Director Wray’s Remarks at the 2024 Birmingham Civil Rights Conference

Source: Federal Bureau of Investigation FBI Crime News

Present: Hate Crimes and Tops Supermarket

Across four decades, FBI special agents and law enforcement officers here in Birmingham took this case personally and saw it through to completion. Their dedicated work—and the dedicated work of hundreds of other agents on countless other cases—is part of the Bureau’s DNA.

Today, the FBI is the only federal agency charged with investigating civil rights violations, which include hate crimes and color-of-law violations. 

Civil rights violations have been increasing for some time, which is why, in 2021, the FBI elevated civil rights to a national threat priority. In plain English, that means the program receives more resources and that civil rights violations jump a lot of other investigations in priority at every field office. And, this year, we increased the number of people specifically committed to investigating civil rights crimes to 176 special agents, plus 57 analysts.

Nationally, we’ve seen a steady rise in the volume of hate crimes. In 2022, across all levels of law enforcement in the United States, more than 13,000 hate crime incidents were reported. About half of those were crimes motivated solely by race, ethnicity, or ancestry biases. We’re still collecting nationwide data for 2023, but just looking at our work at the FBI, our investigations led to more hate crimes charges last year than any year since the turn of the century.

Almost certainly, the most high-visibility ongoing case is the mass-casualty shooting at the Tops Supermarket in Buffalo, New York, in May of 2022. The shooter posted online about his fears of what he called “white genocide.” He targeted a nearby community with the highest percentage of Black residents and then meticulously plotted, scouted, and prepared for a series of shootings.

He was ahead of his planned schedule when he stepped out of his car wearing body armor and livestreaming from a helmet cam. Yelling racial slurs, he shot four people in the parking lot before he entered the store and began targeting anyone who was Black. 

In just a couple minutes, he’d shot 13 people, and the 10 he killed were all Black.

As horrific as that was, it could’ve been far worse if Buffalo Police Department officers had not arrived within two minutes of the start of the shooting. They stopped him from reaching his car—where he had more weapons and ammunition—and from moving to a second location.

Now, I can’t talk much about the ongoing federal case, but those are all details from the shooter’s guilty plea to state charges of murder, terrorism, and hate crimes. In February, a New York court sentenced him to 10 consecutive life sentences, plus 75 years, without the possibility of parole. 

And our case has also led to 27 federal charges: 13 hate crimes charges relating to the people he shot, one more for attempting to kill other African American people nearby, and 13 firearms charges relating to his hate crimes, with that trial scheduled to begin late next year.

I know that case has everyone’s interest across the country, but I don’t want to leave you with the impression that something needs to be a capital case—or even to include violence—for the FBI to get involved.

One recent case we investigated was up in Billings, Montana. In November 2020, a man walked into a church, hungry and needing help. The elderly woman working there gave him a gift card and wished him well. He should have just been grateful, but he didn’t like that the woman who helped him was Black. 

So five days later, he called the church and left a voicemail, claiming to be a church donor and saying he would donate a lot more money if the church would just stop employing African Americans—although the term he used was not “African Americans.”

After he made three more calls, the church contacted the local police. A detective spoke to the man, who promised not to call the church again. Three days later, he left another voicemail, apologizing. 

But, it turned out, he wasn’t done. Over the next year and a half—even after leaving the state—he continued calling the church, using racial slurs and making threats, so the FBI got involved and tracked him down. October of 2022, he was indicted on federal charges, arrested in Indiana, and held in federal custody. Last June, he pled guilty to harassment, and, in October, he was sentenced to 18 months in federal prison.

Now, that case didn’t make national headlines, but those threats made a huge impact on that church and led a woman—who’d just tried to help someone—to fear for her safety. And we were not going to rest until she felt safe again.

Federal Bureau of Investigation Budget Request for Fiscal Year 2025

Source: Federal Bureau of Investigation FBI Crime News

Statement for the Record

Good afternoon, Chairman Rogers, Ranking Member Cartwright, and members of the Subcommittee. Thank you for inviting me to appear before you today. Each day, Federal Bureau of Investigation (FBI) personnel are making a real difference in communities across the nation, tackling some of the most complex national security and criminal threats with perseverance, professionalism, and integrity—sometimes at the greatest of costs. I am extremely proud of their service and commitment. On their behalf, I ask for your support and pledge to be the best possible stewards of the resources you provide. I would like to begin by providing a brief overview of the FBI’s FY2025 budget request and then follow with a short discussion of key threats and challenges that we face, both as a nation and as an organization.

FY2025 Budget Overview

The FY2025 budget request proposes a total of $11.3 billion in direct budget authority to carry out the FBI’s national security, intelligence, criminal law enforcement, and criminal justice services missions. The gross request includes a total of $11.3 billion for salaries and expenses, which will support 37,083 positions (13,623 special agents, 3,337 intelligence analysts, and 20,123 professional staff), and $61.9 million for construction. The request includes program enhancements under salaries and expenses, including $7.0 million to enhance cyber investigative capabilities, $17.8 million to mitigate threats from foreign intelligence services, and $8.4 million to address the increased volume of firearms background checks. The request also provides funding to allow the FBI to fund critical national security and law enforcement positions reduced as a result of reductions in the FY2024 enacted appropriation. Congress has long supported these positions in years past, and the safety and security of the American people would be well served by allowing the FBI to continue filling these positions in FY2025 through the requested budget.

As described in this threat summary, our adversaries are not scaling back their efforts because of the constrained budget environment. In fact, threat actors may try to take advantage of federal budget reductions to conduct nefarious activities. The FBI cannot afford to be playing catch-up to the People’s Republic of China (PRC), Hamas, transnational organized criminals coming across the border, and cyber actors. With the requested resources, the FBI will have the talent, tools, and authorities to do more to protect the American people and uphold the Constitution.

Key Threats and Challenges

Over the past year, the threats facing our nation have escalated. These threats emanate from myriad sources—nation-states, hostile foreign intelligence services, and criminals. They range from homegrown violent extremists (HVEs) to sophisticated cyber attacks, from internet- facilitated sexual exploitation of children to human trafficking, from violent gangs and criminal organizations to public corruption and corporate fraud. Keeping pace with these threats is a significant challenge for the FBI, especially as technology evolves and allows adversaries to use the internet and social media to facilitate illegal activities, recruit followers, encourage terrorist attacks and other illicit actions, to spread misinformation, and to disperse information on building improvised explosive devices and other means to attack the United States. Cyber actors also exploit technology to infiltrate U.S. networks, steal our intellectual property and secrets, spread malicious malware, hold our critical infrastructure at risk, and create chaos. The breadth of these threats and challenges are as complex as any time in our history, and the consequences of not responding to and countering threats and challenges have never been greater.

The support of this committee in funding the FBI to do its part in thwarting these threats and facing these challenges is greatly appreciated. That support will allow us to establish strong capabilities and capacities to assess threats, share intelligence, leverage key technologies, and—in some respects, most importantly—hire the best personnel to serve as special agents, intelligence analysts, and professional staff. We have built, and are continuously enhancing, a workforce that possesses the skills and knowledge to deal with the complex threats and challenges we face today and will face tomorrow. We are building a leadership cadre that views change and transformation as a positive tool for keeping the FBI focused on the key threats facing our nation.

Today’s FBI is a national security and law enforcement organization that uses, collects, and shares intelligence in everything we do. Each FBI employee understands that, to defeat the key threats facing our nation, we must constantly strive to be more efficient and more effective. Just as our adversaries continue to evolve, so too must the FBI. We live in a time of acute and persistent terrorist and criminal threats to our national security, our economy, and indeed our communities. These diverse threats underscore the complexity and breadth of the FBI’s mission: to protect the American people and uphold the Constitution of the United States.

National Security

Top Terrorism Threats

Protecting the American people from terrorism—both international and domestic— remains the FBI’s number one priority. The threat from terrorism is as persistent and complex as ever. As we saw in October with the devastating attack in Israel, terrorist actors are still very intent on using violence and brutality to spread their ideologies. We are in an environment where the threats from international terrorism (IT), domestic terrorism (DT), and state-sponsored terrorism are all simultaneously elevated.

The greatest terrorism threat to our homeland is posed by lone actors or small cells of individuals who typically radicalize to violence online and who primarily use easily accessible weapons to attack soft targets. We see the lone offender threat with both domestic violent extremists (DVEs) and HVEs: two distinct threats, both primarily located in the United States, that typically radicalize and mobilize to violence on their own. DVEs are individuals based and operating primarily within the United States or its territories, without direction or inspiration from a foreign terrorist group or other foreign power, who seek to further political or social goals through unlawful acts of force or violence. In comparison, HVEs are individuals of any citizenship who have lived and/or operated primarily in the United States or its territories, who advocate, are engaged in, or are preparing to engage in ideologically motivated terrorist activities in furtherance of political or social objectives promoted by a foreign terrorist organization but are acting independently of direction by a foreign terrorist organization (FTO).

Domestic and homegrown violent extremists are often motivated and inspired by a mix of social or political, ideological, and personal grievances against their targets and, more recently, have focused on accessible targets, to include civilians, law enforcement and the military, symbols or members of the U.S. government, houses of worship, retail locations, and public mass gatherings. Lone actors present a particular challenge to law enforcement and intelligence agencies. These actors are difficult to identify, investigate, and disrupt before they take violent action, especially because of the insular nature of their radicalization and mobilization to violence and limited discussions with others regarding their plans.

The top domestic terrorism threat we face continues to be from DVEs we categorize as racially or ethnically motivated violent extremists (RMVEs) and antigovernment or antiauthority violent extremists (AGAAVEs). The number of FBI domestic terrorism investigations has more than doubled since the spring of 2020. At the end of FY2023, the FBI was conducting approximately 2,700 investigations within the domestic terrorism program and was also conducting approximately 4,000 investigations within its international terrorism program.

The FBI assesses HVEs as the greatest, most immediate international terrorism threat to the homeland. HVEs are people located and radicalized to violence primarily in the United States, who are not receiving individualized direction from FTOs but are inspired to commit violence by FTOs, including the self-proclaimed Islamic State of Iraq and ash-Sham (ISI”) and al-Qaida and their affiliates. The lack of a direct connection with an FTO, ability to rapidly mobilize without detection, and use of encrypted communications pose significant challenges to our ability to proactively identify and disrupt potential violent attacks by HVEs.

While we assist our Israeli colleagues and we understand the global implications of the ongoing conflict in Israel, we are paying heightened attention to how the events abroad could directly affect and inspire people to commit violence here in the Homeland. Terrorist organizations worldwide, as well as individuals attracted to violence, have praised Hamas’ horrific attack on Israeli civilians. We have seen violent extremists across ideologies seeking to target Jewish and Muslim people and institutions through physical assaults, bomb threats, and online calls for mass casualty attacks. Our top concern stems from lone offenders inspired by— or reacting to—the ongoing Israel-Hamas conflict, as they pose the most likely threat to Americans, especially Jewish, Muslim, and Arab-American communities in the United States. We have seen an increase in reported threats to Jewish and Muslim people, institutions, and houses of worship here in the United States, and we are moving quickly to mitigate them.

