FBI takes terrorist investigation online

In the hours following attacks on the World Trade Center and the Pentagon Sept. 11, the FBI moved quickly to mount an investigation of unprecedented scale. One of its first steps was to generate tips from the public by establishing a toll-free, national telephone hot line. Then it looked for a Web site that could do the same thing. Dennis Lormel, section chief for the agency's financial crime division, told FBI leaders that such a site was already in place, and that it could serve as a clearinghouse for potential leads in the effort to track down those responsible for the attacks.

Within 90 minutes, the Internet Fraud Complaint Center (IFCC), established in May 2000 to handle complaints of online consumer swindles, was receiving large numbers of tips from people around the world and disseminating them throughout the agency and the intelligence community, said Bob Pocica, the FBI supervisory special agent who helps run IFCC. Attorney General John Ashcroft immediately announced that the site, www.ifccfbi.gov, was open for business. As of 3:30 Sept. 18, the Web site had received more than 54,000 online tips, making it the FBI's most valuable source of potential leads in the investigation, according to Ashcroft. By comparison, the FBI's telephone hotline provided nearly 9,000 tips and FBI field offices contributed more than 33,000 tips. "The Internet really blows all the other figures to pieces," said FBI spokeswoman Debbie Weierman. "This is the biggest investigation the FBI has ever been involved in-there's no doubt about it," Pocica said. He added that even the investigation of the Unabomber, which lasted 17 years and involved state and local law enforcement agencies across the country, doesn't equal the effort mounted by the FBI in the past seven days. Pocica believes IFCC has been invaluable in that effort. "Thank God we had it in place," he said. Pocica said tips are coming in from all over the world, from people who believe they know something relevant to the investigation or know someone who might be involved. At this point, he said, the FBI's mission is to gather evidence from which an indictment could be secured and a prosecution made. Pocica said the influx of international tips showcases the Internet's special ability to aid law enforcement. People living overseas are unlikely to pick up a phone and call the FBI's hotline, Pocica said. But anyone with an Internet connection can contribute potentially valuable information. The Web site hasn't changed the FBI's traditional case management system. Once a tip arrives, an FBI analyst reviews the message, and an agent supervisor assesses its value and decides whether to treat it as a lead and forward it to the appropriate law enforcement or intelligence personnel, said Pocica. In general, the more specific the information, the more likely it will be given high priority, he explained. Pocica could not reveal the nature of the information IFCC is handling, but said the site has received "substantial productive leads." Once the site was up and running at the IFCC offices, a second team of analysts was added to the operation at FBI headquarters in Washington, doubling the staff. Using a Web-based system allows anyone with Internet access to work on the operation, no matter where they are located, Pocica said. Pocica said this use of the IFCC heralds a new era in law enforcement and in the government's approach to conducting business online. "For e-government, for e-commerce, for e-everything, this is what we have to be doing," he said.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.