Oversight of Section 702 of the Foreign Intelligence Surveillance Act and Related Surveillance Authorities

Source: Federal Bureau of Investigation FBI Crime News

I. Introduction

Chairman Durbin, Ranking Member Graham, distinguished members of the Committee, thank you for the opportunity to speak to you about Section 702 of the Foreign Intelligence Surveillance Act (FISA), the vital intelligence authority which, along with other FISA provisions, will expire at the end of this year unless Congress renews it.

Section 702 authorizes the Intelligence Community to collect critical foreign intelligence information about foreign targets located outside the United States with the compelled assistance of U.S. communications service providers. In the fifteen years since its enactment, Section 702 has proven indispensable to U.S. national security. Every day it helps protect Americans from a host of new and emerging threats—such as terrorist plots, weapons of mass destruction, malicious cyber activity, and hostile state behavior from China and Russia.

As described below, Section 702 is an elegant solution to an operational challenge created by the advent of the Internet and changes in the technology supporting international communications. It authorizes the Intelligence Community to collect vital intelligence overseas while requiring the Intelligence Community to comply with rigorous safeguards that protect the rights of Americans. It is a cornerstone of our Intelligence Community’s efforts to identify and understand a broad range of challenges our country faces in an increasingly complex and dangerous world. And it remains a paradigmatic example of congressional leadership in national security. Without it, the United States and its allies and a partners would be less safe.

Presidents of both parties have strongly supported it and attested to Section 702’s importance to national security. Congress, recognizing Section 702’s critical value and stringent protections, has three times voted on a bipartisan basis to authorize it, first in 2008, and then in 2012 and again in 2018. If Congress allows this authority to lapse, or renews it in a diminished form, the United States will lose access to critical intelligence about strategic national priorities and threats around the world.

Section 702 is subject to robust privacy protections and oversight by all three branches of government. This structure enables the government to proactively identify, transparently disclose, and swiftly address compliance risks. For example, the Department of Justice (DOJ) and Federal Bureau of Investigation (FBI) recently imposed additional safeguards in response to compliance incidents related to procedures for accessing data lawfully collected through Section 702.

This Committee plays an important role in overseeing this critical surveillance authority, and we stand ready to provide you with the information you need regarding the use of Section 702. The executive branch is committed to working with the Committee and the rest of the Congress on reforms to further enhance privacy protections while fully preserving the efficacy of this vital national security tool.

Today we will illustrate the immense national security value of Section 702; describe its origin and legal structure; outline its compliance regime; and address concerns regarding privacy, particularly with respect to U.S. person queries of Section 702 data.

II. The Value of Section 702 Collection

Section 702 provides foreign intelligence information that is indispensable to protect the nation against national security threats. It has proved invaluable in protecting American lives and U.S. national security. There is no way to replicate Section 702’s speed, reliability, specificity, and insight. In many cases, Section 702 is the sole source of our information about foreign threats to the United States and its people.

Section 702 has been tremendously effective in combatting international terrorism, the dominant national security concern when Congress initially enacted the authority. In 2009, for example, Section 702 helped foil an active plot to bomb the New York City subway. National Security Agency (NSA) analysts relied on Section 702 to acquire the email communications of a suspected Al-Qa’ida courier in Pakistan and discovered a message sent by someone in the United States seeking advice about making explosives. The FBI identified that person as Najibullah Zazi and was able to disrupt his plot in time to save countless lives. Moreover, Section 702’s value to the government’s efforts to counter international terrorism continues to the present day. Just last year, in July 2022, Section 702 played an important role in the strike against Al-Qa’ida’s leader, Ayman al-Zawahiri. Section 702 collection contributed significantly to our knowledge that alZawahiri was living in a safe house in downtown Kabul.

Section 702’s utility extends well beyond counterterrorism. It provides critical insights on some of the most urgent threats to U.S. national security.

  • Section 702 has been used to identify ransomware attacks on U.S. critical infrastructure, and multiple attacks have been identified and defended against because of Section 702 collection.
  • For example, Section 702 played an important role in the U.S. Government’s response to the cyberattack on Colonial Pipeline attack in 2021. Using Section 702, the Intelligence Community acquired information that verified the identity of the hacker, as well as information that enabled U.S. Government efforts to recover the majority of the ransom.
  • Section 702–acquired information related to sanctioned foreign adversaries was used in U.S. government efforts to stop components for weapons of mass destruction from reaching foreign actors.
  • Section 702 information has identified key economic security risks, including strategic malign investment by foreign actors in certain U.S. companies.
  • Section 702 collection has helped identify when hostile foreign intelligence services are trying to send their operatives into the United States to recruit spies here in the United States.
  • Finally, Section 702–acquired information revealed:
    • insights that have informed the U.S. government’s understanding of the Chinese origins of a chemical used to synthesize fentanyl;
    • foreign actors’ illicit plans to smuggle methamphetamine across the U.S. border;
    • the quantities and potency of drugs, including fentanyl, destined for illegal transfer to the United States, as well as specific smuggling techniques used to avoid detection; and
    • a foreign narcotics trafficker’s purchase of a vast quantity of pills for transfer to the United States.

Today, Section 702 not only helps defend and protect the United States but also helps advance U.S. foreign policy priorities around the world. For example:

  • Section 702 has helped uncover gruesome atrocities committed by Russia in Ukraine—including the murder of non-combatants, the forced relocation of children from Russian-occupied Ukraine to the Russian Federation, and the detention of refugees fleeing violence by Russian personnel. This and other information have helped the U.S. government to galvanize accountability efforts related to Ukraine by confidently and accurately speaking to the international community about Russia’s atrocities.
  • Section 702 data helped expose efforts by foreign powers, including China, to coerce nations to oppose international responses to human rights violations. This reporting enabled U.S. diplomats to assist countries in shielding themselves from coercion and influence.
  • In 2021, Section 702 data enabled U.S. diplomats to demarche a Middle Eastern country over its efforts to monitor and track dissidents abroad, as well as dissidents here in the United States.
  • In 2022, Section 702 data was vital in warning the international community, the private sector, and the public about efforts by North Korea to deploy information technology workers to commit fraud against a global industry, including against US businesses, to generate revenue for its nuclear program.

Section 702 plays a key role in advancing the missions of each of our agencies.

  • Central Intelligence Agency (CIA): At CIA, Section 702 collection enables missions against the full range of foreign intelligence priorities—including all adversarial nation states, counterproliferation, cyber, counterintelligence, counternarcotics, and counterterrorism—and is foundational to our analysis in support of policymakers. Section 702 collection illuminates actionable opportunities against foreign individuals and networks of intelligence concern more comprehensively than any other single data source; for example, Section 702 collection enabled over 70% of the successful weapons and counterproliferation disruptions supported by CIA from 2018 to2022. Section 702 has also been used in efforts to prevent U.S. technology being acquired by adversaries for their advanced weapons programs, and Section 702 supports CIA’s ability to run safe human intelligence operations abroad and gain invaluable insight into human assets, the individuals who have put their lives on the line to work for the United States.

    Moreover, every day CIA analysts produce dozens of products to inform the President, Congress, and other senior officials within our government, and a sizeable proportion of the intelligence that goes into these products comes from Section 702 collection. To take one example, the WIRe—or the World Intelligence Review—is one of CIA’s primary tools for disseminating intelligence electronically. CIA analysts cited at least one FISA Section 702 intelligence report in nearly 40% of WIRe products published over the past year. FISA Section 702–derived intelligence reports are published by several agencies, and they are most-often cited in WIRe products on some of our most critical intelligence targets.

  • National Security Agency: Section 702 is essential to NSA’s foreign signals intelligence (SIGINT) mission: Approximately 20% of NSA reporting in 2022 contained Section 702 information, and 702 also plays a significant role in enabling SIGINT collection under other authorities. Intelligence obtained from Section 702 has protected U.S. and allied forces, stopped significant terrorist plots, and prevented cyber-attacks. Section 702 also regularly provides NSA with insights into the strategic intentions of China, Russia, Iran, and North Korea. Across all of NSA’s mission areas, this authority is an invaluable resource. 100% of the President’s intelligence priorities topics reported on by NSA were supported by the Section 702. With Section 702, NSA’s ability to provide intelligence on the most significant threats to our nation would be significantly diminished.
  • Federal Bureau of Investigation: Section 702 collection is critical to the FBI’s ability to fulfill its unique role and responsibility in the Intelligence Community, which is focused on protecting the homeland, and Americans, from foreign threats. The FBI uses Section 702 across the entire range of its national security investigations: to go after foreign terrorist organizations seeking to conduct attacks within the U.S., counter foreign spies and proliferators, and get in front of increasingly sophisticated and prolific foreign cyber actors targeting Americans.

    Section 702 is a particularly, and increasingly, important tool in the FBI’s mission to protect the United States and its critical infrastructure from malicious foreign cyber activity. Its agility is especially important in a technology environment where those foreign cyber actors can move to new communication accounts and infrastructure in a matter of hours, if not minutes. Section 702 produces valuable insight the FBI uses to notify victims who often don’t know they’ve been compromised, warn targeted entities who are likely to be compromised next, and provide unclassified threat intelligence to help mitigate active or recent intrusions and prevent potential future incidents

Many of the most significant examples of the utility and importance of Section 702 remain classified by virtue of the need to protect intelligence sources and methods. While classified examples are available to this Committee, it is essential that the legislative and public discussion of these authorities be informed, to the extent possible, by concrete examples of its value. To that end, the Intelligence Community is working to declassify additional examples of the role Section 702 plays in defending the United States and its citizens.

III. Overview of Section 702

Origin of Section 702

When Congress first passed FISA in 1978, it primarily intended for the law to regulate surveillance activities inside the United States. The advent of the Internet and changes in the technology supporting international communications led to significant unintended consequences in the operation of FISA. As a result of these technological changes, terrorists, hackers, spies, and other foreign intelligence targets abroad used communications services based in the United States, including those provided by U.S.-based Internet service providers (ISPs).

Prior to the enactment of Section 702, when the Intelligence Community wanted to collect communications between, for example, two terrorism targets both located overseas who happened to be using a U.S.-based ISP, the government was required to obtain a court order under Title I or Title III of FISA (“traditional FISA”) from the Foreign Intelligence Surveillance Court (FISC). A traditional FISA order requires that the government demonstrate probable cause that the target is a foreign power or an agent of a foreign power and, in the case of Title I orders, that the target is using or about to use the targeted facility, such as a telephone number or an email account. Requiring individual court orders for intelligence collection aimed at non-U.S. persons abroad was both extraordinarily burdensome operationally and unnecessary legally, because the Supreme Court has held such individuals are not entitled to Fourth Amendment protections. Indeed, no other country is known to require individualized court orders to authorize intelligence activities targeting foreigners outside their borders.

Requiring traditional FISA orders became operationally unsustainable in the years following the 9/11 terrorist attacks because of the increasing terrorist threats emanating from overseas to the United States and our allies. In 2008, against this backdrop, Congress enacted Section 702 as part of the FISA Amendments Act (FAA).1 As mentioned above, Section 702 authorizes the government, with the approval and oversight of the FISC on a programmatic basis, to compel the assistance of providers in the United States in obtaining communications of non-U.S. persons located outside the United States to acquire foreign intelligence information. It allows the government to target for collection only foreign targets located overseas that are reasonably assessed to have foreign intelligence information. 

The statute also provides for comprehensive oversight by all three branches of government. This ensures the information collected about non-U.S. persons overseas is used responsibly and protects the constitutional and privacy interests of Americans whose information may be incidentally acquired when collecting foreigners’ communications.

Legal Structure

Under Section 702, the FISC approves annual certifications submitted by the Attorney General and the Director of National Intelligence (DNI) that specify classified categories of foreign intelligence that the government is authorized to acquire pursuant to the authority. The certifications serve as the legal basis for targeting specific non-U.S. persons outside the United States. Based on the certifications, the Attorney General and the DNI can direct U.S. communications service providers to assist in collection against authorized Section 702 targets. The FISC also reviews and approves the agencies’ targeting, minimization, and querying procedures on an annual basis.

Multiple provisions ensure that targeting is properly aimed at non-U.S. persons located outside the United States who are likely to possess, receive, or communicate foreign intelligence information that falls within one of the specified categories. First, the law requires the Attorney General and the DNI to certify that a significant purpose of an acquisition is to obtain foreign intelligence information. Second, only non-U.S. persons may be targeted. Third, the government may not target any person known at the time of the acquisition to be located in the United States at that time, regardless of whether they are a U.S. person. Fourth, the government may not target someone outside the United States for the purpose of targeting a particular known U.S. person or anyone in this country (“reverse targeting”). Fifth, Section 702 protects domestic communications by prohibiting the intentional acquisition of “any communication as to which the sender and all intended recipients are known at the time of the acquisition” to be in the United States. Finally, of course, any collection must be consistent with the Fourth Amendment.

Targeting and Acquisition

An agency requesting authority under Section 702 must propose for court approval detailed procedures to ensure that it targets only non-U.S. persons outside the United States and also that it does not intentionally acquire domestic communications. The National Security Agency (NSA) initiates all Section 702 collection. NSA’s targeting procedures require that there be an appropriate foreign intelligence purpose for the acquisition and that a “selector” associated with a particular target—like a phone number or e-mail address—be used by a non-U.S. person reasonably believed to be located outside the United States. An analyst must conduct due diligence to identify information in the NSA’s possession that may bear on the location or citizenship status of the potential target. NSA’s basis for obtaining communications associated with a particular selector must be documented, and DOJ reviews the documentation for every selector.

Under Section 702, each target is approved for tasking based on an individualized determination. The Intelligence Community has reported that approximately 246,073 targets were authorized for collection under the Section 702 program in 2022.

FBI and CIA do not initiate Section 702 collection but may nominate selectors to NSA for collection.2 FBI, CIA, and NCTC also do not receive all Section 702 collections, but only a small fraction relevant to their respective missions. For example, FBI may receive information only as to those Section 702 targets that the FBI determines are relevant to a full, predicated FBI national security investigation. As of 2022, that amounted to approximately 3.2% of all Section 702 targets.

