FBI and Jefferson Parish Sheriff’s Office Requesting the Public’s Assistance to Identify the Suspect from a Capital One Bank Robbery

Source: Federal Bureau of Investigation (FBI) State Crime News

NEW ORLEANS—The FBI and the Jefferson Parish Sheriff’s Office are requesting the assistance of the public in identifying the subject who robbed the Capital One Bank, 1867 Barataria Boulevard, Marrero, Louisiana.

On Monday, July 19, 2021, at approximately 12:32 p.m., the suspect entered the Capital One Bank and presented a demand note to a teller who handed over an undisclosed amount of money to the suspect.

The suspect is described as a white male in his 30s, approximately 6’0″ tall and weighing 160 to 170 lbs. He wore a purple, long-sleeve button-up shirt with a black face mask.

Anyone with information about this robbery is asked to contact the FBI at 504-816-3000 or JPSO CRIME STOPPERS at 504-822-1111.

Tips can be submitted online at tips.fbi.gov.

FBI Warns of Phone Scammers Claiming to Represent the Agency

Source: Federal Bureau of Investigation (FBI) State Crime News

The Federal Bureau of Investigation (FBI) Sacramento Field Office is warning the public to be on alert for a phone scam involving unsolicited calls received from someone claiming to represent the FBI.

In June 2021, the Placer County Sheriff’s Office received a report from a Lincoln resident who suffered a financial loss of $45,500. The victim received an unsolicited call from someone claiming to be with the FBI, who advised that the victim’s identity was allegedly used in a money laundering and drug smuggling operation. According to the caller, the only way to avoid prosecution was to purchase gift cards from various stores and provide the card numbers.

“A call from any official law enforcement agency can set anyone’s nerves on edge and perpetrators of scams know how to exploit those feelings,” said Special Agent in Charge Sean Ragan of the FBI Sacramento Field Office. “We want the communities we serve to know that the FBI will never place an unsolicited call to demand personal information or payment. We also invite the community to call our main office at 916-746-7000 to verify if the claims a caller makes are true.”

These types of scam calls share a common theme. The perpetrator advises an unsuspecting citizen of pending prosecution for an alleged crime or an account that was compromised by criminals and used for illicit transactions. The perpetrator may request personal information and often demands fees to be paid immediately to avoid arrest, prosecution, or financial harm.

Caller identification displays may not be correct. In some cases, the telephone number displayed may appear to be the telephone number of an official government office. This is a technique called “spoofing.”

Always be wary of the information provided by an unsolicited caller. If the caller offers a phone number to verify the information, the FBI advises against using it. Instead, look up the official phone number and call the agency, organization, or business to verify the details of the call. A legitimate caller will encourage the public to take the time to verify.

Anyone who believes they were targeted in a phone scam should report the incident immediately using the FBI Internet Crime Complaint Center (IC3) website at www.ic3.gov.

The following tips are provided to help the public navigate unsolicited phone calls:

  • Never provide personal information including banking information, Social Security numbers, or other personally identifiable information to anyone that you do not know.
  • Never obtain gift cards to provide remote payment.
  • Always approach any unsolicited telephone call with caution.
  • Always feel free to discontinue or “hang up” any unsolicited call.
  • Always contact law enforcement with any concerns.
  • Always report scams and attempted scams to www.ic3.gov.

More information about government impersonation schemes and other online fraud schemes can be found at https://www.fbi.gov/scams-and-safety/common-fraud-schemes.

Federal Bureau of Investigation Budget Request for Fiscal Year 2022

Source: Federal Bureau of Investigation FBI Crime News

Statement Before the Senate Appropriations Committee, Subcommittee on Commerce, Justice, Science, and Related Agencies

Washington, D.C.

Good morning, Chairwoman Shaheen, Ranking Member Moran, and members of the subcommittee. I am honored to be here, representing the men and women of the FBI. Our people—nearly 37,000 of them—are the heart of the Bureau. I am proud of their service and their commitment to our mission. Every day, they tackle their jobs with perseverance, professionalism, and integrity, sometimes at the greatest of costs.

Earlier this year, two of our agents made the ultimate sacrifice in the line of duty. Special Agents Dan Alfin and Laura Schwartzenberger left home to carry out the mission they signed up for—to keep the American people safe. They were executing a federal court-ordered search warrant in a violent crimes against children investigation in Sunrise, Florida, when they were shot and killed. Three other agents were also wounded that day. We’ll be forever grateful for their commitment and their dedication, for their last full measure of devotion to the people they served and defended. We will always honor their sacrifice.

