STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES

Similar documents
Finland's response

COUNCIL OF THE EUROPEAN UNION. Brussels, 29 October /09 JAIEX 79 RELEX 981 ASIM 114 CATS 112 JUSTCIV 224 USA 93 NOTE

COUNCIL OF EUROPE AND THE INTERNET

CYBER CRIMES CENTER U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT DEPARTMENT OF HOMELAND SECURITY BEFORE THE U.S. HELSINKI COMMISSION.

Statement for the Record. House Judiciary Subcommittee on Crime, Terrorism and Homeland Security. Hearing on Reauthorizing the Patriot Act

Next- Generation National Security and Public Safety in Europe

UN Presentation- Combating the Evolving Threat from Foreign Terrorist Fighters

AUSSIE ISLAMIC LEADERS UNITE AGAINST TERRORISM

Northern California Regional Intelligence Center

BUSINESS LAW Chapter 3 PowerPoint Notes & Assignment Criminal Law

DHS Biometrics Strategic Framework

Anti-Cyber Crime Law (8 Rabi / 26 March 2007)

Statement of. Michael P. Downing Assistant Commanding Officer Counter-Terrorism/Criminal Intelligence Bureau Los Angeles Police Department.

UN Security Council Resolution on Foreign Terrorist Fighters (FTFs)

Testimony of Peter P. Swire

Analysis of Directive 2013/40/EU on attacks against information systems in the context of approximation of law at the European level

21st Century Policing: Pillar Three - Technology and Social Media and Pillar Four - Community Policing and Crime Reduction

LEGAL GUIDE TO RELEVANT CRIMINAL OFFENCES IN WESTERN AUSTRALIA

Transnational Radical Party (TRP) FILLING THE "DEMOCRATIC DIGITAL DIVIDE"

8799/17 1 DPG LIMITE EN

Statement of Mr. Vladimir Voronkov, Under-Secretary-General of the United Nations Office of Counter-Terrorism

PC.DEL/764/08 15 September ENGLISH only

INTERPOL s face programme for a safer world. Mark Branchflower Monday 17th March 2014

February 8, The Honorable Jerrold Nadler Chairman U.S. House Committee on the Judiciary 2141 Rayburn House Office Building Washington, DC 20515

Written Testimony of Marc J. Zwillinger. Founder. ZwillGen PLLC. United States Senate Committee on the Judiciary. Hearing on

Countering Violent Extremism (CVE) How to fight the monster? Author: Selim Ibraimi, MA

Measures to prevent the recruitment and radicalization of young persons by international terrorist groups

Following the Money to Combat Terrorism, Crime and Corruption

Police and Crime Needs Assessment. Karen Sleigh Chief Inspector Andy Burton

Safeguarding Children and Young People Statement

Roma Lyon Group s First Report on the Implementation of the G7 Action Plan on Countering Terrorism and Violent Extremism

Justice for Victims of Trafficking Act Section-by-Section Analysis

Scenarios for discussion*

The Convention on Cybercrime: A framework for legislation and international cooperation for countries of the Americas

January 14, Dear Chairman Graham and Ranking Member Feinstein:

Legal Supplement Part C to the Trinidad and Tobago Gazette, Vol. 56, No. 52, 18th May, 2017

CONFERENCE COMMITTEE REPORT BRIEF HOUSE SUBSTITUTE FOR SENATE BILL NO. 40

6.0 ENSURING SAFETY AND JUSTICE

Chapter 11 The use of intelligence agencies capabilities for law enforcement purposes

STATEMENT STEVEN G. BRADBURY ACTING ASSISTANT ATTORNEY GENERAL OFFICE OF LEGAL COUNSEL DEPARTMENT OF JUSTICE

10880/17 GdK/lwp 1 CAB LIMITE EN

STATEMENT OF JOHN MORTON DIRECTOR U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT REGARDING A HEARING ON IMMIGRATION ENFORCEMENT BEFORE THE

Tackling Extremism and Radicalisation Policy. Linked to Child Protection and Safeguarding Policy

G8 Declaration on Counter Terrorism

This Bill contains 4 Parts and seeks to provide for the prevention and punishment of electronic crimes.

Spying on humanitarians: implications for organisations and beneficiaries

30 June 1 July 2015, Hofburg, Vienna

The Measurement of Child Sex Trafficking and Exploitation

Report on community resilience to radicalisation and violent extremism

Speech by Prime Minister Erna Solberg at the UN Crime Commision-meeting i Vienna, 14 May 2018.