Minimization, Querying, Dissemination, and Use

Under the statute, each agency must have its own minimization procedures. These impose strict controls with respect to all acquired data, regardless of the nationality of the individual to whom the data pertains. All personnel who are granted access to Section 702 information are required to receive training on the minimization procedures. The minimization procedures specify the duration of time for which data can be retained.3

Since 2018, the statute has required the government to have separate procedures governing queries, which had previously been addressed as part of minimization procedures. Queries do not result in any additional collection. Rather, they allow an agency to quickly and effectively locate foreign intelligence information within what the agency collected previously through the use of Section 702. The query procedures limit the ways in which personnel can query Section 702 data using a term that is associated with a U.S. person, such as a name or telephone number. As discussed further below, U.S. person queries of Section 702 collection help us detect and evaluate connections between lawfully targeted non-United States persons involved in terrorist plots, cyber attacks, and other national security threats and U.S. persons.

Queries are subject to a three-part standard. First, the query must have an authorized purpose: to obtain foreign intelligence information, or, only in the case of the FBI, to obtain evidence of a crime. Second, the query must be reasonably designed for that purpose. And third, there must be a specific factual basis to believe the query is reasonably likely to retrieve foreign intelligence information or evidence of a crime. As described below, the Intelligence Community and DOJ in recent years have taken steps to impose additional privacy safeguards surrounding querying of Section 702 data.

There are also additional controls on the dissemination and use of Section 702–acquired information. An agency is permitted to disseminate information identifying a U.S. person to other entities only under the limited exceptions in the minimization procedures, for example, when such information is foreign intelligence information, necessary to understand foreign intelligence information or assess its importance, or evidence of a crime. The statute dictates that all FISA-acquired information, including Section 702 information, may be used in a criminal proceeding only with the approval of the Attorney General. Additionally, the government must give notice to individuals if the government intends to use information against them that is either obtained or derived from Section 702. The statute also prohibits the use in a criminal proceeding of any communication to or from, or information about, a U.S. person acquired under Section 702, except for crimes involving national security or in a limited set of additional enumerated serious crimes.4

IV. Privacy Protections: Compliance, Oversight, and Transparency

The government is committed to ensuring that the Intelligence Community’s use of Section 702 is consistent with the law, complies with FISC orders, and protects the privacy and civil liberties of Americans. By approving the annual certifications, as well as the targeting, minimization, and querying procedures, the FISC plays a central role in ensuring that Section 702 activities are conducted lawfully—consistent with statutory and constitutional requirements. The FISC may require the government to provide additional filings and testimony at hearings to ensure that the court has a full understanding of the operation of the program. In addition, on multiple occasions, the FISC has appointed amici curiae to address Section 702–related legal questions. In the annual evaluation of whether a proposed certification meets all statutory and constitutional requirements, the FISC makes findings regarding the operation of the program and the government’s compliance record.

Internal components in each agency with access to Section 702 information, including Inspectors General, oversee activities conducted under the authority. All Section 702 targeting decisions made by NSA are reviewed at least three times—by the drafting analyst, the more senior analyst, and a specifically trained adjudicator—prior to tasking and are further reviewed by NSA compliance personnel and DOJ National Security Division (NSD) personnel after tasking. CIA and FBI require multiple layers of review before nominating selectors to NSA for tasking to Section 702. NSA, CIA, and FBI require that all personnel who nominate selectors for tasking under Section 702 or task selectors complete training on targeting, minimization, and querying procedures, as well as on other agency policies.5

DOJ personnel routinely review the agencies’ targeting, querying, minimization, and dissemination decisions. This oversight includes DOJ’s review of all tasking decisions by NSA and reviews at least once every two months at NSA, FBI, CIA, and NCTC to assess each agency’s compliance with its legal procedures. In addition, agencies conducting activities under Section 702 must report promptly to DOJ and to ODNI incidents of noncompliance with the targeting, querying, or minimization procedures. NSD attorneys investigate each potential instance of non-compliance and work with the agencies to remediate any such instances. NSD reports any incident of noncompliance with the statute, court orders, or the approved legal procedures to the FISC and to Congress.

As required by FISA, NSD submits reports regarding the government’s use of Section 702 to the congressional intelligence and judiciary committees at least every six months. These semiannual reports are also provided to the FISC and include a description of every identified Section 702 compliance incident in the reporting period. NSD and ODNI also prepare semiannual joint assessments focused on compliance incidents impacting U.S. persons, compliance trends, and remedial measures. The joint assessments are provided to both Congress and the FISC. The FISA statute also requires the government to provide Congress with any pleading, FISC opinion, or order that contains a significant interpretation of the law.

The Intelligence Community and DOJ work to be as transparent as possible with the public regarding the operation of the Section 702 program, consistent with the need to protect sources and methods. We have declassified and released FISC opinions regarding the authorization and operation of the Section 702 program. DOJ has provided to Congress every Section 702 opinion the FISC has issued to date. In addition, by statute, DOJ is required to produce to Congress any FISC opinion that includes a significant construction or interpretation of any provision of law or a novel application of any provision of FISA. Relatedly, the DNI, in consultation with the Attorney General, is required to publicly release such opinions containing a significant construction or interpretation of any provision of law.

V. Query Compliance and Remedial Measures

In recent years, a key oversight focus has been on queries of Section 702 information, in particular those involving U.S. person identifiers. As explained above, a query involves using a term to retrieve specific information from an agency’s database of previously collected information. In other words, queries do not return newly collected data but merely retrieve lawfully collected data that is already stored in agency computer systems. 

Queries using U.S. person identifiers, such as a name or e-mail address, are critical to protecting U.S. national security. These queries can identify links between foreign threats and those inside the United States, including those related to terrorism, malicious cyber threats, hostile nation state activity, or other threats to the American people. U.S. person queries are especially important at the early stages of a national security investigation. They can help the government learn critical information needed to protect U.S. victims of malicious foreign adversaries, and they can help the U.S. government learn more about significant threats by foreign surveillance targets in contact with U.S. persons.

This is particularly true for the FBI, which is responsible for protecting the homeland from national security threats emanating from overseas. In many cases, the FBI conducts U.S. person queries to identify U.S. person victims of foreign hacking or spying to enable the agency to warn and protect those individuals. These queries are vital to the ability to protect Americans from terrorism and from escalating cyber and espionage threats. To name but a few examples:

  • The FBI U.S. person queries against Section 702-acquired information to identify the extent of a foreign government’s kidnapping and assassination plots. The timely identification of the foreign government’s plans and intentions in Section 702-acquired information contributed to the FBI’s disruption of the plots.
  • Through U.S. person queries of Section 702-acquired information, FBI discovered that Iranian hackers had conducted extensive research on the former head of a Federal Department. FBI then notified that individual and the Department of the specific threat, so they could take action to protect them and help secure their accounts.

Just as this tool is critical to protecting the nation, it is vital that the government maintain the trust and confidence of Congress, the courts, and the American public in its use of Section 702 information. In recent years, oversight by DOJ and ODNI has identified serious compliance issues in the FBI’s queries of FISA collection for information about U.S. persons. These incidents were reported promptly to the FISC and Congress, and they are described in detail in court opinions that are now public.

The most recent such opinion, which was issued in spring of 2022 and declassified in May 2023, reflects a number of serious incidents of non-compliance, including improper queries of Americans involved in peaceful protests. These incidents are unacceptable. The FBI, the DOJ, and the entire Intelligence Community are committed to addressing them completely, including by implementing stronger safeguards and accountability mechanisms. All these incidents predated a set of significant reforms undertaken by the FBI beginning in the summer of 2021, which are discussed below and were designed to address the root causes of these incidents and prevent similar errors from occurring again.

In 2021 and 2022, FBI worked with DOJ and ODNI to institute remedial measures that have since significantly strengthened compliance. These measures include:

  • Requiring FBI Personnel to “Opt-In” to Query Unminimized Section 702 Information: In June 2021, the FBI changed the default settings in the systems where it stores unminimized Section 702 information so that FBI personnel with access to unminimized FISA Section 702 information need to affirmatively “opt-in” to querying such information. This system change was designed to address the large number of inadvertent queries of unminimized Section 702 information DOJ had identified in its reviews, in which FBI personnel did not realize their queries would run against such collection. 
  • Heightened Approvals on Large Batch Job FISA Queries: Also in June 2021, the FBI instituted a policy requiring FBI attorney approval prior to conducting a “batch job” that would result in 100 or more queries. The term “batch job” refers to a capability in one of the FBI’s systems that allows FBI personnel to more efficiently run queries involving multiple query terms. Attorney preapproval is aimed at providing additional review in situations where one incorrect decision could potentially have a greater privacy impact due to the large number of query terms.
  • Supplemental Guidance and Mandatory Training on Query Requirements: In November 2021, DOJ, ODNI, and the FBI issued new comprehensive guidance to all FBI FISA users on the proper application of the query rules, and in December 2021, the FBI instituted new mandatory training on that guidance, which personnel were required to complete by the end of January 2022. The FBI expanded and updated this training at the end of 2022. On an annual basis, all FBI personnel with access to unminimized FISA information are required to complete the expanded and updated query training or lose access to FISA systems.
  • Requirement for Case-Specific Justifications for U.S. Person Query Terms in FBI Systems: In the fall of 2021, at the direction of the FISC, the FBI modified its systems containing unminimized Section 702 information to require a case-specific justification for every query using a U.S. person query term before accessing any content retrieved by such a query from unminimized Section 702 information. Previously, personnel were permitted to use a pre-populated common justification, when applicable, for the query. These case-specific justifications are subject to review and audit by DOJ as part of its regular oversight reviews.
  • New Restrictions and Oversight of Sensitive Queries: In March 2022, the FBI instituted a new policy requiring enhanced preapproval requirements for certain “sensitive” queries, such as those involving elected officials, members of the media, members of academia, or religious figures. Under the new policy, an FBI attorney must review these queries before they are conducted. The FBI’s Deputy Director must also personally approve certain queries before they can be conducted. This measure was designed to ensure that there is additional review at a leadership level of queries that reflect particular investigative sensitivities.

These initial remedial measures are already achieving significant compliance benefits and protecting privacy. For example, the number of U.S. person queries FBI conducted in 2022 was approximately 200,000, more than a 93% decrease from the previous year. Further, the FBI’s Office of Internal Auditing—established at the direction of former Attorney General Barr to audit the FBI’s use of its national security authorities—found an increase in the FBI’s rate of compliance with the FISA query standard from 82% before these measures were instituted to 96% after their implementation.

Implementation of robust privacy protections is not a one-time solution but rather an ongoing and iterative process involving repeated review and evaluation. DOJ and the FBI are continuing to develop additional measures to enhance privacy protections and ensure personnel comply with existing policies.

Compliance reviews conducted by DOJ and ODNI have found that deliberate misconduct with respect to Section 702 information is extremely rare. In those rare cases of intentional misconduct, the individuals involved are referred for investigation and appropriate action—up to and including suspension, revocation of security clearance, or termination. By contrast, the vast majority of the compliance issues that prompted DOJ and FBI’s remedial measures were the result of FBI personnel misunderstanding the rules governing U.S. person queries. For example, in some other instances, FBI personnel queried raw Section 702 information inadvertently, without realizing that the Section 702 dataset was included in the query as a default. However, DOJ and FBI are committed to addressing these unintentional errors, and the remedial measures described earlier are designed to do so; DOJ and FBI are also working to implement additional measures to ensure compliance.

VI. Potential Reforms to Section 702

The Administration is committed to working with Congress to address concerns regarding the use of Section702 and to identify reforms to enhance privacy and civil liberties protections while fully preserving Section 702’s efficacy.

As discussed above, the FBI has imposed a number of remedial measures, the codification of which could serve as the starting point for additional statutory reforms. This would entrench these policies into law, making them hard to undo. The Executive Branch is committed to working with this Committee and the Congress to explore potential additional changes to enhance the authority and its associated privacy, oversight, and transparency functions.

However, it is essential that we pursue reforms that do not impair the benefits of Section 702; doing otherwise would imperil U.S. national security. In particular, more sweeping proposals—such as prohibiting U.S. person queries, imposing a warrant requirement for all such queries, or barring the FBI from receiving Section 702 collection—would force the government to turn a blind eye to threat information that it had lawfully acquired, with potentially grave consequences to our nation’s security.

But there is no need to go down that path. Other reforms would meaningfully enhance Section 702 safeguards while also continuing to preserve its national security benefits. We look forward to continuing to work with this Committee and others in the Congress regarding such proposals.

VII. Conclusion

Section 702 is an indispensable foreign intelligence tool that allows our Intelligence Community to target non-U.S. persons located outside the United States to acquire information critical to our national security. Courts have repeatedly found that Section 702 is consistent with the Constitution and upholds the rights of Americans. Section 702 operates under stringent procedures and is subject to oversight from all three branches of government. In a world in which digital authoritarianism and technological repression are on the rise, Section 702 is a model for democratic countries to conduct intelligence activities consistent with the rule of law.

The government recognizes the enormous responsibility it has to use this tool responsibly, protect the privacy and civil liberties of U.S. persons, and uphold the trust and confidence placed in the law enforcement and intelligence community. We are committed to addressing mistakes, being transparent with you and the American people, and continually reinforcing a system and culture that protects Americans’ privacy and civil liberties. We look forward to working with this Committee on reauthorization of this critical tool that advances our shared goal of protecting the United States.

Federal Bureau of Investigation Budget Request For Fiscal Year 2024

Source: Federal Bureau of Investigation FBI Crime News

Statement Before the U.S. House of Representatives Appropriations Committee, Subcommittee on Commerce, Justice, Science, and Related Agencies

Washington, D.C.

Statement for the Record

Good afternoon, Chairman Rogers, Ranking Member Cartwright, and Members of the Subcommittee. Thank you for inviting me to appear before you today. I do so on behalf of the men and women of the Federal Bureau of Investigation (“FBI”), who tackle some of the most complex national security and criminal threats every day with perseverance, professionalism, and integrity – sometimes at the greatest of costs. I am extremely proud of their service and commitment to the FBI’s mission and to ensuring the safety and security of communities throughout our nation. On their behalf, I would like to express my appreciation for the support you have given them in the past, ask for your continued support in the future, and pledge to be the best possible stewards of the resources you provide. I would like to begin by providing a brief overview of the FBI’s FY 2024 budget request, and then follow with a short discussion of key threats and challenges that we face, both as a nation and as an organization.