Despite the many challenges our FBI workforce has faced, I am immensely proud of their dedication to protecting the American people and upholding the Constitution. Our country has faced unimaginable challenges this past year. Yet, through it all, whether it was coming to the aid of our partners during the Capitol siege and committing all of our resources to ensuring that those involved in that brutal assault on our democracy are brought to justice, the proliferation of terrorist violence moving at the speed of social media, abhorrent hate crimes, COVID-19 related fraud and misinformation, the increasing threat of cyber intrusions and state-sponsored economic espionage, malign foreign influence and interference, the scourge of opioid trafficking and abuse, or human trafficking and crimes against children, the women and men of the FBI have unwaveringly stood at the ready and taken it upon themselves to tackle any and all challenges thrown their way.

Today, I appear before you on behalf of the men and women who tackle these threats and challenges every day. I am extremely proud of their service and commitment to the FBI’s mission and to ensuring the safety and security of communities throughout our nation. On their behalf, I would like to express my appreciation for the support you have given them in the past, ask for your continued support in the future, and pledge to be the best possible stewards of the resources you provide. I would like to begin by providing a brief overview of the FBI’s FY 2022 budget request, and then follow with a short discussion of key threats and challenges that we face, both as a nation and as an organization.

FY 2022 Budget Overview

The FY 2022 budget request proposes a total of $10.28 billion in direct budget authority to carry out the FBI’s national security, criminal law enforcement, and criminal justice services missions. The request includes a total of $10.21 billion for salaries and expenses, which will support 36,149 positions (13,414 special agents, 3,216 intelligence analysts, and 19,519 professional staff), and $61.9 million for construction. The request includes six program enhancements totaling $160.73 million. These enhancements are proposed to meet critical requirements and close gaps in operational capabilities, including: $45.0 million for additional personnel and tools to investigate the threat posed by domestic violent extremists (DVEs), receive and process tips from the public, and perform watchlisting and screening activities; $40 million to enhance cyber investigative capabilities; $18.8 million to mitigate threats from foreign intelligence services; $25.5 million to support the expansion of federal jurisdiction for crimes committed on tribal lands in response to the McGirt Supreme Court case; $6.2 million to support infrastructure needs related to federal task force officer use of body-worn cameras; $15.23 million to enhance the FBI’s cybersecurity posture and protect internal networks; and $10 million to maintain facilities on the FBI’s Quantico campus.

Key Threats and Challenges

This committee has provided critical resources for the FBI to become what it is today—a threat-focused, intelligence-driven organization. Our nation continues to face a multitude of serious and evolving threats ranging from homegrown violent extremists to hostile foreign intelligence services and operatives; from sophisticated cyber-based attacks to Internet-facilitated sexual exploitation of children; from violent gangs and criminal organizations to public corruption and corporate fraud. Keeping pace with these threats is a significant challenge for the FBI. As an organization, we must be able to stay current with constantly evolving technologies. Our adversaries—terrorists, foreign intelligence services, and criminals—take advantage of modern technology, including the Internet and social media, to facilitate illegal activities, recruit followers, encourage terrorist attacks and other illicit actions, and to disperse information on building improvised explosive devices and other means to attack the U.S. The breadth of these threats and challenges are as complex as any time in our history. And the consequences of not responding to and countering threats and challenges have never been greater.

The support of this Committee in helping the FBI do its part in facing and thwarting these threats and challenges is greatly appreciated. That support is allowing us to establish strong capabilities and capacities for assessing threats, sharing intelligence, leveraging key technologies, and —in some respects, most importantly—hiring some of the best to serve as special agents, intelligence analysts, and professional staff. We have built and are continuously enhancing a workforce that possesses the skills and knowledge to deal with the complex threats and challenges we face today—and tomorrow. We are building a leadership cadre that views change and transformation as a positive tool for keeping the FBI focused on the key threats facing our nation.

Today’s FBI is a national security and law enforcement organization that uses, collects, and shares intelligence in everything we do. Each FBI employee understands that, to defeat the key threats facing our nation, we must constantly strive to be more efficient and more effective. Just as our adversaries continue to evolve, so, too, must the FBI. We live in a time of acute and persistent terrorist and criminal threats to our national security, our economy, and indeed our communities. These diverse threats underscore the complexity and breadth of the FBI’s mission: to protect the American people and uphold the Constitution of the United States.

National Security

Capitol Violence

First and foremost, I want to assure you, your staff, and the American people that the FBI has deployed our full investigative resources and is working closely with our federal, state, local, tribal, and territorial partners to aggressively pursue those involved in criminal activity during the events of January 6, 2021. We are working closely with our federal, state, and local law enforcement partners, as well as private sector partners, to identify those responsible for the violence and destruction of property at the U.S. Capitol building who showed blatant and appalling disregard for our institutions of government and the orderly administration of the democratic process.