Presently, we have no information to indicate that Hamas has the intent or capability to conduct operations inside the United States, though we cannot, and do not, discount that possibility, but we are especially concerned about the possibility of Hamas supporters engaging in violence on the group’s behalf. As always, we are concerned with any FTO that may exploit the attacks in Israel as a tool to mobilize their followers around the world. In recent years, there have been several events and incidents in the United States that were purportedly motivated, at least in part, by the conflict between Israel and Hamas. These have included the targeting of individuals, houses of worship, and institutions associated with the Jewish and Muslim faiths with acts of physical assault, vandalism, or harassment. Anti-Semitism and anti-Islamic sentiment permeate many violent extremist ideologies and serve as a primary driver for attacks by a diverse set of violent extremists who pose a persistent threat to Jewish and Muslim communities and institutions in the United States and abroad. FTOs have exploited previous conflicts between Israel and Hamas via media outlets and online communications to call on their supporters located in the United States to conduct attacks. Some violent extremists have used times of heightened tensions to incite violence against religious minorities, targeting both Jewish and Muslim Americans.

The FBI remains concerned about the intent of FTOs, such as ISIS and al-Qaida and their affiliates, to carry out or inspire large-scale attacks in the United States.

Despite its loss of physical territory in Iraq and Syria, ISIS remains relentless in its campaign of violence against the United States and its partners, here at home and overseas. ISIS and its supporters continue to aggressively promote its hate-fueled rhetoric and attract like-minded violent extremists with a willingness to conduct attacks against the United States and our interests abroad. ISIS’ successful use of social media and messaging applications to attract individuals is of continued concern to us. Like other foreign terrorist groups, ISIS advocates for lone offender attacks in the United States and Western countries via videos and other English language propaganda that have specifically advocated for attacks against civilians, the military, law enforcement, and intelligence community personnel.

Al-Qaida also maintains its desire to conduct and to inspire large-scale attacks. Because continued pressure has degraded some of the group’s senior leadership, we assess that, in the near term, al-Qaida is more likely to continue to focus on cultivating its international affiliates and supporting small-scale, readily achievable attacks in regions such as East and West Africa. Nevertheless, propaganda from al-Qaida leaders continues to seek individuals inspired to conduct their own attacks in the United States and other Western nations.

Iran and its global proxies and partners, including Iraqi Shia militant groups, attack and plot against the United States and our allies throughout the Middle East. Iran’s Islamic Revolutionary Guard Corps-Qods Force (IRGC-QF) has, too, provided support to militant resistance groups and terrorist organizations. And Iran has supported Lebanese Hizballah and other terrorist groups. Hizballah has sent operatives to build terrorist infrastructure worldwide. The arrests of individuals in the United States allegedly linked to Hizballah’s main overseas terrorist arm, and their intelligence-collection and -procurement efforts, demonstrate Hizballah’s interest in long-term contingency planning activities here in the Homeland. Hizballah Secretary-General Hassan Nasrallah has also threatened retaliation for the death of IRGC-QF Commander Qassem Soleimani.

While the terrorism threat continues to evolve, the FBI’s resolve to counter that threat remains constant. We continually adapt and rely heavily on the strength of our federal, state, local, tribal, territorial, and international partnerships to combat all terrorist threats to the United States and its interests. To that end, we use all available lawful investigative techniques and methods to combat these threats while continuing to collect, analyze, and share intelligence concerning the threats posed by violent extremists who desire to harm Americans and U.S. interests. We will continue to share information and encourage the sharing of information among our numerous partners via our joint terrorism task forces across the country and our legal attaché offices around the world.

In addition to fighting terrorism, countering the proliferation of weapons-of-mass-destruction materials (WMD), technologies, and expertise, preventing their use by any actor, and securing nuclear and radioactive materials of concern are also top national security priorities for the FBI. The FBI considers preventing, mitigating, investigating, and responding to WMD terrorism a no-fail mission because a WMD attack could result in substantial injuries, illness, or loss of lives and yield significant social, economic, political, and other national security consequences.

The FY2025 budget request will allow the FBI to invest resources in counterterrorism programs previously funded prior to the FY2024 appropriation. In a rapidly evolving threat environment, now is not the time to reduce resources against international terrorism threats.

Cyber

The FBI has seen a wider-than-ever range of cyber actors threaten Americans’ safety, security, and confidence in our digitally connected world. Cybercriminal syndicates and nation-states continue to innovate, using unique techniques to compromise our networks and maximize the reach and impact of their operations. Those techniques include selling malware as a service or targeting vendors to access scores of victims by hacking just one provider.

These criminals and nation-states believe that they can compromise our networks, steal our property, extort us, and hold our critical infrastructure at risk without incurring any risk themselves. In the last few years, we have seen the People’s Republic of China (PRC), the Democratic People’s Republic of Korea (DPRK), and Russia use cyber operations to target U.S. research. We have seen the PRC working to obtain controlled dual-use technology while developing an arsenal of advanced cyber capabilities that could be used against other countries in the event of a real-world conflict. And we have seen the disruptive impact a serious supply chain compromise can have through the SolarWinds-related intrusions conducted by the Russian Foreign Intelligence Service. As these adversaries become more sophisticated, we are increasingly concerned about our ability to detect specific cyber operations against U.S. organizations. One of the most worrisome facets is their focus on compromising U.S. critical infrastructure, especially during a crisis.

Making things even more difficult, there is often no bright line that separates where nation-state activity ends and cybercriminal activity begins. Some cybercriminals contract or sell services to nation-states; some nation-state actors moonlight as cybercriminals to fund personal activities; and nation-states are increasingly using tools, such as ransomware, typically used by criminal actors.

So, as dangerous as nation-states are, we do not have the luxury of focusing only on them. In the past year, we also have seen cybercriminals target hospitals, medical centers, educational institutions, and other critical infrastructure for theft or ransomware, causing massive disruption to our daily lives. Incidents affecting medical centers have led to the interruption of computer networks and systems that put patients’ lives at increased risk.

We have also seen the rise of an ecosystem of services dedicated to supporting cybercrime in exchange for cryptocurrency. Criminals now have new tools to engage in destructive behavior—for example, deploying ransomware to paralyze entire hospitals, police departments, and businesses—as well as new means to better conceal their tracks. It is not that individual malicious cyber actors have necessarily become much more sophisticated, but that they can now more easily rent sophisticated capabilities.

We must make it harder and more painful for malicious cyber actors and criminals to carry on their malicious activities. As the lead federal agency for threat response, the FBI works seamlessly with domestic and international partners to defend their networks, attribute malicious activity, sanction bad behavior, and take the fight to our adversaries overseas. We must impose consequences on cyber adversaries and use our collective law enforcement and intelligence capabilities to do so through joint and enabled operations sequenced for maximum impact. And we must continue to work with the Department of State and other key departments and agencies to ensure that our foreign partners are able and willing to cooperate in our efforts to disrupt perpetrators of cybercrime.

An example of this approach is the coordinated international operation announced in April 2023 against Genesis Market, a criminal online marketplace offering access to data stolen from over 1.5 million compromised computers around the world containing over 80 million account access credentials. Genesis Market was also a prolific initial access broker (IAB) in the cybercrime world, providing criminals a user-friendly database to search for stolen credentials so they could easily infiltrate a victim’s computer. As part of this operation, law enforcement seized 11 domain names used to support Genesis Market’s infrastructure pursuant to a warrant authorized by the U.S. District Court for the Eastern District of Wisconsin. A total of 22 international agencies and 44 FBI field offices assisted the FBI Milwaukee Field Office investigating the case. And on April 5, 2023, the U.S. Department of Treasury announced sanctions against Genesis Market.

In January 2024, the FBI announced an operation where the FBI and its partners identified hundreds of routers that had been taken over by the PRC-sponsored hacking group known as Volt Typhoon. The Volt Typhoon malware enabled China to hide, among other things, pre-operational reconnaissance and network exploitation against critical infrastructure like our communications, energy, transportation, and water sectors. The PRC took these steps to find and prepare to destroy or degrade the civilian critical infrastructure that keeps us safe and prosperous. To be extremely clear, cyber threats to our critical infrastructure represent real-world threats to our physical safety. Working with our partners, the FBI ran a court-authorized, on-network operation to shut down this Volt Typhoon botnet and the access it enabled.

This operation was an important step. But there’s a lot more to do. To quantify what we are up against, the PRC has a bigger hacking program than every other major nation combined. In fact, if each one of the FBI’s cyber agents and intelligence analysts focused exclusively on the PRC threat, the PRC’s hackers would still outnumber FBI cyber personnel at least 50 to 1. The appropriations this committee decides on this year will dictate what resources can apply to counter the growing PRC cyber threat, especially as 2027—the year that the Chinese Communist Party (CCP) has targeted for a potential invasion of Taiwan—approaches.

The FBI is doing everything in its power to combat these threats. In total, we took over 1,000 actions against cyber adversaries in 2023—to include arrests, criminal charges, convictions, dismantlements, and disruptions—and enabled many more actions through our dedicated partnerships with the private sector, foreign partners, and with federal, state, and local entities. We also provided thousands of individualized threat warnings and disseminated 78 public threat advisories by way of joint cybersecurity advisories, FBI Liaison Alert System (FLASH) reports, private industry notifications (PINs), and public service announcements (PSAs), many of which were jointly authored with other U.S. agencies and international partners.

Along with our partners in the interagency, the FBI has devoted significant energy and resources to partnerships with the private sector. We are working hard to push important threat information to network defenders, but we have also been making it as easy as possible for the private sector to share important information with us. For example, we are emphasizing to the private sector how we keep our presence unobtrusive in the wake of an incident, as well as how we protect identities and other information that the private sector shares with us. We are still committed to providing useful feedback and improving coordination with our government partners so that we are speaking with one voice. But we need the private sector to do its part, too. We need the private sector to come forward to warn us and our partners when they see malicious cyber activity. We also need the private sector to work with us when we warn them that they are being targeted. Significant cyber incidents—SolarWinds, Cyclops Blink, the Colonial Pipeline incident—only emphasize what we have been saying for a long time: the government cannot protect against cyber threats on its own. We need a fully resourced, whole-of-society approach that matches the scope of the danger. There is no other option for defending a country where nearly all of our critical infrastructure, personal data, intellectual property, and network infrastructure sits in private hands.

In summary, the FBI is engaged in myriad efforts to combat cyber threats, from improving threat identification and information sharing inside and outside of the government to developing and retaining new talent, to examining the way we operate to disrupt and defeat these threats. We take all potential threats to public and private sector systems seriously and will continue to investigate and hold accountable those who pose a threat in cyberspace. The FY2025 request includes an additional 12 positions (including 4 special agents and 8 professional staff) and $7.0 million to enhance cyber response capabilities.