FY 2024 Budget Overview

The FY 2024 budget request proposes a total of $11.4 billion in direct budget authority to carry out the FBI’s national security, intelligence, criminal law enforcement, and criminal justice services missions. The request includes a total of $11.3 billion for Salaries and Expenses, which will support 37,312 positions (13,662 Special Agents, 3,215 Intelligence Analysts, and 20,435 professional staff), and $61.9 million for Construction. The request includes nine program enhancements under Salaries and Expenses totaling $196.0 million. These enhancements are proposed to meet critical requirements and close gaps in operational capabilities, including $63.4 million to enhance cyber investigative capabilities, $13.0 million to address escalating counterterrorism threats, $4.5 million to mitigate threats from foreign intelligence services, $27.2 million to enhance the FBI’s cybersecurity posture and protect internal networks, $14.9 million to combat violent crime, $53.1 million to address the increase in DNA collection and processing, $3.1 million to sustain secure communications platforms, $2.8 million to support infrastructure needs related to the use of Body Worn Cameras, and $14.1 million to begin to address executive order requirements for zero emission vehicles.

Key Threats and Challenges

Our nation continues to face a multitude of serious and evolving threats ranging from homegrown violent extremists to hostile foreign intelligence services and operatives, from sophisticated cyber-based attacks to internet facilitated sexual exploitation of children, from violent gangs and criminal organizations to public corruption and corporate fraud. Keeping pace with these threats is a significant challenge for the FBI. As an organization, we must be able to stay current with constantly evolving technologies. Our adversaries — terrorists, foreign intelligence services, and criminals — take advantage of technology, including the Internet and social media, to facilitate illegal activities, recruit followers, encourage terrorist attacks and other illicit actions, to spread misinformation, and to disperse information on building improvised explosive devices and other means to attack the U.S. The breadth of these threats and challenges are as complex as any time in our history. And the consequences of not responding to and countering threats and challenges have never been greater.

The support of this Committee in helping the FBI do its part in thwarting these threats and facing these challenges is greatly appreciated. That support is allowing us to establish strong capabilities and capacities to assess threats, share intelligence, leverage key technologies, and — in some respects, most importantly — hire some of the best to serve as Special Agents, Intelligence Analysts, and professional staff. We have built, and are continuously enhancing, a workforce that possesses the skills and knowledge to deal with the complex threats and challenges we face today — and tomorrow. We are building a leadership cadre that views change and transformation as a positive tool for keeping the FBI focused on the key threats facing our nation.

Today’s FBI is a national security and law enforcement organization that uses, collects, and shares intelligence in everything we do. Each FBI employee understands that, to defeat the key threats facing our nation, we must constantly strive to be more efficient and more effective. Just as our adversaries continue to evolve, so, too, must the FBI. We live in a time of acute and persistent terrorist and criminal threats to our national security, our economy, and indeed our communities. These diverse threats underscore the complexity and breadth of the FBI’s mission: to protect the American people and uphold the Constitution of the United States. 

National Security

Top Terrorism Threats

Protecting the American people from terrorism—both international and domestic— remains the FBI’s number one priority. The threat from terrorism is as persistent and complex as ever. The threats from international terrorism (IT), domestic terrorism (DT), and statesponsored terrorism all remain at elevated levels, necessitating the need for continued investment and vigilance.

The greatest terrorism threat to our Homeland is posed by lone actors or small cells who typically radicalize online and look to attack soft targets with easily accessible weapons. We see these threats manifested within both Domestic Violent Extremists (“DVEs”) and Homegrown Violent Extremists (“HVEs”), two distinct threats, both of which are located primarily in the United States and typically radicalize and mobilize to violence on their own. Individuals who commit violent criminal acts in furtherance of social or political goals stemming from domestic influences – some of which include racial or ethnic bias, or antigovernment or anti-authority sentiments – are described as DVEs, whereas HVEs are individuals who are inspired primarily by global jihad but are not receiving individualized direction from Foreign Terrorist Organizations (“FTOs”).

Domestic and Homegrown Violent Extremists are often motivated and inspired by a mix of social or political, ideological, and personal grievances against their targets, and more recently have focused on accessible targets to include civilians, law enforcement and the military, symbols or members of the U.S. government, houses of worship, retail locations, and mass public gatherings. Lone actors present a particular challenge to law enforcement and intelligence agencies. These actors are difficult to identify, investigate, and disrupt before they take violent action, especially because of the insular nature of their radicalization and mobilization to violence and limited discussions with others regarding their plans.

The top domestic terrorism threat we face continues to be from DVEs we categorize as Racially or Ethnically Motivated Violent Extremists (“RMVEs”) and Anti-Government or AntiAuthority Violent Extremists (“AGAAVEs”). In May 2022, a RMVE in the United States conducted an attack in Buffalo, NY that resulted in the deaths of 10 innocent individuals. The number of FBI domestic terrorism investigations has more than doubled since the spring of 2020, and as of the end of fiscal year 2022, the FBI was conducting approximately 2,700 investigations within the domestic terrorism program. In addition to the cases conducted within the domestic terrorism program, the FBI was also conducting approximately 4,000 investigations within its international terrorism program in fiscal year 2022.

The FBI uses all tools available at its disposal to combat domestic terrorism. These efforts represent a critical part of the National Strategy for Countering Domestic Terrorism, which was released in June 2021, and which sets forth a comprehensive, whole of government approach to address the many facets of the domestic terrorism threat.

The FBI assesses HVEs are the greatest, most immediate international terrorism threat to the homeland. HVEs are people located and radicalized to violence primarily in the United States, who are not receiving individualized direction from FTOs but are inspired by FTOs, including the self-proclaimed Islamic State of Iraq and ash-Sham (“ISIS”) and al-Qa’ida and their affiliates, to commit violence. An HVE’s lack of a direct connection with an FTO, ability to rapidly mobilize without detection, and use of encrypted communications pose significant challenges to our ability to proactively identify and disrupt potential violent attacks. Recently, an HVE attacked three New York Police Department Officers using an edged weapon in New York City on New Year’s Eve 2022.

The FBI remains concerned about the Taliban takeover of Afghanistan and the intent of FTOs, such as ISIS and al-Qa’ida and their affiliates, to carry out or inspire large-scale attacks in the United States. Despite its loss of physical territory in Iraq and Syria, ISIS remains relentless in its campaign of violence against the United States and our partners—both here at home and overseas. ISIS and its supporters continue to aggressively promote its hate-fueled rhetoric and attract like-minded violent extremists with a willingness to conduct attacks against the United States and our interests abroad. ISIS’s successful use of social media and messaging applications to attract individuals is of continued concern to us. Like other foreign terrorist groups, ISIS advocates for lone offender attacks in the United States and Western countries via videos and other English language propaganda that have, at times, specifically advocated for attacks against civilians, the military, law enforcement and intelligence community personnel.

Al-Qa’ida maintains its desire to both conduct and inspire large-scale, spectacular attacks. Because continued pressure has degraded some of the group’s senior leadership, we assess that, in the near term, al-Qa’ida is more likely to continue to focus on cultivating its international affiliates and supporting small-scale, readily achievable attacks in regions such as East and West Africa. Over the past year, propaganda from al-Qa’ida leaders continued to seek to inspire individuals to conduct their own attacks in the United States and other Western nations.

Iran and its global proxies and partners, including Iraqi Shia militant groups, continue to attack and plot against the United States and our allies throughout the Middle East. Iran’s Islamic Revolutionary Guard Corps-Qods Force (“IRGC-QF”) continues to provide support to militant resistance groups and terrorist organizations. Iran also continues to support Lebanese Hizballah and other terrorist groups. Hizballah has sent operatives to build terrorist infrastructures worldwide. The arrests of individuals in the United States allegedly linked to Hizballah’s main overseas terrorist arm, and their intelligence collection and procurement efforts, demonstrate Hizballah’s interest in long-term contingency planning activities here in the Homeland. Hizballah Secretary-General Hassan Nasrallah also has threatened retaliation for the death of IRGC-QF Commander Qassem Soleimani. The willingness to seek retaliation exemplified in 2022, when the Department charged an Iranian national and member of the IRGC, working on behalf of the Qods Force, with a plot to murder a former national security advisor.

The terrorism threat continues to evolve, but the FBI resolve to counter that threat remains constant. As an organization, we continually adapt and rely heavily on the strength of our Federal, state, local, Tribal, territorial, and international partnerships to combat all terrorist threats to the United States and our interests. To that end, we use all available lawful investigative techniques and methods to combat these threats while continuing to collect, analyze, and share intelligence concerning the threat posed by violent extremists, in all their forms, who desire to harm Americans and U.S. interests. We will continue to share information and encourage the sharing of information among our numerous partners via our Joint Terrorism Task Forces across the country, and our Legal Attaché offices around the world. The FY 2024 Request includes an additional 43 positions (including 20 Special Agents and 23 professional staff) and $13.0 million to counter the increasing acts of domestic terrorism across the United States.

Additionally, countering the proliferation of weapons of mass destruction materials, technologies, and expertise, preventing their use by any actor, and securing nuclear and radioactive materials of concern also are top national security priority missions for the FBI. The FBI considers preventing, mitigating, investigating, and responding to WMD terrorism a “no-fail” mission because a WMD attack could result in substantial injuries, illness, or loss of lives, with significant social, economic, political and other national security consequences. The FBI employs a full range of capabilities, in collaboration with its Federal, state, local, tribal, territorial, and other partners, and synchronizes its efforts to leverage resources efficiently and to integrate complementary efforts in countering WMD terrorism.

Cyber

Throughout these last two years, the FBI has seen a wider-than-ever range of cyber actors threaten Americans’ safety, security, and confidence in our digitally connected world. Cyber-criminal syndicates and nation-states continue to innovate and use unique techniques to compromise our networks and maximize the reach and impact of their operations, such as by selling malware as a service or by targeting vendors as a way to access scores of victims by hacking just one provider.

These criminals and nation-states believe that they can compromise our networks, steal our property, extort us, and hold our critical infrastructure at risk without incurring any risk themselves. In the last few years, we have seen—and have publicly called out—the People’s Republic of China (“PRC”), the Democratic People’s Republic of Korea (“DPRK”), and Russia for using cyber operations to target U.S. COVID-19 vaccines and research. We have seen the far-reaching disruptive impact a serious supply-chain compromise can have through the – 6 – SolarWinds-related intrusions, conducted by the Russian SVR. We have seen the PRC working to obtain controlled dual-use technology and developing an arsenal of advanced cyber capabilities that could be used against other countries in the event of a real-world conflict. As these adversaries become more sophisticated, we are increasingly concerned about our ability to detect and warn about specific cyber operations against U.S. organizations. One of the most worrisome facets is their focus on compromising U.S. critical infrastructure, especially during a crisis.

What makes things more difficult is that there is no bright line that separates where nation-state activity ends and cybercriminal activity begins. Some cybercriminals contract or sell services to nation-states; some nation-state actors moonlight as cybercriminals to fund personal activities; and nation-states are increasingly using tools typically used by criminal actors, such as ransomware.

So, as dangerous as nation-states are, we do not have the luxury of focusing on them alone. In the past year, we also have seen cybercriminals target hospitals, medical centers, educational institutions, and other critical infrastructure for theft or ransomware, causing massive disruption to our daily lives. Such incidents affecting medical centers in particular have led to the interruption of computer networks and systems that put patients’ lives at an increased risk, at a time when America faces its most dire public health crisis in generations.

We have also seen the rise of an ecosystem of services dedicated to supporting cybercrime in exchange for cryptocurrency. The effect is that what were once unsophisticated criminals now have the tools to engage in destructive behavior—for example, deploying ransomware to paralyze entire hospitals, police departments, and businesses—and the means to better conceal their tracks. It is not that individual malicious cyber actors have become much more sophisticated, but they can more easily rent sophisticated capabilities.

We must make it harder and more painful for malicious cyber actors and criminals to carry on their malicious activities. The FBI, using its role as the lead Federal agency for threat response, with its law enforcement and intelligence responsibilities, works seamlessly with domestic and international partners to defend their networks, attribute malicious activity, sanction bad behavior, and take the fight to our adversaries overseas. We must impose consequences on cyber adversaries and use our collective law enforcement and intelligence capabilities to do so through joint and enabled operations sequenced for maximum impact. And we must continue to work with the Department of State and other key agencies to ensure that our foreign partners are able and willing to cooperate in our efforts to bring the perpetrators of cybercrime to justice or otherwise disrupt such perpetrators’ activities.

An example of this approach is the coordinated international operation announced in April 2023 against Genesis Market, a criminal online marketplace offering access to data stolen from over 1.5 million compromised computers around the world containing over 80 million account access credentials. Genesis Market was also a prolific initial access broker (IAB) in the cyber crime world, providing criminals a user-friendly database to search for stolen credentials – 7 – so they could easily infiltrate a victim’s computer. As part of this operation, law enforcement seized 11 domain names used to support Genesis Market’s infrastructure pursuant to a warrant authorized by the US District Court for the Eastern District of Wisconsin. A total of 22 international agencies and 44 FBI field offices provided assistance to the FBI Milwaukee Field Office investigating the case. And on April 5, the US Department of the Treasury announced sanctions against Genesis Market.

In January 2023, the DOJ and FBI heralded the success of an FBI investigation against Hive ransomware. This impactful action spotlighted an operation that truly characterized how the FBI can assist during ransomware attacks and why timely reporting is key. Through unique access to decryption keys, the FBI was able to prevent $130 million in ransoms being paid to cyber criminals. This access allowed us to really gauge the amount of reporting to law enforcement from a single ransomware variant, which is rather dire: approximately 20-25% of Hive victims reported to some law enforcement entity. There are many more actions we can take and there’s much more intelligence to be gleaned, but we need to know about it. We can put these actors out of business, but it requires everyone’s help.

