FBI Washington Field Office Statement on Bomb Threats to D.C. High Schools

Source: Federal Bureau of Investigation FBI Crime News

The FBI Washington Field Office is aware of bomb threats that were made to several Washington, D.C., high schools on Wednesday, February 9, and is working with the D.C. Metropolitan Police Department and ATF Washington Field Division to investigate them. The FBI takes these and all threats seriously and asks that anyone with information about them contact the FBI at 1-800-CALL-FBI or submit it online to tips.fbi.gov.

Oregon FBI Tech Tuesday: Building a Digital Defense Against Romance Scams

Source: Federal Bureau of Investigation FBI Crime News

Welcome to the Oregon FBI’s Tech Tuesday segment. Today: Building a digital defense against broken hearts.

One billion dollars. That’s the amount of money that the FBI’s Internet Crime Complaint Center estimates that romance fraud victims lost in 2021. And, those are just the victims who reported losing their heart—and bank account—to such scammers.

While anyone can be a victim of this fraud, the bad actors are known to target women over age 40 who are widowed, divorced, elderly, and/or disabled.

The victim just wants connection and companionship. The bad guy generally wants cold hard cash.

He may be direct about it and just ask for you to send him money for some big emergency. To avoid meeting in person, romance scammers often claim to live or work in other parts of the country or world. Eventually, when they feel they have gained the trust of their victims, these criminals will ask for cash. He may say he needs money to move back home or to pay for some legal or medical emergency.

These bogus boyfriends and greedy girlfriends may want more than just money, too. They likely will try to trick victims into releasing personal info—such as birth dates and bank account numbers—that they can exploit for further scams or sell for more profit. Romance fraud victims also are very vulnerable to bad actors who want to use them to launder money.

Here are some warning signs:

  • Your new love wants you to leave the dating app where you met to move to a more private messaging option, such as email or text.
  • He wants you to send compromising photos or videos of yourself.
  • His photo appears to be a glamour shot or her profile is too perfect.
  • And, of course, there’s always the ask for money or the ask to help move money.

Here are some things you can do to avoid the pitfalls of a bad online breakup:

  • Research your new love. Use online search tools to see whether that photo, name, or profile links to other scams.
  • Question any relationship where your virtual soulmate always has an excuse as to why he can’t visit in person.
  • Don’t travel to meet someone, especially if it involves travel to a foreign country. Such visits can end in tragedy.
  • Be careful about how much information you post online. A good scammer can turn a tiny bit of detail into a very effective romantic pitch.

Losing your heart—and your bank account—in romance scams can be both emotionally and financially devastating. We ask victims, though, to come forward so that we can identify those who are committing these crimes and protect others in the process.

If you are the victim of an online fraud, you should report the incident to the FBI’s Internet Crime Complaint Center at www.ic3.gov or call your FBI local office.

FBI Statement on Investigation into Bomb Threats to Historically Black Colleges and Universities and Houses of Worship

Source: Federal Bureau of Investigation FBI Crime News

The FBI Joint Terrorism Task Forces are leading the investigation into the nationwide series of bomb threats to Historically Black Colleges and Universities and houses of worship. This investigation is of the highest priority for the Bureau and involves more than 20 FBI field offices across the country. These threats are being investigated as racially or ethnically motivated violent extremism and hate crimes. We are working closely with our local, state, and federal law enforcement partners; coordinating with the targeted institutions; and meeting with academia and faith leaders to share information.

Although at this time no explosive devices have been found at any of the locations, the FBI takes all threats with the utmost seriousness, and we are committed to thoroughly and aggressively investigating these threats.

Due to the continuing investigation, we are unable to provide more details at this time.

The FBI will continue our work to make sure all races and religions feel safe in their communities, schools, and places of worship. We would like to remind members of the public that if they observe anything suspicious or have information about potential threats to report it to law enforcement immediately, call their local FBI field office, or submit a tip to tips.fbi.gov.

Michael E. Hensle Named Special Agent in Charge of the Milwaukee Field Office

Source: Federal Bureau of Investigation FBI Crime News

Director Christopher Wray has named Michael E. Hensle as the special agent in charge of the Milwaukee Field Office. Mr. Hensle most recently served as the deputy assistant director of the Inspection Division at FBI Headquarters in Washington, D.C. 
 