Foreign Intelligence Threats

Nations such as the PRC, Russia, and Iran are becoming more aggressive and more capable than ever before. These nations seek to undermine our core democratic, economic, and scientific institutions, and they employ a growing range of tactics. Defending American institutions and values against these threats is a national security imperative and a priority for the FBI.

With that, the greatest long-term threat to our nation’s ideas, innovation, and economic security is from PRC foreign intelligence and economic espionage. By extension, it is also a threat to our national security. The PRC aspires to reshape the international rules-based system to its benefit, often with little regard for international norms and laws.

When it comes to economic espionage, the PRC uses every means at its disposal, blending cyber, human intelligence, diplomacy, corporate transactions, and other pressure on U.S. companies operating in the PRC to steal our companies’ innovations. These efforts are consistent with the PRC’s expressed goals to become an international power, modernize its military, and create innovation-driven economic growth.

To pursue this goal, the PRC uses human intelligence officers, co-optees, and corrupt corporate insiders, as well as sophisticated cyber intrusions, pressure on U.S. companies in China, shell-game corporate transactions, and joint-venture “partnerships” that are anything but a true partnership. There is nothing traditional about the scale of their theft. It is unprecedented. American workers and companies are facing a greater, more complex danger than they have dealt with before. Stolen innovation means stolen jobs, stolen opportunities for American workers, and stolen national power.

As the lead U.S. counterintelligence agency, the FBI is responsible for detecting and lawfully countering the actions of foreign intelligence services and organizations as they seek to adversely affect U.S. national interests. The FBI recognized the need to coordinate similar efforts across all agencies, and therefore established the National Counterintelligence Task Force (NCITF) in 2019 to create a whole-of-government approach to counterintelligence. The FBI established the national-level NCITF in the National Capital Region to coordinate, facilitate, and focus multi-agency counterintelligence operations and to programmatically support local counterintelligence task force (CITF) operations in each FBI field office. Combining the authorities and operational capabilities of the U.S. Intelligence Community; federal, state, and local law enforcement; and local CITFs, the NCITF coordinates and leads whole-of-government efforts to defeat hostile intelligence activities targeting the United States.

The Department of Defense (DoD) has been a key partner in the NCITF since its founding. While the FBI has had long-term collaborative relationships with DoD entities such as the Air Force Office of Special Investigations, Naval Criminal Investigative Service, and Army Counterintelligence, the NCITF has allowed us to enhance our collaboration with each other for greater impact. We plan to emphasize this whole-of-government approach moving forward as a powerful formula to mitigate the modern counterintelligence threat.

In recent years, we have seen a rise in efforts by authoritarian regimes to interfere with freedom of expression and punish dissidents, political opponents, and others abroad. These acts of repression cross national borders, often reaching into the United States. The governments of China, Russia, and Iran and their proxies stalk, intimidate, and harass expatriates or dissidents who speak against the regime from within the United States and elsewhere, as well as other individuals these governments view as threats to their regime.

Transnational repression can occur in different forms, including assault, kidnapping, and murder. Governments use transnational repression tactics to silence the voices of their own or former citizens, U.S. residents, and family members living abroad who are critical of their regimes. This sort of repressive behavior is antithetical to our values. People from all over the world are drawn to the United States by the promise of living in a free and open society that adheres to the rule of law. To ensure that this promise remains a reality, we must continue to use all of our tools to block authoritarian regimes that seek to extend their tactics of repression beyond their own shores.

In addition, our nation is confronting multifaceted foreign threats seeking both to influence our national policies and public opinion and to harm our national dialogue and debate. The FBI and our interagency partners remain focused on foreign malign influence operations, including subversive, undeclared, coercive, and criminal actions used by foreign governments in their attempts to sway U.S. citizens’ preferences and perspectives, shift U.S. policies, increase discord in the United States, and undermine the American people’s confidence in our democratic institutions and processes.

Foreign malign influence is not a new problem, but the interconnectedness of the modern world, combined with the anonymity of the internet, have changed the nature of the threat. The FBI is the lead federal agency responsible for investigating foreign malign influence threats. Several years ago, we established the Foreign Influence Task Force (FITF) to identify and counteract foreign malign influence operations targeting the United States. The FITF is led by our Counterintelligence Division and comprises agents, analysts, and professional staff from the Counterintelligence, Cyber, Counterterrorism, and Criminal Investigative Divisions. It is specifically charged with identifying and combating foreign malign influence operations targeting democratic institutions inside the United States.

The domestic counterintelligence environment is more complex than ever. We face a persistent and pervasive national security threat from foreign adversaries, particularly the governments of China, Russia, and Iran, who conduct sophisticated intelligence operations using coercion, subversion, malign influence, cyber and economic espionage, traditional spying, and non-traditional human intelligence collection. Together, they pose a continuous threat to U.S. national security and our economy by targeting strategic technologies, industries, sectors, and critical infrastructure. Historically, these asymmetric national security threats involved foreign intelligence service officers seeking U.S. government and U.S. intelligence community information. Now, however, the FBI has observed foreign adversaries employing a wider range of nontraditional collection techniques, including the use of human collectors not affiliated with intelligence services, foreign investment in critical U.S. sectors, and infiltration of U.S. supply chains. The FBI continues to adjust its counterintelligence priorities to address this evolution.

The FY2025 request includes an additional 44 positions (12 special agents, 18 intelligence analysts, and 14 professional staff) and $17.8 million to help combat the threats posed by foreign, and potentially hostile, intelligence services and other foreign government actors.

Criminal Threats

The United States faces many criminal threats, including financial and health care fraud, transnational and regional organized criminal enterprises, crimes against children and human trafficking, and public corruption. Criminal organizations—domestic and international—and individual criminal activity represent a significant threat to security and safety in communities across the nation.

A critical tool in protecting the nation from those who wish to do harm is the National Instant Criminal Background Check System, or NICS. The goal of NICS is to ensure that guns do not fall into the wrong hands and ensure the timely transfer of firearms to eligible gun buyers. Mandated by the Brady Handgun Violence Prevention Act of 1993 and launched by the FBI on November 30, 1998, NICS is used by federal firearms licensees (FFLs) to determine whether a prospective buyer is eligible to buy firearms. NICS receives information from tens of thousands of FFLs and checks to ensure that applicants do not have a criminal record and are not otherwise prohibited and therefore ineligible to purchase a firearm. In the first complete month of operation in 1998, a total of 892,840 firearm background checks were processed. By contrast, in 2023, approximately 2.4 million checks were processed per month, for a total of 29.9 million processed last year.

The Bipartisan Safer Communities Act (BSCA), signed into law in June 2022, requires enhanced NICS background checks for any person under the age of 21. These enhanced background checks are more labor-intensive but have prevented ineligible persons from acquiring firearms. As provisions from the BSCA continue to be implemented, the FBI expects the volume of NICS transactions to continue to grow. Ensuring the timely processing of these inquiries is important to ensure law abiding citizens can exercise their right to purchase a firearm and to protect communities from prohibited, and therefore ineligible, individuals attempting to acquire a firearm. To ensure the FBI maintains this capability, the FY2025 request includes an additional 27 positions (including 1 special agent and 26 professional staff) and $8.4 million.

Violent Crime

Violent crimes and gang activities exact a high toll on individuals and communities. Many of today’s gangs are sophisticated and are well organized. They use violence to control neighborhoods and boost their illegal money-making activities, which include robbery, drug, and gun trafficking; fraud; extortion; and prostitution rings. These gangs do not limit their illegal activities to single jurisdictions or communities. The FBI is able to work across such lines, which is vital to the fight against violent crime in big cities and small towns across the nation. Every day, FBI special agents work in partnership with federal, state, local, and tribal officers and deputies on joint task forces and individual investigations.

FBI joint task forces—Violent Crime Safe Streets, Violent Gang Safe Streets, and Safe Trails— identify and target major groups operating as criminal enterprises. Much of the FBI criminal intelligence is derived from our state, local, and tribal law enforcement partners, who know their communities inside and out. Joint task forces benefit from FBI surveillance assets, and our sources track these gangs to identify emerging trends. Through these multi-subject and multi-jurisdictional investigations, the FBI concentrates its efforts on high-level groups engaged in patterns of racketeering. This investigative model enables us to target senior gang leadership and to develop enterprise-based prosecutions.

By way of example, the FBI has dedicated tremendous resources to combat the threat of violence posed by MS-13. The atypical nature of this gang has required a multi-pronged approach—we work through our task forces here in the United States while simultaneously gathering intelligence from and aiding our international law enforcement partners. We do this through the FBI’s Transnational Anti-Gang Task Forces (TAGs). Established in El Salvador in 2007 through the FBI’s National Gang Task Force, Legal Attaché San Salvador, and the Department of State, each TAG is a fully operational unit responsible for the investigation of MS-13 operating in the northern triangle of Central America and threatening the United States. This program combines the expertise, resources, and jurisdiction of participating agencies involved in investigating and countering transnational criminal gang activity in the United States and Central America. There are now TAGs in El Salvador, Guatemala, and Honduras. Through these collaborating efforts, the FBI has achieved substantial success in countering the MS-13 threat.

We are committed to working with our federal, state, local, and tribal partners in a coordinated effort to reduce violent crime in the United States.

Transnational Organized Crime (TOC)

More than a decade ago, organized crime was characterized by hierarchical organizations—or families—that exerted influence over criminal activities in neighborhoods, cities, or states. But organized crime has changed dramatically. Today, international criminal enterprises run multi-national, multi-billion-dollar schemes from start to finish. Modern-day criminal enterprises are flat, fluid networks with global reach. While still engaged in many of the “traditional” organized crime activities such as loan-sharking, extortion, and murder, modern criminal enterprises are now also involved in trafficking counterfeit prescription drugs containing deadly fentanyl, conducting stock market fraud and manipulation, committing cyber-facilitated bank fraud and embezzlement, illicit drug trafficking, identity theft, human trafficking, money laundering, alien smuggling, engaging in public corruption, weapons trafficking, kidnapping, and other illegal activities. TOC networks exploit legitimate institutions for critical financial and business services that enable the storage or transfer of illicit proceeds. Preventing and combating transnational organized crime demands a concentrated effort by the FBI and federal, state, local, tribal, and international partners.

As part of our efforts to combat the TOC threat, the FBI is focused on the cartels trafficking dangerous narcotics, like fentanyl, across our borders. The FBI has over 350 cases linked to cartel leadership, and 88 of those are along the southern border. Additionally, the FBI actively participates in 17 Organized Crime Drug Enforcement Task Force (OCDETF) strike forces across the United States, investigating major drug trafficking, money laundering, and other high-priority TOC networks. On top of that, through our prescription drug initiative, we are pursuing healthcare fraud investigations against medical professionals and pill mills; through our Safe Streets Task Forces, investigating the gangs and criminal groups responsible for distributing dangerous substances like fentanyl; and through our Joint Criminal Opioid Darknet Enforcement team, disrupting and dismantling darknet marketplaces for prescription opioids and drugs like fentanyl.