In total, we took over 1,000 actions against cyber adversaries in 2022, to include arrests, criminal charges, convictions, dismantlements, and disruptions, and enabled many more actions through our dedicated partnerships with the private sector, foreign partners, and with Federal, state, and local entities. We also provided thousands of individualized threat warnings and disseminated 70 public threat advisories by way of Joint Cybersecurity Advisories, FBI Liaison Alert System (“FLASH”) reports, Private Industry Notifications (“PINs”), and Public Service Announcements (“PSAs”)—many of which were jointly authored with other U.S. agencies and international partners.

With our partners in the interagency, we have been putting a lot of energy and resources into all those partnerships, especially with the private sector. We are working hard to push important threat information to network defenders, but we have also been making it as easy as possible for the private sector to share important information with us. For example, we are emphasizing to the private sector how we keep our presence unobtrusive in the wake of an incident; how we protect information that the private sector shares with us, including their identities. We are also committed to providing useful feedback and improving coordination with our government partners so that we are speaking with one voice. But we need the private sector to do its part, too. We need the private sector to come forward to warn us and our partners—and warn us quickly—when they see malicious cyber activity. We also need the private sector to work with us when we warn them that they are being targeted. The recent examples of significant cyber incidents—SolarWinds, Cyclops Blink, the Colonial pipeline incident—only emphasize what I have been saying for a long time: The government cannot protect against cyber threats on its own. We need a whole-of-society approach that matches the scope of the danger. There is no other option for defending a country where nearly all of our critical infrastructure, personal data, intellectual property, and network infrastructure sits in private hands.

In summary, the FBI is engaged in a myriad of efforts to combat cyber threats, from improving threat identification and information sharing inside and outside of the government to developing and retaining new talent, to examining the way we operate to disrupt and defeat these threats. We take all potential threats to public and private sector systems seriously and will continue to investigate and hold accountable those who pose a threat in cyberspace. The FY 2024 Request includes an additional 192 positions (including 31 Special Agents, 8 Intelligence Analysts, and 153 Professional Staff) and $63.4 million to enhance cyber information-sharing abilities and increase cyber tools and capacities. The Request also includes 4 positions and $27.2 million to help protect internal FBI networks.

Foreign Intelligence Threats

We see nations such as China, Russia, and Iran becoming more aggressive and more capable in their nefarious activity than ever before. These nations seek to undermine our core democratic, economic, and scientific institutions. They employ a growing range of tactics to advance their interests and to harm the United States. Defending American institutions and values against these threats is a national security imperative and a priority for the FBI.

With that, the greatest long-term threat to our nation’s ideas, innovation, and economic security is the foreign intelligence and economic espionage threat from China. It’s a threat to our economic security—and by extension—to our national security. The Chinese government aspires to reshape the international rules-based system to its benefit, with little regard for the democratic ideals that underpin it. The pursuit of these goals is often with little regard for international norms and laws.

When it comes to economic espionage, the PRC uses every means at its disposal against us, blending cyber, human intelligence, diplomacy, corporate transactions, and pressure on U.S. companies operating in China, to achieve its strategic goals to steal our companies’ innovations. These efforts are consistent with China’s expressed goal to become a national power, modernizing its military and creating innovative-driven economic growth.

To pursue this goal, China uses not only human intelligence officers, co-optees, and corrupt corporate insiders, but also sophisticated cyber intrusions, pressure on U.S. companies in China, shell-game corporate transactions, and joint-venture “partnerships” that are anything but a true partnership. There’s also nothing traditional about the scale of their theft—it’s unprecedented in the history of the FBI. American workers and companies are facing a greater, more complex danger than they’ve ever dealt with before. Stolen innovation means stolen jobs, stolen opportunities for American workers, stolen national power, and stolen leadership in the industries.

As the lead U.S. counterintelligence agency, the FBI is responsible for detecting and lawfully countering the actions of foreign intelligence services and organizations as they seek to adversely affect U.S. national interests. The FBI recognized the need to coordinate similar – 9 – efforts across all agencies, and therefore established the National Counterintelligence Task Force (“NCITF”) in 2019 to create a whole-of-government approach to counterintelligence. The FBI established the national-level task force, or NCITF, in the National Capital Region to coordinate, facilitate, and focus these multi-agency counterintelligence operations, and to programmatically support local Counterintelligence Task Force (“CITF”) operations. Combining the authorities and operational capabilities of the U.S. Intelligence Community; Federal, state, and local law enforcement; and local CITFs in each FBI field office, the NCITF coordinates and leads whole-of-government efforts to defeat hostile intelligence activities targeting the United States.

The Department of Defense has been a key partner in the NCITF since its founding. While the FBI has had long-term collaborative relationships with DoD entities such as the Air Force Office of Special Investigations, Naval Criminal Investigative Service, and Army Counterintelligence, the NCITF has allowed us to enhance our collaboration with each other for greater impact. We plan to emphasize this whole-of-government approach moving forward as a powerful formula to mitigate the modern counterintelligence threat.

In recent years, we have seen a rise in efforts by authoritarian regimes to interfere with freedom of expression and punish dissidents abroad. These acts of repression cross national borders, often reaching into the United States. It’s important to note countries like China, Russia, and Iran stalk, intimidate, and harass certain people in the U.S. This is called transnational repression. It’s illegal, and the FBI is investigating it.

Transnational repression can occur in different forms, including assaults and attempted kidnapping. Governments use transnational repression tactics to silence the voices of their citizens, U.S. residents, or non-citizens connected to the home country. This sort of repressive behavior is antithetical to our values as Americans. People from all over the world are drawn to the United States by the promise of living in a free and open society—one that adheres to the rule of law. To ensure that this promise remains a reality, we must continue to use all of our tools to block authoritarian regimes that seek to extend their tactics of repression beyond their shores.

Our nation is confronting multifaceted foreign threats seeking to both influence our national policies and public opinion, and cause harm to our national dialogue and debate. The FBI and our interagency partners remain concerned about, and focused on, foreign malign influence operations—which include subversive, undeclared, coercive, and criminal actions used by foreign governments in their attempts to sway U.S. voters’ preferences and perspectives, shift U.S. policies, increase discord in the United States, and undermine the American people’s confidence in our democratic institutions and processes. Foreign malign influence is not a new problem, but the interconnectedness of the modern world, combined with the anonymity of the Internet, have changed the nature of the threat and how the FBI and its partners must address it.

Foreign malign influence operations have taken many forms and used many tactics over the years. Most widely reported these days – 10 – are attempts by adversaries—hoping to reach a wide swath of Americans covertly from outside the United States—to amplify existing stories on social media in an attempt to discredit U.S. individuals and institutions.

The FBI is the lead Federal agency responsible for investigating foreign malign influence threats. Several years ago, we established the Foreign Influence Task Force (“FITF”) to identify and counteract foreign malign influence operations targeting the United States. The FITF is led by the Counterintelligence Division and comprises agents, analysts, and professional staff from the Counterintelligence, Cyber, Counterterrorism, and Criminal Investigative Divisions. It is specifically charged with identifying and combating foreign malign influence operations targeting democratic institutions and values inside the United States. In all instances, the FITF strives to protect democratic institutions, develop a common operating picture, raise adversaries’ costs, and reduce their overall asymmetric advantage.

The FITF brings the FBI’s national security and traditional criminal investigative expertise under one umbrella to prevent foreign malign influence in our elections. This better enables us to frame the threat, to identify connections across programs, to aggressively investigate as appropriate, and—importantly—to be more agile. Coordinating closely with our partners and leveraging relationships we have developed in the technology sector, we had several instances where we were able to quickly relay threat indicators that those companies used to take swift action, blocking budding abuse of their platforms.

After previous midterm elections, we reviewed the threat and the effectiveness of our coordination and outreach. As a result of this review, we further expanded the scope of the FITF. Previously, our efforts to combat foreign malign influence focused solely on the threat posed by Russia. Utilizing lessons learned, the FITF widened its aperture to confront malign foreign operations of the PRC, Iran, and other global adversaries. To address this expanding focus and wider set of adversaries and influence efforts, we have also added resources to maintain permanent “surge” capability on foreign malign influence threats to elections.

In addition, the domestic counterintelligence environment is more complex than ever. This nation faces a persistent and pervasive national security threat from foreign adversaries, particularly Russia and China, conducting sophisticated intelligence operations using coercion, subversion, malign influence, disinformation, cyber and economic espionage, traditional spying and non-traditional human intelligence collection. Together, they pose a continuous threat to U.S. national security and its economy by targeting strategic technologies, industries, sectors, and critical infrastructures. Historically, these asymmetric national security threats involved foreign intelligence service officers seeking U.S. government and U.S. Intelligence Community information. The FBI has observed foreign adversaries employing a wide range of nontraditional collection techniques, including the use of human collectors not affiliated with intelligence services, foreign investment in critical U.S. sectors, and infiltration of U.S. supply chains. The FBI continues to adjust its CI priorities and posture to address the evolving and multifaceted threat.

The FY 2024 Request includes an additional 30 positions (all Professional Staff) and $4.5 million to help combat the threats posed by foreign, and potentially hostile, intelligence services and other foreign government actors.

Criminal Threats

The U.S. faces many criminal threats, including financial and health care fraud, transnational and regional organized criminal enterprises, crimes against children and human trafficking, and public corruption. Criminal organizations — domestic and international — and individual criminal activity represent a significant threat to security and safety in communities across the nation.

A critical tool in protecting the Nation from those who wish to do us harm is the National Instant Criminal Background Check System, or NICS. The goal of NICS is to ensure that guns don’t fall into the wrong hands, and ensure the timely transfer of firearms to eligible gun buyers. Mandated by the Brady Handgun Violence Prevention Act of 1993 and launched by the FBI on November 30, 1998, NICS is used by Federal Firearms Licensees (FFLs) to determine whether a prospective buyer is eligible to buy firearms. NICS receives information from tens of thousands of FFLs and checks to ensure that applicants do not have a criminal record and aren’t otherwise prohibited and therefore ineligible to purchase a firearm. In the first complete month of operation in 1998, a total of 892,840 firearm background checks were processed; in 2022, approximately 2.6 million checks were processed per month, for a total of 31.6 million processed in 2022.

While most checks are completed within minutes by electronic searches of the NICS database, a small number of checks require examiners to review records and resolve missing or incomplete information before an application can be approved or rejected. Ensuring the timely processing of these inquiries is important to ensure law abiding citizens can exercise their right to purchase a firearm and to protect communities from prohibited and therefore ineligible individuals attempting to acquire a firearm. To ensure the FBI maintains this capability, the FY 2024 Request includes an additional 27 positions (including 1 Special Agent and 26 Professional Staff) and $8.4 million.

In 2022, Congress demonstrated its united faith in the role NICS plays in our country’s public safety and a desire to make it even stronger with passage of the Bipartisan Safer Communities Act. This legislation added dating relationships as a disqualifying consideration for misdemeanor crimes of domestic violence prohibitions; enhanced checks on persons under the age of 21 by requiring additional outreach to state and local agencies where the person resides to inquire about the existence of any possibly disqualifying juvenile records; allows certain FFLs to receive information from the NCIC gun file necessary to verify if a firearm had been reported stolen before buying it second hand; and allows FFLs to access NICS for the purposes of voluntary background checks on current and prospective employees to help combat illegal firearms trafficking. The FBI has implemented all aspects of the BSCA with the exception of the two latter parts as they require the promulgation of regulations. Those proposed regulatory changes are in process and are a priority to complete. Since the passage of the BSCA, the FBI has conducted over 86,400 expanded background checks on persons under the age of 21. The vast majority are proceeded quickly. However, a total of 750 checks have been denied under the new process. As a result of the expanded outreach enabling NICS to issue denials based solely on information it obtains, NICS issued 151 denials.

Violent Crime

Violent crimes and gang activities exact a high toll on individuals and communities. Many of today’s gangs are sophisticated and are well organized. They use violence to control neighborhoods and boost their illegal money-making activities, which include robbery, drug and gun trafficking, fraud, extortion, and prostitution rings. These gangs do not limit their illegal activities to single jurisdictions or communities. The FBI is able to work across such lines, which is vital to the fight against violent crime in big cities and small towns across the Nation. Every day, FBI special agents work in partnership with Federal, state, local, and Tribal officers and deputies on joint task forces and individual investigations.

FBI joint task forces—Violent Crime Safe Streets, Violent Gang Safe Streets, and Safe Trails—focus on identifying and targeting major groups operating as criminal enterprises. Much of the FBI criminal intelligence is derived from our state, local, and tribal law enforcement partners, who know their communities inside and out. Joint task forces benefit from FBI surveillance assets, and our sources track these gangs to identify emerging trends. Through these multi-subject and multi-jurisdictional investigations, the FBI concentrates its efforts on high-level groups engaged in patterns of racketeering. This investigative model enables us to target senior gang leadership and to develop enterprise-based prosecutions.

By way of example, the FBI has dedicated tremendous resources to combat the threat of violence posed by MS-13. The atypical nature of this gang has required a multi-pronged approach—we work through our task forces here in the U.S. while simultaneously gathering intelligence and aiding our international law enforcement partners. We do this through the FBI’s Transnational Anti-Gang Task Forces (TAGs). Established in El Salvador in 2007 through the FBI’s National Gang Task Force, Legal Attaché San Salvador, and the United States Department of State, each TAG is a fully operational unit responsible for the investigation of MS-13 operating in the northern triangle of Central America and threatening the United States. This program combines the expertise, resources, and jurisdiction of participating agencies involved in investigating and countering transnational criminal gang activity in the United States and Central America. There are now TAGs in El Salvador, Guatemala, and Honduras. Through these combined efforts, the FBI has achieved substantial success in countering the MS13 threat across the United States and Central America.

We are committed to working with our Federal, state, local, and tribal partners in a coordinated effort to reduce violent crime in the United States.