Mr. Hensle joined the FBI as a special agent in 2003 and was assigned to the Albany Field Office in New York, where he worked white-collar violations—including financial institution fraud and health care fraud—public corruption, and civil rights. In 2006, Mr. Hensle transferred to the Newark Field Office in New Jersey, where he continued to work public corruption and investigated organized crime, domestic terrorism, and weapons of mass destruction violations. 
 
In 2008, Mr. Hensle was promoted to supervisory special agent in the Weapons of Mass Destruction Directorate at FBI Headquarters and worked in the Infrastructure Countermeasures Unit and Biological Countermeasures Unit. In 2011, he was promoted to unit chief of the Biological Countermeasures Unit, where he led the bioterrorism program and initiatives to prevent the acquisition, production, and use of biological agents as weapons of mass destruction (WMDs). 
 
Mr. Hensle transferred to the Salt Lake City Field Office in 2012 for the first of several assignments. He initially led the domestic terrorism, WMD, and crisis management programs for Utah, Idaho, and Montana. In 2015, he was promoted to assistant special agent in charge over Salt Lake City’s counterterrorism, WMD, crisis management, and administrative programs and oversaw the eight resident agencies in Montana. In 2017, he led Salt Lake City’s counterintelligence, cyber, intelligence, and administrative programs and continued to oversee the resident agencies in Montana. 
  
In 2018, Mr. Hensle was promoted to inspector in the Inspection Division at FBI Headquarters. He was appointed to chief inspector in 2020, with oversight of eight inspectors and staff in the Office of Inspections who conducted inspections of the FBI’s 56 field offices, agent-involved shooting reviews, and special investigations. Later in 2020, Mr. Hensle was selected as deputy assistant director in the Inspection Division, where he continued to lead the Office of Inspections and oversaw the FBI’s internal affairs portfolio. He also coordinated audits and reviews of the FBI conducted by the Department of Justice’s Office of Inspector General and the Government Accountability Office.  
 
Prior to joining the FBI, Mr. Hensle worked in the Environmental Health and Safety Office of Emory University in Georgia, in conjunction with the Centers of Disease Control and Prevention. He earned a master’s degree in public health from Emory University and a bachelor’s degree from Ithaca College in New York in applied psychology. 

Countering Threats Posed by the Chinese Government Inside the U.S.

Source: Federal Bureau of Investigation FBI Crime News

I also want to congratulate whoever came up with the name for the exhibit: “FBI: From Al Capone to al Qaeda.” It’s not only catchy; it also captures the way the world has changed since the Bureau’s establishment back in 1908 and the way we’ve evolved as a law enforcement and intelligence agency to keep ahead of the changing threats we face.

Today, we in the United States and the Western world find ourselves in a very different struggle against another global adversary—the Chinese Communist Party. Now, there are some surface-level similarities between the threat posed by the Chinese government and the historical threat of the Soviet Union: The Chinese government also rejects the fundamental freedoms, basic human rights, and democratic norms we value as Americans.

But the Soviet Union didn’t make much that anyone in America wanted to buy. We didn’t invest in each other’s economies or send huge numbers of students to study in each other’s universities. The U.S. and today’s China are far more interconnected than the U.S. and the old U.S.S.R. ever were, and China is an economic power on a level the Soviets could never have dreamed of being.

The complexity of the threat posed by the Chinese government flows from those new realities, because China’s government has the global reach and presence of a great nation, but it refuses to act the part and too often uses its capabilities to steal and threaten, rather than to cooperate and build. That theft, those threats, are happening right here in America, literally every day.

That’s what I want to talk to you about tonight, the threat posed by the Chinese government here at home to our economic security and to our freedoms. Our freedom of speech, of conscience; our freedom to elect and be served by our representatives without foreign meddling; our freedom to prosper when we toil and invent. I’ve spoken a lot about this threat since I became FBI Director. But I want to focus on it here, tonight, because in many ways it’s reached a new level—more brazen, more damaging than ever before, and it’s vital—vital—that all of us focus on that threat together.