While the FBI continues to share intelligence about criminal groups with our partners and combines resources and expertise to gain a full understanding of each group, the threat of transnational crime remains a significant and growing threat to national and international security with implications for public safety, public health, democratic institutions, and economic stability across the globe. TOC groups increasingly exploit jurisdictional boundaries to conduct their criminal activities overseas. Furthermore, they are expanding their use of the darknet to engage in illegal activity while exploiting emerging technology to traffic illicit drugs and contraband across international borders and into the United States.

Crimes Against Children and Human Trafficking

Every year, thousands of children become victims of crimes, whether it results from kidnappings, violent attacks, sexual abuse, human trafficking, or online predators. The FBI is uniquely positioned to provide a rapid, proactive, and comprehensive response. We help identify, locate, and recover child victims. Our strong relationships with federal, state, local, territorial, tribal, and international law enforcement partners also help to identify, prioritize, investigate, and deter individuals and criminal networks from exploiting children.

But the FBI’s ability to learn about and investigate child sexual exploitation is being threatened by the proliferation of sites on the darknet and end-to-end encryption. For example, currently, there are at least 30 child sexual abuse material (CSAM) sites operating openly and notoriously on the darknet. Some of these exploitative sites are exclusively dedicated to the sexual abuse of infants and toddlers. The sites often expand rapidly, with one site obtaining as many as 200,000 new members within its first few weeks of operation. End-to-end encrypted apps allow offenders to form groups of like-minded individuals to trade files of child sexual abuse material and trade tips for how to exploit children, all with no fear of detection.

Another growing area of concern involving the sexual exploitation of children and adults alike is the explosion in incidents of children, teens, and adults being coerced into sending explicit images online and being extorted for money. Known as financially motivated sextortion, between October 2021 and March 2023, law enforcement received over 13,000 reports of this type of crime—resulting in at least 12,600 victims here and abroad—and more than 20 suicides. A large percentage of these sextortion schemes originate outside the United States, primarily in West African countries such as Nigeria and Ivory Coast. The continued development of artificial intelligence (AI) has made this crime even easier to commit. Perhaps the most difficult part of a successful sextortion is convincing the child to initially share a sexually explicit depiction. Now, with AI, offenders can create the sexually explicit depiction from innocent images available on social media and then use that created image to extort the child into creating actual depictions or making a financial payment. The FBI continues to collaborate with other law enforcement partners and the National Center for Missing and Exploited Children to mitigate this criminal activity and provide the public with informational alerts and victim resources regarding these crimes.

The FBI has several programs in place to arrest child predators and to recover missing and endangered children. To this end, the FBI funds or participates in a variety of endeavors and constructs, including the Innocence Lost National Initiative, the Innocent Images National Initiative, Operation Cross Country, Child Abduction Rapid Deployment Team, Victim Services, over 80 Child Exploitation and Human Trafficking Task Forces, over 74 International Violent Crimes Against Children Task Force officers, and numerous community outreach programs to educate parents and children about safety measures they can follow. Through improved communications, the FBI collaborates with partners throughout the world quickly, playing an integral role in preventing crimes against children.

The Child Abduction Rapid Deployment Team is a rapid-response team with experienced investigators strategically located across the country to quickly respond to child abductions. Investigators provide a full array of investigative and technical resources during the most critical time following the abduction of a child, such as the collection and analysis of DNA, impression, and trace evidence, the processing of digital forensic evidence, and interviewing expertise.

The FBI also focuses efforts to stop human trafficking of both children and adults. The FBI works collaboratively with law enforcement partners to disrupt all forms of human trafficking through Human Trafficking Task Forces nationwide. One way the FBI combats this pernicious crime is through investigations such as Operation Cross Country. Over a two-week period in 2023, the FBI, along with other federal, state, local, and tribal partners, executed approximately 350 operations to recover survivors of human trafficking and disrupt traffickers. These operations identified and located 59 minor victims of child sex trafficking, child sexual exploitation, or related state offenses and located 59 actively missing children. Furthermore, the FBI and its partners located 141 adults who were identified as potential victims of sexual exploitation, human trafficking, or related state offenses. In addition to identifying and recovering missing children and potential victims, the law enforcement activity conducted during Operation Cross Country led to the identification or arrest of 126 suspects implicated in potential child sexual exploitation, human trafficking, or related state or federal offenses.

While many victims of human trafficking recovered by the FBI are adult U.S. citizens, foreign nationals, children, and other vulnerable populations are disproportionately harmed by both sex and labor trafficking. The FBI and its partners take a victim-centered, trauma-informed approach to investigating these cases and strive to ensure the needs of victims are fully addressed at all stages. To accomplish this, the FBI works in conjunction with other law enforcement agencies and victim specialists on the federal, state, local, and tribal levels, as well as with a variety of vetted non-governmental organizations. Even after the arrest and conviction of human traffickers, the FBI often continues to work with partner agencies and organizations to assist victims and survivors in moving beyond their exploitation.

Key Cross-Cutting Capabilities and Capacities

Operational Technologies

As criminal and terrorist threats become more diverse and dangerous, the role of technology becomes increasingly important to our efforts. We are using technology to improve the way we collect, analyze, and share information. We have seen significant improvement in capabilities and capacities over the past decade, but keeping pace with technology remains a key concern for the future.

The FBI Laboratory is one of the largest and most comprehensive forensic laboratories in the world. Operating out of a state-of-the-art facility in Quantico, Virginia, laboratory personnel travel the world on assignment, using science and technology to protect our nation and support law enforcement, intelligence, military, and forensic science partners. The Lab’s many services include providing expert testimony, mapping crime scenes, and conducting forensic exams of physical and hazardous evidence. Lab personnel possess expertise in many areas of forensics, supporting law enforcement and intelligence purposes—including explosives, trace evidence, documents, chemistry, cryptography, DNA, facial reconstruction, fingerprints, firearms, digital forensics, and WMDs.

One example of the Lab’s key services and programs is the Combined DNA Index System (CODIS), which allows 200 law enforcement laboratories throughout the United States to compare over 20 million DNA profiles. In the last 20 years, CODIS has aided over 675,000 investigations while maintaining its sterling reputation and the confidence of the American public.

Statutory requirements and recent regulatory changes have significantly expanded the DNA processing requirements of the FBI. For instance, enacted in 2005, the DNA Fingerprint Act (in 34 U.S.C. § 40702(a)(1)(A) and (B)) authorized the attorney general to collect DNA samples from individuals who are arrested, facing charges, or convicted, and from non-U.S. persons detained under U.S. authority. The law mandates federal DNA collection agencies submit their arrestee collections to the FBI Laboratory for analysis and entry into CODIS. In April 2020, the Department of Justice amended the DNA Fingerprint Act’s implementing rule that now precludes the Department of Homeland Security (DHS) from waiving DNA collections. As a result, during the past fiscal year, the FBI received an average of 118,000 DNA samples per month, which is more than triple the average monthly submission rate for FY2021 of 36,300 samples. This substantial increase has created massive budget and personnel shortfalls for the FBI. While the FBI has worked with DHS components to automate and streamline workflows, a backlog of over 1.4 million samples (as of February 2024) has developed, increasing the likelihood of arrestees and non-U.S. detainees being released before identification through investigative leads. The administration requested $204 million in its national security supplemental to address this backlog.

Investment in additional DNA expansion capabilities and technology is critical to maintaining and enhancing the FBI’s ability to address emerging threats and help mission critical information reach partners and investigators in an expeditious manner.

Conclusion

In conclusion, the threats we face as a nation have never been greater or more diverse, and the expectations placed on the FBI have never been higher. Our fellow citizens look to the FBI to protect the United States from all of those threats, and the men and women of the FBI continue to meet and exceed those expectations every day. I want to thank them for their dedicated service. I also want to pledge to this Committee to be good stewards of the resources provided.

Chairman Rogers, Ranking Member Cartwright, and members of the Subcommittee, thank you for the opportunity to testify today. I am happy to answer any questions you might have. 

Director Wray’s Remarks to the ABA Standing Committee on Law and National Security

Source: Federal Bureau of Investigation FBI Crime News

FISA Section 702

That brings me to what the FBI is doing to stay ahead of and strategically disrupt these threats.

Our focus is not only whether we’ve got the resources—the money and the right talent to deal with these threats to grow to meet the challenges of the next five, 10 years. But also whether we’ve got the necessary tools to combat our adversaries.

And one tool that’s indispensable to our efforts to combat threats posed by foreign adversaries, is one that will expire in just a couple of weeks if Congress does not act—and that’s our FISA Section 702 authorities.

702 allows us to stay a step ahead of foreign actors located outside the United States who pose a threat to national security. And the expiration of our 702 authorities would be devastating to the FBI’s ability to protect Americans from those foreign threats. 

We’re glad so many members of Congress support this critical tool, and our use of it, and recognize the value of 702 is undisputed. Whether it’s to protect our critical infrastructure, find victims and get them the help they need, or detect foreign terrorists overseas directing an operative here to carry out an attack in our own backyard.

And crucial to our ability to use 702 to protect Americans is our ability to review intelligence promptly and efficiently through queries. 

I’ve talked about how the PRC is pre-positioning on critical infrastructure across the United States. Just to pick an example: U.S.-person queries were key to discovering where Chinese hackers had successfully compromised network infrastructure at a transportation hub here in the United States, allowing us to alert the network operators so they could mitigate the intrusion.

Who knows how much damage those hackers could have caused—not just monetarily, but in the disruption and even the safety of Americans’ lives. Effective and prompt victim notifications like those hinge on our ability to conduct U.S.-person queries of our existing 702 collection.

In just one recent cyber case, for instance, 702 allowed the FBI to alert more than 300 victims in every state and countries around the world—many of those notifications made possible because of U.S.-person queries. And U.S.-person queries, in particular, may provide the critical link that allows us to identify an intended target or build out the network of attackers, so we can stop them before they strike.

And just like in cyber, U.S.-person queries continue to be key to identifying terrorists in the homeland, helping us find out who they’re working with and what they’re targeting—the intelligence we may need to stop them before they kill Americans. So, while it is imperative that we ensure this critical authority does not lapse, we also must not undercut the effectiveness of this essential tool with a warrant requirement or some similar restriction paralyzing our ability to tackle fast-moving threats.

Now, contrary to what a lot of folks are saying about the constitutionality and legality of U.S.-person queries, the law and the Fourth Amendment simply do not require a warrant in order for the FBI to query 702 data.

