investigate * Terrorism * Counterintelligence * Cybercrime * News * Most Wanted * FBI Guidance to Victims of Cyber Incidents on SEC Reporting Requirements * Business and Industry Partners * * Public Corruption * Civil Rights * Organized Crime * White-Collar Crime * Violent Crime * Environmental Crime * Weapons of Mass Destruction * How We Investigate * More * How We Investigate * How We Can Help You * Submit a Tip * About * Contact Us * Crime Statistics * Photos * Video * Outreach * History * FOIA * Scams & Safety * FBI Kids * FBI Jobs CONTENTS * Overview * Private Sector Partners * Combating the Threat * How We Work * What You Should Know * Respond and Report * Resources * Cyber News