Now, having said that, I do want to be clear that the Chinese government and the Chinese Communist Party pose the threat we’re focused on countering—not the Chinese people, and certainly not Chinese Americans, who are themselves frequently victims of the Chinese government’s lawless aggression. Protecting them from the Chinese government is top of mind for us, too. America is richer and stronger because of the generations of people who immigrated here from China, many of whom will celebrate the traditional Lunar New Year festival this week. At the FBI, we’re committed to protecting the safety and rights of all Americans.

Threat to our Economic Vitality and Innovation

At the Bureau, we’ve long held the view that protecting our nation’s innovation is both a law enforcement priority and a top national security priority. It secures national prosperity and security, but it also keeps individual workers employed, families able to make ends meet and fully live their lives—to put food on the table. That’s what’s really at stake in the fight with the Chinese government here in America. It’s home economics, not just macroeconomics.

America’s strength is built on our innovation, on our striving citizens and the world-changing products and services they build—from the invention of the airplane back around the time of the FBI’s founding to the computer, the Internet, GPS, life-saving medicines, and thousands of others over the decades.

When we tally up what we see in our investigations—over 2,000 of which are focused on the Chinese government trying to steal our information and technology—there is just no country that presents a broader threat to our ideas, our innovation, and our economic security than China.

The Chinese government steals staggering volumes of information and causes deep, job-destroying damage across a wide range of industries—so much so that, as you heard, we’re constantly opening new cases to counter their intelligence operations, about every 12 hours or so.

What makes the Chinese government’s strategy so insidious is the way it exploits multiple avenues at once, often in seemingly innocuous ways. They identify key technologies to target. Their “Made in China 2025” plan, for example, lists 10 broad ones—the keys to economic success in the coming century—spanning industries like robotics, green energy production and vehicles, aerospace, biopharma, and so on. And then—and then, they throw every tool in their arsenal at stealing that technology to succeed in those areas.

Here in the U.S., they unleash a massive, sophisticated hacking program that is bigger than those of every other major nation combined. Operating from pretty much every major city in China, with a lot of funding and sophisticated tools, and often joining forces with cyber criminals, in effect, cyber mercenaries. In just one case, one example, a group of MSS-associated criminal hackers stole terabytes of data from hundreds of companies. Now, to put that in context, one terabyte is around 70 million pages of data. Think about that. They’re not just hacking on a huge scale but causing indiscriminate damage to get to what they want, like in the recent Microsoft Exchange hack, which compromised the networks of more than 10,000 American companies in a single campaign alone.

At the same time, the Chinese government uses intelligence officers to target the same information, multiplying their efforts by working extensively through scores of so-called co-optees. Basically, people who aren’t technically Chinese government officials but who assist in their intelligence operations—spotting and assessing sources, providing cover, communications, and helping steal secrets in other ways. The Chinese government also makes investments and partnerships to position their proxies to take valuable technology.

Sometimes they just wave enough money to get what they want, but often they also conceal which companies they actually control. Or use companies they don’t literally own but instead can control through embedded Chinese Communist Party cells that are required to exist in virtually any Chinese company of any real size, using elaborate shell games to disguise their efforts both from our companies and from our government investment screening program, CFIUS—the Committee on Foreign Investment in the United States. Within China, they force U.S. companies to partner with Chinese government-owned ones to do business in China, and then abuse and exploit those partnerships.

Xu Yanjun and GE Aviation

A recent case from Ohio is a great illustration of the Chinese government’s multiprong strategy for stealing our valuable secrets. This past November, a Chinese intelligence officer named Xu Yanjun was convicted of economic espionage in Cincinnati. He was part of the Chinese Ministry of State Security, which is one of their spy services, and he was in a unit responsible for stealing aviation-related secrets.

Xu was targeting an advanced engine made by GE and a foreign joint venture partner—an engine that Chinese state-owned enterprises were openly working to copy. He corrupted insiders with access to sensitive company data and access to company IT infrastructures, so Xu could help MSS hackers, in cyber units back in China, target the same data at the same time. Xu used one of his recruits, or co-optees—this one a senior company IT official—to help him plant malware on a joint venture company laptop.

He kept in touch with the MSS hackers in China to make sure that they could access the implant that he’d uploaded. And then, to steal a particular composite fan blade technology that only GE possesses, he used another co-optee—this one an official at a prominent Chinese university—to contact a GE engineer through LinkedIn.

Now, as an aside, I would be remiss if I didn’t note that we see an awful lot of Chinese intelligence outreach on social media, especially on LinkedIn.

