Good morning, Chairman Lieberman, Ranking Member Collins, and members of a committee. Thank we for a event to seem before a cabinet now and for your continued support of a organisation and women of a FBI.
As we know, a Bureau has undergone rare mutation in new years. Since a attacks of Sep 11th, we have refocused a efforts to residence and forestall rising militant threats. The militant hazard is some-more different than it was 11 years ago, though today, we in a FBI are improved prepared to accommodate that threat.
We also face increasingly formidable threats to a nation’s cyber security. Nation-state actors, worldly orderly crime groups, and hackers-for-hire are hidden trade secrets and profitable investigate from America’s companies, universities, and supervision agencies. Cyber threats also poise a poignant risk to a nation’s vicious infrastructure.
As these threats continue to evolve, so too contingency a FBI change to opposite those threats. We contingency continue to build partnerships with a law coercion and private zone partners, as good as a communities we serve. Above all, we contingency sojourn resolutely committed to carrying out a goal while safeguarding a polite rights and polite liberties of a people we serve.
Counterterrorism stays a tip priority.
We face a fluid, dynamic, and formidable militant threat. We have seen an boost in a sources of terrorism, a wider array of terrorism targets, a larger team-work among militant groups, and an expansion in militant strategy and communications methodology.
In a past decade, al Qaeda has spin decentralized, though a organisation stays committed to high-profile attacks opposite a West. Records seized from Osama bin Laden’s devalue some-more than one year ago endorse al Qaeda’s intent. The May 2012 self-assurance of an al Qaeda user who plotted to control concurrent self-murder bombings in a New York City transport complement emphasizes a existence of a threat.
Our believe has been that several pivotal al Qaeda in a Arabian Peninsula (AQAP) total were innate or prepared in a United States; they know a enlightenment and a confidence protocols, and they use this bargain to rise and labour new strategy and techniques for their due attacks. Al Qaeda affiliates and surrogates, generally AQAP, paint a tip counterterrorism hazard to a nation. These groups have attempted several attacks on a United States, including a unsuccessful Christmas Day airline bombing in 2009 and a attempted bombing of U.S.-bound load planes in Oct of 2010.
AQAP leaders have published English-language articles in a Internet detailing their vigilant to strike a United States. They are also creation use of amicable media to share their believe with people of identical mindsets. They comprehend a value of reaching English-speaking audiences and are regulating a group’s selling skills to enthuse people to commence attacks in a United States though carrying to transport or sight abroad.
We also sojourn endangered about a hazard from homegrown aroused extremists. Over a past few years, we have seen augmenting activity among nonconformist individuals. These people have no standard profile; their practice and motives are mostly distinct. But they are increasingly savvy and peaceful to act alone, that creates them formidable to find and to stop.
For example, in Feb 2012, a FBI arrested Amine El Khalifi, a 29-year-old Moroccan immigrant, for allegedly attempting to erupt a explosve in a self-murder conflict on a U.S. Capitol. According to probity documents, Khalifi believed he was conducting a militant conflict on interest of al Qaeda, nonetheless he was not directly dependent with any group.
Another instance is a box of Rezwan Ferdaus, a 26-year-old U.S. citizen and connoisseur tyro vital in Boston, Massachusetts. During a tumble of 2011, Ferdaus designed to use unmanned, remote-controlled aircraft to conflict locations in Washington, D.C., including a U.S. Capitol. Although he espoused faithfulness to Bin Laden and al Qaeda, Ferdaus was not dependent with any organisation or other would-be terrorists. He had spin radicalized on his own, shabby by radical websites advocating aroused extremism among other things. In July, Ferdaus concluded to beg guilty to attempting to repairs and destroy a sovereign building by means of an bomb and attempting to yield element support to terrorists. The agreement is theme to examination and acceptance by a district court.