FBI special agents, intelligence analysts, and professional staff have been hard at work gathering evidence, sharing intelligence, and working with federal prosecutors to bring charges against the individuals involved. As we have said consistently, we do not and will not tolerate violent extremists who use the guise of First Amendment-protected activity to engage in violent criminal activity. Thus far, the FBI has arrested hundreds of individuals with regards to rioting, assault on a federal officer, property crimes violations, and conspiracy charges, and the work continues.

Overall, the FBI assesses that the January 6 siege of the Capitol Complex demonstrates a willingness by some to use violence against the government in furtherance of their political and social goals. This ideologically motivated violence underscores the symbolic nature of the National Capital Region and the willingness of some Domestic Violent Extremists (DVEs) to travel to events in this area and violently engage law enforcement and their perceived adversaries. The American people should rest assured that we will continue to work to hold accountable those individuals who participated in the violent breach of the Capitol on January 6 and any others who attempt to use violence to intimidate, coerce, or influence the American people or affect the conduct of our government.

Top Terrorism Threats

As has been stated multiple times in the past, preventing terrorist attacks, from any place, by any actor, remains the FBI’s top priority. The nature of the threat posed by terrorism, both international terrorism (IT) and domestic terrorism (DT), continues to evolve.

The greatest terrorism threat to our homeland is posed by lone actors or small cells who typically radicalize online and look to attack soft targets with easily accessible weapons. We see these threats manifested within both DVEs and homegrown violent extremists (HVEs), two distinct threats, both of which are located primarily in the United States and typically radicalize and mobilize to violence on their own. Individuals who commit violent criminal acts in furtherance of social or political goals stemming from domestic influences—some of which include racial or ethnic bias, or anti-government or anti-authority sentiments—are described as DVEs, whereas HVEs are individuals who are inspired primarily by global jihad but are not receiving individualized direction from foreign terrorist organizations (FTOs).

Domestic and homegrown violent extremists are often motivated and inspired by a mix of socio-political, ideological, and personal grievances against their targets, and more recently have focused on accessible targets to include civilians, law enforcement and the military, symbols or members of the U.S. government, houses of worship, retail locations, and mass public gatherings. Selecting these types of soft targets, in addition to the insular nature of their radicalization and mobilization to violence and limited discussions with others regarding their plans, increases the challenge faced by law enforcement to detect and disrupt the activities of lone actors before they occur.

The top threat we face from DVEs continues to be from those we categorize as racially or ethnically motivated violent extremists (RMVEs), largely those who advocate for the superiority of the white race, who were the primary source of lethal attacks perpetrated by DVEs in 2018 and 2019. It is important to note that we have also recently seen an increase in fatal DVE attacks perpetrated by anti-government or anti-authority violent extremists, specifically militia violent extremists and anarchist violent extremists. Anti-government or anti-authority violent extremists were responsible for three of the four lethal DVE attacks in 2020. Also, in 2020, we saw the first lethal attack committed by an anarchist violent extremist in over 20 years.

Consistent with our mission, the FBI does not investigate First Amendment-protected speech or association, peaceful protests, or political activity. The FBI holds sacred the rights of individuals to peacefully exercise their First Amendment freedoms. Non-violent protests are signs of a healthy democracy, not an ailing one. Regardless of their specific ideology, the FBI will aggressively pursue those who seek to hijack legitimate First Amendment-protected activity by engaging in violent criminal activity such as the destruction of property and violent assaults on law enforcement officers that we witnessed on January 6 and during protests throughout the U.S. during the summer of 2020 and beyond. In other words, we will actively pursue the opening of FBI investigations when an individual uses—or threatens the use of—force, violence, or coercion, in violation of federal law and in the furtherance of social or political goals.

The FBI assesses HVEs are the greatest, most immediate IT threat to the homeland. As I have described, HVEs are located in and radicalized primarily in the United States, who are not receiving individualized direction from global jihad-inspired FTOs but are inspired largely by the Islamic State of Iraq and ash-Sham (ISIS) and al Qaeda to commit violence. An HVE’s lack of a direct connection with an FTO, ability to rapidly mobilize without detection, and use of encrypted communications pose significant challenges to our ability to proactively identify and disrupt them.