You don’t have to take my word for it. Multiple federal district courts and appellate courts have considered the issue, and no court has ever held that a warrant is required for the FBI to conduct U.S.-person queries—to blind ourselves from information already lawfully in our holdings. And when the Foreign Intelligence Surveillance Court renews the 702 program every year, not once has it found that the law requires a warrant to conduct U.S.-person queries.

And if the appetite for a warrant is borne out of compliance concerns, I can wholeheartedly say that there are plenty of ways to ensure compliance without paralyzing us and our ability to move fast. We’ve proven that. I’ve been unequivocal that the compliance incidents we’ve had in the past are unacceptable. And in response, we’ve undertaken a whole host of reforms to ensure that we’re good stewards of this authority.

Now, if you look at compliance reviews conducted by the Foreign Intelligence Surveillance Court and the Department of Justice on queries that were run after we put in place our reforms—let me say that again—the compliance reviews conducted on queries that were run after our reforms, both the FISC and DOJ have recognized that our reforms have resulted in substantial compliance improvements, hitting compliance rates well into the high 90% range.

And we’re going to keep looking for ways to push that number even higher. So, if there’s no constitutional, legal, or compliance necessity for a warrant requirement, then Congress would be making a policy choice to require us to blind ourselves to intelligence in our holdings. And if that’s the path that’s chosen, I can tell you that it will have real-world consequences on our ability to disrupt the threats I outlined—on our ability to protect the American people.

Take for example a foreign terrorist organization—ISIS or al-Qaida—legally or illegally sending an operative into the U.S. to conduct an attack. U.S.-person queries on the foreign terrorist’s communications are how we’re able to potentially learn the extent of what they’re planning and how imminent it may be.

Requiring a warrant for U.S.-person queries—which are typically conducted in the nascency of an investigation; when we usually cannot establish probable cause or demonstrate exigency; where time is of the essence to get ahead of the bad guys—would be a deliberate and shortsighted choice to blind us to the threat of a foreign terrorist in the U.S. planning and even executing an attack.

The consequences of tying our hands are not merely hypothetical. Just last year, we discovered that a foreign terrorist had communicated with a person we believed to be in the United States. Only by querying that U.S. person’s identifiers in our 702 collection did we find important intelligence on the seriousness and urgency of the threat. And less than a month after that initial query, we disrupted that U.S. person who, it turned out, had researched and identified critical infrastructure sites in the U.S. and had acquired the means to conduct an attack.

If we had to obtain a warrant to conduct that initial query, based on what we knew at that time, there is no way we could’ve met a probable cause standard or even an exigency exception. And if we hadn’t done that query, we would’ve lost valuable time we needed to get ahead of the potential attack.

Bottom line, a warrant requirement would be the equivalent of rebuilding the pre-9/11 intelligence “wall.” I saw the consequences of that policy choice 22 years ago. I’ve spoken with families of victims of that horrific attack. And now two decades later, I can assure you that none of our adversaries are holding back or tying their own hands—whether to attack us, steal from us, to put American national security, our economic security, and American lives at risk.

So we need lawyers—folks like you who are committed to educating the bar and the public on the rule of law and our national security to explain what’s law and what’s policy, what a warrant is and what it isn’t, and to help illuminate the consequences of purposefully choosing to limit the American Intelligence Community from accessing key and timely information about our foreign adversaries.

Because we’re in crunch time when it comes to reauthorizing this vital authority. And as the threats to our homeland continue to evolve, the agility and effectiveness of 702 will be essential to the FBI’s ability—and really our mandate from the American people—to keep them safe for years to come.

And we owe it to them to make sure we’ve got the tools we need to do that.

Thank you for having me, and I look forward to your questions.

Resources:

Director Wray’s Opening Statement to the House Appropriations Committee

Source: Federal Bureau of Investigation FBI Crime News

As prepared for delivery.

Good afternoon, Chairman Rogers, Ranking Member Cartwright, and Members of the Committee.

I’m proud to be here today representing the 38,000 men and women who make up the FBI. Every day, our people are working relentlessly to outpace our adversaries and stay ahead of complex and evolving threats. So I’d first like to thank you for your support over the years of our efforts to achieve our mission of protecting the American people and upholding the Constitution.

At the same time, I also realize the reality of the environment we’re in today, where so many agencies are dealing with tightening budgets—and this year, the FBI is one of those agencies. With our fiscal year 2024 budget having now come in almost $500 million dollars below what the FBI needs just to sustain our 2023 efforts.

Candidly, this could not come at a worse time.

When I sat here last year, I walked through how we were already in a heightened threat environment.

Since then, we’ve seen the threat from foreign terrorists rise to a whole ‘nother level after October 7; we continue to see the cartels push fentanyl and other dangerous drugs into every corner of the country, claiming countless American lives; we’ve seen a spate of ransomware and other cyberattacks impacting parts of our critical infrastructure and businesses large and small; violent crime, which reached alarming levels coming out of the pandemic, remains far too high and is impacting far too many communities; China continues its relentless efforts to steal our intellectual property and most valuable information.

And that’s just scratching the surface.

Looking back over my career in law enforcement, I’d be hard pressed to think of a time where so many threats to our public safety and national security were so elevated all at once. But that is the case as I sit here today.

And while we’ve always found ways at the FBI to innovate and make the most with what we have, this is by no means a time to let up or dial back. This is a time when we need your support the most—we need all the tools, all the people, and all the resources required to tackle these threats and to keep Americans safe. To take each of those in turn—the tools, the people, and the resources.

First—an absolutely indispensable tool Congress can give us in our fight against foreign adversaries is the reauthorization of Section 702 of the Foreign Intelligence Surveillance Act. It’s critical in securing our nation, and we’re in crunch time with our 702 authority set to expire next week. So, let me be clear: failure to reauthorize 702—or gutting it with some kind of new warrant requirement—would be dangerous and put American lives at risk.

Second—we need people. I’ll stack the FBI’s workforce up against anyone, anywhere, at any time. They’re innovative, they’re efficient, they’re relentless—and they’re patriots. And we’ve been fortunate at the FBI in recent years that our recruiting has gone through the roof. Americans are applying in droves to devote their lives to a career with us protecting others. But we need more positions to be able to bring all the good people we can to the fight—certainly not fewer. Now is not the time to cut back; it’s time to lean forward. 

Third—we need resources, which you’ll see in the 2025 budget request we’re here today to discuss. We need funding to protect America from terrorism—I touched on this earlier, but there was already a heightened risk of violence in the United States before October 7. Since then, we’ve seen a rogue’s gallery of foreign terrorist organizations call for attacks against Americans and our allies. Given those calls for action, our most immediate concern has been that individuals or small groups will draw twisted inspiration from the events in the Middle East to carry out attacks here at home.

But now increasingly concerning is the potential for a coordinated attack here in the homeland, akin to the ISIS-K attack we saw at the Russia Concert Hall a couple weeks ago.

We also need funding to counter the threat from the People’s Republic of China—a government sparing no expense in its quest to hack, lie, cheat, and steal its way to the top as a global superpower and to undermine our democracy and our economic success.

We need funding to counter cyber threats—certainly those from China, but also from a crowded field of sophisticated criminals and other hostile nation-states like Russia, Iran, and North Korea.

We need funding to mitigate the range of threats emanating from the border—fentanyl, gangs like MS-13, and human trafficking.

We need funding to address the violent crime that remains at levels in this country that are still too high.

And we need funding to keep going after child predators and to rescue young victims from their tormentors.

In all these areas I just mentioned, we’re working closely with our partners at all levels of government to achieve our shared goals of keeping our communities safe.

Every day, FBI agents, analysts, and professional staff are working shoulder to shoulder with thousands of task force officers from hundreds of different police departments and sheriffs’ offices all over the country on our FBI-led task forces. On top of that, we provide technology and expertise, valuable investigative leads like DNA matches, and cutting-edge training to law enforcement nationwide to help them protect Americans from harm.

So cuts to us are cuts to our partners—state and local law enforcement agencies and officers who are on the ground, putting themselves in the line of fire—often quite literally. And that’s just one way those cuts are going to have real impacts on the American people.

Yes, we took a hit in the 2024 budget. But the 2025 budget is a chance to get back on track to provide the FBI’s men and women the tools and resources the American people need us to have to keep them safe.

Thank you again for having me here today, and I look forward to our discussion.

Director Wray’s Remarks at the ABA Standing Committee on Law and National Security

Source: Federal Bureau of Investigation FBI Crime News

FISA Section 702

That brings me to what the FBI is doing to stay ahead of and strategically disrupt these threats.

Our focus is not only whether we’ve got the resources—the money and the right talent to deal with these threats to grow to meet the challenges of the next 5, 10 years. But also whether we’ve got the necessary tools to combat our adversaries.

And one tool that’s indispensable to our efforts to combat threats posed by foreign adversaries, is one that will expire in just a couple of weeks if Congress does not act—and that’s our FISA Section 702 authorities.

702 allows us to stay a step ahead of foreign actors located outside the United States who pose a threat to national security. And the expiration of our 702 authorities would be devastating to the FBI’s ability to protect Americans from those foreign threats. 

We’re glad so many members of Congress support this critical tool, and our use of it, and recognize the value of 702 is undisputed. Whether it’s to protect our critical infrastructure, find victims and get them the help they need, or detect foreign terrorists overseas directing an operative here to carry out an attack in our own backyard.

And crucial to our ability to use 702 to protect Americans is our ability to review intelligence promptly and efficiently through queries. 

I’ve talked about how the PRC is pre-positioning on critical infrastructure across the United States. Just to pick an example: U.S.-person queries were key to discovering where Chinese hackers had successfully compromised network infrastructure at a transportation hub here in the United States, allowing us to alert the network operators so they could mitigate the intrusion.

Who knows how much damage those hackers could have caused—not just monetarily, but in the disruption and even the safety of Americans’ lives. Effective and prompt victim notifications like those hinge on our ability to conduct U.S.-person queries of our existing 702 collection.

In just one recent cyber case, for instance, 702 allowed the FBI to alert more than 300 victims in every state and countries around the world—many of those notifications made possible because of U.S.-person queries. And U.S.-person queries, in particular, may provide the critical link that allows us to identify an intended target or build out the network of attackers, so we can stop them before they strike.

And just like in cyber, U.S.-person queries continue to be key to identifying terrorists in the homeland, helping us find out who they’re working with and what they’re targeting—the intelligence we may need to stop them before they kill Americans. So, while it is imperative that we ensure this critical authority does not lapse, we also must not undercut the effectiveness of this essential tool with a warrant requirement or some similar restriction paralyzing our ability to tackle fast-moving threats.

Now, contrary to what a lot of folks are saying about the constitutionality and legality of U.S.-person queries, the law and the Fourth Amendment simply do not require a warrant in order for the FBI to query 702 data.