To improved residence this elaborating threat, a FBI has determined a Countering Violent Extremism (CVE) Office within a National Security Branch (NSB) that will urge a efficacy in lenient a state, local, and village partners to support in this effort. The duties and goals of this bureau embody building a improved bargain of and tackling a hazard of aroused extremism in a United States; strengthening village partnerships; providing to state and inner officials and to village leaders unclassified briefings per a hazard of aroused extremism; addressing CVE-related operational and mission-support needs, including investigations, analysis, and training; and coordinating a FBI’s interests with courtesy to CVE matters with those of other agencies to guarantee that a efforts of a U.S. supervision are aligned.
Webster Commission Report on Fort Hood
In 2009, following a conflict on Fort Hood, a FBI requested a full—and independent—investigation of a demeanour in that a FBI rubbed and acted on counterterrorism comprehension before and after a Fort Hood shootings. Former FBI Director William Webster concluded to commence that eccentric review. On Jul 19, 2012, Judge Webster delivered to a FBI a finished Webster Commission Report on Fort Hood.
The elect found shortcomings in FBI routine guidance, technology, information examination protocols, and training and done 18 recommendations for visual and enhancing measures in those areas. The FBI concurs with a beliefs underlying a recommendations and has already taken action—and had taken action, even before to a recover of a report—to exercise a recommendations formed on a mixed of a commission’s work, a FBI’s possess inner examination of a Fort Hood shootings, and a news of this committee.
The Webster Commission reported that it was tender with a peculiarity and a joining of a FBI’s comprehension analysts and a formation of analysts into a FBI’s work. The FBI has taken poignant stairs to strengthen a formation of comprehension and operations, and we will continue to inspect innovative ways to continue a mutation from an investigative-led indication to an intelligence-led model, where comprehension drives a inquisitive strategies, enhances a bargain of threats, and increases a ability to residence and lessen those threats. The Directorate of Intelligence will continue to rise to some-more effectively yield vital direction, oversight, and support to a FBI’s comprehension module as we enhance a comprehension components in any of a operational divisions.
In further to a threats associated to ubiquitous terrorism discussed above, we confront domestic terrorism—domestic acts of assault in avail of political, religious, racial, or amicable ideology. Unfortunately, we have seen a swell in sole delinquent incidents, as we witnessed with a sharpened during a Sikh church in Wisconsin.
Many sole offenders might have some connection with famous domestic militant organizations, such as aroused white supremacist groups, anarchists, animal rights and environmental extremists, and association groups whose activities might violate sovereign law. These sole offenders might be loosely dependent with such groups, though their actions typically are not destined by these groups. They might be self-trained, self-financed, and self-executing, though they are encouraged to take movement in avail of their ideological beliefs.
We in a FBI say extensive coverage of famous domestic militant groups and their ubiquitous membership. But sole offenders poise a poignant regard in that they mount on a periphery.
We are operative closely with a counterparts in a Department of Homeland Security to teach a law enforcement, private sector, and village partners to be on a notice for questionable people and activities. We wish a partners to be attuned to a hazard of domestic terrorism, either by famous groups or sole offenders, and to know how best to strech out to law coercion for assistance.
In addition, any JTTF opposite a republic includes special agents dedicated to questioning domestic terrorism. We are operative with a Bureau of Prisons to fight aroused radicalization of jailed people by groups with a far-reaching operation of underlying ideologies. We are also operative with a Department of Defense to brand members of a troops who might be dependent with and try to support or join groups intent in militant activity.
In any domestic terrorism investigation—and indeed, in any investigation—we in a Bureau essay to change a need to keep a American open protected with a inherent rights of any citizen, including their First Amendment rights to giveaway debate and leisure of assembly.
As this cabinet knows, a cyber hazard has developed and grown significantly over a past decade. Foreign cyber spies have spin increasingly skilful during exploiting weaknesses in a mechanism networks. Once inside, they can exfiltrate supervision and troops secrets, as good as profitable egghead property—information that can urge a rival advantage of state-owned companies.
Unlike state-sponsored intruders, hackers-for-profit do not find information for domestic power; rather they find information for sale to a top bidder. These once-isolated hackers have assimilated army to emanate rapist syndicates. Organized crime in cyber space offers a aloft distinction with a reduce luck of being identified and prosecuted. And hacker groups such as Anonymous and LulzSec are pioneering their possess forms of digital anarchy.