Transnational Organized Crime (“TOC”)

More than a decade ago, organized crime was characterized by hierarchical organizations, or families, that exerted influence over criminal activities in neighborhoods, cities, or states. But organized crime has changed dramatically. Today, international criminal enterprises run multi-national, multi-billion-dollar schemes from start to finish. Modern-day criminal enterprises are flat, fluid networks with global reach. While still engaged in many of the “traditional” organized crime activities of loan-sharking, extortion, and murder, modern criminal enterprises are also involved in trafficking counterfeit prescription drugs containing deadly fentanyl, targeting stock market fraud and manipulation, cyber-facilitated bank fraud and embezzlement, illicit drug trafficking, identity theft, human trafficking, money laundering, alien smuggling, public corruption, weapons trafficking, kidnapping, and other illegal activities. TOC networks exploit legitimate institutions for critical financial and business services that enable the storage or transfer of illicit proceeds. Preventing and combating transnational organized crime demands a concentrated effort by the FBI and Federal, state, local, tribal, and international partners.

As part of our efforts to combat the TOC threat, the FBI is focused on the cartels trafficking dangerous narcotics, like fentanyl, across our border. The FBI has over 380 cases linked to cartel leadership and actively participates in 6 OCDETF Strike Forces along the border, investigating major drug trafficking, money laundering, and other high priority transnational organized crime networks. On top of that, we are pursuing healthcare fraud investigations against medical professionals and pill mills through our prescription drug initiative, investigating the gangs and criminal groups responsible for distributing dangerous substances like fentanyl through our Safe Streets Task Forces, and disrupting and dismantling DarkNet marketplaces for prescription opioids and drugs like fentanyl through our Joint Criminal Opioid Darknet Enforcement team.

While the FBI continues to share intelligence about criminal groups with our partners and combines resources and expertise to gain a full understanding of each group, the threat of transnational crime remains a significant and growing threat to national and international security with implications for public safety, public health, democratic institutions, and economic stability across the globe. TOC groups increasingly exploit jurisdictional boundaries to conduct their criminal activities overseas. Furthermore, they are expanding their use of the Darknet to engage in illegal activity while exploiting emerging technology to traffic illicit drugs and contraband across international borders and into the U.S.

Crimes Against Children and Human Trafficking

It is unthinkable, but every year, thousands of children become victims of crimes, whether it is through kidnappings, violent attacks, sexual abuse, human trafficking, or online predators. The FBI is uniquely positioned to provide a rapid, proactive, and comprehensive response; identify, locate, and recover child victims; and strengthen relationships between the FBI and Federal, state, local, tribal, and international law enforcement partners to identify, prioritize, investigate, and deter individuals and criminal networks from exploiting children.

But the FBI’s ability to learn about and investigate child sexual exploitation is being threatened by the proliferation of sites online on the Darknet. For example, currently, there are at least 30 child sexual abuse material (CSAM) sites operating openly and notoriously on the Darknet, including the Tor network. Some of these CSAM sites are exclusively dedicated to the sexual abuse of infants and toddlers. The sites often expand rapidly, with one site obtaining 200,000 new members within its first four weeks of operation.

The FBI combats this pernicious crime problem through investigations such as Operation Cross Country. Over a two-week period in 2022, the FBI, along with other Federal, state, and local partners, executed approximately 400 operations. These operations identified and located 84 minor victims of child sex trafficking and child sexual exploitation offenses and located 37 actively missing children. Furthermore, the FBI and its partners located 141 adult victims of human trafficking, and identified or arrested 85 suspects with child sexual exploitation and human trafficking offenses.

The FBI has several programs in place to arrest child predators and to recover missing and endangered children. To this end, the FBI funds or participates in a variety of endeavors, including our Innocence Lost National Initiative, Innocent Images National Initiative, Operation Cross Country, Child Abduction Rapid Deployment Team, Victim Services, over 80 Child Exploitation and Human Trafficking Task Forces, over 50 International Violent Crimes Against Children Task Force Officers, as well as numerous community outreach programs to educate parents and children about safety measures they can follow. Through improved communications, the FBI also has the ability to quickly collaborate with partners throughout the world, which plays an integral role in crime prevention.

The Child Abduction Rapid Deployment Team is a rapid response team comprised of experienced investigators strategically located across the country to quickly respond to child abductions. Investigators are able to provide a full array of investigative and technical resources during the most critical time period following the abduction of a child, such as the collection and analysis of DNA, impression, and trace evidence, and the processing of digital forensic evidence.

In addition to programs combating child exploitation, the FBI also focuses efforts to stop human trafficking. The FBI works collaboratively with law enforcement partners to combat all forms of human trafficking through Human Trafficking Task Forces nationwide.

The majority of human trafficking victims recovered during FBI investigations are United States citizens, but traffickers are opportunists who will exploit any victim with a vulnerability, including foreign nationals and victims of all ages, by subjecting them to forced labor or sex trafficking. We take a victim-centered, trauma-informed approach to investigating these cases and strive to ensure the needs of victims are fully addressed at all stages. To accomplish this, the FBI works in conjunction with other law enforcement agencies and victim specialists on the local, state, tribal, and Federal levels, as well as with a variety of vetted nongovernmental organizations. Even after the arrest and conviction of human traffickers, the FBI often continues to work with partner agencies and organizations to assist victims and survivors in moving beyond their exploitation.

The FBI commends the committee’s dedication to these efforts and appreciates the resources provided to combat these horrific acts. The FY 2024 Request includes an additional 17 positions (14 Special Agents and 3 professional staff) and $6.4 million to expand the Crimes Against Children and Human Trafficking programs.

Key Cross-Cutting Capabilities and Capacities

Operational Technologies

As criminal and terrorist threats become more diverse and dangerous, the role of technology becomes increasingly important to our efforts. We are using technology to improve the way we collect, analyze, and share information. We have seen significant improvement in capabilities and capacities over the past decade; but keeping pace with technology remains a key concern for the future.

The FBI Laboratory is one of the largest and most comprehensive forensic laboratories in the world. Operating out of a state-of-the-art facility in Quantico, Virginia, laboratory personnel travel the world on assignment, using science and technology to protect the nation and support law enforcement, intelligence, military, and forensic science partners. The Lab’s many services include providing expert testimony, mapping crime scenes, and conducting forensic exams of physical and hazardous evidence. Lab personnel possess expertise in many areas of forensics supporting law enforcement and intelligence purposes, including explosives, trace evidence, documents, chemistry, cryptography, DNA, facial reconstruction, fingerprints, firearms, digital forensics and weapons of mass destruction (WMD).

One example of the Lab’s key services and programs is the Combined DNA Index System (CODIS), software the FBI develops and administers, which allows 200 law enforcement laboratories throughout the United States to compare over 20 million DNA profiles. In the last 20 years, CODIS has aided over 600,000 investigations, while maintaining its sterling reputation and the confidence of the American public. The latest version of the system, however, is 10 years old, and requires transition to a more stable, reliable, efficient and secured platform.

In addition, statutory requirements and recent regulatory changes have significantly expanded the DNA processing requirements of the FBI. For instance, enacted in 2005, the DNA Fingerprint Act (in 34 U.S.C. § 40702(a)(1)(A) and (B)) authorized the Attorney General – 16 – (AG) to collect DNA samples from individuals who are arrested, facing charges, or convicted, and from non-U.S. persons detained under U.S. authority. The law mandates Federal DNA collection agencies submit their arrestee collections to the FBI Laboratory for analysis and entry into CODIS. In April 2020, the Department of Justice (DOJ) amended the DNA Fingerprint Act’s implementing rule that now precludes the Department of Homeland Security (DHS) from waiving DNA collections on over 700,000 individuals per year. As a result, during the past 12 months, the FBI has received an average of 92,000 DNA samples per month (over 10 times the historical sample volume). When Title 42 ends, the FBI anticipates an additional 50,000 samples per month due to increased DHS detentions. This will eventually bring the total monthly samples received to approximately 120,000 (~1,440,000 samples per year). This substantial increase has created massive budget and personnel shortfalls for the FBI. While the FBI has worked with DHS components to automate and streamline workflows, a backlog of approximately 650,000 samples has developed, increasing the likelihood of arrestees and non-U.S. detainees being released before identification through investigative leads.

Investment in additional DNA expansion capabilities and technology is critical to maintaining and enhancing the FBI’s ability to address emerging threats and help mission critical information reach partners and investigators in an expeditious manner. The FY 2024 Request includes an additional 7 positions and $53.1 million to assist the FBI in processing DNA samples in a timely manner and leverage technology to modernize the aging CODIS system.

In addition to forensic advancements, the FBI must also invest in technologies to help its workforce. This includes reliable, secure access to classified information and systems in a remote environment. This technology – the Enterprise Remote Access System (ERAS) – provides FBI users the ability to access the FBI’s Secret Enclave securely and remotely. This is particularly important in field offices where Special Agents may be several hours from the nearest FBI Field Office (FO) or Resident Agency (RA). This remote access significantly improves the timely completion of investigative activities, dissemination of intelligence, and sustainment of necessary business operations.

Another technology in which the FBI must make investments is in the body worn camera (BWC) arena. BWCs are critical tools that enhance law enforcement transparency and accountability, and thereby assist in building and maintaining public trust. In the past decade, BWC use has become commonplace in large law enforcement organizations throughout the U.S. According to a study by DOJ’s Office of Justice Programs (OJP), as of 2016, about 80% of non-Federal law enforcement agencies with at least 500 full-time officers had acquired BWCs. Additionally, other Federal entities have implemented BWC programs, including select agencies within the Department of the Interior (DOI) and Customs and Border Patrol (CBP).

In 2020, DOJ announced the Department would permit state, local, territorial, and tribal task force officers to use BWCs on Federal task forces across the nation. In 2021, DOJ’s BWC working group expressed the need to phase implementation of a BWC program for DOJ Federal Agents. As a result, in FY 2022, the FBI launched a pilot program in five field offices; the FBI plans to expand this pilot to additional field offices across the country in FY 2023, as well as in FY 2024 should funding become available. The FBI has always been committed to transparency and accountability. BWC technology would enable the FBI to further this commitment to the public.

Also, to begin to address executive order requirements and meet standards for sustainable, resilient vehicle fleet electrification, the FBI proposes to begin deployment of zero emission vehicles – including battery electric, plug-in electric hybrid, and hydrogen fuel cell vehicles – along with applicable charging stations in select Field Offices across the nation.

FBI special agents and intelligence analysts need the best technological tools available to be responsive to the advanced and evolving threats that face our nation. The FY 2024 Request includes an additional $3.1 million for secure communications, $14.1 million for zero emissions vehicles, and $2.8 million for body worn cameras.

Conclusion

Finally, the strength of any organization is its people. The threats we face as a nation have never been greater or more diverse and the expectations placed on the FBI have never been higher. Our fellow citizens look to the FBI to protect the United States from all of those threats, and the men and women of the FBI continue to meet and exceed those expectations, every day. I want to thank them for their dedicated service.

Chairman Rogers, Ranking Member Cartwright, and Members of the Subcommittee, thank you for the opportunity to testify today. I am happy to answer any questions you might have.

Outreach and Mentorship: Cliff’s Crew Visits the FBI

Source: Federal Bureau of Investigation FBI Crime News

“Whatever challenges you may have in life can be frustrating,” said Turner. “Failure is a part of our lives. You have to embrace failure.”

Turner continued by explaining that at the end of the day, the recipe for success is focusing on what you can control and take ownership of—regardless of external pressures.

“When I experienced past failures, I asked myself: What did I do?” he said. “Don’t worry about what the teacher did. Don’t worry about what coach doesn’t like about you. What did I do that caused that failure, and what can I do moving forward to make it better? I can own that. That’s what I pass on to you.”

Turner concluded that new experiences are also key to personal growth.

“In my journey,” he said, “I’ve always kind of gone outside my comfort zone. You need to get comfortable being uncomfortable because that’s the only way you’re going to grow. If you guys remember that, you will be leaders on a level that you hadn’t even imagined. Be that leader. Stay true to yourself.”

Interested in learning more about community outreach at the FBI?

The Community Relations Unit at FBI Headquarters and FBI community outreach specialists in field offices across the country create and strengthen relationships locally and nationally with minority groups, religious and civic organizations, schools, non-profits, and other entities. 

Visit your local FBI field office’s page to learn about programs in your area.

Safe Online Surfing Launching for 2023-2024 School Year

Source: Federal Bureau of Investigation FBI Crime News

“The Safe Online Surfing program is a great way for teachers and families to prepare students for their journey through cyberspace,” said Ken Hoffman, who leads the FBI’s national community outreach program. “The interactive platform helps kids build a digital defense against predators and bullies while teaching them how to be responsible cyber citizens.” 

While taking the course, students guide a robot avatar through six thematic areas, answering true/false, multiple choice, and matching questions along the way. After completing all levels, students will take a final exam.  

Since the program’s launch in 2012, more than 1.6 million students have participated in the SOS challenge. 

The SOS website and its activities are open year-round, both at home and in the classroom. The challenge opens on September 1 and runs through May. Each month during this timeframe, the classes with the top exam scores nationwide will receive an FBI-SOS certificate and, when possible, receive a congratulatory visit from FBI personnel.  

To participate in the challenge, teachers must register their classes at sos.fbi.gov. Teachers manage their students’ participation in the program; the FBI does not collect or store any student information.

Learn more and register your class at sos.fbi.gov

FBI Internship Program Gives Wounded Warriors a Window into Bureau Careers

Source: Federal Bureau of Investigation FBI Crime News

Moorer, who recently retired from the Navy and concluded his internship, encourages fellow wound warriors to apply, nothing that “I don’t think there’s a better program for you to go get on-the-job experience, exchange knowledge with other people who are very knowledgeable, and get an excellent job opportunity that could end up being the perfect career for you.

Eligibility 

The FBI Wounded Warrior Internship Program is part of the Defense Department’s Operation Warfighter program. This DOD initiative links wounded warriors with federal government internships so that they can gain work experience while recuperating from a wound, illness, or injury. 
 
The program is incredibly competitive, but at this time, there’s no limit on the number of qualified servicemembers who may be selected for internships each year, Keffer said. Thirteen FBI interns are expected to onboard by the end of fiscal year 2023, according to the program. 
 
As long as a field office or Headquarters division has an operational need—and if they believe an applicant is the right fit for the position—the FBI’s Human Resources Division will make the match.  
 