The FBI remains concerned that FTOs, such as ISIS and al Qaeda, intend to carry out or inspire large-scale attacks in the United States. Despite its loss of physical territory in Iraq and Syria, ISIS remains relentless in its campaign of violence against the United States and our partners—both here at home and overseas. To this day, ISIS continues to aggressively promote its hate-fueled rhetoric and attract like-minded violent extremists with a willingness to conduct attacks against the United States and our interests abroad. ISIS’ successful use of social media and messaging applications to attract individuals seeking a sense of belonging is of continued concern to us. Like other foreign terrorist groups, ISIS advocates for lone offender attacks in the United States and Western countries via videos and other English-language propaganda that have at times specifically advocated for attacks against civilians, the military, law enforcement and intelligence community personnel.

Al Qaeda maintains its desire to both conduct and inspire large-scale, spectacular attacks. Because continued pressure has degraded some of the group’s senior leadership, in the near term, we assess al Qaeda is more likely to continue to focus on cultivating its international affiliates and supporting small-scale, readily achievable attacks in regions such as East and West Africa. Over the past year, propaganda from al Qaeda leaders continued to seek to inspire individuals to conduct their own attacks in the United States and other Western nations.

Iran and its global proxies and partners, including Iraqi Shia militant groups, continue to attack and plot against the United States and our allies throughout the Middle East in response to U.S. pressure. Iran’s Islamic Revolutionary Guard Corps-Qods Force (IRGC-QF) continues to provide support to militant resistance groups and terrorist organizations. Iran also continues to support Lebanese Hizballah and other terrorist groups. Lebanese Hizballah has sent operatives to build terrorist infrastructures worldwide. The arrests of individuals in the United States allegedly linked to Lebanese Hizballah’s main overseas terrorist arm, and their intelligence collection and procurement efforts, demonstrate Lebanese Hizballah’s interest in long-term contingency planning activities here in the Homeland. Lebanese Hizballah Secretary-General Hasan Nasrallah also has threatened retaliation for the death of IRGC-QF Commander Qassem Soleimani.

As an organization, we continually adapt and rely heavily on the strength of our federal, state, local, tribal, territorial, and international partnerships to combat all terrorist threats to the United States and our interests. To that end, we use all available lawful investigative techniques and methods to combat these threats while continuing to collect, analyze, and share intelligence concerning the threat posed by violent extremists, in all their forms, who desire to harm Americans and U.S. interests. We will continue to share information and encourage the sharing of information among our numerous partners via our Joint Terrorism Task Forces across the country, and our Legal Attaché offices around the world. The FBI’s FY 2022 Request includes 179 positions (including 80 special agents, 43 intelligence analysts, and 56 professional staff) and $45.0 million to counter terrorism and the increasing acts of domestic terrorism occurring across the United States.

Lawful Access

The problems caused by law enforcement agencies’ inability to access electronic evidence continue to grow. Increasingly, commercial device manufacturers have employed encryption in such a manner that only the device users can access the content of the devices. This is commonly referred to as “user-only-access” device encryption. Similarly, more and more communications service providers are designing their platforms and apps such that only the parties to the communication can access the content. This is generally known as “end-to-end” encryption. The proliferation of end-to-end and user-only-access encryption is a serious issue that increasingly limits law enforcement’s ability, even after obtaining a lawful warrant or court order, to access critical evidence and information needed to disrupt threats, protect the public, and bring perpetrators to justice.

The FBI remains a strong advocate for the wide and consistent use of responsibly managed encryption, encryption that providers can decrypt and provide to law enforcement when served with a legal order. Protecting data and privacy in a digitally connected world is a top priority for the FBI and the U.S. government, and we believe that promoting encryption is a vital part of that mission. But we have seen that the broad application of end-to-end and user-only-access encryption adds negligible security advantages. It does have a negative effect on law enforcement’s ability to protect the public. What we mean when we talk about lawful access is putting providers who manage encrypted data in a position to decrypt it and provide it to us in response to legal process. We are not asking for, and do not want, any “backdoor,” that is, for encryption to be weakened or compromised so that it can be defeated from the outside by law enforcement or anyone else. Unfortunately, too much of the debate over lawful access has revolved around discussions of this backdoor straw man instead of what we really want and need.

We are deeply concerned with the threat end-to-end and user-only-access encryption pose to our ability to fulfill the FBI’s duty of protecting the American people from every manner of federal crime, from cyber-attacks and violence against children to drug trafficking and organized crime. We believe Americans deserve security in every walk of life, in their data, their streets, their businesses, and their communities.

End-to-end and user-only-access encryption erode that security against every danger the FBI combats. For example, even with our substantial resources, accessing the content of known or suspected terrorists’ data pursuant to court-authorized legal process is increasingly difficult. The often-online nature of the terrorist radicalization process, along with the insular nature of most of today’s attack plotters, leaves fewer dots for investigators to connect in time to stop an attack—and end-to-end and user-only-access encryption increasingly hide even those often precious few and fleeting dots.

