Language Selection

English French German Italian Portuguese Spanish

FBI wants more subpoena power

Filed under
Security

FBI Director Robert Mueller said Wednesday that Congress should give the agency the power to issue its own subpoenas, instead of having to get approval for them from a court, so that it can collect information more quickly in terrorism investigations.

Mueller said North Carolina State University initially rebuffed FBI investigators this month when they sought enrollment records for a former graduate student suspected of being linked to the London bombings because the investigators did not have a subpoena.

Although the FBI eventually obtained subpoenas and the records, Mueller used the episode to argue to the Senate Judiciary Committee that the bureau needs the new subpoena power.

"We should've been able to have a document, an administrative subpoena, that we took to the university and got those records immediately," Mueller told the committee.

Lawmakers are trying to determine whether to include FBI subpoena power for gathering anti-terror intelligence in a package of amendments to the USA Patriot Act.

Mueller said he objects to any oversight of an FBI subpoena outside of the bureau.

But Sen. Dianne Feinstein (D-Calif.) said she is leery of giving the FBI anti-terror subpoena power without some Justice Department supervision. The FBI already has the authority to issue administrative subpoenas in certain kinds of cases.

Feinstein said an agent seeking to issue a subpoena should be required to justify the need for it to an assistant U.S. attorney because of the possibility that the FBI would amass information about innocent people.

"The resistance to this makes me suspicious," she said.

At North Carolina State, the FBI sought records for Magdy el-Nashar, an Egyptian who attended the university in 2000 and was believed to have rented a house in Leeds, England, near where four bombs used in the July 7 attacks in London are thought to have been made. The attacks killed 56 people.

El-Nashar, who is wanted for questioning by British authorities, has been detained in Egypt. Officials there have said he has no links to the bombings.

In a statement, the university said that under federal privacy laws, it could not turn over records without a subpoena. In all, North Carolina State eventually was served with three subpoenas pertaining to el-Nashar, the statement said.

Mueller's visit to Capitol Hill coincided with the release of a report by Justice Department Inspector General Glenn Fine that found continued shortcomings in FBI efforts to translate a backlog of foreign-language material, including information related to counterterrorism.

The report found that the FBI now has 8,354 hours of tape recordings involving counterterrorism topics waiting to be reviewed, up from 4,086 hours a year ago. But Fine found that the bureau is up-to-date in translating material deemed "highest priority," a category that includes information relating to Al Qaeda terrorism cases.

On another sore subject for the agency, Mueller said the FBI has made "substantial progress" in upgrading its much maligned technology systems. He said the bureau has bought more powerful computers and built a new secure network.

A contractor for a new case management system, code-named Sentinel, is expected to be selected by the end of the year, he said. Sentinel is slated to be implemented in four stages over 40 months, ending in 2009.

An earlier attempt at a case management systemwas scrapped after three years and an expenditure of $170 million.

By Andrew Zajac
Washington Bureau

More in Tux Machines

Red Hat's Survey in India

From Raspberry Pi to Supercomputers to the Cloud: The Linux Operating System

Linux is widely used in corporations now as the basis for everything from file servers to web servers to network security servers. The no-cost as well as commercial availability of distributions makes it an obvious choice in many scenarios. Distributions of Linux now power machines as small as the tiny Raspberry Pi to the largest supercomputers in the world. There is a wide variety of minimal and security hardened distributions, some of them designed for GPU workloads. Read more

IBM’s Systems With GNU/Linux

  • IBM Gives Power Systems Rebates For Linux Workloads
    Big Blue has made no secret whatsoever that it wants to ride the Linux wave up with the Power Systems platform, and its marketeers are doing what they can to sweeten the hardware deals as best they can without adversely affecting the top and bottom line at IBM in general and the Power Systems division in particular to help that Linux cause along.
  • Drilling Down Into IBM’s System Group
    The most obvious thing is that IBM’s revenues and profits continue to shrink, but the downside is getting smaller and smaller, and we think that IBM’s core systems business will start to level out this year and maybe even grow by the third or fourth quarter, depending on when Power9-based Power Systems and z14-based System z mainframes hit the market. In the final period of 2016, IBM’s overall revenues were $21.77 billion, down 1.1 percent from a year ago, and net income rose by nearly a point to $4.5 billion. This is sure a lot better than a year ago, when IBM’s revenues fell by 8.4 percent to $22 billion and its net income fell by 18.6 percent to $4.46 billion. For the full 2016 year, IBM’s revenues were off 2.1 percent to $79.85 billion, but its “real” systems business, which includes servers, storage, switching, systems software, databases, transaction monitors, and tech support and financing for its own iron, fell by 8.3 percent to $26.1 billion. (That’s our estimate; IBM does not break out sales this way, but we have some pretty good guesses on how it all breaks down.)

Security News

  • DB Ransom Attacks Spread to CouchDB and Hadoop [Ed: Get sysadmins who know what they are doing, as misconfigurations are expensive]
  • Security advisories for Monday
  • Return on Risk Investment
  • Widely used WebEx plugin for Chrome will execute attack code—patch now!
    The Chrome browser extension for Cisco Systems WebEx communications and collaboration service was just updated to fix a vulnerability that leaves all 20 million users susceptible to drive-by attacks that can be carried out by just about any website they visit.
  • DDoS attacks larger, more frequent and complex says Arbor
    Distributed denial-of-service (DDoS) attacks are becoming more frequent and complex, forcing businesses to deploy purpose-built DDoS protection solutions, according to a new infrastructure security report which warns that the threat landscape has been transformed by the emergence of Internet of Things (IoT) botnets. The annual worldwide infrastructure security report from Arbor Networks - the security division of NETSCOUT - reveals that the largest distributed denial-of-service (DDoS) attack reported in 2016 was 800 Gbps, a 60% increase over 2015’s largest attack of 500 Gbps.