TOP SECRET!/COMOO'//NO.i'ORN

Encryption & FBI vs Apple. Sophie Park & Shanelle Roman

ICAO AVIATION SECURITY GLOBAL RISK CONTEXT STATEMENT. (Extract)

Preventing Violent Extremism A Strategy for Delivery

S. J. RES. ll [Report No. 113 lll]

Encryption: Balancing the Needs of Law Enforcement and the Fourth Amendment

GAO DEPARTMENT OF STATE. Undercover Tests Reveal Significant Vulnerabilities in State s Passport Issuance Process. Report to Congressional Requesters

Combating Homegrown Terrorism. Written testimony of: Seamus Hughes Deputy Director, Program on Extremism The George Washington University

Decision Making Process

Office of the Police and Crime Commissioner for Surrey

Ada, National College for Digital Skills supports the Home Office 4P Prevent strategy to combat radicalisation and terrorism.

Declaration of Washington, District of Columbia Governing Council Ministerial September 15, 2017

Preventing Radicalisation Policy

Issue Brief for Congress

tinitrd~tat s~fnatf WASHINGTON, DC 20510

History & Sex Trafficking Lesson Plan

Counter-Extremism Strategy

Agreement on counter-terrorism measures

STATEMENT OF. David V. Aguilar Chief Office of Border Patrol U.S. Customs and Border Protection Department of Homeland Security BEFORE

LEGAL GUIDE TO RELEVANT CRIMINAL OFFENCES IN TASMANIA

IC Repealed (As added by P.L , SEC.244. Repealed by P.L , SEC.15.)

School Prevent Policy Protecting Children from Extremism and Radicalisation

"Responses to the threat of terrorism and effects on communities

PROTECTING THE VULNERABLE

NCSL SUMMARY P.L (HR 4472)

NEW YORK IDENTITY THEFT RANKING BY STATE: Rank 6, Complaints Per 100,000 Population, Complaints (2007) Updated January 25, 2009

Concept Note: Preventing of ideas radicalization Author: Séraphin ALAVA

OUR PURSUIT Develop a passion for learning. If you do, you will never cease to grow. Anthony J. Angelo

Somali Police Force The Commissioner

BREACHES OF INFORMATION SECURITY: A U.S. COMPANY S OBLIGATIONS

Issue Brief for Congress

Statement of Dennis C. Blair before The Senate Select Committee on Intelligence United States Senate January 22, 2009

Countering Violent Extremism and Radical Rhetoric

THE SURVEILLANCE AND COMMUNITY SAFETY ORDINANCE

Consumer Attitudes About Biometric Authentication

RESOLUTION ON PREVENTING AND COUNTERING TERRORISM AND VIOLENT EXTREMISM AND RADICALIZATION THAT LEAD TO TERRORISM 1

Delegations will find attached the conclusions adopted by the European Council at the above meeting.

Selected Federal Data Security Breach Legislation

DOMESTIC VIOLENCE. DRAFT 20 March By Order of the Police Commissioner

WCAML Forum. The Challenges of Terrorist Financing in 2014 and Beyond. May 7, Dennis M. Lormel President & CEO DML Associates, LLC

OKLAHOMA IDENTITY THEFT RANKING BY STATE: Rank 25, 63.9 Complaints Per 100,000 Population, 2312 Complaints (2007) Updated January 10, 2009

DECLARATION ON TRANSATLANTIC RELATIONS *

Steering and Follow-Up Committee Meeting. Cairo, November Opening statement by. Ms. Cristina Albertin

PROPOSED POLICY RECOMMENDATIONS FOR THE HIGH LEVEL CONFERENCE

Recommendation for a COUNCIL DECISION

Computer Search and Seizure

Small Group Discussion:

Written Testimony of

EU Strategy to Combat Organized Crime, EU Anti-Terrorism Policy and EU-US-Candidate States Law Enforcement Cooperation

SUPPLEMENTAL NOTE ON HOUSE SUBSTITUTE FOR SENATE BILL NO. 40

Transcription:

STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES AT A HEARING ENTITLED ENCRYPTION TIGHTROPE: BALANCING AMERICANS SECURITY AND PRIVACY PRESENTED MARCH 1, 2016

James B. Comey Director Federal Bureau of Investigation Before the Committee on the Judiciary U.S. House of Representatives At a Hearing Entitled Encryption Tightrope: Balancing Americans Security and Privacy Presented March 1, 2016 Good morning, Chairman Goodlatte, Ranking Member Conyers, and members of the Committee. Thank you for the opportunity to appear before you today to discuss the challenges to public safety and national security that have eroded our ability to obtain electronic information and evidence pursuant to a court order or warrant. In recent years, new methods of electronic communication have transformed our society, most visibly by enabling ubiquitous digital communications and facilitating broad e-commerce. As such, it is important for our global economy and our national security to have strong encryption standards. The development and robust adoption of strong encryption is a key tool to secure commerce and trade, safeguard private information, promote free expression and association, and strengthen cyber security. We are on the frontlines of the fight against cyber crime, and we know first-hand the damage that can be caused by those who exploit vulnerable and insecure systems. We support and encourage the use of secure networks to prevent cyber threats to our critical national infrastructure, our intellectual property, and our data so as to promote our overall safety. American citizens care deeply about privacy, and rightly so. Many companies have been responding to a market demand for products and services that protect the privacy and security of their customers. This has generated positive innovation that has been crucial to the digital economy. We, too, care about these important principles. Indeed, it is our obligation to uphold civil liberties, including the right to privacy. We have always respected the fundamental right of people to engage in private communications, regardless of the medium or technology. Whether it is instant messages, texts, or old-fashioned letters, citizens have the right to communicate with one another in private

