FBI director says agency has become 'flexible and agile'

The FBI is using new anti-terrorism powers in a responsible manner, is boosting its intelligence capabilities and is progressing toward upgrading what agency officials have acknowledged as weak information technology capabilities, Director Robert Mueller said on Wednesday.

Testifying before the Senate Judiciary Committee jointly with Asa Hutchinson, undersecretary for border and transportation security at the Homeland Security Department, Mueller trumpeted the bureau's progress in its quest to become a "more flexible and agile" agency.

He particularly highlighted the bureau's progress in upgrading its antiquated computer systems and its ability to make use of the 2001 USA PATRIOT Act, which he said has greatly aided the fight against terrorism.

Mueller praised a provision in the PATRIOT Act that lets criminal prosecutors use information obtained under the Foreign Intelligence Surveillance Act. He said the change "effectively dismantled the wall between law enforcement and intelligence personnel. The resulting free flow of information and coordination between law enforcement and intelligence has expanded our ability to use all appropriate resources to prevent terrorism."

He also highlighted two other key provisions of the law: the ability for prosecutors to obtain nationwide court orders in terrorism cases and its anti-money-laundering features.

But Mueller did not mention two PATRIOT Act provisions that have become increasingly controversial. One lets investigators access library, bookstore and other business records under FISA, and the other lets investigators conducted secret searches of property.

Privacy advocates succeeded Tuesday in getting the House to vote to bar the latter provision. The vote came on an amendment to the fiscal 2004 spending bill for the Commerce, Justice and State departments.

Electronic surveillance conducted under foreign intelligence law continues to rely upon a lower standard than surveillance conducted under criminal law: probable cause to believe that the individual is a foreign agent, as opposed to the criminal law's standard of probable cause to believe that the target has broken the law.

But the provision of the PATRIOT Act opened the door for criminal prosecutors to use FISA wiretaps and to direct the conduct of such surveillance. A November ruling by the 2002 FISA Court of Review affirmed the Justice Department's position encouraging broader use of such wiretaps.

Mueller also noted that the FBI implemented a common information technology platform in March 2003 and anticipates completion of its "virtual case file" by the end of the year.

But senators from both parties put the agency on notice that they are watching its progress in updating its computer capabilities. "We all know what a sorry state of affairs it was when you came into office," said Sen. Mike DeWine, R-Ohio. "Everyone on this panel has complained about" your computer systems.

Sen. Richard Durbin, D-Ill., also asked Hutchinson whether Homeland Security is seeking to integrate its computers with those of the Justice Department and the FBI. He replied that the agency's chief information officer had his hands full in integrating pre-existing agencies' systems, hence information sharing is currently limited to "watch lists" of terrorism suspects.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.