In one instance, while planning and right up until the eve of the December 6, 2019, shooting at Naval Air Station Pensacola that killed three U.S. sailors and severely wounded eight other Americans, deceased terrorist Mohammed Saeed Al-Shamrani communicated undetected with overseas al Qaeda terrorists using an end-to-end encrypted app. Then, after the attack, user-only-access encryption prevented the FBI from accessing information contained in his phones for several months. As a result, during the critical time period immediately following the shooting and despite obtaining search warrants for the deceased killer’s devices, the FBI could not access the information on those phones to identify co-conspirators or determine whether they may have been plotting additional attacks.

This problem spans international and domestic terrorism threats. Like Al-Shamrani, the plotters who sought to kidnap the Governor of Michigan late last year used end-to-end encrypted apps to hide their communications from law enforcement. Their plot was only disrupted by well-timed human source reporting and the resulting undercover operation. Subjects of our investigation into the January 6 Capitol siege used end-to-end encrypted communications as well.

We face the same problem in protecting children against violent sexual exploitation. End-to-end and user-only-access encryption frequently prevent us from discovering and searching for victims. In particular, providers can send us vital tips that can lead to the rescue of a child only when those providers themselves are able to detect and report child exploitation being facilitated on their platforms and services. They cannot do that when their platforms are end-to-end encrypted. For example, while Facebook Messenger and Apple iMessage each boasts over one billion users, in 2020, the National Center for Missing and Exploited Children (NCMEC) received over 20 million tips from Facebook, compared to 265 tips from Apple, according to NCMEC data and publicly available information. Apple’s use of end-to-end encryption, which blinds it to child sexual abuse material being transmitted through its services, likely plays a role in the disparities in reporting between the two companies. We do not know how many children are being harmed across the country as a result of this under-reporting by Apple and other end-to-end providers.

When we are able to open investigations, end-to-end and user-only-access encryption makes it much more difficult to bring perpetrators to justice. Much evidence of crimes against children, just like many other kinds of crime today, exists primarily in electronic form. If we cannot obtain that critical electronic evidence, our efforts are frequently hamstrung.

This problem is not just limited to federal investigations. Our state and local law enforcement partners have been consistently advising the FBI that they, too, are experiencing similar end-to-end and user-only-access encryption challenges, which are now being felt across the full range of state and local criminal law enforcement. Many report that even relatively unsophisticated criminal groups, like street gangs, are frequently using user-only-access encrypted smartphones and end-to-end encrypted communications apps to shield their activities from detection or disruption. As this problem becomes more and more acute for state and local law enforcement, the advanced technical resources needed to address even a single investigation involving end-to-end and user-only-access encryption will continue to diminish and ultimately overwhelm state and local capacity to investigate even common crimes.

Cyber

In 2020, nation-state and criminal cyber actors took advantage of people and networks made more vulnerable by the sudden shift of our personal and professional lives online due to the COVID-19 pandemic, targeting those searching for personal protective equipment, worried about stimulus checks, and conducting vaccine research.

Throughout the last year, the FBI has seen a wider-than-ever range of cyber actors threaten Americans’ safety, security, and confidence in our digitally connected world. But these threats will not disappear when the pandemic ends. Cyber-criminal syndicates and nation-states keep innovating ways to compromise our networks and maximize the reach and impact of their operations, such as by selling malware as a service or by targeting vendors as a way to access scores of victims by hacking just one provider.

These criminals and nation-states believe that they can compromise our networks, steal our property, and hold our critical infrastructure at risk without incurring any risk themselves. In the last year alone, we have seen, and have publicly called out, China, North Korea, and Russia for using cyber operations to target U.S. COVID-19 vaccines and research. We have seen the far-reaching disruptive impact a serious supply-chain compromise can have through the SolarWinds intrusions, conducted by the Russian SVR. We have seen China working to obtain controlled defense technology and developing the ability to use cyber means to complement any future real-world conflict. We have seen Iran use cyber means to try to sow divisions and undermine our elections, targeting voters before the November election and threatening election officials after.

As dangerous as nation-states are, we do not have the luxury of focusing on them alone. In the past year, we also have seen cyber criminals target hospitals, medical centers, and educational institutions for theft or ransomware. Such incidents affecting medical centers have led to the interruption of computer networks and systems that put patients’ lives at an increased risk at a time when America faces its most dire public health crisis in generations. And we have seen criminal groups targeting critical infrastructure for ransom, causing massive disruption to our daily lives.