So, they offered this engineer a trip to China to give a presentation on his work at a university there, and then another trip, to Europe. When we saw what was happening, we and GE were able to use our relationship to work together to foil the attempted theft—letting the scheme appear to play out but helping GE provide the engineer altered documents to steal. So, in this case, at least, because of GE’s quick work and cooperation, China was not able to leapfrog over a decade of hard work and billions in investment to undercut a major U.S. employer with nearly 50,000 employees. But we’re waging this battle every day.

As dangerous as that blend of tools all directed at a single company’s technology is, what’s really scary is how common Chinese operations like that one have become. Xu is just one Chinese intelligence officer working for an entire unit dedicated solely to stealing aviation-related secrets. And that’s just one of those 10 technology areas the Chinese government has prioritized for stealing.

Just using cyber means, Chinese government hackers have stolen more of our personal and corporate data than every other nation combined. The harm from the Chinese government’s economic espionage isn’t just that its companies pull ahead based on illegally gotten technology. While they pull ahead, they push our companies and workers behind. And that harm—company failures, job losses—has been building for a decade to the crush that we feel today. It’s harm felt across the country in a whole range of industries.

I’ll give you an example. Several years ago, a Chinese government-owned corporation called Sinovel stole the proprietary source code for controlling wind turbines from a U.S. company in Massachusetts, causing that U.S. company, American Superconductor, to plummet from being a $1.6 billion company to a $200 million company, and from 900 employees to only 300 employees. That’s 600 people who lost their livelihoods. And while those people were trying to figure out how to cope with catastrophe, Sinovel was adding insult to injury, using the source code they’d stolen to sell wind turbines—right here in the United States.

In 2015, the Chinese government publicly promised to stop handing hacked U.S. technology to Chinese companies, but their cyber theft program kept going strong. And in the years since, they’ve hit ever more companies and workers. We’ve seen small companies developing important medicines ransacked. We’ve seen big managed service providers remotely managing IT services for thousands of other businesses hacked, so the Chinese government could hijack their trusted connections with their customers and hack those companies, too.

Whatever makes an industry tick, they target: source code from software companies, testing data and chemical designs from pharma firms, engineering designs from manufacturers, personal data from hospitals, credit bureaus, and banks. They’ve even sent people to sneak into agribusinesses’ fields and dig up advanced seeds out of the ground. The common thread is that they steal the things companies can’t afford to lose. So, the Chinese government’s economic theft campaign is not just unprecedented in its breadth, it’s also deeply damaging—undoing the labor, ideas, and investments of decades, and leaving lives overturned in its wake.

Threats to our Constitution, Values, and Democratic Norms

But stealing innovation isn’t the only way the Chinese government shows their disregard for the international rule of law. The Chinese government is increasingly targeting people inside the U.S. for personal and political retribution—undercutting the freedoms that our Constitution and laws promise. The kinds of people the Chinese Communist Party tends to go after are not those that a responsible government would make their enemies—refugees, dissidents, and Uyghurs—people with their own ideas, who speak or worship as their conscience dictates.

One egregious example is a thing called Fox Hunt, which is a program that President Xi Jinping claimed in 2014 was created to stamp out corruption. But in reality—in reality, it targets, captures, and repatriates former Chinese citizens living overseas whom it sees as a political or financial threat. Over the past eight years, the Chinese government has hauled home more than 9,000 people worldwide, bringing them back to China, where they can be imprisoned or controlled.

And a big reason why it’s been so effective is because—much like with its economic espionage—the Chinese government is willing to disregard diplomatic norms and international law when it comes to grabbing these victims. To start with, they often issue “red notices” through INTERPOL, using the international law-enforcement community to stop and hold people for extradition. Now, effective use of red notices brings real criminals to justice, but issuing red notices for political purposes is an abuse of the program.

Currently, there are hundreds of people on U.S. soil who are on the Chinese government’s official Fox Hunt list and a whole lot more that are not on the official list. And most of the targets are green card holders, naturalized citizens—folks with important rights and protections under U.S. law.

