The Activities of the Federal Bureau of Investigation: Hearing Before the Subcommittee on Crime of the Committee on the Judiciary, House of Representatives, One Hundred Fifth Congress, First Session, on the Activities of the Federal Bureau of Investigation, Part 2

Front Cover

From inside the book

Other editions - View all

Common terms and phrases

Popular passages

Page 29 - SHEILA JACKSON LEE, A REPRESENTATIVE IN CONGRESS FROM THE STATE OF TEXAS Thank you, Mr. Chairman, for convening this important hearing.
Page 29 - Ms. Jackson Lee, you are recognized for 5 minutes. Ms. JACKSON LEE. Thank you very much, Mr. Chairman. And I appreciate, by unanimous consent, to allow my opening statement to be submitted for the record.
Page 9 - Embassies and posts, it is important that we do not lose sight of the...
Page 22 - NEEDS. IN MY OPINION, THE ENACTMENT OF THESE BILLS WOULD HAVE A SERIOUS NEGATIVE IMPACT ON PUBLIC SAFETY AND NATIONAL SECURITY. ANY SOLUTION THAT IGNORES THE PUBLIC SAFETY AND NATIONAL SECURITY CONCERNS RISKS GRAVE HARM TO BOTH. MULTIPOINT ELECTRONIC SURVEILLANCE AUTHORITY: MODERN TELEPHONE TECHNOLOGY HAS CREATED ISSUES NEVER ENVISIONED IN 1968 WHEN WIRETAPPING WAS FIRST AUTHORIZED. WE NOW SEE CRIMINALS WHO BUY DOZENS OF CELLULAR TELEPHONES AT ONCE, DISCARDING EACH AFTER USING IT FOR ONLY A SHORT...
Page 7 - My view is shaped by my experiences as an Assistant United States Attorney in the Southern District of New York from 1991-1994, and as an Associate Counsel in the office of the regulatory Whitewater Independent Counsel, Robert B.
Page 38 - Thank you, Mr. Chairman. Mr. McCOLLUM. Thank you very much. Mr. Hutchinson, you are recognized for 5 minutes.
Page 16 - MORE NEEDS TO BE DONE. I WOULD LIKE TO BRIEFLY MENTION SOME OF THE INITIATIVES UNDERWAY THAT CAN BE DISCUSSED IN OPEN SESSION. ON THE TECHNOLOGY FRONT, CONGRESS IN 1994 PASSED THE COMMUNICATIONS ASSISTANCE TO LAW ENFORCEMENT ACT (CALEA) TO PRESERVE ONE OF LAW ENFORCEMENT'S MOST VALUABLE INVESTIGATIVE TECHNIQUES— COURT-AUTHORIZED WIRETAPPING— WHICH WAS BEING LOST TO NEW TECHNOLOGY.
Page 11 - Defense, and many other Federal agencies, to prepare for those very catastrophic tendencies. In major public events, presidential conventions, inaugurations, and events to come, we now plan for those very important events with a view of these threats in mind. NCIC 2000 and the IAFIS projects will...
Page 15 - NOT LONG AGO, NO ONE PERCEIVED THAT TELEPHONE SYSTEMS COULD BECOME UNTAPPABLE, THAT VIRTUALLY UNBREAKABLE ENCRYPTION WOULD BECOME COMMONPLACE, THAT PEOPLE USING POWERFUL LAPTOP COMPUTERS IN DISTANT LANDS COULD STEAL IN SECONDS SENSATIONAL AMOUNTS OF MONEY, OR THAT THE MARVELS OF THE INTERNET COULD BE USED FOR EVIL AGAINST CHILDREN.
Page 19 - ... COUNTRIES. THIS COUPLED WITH A GREATLY ENHANCED FOREIGN POLICE TRAINING PROGRAM THAT CONDUCTS CLASSES BOTH HERE AND ABROAD GREATLY EXPANDS THE FBI'S ABILITY TO CONDUCT INVESTIGATIONS THAT HAVE INTERNATIONAL ASPECTS AND SPREADS THROUGHOUT THE REGION THE FUNDAMENTALS OF POLICING UNDER THE RULE OF LAW.

Bibliographic information