We are also seeing dark web vendors who sell capabilities in exchange for cryptocurrency increase the difficulty of stopping what would once have been less dangerous offenders. What was once a ring of unsophisticated criminals now has the tools to paralyze entire hospitals, police departments, and businesses with ransomware. It is not that individual hackers alone have necessarily become much more sophisticated, but, unlike previously, they are able to rent sophisticated capabilities.

We have to make it harder and more painful for hackers and criminals to do what they are doing. That is why I announced a new FBI cyber strategy last year, using the FBI’s role as the lead federal agency with law enforcement and intelligence responsibilities to not only pursue our own actions, but to work seamlessly with our domestic and international partners to defend their networks, attribute malicious activity, sanction bad behavior, and take the fight to our adversaries overseas. We must impose consequences on cyber adversaries and use our collective law enforcement and intelligence capabilities to do so through joint and enabled operations sequenced for maximum impact. And we must continue to work with the Department of State and other key agencies to ensure that our foreign partners are able and willing to cooperate in our efforts to bring the perpetrators of cybercrime to justice.

An example of this approach is the international takedown in January 2021 of the Emotet botnet, which enabled a network of cyber criminals to cause hundreds of millions of dollars in damages to government, educational, and corporate networks. The FBI used sophisticated techniques, our unique legal authorities, and, most importantly, our worldwide partnerships to significantly disrupt the malware.

A few months ago, cybersecurity companies, including Microsoft, disclosed that hackers were using previously unknown vulnerabilities related to Microsoft Exchange software to access email servers that companies physically keep on their premises rather than in the cloud. These “zero day” vulnerabilities allowed the actors to potentially exploit victim networks, engaging in activities such as grabbing login credentials, installing malicious programs to send commands to the victim network, and stealing emails in bulk. The FBI first put out a joint advisory in partnership with the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) to give network defenders the technical information they needed to mitigate the vulnerability. However, while many infected system owners successfully removed the web shells others were not able to do so. That left many systems vulnerable to adversaries who could continue to steal information, encrypt data for ransom, or potentially even execute a destructive attack. In response, through a court-authorized operation in partnership with the private sector, we were able to copy and remove malicious web shells from hundreds of vulnerable computers in the U.S. running Microsoft Exchange Server software. This is another example of how the FBI used its unique authorities, in this case, court-issued legal process, and its partnerships with the private sector to have tangible, real-world impact on the problem.

We took upwards of 1,100 actions against cyber adversaries last year, including arrests, criminal charges, convictions, dismantlements, and disruptions, and enabled many more actions through our dedicated partnerships with the private sector, foreign partners, and at the federal, state, and local entities.

We have been putting a lot of energy and resources into all of those partnerships, especially with the private sector. We are working hard to push important threat information to network defenders, but we have also been making it as easy as possible for the private sector to share important information with us. For example, we are emphasizing to the private sector how we keep our presence unobtrusive in the wake of a breach; how we protect information that companies, and universities share with us, and commit to providing useful feedback; and how we coordinate with our government partners so that we are speaking with one voice. But we need the private sector to do its part, too. We need the private sector to come forward to warn us—and warn us quickly—when they see malicious cyber activity. We also need the private sector to work with us when we warn them that they are being targeted. The recent examples of significant cyber incident—SolarWinds, HAFNIUM, the pipeline incident—only emphasize what I have been saying for a long time: The government cannot protect against cyber threats on its own. We need a whole-of-society approach that matches the scope of the danger. There is really no other option for defending a country where nearly all of our critical infrastructure, personal data, intellectual property, and network infrastructure sits in private hands.

In summary, the FBI is engaged in a myriad of efforts to combat cyber threats, from improving threat identification and information sharing inside and outside of the government to developing and retaining new talent, to examining the way we operate to disrupt and defeat these threats. We take all potential threats to public and private sector systems seriously and will continue to investigate and hold accountable those who pose a threat in cyberspace. The FY 2022 Request includes 155 positions (including 52 special agents, 57 intelligence analysts, and 46 professional staff) and $40.0 million to enhance cyber information-sharing abilities and increase cyber tools and capacities. The request also includes 22 positions and $15.23 million to help protect internal FBI networks.

Foreign Influence

Our nation is confronting multifaceted foreign threats seeking to both influence our national policies and public opinion, and cause harm to our national dialogue. The FBI and our interagency partners remain concerned about, and focused on, the covert and overt influence measures used by certain adversaries in their attempts to sway U.S. voters’ preferences and perspectives, shift U.S. policies, increase discord in the United States, and undermine the American people’s confidence in our democratic processes.