But abusing red notices is bad enough. We’re seeing the Chinese government resort to blackmail, threats of violence, stalking, and kidnappings. They’ve actually engaged criminal organizations in the U.S., offering them bounties in hopes of successfully taking targets back to China. China applies incredible pressure on the targets of those efforts, many of whom still have family back in China. Some, unaware the Party was after them, have traveled back to China for a visit, only to find themselves suddenly trapped, and prevented from leaving.

Others—who are aware that they’re targets—in those cases, the Chinese government has arrested their family members and imprisoned them, effectively holding the relatives hostage until the victim returns to China. Now, at the FBI, we know a lot about criminal tactics after 113 years, and this is right up there. And it’s certainly not the kind of conduct you would expect from a responsible nation on the world stage.

As with the GE economic espionage example, maybe the most appalling thing about Fox Hunt is that it’s just the tip of the iceberg when it comes to the Chinese government’s transnational repression. For decades, the Chinese Communist Party has targeted, threatened, and harassed U.S.-based Tibetans and Uyghurs, Falun Gong members, pro-democracy advocates, and really any others who question their legitimacy or authority.

Now of course, there’s a lot of bad behavior on the global stage, but the Chinese government’s reach—their willingness and ability to exert power here in the United States—is unique. Sometimes they seem to make a point of applying overwhelming pressure to stifle even petty criticisms. In 2018, after one U.S.-based employee of a major hotel chain “liked” a social media post by a Tibetan separatist group, the Chinese government made the U.S. hotel chain shut down all of its Chinese websites and applications for an entire week. And many of you will remember that when an executive with a certain NBA team appeared to tweet in support of Hong Kong democracy protests in 2019, the Chinese government banned NBA broadcasts in China for an entire year.

The Chinese government is getting more brazen controlling that kind of speech. In November, just a couple months ago, the Chinese Embassy put out letters effectively warning U.S. businesses that if they want to do business in China, they need to fight against Chinese government-related bills in our Congress.

But even more concerning are menacing violations of our citizens’ and residents’ rights, things like threatening and harassing students at our universities when they exercise their right to free speech. In a recent incident at one Midwestern university, for example, a Chinese-American student posted online praise for those students who were killed in the Tiananmen Square massacre in 1989. And almost immediately, his parents called from China, saying that Chinese intelligence officers had shown up to threaten them because of his post.

When the same student participated in an online rehearsal for a protest event with other students, the Chinese government knew what he’d said in the rehearsal, and his parents called again, even more frantic this time. That student backed out of the event, only recently making public what had happened. This is at a major American university, right in the heartland, and that kind of overt harassment is just part of the visible spectrum of the problem. The Chinese government is also leveraging covert means, like using their cyber capability to target dissidents.

The Party doesn’t just go after individuals, though. They aim higher and more broadly—to try to corrupt our leaders, to buy or intimidate acquiescence to their will. That includes trying to undermine our democratic process by influencing our elected officials. And here, too, they play the long game. The Chinese government understands that politicians in smaller roles today may rise to become more influential over time. So they look to cultivate talent early—often state and local officials—to ensure that politicians at all levels of government will be ready to take a call and advocate on behalf of Beijing’s agenda.

The Chinese government is not the first with authoritarian ambitions. As I mentioned when we started, President Reagan and his fellow Cold War presidents knew a thing or two about confronting tyranny. But China may be the first government to combine authoritarian ambitions with cutting edge technical capability. It’s like the surveillance nightmare of East Germany combined with the tech of Silicon Valley.

FBI Response

I hope all this gives you a sense for why the FBI is so focused on the threat from the Chinese government. Here, the Reagan Library’s FBI exhibit is a great place to talk about what we, our partners, and our allies are doing about that threat. The exhibit not only shows how threats to the United States have evolved over the decades but also how the FBI has evolved to stay ahead of those threats. Twenty years after 9/11, the FBI is a very different agency in important and valuable ways. To deal with the threat of terrorism, the FBI deployed around the world. We shifted focus to disruption before danger can strike, and we cemented a culture of working with—and through—partners of all kinds.

Today we use our intelligence collection—both what we develop and what we obtain from partner agencies here and abroad—to identify and disrupt threats early. Like when we ran an operation to slam shut the backdoors that Chinese government hackers had placed on thousands of American companies’ networks in that Microsoft Exchange operation I was referring to earlier—in that case working closely with Microsoft and other private sector and government partners. And we focus on sharing what we learn through our work—and I mean really sharing, a lot—with a whole variety of partners who can act alongside us. Not just other intelligence services but law enforcement agencies around the world, and private sector, state and local, and military partners here at home, pointing to hacking infrastructure to take down, intelligence officers to track, corporate transactions to block, and more.