You don’t have to take my word for it. Multiple federal district courts and appellate courts have considered the issue, and no court has ever held that a warrant is required for the FBI to conduct U.S.-person queries—to blind ourselves from information already lawfully in our holdings. And when the Foreign Intelligence Surveillance Court renews the 702 program every year, not once has it found that the law requires a warrant to conduct U.S.-person queries.

And if the appetite for a warrant is borne out of compliance concerns, I can whole-heartedly say that there are plenty of ways to ensure compliance without paralyzing us and our ability to move fast. We’ve proven that I’ve been unequivocal that the compliance incidents we’ve had in the past are unacceptable. And in response, we’ve undertaken a whole host of reforms to ensure that we’re good stewards of this authority.

Now, if you look at compliance reviews conducted by the Foreign Intelligence Surveillance Court and the Department of Justice on queries that were run after we put in place our reforms—let me say that again—the compliance reviews conducted on queries that were run after our reforms, both the FISC and DOJ have recognized that our reforms have resulted in substantial compliance improvements, hitting compliance rates well into the high 90% range.

And we’re going to keep looking for ways to push that number even higher. So, if there’s no constitutional, legal, or compliance necessity for a warrant requirement, then Congress would be making a policy choice to require us to blind ourselves to intelligence in our holdings. And if that’s the path that’s chosen, I can tell you that it will have real-world consequences on our ability to disrupt the threats I outlined—on our ability to protect the American people.

Take for example a foreign terrorist organization—ISIS or Al-Qa’ida—legally or illegally sending an operative into the U.S. to conduct an attack. U.S.-person queries on the foreign terrorist’s communications are how we’re able to potentially learn the extent of what they’re planning and how imminent it may be.

Requiring a warrant for U.S.-person queries—which are typically conducted in the nascency of an investigation; when we usually cannot establish probable cause or demonstrate exigency; where time is of the essence to get ahead of the bad guys—would be a deliberate and shortsighted choice to blind us to the threat of a foreign terrorist in the U.S. planning and even executing an attack.

The consequences of tying our hands are not merely hypothetical. Just last year, we discovered that a foreign terrorist had communicated with a person we believed to be in the United States. Only by querying that U.S. person’s identifiers in our 702 collection did we find important intelligence on the seriousness and urgency of the threat. And less than a month after that initial query, we disrupted that U.S. person who, it turned out, had researched and identified critical infrastructure sites in the U.S. and had acquired the means to conduct an attack.

If we had to obtain a warrant to conduct that initial query, based on what we knew at that time, there is no way we could’ve met a probable cause standard or even an exigency exception. And if we hadn’t done that query, we would’ve lost valuable time we needed to get ahead of the potential attack.

Bottom line, a warrant requirement would be the equivalent of rebuilding the pre-9/11 intelligence “wall.” I saw the consequences of that policy choice 22 years ago. I’ve spoken with families of victims of that horrific attack. And now two decades later, I can assure you that none of our adversaries are holding back or tying their own hands—whether to attack us, steal from us, to put American national security, our economic security, and American lives at risk.

So we need lawyers—folks like you who are committed to educating the bar and the public on the rule of law and our national security to explain what’s law and what’s policy, what a warrant is and what it isn’t, and to help illuminate the consequences of purposefully choosing to limit the American intelligence community from accessing key and timely information about our foreign adversaries.

Because we’re in crunch time when it comes to reauthorizing this vital authority. And as the threats to our homeland continue to evolve, the agility and effectiveness of 702 will be essential to the FBI’s ability—and really our mandate from the American people—to keep them safe for years to come.

And we owe it to them to make sure we’ve got the tools we need to do that.

Thank you for having me, and I look forward to your questions.

Director Wray’s Remarks at the FBI and University of Kansas Cybersecurity Conference

Source: Federal Bureau of Investigation FBI Crime News

Cyber Threat Overview 

I think everyone in this room has a pretty good sense of how complex, persistent, and severe today’s cyber threats have become. They’re more pervasive, hit a wider array of victims, and carry the potential for greater damage than ever before.

Today, we’re investigating more than 100 different ransomware variants, each with scores of victims. Cybercriminals are using ransomware to wreak havoc on business operations, cause devastating financial losses, and target our critical infrastructure. Everything from food distributors to 9-1-1 call centers, police departments and schools to hospitals—something I know two of our special agents, Kyle Neuberger and Dylan Meadows, will discuss in more detail this afternoon.

At the same time, we’re dealing with a host of unique threats from nation-states aimed at disrupting our democratic society. Now more than ever, foreign adversaries like the governments of China, Russia, Iran, and North Korea are using cyber operations to undermine us and achieve their strategic objectives.

They’re growing stealthier—for example, “living off the land” by corrupting native software tools that already exist on victims’ computers (and, thus, don’t raise alarms when they’re in use) rather than uploading big chunks of malicious, and suspicious, code to their victims’ networks. They’re constantly developing new ways to get the most reach and impact out of their operations.

And, on top of all that, it’s getting more and more difficult to discern where cybercriminal activity ends and adversarial nation-state activity begins, as the line between the two grows increasingly blurred.

These days, we see foreign intelligence officers who are moonlighting—making money on the side, through cybercrime—as well as hackers who are profit-minded criminals by day and state-sponsored by night—effectively cyber mercenaries.

What Success Looks Like  

So the threat environment is pretty daunting, but the good news is that at the FBI, we’ve learned, and shown, what success looks like.

The Bureau has been focused on what I consider one of our most valuable tools, and the core of the cyber strategy we rolled out not long ago: leading joint, sequenced operations, executed with our partners and designed to maximize impact on our adversaries.

I’m talking about things like Operation Medusa, where we targeted Snake—the Russian FSB’s [Federal Security Service’s] most sophisticated malware—and, by using technical means our folks developed, forced it to effectively cannibalize itself. You’ll hear more about that operation from Supervisory Special Agent Joe Lawlor later this morning, but the end result is that, with Medusa, we took down Snake in over 50 countries with the help of our U.S. partners and those from more than half a dozen other nations.

Or another example: the year-and-a-half-long campaign we waged, with our European partners, to hack the hackers of Hive, a ransomware group targeting hospitals, schools, and emergency services. We lawfully compromised their command and control network and used what we learned to seize and shut down their servers and websites, and to build a decryption capability we shared with victims that saved them from tens of millions in ransom payments.

Or how about the joint, sequenced operation that dismantled Genesis Market, where—working with our law enforcement counterparts in a dozen nations—we accomplished our biggest takedown ever of criminals dealing in stolen digital credentials?

In January, there was Operation Dying Ember. For that one, we worked with our U.S. and—again—worldwide law enforcement partners. We ran a court-authorized technical operation to kick the Russian GRU [military intelligence] off well over 1,000 home and small business routers and lock the door behind them. That killed the GRU’s access to a botnet it was piggybacking to run cyber operations against countries around the world—including America and our allies in Europe.

And, in February, we announced the disruption of LockBit, one of the world’s most active ransomware groups. LockBit has targeted thousands of victims across all sectors and collected millions of dollars in ransom payments. But another joint, sequenced operation—this one among 10 countries—disrupted LockBit’s front- and back-end infrastructure in the U.S. and abroad. As part of that technical operation, the FBI seized four servers here in the U.S., and our investigation led to federal charges for five LockBit affiliates.

And that’s without getting into all of our work against Beijing—including a steady stream of operations against their military and intelligence services. As you’d expect, given that China wields a bigger hacking program than those of every major nation combined, we’re confronting them across the country and around the world, literally every day.

We’re developing all these operations based on decades of experience battling nation-state and criminal threats across high- and low-tech domains, now applied in a world where we’re running court-authorized, on-network technical operations at the cutting edge of cyber.

Take cybercriminals. We know, and we go after, everything that makes criminal organizations tick, going after their people—a term we define broadly, to include not just ransomware administrators and affiliates, but also the facilitators they depend on, like bulletproof hosters and money launderers; going after their infrastructure—like their servers and botnets; and going after their money—the cryptocurrency wallets they use to stash their ill-gotten gains, hire associates, and lease infrastructure.

We use a wealth of hard-earned experience to design operations to hit them everywhere it hurts and put them down, hard.

Who Gets the Job Done 

Most of our work on those joint, sequenced operations takes place in our 56 field offices all across the country. 

And to make sure we’re getting the job done, we’ve put in place what we call the Model Cyber Squad Initiative: bringing together in every field office a team of about a dozen people, special agents and intelligence analysts, as well as computer scientists, data analysts, and other technically skilled personnel. In other words, the perfect blend of investigative, technical, and analytical know-how to both identify cyber threats and take them down.

Thanks in significant part to the committed support of Sen. Moran, we’ve been working hard to stack our offices nationwide with key cyber skills and abilities.

We’re aiming to have at least one Model Cyber Squad in every FBI field office. With that, we can remain focused both on responding to cyber incidents and helping victims and on staying ahead of even the most dangerous foreign adversaries and the most damaging cyber threats.

To do all that, we need even more smart, driven, talented people in the field to do the work—people with the technical skills to keep our cyber workforce world-class.

So, while I’m here at KU, among some of our nation’s best and brightest students about to enter the workforce, here’s a plug: We need more people like you.

We need more people to be one of that elite team determining who’s responsible for cyberattacks; planning and running those joint, sequenced operations to knock our adversaries back; working with victims; and often doing all those things in the same day.

We need talented people on our rapid-response Cyber Action Team—deploying across the country often within hours to respond to major incidents—and working with international partners in our legal attaché offices overseas, seeking justice for victims of cyberattacks.

A job with the FBI could take you anywhere, from New York to New Delhi—or it might even land you right here, in Kansas.

In fact, just yesterday, I cut the ribbon on our brand-new Kansas City Field Office, and I can assure you it’s absolutely state-of-the-art. And it needs to be, too.

In a city as connected as Kansas City—and in offices across the country and around the world—the FBI needs people who want the opportunity to do some really amazing cyber work in support of an incredibly important mission.

Conclusion 

For years, the Bureau has been laser-focused on hitting as many adversaries as we can and on getting the most bang for our buck out of every operation.

But with the cyber threat growing increasingly severe and complex, we’ve got both the room, and the need, to grow.

So I hope some of you will apply to join us. 

There’s no better way to serve a mission you’re proud of, while doing work that’s the envy of your friends slogging it out elsewhere.

The FBI doesn’t do easy. We focus on what’s hard, what no one else can do—measured both in our own work and in the adversaries we go up against: the most dangerous intelligence services and criminals in the world.

I look forward to continuing this discussion with you this morning.

Thanks again for having me.

Director Wray’s Remarks at the FBI Kansas City Field Office Ribbon Cutting Ceremony

Source: Federal Bureau of Investigation FBI Crime News

Thank you, Steve, and good morning, everyone.

I’m thrilled to be here to celebrate this new chapter for FBI Kansas City. Today is a big day—not just for this field office, but for the entire FBI and for the communities we serve here—because today, as we officially open the doors of this new facility, we renew our commitment to the people of Kansas and Western Missouri: that the FBI here is working hard for you to support your communities and keep you safe.