Foreign influence operations—which include subversive, undeclared, coercive, and criminal actions by foreign governments to influence U.S. political sentiment or public discourse or interfere in our processes themselves—are not a new problem. But the interconnectedness of the modern world, combined with the anonymity of the Internet, have changed the nature of the threat and how the FBI and its partners must address it. Foreign influence operations have taken many forms and used many tactics over the years. Most widely reported these days are attempts by adversaries—hoping to reach a wide swath of Americans covertly from outside the United States—to use false personas and fabricated stories on social media platforms to discredit U.S. individuals and institutions.

The FBI is the lead federal agency responsible for investigating foreign influence operations. In the fall of 2017, we established the Foreign Influence Task Force (FITF) to identify and counteract malign foreign influence operations targeting the United States. The FITF is led by the Counterintelligence Division and is comprised of agents, analysts, and professional staff from the Counterintelligence, Cyber, Counterterrorism, and Criminal Investigative divisions. It is specifically charged with identifying and combating foreign influence operations targeting democratic institutions and values inside the United States. In all instances, the FITF strives to protect democratic institutions; develop a common operating picture; raise adversaries’ costs; and reduce their overall asymmetric advantage.

The FITF brings the FBI’s national security and traditional criminal investigative expertise under one umbrella to prevent foreign influence in our elections. This better enables us to frame the threat, to identify connections across programs, to aggressively investigate as appropriate, and  importantly, to be more agile. Coordinating closely with our partners and leveraging relationships we have developed in the technology sector, we had several instances where we were able to quickly relay threat indicators that those companies used to take swift action, blocking budding abuse of their platforms.

Following the 2018 midterm elections, we reviewed the threat and the effectiveness of our coordination and outreach. As a result of this review, we further expanded the scope of the FITF. Previously, our efforts to combat malign foreign influence focused solely on the threat posed by Russia. Utilizing lessons learned since 2018, the FITF widened its aperture to confront malign foreign operations of China, Iran, and other global adversaries. To address this expanding focus and wider set of adversaries and influence efforts, we have also added resources to maintain permanent “surge” capability on election and foreign influence threats.

These additional resources were also devoted to working with U.S. government partners on two documents regarding the U.S. Government’s analysis of foreign efforts to influence or interfere with the 2020 election. The reports are separate but complementary. The first report, referred to as the 1a report and authored by the Office of the Director of National Intelligence, outlines the intentions of foreign adversaries with regard to influencing and interfering in the election but does not evaluate impact. The second report, referred to as the 1b report and authored by the Department of Justice, including the FBI, and Department of Homeland Security, and the CISA, evaluates the impact of foreign government activity on the security or integrity of election infrastructure or infrastructure pertaining to political organizations, candidates, or campaigns.

The main takeaway from both reports is there is no evidence, not through intelligence collection on the foreign actors themselves, not through physical security and cybersecurity monitoring of voting systems across the country, not through post-election audits, and not through any other means, that a foreign government or other actors compromised election infrastructure to manipulate election results.

While the 2020 election is over, the FBI will not stop working with our partners to impose costs on adversaries who have or are seeking to influence or interfere in our elections.

The FY 2022 Request includes 28 positions (including 7 special agents, 4 intelligence analysts, and 17 professional staff) and $18.8 million to help combat the threats posed by foreign, and potentially hostile, intelligence services, and other foreign government actors.

Criminal Threats

We face many criminal threats, from complex white-collar fraud in the financial, health care, and housing sectors to transnational and regional organized criminal enterprises to violent crime and public corruption. Criminal organizations, domestic and international, and individual criminal activity represent a significant threat to our security and safety in communities across the nation.

Violent Crime

Violent crimes and gang activities exact a high toll on individuals and communities. Many of today’s gangs are sophisticated and well organized, and use violence to control neighborhoods and boost their illegal money-making activities, which include robbery, drug and gun trafficking, fraud, extortion, and prostitution rings. These gangs do not limit their illegal activities to single jurisdictions or communities. The FBI is able to work across such lines, which is vital to the fight against violent crime in big cities and small towns across the nation. Every day, FBI special agents work in partnership with federal, state, local, and Tribal officers and deputies on joint task forces and individual investigations.

Similar to the FBI’s work combatting gangs, the FBI also investigates the most serious crimes in Indian Country—such as murder, child sexual and physical abuse, violent assaults, drug trafficking, public corruption, financial crimes, and Indian gaming violations. As you are aware, there are 574 federally recognized American Indian tribes in the United States, and the FBI has federal law enforcement responsibility on nearly 200 Indian reservations. This federal jurisdiction is shared concurrently with the Bureau of Indian Affairs (BIA), Office of Justice Services; the FBI works very closely with BIA and other federal, state, and tribal partners across the United States on crimes in Indian Country.