And as we have against other dangers, we’re applying a lot of the lessons learned in the fight against terrorism to every aspect of the Chinese government threat. Following the successful model of the Joint Terrorism Task Forces we lead in every one of our field offices, we also now have both Cyber and Counterintelligence Task Forces set up in all of those field offices too, bringing aboard indispensable teammates from scores of other federal, state, and local agencies. We also recently set up a National Counterintelligence Task Force to provide nationwide coordination with federal law enforcement and intelligence partners, a lot like the National Cyber Joint Investigative Task Force we’ve built on the cyber side.

And we’re continuing to adapt how we operate. The post-9/11 counterterrorism analogy is not a perfect one. The biggest differences we see with the threat from the Chinese government are, first, the central importance of the private sector—from young, new-economy firms to Internet service providers to industrial giants—and second, how often we’re using tools other than arrests and prosecutions to neutralize these threats. We’re showing that early coordination is essential to achieving positive results, like GE Aviation saving thousands of jobs by acting before their trade secrets could be stolen.

Much of the battleground we’re contesting lies outside the government’s control: companies whose technology we’re helping protect, universities whose students and research we’re helping protect, local governments we’re warning about foreign threats. None of them are equipped to deal with a threat this complex alone, so it’s good they don’t have to. We’re sharing information those partners need to protect themselves while we employ all of the lawful tools at our disposal and provide our government partners around the world with the evidence they need to act in concert.

The sheer volume of criminal and threatening actions we see from the Chinese government is immense, but the good news—the good news—is that our partners and allies these days are more alert to those dangers than ever. I spend a lot of my time talking with other leaders focused on national security and law enforcement, both here at home and abroad. And the frequency with which this threat dominates the discussion is striking. I have foreign counterparts tell me they’re fighting to protect their students from intimidation, too. That Chinese officials are targeting their policies and their candidates with malign influence, too. That hackers in China are carrying their companies’ innovation off; that Chinese companies or proxies are using quasi-legal investments to undermine their economies.

And they’re in the fight with us. Just over the last couple of months, for example, Australia passed new rules to protect students from harassment on campus and to safeguard their universities’ research. In the UK, our close partner, MI5, publicly alerted the UK Parliament to a Chinese Communist Party agent trying to corrupt their political process. Not long after, my friend and colleague Richard Moore, the head of MI6, warned in his first public speech of some of the very same dangers I’ve talked about here. Across Europe and East Asia, our partners are establishing or strengthening investment screening programs, toughening cyber defenses—sometimes with our technically trained agents sitting right there with them—and improving their own private sector partnerships.

The list goes on. So, yes, the Chinese government understands the West’s free and open society and tries to exploit it. But the Chinese government’s worldview works as a blinder, too. They may think our adherence to the rule of law is a weakness, but they’re wrong. As a rule-of-law agency in a rule-of-law country with rule-of-law partners, we see how our democratic and legal processes arm us. For one, when it’s appropriate, we make allegations we can prove to neutral fact finders, and those allegations often give allied governments the predication they need to act.

Look at what’s been happening with Huawei. When an independent grand jury returns an indictment accusing a company of serial trade secret theft, people think twice about entrusting their privacy and secrets to that company. And the threat Huawei poses is a lot better understood now than it was before our investigation led to those charges.

So, we’re confronting this threat and winning important battles—not just while adhering to our values but by adhering to our values. I believe that in the course of doing so, we’re showing why the Chinese government needs to change course—for all our sakes.

There is so much good we could do with a responsible Chinese government: crack down on cyber criminals, stop money launderers, reduce opioid overdose deaths. But at the FBI, we’re focused on the reality of the Chinese government today.

All of us in America—and across the free world—are in this together. And as President Reagan said in his inaugural address, “No arsenal or no weapon in the arsenals of the world is so formidable as the will and moral courage of free men and women.” And I have been heartened to see that recognition take hold, to watch and help our partners gird for the long, important fight now underway. And everyone involved in that fight can be certain that you will have no more committed partner than the FBI.

Thank you.