Honoring Division History 

We’ve been doing that a long time in our Kansas City office.

Our people here have fought for Kansans and Missourians (and even Nebraskans and Iowans for a time) since the earliest days of the Bureau.

In 1920, we designated our office in Kansas City as one of the original nine “divisional headquarters”—overseeing all the FBI field offices in this region. And since those early days, the dedicated people of the Kansas City Division has chased bank robbers and searched for fugitives—including helping pursue notorious “public enemies” like Bonnie and Clyde.

They’ve fought the illegal drug trade, violent gangs, and public corruption. They’ve tackled international and domestic terrorism, child exploitation, and foreign espionage. And they’ve pursued justice for victims of hate crimes, fraud, and violent crime.

In the more than 100 years the FBI has maintained an office in Kansas City, our agents, analysts, and professional staff here have tackled all these threats—largely behind the scenes.

But this morning, I want to share with you some recent examples of their successes that I think deserve mention, because we’ve seen FBI Kansas City’s work have an incredible impact on the communities it serves.

Thanks to excellent investigative work: 

  • In December, a smuggler pled guilty for his role in a years-long scheme selling and exporting sophisticated U.S. avionics equipment to Russia, following its unprovoked invasion of Ukraine.
  • Also in December, a man was federally indicted with a racially motived hate crime for viciously attacking and killing an African American man with a knife. 
  • And in the last few weeks, a fourteenth individual has agreed to plead guilty as a participant in a conspiracy to distribute fentanyl, marking the conclusion to Kansas City’s years-long effort to bring to justice those responsible the overdose deaths of at least seven victims.

Those are just a few of the many ways the people of this field office work hard every day to protect neighborhoods from harm and seek justice for victims.

Beyond the division’s investigative successes, I also want to highlight the pivotal role our Kansas City office has played in shaping the FBI’s history.

In the 1930s, following a brazen attack that came to be known as the “Kansas City Massacre”—which took the lives of four law enforcement officers, including our own Special Agent Raymond Caffrey—our FBI special agents were finally permitted to carry firearms.

Of course, we can’t talk about the history of the Kansas City Division without mentioning former Special Agent in Charge Clarence Kelley.

In the 1970s, when Kelley was the Kansas City police chief, he was sworn in as the FBI Director, succeeding J. Edgar Hoover. At a time of relentless and deserved scrutiny for the FBI, Kelley spearheaded efforts to shift Bureau priorities towards running quality investigations and protecting American civil liberties. We honor his contributions today by commemorating this building in Director Kelley’s name.

In the 1980s, Kansas City produced the FBI’s first deputy director, when another SAC [special agent in charge] from here, Floyd Clark, was designated by fellow Kansan and then-Director William Sessions.

And in 1996, when we broke ground on the former field office building here, the FBI was still reeling from the Oklahoma City bombing a year earlier. Kansas City’s was the first FBI facility built in compliance with the new safety regulations put in place for federal buildings. Our standards have evolved quite a bit since then, and this new field office is absolutely state-of-the-art when it comes to safety, security, and technology. We built it to protect our people and our information, and to last for decades to come.

Building: A New Future 

The commemoration of this building marks an exciting milestone for the future of the FBI’s work in this community, while also honoring the rich history cemented into its foundation.

The facility was designed to pay tribute to the people at the heart of Kansas City’s work.

Not only is the building commemorated in honor of Director Kelley, but its five main conference rooms are each dedicated to a member of the FBI’s Kansas City family lost in the line of duty, many of whom have family members here with us today as our honored guests. 

Keeping our people front and center, this new facility was built to serve as a hub—one capable of hosting all the members of our workforce, together. That includes space for our folks from our squads in FBI satellite offices who regularly travel to Kansas City. We have employees working across state lines, from the plains of Kansas to the western two-thirds of Missouri. So today, I’m proud that we’re officially opening this larger, modernized space with plenty of room not only for our own folks, but also for our task force officers and other state and local partners to work shoulder-to-shoulder with their Bureau counterparts.

All of the important work they’re doing needed a base of operations to support it—under one roof.

It’s what the brave and dedicated people of FBI Kansas City deserved, and today, we’ve delivered.

It’s especially impressive that we’re doing this ribbon cutting today, given that we broke ground at this site just shy of two years ago.

On behalf of the entire FBI, I’d like to recognize some of the many people who guided this project to its successful completion: 

  • We’re grateful to Mayor Lucas and the town of Kansas City, Missouri, for continuing to welcome our centralized presence here and opening up so many ways for us to serve our communities more effectively.
  • I’d like to recognize Rep. Emanuel Cleaver and his colleagues in Congress for their support of the funding for this new facility. 
  • I also want to thank David Rumsey, Joe Schurle, and Steve Stanberry from the General Services Administration for their partnership.
  • A special welcome to U.S. Federal Properties, the developer on this project, and a big “thank you” to all of the hardworking men and women who built this facility from the ground up.
  • My thanks to Nick Dimos, the head of our Finance and Facilities Division, and his entire team—especially Project Manager Robert Manns, 
    Project Architect Alyssa McCarthy, and Mechanical Engineer Juan Di Donna Perea, who are all here with us today.
  • And, of course, last—but certainly not least—I want to thank SAC Steve Cyrus and the entire FBI Kansas City workforce for their support. To everyone whose hard work and dedication made this building a reality: Thank you. I know this project took a lot of time, effort, and resources, so whether you were involved in coordinating or planning the move, or helping out as security escorts for contractors, or doing countless other necessary tasks, thank you all for your patience and your professionalism.

Partnerships 

None of the work we’re doing here in Kansas City would be possible without the trust and dedication of our partners.

Some of them are here today, so I’d like to extend a warm welcome to our community, private sector, and law enforcement partners. Thank you all for being here. Your presence and your partnership mean a lot to us.

I’m especially grateful to the agencies that have sent their agents, officers, and deputies to work on our FBI task forces. More than half of them are with us full-time, and I know it’s not easy to entrust your personnel to us like that, especially at a time when we’re all in need of additional resources. It’s a testament to the close and fruitful partnerships we’ve built, and to the trust we share, and I can promise you that none of us takes that trust lightly.

And, as our folks enjoy the extra elbow room and modern technology that this new space affords, I encourage all of us to think about two things: 

  1. How can we even better meet the mission of protecting the American people and upholding the Constitution; and
  2. How can we be even better partners to our colleagues at other agencies whose expertise and skills we depend on every day? 

So while today marks a new chapter for the Kansas City Field Office and for the communities we serve, it’s also a step forward for our partnerships. And together, we’ll continue to stop violence, make neighborhoods safer, and pursue justice. 

Conclusion 

For more than 100 years, the Kansas City Field Office has been committed to protecting local communities—and people all over this country—and the world from crime and national security threats.

Today, that work continues in a new facility, with a new foundation to bolster this important work and new tools to make us more effective.

And I’m honored to stand here and open this exciting chapter for FBI Kansas City.

Thanks again, and congratulations on this new beginning.

Four Men Sentenced for $18 Million Global Investment Fraud Scheme

Source: Federal Bureau of Investigation FBI Crime News

Four men were sentenced last week for participating in an eight-year investment fraud and money laundering scheme that defrauded over a dozen victims around the world out of more than $18 million.

John C. Nock, 55, of Fayetteville, Arkansas, founder of The Brittingham Group, was sentenced on March 14 to 20 years and 10 months in prison; Brian Brittsan, 67, of Boise, Idaho, was sentenced on March 14 to 10 years in prison; Kevin Griffith, 68, of Orem, Utah, was sentenced on March 15 to 12 years and six months in prison; and Alexander Ituma, 57, of Lehi, Utah, was sentenced on March 15 to eight years and four months in prison. 

“For nearly a decade, the defendants brazenly and repeatedly lied to investors, defrauding them out of more than $18 million and laundering the proceeds of their crime through a complex web of bank accounts around the world,” said Principal Deputy Assistant Attorney General Nicole M. Argentieri, head of the Justice Department’s Criminal Division. “The defendants have now been held to account for their crimes. The sentences imposed last week reflect the Justice Department’s commitment to rooting out investment fraud and protecting Americans’ financial security.”

According to court documents and the evidence presented at trial, between at least 2013 and 2021, Nock, Brittsan, Griffith, and Ituma conspired to engage in an investment fraud scheme through The Brittingham Group, a purported investment firm that claimed to have access to exclusive investment opportunities, including deals involving the monetization of foreign bank guarantees. Together, the four defendants falsely represented the nature of their investment offerings and made guarantees to victims regarding the safety and security of their funds. The defendants also promised victims outsized returns, to be paid in a short period of time, which the defendants could not and did not ever produce. To promote and conceal the conspiracy, Nock and Brittsan directed victims to send their money to bank accounts that Griffith, Ituma, and other co-conspirators controlled, and created fake documents to send to victims to make the investment appear legitimate and to be progressing. Once the money was in the hands of the co-conspirators, the defendants transferred victim money through a complex web of worldwide bank accounts. 

“For years, the defendants’ blatant and egregious investment fraud scheme used false promises to bilk investors out of millions of dollars of their hard-earned money,” said Special Agent in Charge Christopher J. Altemus Jr. of the IRS Criminal Investigation (IRS-CI) Dallas Field Office. “IRS-CI is proud of their joint efforts with the Justice Department and the FBI to hold Nock, Brittsan, Griffith, and Ituma accountable for their greed. The women and men of IRS-CI will continue to band together with their law enforcement partners to pursue those who commit financial crimes and steal from trusting individuals.”

“The victims in this case were promised lucrative investment opportunities, but what they got was a conspiracy of lies and fraud,” said Assistant Director Michael D. Nordwall of the FBI’s Criminal Investigative Division. “These defendants stole more than $18 million from over a dozen victims through a years-long fraud scheme, and the sentences they received last week will help hold them accountable for their crimes.”  

In August 2023, the defendants were convicted of conspiracy to commit wire fraud, multiple counts of wire fraud, and conspiracy to commit money laundering. Nock was also convicted of money laundering for using victim funds to pay a prior debt unrelated to The Brittingham Group.

IRS-CI and the FBI investigated the case. The U.S. Attorney’s Office for the Western District of Arkansas provided invaluable assistance.

Trial Attorneys Philip Trout, Vasanth Sridharan, and Sara A. Hallmark of the Criminal Division’s Fraud Section prosecuted the case.

Examining the Current Status of Iran’s Axis of Resistance and the Implications for Homeland Security and U.S. Interests

Source: Federal Bureau of Investigation FBI Crime News

Statement for the Record

Good morning Chairman Green, Ranking Member Thompson, and distinguished members of the committee. My name is Robert Wells and I am the assistant director for the FBI’s Counterterrorism Division. I am honored to be here representing the FBI’s counterterrorism personnel who tackle some of the most complex terrorism threats here in the United States and throughout the world.