To qualify for the program, a servicemember must: 

  • Be an active-duty servicemember, a mobilized reservist, or a member of the Army or Air National Guard
  • Be a U.S. citizen
  • Be assigned to a Wounded Warrior unit, detachment, or regiment
  • Hold an active Top Secret security clearance
  • Have at least six months remaining on their service commitment
  • Have the ability to travel to and from their assigned worksite
  • Meet FBI security and suitability requirements

Interested servicemembers can reach out to their Operation Warfighter coordinator to begin the application process.

FBI-Led Sweep Targeting Sex Traffickers Recovers Dozens of Minor Victims

Source: Federal Bureau of Investigation FBI Crime News

FBI Child Exploitation and Human Trafficking Task Forces across the country work throughout the year to locate victims and their traffickers. Often, victim specialists are embedded in operations. They serve as a liaison between the victims and FBI agents. They also help victims find services to rebuild their lives. The FBI’s Victim Services Division has a team of child and adolescent forensic interviewers, or CAFIs, who are specially trained interviewers skilled at gathering evidence without further traumatizing children and others with mental or emotional disabilities. These multi-disciplinary teams work with state and local partners to make resources available for victims, which might include counseling, medical services, housing, or job placement.  

“Our victim specialists, victim service coordinators, child and adolescent forensic interviewers, and other victim service professionals work collaboratively with special agents to ensure a trauma-informed, victim-centered approach is taken when engaging with victims,” said Regina Thompson, assistant director of the Victim Services Division. “This is especially important when engaging with victims of human trafficking as it is a very complex, traumatic crime.”  

Remembering Supervisory FBI Police Officer Yiu Tak ‘Louis’ Tao

Source: Federal Bureau of Investigation FBI Crime News

Remarks prepared for delivery.

Good morning. On behalf of all the men and women of the FBI, it’s an honor to be here today to remember Lou and honor his life.

For those of you who may not know, Lou joined the Bureau in 1996, first entering on duty with the New York Field Office as a file clerk before joining the ranks of the FBI Police the next year.

But it didn’t take him long to move up, first achieving a promotion to sergeant and, a few years later, to lieutenant. And while Lou was proud to have provided FBI police services across the country when duty called—for example, at the Winter Olympics in Salt Lake City or during the protests in Ferguson, Missouri—his heart was always in New York.

On the morning of 9/11, Lou was sitting at his desk at 26 Fed when he got a phone call saying a plane had hit the World Trade Center. He didn’t ask questions, he didn’t ask for details, and he never stopped to think about his own danger.

Rather, instinctively, he simply rushed to the elevator, made it down to the lobby, and ran as fast as he could toward the Twin Towers and the people he knew needed his help.

When he arrived, Lou saw smoke pouring from the building and immediately began evacuating people from the area. Most of them seemed dazed, he said later, and he knew they needed someone like him, a trained first responder, to shepherd them to safety.

But then the second plane hit, and when Lou looked up, all he could see was a fireball. He tried to take cover as debris rained down—metal, pipes, jet fuel.

He described it later as something like a war zone. And as the first tower began to tilt, and then fell, he continued to work to get as many people as he could to safety.

Some of the people in this room undoubtedly know exactly how Lou felt that clear September morning—the fear, the disbelief, and the sense of duty to protect their fellow citizens, even without knowing exactly what they needed to be protected from. But most of us can barely imagine.

The uniform Lou wore that day—torn and tattered, spattered with blood and jet fuel—now hangs in the FBI Police office at our Headquarters building in Washington.

It serves as a constant reminder of one of our nation’s darkest days and, more importantly, of the courage of first responders, who choose to rush in and towards danger when others rush out. Because, as Lou would say, that’s just the nature of those who have taken an oath to serve and protect others. And Lou took that oath to heart.

So many innocent lives were lost on 9/11—people going into work, people meeting clients or eating breakfast, and scores of first responders.

And now, with each year that passes, we lose more of the brave men and women who instinctively ran toward the danger that day, including many—too many—members of our FBI Family.

People like Lou.

I had the privilege of speaking with him a little more than a year ago. He’d been sick for several years by then, but despite all that he’d been through, I remember being struck by his spirit, by the genuine enthusiasm, love, and dedication Lou had for the FBI that I could feel, even over the phone.

I asked Lou about himself, his career, his time in the FBI. But as will come as no shock to any of you who knew him, Lou didn’t really want to talk about himself. He wanted to tell me about everyone else—the outpouring of support he and his family had received following the resurgence of his cancer, how absolutely wonderful everyone else had been.

As I never tire of telling people, it takes an incredibly special person to do this work—to put his or her life on the line for total strangers, day after day. And Lou was just that kind of incredibly special person.

But Lou was so much more than just his career.

In talking to the people who knew him well, the same words keep coming up over and over again. Kind. Respected. Trustworthy. Fair. Loving. Smart. Funny. Dedicated. Loyal.

Lou was an immigrant who’d come here from Hong Kong at a young age in search of a better life. And I think it’s safe to safe—he certainly would—that he found one.

Lou was a devoted husband whose years of friendship with a coworker named Jessica blossomed into love and the friendly banter and laughter that became the hallmark of their relationship.

I’m told they wanted to get married a year-and-a-half ago, but the pandemic threw a wrench into their plans. So rather than postpone the ceremony, they held it on the boardwalk at Coney Island on a very, very cold November day.

It was originally supposed to be a small gathering—only 20 people or so. But Lou and Jessica were so beloved that the crowd swelled, and their dear friend and coworker Kelly, who officiated the ceremony, had to use a bullhorn just so all the guests could hear.

Lou was also a loving and loyal friend, and after 25 years in the New York Field Office, he’d grown close to many of his colleagues. So close that one of his best friends, Heriberto, who’d started out as one of Lou’s employees 18 years ago, referred to him as his brother.

Those friends remained steadfast until the end, bringing Lou’s favorite foods to his hospital bed and, even after his passing, keeping vigil these past few days and nights to honor him.

And I’d be remiss not to also mention and thank the Sisters of Life, who have lent extraordinary support to our New York Field Office this week, as well as Monsignor Geno Sylva for his part in the Mass and for serving as an FBI chaplain for 13 years. Thank you for your support to this family, to this office, and to all of the men and women of the FBI.

Finally, I cannot close without mentioning that Lou was a man of deep faith who’d been baptized in adulthood.

In Isaiah, chapter six, verse eight, the Lord calls for someone to serve him. And Isaiah raises his hand and says, “Here I am. Send me.”

Here I am. Send me.

God was issuing Isaiah a call to service. A test. An act of faith.

Lou had faith. He had faith in the better life he’d find in the United States. He had faith in Jessica and her daughter, Jesslyn; in his sisters, Sandy and Mimi; in their husbands, Jason and Michael; in his niece, Pegeen, and his nephew, Milo; and in his stepmom, Lan. He had faith in the FBI. And he had faith in the work he was called to do: to serve and protect.

When Lou was called, he raised his hand, before God and before his country, and he said, “Here I am. Send me.”

At Headquarters and in every field office across the country, there’s a Wall of Honor where the names of fallen FBI employees are inscribed.

Each May we hold a ceremony to honor those whose names are on it. Last week we added two more to the wall. In time, we’ll add Lou’s name, as well.

Each one represents the kind of extraordinary people we have in the FBI—people who answer the call of duty, no matter the cost. People who always think of others before themselves.

We owe them a debt of gratitude we can never repay. But we can and will make sure that every future generation of our FBI Family reflects on Lou’s commitment, and the commitment of the other brave men and women who came before them.

Today, we say goodbye to a beloved member of the FBI Family gone too soon. But we’ll remember him, and the way he touched and changed so many lives, even those he didn’t know, for the better.

Jessica, Sandy, and Mimi, we know you’ll remember him better than anyone, as a devoted husband, brother, and family man. And we want to thank you for sharing Lou with us for so many years.

Please know that Lou, and all of you, will always be a part of our FBI Family.

Deputy Director’s Remarks to the National Football League 2022 Annual Security Conference

Source: Federal Bureau of Investigation FBI Crime News

Thank you, Cathy, for that kind introduction, and for the opportunity to be here with you all today.

As Cathy mentioned, our paths have crossed many times over the years, and I worked closely with her during my time at the Washington Field Office. I have incredible respect and admiration for Cathy – she’s extraordinary and the epitome of exceptional leadership. I am grateful to have worked with her and to call her a friend. Just recently in March, Cathy joined us at FBI Headquarters as a guest speaker for our celebration of Women’s History Month. We are grateful that she shared her story with people from across the Bureau. Each time I have the chance to see Cathy again, I am reminded of all that she did for this city as chief of the Metropolitan Police Department.

Cathy was always on-scene, leading from the front, visible, and constantly communicating with and reassuring the public during every incident and every major event. She was engaged, hands-on and everywhere all the time. In my mind, that’s what it takes to protect our communities. And all of the people in this room today know that well.

Protecting a gathering of thousands of people is a tall order on any day – but I would say, especially at a major event like a League game, with so many participants and spectators and so much at stake. So today, I’d like to talk briefly about what we’re up against – what we see as some of the most pressing threats to our national security — and how it all translates into security considerations for sporting event management and business operations. We’ve talked about these challenges before, but it’s more important than ever to stay focused and disciplined in our approach. I’ll touch on the growing cyber threat, the persistent threat of terrorist attacks, and, briefly, criminal threats to the integrity of sports.

I’ll start with the cyber threat. We’re increasingly concerned about the threat of cyber attacks against our country’s critical infrastructure, including the energy sector, emergency services, local government operations, and more. There’s a good reason for that. Over the past two years, the FBI has seen a wider-than-ever range of cyber actors threaten Americans’ safety, security, and confidence in this digitally connected world. Those cyber actors include cyber-criminal syndicates and nation states – and sometimes the two working in toxic combination. And they’re constantly developing new ways to compromise our networks and get the most reach and impact out of their nefarious operations.

We’re particularly focused on ransomware schemes. Not only have these schemes wreaked havoc on company operations and caused devastating financial losses, but they’ve targeted hospitals, 911 call centers, and even schools. And no one is immune from these attacks – including sports leagues, teams, and those of you who head up security for stadiums and teams around the country.

A cyber attack on this sector is an attack on our country’s economic security and on one of our favorite pastimes. And unfortunately, cyber actors have and continue to target sporting institutions and events. In 2018, six Russian nationals used malware called Olympic Destroyer to launch an attack against the opening ceremony of the 2018 PyeongChang Winter Olympics. They also used spear phishing campaigns and malicious mobile apps to target Olympic athletes, partners, and visitors – and International Olympic Committee officials. Those attacks were part of a larger campaign that included efforts to destabilize Ukraine and Georgia and interfere in France’s elections. Multiple FBI field offices were involved in the investigation, which culminated in indictments of six individuals in 2020. And earlier this year, we saw a professional sports team affected by ransomware. The same way we respond to all cyber incidents, we moved swiftly to provide indicators of compromise and helped mitigate the threat, all while working to safeguard the victim’s sensitive data.

We have the tools to investigate these malicious attacks, identify the perpetrators, and then impose risks and consequences on them. That’s part of our new cyber strategy, which you may have a sense of if you attended this conference last year and heard EAD Brian Turner speak. But it’s now such an integral part of how we operate that I want to give a bit more detail.

We’re using a full range of authorities as both an intelligence and a law enforcement agency, and working seamlessly with our domestic and international partners. Together, we’re working to defend networks, attribute malicious activity, sanction bad behavior, and take the fight to our adversaries overseas. The strategy centers on prevention and disruption – hitting hackers before they attack or before their intrusions can cause major harm. To dismantle them, we’re pursuing them on three fronts. First, we’re taking aim at the actors. Working with our partners, we identify who’s responsible for the most damaging schemes. And we take a broad view – everyone from administrators to affiliates to operators of services facilitating cybercrime. Second, we target their technical infrastructure. Seizing or disabling their servers, domains, botnets; disrupting their operations; raising their costs … all while gleaning valuable new intelligence on their activities. Third and finally, we’re going after their money. Knowing that virtual currencies are central to ransomware, we trace many transactions back to bad actors. Where we can, we’re also seizing the funds, or we’re shutting down illicit currency exchanges. We’re intent on making it harder and more painful for hackers to steal data and hold IT networks hostage. And while actors, infrastructure, and money are all important individually, we achieve the biggest impact when we disrupt all three together.

One of our most important resources in this fight is all of you – our partners in law enforcement and the private sector. We’re constantly looking to open new avenues to work together and ways to help if you do get hit with an attack. We’ve now set up Cyber Task Forces in all of our 56 FBI Field Offices across the nation – similar to the Joint Terrorism Task Forces you may be familiar with. So, if you reach out for help, you’re going to get a whole team with specialized expertise … and with jurisdiction to go after any cyber threat actor. That’s at every field office.

At the agency level, our Internet Crime Complaint Center established its Recovery Asset Team – which we just call “the RAT” – in 2018. Out of the top 50 U.S. banks by assets, the IC3 RAT has partnerships with 45, including all of the top 10 banks. Every year, the team culls through thousands of public complaints to help fraud victims recover hundreds of millions of dollars lost to cyber-crime. And more-and-more companies are coming to us for help. RAT addressed 32 percent more incidents in 2021 than 2020, with a solid record of being able to help. And between 2019 and 2021, the number of ransomware complaints reported to the FBI through the IC3 increased by 82 percent.

We’re also focused on sharing information through cybersecurity advisories. These advisories identify specific malware signatures; indicators of compromise; and tactics, techniques, and procedures. At the same time, we recommend that all of our partners take some steps to protect themselves.

First and foremost is to be extremely vigilant. You know your networks best, and chances are you’ll be the first to learn of a cyber attack conducted on your system. Second, we always recommend having a solid cyber incident response plan that includes instructions to call your local FBI field office if something happens. And third, we encourage you to review those cybersecurity advisories I mentioned, so that you’re working with the same information we have. Now more than ever, it’s critical that we keep our information flowing, fortify our networks, and stay on guard.