without unauthorized government surveillance not simply because the Constitution demands it, but because the free flow of information is vital to a thriving democracy. The benefits of our increasingly digital lives, however, have been accompanied by new dangers, and we have been forced to consider how criminals and terrorists might use advances in technology to their advantage. For example, malicious actors can take advantage of the Internet to covertly plot violent robberies, murders, and kidnappings; sex offenders can establish virtual communities to buy, sell, and encourage the creation of new depictions of horrific sexual abuse of children; and individuals, organized criminal networks, and nation-states can exploit weaknesses in our cyber-defenses to steal our sensitive, personal information. Investigating and prosecuting these offenders is a core responsibility and priority of the Department of Justice. As national security and criminal threats continue to evolve, the Department has worked hard to stay ahead of changing threats and changing technology. We must ensure both the fundamental right of people to engage in private communications as well as the protection of the public. One of the bedrock principles upon which we rely to guide us is the principle of judicial authorization: that if an independent judge finds reason to believe that certain private communications contain evidence of a crime, then the Government can conduct a limited search for that evidence. For example, by having a neutral arbiter the judge evaluate whether the Government s evidence satisfies the appropriate standard, we have been able to protect the public and safeguard citizens Constitutional rights. The more we as a society rely on electronic devices to communicate and store information, the more likely it is that information that was once found in filing cabinets, letters, and photo albums will now be stored only in electronic form. We have seen case after case from homicides and kidnappings, to drug trafficking, financial fraud, and child exploitation where critical evidence came from smart phones, computers, and online communications. When changes in technology hinder law enforcement s ability to exercise investigative tools and follow critical leads, we may not be able to root out the child predators hiding in the shadows of the Internet, or find and arrest violent criminals who are targeting our neighborhoods. We may not be able to identify and stop terrorists who are using social media to recruit, plan, and execute an attack in our country. We may not be able to recover critical information from a device that belongs to a victim who cannot provide us with the password, especially when time is of the essence. These are not just theoretical concerns. We continue to identify individuals who seek to join the ranks of foreign fighters traveling in support of the Islamic State of Iraq and the Levant, commonly known as ISIL, and 2 -

also homegrown violent extremists who may aspire to attack the United States from within. These threats remain among the highest priorities for the FBI, and the United States Government as a whole. Of course, encryption is not the only technology terrorists and criminals use to further their ends. Terrorist groups, such as ISIL, use the Internet to great effect. With the widespread horizontal distribution of social media, terrorists can spot, assess, recruit, and radicalize vulnerable individuals of all ages in the United States either to travel or to conduct a homeland attack. As a result, foreign terrorist organizations now have direct access into the United States like never before. Some of these conversations occur in publicly accessed social networking sites, but others take place via private messaging platforms. These encrypted direct messaging platforms are tremendously problematic when used by terrorist plotters. We are seeing more and more cases where we believe significant evidence resides on a phone, a tablet, or a laptop evidence that may be the difference between an offender being convicted or acquitted. If we cannot access this evidence, it will have ongoing, significant impacts on our ability to identify, stop, and prosecute these offenders. We would like to emphasize that the Going Dark problem is, at base, one of technological choices and capability. We are not asking to expand the Government s surveillance authority, but rather we are asking to ensure that we can continue to obtain electronic information and evidence pursuant to the legal authority that Congress has provided to us to keep America safe. The rules for the collection of the content of communications in order to protect public safety have been worked out by Congress and the courts over decades. Our country is justifiably proud of the strong privacy protections established by the Constitution and by Congress, and the FBI fully complies with those protections. The core question is this: Once all of the requirements and safeguards of the laws and the Constitution have been met, are we comfortable with technical design decisions that result in barriers to obtaining evidence of a crime? The debate so far has been a challenging and highly charged discussion, but one that we believe is essential to have. This includes a productive and meaningful dialogue on how encryption as currently implemented poses real barriers to law enforcement s ability to seek information in specific cases of possible national security threat. Mr. Chairman, we believe that the challenges posed by the Going Dark problem are grave, growing, and extremely complex. At the outset, it is important to emphasize that we believe that there is no one-size-fits-all strategy that will ensure progress. All involved must continue to ensure that citizens legitimate privacy 3 -

interests can be effectively secured, including through robust technology and legal protections. We must continue the current public debate about how best to ensure that privacy and security can co-exist and reinforce each other, and continue to consider all of the legitimate concerns at play, including ensuring that law enforcement can keep us safe. 4 -