Thank you for inviting me to join you this morning. I appreciate the opportunity to speak with you about our current threat environment, specifically as it relates to Iran and its proxies.

Terrorism Threat Assessment

As I’m sure you’ve heard from [FBI] Director [Christopher] Wray, we are currently in a heightened terrorism threat environment. Since the Hamas attack against Israel, we’ve seen almost every major terrorist organization in the world, including al Qaeda, AQAP [al Qaeda in the Arabian Peninsula] and ISIS, call for terrorist attacks against the United States. We’ve also seen an uptick in threats against the Jewish community here in the U.S. and abroad. We remain concerned about threats from lone actors or small cells radicalized to violence online. In addition, we are very focused on the threat posed by the more traditional foreign terrorist organizations and the state-sponsored terrorism threat from Iran.

Iran Threat Overview

Iran continues to plot attacks against former government officials in retaliation for the death of IRGC-QF [Iranian Revolutionary Guard Corps-Qods Force], Commander Qassem Soleimani. They also have continued to provide support to their proxies and terrorist organizations throughout the world, to include Lebanese Hezbollah.

The FBI believes Iran is capable of a variety of attack options against U.S. targets, to include cyber operations intended to sabotage public and private infrastructure, and targeted assassinations of individuals who are deemed to be a threat to the regime or its stability. The FBI continues to use intelligence to identify threats related to Iran’s lethal capabilities targeting U.S. persons. We work closely with other U.S. government agencies and foreign partners to address the threat to U.S. interests from Iran and its proxies.

There have been several examples of Iran’s intention to carry out lethal attacks in the United States. For instance, in 2022, an Iranian IRGC-QF officer, Shahram Poursafi, was charged related to his attempt to arrange the murder of former National Security Advisor John Bolton. Poursafi attempted to pay individuals in the United States $300,000 to carry out the murder in the Washington, D.C., area. Thankfully, Poursafi attempted to pay one of our confidential human sources to carry out the attack. This incredible investigative work by our Washington Field Office resulted in charges against Poursafi. Even though Poursafi remains at large abroad, this investigation highlighted Iran’s incredibly bold plot to murder a former U.S. government official.

In 2023, three members of an Eastern European criminal organization were charged for plotting the murder of a U.S. citizen, who has been targeted by the Government of Iran for speaking out against the regime’s human rights abuses. The victim was targeted for exercising the rights to which every American citizen is entitled. An attempted assassination on U.S. soil shows how far Iranian actors are willing to go to silence their critics.

These brazen attempted attacks on U.S. soil by Iran are not new. You may also recall that in September 2011, Mansour Arbabsiar was arrested for plotting to murder the Saudi Ambassador to the United States on U.S. soil. This plot was directed and approved by the IRGC-QF.

Based on the examples I just described, it’s clear the Iranians are determined to carry out attacks in the United States, whether it be to avenge the death of Soleimani, to silence one of their critics, or to kill the ambassador of an ally nation. The FBI’s mission is to work with our partners in the U.S. and throughout the world to prevent attacks like this.

In January 2024, fourteen foreign nationals were intercepted by a U.S. military vessel during their alleged transportation of suspected Iranian-made weapon parts to Houthi rebel forces in Yemen. Four of these individuals were recently brought to the United States to face charges outlined in a criminal complaint unsealed in February. Tragically, two Navy SEALS lost their lives in the pursuit of this mission. The disruption of these individuals prevented Iranian-made weapon parts from getting into the hands of the Houthis, who could have used the weapons to target U.S. forces.

Post October 7 – Iran & Hamas

The persistent threat from Iran came into sharper focus following the October 7 Hamas attack against Israel. Despite their praise for the attack and threat to join the conflict should Israel invade Gaza, Iran will likely still rely on their proxy networks to action retaliatory attacks focused in the region, in the near term. We assess that Iran IRGC [Iranian Revolutionary Guard Corps] will continue to provide training, weapons, and financial support to Hamas.

Hezbollah

The FBI remains concerned Hezbollah, Iran’s primary strategic partner, could conduct retaliatory attacks against former U.S. officials, not only overseas, but also within the U.S.

Since its inception in 1982, Hezbollah has been involved in numerous anti-US terrorist attacks. Historically, Hezbollah has sent operatives to build terrorist infrastructures worldwide, and are likely to continue conducting intelligence collection, financial activities, and procurement efforts worldwide to support their terrorist capabilities.

Conclusion

In summary, the threat from Iran and its proxies remains persistent and the FBI continues to engage with our partners to ensure protection of the American people and U.S. interests, both at home and abroad. Thank you for the opportunity to speak with you today and I look forward to answering your questions.

Director Wray’s Remarks at the University of Georgia’s Getzen Lecture on Government Accountability

Source: Federal Bureau of Investigation FBI Crime News

Holding Law Enforcement Accountable 

But I’ll start with our efforts to protect Americans’ civil rights by holding law enforcement officers accountable. As part of their vital role in enforcing our laws and keeping us all safe, law enforcement officers have the power to arrest and detain people, to search and seize property, and in some cases even to use deadly force. Given all that tremendous power, it’s our job to step in to investigate allegations of abuse.

Now, let me be clear here. I’m the leader of the world’s premier law enforcement agency, and I’ve spent most of my career proudly working shoulder to shoulder with law enforcement officers. At the FBI, we couldn’t have the impact we do without the partnership of the nearly 6,000 state and local law enforcement officers who work alongside our agents on our various FBI-led task forces.

Last year alone, for instance, the FBI and our law enforcement partners arrested nearly 18,000 violent criminals and child predators. That’s almost 50 bad guys we took off the streets per day, every day—together. So I’ve seen first-hand what they’re made of and what they do to make our communities safer.

The overwhelming majority of officers are in the job because they think of others before themselves, no matter the cost. They’re men and women of courage and character, of dedication and service. They work long hours—longer than most people will ever know—and don’t get paid nearly enough for what they do. Much of their work goes on behind the scenes—and rarely gets the attention or credit it deserves.

To answer the call to go into law enforcement, you’ve got to really want to help people. Because every day, when officers pick up their badges and say goodbye to their families, they know there’s a chance they might not make it home. Just stop for a second and think about what that really means. What it takes for someone to be willing to put their life on the line for another—and I’m not talking about a member of their family—I’m talking about potentially giving up their life to protect a total stranger.

Now think about doing that day after day, year after year for an entire career—and not just while they’re on the job, but when they’re “off duty,” out with their own family, too. It takes a pretty extraordinary person to choose that life.

Which is why when officers violate their oath and hurt the ones they’re sworn to serve instead of protecting them, it’s a discredit to those scores of brave men and women who do the job the right way, each and every day. And it’s why law enforcement at all levels share an interest in holding those who stray accountable.

At the FBI, we fulfill that duty as part of our responsibility to safeguard the civil rights of all Americans. And I can think of no better place to discuss that work than here in Georgia, where the capital’s known as the cradle of the modern civil rights movement.

Today, the FBI is the primary federal agency charged with investigating civil rights violations. And while our work combating hate crimes might be what most people think of when it comes to the Bureau’s civil rights program, another absolutely essential part of it is our investigation of color-of-law violations. Those crimes occur when an individual acting under the authority of federal, state, or local laws—under what’s known as the color of law—willfully deprives someone of their constitutional rights. And that deprivation of rights can run the gamut, from excessive force, false arrest, or obstruction of justice—to sexual assault, withholding medical care, or the failure to keep an individual from harm. While color-of-law violations can be committed by anybody acting under their lawful authority, including probation and corrections officers, public officials, prosecutors, and judges, they too often involve law enforcement officers.

An investigation the FBI’s Jackson, Mississippi, field office conducted last year represents a particularly heinous example. In January 2023, six white law enforcement officers committed some absolutely unspeakable crimes. Without a warrant or any exigent circumstances, the six of them kicked in the door of a home where two Black men were staying and subjected them to an hour and a half of pure hell. Despite having no probable cause to believe either had committed a crime, the six officers: handcuffed and arrested the men; kicked and beat them; bombarded them with racial slurs; forced them to strip naked; assaulted them with a variety of objects; tased them—not once, but 17 times; and fired their guns to intimidate them.

But apparently that wasn’t enough for these defendants. One of them had the idea to stage a mock execution. So he took his weapon and secretly removed a bullet from the chamber. He put the barrel into one victim’s mouth and pulled the trigger, dry-firing the gun. Then he did it again—but this time, the gun didn’t dry-fire. It discharged, sending a bullet into the victim’s mouth, lacerating his tongue, and breaking his jaw.

Can you imagine the abject terror those two victims must have felt? I mean, who do you call when the police are the ones terrorizing you? No human being should ever be subjected to the torture, the trauma, the horrific acts of violence carried out by those individuals. 

As their gunshot victim lay bleeding on the floor, what do you think these six law enforcement officers—men who had sworn an oath to protect and serve—did next? I can tell you they didn’t render aid. Instead, they came up with a cover story and then took steps to corroborate it. They planted a gun on one of the victims; destroyed surveillance video, spent shell casings, and taser cartridges; submitted phony drug evidence to the crime lab; filed false reports; charged one of the victims with crimes he had not committed; made false statements to investigators; and pressured witnesses to stick to their cover story.

All of that came out through the course of the FBI’s investigation. We also found that in addition to those offenses, three of the officers had committed other color-of-law violations just a month earlier, when one of them beat another man, tased him, and fired a gun near his head attempting to coerce a confession, while the other two failed to intervene.

I recognize that what happened in Mississippi is an extreme example. In fact, it’s hard to imagine a more atrocious set of civil rights violations than those carried out by these guys. But on the flip side, it’s hard to imagine more important work than investigating those crimes and seeking justice for the victims. As the result of the Bureau’s color-of-law investigation, which we worked in collaboration with our federal and state partners, all six pled guilty last August and are now waiting to be sentenced.

The contrast between the vast majority of law enforcement officers who are in the job for the right reasons, to help people and keep communities safe—and the others, like those six in Mississippi, who instead use their power and authority to hurt the most vulnerable—that contrast is what makes color-of-law violations so immensely harmful.

We’ve entrusted law enforcement officers with vast power and authority. And when they abuse it—when they operate as though they’re above the law—they’re not just depriving victims of their civil rights. They’re degrading the public’s trust in our criminal justice system, one violation at a time. And that’s why the FBI’s work investigating these kinds of abuses is among our most important responsibilities.

The philosopher David Hume wrote that the corruption of the best things produces the worst. I know firsthand the men and women who choose a career of protecting others to be some of the very best among us. But while officers-turned-criminals make up a tiny fraction of the law enforcement community, the harm they do has the worst possible effect. Because no matter how infrequent, when officers violate the civil rights of ordinary citizens, it erodes trust—often in our most vulnerable communities—making the job that much harder for the honest men and women who do things the right way.