With these different threats, we expect that cyber confidence might good spin a top priority in a years to come. Computer intrusions and network attacks are a biggest cyber hazard to a inhabitant security. That is since we are strengthening a cyber capabilities, in a same approach we extended a comprehension and inhabitant confidence capabilities in a arise of a Sep 11th attacks.
We are focusing a Cyber Division on mechanism intrusions and network attacks. Such intrusions poise a biggest cyber hazard to a inhabitant security. We will re-unite non-intrusion programs now run by a Cyber Division, including Innocent Images and Intellectual Property Rights, with their counterparts in a Criminal Investigation Division. And since even normal crime is now facilitated by a use of computers, we are enhancing a technological capabilities of all FBI inquisitive personnel. We are also employing additional mechanism scientists to yield consultant technical support to vicious investigations in a field.
As partial of these efforts, we are formulating dual graphic charge army in a field. First, we will have Cyber Task Forces that will be focused on intrusions and network attacks. The stream cyber squads in any of a margin offices will form a iota of these charge forces. We contingency also work together to strengthen a many exposed among us: a children. To that end, we will also emanate Child Exploitation Task Forces in any margin office, that will concentration on crimes opposite children. As we have in a past, we acquire a appearance of a federal, state and inner partners, as we pierce forward, with these initiatives.
We are also augmenting a distance and range of a National Cyber Investigative Joint Task Force—the FBI-led multi-agency focal indicate for coordinating and pity of cyber hazard information. The National Cyber Investigative Joint Task Force brings together 18 law enforcement, military, and comprehension agencies to stop stream and envision destiny attacks. With a partners during DOD, DHS, CIA, and a NSA, we are targeting a cyber threats that face a nation. The charge force operates by Threat Focus Cells—specialized groups of agents, officers, and analysts that are focused on sold threats, such as botnets.
With a partners during a Department of Homeland Security and a National Cyber-Forensics Training Alliance, we are regulating comprehension to emanate an operational design of a cyber threat—to brand patterns and players, to couple cases and criminals.
The FBI also has 63 authorised attaché offices around a world, by that we share information and coordinate investigations with a ubiquitous counterparts. We also have special agents embedded with military departments in Romania, Estonia, Ukraine, and a Netherlands operative to brand rising trends and pivotal players in a cyber arena.
Together with a comprehension village and law coercion group partners, we are creation swell toward defeating a cyber threat—through a use of tellurian sources, technical surveillance, and mechanism science.
In Apr 2011, with a private zone and law coercion partners, a FBI distant a Coreflood botnet. This botnet putrescent an estimated dual million computers with malware that enabled hackers to seize control of a secretly owned computers, to take personal and financial information. With probity approval, a FBI seized domain names and re-routed a botnet to FBI-controlled servers. The servers destined a zombie computers to stop a Coreflood software, preventing intensity mistreat to hundreds of thousands of users.
And final fall, we worked with NASA’s Inspector General and a partners in Estonia, Denmark, Germany, and a Netherlands to close down a rapist network operated by an Estonian association by a name of Rove Digital. The investigation, called Operation Ghost Click, targeted a ring of criminals who manipulated Internet “click” advertising. They redirected users from legitimate promotion sites to their possess advertisements and generated some-more than $14 million in bootleg fees. This “click” intrigue impacted some-more than 100 countries and putrescent 4 million computers, half a million of that were here in a United States. We seized and infirm brute servers, froze a defendants’ bank accounts, and transposed a brute servers with legitimate ones, to minimize use disruptions. With a Estonian partners, we arrested and charged 6 Estonian nationals for their appearance in a scheme.
We contingency continue to share information with a partners in law enforcement, in a comprehension community, and in a private sector. We contingency sequester mission-centric information from slight information. We contingency incorporate layers of insurance and layers of entrance to vicious information. And when there is a compromise, we contingency extent a information that can be gleaned from it.
