ACAMS Today Magazine (September-November 2017) Vol. 16 No. 4 | Page 22

AML CHALLENGES
Join the call for stronger international agreements and alliances among governments and law enforcement agencies financial transaction as it occurs. 31 Other related cyberthreats include man-in-the-mobile, man-in-the-app, man-in-the-cloud and man-in-the-IoT attacks. 32
In conclusion, on the perplexing issue of cyberattacks by nationstate actors, responses may include the following:
• Research cyberattacks by nation-state actors and commercial and governmental responses to such cyberattacks. Online search terms like“ advanced persistent threats”( APTs) may be helpful. APTs often cover large-scale cyberattacks incited by nation-states— such as China, Russia, Iran and North Korea 33— or by hacking groups, companies or organizations that serve as their proxies. 34 APTs may also include cyberattacks that are directed at major institutions by foreign terrorists and criminal organizations. 35
• File timely suspicious activity reports( SARs), pursuant to the U. S. Department of the Treasury’ s Financial Crimes Enforcement Network’ s recently issued advisory to financial institutions on cyber-events and cyber-enabled crime. 36
• In addition to filing SARs, other public-private information sharing options may include those outlined by the Cybersecurity Information Sharing Act of 2015( CISA), 37 a U. S. federal law designed to encourage public-private information sharing on cyberthreats. 38 Please note:
— CISA is not a substitute for other federal reporting, such as timely SAR filings. 39
— CISA submissions must be attentive to information privacy and cybersecurity concerns, given the possibility of a CISA data breach by cybercriminals, including nation-state actors and their proxies. 40
— CISA has been criticized by information privacy and civil liberties groups, like the Electronic Frontier Foundation( EFF) 41 and the American Civil Liberties Union( ACLU). 42
• Join the call for stronger international agreements and alliances among governments and law enforcement agencies, prompted by the recent wave of cyberattacks backed by nation-states. 43
31
Dauda Sule,“ Man in the Browser— A Threat to Online Banking,” ISACA Journal, Volume 4, 2016, https:// www. isaca. org / Journal / archives / 2013 / Volume-4 / Documents / 13v4-Man-in-the-Browser. pdf
32
Michael Gregg,“ Six Ways You Could Become a Victim of Man-in-the-Middle( MiTM) Attacks This Holiday Season,” Huffington Post, November 12, 2016, http:// www. huffingtonpost. com / michael-gregg / six-ways-you-could-become _ b _ 8545674. html
33
Frank J. Cilluffo,“ Emerging Cyber Threats to the United States,” United States House of Representatives testimony, February 26, 2016, http:// docs. house. gov / meetings / HM / HM08 / 20160225 / 104505 / HHRG-114-HM08-Wstate-CilluffoF-20160225. pdf
34
Tom Spring,“ Nation States Distance Themselves from APTs,” Threatpost, February 14, 2017, https:// threatpost. com / nation-states-distancing-themselves-from-apts / 123711 /
35
Limor Kessem,“ Organized Cybercrime’ s New Bull’ s-eye: Bankers,” SecurityIntelligence, April 8, 2016, https:// securityintelligence. com / organized-cybercrimes-new-bulls-eye-bankers /
36
“ FIN-2016-A005 Advisory to Financial Institutions on Cyber-Events and Cyber-Enabled Crime,” United States Department of the Treasury- Financial Crimes Enforcement Network, October 25, 2016, https:// www. fincen. gov / sites / default / files / advisory / 2016-10-25 / Cyber % 20Threats % 20Advisory % 20- % 20FINAL % 20508 _ 2. pdf
37
S. 754,“ Cybersecurity Information Sharing Act of 2015,” Congress. gov, October 27, 2015, https:// www. congress. gov / 114 / bills / s754 / BILLS-114s754es. pdf
38
Brad S. Karp,“ Federal Guidance on the Cybersecurity Information Sharing Act of 2015,” Harvard Law School Forum on Corporate Governance and Financial Regulation, March 3, 2015, https:// corpgov. law. harvard. edu / 2016 / 03 / 03 / federal-guidance-on-the-cybersecurity-information-sharing-act-of-2015 /
39
“ Guidance to Assist Non-Federal Entities to Share Cyber Threat Indicators and Defensive Measures with Federal Entities under the Cybersecurity Information Sharing Act of 2015,” United States Department of Homeland Security, United States Department of Justice, June 15, 2016, https:// www. us-cert. gov / sites / default / files / ais _ files / Non-Federal _ Entity _ Sharing _ Guidance _% 28Sec % 20105 % 28a % 29 % 29. pdf
40
Robyn Greene,“ Is CISA gift-wrapped for hackers and nation-state actors?,” TheHill. com, August 3, 2015, http:// thehill. com / blogs / pundits-blog / technology / 250070-is-cisa-gift-wrapped-for-hackers-and-nation-state-actors
41
Lee Tien,“ EFF Strongly Opposes CISA Cyber Surveillance Bill and CFAA Amendment,” October 22, 2015, Electronic Frontier Foundation, https:// www. eff. org / deeplinks / 2015 / 10 / eff-strongly-oppose-cisa-cyber-surveillance-bill-and-cfaa-amendment
42
Eliza Sweren-Becker,“ Congress Working in the Dark on Cybersecurity Bill,” ACLU. org, November 17, 2015, https:// www. aclu. org / blog / free-future / congress-working-dark-cybersecurity-bill
43
Dustin Volz,“‘ Digital Geneva Convention’ needed to deter nation-state hacking: Microsoft president,” Reuters, February 14, 2017, http:// www. reuters. com / article / us-microsoft-cyber-idUSKBN15T26V
22 ACAMS TODAY | SEPTEMBER – NOVEMBER 2017 | ACAMS. ORG | ACAMSTODAY. ORG