Recently, the FBI’s work in Indian Country in Oklahoma increased significantly due to the July 9, 2020, Supreme Court ruling in McGirt v. Oklahoma, which determined that the territorial boundaries of the Muscogee Creek Nation fall under federal Indian Country jurisdiction, making the FBI the responsible law enforcement agency for offenses committed by or victimizing a tribal member. The principles of the McGirt decision also apply to the status of the Cherokee, Chickasaw, Choctaw, and Seminole tribal territories in Oklahoma. Combined, all five reservation territories encompass approximately 32,000 square miles, or 45 percent of the state of Oklahoma. The total population within the combined borders is roughly 1.9 million, of which approximately 420,000 are enrolled tribal members.

This increase in FBI jurisdiction poses significant and long-term operational and public safety risks given the challenges associated with the increased number of violent criminal cases now under federal jurisdiction within Oklahoma’s IC territory. Since this decision, the FBI’s Oklahoma City Field Office has seen a drastic increase in the total number of Indian Country investigations and now has the FBI’s largest investigative responsibility. From July 9, 2020 to March 23, 2021, FBI Oklahoma City opened nearly 1,000 Indian Country investigations (most of them adopted from previous state actions), prioritizing cases involving the most violent offenders who pose the most serious risk to the public. As a point of comparison, the FBI’s other 55 Field Offices opened a combined total of 1,255 IC investigations during the same period, with FBI Minneapolis, the next largest Indian Country office behind FBI OC, opening over 300 cases. This workload data primarily represents the cases from the MCN reservation alone; this workload is expected to increase substantially given the additions of the Cherokee and Chickasaw reservations in mid-March and the Choctaw and Seminole reservations in April. The FBI is anticipating 2,500 new cases next year and approximately 5,000 adopted cases from previously adjudicated in Oklahoma state courts which were overturned either by McGirt or subsequent Oklahoma court decisions applying McGirt.

To effectively conduct these investigations, the FBI has conducted temporary duty (TDY) rotations of 140 special agents, investigative analysts, victims specialists and other professional staff to the Muskogee and Tulsa RAs, the offices most impacted by the decision. The FBI has also expanded state, local, and tribal participation on task forces to 230 task force officers from 32 agencies to assist with initial response and investigative efforts. The U.S. Attorney’s Offices in the Eastern District of Oklahoma and the Northern District of Oklahoma also increased their staffing. In order to support the U.S. Attorneys’ effective prosecution of these crimes, the FBI must have the capability to sustain an enhanced presence in FBI Oklahoma City. As such, the FY 2022 Request includes $25.5 million to support the surge in personnel to meet the immediate need, as the situation on the ground continues to evolve. In addition, the FY 2022 Request includes $6.2 million to fulfill the Department of Justice’s October 2020, policy on use of body-worn cameras by federally deputized task force officers.

Conclusion

Finally, the strength of any organization is its people. The threats we face as a nation have never been greater or more diverse and the expectations placed on the FBI have never been higher. Our fellow citizens look to the FBI to protect the United States from all of those threats, and the men and women of the FBI continue to meet and exceed those expectations, every day. I want to thank them for their dedicated service.

Chairwoman Shaheen, Ranking Member Moran, and members of the subcommittee, thank you for the opportunity to testify today. I am happy to answer any questions you might have.

1Facebook is planning to move its Facebook Messenger platform to end-to-end encryption as a default in the near future. This will result in the loss of most of these tips.

2These reports are required by sections 1(a) and 1(b) of Executive Order 13,848.

Security News in Brief: Attorney General Garland and Civil Rights Division Assistant Attorney General Clarke Commemorate the 31st Anniversary of the Americans with Disabilities Act

Source: United States Department of Justice 2

Today, Attorney General Merrick B. Garland and Assistant Attorney General for the Civil Rights Division Kristen Clarke issued the following statements to mark the 31st Anniversary of the Americans with Disabilities Act (ADA), the nation’s preeminent civil rights law that provides equal opportunity for people with disabilities.

Security News in Brief: DOJ and HHS Issue Guidance on ‘Long COVID’ and Disability Rights Under the ADA, Section 504, and Section 1557

Source: United States Department of Justice 2

Today, as we commemorate the 31st anniversary of the Americans with Disabilities Act (ADA), the U.S. Department of Justice (DOJ) and the U.S. Department of Health and Human Services (HHS) are jointly publishing guidance on how “long COVID” can be a disability under the ADA, Section 504 of the Rehabilitation Act and Section 1557 of the Affordable Care Act. The guidance is on the DOJ website at https://www.ada.gov/long_covid_joint_guidance.pdf – PDF and on the HHS website at https://www.hhs.gov/civil-rights/for-providers/civil-rights-covid19/index.html.