Next I want to talk about the threat with the potential to do the most physical, real-world damage, with potentially tragic consequences, and that’s terrorism. We’ve been briefing on the terrorist threat for the past 20 plus years, and there is no doubt we must remain vigilant on it. To be sure, by putting so much of our authority and resources behind the terrorism fight, we’ve made it really hard for international terrorist organizations to plan intricate, complex physical attacks. That doesn’t mean that kind of threat is gone. ISIS and al-Qaeda are still committed to attacking the U.S. and the West. They regularly put out calls for lone actor attacks. And the greatest terrorist threat we face is posed by those lone actors, or small, isolated cells.

We refer to those as homegrown violent extremists, and they typically radicalize online – inspired by some terrorist organization. But because they aren’t talking back and forth, coordinating with someone overseas, there’s no communications to intercept and no group to infiltrate. And as they’ve increasingly favored using guns, knives, and cars against soft targets, that limits the opportunities to see attacks coming. So, this is a really hard problem. And its scope is massive. We currently have about 1,000 homegrown violent extremist cases open, spanning all 50 states and all 56 FBI field offices. And then, separate from the homegrown violent extremists who are inspired by global jihad, we’re also concerned about what we call domestic violent extremists, who are motivated by issues happening at home.

Over the past few years, we’ve elevated two of the sub-groups within the domestic violent extremist category to be National Level Priorities – the same level as ISIS and Homegrown Violent Extremism. Those are the racially or ethnically motivated violent extremists – particularly those advocating for the superiority of the white race. And the anti-government anti-authority violent extremists, which includes militia violent extremists (anarchist violent extremists) and sovereign citizen violent extremists. The FBI currently has more than 2,700 domestic terrorism investigations ongoing. No matter which category the attackers fall into, they are eager to exploit security vulnerabilities in spaces with high attendance and a lot of media attention – like sporting events and music venues – to hurt as many people as possible. That’s where the attacks can have the greatest impact, in their view.

So, how do we address this? Just like with cyber, we at the FBI believe we have the best chance of thwarting these attacks when we effectively share intelligence and leverage our partnerships. We need a clear picture of what’s happening in communities across the country. And our partners, for example in the Joint Terrorism Task Forces, which some of you here may be part of – help us get there. The task force model allows us to share information quickly, surge resources where they’re most needed, and collaborate with our partners most effectively.

We’re also keeping companies and law enforcement agencies up to date with partner calls, situational reports, and intelligence products. On top of that, we’re working collaboratively with community groups to provide training on preventive measures. In so many cases, family members, peers, and associates are the best positioned to detect hints that someone they know may be considering violent action. So, a huge line of effort for the FBI is educating companies and the public on how to detect extremist conduct – in person and online. These are all avenues through which we share threat information and strategies to combat those threats.

Information is crucial, because when targets are unknown, soft targets are at highest risk. Of course, the information flow and coordination don’t stop at our borders: The FBI has 63 legal attaché offices around the world. So as the NFL holds more events overseas, we hope to partner with you there as well. In short, we firmly believe that each organization brings its unique abilities to the table, but it requires tremendous teamwork and cooperation to pull everything together into a unified whole.

I also want to briefly mention a program we’ve had in place for a number of years now, and that’s our Integrity in Sport and Gaming Initiative. You’ll hear about ISG from our Criminal Investigative Division later today, so I don’t want to steal the spotlight from that team. They’ll cover what the FBI is doing to combat threats of influence from organized crime groups and other criminal actors targeting leagues, athletes, coaches, referees, and others.

The main point I want to make right now is that behind this initiative, there’s a great deal of passion – not just for investigating sports crimes, but for the sports themselves. At the heart of our efforts is a recognition that sports hold a special place in our country and with the American people, and we’d hate to see the country’s most popular sport get undermined. So even though the ISG grew out of our Transnational Organized Crime program, one of the main tenets of the initiative is to preserve the integrity of our sporting institutions and to provide support. And we’re determined in our pursuit of those who prey on sport for profit.

Earlier I talked about the importance of intelligence, and I must say it’s great to see that our private sector partners like the NFL are on the same page with us about that. In fact, it looks like you’ll soon be hearing from Robert Gummer. Before he became the NFL’s director of intel operations, Rob was one of the FBI’s senior national intelligence officers. They make up sort of a brain trust at the Bureau. If there’s anyone who knows the importance of intelligence – that the common connection for countering these threats is understanding them, sharing information, and working with partners to disrupt threats before harm occurs – it’s Rob.

I do appreciate the opportunity to meet with you today, and I hope the partnership between the Bureau and the League will continue to be a strong one. With the NFL season schedule set to be released tomorrow, tens of thousands of Americans will start making plans to attend the games. Millions will be getting excited to watch on TV or online. So the stakes are high, as they’ve always been. And we all want the same thing – to make sure every game goes off without a hitch. To keep fans safe.

I want to thank you for choosing and devoting yourselves to the important work of protecting the American people. And I want to assure you that the FBI will continue to work ever more closely with you as the threats continue to evolve. It’s a privilege to join you here. Stay well and be safe. Thank you.

Director’s Remarks to the Association of State Criminal Investigative Agencies

Source: Federal Bureau of Investigation FBI Crime News

Remarks prepared for delivery.

Introduction  

Thank you, Mark, for that introduction. Good afternoon, everyone. Glad to be back here in person speaking to all of you. Conferences like these give us a chance to step away from our day-to-day challenges and gain some perspective on the issues we’re all facing in law enforcement.

They also give us the opportunity to hear directly from you what you’re seeing and experiencing in your states, and what we at the FBI can do to help.

We also hope to find ways to make our partnerships even stronger. Today I’d like to talk about what we’re up against—what some of the most pressing threats are to our national security and to law enforcement.

That includes our priorities—the counterterrorist threat, threats through cyberspace, from foreign intelligence, and in the form of violent crime, including violence against law enforcement.

FBI Priorities

Our number one priority at the FBI remains preventing terrorist attacks.

We still face threats from al-Qaida and other foreign terrorist groups that want to carry out large-scale attacks in the U.S. and around the world, but today, the greatest terrorist threat we face is from lone actors. These include homegrown violent extremists, who are inspired by foreign terror groups and ideologies, and domestic violent extremists.

Far too often, we’re seeing people resort to violence to advance their ideological, political, or social goals.

That’s why the FBI has significantly surged resources to our increasing number of domestic terrorism investigations.

Another one of our top priorities is, of course, the cyber threat. It’s taking an ever-increasing amount of our attention and energy. Today’s cyber threats are more pervasive, hit a wider variety of victims, and carry the potential for greater damage than ever before, which is why the cyber threat will stay near the top of our list, as long as nation-states and cybercriminal syndicates keep innovating. 

They’re constantly developing new ways to compromise our networks and get the most reach and impact out of their operations. We’re laser-focused on ransomware schemes—particularly those targeting our nation’s critical infrastructure.

Not only have these schemes wreaked havoc on company operations and caused devastating financial losses, but they’ve also crippled hospital systems, targeted the energy sector, threatened emergency services, shut down local government operations, and more. 

Even law enforcement data isn’t immune from this threat, as we’ve seen ransomware attacks on police departments from California to Washington, D.C.

But that’s not all we’re up against.

We’re also facing persistent counterintelligence threats from formidable adversaries like North Korea, Russia, and Iran. 

However, the greatest long-term counterintel threat, not only to our information and intellectual property, but also to our economic vitality and, ultimately, our national security—comes from China. 

We’ve got around 2,000 active China CI cases across the Bureau, about a 1,300% increase over where we were a decade ago.

Violent Crime

So those are some of our top priorities at the FBI, but a topic that remains top of mind for us and all of you these days is of course violent crime.

In too many communities, we’re seeing a disturbing uptick in homicides and violent assaults. Our 2020 detailed crime data—which we released late last year—illustrates this.

Overall violent crime in the United States, which includes not only murder but also assault, robbery, and rape, rose by more than 5%. I want to put that in perspective, because it’s hard to visualize what 5% actually means.

It means in 2020, there were 67,000 more violent crime offenses than there were in 2019. And homicides jumped nearly 30% in 2020, the largest single-year increase in more than 50 years.

You all know what’s driving the violent crime in your states.

Whether it’s a community where a disproportionate amount of gun violence takes place or rival gangs wreaking havoc in a particular region or a handful of well-known trigger pullers who keep finding their way back to the streets, no matter how many times they’re arrested, at the FBI, we want to be your integral partner in the fight against violent crime.

This is why we’re sharing information, working strategically with our state, local, and tribal law enforcement partners, and prosecuting the right cases in federal court. Our primary model for fighting violent crime remains our task forces.

Throughout the U.S., we have more than 50 violent crimes task forces; 175 Safe Streets gang task forces, with nearly 2,000 TFOs; 22 Safe Trails Task Forces, which are working to reduce Indian Country crime; and more than 100 Transnational Organized Crime Task Forces, with 600 members.

For some of the cities hit hardest by the recent surge, we’re boosting those efforts by temporarily surging resources to our field offices. These investigative, analytical, and technical resources embed with FBI personnel and support existing initiatives with our law enforcement partners for an immediate, measurable impact against violent crime.

Depending on where they are, the teams might focus on helping to get violent gun offenders off the streets, targeting commercial robbery crews, or taking aim at drug-trafficking gangs and criminal enterprises.

To date we have surged resources to six offices—Buffalo, Milwaukee, Louisville, Memphis, San Juan, and a current deployment in San Francisco. And collectively, these deployments have yielded nearly 150 arrests and the seizure of over 70 firearms from violent criminals.

And we’re seeing promising trends. In Milwaukee, homicides went down 17%, and non-fatal shootings fell by 28% during the resource surge.

And in Buffalo, there was a 50% decrease in homicides during the deployment. Buffalo is a good example of what we can accomplish when we gather intelligence across jurisdictions, surge resources, and build large enterprise investigations.

Buffalo had approached all-time highs in shootings and homicides over the past several years. By taking a hard look at what was driving that increase, we identified a couple of local gangs that were responsible for a number of murders.

We worked with our partners to build the case, and last fall, the 13th member of that gang was sentenced to life in prison after he was convicted on two counts of murder in aid of racketeering.

We work shoulder-to-shoulder with our state and local partners in investigations like that across the country every day.

Just last year, our Safe Streets Task Forces made more than 20,000 arrests, seized more than 8,000 firearms, and dismantled over 200 gangs and criminal organizations.

These kinds of joint investigations we can all be proud of, agents and task force officers working with our partners to make communities safer.

I want to especially thank ASCIA’s member agencies for sending your best and brightest investigators and intel analysts to our task forces and for helping to ensure information flows both ways through fusion centers.

By doing this, you’re helping your local partners combat this ongoing wave of violence in so many areas of our country.

We’re going to continue surging resources, and we’ll keep assessing where our support will most help our partners to continue cracking down on violent criminals.

It means going after the most violent offenders, making good use of intelligence about what’s fueling crime, and working together across agencies and departments to drive results.

Our goal is to help make a lasting impact, so our communities are safer places to live and work.

Threats to Law Enforcement

We need those communities to not only be safer places for our citizens to live and work, but also for the men and women whose job it is to protect those citizens.

That brings me to a topic that’s of paramount importance to me, and I know it is to you, too, threats to law enforcement.

Last year, 73 law enforcement officers were feloniously killed on the job—the highest single-year number since 9/11.

And that doesn’t even count those we lost to COVID or in accidental deaths, those killed while they weren’t on duty, or the scores of officers who were injured but thankfully survived.

Especially troubling is that a record number of those officers killed—nearly half—had no engagement with their assailant before the attack.

They were ambushed while sitting in their vehicles, attacked while on patrol, or lured out into the open and killed.

And so far in 2022, 16 more officers have been murdered in the line of duty.

One of those was Officer Drew Barr, from Mark Keel’s home state of South Carolina. Officer Barr was shot and killed while responding to a domestic disturbance just over a week ago.

At a news conference later that day, Cayce Police Chief Chris Cowan said Officer Barr was “married to this profession. He cared about nothing else other than serving his community. He was shot and killed this morning for no reason….It was inexcusable.”

Like Officer Barr, each one of the officers we’ve lost got up one morning, picked up their badge, not knowing whether they’d make it home that night.

They did their jobs despite all the hardships they’ve faced in these especially difficult past few years because they were devoted to protecting their fellow Americans, both friends and strangers alike, devoted to serving their communities.

The loss of any agent or officer is heartbreaking for their families, for their agencies, and for the communities they serve. It’s why working together, to fight the scores of threats we collectively face, is so important.

Keeping our people safe is our highest priority, and I know you feel the same. Getting the most violent offenders off our streets will go a long way toward that, and so will making sure folks have the training and equipment they need to do the job safely.

Because law enforcement is dangerous enough; wearing a badge shouldn’t make someone a target.

We need good people to continue to answer the call to make law enforcement their career.

Of course, if we’re going to be able to recruit and retain the special kind of person willing to put his or her life on the line to protect others, we need to show them that we appreciate their sacrifices, that we have their backs.

I’ll keep doing my best to sound the alarm, and I’d ask for your help in raising awareness on the issue, too.

Data Collection Programs

To know how to effectively address violent crime or threats to law enforcement, we need to understand the trends. We need concrete information and transparency into what’s really going on in our communities—accurate, objective data. We need the facts.

The great news is now that we’ve transitioned to the National Incident-Based Reporting System, or NIBRS, the FBI can provide more detailed and comprehensive crime data.

NIBRS-only reporting has been up and running for over a year, and we’ve got nearly 12,000 law enforcement agencies (63%) reporting their data. I want to thank everyone who’s participating, but we can do better.

If you aren’t contributing NIBRS-certified data yet, I strongly encourage you to do so. We know it can be a challenge, but we’re here to help you.

The Bureau’s investing—and is going to continue investing—in training and tools to help you make the transition to NIBRS.

If you have questions or need help getting us your data, please contact our team at ucr@fbi.gov.

Without it, we can’t get an accurate nationwide picture of things like hate crimes or assaults on law enforcement officers

If you aren’t NIBRS-certified, you can’t contribute that kind of data. And we need your information so our agencies, and the public we serve, can understand the issues we’re facing and make the best possible decisions.

The same goes for our National Use-of-Force Data Collection, also a top priority for us, and I know it is for ASCIA as well.