We contingency also work together to establish who is behind any given mechanism penetration or network attack. We can use a ability to charge an conflict to a specific assailant to assistance deter destiny attacks. We can't simply minimize vulnerabilities and understanding with a consequences. Collectively, we can urge cyber confidence and reduce costs—with systems designed to locate hazard actors, rather than simply to withstand them.
As rapist and militant threats spin some-more different and dangerous, a purpose of record becomes increasingly critical to a efforts.
We are regulating record to urge a approach we collect, analyze, and share information. In 2011, we debuted new record for a FBI’s Next Generation Identification System, that enables us to routine fingerprint exchange most faster and with some-more accuracy. We are also integrating removed information sets via a Bureau, so that we can hunt mixed databases some-more efficiently, and, in turn, pass along applicable information to a partners.
Sentinel, a FBI’s next-generation information and box government system, was deployed to all employees on Jul 1, 2012. Sentinel moves a FBI from a paper-based box government complement to a digital complement of record. It enhances a FBI’s ability to couple cases with identical information by stretched hunt capabilities. It also streamlines executive processes by “electronic workflow,” creation new box information and comprehension accessible some-more fast to agents and analysts. The FBI will continue building Sentinel’s capabilities according to worker feedback and organizational requirements.
As record advances, both during a FBI and via a nation, we contingency guarantee that a ability to obtain communications pursuant to probity sequence is not eroded. The increasingly mobile, complex, and sundry inlet of communication has combined a flourishing plea to a ability to control court-ordered electronic notice of criminals and terrorists. Many communications providers are not compulsory to build or say forestall capabilities in their ever-changing networks. As a result, they are mostly not versed to respond to information sought pursuant to a official probity order.
Because of this opening between record and a law, law coercion is increasingly incompetent to entrance a information it needs to strengthen open reserve and a justification it need to move criminals to justice.
We are grateful for Congress’ support in appropriation a National Domestic Communications Assistance Center. The core will capacitate law coercion to share tools, sight one another in complicated forestall solutions, and strech out to a communications attention with one voice.
It is usually by operative together—within a law coercion and comprehension communities, and with a private zone partners—that we will find a long-term resolution to this flourishing problem. We contingency guarantee that a laws by that we work keep gait with new threats and new technology.
Civil Rights, Civil Liberties, and a Rule of Law
Intelligence and record are pivotal collection we use to stay forward of those who would do us harm. Yet as we rise and refurbish a inquisitive techniques and a use of record to keep gait with today’s formidable hazard environment, we contingency always act within a proportions of a order of law and a safeguards guaranteed by a Constitution.
The universe around us continues to change, though a values contingency never change. Every FBI worker takes an promise earnest to defend a order of law and a United States Constitution. This promise is not to be taken lightly. In my remarks to new agents, on their graduation from a FBI Academy, we stress that it is not adequate to locate a criminal; we contingency do so while support his polite rights. It is not adequate to stop a terrorist; we contingency do so while progressing polite liberties. It is not adequate to forestall unfamiliar nations from hidden a secrets; we contingency do so while support a order of law.
Following a order of law and support polite liberties and polite rights—these are not a burdens. These are what make all of us safer and stronger. In a end, we in a FBI will be judged not usually by a ability to keep Americans protected from crime and terrorism, though also by either we guarantee a liberties for that we are fighting and say a trust of a American people.
Chairman Lieberman and Ranking Member Collins, we appreciate we for this event to plead a FBI’s priorities and a state of a Bureau as it stands today. Mr. Chairman, let me again acknowledge a care that we and this cabinet have supposing to a FBI. The mutation a FBI has achieved over a past 11 years would not have been probable though a support of Congress and a American people. we would be happy to answer any questions that we might have.
Article source: http://holtvilletribune.com/2012/09/19/robert-s-mueller-iii-director-federal-bureau-of-investigation-statement-before-the-senate-committee-on-homeland-security-and-governmental-affairs-washington-d-c-september/