Our goal there is not to offer insight into single incidents; it’s to provide a comprehensive view of the circumstances, subjects, and officers involved in use-of-force incidents nationwide.

I’m happy to report that we hit our participation threshold last month. We’ve now got over 60% of law enforcement agencies contributing data.

That means in the very near future, we’ll be able to release our first statistics on the use of force, things like the top types of force used and resistance encountered, as well as the overall percentages we’re seeing for different incidents and reasons for initial contact.

Once we get to the 80% mark, we’ll be able to share even more data and insight into use-of-force incidents. We can give the public the necessary facts, and, I believe, strengthen our nation’s confidence in law enforcement.

As we all know, if we don’t provide the data and the context, others out there might try to paint a very different picture, using their own information and their own context or spin.

It all depends on the data our law enforcement agencies provide. I know I’m speaking to the choir here; many of ASCIA’s member agencies are already submitting use-of-force data.

We’ve got to continue to encourage our local law enforcement partner, our city and county departments, to submit their use-of-force statistics.

Another program I want to tell you about today is a new one, and it’s one that’s hard to talk about. This year, we started collecting data on law enforcement suicides and attempted suicides. That includes not just the location of these tragedies and the manner of death, but also things like biographical information, employment history, and any triggers, issues, or out-of-the-ordinary behaviors or actions agencies might have seen.

You can access this data collection through the Law Enforcement Enterprise Portal, or LEEP.

We need to be able to take care of our people, and we can’t do that properly without greater insight into what’s really happening out there.

I firmly believe these data collections are going to be vital for all of us as we continue making the physical and mental health of our people a priority.

Conclusion

Those are just a few thoughts on our current priorities and challenges. Times like these call for both strong partnerships and innovation.

At the FBI, we’re committed to both, and I know ASCIA is, too. After all, your organization was founded more than 40 years ago to improve communication, share ideas, and build relationships among public safety agencies.

We need to stay tightly connected, now more than ever, so I hope you’ll continue to work with us, including on our many task forces.

And we want to continue to help you in whatever way we can.

Thank you for your service, for your support, and for your partnership with us, and thank you for giving me the opportunity to join you today.

Director’s Remarks to the Domestic Security Alliance Council

Source: Federal Bureau of Investigation FBI Crime News

Counterintelligence Threats

First, I’d like to talk for a moment about the threats we’re facing today, and I’ll start with one that’s at the top of the Bureau’s list of concerns and should be at the top of every U.S. company’s list, too.

That’s the counterintelligence threat posed by China. When we tally up what we see in our cases, nothing presents a broader, more severe threat to our ideas, our innovation, and our economic security than the People’s Republic of China.

The PRC is leading a generational fight for China to surpass the U.S. as a global superpower, and it’s pursuing those goals with little regard for international norms and laws and certainly not through fair and lawful competition.

Instead, the Chinese government has shown its willingness to steal its way up the ladder. In fact, the scale of China’s theft of U.S. innovation is unprecedented. And as a result, U.S. companies are facing a greater, more complex danger than they’ve ever faced before.

Because stolen innovation is not just the theft of one idea—it means stolen jobs, stolen opportunities for American workers, stolen national power, and stolen leadership in the industries China seeks to dominate in the decades to come.

That’s why investigating and preventing economic espionage and illicit technology transfer to the Chinese state is a top priority for the FBI.

Let me give you some context for this threat. The FBI has 56 field offices across the country.

Every single one has cases on the Chinese government’s attempts to steal U.S.-based information and technology, and those investigations tell us a lot about the tools and tactics the Chinese government uses to steal what it wants from unwitting companies.

These tactics range from the use of intelligence officers, to hackers, to front companies, to seemingly benign joint ventures or research partnerships to recruiting employees who use their legitimate access to steal corporate secrets, what we all refer to as “insider threats.”

Now later today, you’ll hear from Rachel Rojas, who heads up the Bureau’s Insider Threat Office, and others from both the USIC and the private sector who work in this field, in what promises to be a great panel discussion about establishing and running an insider threat program within your own organizations.

But I’d be remiss if I didn’t take a couple minutes to highlight the significant role insiders play when it comes to the Chinese government’s theft of American information and innovation.

So, I want to tell you a little bit about the case of Shan Shi. He was sentenced to federal prison in 2020 for stealing trade secrets from a company in Texas regarding a technology called syntactic foam. It’s export-controlled because it’s got important military applications–it allows submarines to evade detection underwater.

In that way, it helps make up the foundation of our naval power–and it’s also part of a multibillion-dollar oil and gas industry. Most important, it’s a technology China’s government agencies and state-owned enterprises hadn’t been able to manufacture themselves.

So here’s what they did instead. They gave Shi three million dollars to incorporate a company in Houston and get what they needed to make syntactic foam in China. But first he needed the technology, so he targeted the American victim company’s employees on social media.

Shi used cash incentives and cushy job offers to entice two former employees, two former insiders, to help with this effort in exchange for the company’s trade secrets and technical data.

Once he had the information, Shi sent it to China, where they started manufacturing a key component of syntactic foam.

Now, and here’s one of the more galling and egregious aspects of the scheme. Shi and his co-conspirators actually patented in China the very manufacturing process they’d stolen from the American company, and the Chinese government actively helped them do it.

Then, Shi contacted the victim company and offered it a joint venture using its own stolen technology. His business plan?

Gain the company’s cooperation—and then put it out of business and take over the market. We’re talking about an American company that spent years and millions of dollars developing a technology.

The Chinese government couldn’t replicate it. So instead, it paid to have it stolen. Fortunately, this story has a happy ending.

Although the FBI’s investigation started after the trade secrets were stolen, we were able to move quickly and prevent more damage. Eager to secure his employees’ jobs and keep a critical technology out of the Chinese government’s hands, the victim company’s CEO fully cooperated with the Bureau.

Indictments and arrests soon followed, and we disrupted a planned purchase of millions of dollars’ worth of manufacturing equipment destined for China.

Ultimately, four defendants—including the two insiders—pleaded guilty. Shi was convicted at trial and the Chinese government’s attempts to dominate that particular industry were thwarted.

Cyber Threats

But of course, economic espionage isn’t the only threat American companies are facing. The broader cyber threat ranks right up there, too. And it’ll stay near the top of our list as long as nation-states and cybercriminal syndicates keep innovating.

They’re constantly developing new ways to compromise our networks and get the most reach and impact out of their operations. As a result, today’s cyber threats are more pervasive, hit a wider variety of victims, and carry the potential for greater damage than ever before.

At the Bureau, that translates to the literally hundreds of national security and criminal cyber threats we’re tracking and countering, around the clock. We’re most concerned about possible cyberattacks against our nation’s critical infrastructure that could wreak havoc in our everyday lives.

A big portion of critical infrastructure attacks today come from ransomware groups. Last year alone, we saw ransomware incidents against 14 of the 16 U.S. critical infrastructure sectors.

Not only have they wreaked havoc on company operations and caused devastating financial losses. But we’ve also seen them compromise networks for oil and gas pipelines, healthcare systems, grade schools, 9-1-1 call centers, and local governments.

They cause real-world harm, threatening our national security, economic vitality, and public health and safety. And the monetary losses associated with ransomware are striking.

In 2020, victims paid an estimated $350 million in ransom—an increase of more than 300% over 2019—with the average payment at more than $300,000. And those ransom amounts often pale in comparison to the massive costs associated with business disruption and remediation.   

In total, between 2019 and 2021, the number of ransomware complaints reported to the FBI increased by 82%.

As harmful as attacks are when conducted by criminal actors, though, targeting of vital networks is in some ways even more dangerous when it’s done by nation-states.

Their efforts may look the same as a criminal attack at first. For example, if they’re using ransomware, you see a notice that your data is encrypted. But when a nation-state is responsible, there may not be a decryption key available—at any price.

Last June, hackers sponsored by the Iranian government prepared to launch a ransomware attack against a U.S. children’s hospital. Let me repeat that: a children’s hospital.

And in 2017, the Russian military used purported ransomware called NotPetya to hit Ukrainian critical infrastructure.

It was supposed to look like a ransomware heist, but it was actually designed to destroy systems. They targeted Ukraine, but ended up also hitting systems here, throughout Europe, and elsewhere.

That attack ended up causing more than 10 billion dollars in damages—one of the most damaging in the history of cyberattacks—and went global before anyone knew to do anything.

Just last month, we disrupted a global botnet of thousands of infected network hardware devices under the control of Russian military intelligence hackers. With the ongoing conflict raging in Ukraine, we’re particularly focused on the destructive cyber threat posed by the Russian intelligence services and the cybercriminal groups they protect and support.

But we’ve also got to keep a close eye on other nations with a history of threatening us in cyberspace, which brings me back to China.

In March 2021, Microsoft—a valuable DSAC partner–and other U.S. tech and cybersecurity companies disclosed some previously unknown vulnerabilities targeting Microsoft Exchange Server software. They warned the public that cyber actors were exploiting those vulnerabilities to illegally access email servers.

The hackers were operating out of China. Through our private sector partnerships, we identified the vulnerable machines. And learned the hackers had implanted webshells, malicious code that created a backdoor and gave them continued remote access to the victims’ networks.

So we pushed out a joint advisory with CISA to give network defenders the technical information they needed to disrupt the threat and eliminate those backdoors. But some system owners weren’t able to remove the webshells themselves, which meant their networks remained vulnerable.

So we executed a surgical, court-authorized operation, copying and removing the harmful code from hundreds of vulnerable computers. Those backdoors the hackers had propped open?

We slammed them shut, so the cyber actors could no longer use them to access victim networks. Our work wouldn’t have been successful without the strong partnerships we have with the private sector.

And those partnerships also enabled the U.S. to join our allies last July in publicly attributing the Microsoft Exchange compromise to China’s Ministry of State Security. And that’s just one example, out of many, where we’ve shown the U.S. business community that when it comes to cyber investigations.

One, we’re here to help. Two, building relationships with us ahead of time can go a long way in protecting your information, technology, and innovation. And three, there’s actually quite a bit we can do even after the fact to recover what’s been stolen or to mitigate the damage—if you come to us early.

Bottom line, whether you’re in the midst of a cyber problem or you’re preparing for one, we’re here for you.

Importance of Partnerships

It’s clear we’re up against some awfully serious threats to our economic and national security. And it’s equally clear that if we’re to continue combating those threats successfully, we’ve got to maintain and strengthen our partnerships with you.

We know we need to keep a meaningful dialogue going, and continue building trust throughout the private sector.

One of our most important partnership efforts is this one—DSAC—and for 17 years, it has served an absolutely critical role in keeping Americans safe.

What started as a few CSOs meeting with the FBI and State Department.

Has grown into a powerful organization representing more than 600 U.S. companies and millions of employees, at least 50 unique industries and nearly every critical sector.

Today, through our DSAC portal, we’re sharing important security information, intelligence products, event notifications, and training resources.

And when a critical incident occurs or an emerging threat surfaces, we’re providing you with as much detail as we can—in the immediate aftermath and in the days and weeks that follow.

You, in turn, are sharing with us your insight, knowledge, and expertise about the threats affecting you.

Combining our intelligence with what you’re seeing, making all of us stronger.

I can’t overstate how proud I am of this organization’s success, nor how grateful I am to DHS, our partners in developing DSAC for the past 14 years, for helping to make it possible.

Still, that doesn’t mean there isn’t room for improvement. That’s why, this past December, our Office of Private Sector held a day-long strategy session with DSAC’s Expanded Executive Working Group.

It was a day of candid conversation about what we’re doing right that’s most helpful to you—and what we can do better, too.

The group provided a lot of valuable feedback on ways to improve our DSAC community, and we took that feedback to heart.

We’ve used it put together short- and long-term strategies to guide DSAC, emphasizing four strategic pillars: people, partnerships, capabilities, and innovation.

And before I close, I’d like to share a little about those pillars and why we believe they’re so important.

First among our four pillars is people. Sure, DSAC’s a success today, but to ensure that success tomorrow and into the future—well after we’ve all retired—we need to increase diversity among our members and leaders.

And by that I mean both diversity in terms of the sectors and industries DSAC represents, as well as in the demographics of our members.

That’s the only way we can make sure we’re bringing the right mix of perspectives to the table.

The second of our strategic pillars is partnerships. And I hope I’ve made clear today—and many times over the years—partnerships are this organization’s bedrock.

We all need each other, and we all have a lot to gain from a strong partnership. When we can combine what we see with what you see, when we work together.

Our two plus your two equals more than four—five, or six, or seven. So an important part of our strategy involves a focus on those partnerships.

On making sure you, as DSAC members, have the information and relationships you need for successful security collaboration.

Third among our pillars is capabilities. What we need to have so we can effectively do our jobs—keeping companies, and people, safe.

To inform our decision making, it’s important that we’re all making the best use of the analytic tools we’ve got. That we’re offering the best training and resources to keep our members at the top of their game.

And that we’re investing in DSAC’s working groups so we can continue improving the way all of us work together.

Our final pillar is innovation. In the private sector, you’re no strangers to the pressure of finding new ways to be more efficient, more agile, and more resilient. And in government, we’re always working to stay a step ahead, too.

DSAC should be no different. We need to be working constantly to update our technology, so we can communicate and share information more effectively. And we’ve got to find new ways to increase collaboration across the private sector.

So while we should be proud that we’ve come a long way since those days of informal meetings with a handful of CSOs, we definitely aren’t resting on our laurels, and we know we’ll continue to have our work cut out for us.

Conclusion

Today, I’ve described the pretty daunting threats we’re facing to our economic and national security.

But I hope I’ve also demonstrated that we’re depending on you, our private sector partners, to help us keep Americans safe, to help us keep U.S. businesses and jobs safe, and to help us keep American information, technology, and innovation safe.

Because while that responsibility may be a daunting one, our adversaries are no match for what we can accomplish when we work together.

So, thank you for the work you’ve done with us as members of DSAC. I look forward to our continued partnership

I know next you’re going to hear from Secret Service Director Murray, and I’m sure he’ll have some excellent thoughts on how to strengthen partnerships as well.